On Mon, Apr 9, 2018 at 12:21 PM, Simon Chamlian <simon.chaml...@mpbc.ca>
wrote:

> Hi ,
>
> Thanks for the information Bill. So  --with-transports="DTLSUDP"
> --with-security-modules="tsm" are not required but simply
> --enable-blumenthal-aes
>
> So I compiled the agent using the following configuration:
>
> ./configure  --disable-embedded-perl
>                  --without-perl-modules with_endianness=big
>                  --enable-mini-agent --with-default-snmp-version="3"
>  --disable-debugging
>                  --with-sys-contact="who@where"
> --with-logfile="/var/log/snmp"
>                  --with-transports="UDP TCP"
>                  --enable-blumenthal-aes
>
> In snmpd.conf I have:
>
>    createUser user   MD5 "authpw-00"
>    rwuser     user
>
>    createUser user1  MD5 "authpw-00" AES "default-00"
>    rwuser     user1
>
>    createUser user2  MD5 "authpw-00" AES192 "default-00"
>    rwuser     user2
>
> 1) The error message unknown privProtocol has disappeared from log file.
> 2) From the MIB browser, I do a GET on one of the OID using user  (noPriv)
> and it works fine.
> 3) From the MIB browser, I do a GET on one of the OID using user2 using
> AES-128 and it works fine .
> 4) From the MIB browser, I do a GET on one of the OID using user3 using
> AES-192 and it DOES NOT work! I get the following error in the log file:
>
>      security service 3 error parsing ScopedPDU
>
>  What I am missing?
>

There are two ways to take a short auth key and lengthen it for a strong
privacy algorithm.  Two things to try:

1. Use "AES192C" for the user instead of "AES192" (this uses the "Cisco"
algorithm);
2. Use a stronger auth mechanism, which creates a longer auth key, which
doesn't have to be lengthened for the strong privacy algorithm, avoiding
the question of how to lengthen it. I think SHA suffices, but of course
SHA224, SHA256, SHA384 and SHA512 are available to try.

  Bill


>
> On Fri, Apr 6, 2018 at 8:49 PM, Bill Fenner <fen...@gmail.com> wrote:
>
>> Simon,
>>
>> The USM AES192 and AES256 support is based upon an Internet Draft, which
>> never became a standard - therefore, you have to pass
>> "--enable-blumenthal-aes" to ./configure. (You don't have to enable TSM or
>> the TLS transports; that's a whole different kettle of fish.)
>>
>>   Bill
>>
>>
>> On Fri, Apr 6, 2018 at 12:01 PM, Simon Chamlian <simon.chaml...@mpbc.ca>
>> wrote:
>>
>>> Thanks for the tip.
>>>
>>> I did compile with the following options:
>>>
>>>     --disable-embedded-perl
>>>     --without-perl-modules with_endianness=big
>>>     --enable-mini-agent
>>>     --with-default-snmp-version="3"
>>>     --enable-ipv6
>>>     --disable-debugging
>>>     --with-sys-contact="who@where"
>>>     --with-logfile="/var/log/snmp"
>>>
>>> *--with-transports="DTLSUDP TLSTCP"     --with-security-modules="tsm" *
>>>
>>>
>>> Still when I put
>>>
>>> createUser User2  MD5 "passwrd-00" AES192 (or AES-192) "default-00"
>>>
>>> I get an error message:
>>>
>>> snmpd.conf: line 27: Error: unknown privProtocol
>>>
>>> So does SNMP 5.8 support AES192 and AES256?
>>> Is it another syntax I need in snmpd.conf?
>>>
>>> Thanks,
>>>
>>> S.
>>>
>>>
>>>
>>>
>>> On Thu, Apr 5, 2018 at 5:14 PM, Keith Mendoza <panthe...@gmail.com>
>>> wrote:
>>>
>>>> Simon,
>>>> Those options have to be enabled in the configure options. I suggest
>>>> building with the following configure options:
>>>>     --with-transports="DTLSUDP" --with-security-modules="tsm"
>>>>
>>>> There might be other configure options that you need to make it work.
>>>>
>>>> Just note though that SNMPv3 RFC _does not_ specify AES192 and AES256;
>>>> they specified some older algorithms that were "latest and greatest"
>>>> at the time it was being drafted :(
>>>>
>>>> Thanks,
>>>> Keith
>>>> Thanks,
>>>> Keith
>>>>
>>>>
>>>> On Thu, Apr 5, 2018 at 1:54 PM, Simon Chamlian <simon.chaml...@mpbc.ca>
>>>> wrote:
>>>> >
>>>> >
>>>> >
>>>> > Hi,
>>>> >
>>>> > Does Net-SNMP support AES192 or AES256?
>>>> >
>>>> > According to this link
>>>> >
>>>> > http://www.net-snmp.org/wiki/index.php/Strong_Authentication
>>>> _or_Encryption
>>>> >
>>>> > The short answer is Yes, starting with release 5.8 AES193 and AES256
>>>> are an
>>>> > optional configure option.
>>>> >
>>>> > So I downloaded version 5.8.pre2 and tried:
>>>> >
>>>> >
>>>> >   createUser user2  SHA "passwrd-00" AES192 "default-00"
>>>> >   rwuser       user2
>>>> >
>>>> >   createUser user3  SHA "passwrd-00" AES256 "default-00"
>>>> >   rwuser       user3
>>>> >
>>>> >
>>>> > Does not work. I get an error:
>>>> >   snmpd.conf: line 27: Error: unknown privProtocol
>>>> >   snmpd.conf: line 31: Error: unknown privProtocol
>>>> >
>>>> > Any insight will be highly appreciated.
>>>> >
>>>> > S.
>>>> >
>>>> >
>>>> >
>>>> >
>>>> > ------------------------------------------------------------
>>>> ------------------
>>>> > Check out the vibrant tech community on one of the world's most
>>>> > engaging tech sites, Slashdot.org! http://sdm.link/slashdot
>>>> > _______________________________________________
>>>> > Net-snmp-coders mailing list
>>>> > Net-snmp-coders@lists.sourceforge.net
>>>> > https://lists.sourceforge.net/lists/listinfo/net-snmp-coders
>>>> >
>>>>
>>>
>>>
>>> ------------------------------------------------------------
>>> ------------------
>>> Check out the vibrant tech community on one of the world's most
>>> engaging tech sites, Slashdot.org! http://sdm.link/slashdot
>>> _______________________________________________
>>> Net-snmp-coders mailing list
>>> Net-snmp-coders@lists.sourceforge.net
>>> https://lists.sourceforge.net/lists/listinfo/net-snmp-coders
>>>
>>>
>>
>
------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Net-snmp-coders mailing list
Net-snmp-coders@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/net-snmp-coders

Reply via email to