Hi Craig, Following are my observations. Please let me know if the behaviour is correct.
----------snmp agent 192.168.1.12------------------------------------------- I added two snmpv3 users createUser pushaaes129 SHA mypassword AES192 mypassword createUser pushaaes129c SHA mypassword AES192C mypassword --------snmp manager 192.168.1.13 -------------------------- pushpat@pushpat-ThinkPad-L480:~$ snmpget -D -t50 -v3 -u pushaaes129c -l authPriv -a SHA1 -A mypassword -x *AES192C* -X mypassword 192.168.1.12 SNMPv2-MIB::sysDescr.0 registered debug token t50, 0 SNMPv2-MIB::sysDescr.0 = STRING: Microsemi pushpat@pushpat-ThinkPad-L480:~$ snmpget -D -t50 -v3 -u pushaaes129c -l authPriv -a SHA1 -A mypassword -x* AES192 *-X mypassword 192.168.1.12 SNMPv2-MIB::sysDescr.0 registered debug token t50, 0 Timeout: No Response from 192.168.1.12. pushpat@pushpat-ThinkPad-L480:~$ I thought AES192, AES192C are same. It looks like they are not. Any idea when to use AES192 and AES192C(cisco algorithm) =========== USM entries in snmp agent persistent config================================= usmUser 1 3 0x<engineid> "pushaaes129" "pushaaes129" NULL .1.3.6.1.6.3.10.1.1.3 0x837954cd0cadfa4c198f22bf7b1b15db1141b8b1 .1.3.6.1.4.1.14832.1.3 0x837954cd0cadfa4c198f22bf7b1b15db1141b8b18f973286 0x usmUser 1 3 0x<engineid> "pushaaes129c" "pushaaes129c" NULL .1.3.6.1.6.3.10.1.1.3 0x837954cd0cadfa4c198f22bf7b1b15db1141b8b1 .1.3.6.1.4.1.9.12.6.1.1 0x837954cd0cadfa4c198f22bf7b1b15db1141b8b15aeeb711 0x .1.3.6.1.4.1.9.12.6.1.1 : iso(1) identified-organization(3) dod(6) internet(1) private(4) enterprise(1) cisco(9) .1.3.6.1.4.1.14832.1.3 : iso(1) org(3) dod(6) internet(1) private(4) enterprise(1) esoConsortiumMIB(14832) On Thu, Sep 16, 2021 at 5:07 AM Craig Small <csm...@dropbear.xyz> wrote: > Hi Pushpa, > It's a matter of identifying it. > > When the packet comes in, the receiver looks at the authentication > protocol and sees one value or the other. That's why you need to specify > which method you are using. > In theory, I expect that the receiver could just look at the auth protocol > and use the same method for both values, but they don't. > > - Craig > > > On Wed, 15 Sept 2021 at 15:44, Pushpa Thimmaiah < > pushpa.thimma...@gmail.com> wrote: > >> Hi Craig Small, >> >> Thank you . This is really helpful. >> If AES192 and AES192C are AES standard from different entity then are >> they interchangeable ? >> Eg: I did configure AES192 on snmpd and use AES192C from mibbrowser. >> Tool 'snmpget' fails. >> >> It would help me if I know why CFB-AES192 (on silvercreek browser) fails >> with AES192 configured on snmp-agent. It works fine when AES192C >> configured on snmpd. >> >> >> On Wed, Sep 15, 2021 at 4:10 AM Craig Small <csm...@dropbear.xyz> wrote: >> >>> Hi Pushpa, >>> As you have discovered, there are two AES192 standards. >>> >>> When you select AES192 (with no C) this is the IETF draft Blumenthal >>> standard. >>> >>> When you select AES192C this is the Cisco "standard". >>> >>> What is the actual difference? As far as I can tell, it comes down to >>> the OID used for some of the parameters like the IV. >>> >>> The Cisco standard uses something under enterprises.Cisco, as you would >>> expect, while the draft IETF standard uses something under enterprises.ESO >>> ESO is Extended Security Options consortium, you can see their MIB at >>> http://www.snmp.com/eso/esoConsortiumMIB.txt >>> >>> To me, it looks like the same protocol, just how it identifies itself >>> and where it stores things changes. So it's not like one is doing CFB and >>> the other thought for some reason ECB was the way to go. >>> >>> If you look online for SNMP and AES 192 or 256, you can see this >>> confuses a bunch of people (e.g. AES192 works for device X, but not device >>> Y, why?) >>> >>> - Craig >>> >>> ObXKCD https://xkcd.com/927/ >>> >>> >>> On Wed, 15 Sept 2021 at 01:51, Pushpa Thimmaiah < >>> pushpa.thimma...@gmail.com> wrote: >>> >>>> Hi Folks, >>>> >>>> I am using SilverCreek as mib browser(windows10) and net-snmp-.5.9 on >>>> snmp-agent(linux). >>>> >>>> *snmp-agent* >>>> creatUser testmd5aes192 MD5 testingauth AES192 testingpriv >>>> >>>> *SilverCreek* >>>> It provides CFB-AES192 option for privprotocol . So I selected >>>> authprotocol as 'MD5' and priv protocol 'CFB-AES192' >>>> snmpquery on fails for this >>>> >>>> So, I changed AES192 to AES192C at snmp-agent side as mentioned below >>>> and it works >>>> creatUser testmd5aes192 MD5 testingauth AES192C testingpriv >>>> >>>> Kindly let me know when to use AES192 and AES192C. Is it based on >>>> cipher methods of AES? >>>> >>>> Thanks, >>>> Pushpa.T >>>> >>>> >>>> _______________________________________________ >>>> Net-snmp-coders mailing list >>>> Net-snmp-coders@lists.sourceforge.net >>>> https://lists.sourceforge.net/lists/listinfo/net-snmp-coders >>>> >>>
_______________________________________________ Net-snmp-coders mailing list Net-snmp-coders@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/net-snmp-coders