> From: Meilán García Antonio [mailto:[EMAIL PROTECTED] 
> Sent: Tuesday, December 18, 2007 12:06 PM
> To: Mike Ayers

> The question is that my communities names can be change remotly, 
> so you can to get this final configuration

        You should not change the *name* of the community, you should change 
its *permissions*.  By changing the community name, you risk clobbering an 
existing community, which results in a nonworking configuration, which is 
apparently what you ran into.

        If you are asking if you can undo the clobbering with SNMP operations, 
the answer is a definite maybe.  If the "private" community is your only 
security principal with write permission, then there's nothing you can do, 
since you no longer have any write access.  If you have a security principal 
(v1/v2c community or v3 user) with write access, then change the entry in the 
snmpCommunityTable that maps the security name "public_sec" to the community 
"private", and change the community name back to "public".  That should return 
"private" to functional status.

        Note that each line in your security configuration (com2sec, group, 
etc.) represents an entry in a standard MIB table.  The "com2sec" lines 
configure the snmpCommunityTable, the "group", "view", and "access" lines 
configure VACM tables, etc.


> #       sec.name  source          community
> com2sec public_sec default private
> com2sec private_sec default private
> 
> #       groupName    securityModel    securityName
> group   public_grp    v1        public_sec
> group   public_grp    v2c        public_sec
> group   private_grp    v1        private_sec
> group   private_grp    v2c        private_sec
> 
> #       name        incl/excl    subtree        mask(optional)
> view    rview        included        system.sysName
> view    rwview        included        system.sysName
> 
> #       group        context    sec.model    sec.level    prefix    
> read    write    notif
> access    public_grp    ""    any        noauth        exact  
>   rview    none    none
> access    private_grp    ""    any        noauth        exact 
>    rwview    rwview    rview
> 
> (in the other case I had
> access    private_grp    ""    any        noauth        exact 
>    rview    rwview    rview
> but that does not matter)

        I'm confused - both lines are the same.

> I don't know if It is normal that with this configuration you 
> can not to set variables, because the agent mix the 
> permissions if you try to do a set with 'private'
> (snmpset -v2c -c private host name)

        Defaulting to a secure posture is good.  Perhaps you can't manage your 
machine, but neither can an attacker who messes with your security tables.

> I solvented this preventing that this never happen, if the 
> manager try to change for example, 'public' for 'private' 
> (both would be 'private') I give a SNMP_ERR_BADVALUE

        I'm not sure at what level you made this change, but it might not be a 
bad idea.  I'd have to review and meditate upon some RFCs before I knew for 
sure there wasn't a good reason to put multiple security names on a community.


        HTH,

Mike

-------------------------------------------------------------------------
SF.Net email is sponsored by:
Check out the new SourceForge.net Marketplace.
It's the best place to buy or sell services
for just about anything Open Source.
http://ad.doubleclick.net/clk;164216239;13503038;w?http://sf.net/marketplace
_______________________________________________
Net-snmp-users mailing list
[email protected]
Please see the following page to unsubscribe or change other options:
https://lists.sourceforge.net/lists/listinfo/net-snmp-users

Reply via email to