How do I determine if the Windows binary is 32 bit? When I run it with "-v" it only shows me the version number.
I thought that these lines were very interesting. It says the version is 1, but I passed in 2c to snmptrap when I generated the trap. mibII/vacm_vars: vacm_in_view: ver=1, community=trappy trace: vacm_check_view_contents(): mibgroup/mibII/vacm_conf.c, 1401: mibII/vacm_vars: vacm_in_view: No security name found Here's the full dump of the messages from -DALL: trace: netsnmp_ipv6_fmtaddr(): transports/snmpIPv6BaseDomain.c, 97: netsnmp_ipv6: fmtaddr: t = (nil), data = 0xa39920, len = 28 trace: netsnmp_udp6_recv(): transports/snmpUDPIPv6Domain.c, 131: netsnmp_udp6: recvfrom fd 8 got 69 bytes (from UDP/IPv6: [fd22:2222:2222:3490::1]:40890) trace: netsnmp_ipv6_fmtaddr(): transports/snmpIPv6BaseDomain.c, 97: netsnmp_ipv6: fmtaddr: t = 0xa3a7a0, data = 0xa39920, len = 28 transport:recv: 69 bytes from UDP/IPv6: [fd22:2222:2222:3490::1]:40890 trace: _sess_process_packet(): snmp_api.c, 5171: sess_process_packet: session 0xa37ff0 fd 8 pkt 0xa484b0 length 69 trace: snmp_parse_version(): snmp_api.c, 3489: dumph_recv: SNMP Version dumpx_recv: 02 01 01 dumpv_recv: Integer: 1 (0x01) trace: _snmp_parse(): snmp_api.c, 4084: snmp_api: Parsing SNMPv2 message... trace: _snmp_parse(): snmp_api.c, 4094: dumph_recv: SNMPv2c message trace: snmp_comstr_parse(): snmp_auth.c, 130: dumph_recv: SNMP version dumpx_recv: 02 01 01 dumpv_recv: Integer: 1 (0x01) trace: snmp_comstr_parse(): snmp_auth.c, 142: dumph_recv: community string dumpx_recv: 04 06 74 72 61 70 70 79 dumpv_recv: String: trappy trace: _snmp_parse(): snmp_api.c, 4140: dumph_recv: PDU trace: snmp_pdu_parse(): snmp_api.c, 4360: dumpv_recv: Command TRAP2 trace: snmp_pdu_parse(): snmp_api.c, 4445: dumph_recv: request_id dumpx_recv: 02 04 31 43 6D 8F dumpv_recv: Integer: 826502543 (0x31436D8F) trace: snmp_pdu_parse(): snmp_api.c, 4456: dumph_recv: error status dumpx_recv: 02 01 00 dumpv_recv: Integer: 0 (0x00) trace: snmp_pdu_parse(): snmp_api.c, 4467: dumph_recv: error index dumpx_recv: 02 01 00 dumpv_recv: Integer: 0 (0x00) trace: snmp_pdu_parse(): snmp_api.c, 4485: dumph_recv: VarBindList trace: snmp_pdu_parse(): snmp_api.c, 4515: dumph_recv: VarBind trace: snmp_parse_var_op(): snmp.c, 164: dumph_recv: Name dumpx_recv: 06 08 2B 06 01 02 01 01 03 00 dumpv_recv: ObjID: DISMAN-EVENT-MIB::sysUpTimeInstance trace: snmp_pdu_parse(): snmp_api.c, 4524: dumph_recv: Value dumpx_recv: 43 01 2A dumpv_recv: UInteger: 42 (0x2A) trace: snmp_pdu_parse(): snmp_api.c, 4515: dumph_recv: VarBind trace: snmp_parse_var_op(): snmp.c, 164: dumph_recv: Name dumpx_recv: 06 0A 2B 06 01 06 03 01 01 04 01 00 dumpv_recv: ObjID: SNMPv2-MIB::snmpTrapOID.0 trace: snmp_pdu_parse(): snmp_api.c, 4524: dumph_recv: Value dumpx_recv: 06 09 2B 06 01 06 03 01 01 05 04 dumpv_recv: ObjID: IF-MIB::linkUp trace: _sess_process_packet(): snmp_api.c, 5218: sess_process_packet: received message id#0 reqid#826502543 len 69 trace: snmp_input(): snmptrapd_handlers.c, 969: snmptrapd: input: a7 trace: snmp_input(): snmptrapd_handlers.c, 1027: snmptrapd: Trap OID: IF-MIB::linkUp trace: snmp_input(): snmptrapd_handlers.c, 1053: snmptrapd: Running auth trap handlers trace: netsnmp_trapd_check_auth(): snmptrapd_auth.c, 179: snmptrapd:auth: Comparing auth types: result=0, request=0, result=1 trace: netsnmp_trapd_auth(): snmptrapd_auth.c, 130: snmptrapd:auth: Calling VACM for checking phase 0:read trace: vacm_check_view_contents(): mibgroup/mibII/vacm_conf.c, 1300: mibII/vacm_vars: vacm_in_view: ver=1, community=trappy trace: vacm_check_view_contents(): mibgroup/mibII/vacm_conf.c, 1401: mibII/vacm_vars: vacm_in_view: No security name found trace: netsnmp_trapd_auth(): snmptrapd_auth.c, 138: snmptrapd:auth: result: not authorized trace: netsnmp_trapd_auth(): snmptrapd_auth.c, 130: snmptrapd:auth: Calling VACM for checking phase 1:write trace: vacm_check_view_contents(): mibgroup/mibII/vacm_conf.c, 1300: mibII/vacm_vars: vacm_in_view: ver=1, community=trappy trace: vacm_check_view_contents(): mibgroup/mibII/vacm_conf.c, 1401: mibII/vacm_vars: vacm_in_view: No security name found trace: netsnmp_trapd_auth(): snmptrapd_auth.c, 138: snmptrapd:auth: result: not authorized trace: netsnmp_trapd_auth(): snmptrapd_auth.c, 130: snmptrapd:auth: Calling VACM for checking phase 2:notify trace: vacm_check_view_contents(): mibgroup/mibII/vacm_conf.c, 1300: mibII/vacm_vars: vacm_in_view: ver=1, community=trappy trace: vacm_check_view_contents(): mibgroup/mibII/vacm_conf.c, 1401: mibII/vacm_vars: vacm_in_view: No security name found trace: netsnmp_trapd_auth(): snmptrapd_auth.c, 138: snmptrapd:auth: result: not authorized trace: netsnmp_trapd_auth(): snmptrapd_auth.c, 130: snmptrapd:auth: Calling VACM for checking phase 3:log trace: vacm_check_view_contents(): mibgroup/mibII/vacm_conf.c, 1300: mibII/vacm_vars: vacm_in_view: ver=1, community=trappy trace: vacm_check_view_contents(): mibgroup/mibII/vacm_conf.c, 1401: mibII/vacm_vars: vacm_in_view: No security name found trace: netsnmp_trapd_auth(): snmptrapd_auth.c, 138: snmptrapd:auth: result: not authorized trace: netsnmp_trapd_auth(): snmptrapd_auth.c, 130: snmptrapd:auth: Calling VACM for checking phase 4:execute trace: vacm_check_view_contents(): mibgroup/mibII/vacm_conf.c, 1300: mibII/vacm_vars: vacm_in_view: ver=1, community=trappy trace: vacm_check_view_contents(): mibgroup/mibII/vacm_conf.c, 1401: mibII/vacm_vars: vacm_in_view: No security name found trace: netsnmp_trapd_auth(): snmptrapd_auth.c, 138: snmptrapd:auth: result: not authorized trace: netsnmp_trapd_auth(): snmptrapd_auth.c, 130: snmptrapd:auth: Calling VACM for checking phase 5:net trace: vacm_check_view_contents(): mibgroup/mibII/vacm_conf.c, 1300: mibII/vacm_vars: vacm_in_view: ver=1, community=trappy trace: vacm_check_view_contents(): mibgroup/mibII/vacm_conf.c, 1401: mibII/vacm_vars: vacm_in_view: No security name found trace: netsnmp_trapd_auth(): snmptrapd_auth.c, 138: snmptrapd:auth: result: not authorized trace: netsnmp_trapd_auth(): snmptrapd_auth.c, 130: snmptrapd:auth: Calling VACM for checking phase 6:(null) trace: vacm_check_view_contents(): mibgroup/mibII/vacm_conf.c, 1300: mibII/vacm_vars: vacm_in_view: ver=1, community=trappy trace: vacm_check_view_contents(): mibgroup/mibII/vacm_conf.c, 1401: mibII/vacm_vars: vacm_in_view: No security name found trace: netsnmp_trapd_auth(): snmptrapd_auth.c, 138: snmptrapd:auth: result: not authorized trace: netsnmp_trapd_auth(): snmptrapd_auth.c, 130: snmptrapd:auth: Calling VACM for checking phase 7:(null) trace: vacm_check_view_contents(): mibgroup/mibII/vacm_conf.c, 1300: mibII/vacm_vars: vacm_in_view: ver=1, community=trappy trace: vacm_check_view_contents(): mibgroup/mibII/vacm_conf.c, 1401: mibII/vacm_vars: vacm_in_view: No security name found trace: netsnmp_trapd_auth(): snmptrapd_auth.c, 138: snmptrapd:auth: result: not authorized trace: netsnmp_trapd_auth(): snmptrapd_auth.c, 141: snmptrapd:auth: Final bitmask auth: 0 trace: netsnmp_trapd_auth(): snmptrapd_auth.c, 155: snmptrapd:auth: Dropping unauthorized message trace: _sess_read(): snmp_api.c, 5512: sess_read: not reading 7 (fdset 0x7ffff9ba6030 set 0) trace: _sess_read(): snmp_api.c, 5512: sess_read: not reading 5 (fdset 0x7ffff9ba6030 set 0) trace: _sess_read(): snmp_api.c, 5512: sess_read: not reading 3 (fdset 0x7ffff9ba6030 set 0) trace: snmp_sess_select_info2_flags(): snmp_api.c, 6015: sess_select: for all sessions: 8 7 5 3 sess_select: next alarm at 182583.984172 sec verbose:sess_select: timer due in 5.869168 sec ^C2014-05-09 14:04:42 NET-SNMP version 5.7.2.1 Stopped. ---- On Fri, 09 May 2014 07:47:02 -0700 Bill Fenner wrote ---- >Let's get to the bottom of this. One notable difference between our >configurations is that on my example system that worked, I was running a >32-bit binary. It's not outside the realm of possibility that there's a >64-bit bug here. (Was the Windows binary 32-bit?) > >Forget about "-d", how about running snmtrapd with -DALL? It will, of course, >be incredibly verbose, but we should be able to get to the bottom of why it's >ignoring the trap. > > > Bill > > > > > >On Thu, May 8, 2014 at 6:54 PM, christopher.wu wrote: > My configuration and invocation is similar. To simplify things I did some > testing using your exact examples and found that the same problem happened. > > I sent the trap using your syntax and port: > > snmptrap -v 2c -c trappy > "udp6:[fd22:2222:2222:3490:be5f:f4ff:fee1:a1ef]:2000" 42 linkUp; > > Because of the -d arg passed to snmptrapd I see the packet coming in, but it > is not accepted. > > /tmp>sudo snmptrapd -d -Le -f -c ~/snmptrapd.conf udp:2000 udp6:2000 > NET-SNMP version 5.7.2.1 > > Received 69 byte packet from UDP/IPv6: [fd22:2222:2222:3490::1]:57327 > 0000: 30 43 02 01 01 04 06 74 72 61 70 70 79 A7 36 02 0C.....trappy.6. > 0016: 04 0E 96 8D 3D 02 01 00 02 01 00 30 28 30 0D 06 ....=......0(0.. > 0032: 08 2B 06 01 02 01 01 03 00 43 01 2A 30 17 06 0A .+.......C.*0... > 0048: 2B 06 01 06 03 01 01 04 01 00 06 09 2B 06 01 06 +...........+... > 0064: 03 01 01 05 04 ..... > > ^C2014-05-08 16:13:09 NET-SNMP version 5.7.2.1 Stopped. > Stopping snmptrapd > > I used the same conf file as you did: > > /tmp>cat ~/snmptrapd.conf > authCommunity log trappy > /tmp> > > This is on 64 bit Xubuntu. Here's the 'uname -a' output: > Linux cwu-dev2 3.13.0-24-generic #47-Ubuntu SMP Fri May 2 23:30:00 UTC 2014 > x86_64 x86_64 x86_64 GNU/Linux > > I decided to try sending traps to a completely different PC that I put on the > same network. I used a PC running the 64 bit version of Windows 7. To my > surprise it worked. I couldn't test with version 5.7.2.1 because Windows > binaries for that version aren't available yet. > > C:ar>snmptrapd -d -Le -f -c snmptrapd.conf udp:2000 udp6:2000 > NET-SNMP version 5.5 > > Received 69 bytes from UDP/IPv6: [fd22:2222:2222:3490::1]:59337 > 0000: 30 43 02 01 01 04 06 74 72 61 70 70 79 A7 36 02 0C.....trappy§6. > 0016: 04 40 E0 C1 B2 02 01 00 02 01 00 30 28 30 0D 06 .@àA²......0(0.. > 0032: 08 2B 06 01 02 01 01 03 00 43 01 2A 30 17 06 0A .+.......C.*0... > 0048: 2B 06 01 06 03 01 01 04 01 00 06 09 2B 06 01 06 +.......... +... > 0064: 03 01 01 05 04 ..... > > 2014-05-08 18:38:14 UDP/IPv6: [fd22:2222:2222:3490::1]:59337 [UDP/IPv6: > [fd22:2222:2222:3490::1]:59337]: > DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks: (42) 0:00:00.42 > SNMPv2-MIB::snmpTrapOID.0 = OID: IF-MIB::linkUp > >^C > C:ar> > > ---- On Thu, 08 May 2014 07:37:35 -0700 Bill Fenner wrote ---- > > >Can you say more about your configuration and invocation? > > > >Using net-snmp 5.7.2, I ran: > > > > > >snmptrapd -Le -f -c ~/snmptrapd.conf udp:2000 udp6:2000 > > > > > > > >with just this line in ~/snmptrapd.conf > > > > > >authCommunity log trappy > > > > > > > >and then sent a trap with: > > > > > >snmptrap -v 2c -c trappy > >"udp6:[fd7a:629f:52a4:2010:225:90ff:fea8:86a2]:2000" 42 linkUp > > > > > > > >and got: > > > > > > 2014-05-08 07:34:17 UDP/IPv6: > > [fd7a:629f:52a4:2010:225:90ff:fea8:86a2]:50583 [UDP/IPv6: > > [fd7a:629f:52a4:2010:225:90ff:fea8:86a2]:50583]: > >DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks: (42) 0:00:00.42 > >SNMPv2-MIB::snmpTrapOID.0 = OID: IF-MIB::linkUp > > > > > > > > Bill > > > > > > > >>On Thu, May 1, 2014 at 2:00 PM, christopher.wu wrote: > > I'm having a strange problem where my snmptrapd server will not accept v2 > > traps/informs if they are sent via ipv6. My snmptrapd server is version > > 5.7.2.1 running on Linux. The traps/informs are being sent by version > > 5.5.1 of snmptrap, also on Linux. I tried version 5.7.2.1 of snmptrap but > > that did not work either. > > > > Here are the scenarios: > > > > 1) v3 inform sent via ipv4 - works > > 1) v3 inform sent via ipv6 - works > > 2) change to v2 and send to same ipv6 address - fails. Because I'm running > > snmptrapd with the '-d' arg I do see the packet come in, but it is not > > accepted. In the packet dump I can see the correct v2 community name is > > being used. Of course I switched to a different, appropriate v2 config > > file for snmptrapd when I switched from sending v3 to v2 traps. > > 3) keep the same v2 credentials and send via ipv4 - works > > > > I couldn't find anything in the bug database that mentions this. Are there > > any debugging steps that I can do to help figure out what is happening? > > > > Here's an example of ipv4 working but ipv6 not when v2 is used. > > > > > > Received 75 byte packet from UDP: [192.168.108.1]:55953->[192.168.108.2]:162 > > 0000: 30 49 02 01 01 04 0A 4E 4F 54 57 4F 52 4B 49 4E 0I.....NOTWORKIN > > 0016: 47 A6 38 02 04 1E 48 83 BD 02 01 00 02 01 00 30 G.8...H........0 > > 0032: 2A 30 0F 06 08 2B 06 01 02 01 01 03 00 43 03 67 *0...+.......C.g > > 0048: 66 B4 30 17 06 0A 2B 06 01 06 03 01 01 04 01 00 f.0...+......... > > 0064: 06 09 2B 06 01 06 03 01 01 05 01 ..+........ > > > > 2014-05-01 13:47:02 UDP: [192.168.108.1]:55953->[192.168.108.2]:162 [UDP: > > [192.168.108.1]:55953->[192.168.108.2]:162]: > > DISMAN-EXPRESSION-MIB::sysUpTimeInstance = Timeticks: (6776500) 18:49:25.00 > > SNMPv2-MIB::snmpTrapOID.0 = OID: SNMPv2-MIB::coldStart > > > > Sending 75 bytes to UDP: [192.168.108.1]:55953->[192.168.108.2]:162 > > 0000: 30 49 02 01 01 04 0A 4E 4F 54 57 4F 52 4B 49 4E 0I.....NOTWORKIN > > 0016: 47 A2 38 02 04 1E 48 83 BD 02 01 00 02 01 00 30 G.8...H........0 > > 0032: 2A 30 0F 06 08 2B 06 01 02 01 01 03 00 43 03 67 *0...+.......C.g > > 0048: 66 B4 30 17 06 0A 2B 06 01 06 03 01 01 04 01 00 f.0...+......... > > 0064: 06 09 2B 06 01 06 03 01 01 05 01 ..+........ > > > > > > Received 74 byte packet from UDP/IPv6: [fd22:2222:2222:3490::1]:33344 > > 0000: 30 48 02 01 01 04 0A 4E 4F 54 57 4F 52 4B 49 4E 0H.....NOTWORKIN > > 0016: 47 A6 37 02 03 68 5B 7F 02 01 00 02 01 00 30 2A G.7..h[.......0* > > 0032: 30 0F 06 08 2B 06 01 02 01 01 03 00 43 03 67 66 0...+.......C.gf > > 0048: B4 30 17 06 0A 2B 06 01 06 03 01 01 04 01 00 06 .0...+.......... > > 0064: 09 2B 06 01 06 03 01 01 05 01 .+........ > > > > > > Received 74 byte packet from UDP/IPv6: [fd22:2222:2222:3490::1]:33344 > > 0000: 30 48 02 01 01 04 0A 4E 4F 54 57 4F 52 4B 49 4E 0H.....NOTWORKIN > > 0016: 47 A6 37 02 03 68 5B 7F 02 01 00 02 01 00 30 2A G.7..h[.......0* > > 0032: 30 0F 06 08 2B 06 01 02 01 01 03 00 43 03 67 66 0...+.......C.gf > > 0048: B4 30 17 06 0A 2B 06 01 06 03 01 01 04 01 00 06 .0...+.......... > > 0064: 09 2B 06 01 06 03 01 01 05 01 .+........ > > > > > > ------------------------------------------------------------------------------ > > "Accelerate Dev Cycles with Automated Cross-Browser Testing - For FREE > > Instantly run your Selenium tests across 300+ browser/OS combos. Get > > unparalleled scalability from the best Selenium testing platform available. > > Simple to use. Nothing to install. Get started now for free." > > http://p.sf.net/sfu/SauceLabs > > _______________________________________________ > > Net-snmp-users mailing list > > Net-snmp-users@lists.sourceforge.net > > Please see the following page to unsubscribe or change other options: > > https://lists.sourceforge.net/lists/listinfo/net-snmp-users > > > > > > > > > > > > > > > ------------------------------------------------------------------------------ Is your legacy SCM system holding you back? Join Perforce May 7 to find out: • 3 signs your SCM is hindering your productivity • Requirements for releasing software faster • Expert tips and advice for migrating your SCM now http://p.sf.net/sfu/perforce _______________________________________________ Net-snmp-users mailing list Net-snmp-users@lists.sourceforge.net Please see the following page to unsubscribe or change other options: https://lists.sourceforge.net/lists/listinfo/net-snmp-users