On 6/22/25 11:44 AM, JustCoding247 wrote:
I am writing to inquire about the proper procedure for reporting a
potential security vulnerability I have discovered in Net-SNMP.
While analyzing the Net-SNMP source code, I have identified what appears
to be a buffer overflow vulnerability in the
On Sat, 8 Mar 2025 at 10:50, Wes Hardaker via Net-snmp-coders <
[email protected]> wrote:
> only be used for bug fixes at this point. Please give 5.10.pre1 a
> whirl -- it certainly won't be perfect yet.
>
I've built 5.10~pre1 using the Debian package
.
___
Net-snmp-coders mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/net-snmp-coders
On 3/10/25 4:27 AM, Stuart Henderson wrote:
gnugk:
snmp.cxx:87:11: error: expected '(' for function-style cast or type construction
trapOID[ OID_LENGTH(trapOID) - 1 ] = trapNumber;
^~~
/usr/local/include/net-snmp/library/asn1.h:65:56: note
*session_ptr;
+ decltype(snmp_sess_open(NULL)) session_ptr;
SNMPSession();
~SNMPSession();
diff --git a/src/SNMP.cpp b/src/SNMP.cpp
index 1763bcac5175..f97e4969a432 100644
--- a/src/SNMP.cpp
+++ b/src/SNMP.cpp
@@ -453,13 +453,16 @@ bool SNMP::send_snmp_request(char *agent_host,
u_int version
configure script and/or autoreconf
when necessary.
An update: a slightly modified version of this patch has been applied.
Bart.
___
Net-snmp-coders mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/net-snmp
On 3/10/25 4:27 AM, Stuart Henderson wrote:
To see how things are going with API changes, I've tested building
everything in OpenBSD ports which depends on this. (I'm not suggesting
that Net-SNMP needs to change anything unless these are unexpected, but
at least giving other package m
stead, let
developers
run autoreconf and/or the Net-SNMP configure script when necessary. See also
https://net-snmp.sourceforge.io/wiki/index.php/Build_System.
---
Makefile.in | 39 ---
stamp-h | 1 -
stamp-h.in | 1 -
3 files changed, 41 deletions(-)
d
; (aka 'const unsigned long[10]')
snmpSession->session.securityAuthProto = usmHMACMD5AuthProtocol;
After having taken a closer look at the ntopng source code, how about
submitting the following (untested) patch to the ntopng project? This
patch should be backwards compatible.
lease mail all replies to [email protected]
___
Net-snmp-coders mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/net-snmp-coders
On 2/28/25 5:14 AM, Michael Schmidt via Net-snmp-coders wrote:
diff --git a/agent/snmp_agent.c b/agent/snmp_agent.c
index 9913a968e1..c728059ac8 100644
--- a/agent/snmp_agent.c
+++ b/agent/snmp_agent.c
@@ -1908,6 +1908,8 @@ netsnmp_wrap_up_request(netsnmp_agent_session *asp, int
status
Greetings net-snmp-devs,
this patch fixes an issue in the latest net-snmp version which inhibits the
proper incrementation of snmpInTotalSetVars. (Issue: Net-SNMP V5.9.x: No
increment of snmpInTotalSetVars #429)
It implements a temporary variable 'command' which is used to save th
NETSNMP_NO_WRITE_SUPPORT
-(asp->pdu->command == SNMP_MSG_SET ?
+(command == SNMP_MSG_SET ?
STAT_SNMPINTOTALSETVARS : STAT_SNMPINTOTALREQVARS),
#else
STAT_SNMPINTOTALREQVARS,
--
2.39.5
_____
: Pushpa Thimmaiah
Sent: Tuesday, February 18, 2025 10:49 AM
To: Net-SNMP Coders
Subject: Regarding OID of AES192
Hi All,
I would like to understand why does oid of AES128 and AES192 not in same branch.
AES128 : .1.3.6.1.6.3.10.1.2.4
AES192 : .1.3.6.1.4.1.14832.1.3
I have seen a snmpagent package
Hello,
I've implemented my own net-snmp Agent in a Linux embedded system.
While the Agent seems to start correctly, it seems the config file parser is
not recognizing the VACM tokens "createUser ", "rwuser", "group", "access" and
"view&quo
at 08:31, Neeraj Bansal
>> wrote:
>> > We recompile everything and install no problem, but instead of fixing
>> our problem it caused net-snmp-5.9.3 to not be able to start. The error it
>> gives is: Bad user id, which could be a red herring. example below:
>> &g
n the same.
If I needed to shift ports around dynamically, I'd approach it from
restarting the daemon and saving the state somehow
or do some funky DNAT/load balancer type thing that moved the ports for me
and left snmpd alone.
___
On 7/30/24 11:46 AM, Niels Baggesen wrote:
You probably need to rerun ldconfig after doing the install.
Since the Net-SNMP library path is passed to the linker with the
linker option -rpath, is it really necessary to run ldconfig after
having installed Net-SNMP? See also commit 3857d43233d4
On Fri, 12 Jul 2024 at 08:31, Neeraj Bansal wrote:
> We recompile everything and install no problem, but instead of fixing our
> problem it caused net-snmp-5.9.3 to not be able to start. The error it gives
> is: Bad user id, which could be a red herring. example below:
> [root@test
er
Please mail all replies to [email protected]
___
Net-snmp-coders mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/net-snmp-coders
Pushpa Thimmaiah writes:
> Could you please confirm net-snmp allows same snmpv3 user with
> different credentials?
No that is not possible. It actually doesn't have to do with Net-SNMP,
the SNMPv3 protocol alone requires a separate user name if you need
different credentials.
--
W
hould never ever have an snmp agent (of any
kind) connected to the internet without a firewall in front of it that
restricts access to only trusted IP addresses. This generally is true
for any SNMP or other management control protocol -- they should be
accessible only from intern
ks for the patch!
Bart.
___
Net-snmp-coders mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/net-snmp-coders
.
___
Net-snmp-coders mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/net-snmp-coders
.
___
Net-snmp-coders mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/net-snmp-coders
good to me.
Thanks,
Bart.
___
Net-snmp-coders mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/net-snmp-coders
On 5/8/24 1:42 AM, Teus Benschop wrote:
I have implemented the f_setup_session() callback in
the snmpTCPBaseDomain.h/.c files.
This callback obtains the port number and copies that into the session
object.
Then from the session object, the local_port is available while
processing the SNMP
On 4/30/24 10:53 AM, Mark Johnston wrote:
Fix var_udp6 and var_tcp6 on FreeBSD
> [ ... ]
This patch has been applied on the V5-9-patches and master branches.
Thanks for the patch!
Bart.
___
Net-snmp-coders mailing list
Net-snmp-cod
nks,
Bart.
___
Net-snmp-coders mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/net-snmp-coders
Hello!
In our project we use net-snmp 5.7.3 and we are going to migrate to 5.9.4.
And the main issue for our project during migration as I could see is that
previously we used authProtocol MD5 for authentication of SNMP users. And the
support of MD5 authProtocol was removed from 5.9.4.
So
ts on this patch/approach? Would
the net-snmp project be willing to accept the patch? Thank you in
advance for any feedback or guidance.
What privileges are required to call kvm_open() on FreeBSD? Are
the same privileges required as for opening /dev/kmem or not? If not,
has it been considered to
cket_free) test, that's a symptom.
I'm not sure if the older library needs the route library or not, so the
next steps are hard to say.
If it was just the new library then a fatal error on Linux for the absence
of either libnl3 or libnl-route-3 would do it.
______
ript, because it
evaluates
libnl-3 + !libnl-route-3 = libnl1
instead of failing.
- Craig
___
Net-snmp-coders mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/net-snmp-coders
Hello All,
I was attempting to compile the git head of net-snmp. One big change is
that uses netlink sockets instead of reading /proc/net/*
The issue is the API is different to the library I can see.
mibgroup/mibII/tcpTable.c:631:12: error: too few arguments to function
‘nl_geterror’
631
Hi,
This email is about working out how the LM-SENSORS MIB should be updated.
If it was just a matter of updating the SNMP agent, I'd just create a pull
request but the MIB is (might be?) different.
The issue is that Gauge32 can only represent a non-negative integer (ref
RFC 2578). which
Hi,
I managed to do a secure DTLS comm between my laptop (snmpget) and my embedded
device net-snmp agent.
But I noticed there's somewhere a memory leak on the Agent (embedded device)
side : I see some 12KB amount of memory taken by the agent each time it
successfully handles such request
Hi,
I'm struggle with agent to be configured for DTLS, so could you confirm my
snmpd.conf file is OK ? :
Here it is -->
createUser vincent MD5 "myPassPhrase" DES "myPrivPhrase"
agentAddress dtlsudp:10161
dtls enable
dtls serverCert /usr/local/etc/snmp/certs/ser
, I changed this and
create proper access directives for my users.
Martijn : tanks for your research, they help me to find out that I need to
populate the /var/net-snmp/snmpv3d.conf with my own createUser directive (for
this, online help tells a “should”, for in my case it’s a “must”).
It appears
Hi Martijn,
Yes, it helps, thanks ! It teaches me things (I’m brand new to the world of
SNMP/net-snmp), and it clearly confirms that I’ve a problem with the creation
of my user.
I would like to keep the creation inside the conf file, but… well…
I tried to play with different combinations
alltboxmibs none
rwuser -s usm vincent priv -V viewalltboxmibs
I tried to create user after group/view/access config, tried also to not use
rwuser, and different combinations but nothing works …
Any ideas ?
De : Niels Baggesen
Envoyé : lundi 29 janvier 2024 20:29
À : net-snmp-coders
Objet : Fw
thing so I added more details (see “In details “) under it.
)))
Regards,
Vincent.
=
Highlights :
-
Reading config file :
-
read_config:line: /usr/local/etc/snmp//snmp
Hello !
I'm working on a net-snmp agent integrated into an industrial embedded system
(ARM-based).
The agent is working perfectly for v1 and v2c, and also with v3 and
'AuthNoPriv' mode. I'm doing my tests with SnmpB software as a client.
But SHA and DES/AES is not work
esses
assigned to interfaces and/or creation/deletion of interfaces, and we
have a requirement that the manager gets notified within a few seconds.
Using Net-SNMP version 5.9.3
When using IP-MIB::ipAddrTable the manager is notified immediately but
when using IP-MIB::ipAddressTable the notificati
Vivek Aditya writes:
> I want the SNMP to start listening on a new agent port without restart.
> Just sending SIGHUP to snmpd does not work.
>
> Is there a way to do it or has this issue already been fixed? Any help
> would be appreciated.
That's a good feature request,
Venkateswarlu K writes:
> We are using net-snmp version 5.7.3 in our ARM based Access Point. Recently we
> are observing snmp core in snmp_alarm.c file with below bt.
Based on the image, we'd need to see in a debugger what the 'a'
structure looks like. I'm not su
;> While upgrading from NETsnmp 5.7.3 to 5.9.3 I encounter a problem which
>> is that root(/) filesystem is missing from UCD-SNMP-MIB disk table:
>
> Is https://github.com/net-snmp/net-snmp/pull/764 perhaps intended as a
> fix for this issue?
>
Yes the issue disappears with t
Hello All,
While upgrading from NETsnmp 5.7.3 to 5.9.3 I encounter a problem which
is that root(/) filesystem is missing from UCD-SNMP-MIB disk table:
# snmpwalk -v1 -c public localhost 1.3.6.1.4.1.2021.9
UCD-SNMP-MIB::dskIndex.2 = INTEGER: 2
UCD-SNMP-MIB::dskIndex.3 = INTEGER: 3
UCD-SNMP-MIB
Pushpa Thimmaiah writes:
> I am looking for method to save username and community in encrypted
> format in / etc/snmp/snmpd.conf. Could you please let me know it can
> be done?
Hi Pushpa,
No it can't be done and there isn't really a way to properly do it in
the first p
.0.0.1]:2000)
or port 3000 if I targeted that.
Port 36600 is my snmpwalk UDP port (i.e. the "remote" address) and 2000 is
what the agent was listening to.
That information looks like its filled in by netsnmp_udp_recvfrom()
- Craig
___
Net-sn
Pushpa Thimmaiah writes:
> Is this known issue in version 5.7.1? I did test the same on net-snmp-5.9
> and
> could see 5 retries.
I'd argue you should be using 5.9.4 then :-) 5.7 is long past supported.
--
Wes Hardaker
Please mail all replies to [email protected]
n the end, we've decided to table the fix until after 5.9.4 to
get this out the door as is for now.
NEWS for 5.9.4:
*5.9.4*:
IMPORTANT: SNMP over TLS and/or DTLS are not functioning properly
in this release with various versions of OpenSSL and will be fixed
in a future release.
; ?
Without double checking the source code, I'm pretty positive that the
same default settings are used when using INFORMs too.
--
Wes Hardaker
Please mail all replies to [email protected]
_______
Net-snmp-coders mailing list
Net-sn
Alexander Bergmann writes:
> Hi Craig,
>
> Thanks for the reply. Any update on your search for the GPG signing
> key?
Sorry fro the delay. I just put a new file in:
https://sourceforge.net/projects/net-snmp/files/net-snmp-admin%20PGP%20key/current-key/
Specifically, the net-snmp
MOUHOUNE Samir writes:
> I am writing to inquire whether your crypto module is FIPS
> certified.
Hi Samir,
We do not have FIPS certification for the net-snmp source-code, nor are
there any plans to do so.
Having said that, one of the motivations behind the "internal" option
th
ame thing a few weeks ago. Wes said he put the key on the mit
> servers. I haven't checked that (or rc1 either).
>
> Both are on my to-do list.
>
> - Craig
>
>
> On Wed, 12 July 2023, 19:12 Alexander Bergmann via Net-snmp-coders, <
> net-snmp-coders@lists
I asked the same thing a few weeks ago. Wes said he put the key on the mit
servers. I haven't checked that (or rc1 either).
Both are on my to-do list.
- Craig
On Wed, 12 July 2023, 19:12 Alexander Bergmann via Net-snmp-coders, <
[email protected]> wrote
Hi Wes / everyone,
Where can I find the current GPG signing key that was used to sign the
latest updates?
gpg: assuming signed data in 'net-snmp-5.9.4.rc1.tar.gz'
gpg: Signature made Thu 22 Jun 2023 05:15:02 PM CEST
gpg:using EDDSA key 6E6718AEF1EB5C65C32D1B2A356BC0B552
ng:
https://sourceforge.net/projects/net-snmp/files/net-snmp/5.9.4-pre-releases/
As a reminder, all patches from here out to the V5-9 branch must have
discussion on -coders first, with at least 3 people in favor of applying
them. Additionally, any code changes will likely cause another rc
candidate
nside the function so we can fetch the cpu name with it.
The module expects that the index is passed in the netsnmp_table_request_info
struct as per net-snmp examples, and then accessed with
i = *(table_info->indexes->val.integer);
But this is not what happens when iterating the table wi
Version 5.9.4.pre3 has been released and published to:
https://sourceforge.net/projects/net-snmp/files/net-snmp/5.9.4-pre-releases/
Please test away and report any critical issues. Ideally, this should
be the last pre-release and we'll publish a release candidate in a
couple of wee
SimonPass .
I was not expecting to receive the trap until I configured the trap
receiver with the same security name and authentication password!?!
Simon
On Tue, Apr 25, 2023 at 3:17 AM Craig Small via Net-snmp-coders
wrote:
On Sat, 15 Apr 2023 at 11:12, Simon Chamlian
password?
If so, are you sure that you don't have those parameters set in an snmp
configuration file?
Trying the command with -Dread_config:line may help here.
I tried snmptrap 5.9.3 with no -u and -A flags and with/without a
configuration file and it o
Pushpa Thimmaiah writes:
> When snmpv2c/snmpv3 informs sent via 'snmptrap -Ci' command and what should
> be
> ideal timeout and retry values to be considered
That's very network dependent. I'd suggest a 1s timeout should be good
for most networks, as you should
We've started the process of creating a 5.9.4 release. Please test and
file pull requests when you run into problems you can fix.
tar/zips are available here:
https://sourceforge.net/projects/net-snmp/files/net-snmp/5.9.4-pre-releases/
--
Wes Hardaker
Please mail all replies to net
ES"
section.
--
Wes Hardaker
Please mail all replies to [email protected]
___
Net-snmp-coders mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/net-snmp-coders
backward compatibily.
--
Wes Hardaker
Please mail all replies to [email protected]
___
Net-snmp-coders mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/net-snmp-coders
Craig Small via Net-snmp-coders
writes:
> My understanding is the only way of adding the key is with the snmpusm
> command. Except it doesn't work for me.
snmpusm is used to change a key, but isn't really doing DH for each
transaction after that. It's still using a s
Feroz writes:
> On net-snmp 5.8, with the following configuration in snmpd.conf file, which
> version of SHA (i.e SHA1/SHA-192/SHA-256/SHA-284/SHA-512) is used?
>
> createUser feroz SHA feroz123 AES feroz123
> rwuser feroz priv
If you specify SHA generically, that's an alia
Abhishek Singh writes:
> 1. The issue was existing snmpv3 details were not updated in the net-snmp
> cache.
> Used clear_user_list() to clear users details. The patch is in attachments. Is
> this the correct way to go forward?
If you're always trying to re-create users th
t
(maybe it doesn't support the SNMP-USM-DH-OBJECTS-MIB MIB)
I should be getting a set of keys but I'm not. Turning on debugging for usm
shows the user being authenticated but no usmDH processing happening.
- Craig
On Wed, 31 Aug 2022 at 23:46, Simon Chamlian wrote:
>
>
>
on -- how are you setting the
engineID? If you're using a "string", the encode engineid still has
some leading binary information to indicate it was set as a string. IE,
the engineID consists of more than just the string itself (per the
SNMPv3 RFCs).
--
Wes Hardake
Craig Small writes:
> Debian net-snmp packages 5.9.3-1 have also been built and uploaded.
Nice, thanks.
--
Wes Hardaker
Please mail all replies to [email protected]
___
Net-snmp-coders mailing list
Net-snmp-cod
So a 5.9.3 release has now been pushed to:
https://sourceforge.net/projects/net-snmp/files/net-snmp/5.9.3/
This fixes the last minute bug with .so library naming in 5.9.2.
--
Wes Hardaker
Please mail all replies to [email protected]
Paban Agarwalla writes:
> when we configure v3 users. Some of the algorithm combinations failed.
What is the device you're using? Certainly it looks like a not-complete
interchangeability table. Net-SNMP has demonstrated interchangeability
with many other implementations, but I do
To fix the discovered shared library versioning issue in 5.9.2,
5.9.3.rc1 has been published and is here:
https://sourceforge.net/projects/net-snmp/files/net-snmp/5.9.3-pre-releases/
Please give it a whirl, with the goal of proper 5.9.3 being published
next week.
--
Wes Hardaker
Please mail
Craig Small writes:
> The trapd linking to the agent library
> (https://github.com/net-snmp/net-snmp/issues/434)
> probably needs some thought about the best way to do it. I'm not even sure
> why the basic
> compile works and Debian one doesn't, but it's prob
Bart Van Assche writes:
> +1 for releasing the next version from the master branch. That would
> make Net-SNMP easier to maintain since it would reduce the number of
> branches to maintain from two to one.
Agreed, though typically we'd fork after that point with a patches
bran
So this issues:
https://github.com/net-snmp/net-snmp/issues/432
Likely warrants an immediate 5.9.3 with only the change to libcurrent in
Makefile.top.
I'll try to get 5.9.3.rc1 out the door today to address this.
--
Wes Hardaker
Please mail all replies to net-snmp-c
I'll send a full announcement early next week, but Net-SNMP 5.9.2 is
published and is at:
https://sourceforge.net/projects/net-snmp/files/net-snmp/5.9.2/
I'm thinking we should look toward a main-branch release next (5.10).
Opinions welcome.
--
Wes Hardaker
Please mail all repl
There have only been a few changes since rc1, but enough that it
warrants another rc2. Please propose no changes at this point unless
there is a critical issue.
https://sourceforge.net/projects/net-snmp/files/net-snmp/5.9.2-pre-releases/
--
Wes Hardaker
Please mail all replies to net-snmp
Craig Small writes:
> Is there a way to encrypt passwords in the snmpd.conf file? Currently,
> when we open
> snmpd.conf file we can look at passwords in plaintext format, is there a
> way to
> store those passwords in encrypted form. Does net-snmp support an
Hanh Nguyen writes:
> I'm new to the net-snmp community. I'm looking for the changes for bug 2923
> -Avoid that
> snmpv3 bulkget errors result in a double free
Hi Hanh,
I'll look at this hopefully in the next 2 days. Thanks for submitting
the patch.
--
Wes Hardaker
rt and address that snmpwalk is looking for. There is also
the SNMP packets also contain a request-id that is not duplicated in the
retries. So each request will look new and will be processed as if new
even though the ports and addresses themselves may be the same.
[Caching, as others have s
Greetings all,
An RC1 candidate is available for download and testing:
https://sourceforge.net/projects/net-snmp/files/net-snmp/5.9.2-pre-releases/
If there are no proposed changes to this, it'll be 5.9.2 next. As a
reminder, in the RC phase of development, any proposed changes (from
a
Paban Agarwalla writes:
> We are using to Netsnmp to collect statistics from our device.
>
> We are registering multiple subagents with the same set of oids.
>
> can i get all sub agent statastics using the same oid with v2c/v1 snmp
> host?
The only way to deal with proble
Craig Small writes:
> However, net-snmp v 5.9.1 doesn't have all of these yet. I can either
> try to pick the relevant ones out and patch the Debian package, or
> wait until 5.9.2 comes out. My question is, is there an idea when that
> would be? My preference is to not patch
ply it.
--
Wes Hardaker
Please mail all replies to [email protected]
___
Net-snmp-coders mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/net-snmp-coders
Craig Small writes:
> On Wed, 6 Apr 2022, 10:09 Wes Hardaker via Net-snmp-coders,
>
> wrote:
>
> Net-SNMP 5.9.2.pre1 has been published for testing as available at:
>
> I can confirm that the compile issues with OpenSSL v3 are fixed with this.
>
> I'
Greetings all,
Net-SNMP 5.9.2.pre1 has been published for testing as available at:
https://sourceforge.net/projects/net-snmp/files/net-snmp/5.9.2-pre-releases/
Please file any issues or pull requests required to improve the state of
this release.
--
Wes Hardaker
Please mail all replies to
UPDATE
Turns out that I am able to query from the cmd shell snmpwalk, but not from
Manage Engine GUI. So leads me to suspect it is ok after all.
Thanks,
On Wednesday, February 9, 2022, 12:45:34 p.m. EST, Ian C via
Net-snmp-coders wrote:
I'm using the node net-snmp packag
I'm using the node net-snmp package to create a simple subagent but I cannot
query its only table provider (Error in packet... No such variable name in
MIB). I have installed net-snmp and registered it, I am able to query simple
things such as uptime:
C:\usr\etc\snmp>snmpwalk -v1 -
Charles Polisher writes:
> I found a bug in snmp-bridge-mib that causes incorrect results
> when the number of bridge ports exceeds one digit, because a
> string compare is used on numeric data.
Thanks, applied!
--
Wes Hardaker
Please mail all replies to [email protected]
g definition of "small" has certainly increased in size over time
with the continued increase of storage/memory availability in even the
smallest devices.
--
Wes Hardaker
Please mail all replies to [email protected]
___
it.
> Also what exactly does "com2sec -Cn ctx_remote notConfigUser default
> cmty_remote1"
> means?
You should read this page for information about access control
configuration:
https://net-snmp.sourceforge.io/wiki/index.php/Vacm
--
Wes Hardaker
Please mail all repl
Neil Mckee writes:
> This may have been covered many times before, but just in case it
> helps someone, here is a summary of my experience with using net-snmp
> in a large network.
Thank you for the very useful list of changes.
--
Wes Hardaker
Please mail all replies to net-sn
And then set
your MIBS environment variable to be correct to. So putting it in
/usr/local/share/snmp/mibs was the right first start, but you also need
to set the MIBS environment variable to be "+PERSONAL-MIB" or whatever
you called it (note you need the leading +)
--
Wes Hardaker
Plea
Hi SNMP Team,
We integrated SNMP 5.7.3 library as part of our software (libsnmpsl and
libpasnmpmgr). We are running on REHL 7 x86 64 bits.
One of our partner reported us that they caught a signal 6 during the
initialization of SNMP V3 session.
Here is the stack trace fwe got in our product that
ed scopedpdu there is nothing the
client and do (and its not its fault, it's the agent's).
--
Wes Hardaker
Please mail all replies to [email protected]
___
Net-snmp-coders mailing list
[email protected]
h
ing. snmpget is just pulling the answer and the count from the
agent's response packet and not calculating it itself.
--
Wes Hardaker
Please mail all replies to [email protected]
___
Net-snmp-coders mailing li
"Srilatha Devineni (sdevinen) via Net-snmp-coders"
writes:
> I installed 5.9.1 net-snmp and I see there is no support for AES
AES requires OpenSSL to be installed when Net-SNMP is compiled. Use the
--with-openssl flag to point to the path where it is installed if it
couldn
1 - 100 of 321 matches
Mail list logo