#
c3100810 |
| 06-Feb-2024 |
martijn <martijn@openbsd.org> |
Load MIB files during startup. The default directory is /usr/share/snmp/mibs, but one or more directories can be configured via the "mib directory" option.
OK tb@
|
#
c1729c40 |
| 25-Apr-2023 |
op <op@openbsd.org> |
tiny markup fix: add missing Ic before `group' in the `agentx' rule
OK martijn@
|
#
328c3f4b |
| 02-Mar-2023 |
jmc <jmc@openbsd.org> |
improve the Nd lines such that the format is consistent for the various *d, *conf, *ctl files (where relevant) and simple;
also makes "man -k routing" more useful;
help from claudio and florian ok
improve the Nd lines such that the format is consistent for the various *d, *conf, *ctl files (where relevant) and simple;
also makes "man -k routing" more useful;
help from claudio and florian ok claudio florian millert
show more ...
|
#
4100cc5f |
| 23-Aug-2022 |
martijn <martijn@openbsd.org> |
(Re)add support for agentx in snmpd Current omissions in protocol support are notifications, index (de)allocation, and agent capabilities.
Help testing sthen@ Feedback/tweaks/OK jmatthew@
|
#
614c3698 |
| 30-Jun-2022 |
martijn <martijn@openbsd.org> |
Introduce a blocklist backend and keyword.
This allows the admin to specify a full region of the OID tree to be blocked and simply returns NOSUCHOBJECT/ENDOFMIBVIEW.
This deprecates filter-pf-addre
Introduce a blocklist backend and keyword.
This allows the admin to specify a full region of the OID tree to be blocked and simply returns NOSUCHOBJECT/ENDOFMIBVIEW.
This deprecates filter-pf-addresses in favour of: blocklist pfTblAddrTable
OK tb@
show more ...
|
#
41ce3b17 |
| 31-Mar-2022 |
naddy <naddy@openbsd.org> |
man pages: add missing commas between subordinate and main clauses
jmc@ dislikes a comma before "then" in a conditional, so leave those untouched.
ok jmc@
|
#
ab858812 |
| 02-Sep-2021 |
martijn <martijn@openbsd.org> |
Allow snmpd(8) to send SNMPv3 traps.
OK jmatthew@
|
#
d589e54c |
| 11-Aug-2021 |
sthen <sthen@openbsd.org> |
For the snmpv2c example, use a community which is something more like the sort of thing which should actually be used (a proper random string rather than a common word, and especially not a common wo
For the snmpv2c example, use a community which is something more like the sort of thing which should actually be used (a proper random string rather than a common word, and especially not a common word that is the default for much SNMP software). The example here is restricted to 127.0.0.1 but it's easy to adapt to something where it's more unsafe so better not to give the example. ok martijn@
show more ...
|
#
f028c474 |
| 10-Aug-2021 |
martijn <martijn@openbsd.org> |
Simplify and be more concise with the listen on flags description.
Suggested by schwarze@
|
#
73f6022e |
| 10-Aug-2021 |
martijn <martijn@openbsd.org> |
Allow "any" to be used as a listen on address. This is a convenient shorthand for listen on 0.0.0.0 listen on :: and was already the default behaviour if no listen on statement is present. This way i
Allow "any" to be used as a listen on address. This is a convenient shorthand for listen on 0.0.0.0 listen on :: and was already the default behaviour if no listen on statement is present. This way it's easier to add additional listeners to the default (like trap receivers).
Manpage feedback sthen@ schwarze@ Manpage OK jmc@ OK sthen@
show more ...
|
#
882f9b84 |
| 09-Aug-2021 |
martijn <martijn@openbsd.org> |
Type-O in previous. Diff by jmc@, who can't commit right now.
Thanks.
|
#
73b5c081 |
| 09-Aug-2021 |
martijn <martijn@openbsd.org> |
Allow setting the engineid.
The previous engineid was based aronud the engine boottime and a random value, which gives problems when sending/receiving unacknowledged PDUs (trapv2) over SNMPv3 with a
Allow setting the engineid.
The previous engineid was based aronud the engine boottime and a random value, which gives problems when sending/receiving unacknowledged PDUs (trapv2) over SNMPv3 with authentication enabled, which need a consistent engineid across restarts to determine the correct user from the sender.
The new default engineid takes a sha256 hash (chosen for its longer output) of gethostname(3) and places the first 27 bytes after the new format number 129. This should give us a very low probability of collisions, assuming all machines have a unique name.
The other formats as specified in SNMP-FRAMEWORK-MIB (RFC3411) are also supported as well as arbitrary formats in the range 128-255 for other private enterprise numbers in hex format.
OK jmatthew@
show more ...
|
#
808130e6 |
| 08-Aug-2021 |
sthen <sthen@openbsd.org> |
Switch default snmpd and snmp auth back to hmac-sha1.
Practical experience on several machines after updates suggests the snmp world isn't really ready for hmac-sha2-256, and the HMAC construction d
Switch default snmpd and snmp auth back to hmac-sha1.
Practical experience on several machines after updates suggests the snmp world isn't really ready for hmac-sha2-256, and the HMAC construction doesn't require collision resistance (which is the weakness of MD5/SHA1; see e.g. "New proofs for NMAC and HMAC: Security without collision-resistance", Bellare 2014).
Feedback from martijn@ (who would prefer to keep using the sha2 hmac), deraadt@, tb@.
show more ...
|
#
3d3fc72f |
| 08-Aug-2021 |
sthen <sthen@openbsd.org> |
mention that "system services" value is in decimal. ok martijn@
|
#
c67854d6 |
| 20-Jun-2021 |
martijn <martijn@openbsd.org> |
Change default user auth to hmac-sha256 and enc to aes. The old defaults are just not sane anymore.
OK sthen@
|
#
c92471af |
| 20-Jun-2021 |
martijn <martijn@openbsd.org> |
Tighten default security for snmpd(8). This is done by doing several things: - Only allow SNMPv3 by default. SNMPv1 and SNMPv2c can be enabled by setting the new snmpv* flags on the "liston on" sta
Tighten default security for snmpd(8). This is done by doing several things: - Only allow SNMPv3 by default. SNMPv1 and SNMPv2c can be enabled by setting the new snmpv* flags on the "liston on" statements. - Remove the default community names. They're not secure to use. - Change the default seclevel to enc.
Initial idea, help from and OK sthen@
show more ...
|
#
cf1309b9 |
| 14-Jun-2021 |
sthen <sthen@openbsd.org> |
snmpd.conf(5): fix typo/plurals and tweak wording. ok jmc martijn
|
#
72594f68 |
| 09-Mar-2021 |
martijn <martijn@openbsd.org> |
Fix some old phrasing on how to set up a trap handler which aren't correct anymore after moving it from its own subprocess to snmpe.
feedback and OK jan@
|
#
20f2292f |
| 22-Jan-2021 |
martijn <martijn@openbsd.org> |
Remove the traphandler process, which was nothing more then a sham. It did nothing more then receive a message over UDP, do some basic ber and ASN.1 parsing and forward the packet to the parent proce
Remove the traphandler process, which was nothing more then a sham. It did nothing more then receive a message over UDP, do some basic ber and ASN.1 parsing and forward the packet to the parent process. snmpe can do/does the same thing but with a far more thorough ASN.1 validation. Because we move trap receiving to snmpe we get trap over tcp for free.
However, to make sure that a normal snmp port doesn't automatically start handling traps a new set of "listen on" flags are introduced: read, write, and notify. To enable trap handling either let snmpd listen on port 162 without flags, or add the notify flag. Only a flag without port results in listening on port 162.
To keep current behaviour copy all UDP-based "listen on" lines without port and add the notify keyword: listen on 127.0.0.1 port 666 becomes listen on 127.0.0.1 port 666 listen on 127.0.0.1 notify
This change also enforces snmpd to honor trap community on receiving a trap, where previously no community was checked before handling a packet.
OK denis@, rob@
show more ...
|
#
113b255e |
| 24-Oct-2020 |
jmc <jmc@openbsd.org> |
double word blunder; from sean davies
|
#
756b4b7a |
| 10-Sep-2020 |
martijn <martijn@openbsd.org> |
Move the tcp/udp keyword before <address>. This allows for easier adding of different protocols in the future. The old syntax is still supported for for now, but will generate a deprecation warning a
Move the tcp/udp keyword before <address>. This allows for easier adding of different protocols in the future. The old syntax is still supported for for now, but will generate a deprecation warning and will be removed in a future release.
While here add support for specifying a tcp/udp port. This will be used for snmp services, "trap handle" will still only run on port 162.
Feedback and OK denis@
show more ...
|
#
62153df3 |
| 30-Jun-2020 |
martijn <martijn@openbsd.org> |
Remove agentx and control socket support.
snmpctl has been removed two releases ago, which makes the control interface obsolete.
agentx support has always been quirky at best, but got completely br
Remove agentx and control socket support.
snmpctl has been removed two releases ago, which makes the control interface obsolete.
agentx support has always been quirky at best, but got completely broken with the BER_MAX_OID_LEN increase in ber.h. This change resulted in the oid length on the snmp side being left uninitialized because of size difference, resulting in weird behaviour. No one reported the breakage, even after 6.7 was released.
This change requires users to remove the socket keyword from their snmpd.conf.
OK denis@
show more ...
|
#
c9d6433d |
| 10-Feb-2020 |
schwarze <schwarze@openbsd.org> |
briefly mention /etc/examples/ in the FILES section of all the manual pages that document the corresponding configuration files; OK jmc@, and general direction discussed with many
|
#
5ec2ddb5 |
| 02-Jan-2020 |
florian <florian@openbsd.org> |
When many prefixes are stored in pf tables it is not sensible to export them via snmp. Introduce option filter-pf-addresses similar to filter-routes which prevents exporting below the OPENBSD-PF-MIB:
When many prefixes are stored in pf tables it is not sensible to export them via snmp. Introduce option filter-pf-addresses similar to filter-routes which prevents exporting below the OPENBSD-PF-MIB::pfTblAddrTable oid. Other pf table statistics are uneffected by this and still available. With this I can do a bulkwalk starting at pfMIBObjects without hitting timeouts and without spinning the cpu at 100% for days to export 300k prefixes. man page input kn OK claudio, sthen. martijn is also fine with it going in.
show more ...
|
#
1fe37961 |
| 09-Aug-2019 |
martijn <martijn@openbsd.org> |
Replace snmpctl(8) references with snmp(1).
|