Age | Commit message (Collapse) | Author | |
---|---|---|---|
2019-10-27 | snmp: T1738: cleanup import statements | Christian Poessinger | |
2019-10-27 | snmp: T1769: remove TSM (Transport Security Mode) support | Christian Poessinger | |
The SNMPv3 TSM is very complex and I know 0 users of it. Also this is untested and I know no way how it could be tested. Instead of carrying on dead and unused code we should favour a drop of it using a proper config migration script. | |||
2019-10-27 | snmp: T818: T1738: remove per user/trap engine id | Christian Poessinger | |
As of the SNMP specification an SNMP engine ID should be unique per device. To not make it more complicated for users - only use the global SNMP engine ID. | |||
2019-10-15 | snmpd: T1705 - High CPU usage by bgpd when snmp is active | hagbard | |
* typo fixed | |||
2019-10-13 | Revert "snmpd: T1705 - High CPU usage by bgpd when snmp is active" | Christian Poessinger | |
Systems not runing BGP won't boot anymore. Syslog shows: snmpd[5404]: getaddrinfo: inetCidrRouteTable Name or service not known snmpd[5404]: getaddrinfo("inetCidrRouteTable", NULL, ...): Name or service not known snmpd[5404]: Error opening specified endpoint "inetCidrRouteTable" snmpd[5404]: Server Exiting with code 1 snmpd[5401]: Starting SNMP services:: systemd[1]: snmpd.service: control process exited, code=exited status=1 systemd[1]: Failed to start LSB: SNMP agents. systemd[1]: Unit snmpd.service entered failed state. This reverts commit e45648cdd5a52569be7f3ac30473b0c7474a7894. | |||
2019-10-10 | snmpd: T1705 - High CPU usage by bgpd when snmp is active | hagbard | |
2019-07-15 | [T1299] - SNMP extension with custom scripts | hagbard | |
2019-01-30 | T1160: fix (ro|rw)community ACL | Christian Poessinger | |
WHen building up the SNMP v2 community ro/rw access all hosts from a INET version could access even when the community was locked to one INET family. Example #1: set service snmp community bar network 172.16.0.0/12 Allowed access only to IPv4 network 172.16.0.0/12 but it allowed acces from IPv6 ::/0. Example #2: set service snmp community baz network 2001:db8::/64 Limited IPv6 access to 2001:db8::/64 but IPv4 was open to 0.0.0.0/0 | |||
2019-01-03 | T1147: Fix SNMP config file generation on newly installed systems | Christian Poessinger | |
2018-11-05 | T950: make sure agentx is enabled in FRR only when SNMP is setup, and ↵ | Daniil Baturin | |
supress duplicate error messages. | |||
2018-10-28 | T923: enable AgentX in FRR after SNMP is configured. | Daniil Baturin | |
2018-10-20 | SNMP: update comments in Python generator | Christian Poessinger | |
2018-10-20 | T923: support SNMP integration with FRR routing daemon | Christian Poessinger | |
2018-09-29 | T855: fix SNMP python verify() to allow non group assignment | Christian Poessinger | |
VyOS 1.1.8 support SNMPv3 without a group beeing assigned to a user. This was yet not supported in VyOS 1.2.0. Use for testing: ================ set service snmp v3 user testsnmpv3 auth plain 'authkey12345' set service snmp v3 user testsnmpv3 auth type sha set service snmp v3 user testsnmpv3 mode ro set service snmp v3 user testsnmpv3 privacy plain 'privkey12345' set service snmp v3 user testsnmpv3 privacy type aes | |||
2018-09-16 | T850: SNMP: improve non existing listen-address assignments | Christian Poessinger | |
2018-09-16 | snmp: fix python script indention | Christian Poessinger | |
2018-09-10 | snmp.py: proper creation of non network bound SNMP communities | Christian Poessinger | |
2018-09-10 | snmp.py: improve JINJA2 template robustness | Christian Poessinger | |
2018-09-01 | snmp.py: improve daemon startup | Christian Poessinger | |
The previous implementation used a hardcoded 2 seconds sleep until the daemon configuration was rendered by snmpd (user/password stuff). Waiting 2 seconds is error prone and was replaced by reading the configuration file until it shows a marker indicating that the file was properly processed by snmpd. | |||
2018-09-01 | snmp.py: beautify generated snmp.conf #2 | Christian Poessinger | |
2018-09-01 | snmp.py: bugfix - CLI client community node was not processed | Christian Poessinger | |
2018-09-01 | snmp.py: bugfix writing rocommunity string in config | Christian Poessinger | |
2018-09-01 | snmp.py: beautify generated snmp.conf | Christian Poessinger | |
2018-09-01 | T771: snmp.px: reduce syslog noise | Christian Poessinger | |
2018-08-29 | snmp.py: only write 'oldEngineID' to config if v3 is enabled | Christian Poessinger | |
2018-08-29 | T733: snmp.py: switch to new IP address validators | Christian Poessinger | |
Commit a30dac7c2 ("vyos package: add IP address validators") added system wide Python validators for IP addresses. Remove duplicated code and switch to single source. | |||
2018-08-07 | T733: snmp.py: set IPv6 community string | Jules Taplin | |
Also fixed it to correctly set an IPv6 community string, even if you don't specify the network it's working on. | |||
2018-07-05 | T733: snmp.py: set IPv6 community string | jules-vyos | |
* Fixed snmp.py to correctly supply 'community6' community strings, so that ipv6 will work. | |||
2018-07-02 | T652: SNMP: bugfix initial specification of v3 engine id missing | Christian Poessinger | |
2018-07-02 | T713: bugfix incorrect parsing of seclevel | Christian Poessinger | |
... there was a coding error in the if clause. | |||
2018-07-02 | T652: SNMP: bugfix for default auth and priv type | Christian Poessinger | |
If no auth or no priv type was specified for a v3 user this resulted in a commit error, but CLI said there would be ssane defaults. * auth type defaults to 'md5' * priv type defaults to 'des' | |||
2018-06-30 | T714: SNMP: make user auth type mandatory | Christian Poessinger | |
... if seclevel for group is auth or priv where the user belongs to | |||
2018-06-30 | T713: bugfix incorrect parsing of seclevel | Christian Poessinger | |
SNMP v3 group seclevel was not taken into account when validating existance of user auth or priv keys. | |||
2018-06-30 | T652: SNMP: bugfix preserving users engineid | Christian Poessinger | |
In VyOS 1.1.x every user was forced to the systems engine ID when using SNMPv3, even when a user wanted to have a custom engineID, thus the node 'service snmp v3 user foo engineid' itself is useless. | |||
2018-06-08 | T652: import SNMP keys from volatile into nonvolatile location | Christian Poessinger | |
2018-06-08 | T652: user encrypted-key not possible without engineid | Christian Poessinger | |
2018-06-07 | T652: snmp.py: support SNMPv3 write groups | Christian Poessinger | |
2018-06-06 | T652: snmp.py: bugfix writing encrypted keys to config | Christian Poessinger | |
... in the past an encrypted key was encrypted again b/c we only used createUser in /var/lib/snmp/snmpd.conf nad not usmUser in addition. | |||
2018-06-06 | snmp.py: pipe shell output to /dev/null as it was back in the Perl days | Christian Poessinger | |
2018-06-06 | T652: snmp.py: listen on all addresses if listen-address is not specified | Christian Poessinger | |
2018-06-05 | T652: snmp.py: convert plaintext-keys into encrypted-keys | Christian Poessinger | |
2018-06-04 | T652: Add SNMPv3 TSM handling and commit verification | Christian Poessinger | |
2018-06-04 | T652: read SNMPv3 config into python dictionary | Christian Poessinger | |
2018-06-04 | snmp.py: refactor listen-address config generation | Christian Poessinger | |
2018-06-04 | T654: Support IPv6 configuration for SNMP listen address | Christian Poessinger | |
2018-06-04 | T652: first SNMP version using XML interface definition | Christian Poessinger | |