summaryrefslogtreecommitdiff
path: root/scripts
diff options
context:
space:
mode:
authorJames Davidson <james.davidson@vyatta.com>2013-02-12 13:02:11 -0800
committerJames Davidson <james.davidson@vyatta.com>2013-02-12 13:02:11 -0800
commit1d917be739f1db7b1ff1d26a0238322d7fd475c5 (patch)
treeac3bdbdcd28f0bd0f9f16477a384e6ccd53970cd /scripts
parent34f23c48bf38c6c88f3c74e958a084bf30380bd6 (diff)
downloadvyatta-cfg-system-1d917be739f1db7b1ff1d26a0238322d7fd475c5.tar.gz
vyatta-cfg-system-1d917be739f1db7b1ff1d26a0238322d7fd475c5.zip
Initial SNMPv3 support
Diffstat (limited to 'scripts')
-rwxr-xr-xscripts/snmp/vyatta-snmp-v3.pl527
-rwxr-xr-xscripts/snmp/vyatta-snmp.pl22
2 files changed, 536 insertions, 13 deletions
diff --git a/scripts/snmp/vyatta-snmp-v3.pl b/scripts/snmp/vyatta-snmp-v3.pl
new file mode 100755
index 00000000..ef93b8a1
--- /dev/null
+++ b/scripts/snmp/vyatta-snmp-v3.pl
@@ -0,0 +1,527 @@
+#!/usr/bin/perl
+
+use lib "/opt/vyatta/share/perl5/";
+use Vyatta::Config;
+use File::Copy;
+use Getopt::Long;
+use Socket;
+use Socket6;
+
+my $snmp_v3_level = 'service snmp v3';
+my $snmp_init = 'invoke-rc.d snmpd';
+my $snmpd_conf = '/etc/snmp/snmpd.conf';
+my $snmpd_usr_conf = '/usr/share/snmp/snmpd.conf';
+my $snmpd_var_conf = '/var/lib/snmp/snmpd.conf';
+my $snmpd_conf_tmp = "/tmp/snmpd.conf.$$";
+my $snmpd_usr_conf_tmp = "/tmp/snmpd.usr.conf.$$";
+my $snmpd_var_conf_tmp = "/tmp/snmpd.var.conf.$$";
+my $versionfile = '/opt/vyatta/etc/version';
+my $local_agent = 'unix:/var/run/snmpd.socket';
+my $vyatta_config_file = '/config/snmp/snmp_conf.ini';
+%VConfig = ();
+
+%OIDs = (
+ "md5", ".1.3.6.1.6.3.10.1.1.2",
+ "sha", ".1.3.6.1.6.3.10.1.1.3",
+ "aes", ".1.3.6.1.6.3.10.1.2.4",
+ "des", ".1.3.6.1.6.3.10.1.2.2",
+ "none", ".1.3.6.1.6.3.10.1.2.1"
+);
+
+# generate a random character hex string
+sub randhex {
+ my $length = shift;
+ return join "", map { unpack "H*", chr(rand(256)) } 1..($length/2);
+}
+
+sub parse_config_file {
+ open (CONFIG, "$vyatta_config_file") or return;
+ while (<CONFIG>) {
+ chomp; # no newline
+ s/#.*//; # no comments
+ s/^\s+//; # no leading white
+ s/\s+$//; # no trailing white
+ next unless length; # anything left?
+ my ($var, $value) = split(/\s*=\s*/, $_, 2);
+ $VConfig{$var} = $value;
+ }
+ close(CONFIG);
+}
+
+sub write_config_file {
+ open (my $config_file, '>' , "$vyatta_config_file");
+ for my $key (keys %VConfig) {
+ my $value = $VConfig{$key};
+ print $config_file "$key=$value\n";
+ }
+ close $config_file;
+}
+
+sub snmpd_running {
+ open (my $pidf, '<', "/var/run/snmpd.pid")
+ or return;
+ my $pid = <$pidf>;
+ close $pidf;
+
+ chomp $pid;
+ my $exe = readlink "/proc/$pid/exe";
+
+ return (defined($exe) && $exe eq "/usr/sbin/snmpd");
+}
+
+sub check_snmp_exit_code {
+ my $code = shift;
+ # snmpd can start/restart with exit code 256 if trap-target is unavailable
+ if ($code !=0 && $code != 256) {
+ return 1;
+ } else {
+ return 0;
+ }
+}
+
+sub snmpd_stop {
+ system("$snmp_init stop > /dev/null 2>&1");
+ if (check_snmp_exit_code($?)) {
+ print "ERROR: Can not stop snmpd!\n";
+ exit(1);
+ }
+}
+
+sub snmpd_start {
+ system("$snmp_init start > /dev/null 2>&1");
+ if (check_snmp_exit_code($?)) {
+ print "ERROR: Can not start snmpd!\n";
+ exit(1);
+ }
+}
+
+sub snmpd_update {
+ system("$snmp_init reload > /dev/null 2>&1");
+ if (check_snmp_exit_code($?)) {
+ print "ERROR: Can not reload snmpd!\n";
+ exit(1);
+ }
+}
+
+sub snmpd_restart {
+ system("$snmp_init restart > /dev/null 2>&1");
+ if (check_snmp_exit_code($?)) {
+ print "ERROR: Can not restart snmpd!\n";
+ exit(1);
+ }
+}
+
+sub get_version {
+ my $version = "unknown-version";
+
+ if (open (my $f, '<', $versionfile)) {
+ while (<$f>) {
+ chomp;
+ if (m/^Version\s*:\s*(.*)$/) {
+ $version = $1;
+ last;
+ }
+ }
+ close $f;
+ }
+ return $version;
+}
+
+sub ipv6_disabled {
+ socket ( my $s, PF_INET6, SOCK_DGRAM, 0)
+ or return 1;
+ close($s);
+ return;
+}
+
+sub set_tsm {
+ my $config = get_snmp_config();
+ if ($config->exists("tsm")) {
+ my $port = $config->returnValue("tsm port");
+ my $local_key = $config->returnValue("tsm local-key");
+ system("sed -i 's/^agentaddress.*\$/&,tlstcp:$port,dtlsudp:$port/' $snmpd_conf_tmp");
+ system("echo \"[snmp] localCert $local_key\" >> $snmpd_conf_tmp");
+ }
+}
+
+sub snmp_delete {
+ snmpd_stop();
+
+ @files = ($snmpd_conf, $snmpd_usr_conf, $snmpd_var_conf);
+ foreach $file (@files) {
+ if (-e $file) {
+ if (unlink($file) == 0) {
+ print "File $file was not deleted.\n";
+ } else {
+ print "File $file deleted successfully.\n";
+ }
+ } else {
+ print "File $file does not exist\n";
+ }
+ }
+}
+
+sub get_snmp_config() {
+ my $config = new Vyatta::Config;
+ $config->setLevel($snmp_v3_level);
+ return $config;
+}
+
+sub set_views() {
+ print "# views \n";
+ my $config = get_snmp_config();
+ foreach my $view ($config->listNodes("view")) {
+ foreach my $oid ($config->listNodes("view $view oid")) {
+ my $mask = $config->returnValue("view $view oid $oid mask");
+ if ($config->exists("view $view oid $oid exclude")) {
+ print "view $view excluded .$oid $mask\n";
+ } else {
+ print "view $view included .$oid $mask\n";
+ }
+ }
+ }
+ print "\n";
+}
+
+sub set_groups() {
+ print "#access\n# context sec.model sec.level match read write notif\n";
+ my $config = get_snmp_config();
+ foreach my $group ($config->listNodes("group")) {
+ my $mode = $config->returnValue("group $group mode");
+ my $view = $config->returnValue("group $group view");
+ if ($mode eq "ro") {
+ print "access $group \"\" usm auth exact $view none none\n";
+ print "access $group \"\" tsm auth exact $view none none\n";
+ } else {
+ print "access $group \"\" usm auth exact $view $view none\n";
+ print "access $group \"\" tsm auth exact $view $view none\n";
+ }
+ }
+ print "\n";
+}
+
+sub set_users_in_etc() {
+
+ print "#group\n";
+
+ my $config = get_snmp_config();
+ foreach my $user ($config->listNodes("user")) {
+ $config->setLevel($snmp_v3_level." user $user");
+ if ($config->exists("group")) {
+ my $group = $config->returnValue("group");
+ print "group $group usm $user\n";
+ print "group $group tsm $user\n";
+ }
+ if ($config->exists("tsm-key")) {
+ my $cert = $config->returnValue("tsm-key");
+ #TODO magic number 10
+ print "certSecName 10 $cert --sn $user\n";
+ }
+ }
+
+ print "\n";
+}
+
+sub set_users_to_other() {
+ open (my $usr_conf, '>>', $snmpd_usr_conf_tmp)
+ or die "Couldn't open $snmpd_usr_conf_tmp - $!";
+ open (my $var_conf, '>>', $snmpd_var_conf_tmp)
+ or die "Couldn't open $snmpd_var_conf_tmp - $!";
+
+ print $var_conf "\n";
+
+ my $config = get_snmp_config();
+ my $needTsm = 0;
+ if ($config->exists("tsm")) {
+ $needTsm = 1;
+ }
+
+ my %trap_users=();
+
+ foreach my $trap ($config->listNodes("trap-target")) {
+ $trap_users{$config->returnValue("trap-target $trap user")} = 1;
+ }
+
+ foreach my $user ($config->listNodes("user")) {
+ delete $trap_users{$user};
+ $config->setLevel($snmp_v3_level." user $user");
+ my $auth_type = $config->returnValue("auth type");
+ my $priv_type = $config->returnValue("privacy type");
+ if ($config->exists("auth")) {
+ if ($config->exists("auth plaintext-key")) {
+ my $auth_key = $config->returnValue("auth plaintext-key");
+ my $priv_key = $config->returnValue("privacy plaintext-key");
+ print $var_conf "createUser $user \U$auth_type\E $auth_key \U$priv_type\E $priv_key\n";
+ } else {
+ my $name_print = get_printable_name($user);
+ my $EngineID = $VConfig{"User.$user.EngineID"};
+ my $auth_type_oid = $OIDs{$auth_type};
+ my $auth_key_hex = $config->returnValue("auth encrypted-key");
+ local ($priv_type_oid, $priv_key_hex);
+ if ($config->exists("privacy")) {
+ $priv_type_oid = $OIDs{$priv_type};
+ $priv_key_hex = $config->returnValue("privacy encrypted-key");
+ } else {
+ $priv_type_oid = $OIDs{'none'};
+ $priv_key_hex = '0x';
+ }
+ print $var_conf "usmUser 1 3 $EngineID $name_print $name_print NULL $auth_type_oid $auth_key_hex $priv_type_oid $priv_key_hex 0x\n";
+ }
+ }
+ my $mode = $config->returnValue("mode");
+ my $end = "auth";
+ if ($config->exists("privacy")) {
+ $end = "priv";
+ }
+ print $usr_conf $mode."user $user $end\n";
+ if ($needTsm) {
+ print $usr_conf $mode."user -s tsm $user $end\n";
+ }
+ }
+
+ foreach my $user (keys %trap_users) {
+ $name_print = get_printable_name($user);
+ print $var_conf "usmUser 1 3 0x".randhex(26)." $name_print $name_print NULL .1.3.6.1.6.3.10.1.1.2 0x".randhex(32)." .1.3.6.1.6.3.10.1.2.1 0x 0x\n";
+ print $usr_conf "rouser $user auth";
+ }
+
+ print $var_conf "setservialno ".$VConfig{"serialno"}."\n";
+ print $var_conf "oldEngineID ".$VConfig{"oldEngineID"}."\n";
+
+ close $usr_conf;
+ close $var_conf;
+}
+
+sub get_printable_name {
+ my $name = shift;
+ if ($name =~ /-/) {
+ my @array=unpack('C*', $name);
+ my $stringHex = '0x';
+ foreach my $c (@array) {
+ $stringHex .= sprintf ("%lx", $c);
+ }
+ return $stringHex;
+ } else {
+ return "\"$name\"";
+ }
+}
+
+sub update_users_vyatta_conf() {
+ %VConfig = ();
+ open (my $var_conf, '<' , $snmpd_var_conf) or die "Couldn't open $snmpd_usr_conf - $!";
+ my $config = get_snmp_config();
+ while (my $line = <$var_conf>) {
+ if ($line =~ /^setserialno (.*)$/) {
+ $VConfig{"serialno"} = $1;
+ }
+ if ($line =~ /^oldEngineID (.*)$/) {
+ $VConfig{"oldEngineID"} = $1;
+ }
+ if ($line =~ /^usmUser /) {
+ my @values = split(/ /, $line);
+ my $name = $values[4];
+ if ($name =~ /^"(.*)"$/) {
+ $name = $1;
+ } else {
+ $name = pack('H*', $name);
+ }
+ # this file contain users for trap-target and vyatta... user
+ # these users recreating automatically on each commit
+ if ($config->exists("user $name")) {
+ $VConfig{"User.$name.EngineID"} = $values[3];
+ system("/opt/vyatta/sbin/my_set service snmp v3 user \"$name\" auth encrypted-key $values[8] > /dev/null");
+ if ($values[10] ne "\"\"" && $values[10] ne "0x") {
+ system("/opt/vyatta/sbin/my_set service snmp v3 user \"$name\" privacy encrypted-key $values[10] > /dev/null");
+ system("/opt/vyatta/sbin/my_delete service snmp v3 user \"$name\" privacy plaintext-key > /dev/null");
+ }
+ system("/opt/vyatta/sbin/my_delete service snmp v3 user \"$name\" auth plaintext-key > /dev/null");
+ }
+ }
+ }
+}
+
+sub set_hosts() {
+ print "#trap-target\n";
+ my $config = get_snmp_config();
+ foreach my $target ($config->listNodes("trap-target")) {
+ $config->setLevel($snmp_v3_level." trap-target $target");
+ my $auth_key = '';
+ if ($config->exists("auth plaintext-key")) {
+ $auth_key = "-A ".$config->returnValue("auth plaintext-key");
+ } else {
+ $auth_key = "-3m ".$config->returnValue("auth encrypted-key");
+ }
+ my $auth_type = $config->returnValue("auth type");
+ my $user = $config->returnValue("user");
+ my $port = $config->returnValue("port");
+ my $protocol = $config->returnValue("protocol");
+ my $type = $config->returnValue("type");
+ my $inform_flag = '';
+ $inform_flag = '-Ci' if ($type eq 'inform');
+ my $privacy = '';
+ my $secLevel = 'authNoPriv';
+ if ($config->exists("privacy")) {
+ my $priv_key = '';
+ if ($config->exists("privacy plaintext-key")) {
+ $priv_key = "-X ".$config->returnValue("privacy plaintext-key");
+ } else {
+ $priv_key = "-3M ".$config->returnValue("privacy encrypted-key")
+ }
+ my $priv_type = $config->returnValue("privacy type");
+ $privacy = "-x $priv_type $priv_key";
+ $secLevel = 'authPriv';
+ }
+ # TODO
+ # set -3m / -3M for auth / priv for master
+ # or -3k / -3K for local
+ my $target_print = $target;
+ if ($target =~ /:/) {
+ $target_print = "[$target]";
+ $protocol = $protocol."6";
+ }
+ print "trapsess -v 3 $inform_flag -u $user -l $secLevel -a $auth_type $auth_key $privacy $protocol:$target_print:$port\n";
+ }
+ print "\n";
+}
+
+sub check_user_auth_changes() {
+ my $config = get_snmp_config();
+ if ($config->isChanged("user")) {
+ my $haveError = 0;
+ foreach my $user ($config->listNodes("user")) {
+ $config->setLevel($snmp_v3_level." user $user");
+ if ($config->exists("auth")) {
+ if ($config->isChanged("auth encrypted-key") || $config->isChanged("privacy encrypted-key")) {
+ $haveError = 1;
+ print "Discard encrypted-key on user \"$user\". You can't change encrypted key. It does not supported yet.";
+ }
+ my $isAuthKeyChanged = $config->isChanged("auth plaintext-key");
+ my $isAuthChanged = $isAuthKeyChanged || $config->isChanged("auth type");
+ if (($isAuthChanged || $config->isDeleted("privacy") ) && !$isAuthKeyChanged) {
+ $haveError = 1;
+ print "Please, set auth plaintext-key for user \"$user\"\n";
+ }
+ if ($config->exists("privacy")) {
+ my $isPrivKeyChanged = $config->isChanged("privacy plaintext-key");
+ my $isPrivChanged = $isPrivKeyChanged || $config->isChanged("privacy type");
+ if ($isPrivChanged && !$isAuthKeyChanged) {
+ $haveError = 1;
+ print "Please, set auth plaintext-key for user \"$user\"\n";
+ }
+ if (($isAuthChanged || $isPrivChanged) && !$isPrivKeyChanged) {
+ $haveError = 1;
+ print "Please, set privacy plaintext-key for user \"$user\"\n";
+ }
+ }
+ } else {
+ if ($config->exists("privacy")) {
+ $haveError = 1;
+ print "Please, delete privacy for user \"$user\"\n";
+ }
+ }
+ }
+ if ($haveError) {
+ exit(1);
+ }
+ }
+}
+
+sub check_relation() {
+ my $config = get_snmp_config();
+ my $haveError = 0;
+ foreach my $user ($config->listNodes("user")) {
+ if ($config->exists("user $user group")) {
+ my $group = $config->returnValue("user $user group");
+ if (! $config->exists("group $group")) {
+ $haveError = 1;
+ print "Please, create group \"$group\". It's need for user \"$user\"\n";
+ }
+ }
+ }
+ foreach my $group ($config->listNodes("group")) {
+ my $view = $config->returnValue("group $group view");
+ if (! $config->exists("view $view")) {
+ $haveError = 1;
+ print "Please, create view \"$view\". It's need for group \"$group\"\n";
+ }
+ }
+ if ($haveError) {
+ exit(1);
+ }
+}
+
+sub check_tsm_port {
+ my $config = get_snmp_config();
+ if ($config->isChanged("tsm port")) {
+ my $port = $config->returnValue("tsm port");
+ my $reg = ":$port\$";
+ $output = `netstat -anltup | awk '{print \$4}'`;
+ foreach my $line (split(/\n/,$output)) {
+ if ($line =~ /$reg/) {
+ print "Actually port $port is using. It can not be used for tsm.\n";
+ exit(1);
+ }
+ }
+ }
+}
+
+sub copy_conf_to_tmp() {
+ # these files already contain SNMPv2 configuration
+ copy($snmpd_conf, $snmpd_conf_tmp) or die "Couldn't copy $snmpd_conf to $snmpd_conf_tmp - $!";
+ copy($snmpd_usr_conf, $snmpd_usr_conf_tmp) or die "Couldn't copy $snmpd_usr_conf to $snmpd_usr_conf_tmp - $!";
+ copy($snmpd_var_conf, $snmpd_var_conf_tmp) or die "Couldn't copy $snmpd_var_conf to $snmpd_var_conf_tmp - $!";
+}
+
+sub snmp_update {
+
+ check_user_auth_changes();
+ check_relation();
+ check_tsm_port();
+
+ copy_conf_to_tmp();
+
+ set_tsm();
+
+ open (my $fh, '>>', $snmpd_conf_tmp)
+ or die "Couldn't open $snmpd_conf_tmp - $!";
+
+ select $fh;
+
+ set_views();
+ set_groups();
+ set_hosts();
+ set_users_in_etc();
+
+ close $fh;
+ select STDOUT;
+
+ move($snmpd_conf_tmp, $snmpd_conf)
+ or die "Couldn't move $snmpd_conf_tmp to $snmpd_conf - $!";
+
+ my $config = get_snmp_config();
+
+ if ($config->isChanged("user") || $config->isAdded("tsm") || $config->isDeleted("tsm") || $config->isChanged("trap-target")) {
+ parse_config_file();
+ snmpd_stop();
+ set_users_to_other();
+ move($snmpd_usr_conf_tmp, $snmpd_usr_conf)
+ or die "Couldn't move $snmpd_usr_conf_tmp to $snmpd_usr_conf - $!";
+ move($snmpd_var_conf_tmp, $snmpd_var_conf)
+ or die "Couldn't move $snmpd_var_conf_tmp to $snmpd_var_conf - $!";
+ snmpd_start();
+ snmpd_restart();
+ update_users_vyatta_conf();
+ write_config_file();
+ } else {
+ snmpd_start();
+ }
+}
+
+my $update_snmp;
+my $delete_snmp;
+
+GetOptions("update-snmp!" => \$update_snmp,
+ "delete-snmp!" => \$delete_snmp);
+
+snmp_update() if ($update_snmp);
+snmp_delete() if ($delete_snmp);
diff --git a/scripts/snmp/vyatta-snmp.pl b/scripts/snmp/vyatta-snmp.pl
index d473e7fa..a4ea9e27 100755
--- a/scripts/snmp/vyatta-snmp.pl
+++ b/scripts/snmp/vyatta-snmp.pl
@@ -64,6 +64,8 @@ sub snmp_stop {
}
sub snmp_start {
+ # we must stop snmpd first for creating vyatta user
+ system("$snmp_init stop > /dev/null 2>&1");
open (my $fh, '>', $snmp_tmp)
or die "Couldn't open $snmp_tmp - $!";
@@ -78,12 +80,6 @@ sub snmp_start {
move($snmp_tmp, $snmp_conf)
or die "Couldn't move $snmp_tmp to $snmp_conf - $!";
-
- if (snmp_running()) {
- system("$snmp_init restart > /dev/null 2>&1 &");
- } else {
- system("$snmp_init start > /dev/null 2>&1 &");
- }
}
sub get_version {
@@ -235,9 +231,6 @@ sub snmp_get_traps {
my $config = new Vyatta::Config;
$config->setLevel($snmp_level);
- my @trap_targets = $config->listNodes("trap-target");
- return unless @trap_targets;
-
# linkUp/Down configure the Event MIB tables to monitor
# the ifTable for network interfaces being taken up or down
# for making internal queries to retrieve any necessary information
@@ -257,6 +250,9 @@ monitor -r 10 -e linkUpTrap "Generate linkUp" ifOperStatus != 2
monitor -r 10 -e linkDownTrap "Generate linkDown" ifOperStatus == 2
EOF
+ my @trap_targets = $config->listNodes("trap-target");
+ return unless @trap_targets;
+
foreach my $trap_target (@trap_targets) {
my $port = $config->returnValue("trap-target $trap_target port");
my $community
@@ -290,8 +286,9 @@ sub snmp_create_snmpv3_user {
my $vyatta_user = shift;
my $passphrase = randhex(32);
+
my $createuser = "createUser $vyatta_user MD5 \"$passphrase\" DES";
- open(my $fh, '>>', $snmp_snmpv3_createuser_conf) || die "Couldn't open $snmp_snmpv3_createuser_conf - $!";
+ open(my $fh, '>', $snmp_snmpv3_createuser_conf) || die "Couldn't open $snmp_snmpv3_createuser_conf - $!";
print $fh $createuser;
close $fh;
}
@@ -299,9 +296,8 @@ sub snmp_create_snmpv3_user {
sub snmp_write_snmpv3_user {
my $vyatta_user = shift;
- my $user = "rouser $vyatta_user\n";
- system ("sed -i '/user[[:space:]]*vyatta[[:alnum:]]*/d' $snmp_snmpv3_user_conf 2>/dev/null;");
- open(my $fh, '>>', $snmp_snmpv3_user_conf) || die "Couldn't open $snmp_snmpv3_user_conf - $!";
+ my $user = "rwuser $vyatta_user\n";
+ open(my $fh, '>', $snmp_snmpv3_user_conf) || die "Couldn't open $snmp_snmpv3_user_conf - $!";
print $fh $user;
close $fh;
}