Age | Commit message (Collapse) | Author | |
---|---|---|---|
2020-02-09 | snmp: T1931: instead of searching a pseudo marker find real marker in config | Christian Poessinger | |
As we need to operate with usmUser, we can search for it directly if its present or not. There is always one usmUser entry for the system user. | |||
2020-02-09 | snmp: T1931: change calling order when setting marker flag | Christian Poessinger | |
2020-02-09 | snmp: T1931: delete obsolete reading of oldEngineID | Christian Poessinger | |
2020-02-09 | snmp: T1931: harden logic when re-reading config fpr encrypted keys | Christian Poessinger | |
2020-02-09 | snmp: T1931: shorten file read timeout to 10ms | Christian Poessinger | |
2020-01-26 | snmpd: T1937: fix all startup warnings | Christian Poessinger | |
This is actually an "upstream" bug, see [1] but it can be fixed via our own scripts. [1]: https://bugs.launchpad.net/ubuntu/+source/net-snmp/+bug/1384122 | |||
2020-01-26 | Revert "snmp: T1937: fix "unknown token" warnings" | Christian Poessinger | |
This reverts commit 6945b2e3561cd76d193d41dd6ab5249661230460. | |||
2020-01-06 | service-snmp: T1931: Enabling SNMP commit error | hagbard | |
2020-01-03 | snmp: T1937: fix "unknown token" warnings | Christian Poessinger | |
2019-12-30 | snmp: T1921: reduce syslog noise | Christian Poessinger | |
Remove informative but noisy messages: Dec 30 11:45:02 vyos snmpd[2870]: Connection from UDP: [172.16.100.1]:42781 ... Dec 30 11:45:02 vyos snmpd[2870]: Connection from UDP: [172.16.100.1]:57331 ... | |||
2019-12-30 | snmp: T1921: change log options | Christian Poessinger | |
suppress error message: Dec 30 11:44:10 LR1 snmpd[2870]: error on subcontainer 'ia_addr' insert (-1) | |||
2019-12-30 | snmp: T1921: migrate sysvinit default to systemd override file | Christian Poessinger | |
2019-12-30 | snmp: adopt user/group to Debian Buster | Christian Poessinger | |
2019-12-18 | snmp: T1881: Add path for ext-scripts without path | DmitriyEshenko | |
2019-12-17 | snmp: T1881: add S_IRGRP to snmp script file permission set | Christian Poessinger | |
2019-12-17 | snmp: T1881: Change permission for script files | Viacheslav Hletenko | |
2019-10-27 | snmp: make script extension code more readable | Christian Poessinger | |
2019-10-27 | snmp: use proper stat literals on chmod() | Christian Poessinger | |
2019-10-27 | snmp: fix verify() indent on script extensions | Christian Poessinger | |
2019-10-27 | snmp: fix verify() bail out early order | Christian Poessinger | |
2019-10-27 | snmp: T1738: cleanup import statements | Christian Poessinger | |
2019-10-27 | snmp: T1769: remove TSM (Transport Security Mode) support | Christian Poessinger | |
The SNMPv3 TSM is very complex and I know 0 users of it. Also this is untested and I know no way how it could be tested. Instead of carrying on dead and unused code we should favour a drop of it using a proper config migration script. | |||
2019-10-27 | snmp: T818: T1738: remove per user/trap engine id | Christian Poessinger | |
As of the SNMP specification an SNMP engine ID should be unique per device. To not make it more complicated for users - only use the global SNMP engine ID. | |||
2019-10-15 | snmpd: T1705 - High CPU usage by bgpd when snmp is active | hagbard | |
* typo fixed | |||
2019-10-13 | Revert "snmpd: T1705 - High CPU usage by bgpd when snmp is active" | Christian Poessinger | |
Systems not runing BGP won't boot anymore. Syslog shows: snmpd[5404]: getaddrinfo: inetCidrRouteTable Name or service not known snmpd[5404]: getaddrinfo("inetCidrRouteTable", NULL, ...): Name or service not known snmpd[5404]: Error opening specified endpoint "inetCidrRouteTable" snmpd[5404]: Server Exiting with code 1 snmpd[5401]: Starting SNMP services:: systemd[1]: snmpd.service: control process exited, code=exited status=1 systemd[1]: Failed to start LSB: SNMP agents. systemd[1]: Unit snmpd.service entered failed state. This reverts commit e45648cdd5a52569be7f3ac30473b0c7474a7894. | |||
2019-10-10 | snmpd: T1705 - High CPU usage by bgpd when snmp is active | hagbard | |
2019-07-15 | [T1299] - SNMP extension with custom scripts | hagbard | |
2019-01-30 | T1160: fix (ro|rw)community ACL | Christian Poessinger | |
WHen building up the SNMP v2 community ro/rw access all hosts from a INET version could access even when the community was locked to one INET family. Example #1: set service snmp community bar network 172.16.0.0/12 Allowed access only to IPv4 network 172.16.0.0/12 but it allowed acces from IPv6 ::/0. Example #2: set service snmp community baz network 2001:db8::/64 Limited IPv6 access to 2001:db8::/64 but IPv4 was open to 0.0.0.0/0 | |||
2019-01-03 | T1147: Fix SNMP config file generation on newly installed systems | Christian Poessinger | |
2018-11-05 | T950: make sure agentx is enabled in FRR only when SNMP is setup, and ↵ | Daniil Baturin | |
supress duplicate error messages. | |||
2018-10-28 | T923: enable AgentX in FRR after SNMP is configured. | Daniil Baturin | |
2018-10-20 | SNMP: update comments in Python generator | Christian Poessinger | |
2018-10-20 | T923: support SNMP integration with FRR routing daemon | Christian Poessinger | |
2018-09-29 | T855: fix SNMP python verify() to allow non group assignment | Christian Poessinger | |
VyOS 1.1.8 support SNMPv3 without a group beeing assigned to a user. This was yet not supported in VyOS 1.2.0. Use for testing: ================ set service snmp v3 user testsnmpv3 auth plain 'authkey12345' set service snmp v3 user testsnmpv3 auth type sha set service snmp v3 user testsnmpv3 mode ro set service snmp v3 user testsnmpv3 privacy plain 'privkey12345' set service snmp v3 user testsnmpv3 privacy type aes | |||
2018-09-16 | T850: SNMP: improve non existing listen-address assignments | Christian Poessinger | |
2018-09-16 | snmp: fix python script indention | Christian Poessinger | |
2018-09-10 | snmp.py: proper creation of non network bound SNMP communities | Christian Poessinger | |
2018-09-10 | snmp.py: improve JINJA2 template robustness | Christian Poessinger | |
2018-09-01 | snmp.py: improve daemon startup | Christian Poessinger | |
The previous implementation used a hardcoded 2 seconds sleep until the daemon configuration was rendered by snmpd (user/password stuff). Waiting 2 seconds is error prone and was replaced by reading the configuration file until it shows a marker indicating that the file was properly processed by snmpd. | |||
2018-09-01 | snmp.py: beautify generated snmp.conf #2 | Christian Poessinger | |
2018-09-01 | snmp.py: bugfix - CLI client community node was not processed | Christian Poessinger | |
2018-09-01 | snmp.py: bugfix writing rocommunity string in config | Christian Poessinger | |
2018-09-01 | snmp.py: beautify generated snmp.conf | Christian Poessinger | |
2018-09-01 | T771: snmp.px: reduce syslog noise | Christian Poessinger | |
2018-08-29 | snmp.py: only write 'oldEngineID' to config if v3 is enabled | Christian Poessinger | |
2018-08-29 | T733: snmp.py: switch to new IP address validators | Christian Poessinger | |
Commit a30dac7c2 ("vyos package: add IP address validators") added system wide Python validators for IP addresses. Remove duplicated code and switch to single source. | |||
2018-08-07 | T733: snmp.py: set IPv6 community string | Jules Taplin | |
Also fixed it to correctly set an IPv6 community string, even if you don't specify the network it's working on. | |||
2018-07-05 | T733: snmp.py: set IPv6 community string | jules-vyos | |
* Fixed snmp.py to correctly supply 'community6' community strings, so that ipv6 will work. | |||
2018-07-02 | T652: SNMP: bugfix initial specification of v3 engine id missing | Christian Poessinger | |
2018-07-02 | T713: bugfix incorrect parsing of seclevel | Christian Poessinger | |
... there was a coding error in the if clause. |