SNMP Change keys Issue


 
Thread Tools Search this Thread
Special Forums UNIX and Linux Applications SNMP Change keys Issue
# 1  
Old 03-06-2008
SNMP Change keys Issue

Hi All
I have been facing a problem with snmpusm for creation of a new user from an existing user through cloning during Key Change.
The Existing user has been created using Passphrase and I intend to create the new user with a Auth and Encryption Keys rather that passphrases.
The documentation of snmpusm suggests the usage of -Ck option for the same.However the flag "f" is not identified for the option -C when i tried this.

The Versions:
SNMP:Net-SNMP 5.1.4
Kernel Version(Unix):2.4.20

The Syntax of the command used:
snmpusm -u user -l authpriv -a SHA -A authpassphrase -x AES -X encrKey [OPTIONS] passwd -Ca -Ck authpassphrase New_AuthKey

This shows that the flag k is not recognized for -C option.

Kindly let me know if net-SNMP hs to be upgraded for this.
when I see the documentation for snmpusm the option -Ck is perfectly on.

Thanks in advance

-Anand
Login or Register to Ask a Question

Previous Thread | Next Thread

9 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

Issue with SNMP

Hi, I have a strange issue with snmwpalk. If I do snmpget on yyy.977.4.3.1.3.1006 I get the following successfull output : yyy.977.4.3.1.3.1006 = INTEGER: 206 This is what I was excepting for, now I want to look for other snmp addresses Under yyy.977.4.3.1.3.xxxx. If I do snmpwalk on... (3 Replies)
Discussion started by: FFedo
3 Replies

2. UNIX for Dummies Questions & Answers

Recreate/Restore Repository and/or change/delete Public Keys???

I have a BIG problem... I host a public (Debian) repository on Cydia (for jailbroken iphones). I use my home Mac running Ubuntu in VMWare Fusion. For the repository, I have to have 5 items in a folder to make it 'live:' 1. deb_files folder (to hold my Debian packages) 2. Packages file 3.... (0 Replies)
Discussion started by: thazsar
0 Replies

3. Shell Programming and Scripting

Snmp Process Monitoring Issue

Can someone please explain to me how come snmpwalk doesn't always find a running process that's on a remote server? I prefer to use snmp to monitor processes remotely because this doesn't require me to put a script on that remote box. but the problem is, there are times that my snmp command... (2 Replies)
Discussion started by: SkySmart
2 Replies

4. Solaris

passwordless login issue with ssh keys

Hi GUYS, Me have 2 servers, eg:: A & B id_dsa.pub key of B had been put in authorized_keys of A & Vice versa Passwordless login going from A to B. But while connecting from B to A ,its asking password Any one please help me out.. (6 Replies)
Discussion started by: racechap
6 Replies

5. Infrastructure Monitoring

SNMP Issue

When my server is restarted, SNMP does not start automatically. It needs to be started manually everytime the server is restarted. (1 Reply)
Discussion started by: shahdeo
1 Replies

6. Infrastructure Monitoring

net-snmp issue

When I run a script that polls a router I get the following error from net-snmp. I can not seem to find a straight answer. Could my mib files be corrupt? xxx-xxx:/etc/sma/snmp/mibs# perl /export/home/user/perl/test.pl Unlinked OID in SNMPv2-MIB: snmp ::= { mib-2 11 } Undefined identifier:... (2 Replies)
Discussion started by: mrlayance
2 Replies

7. Solaris

Net-SNMP-5.4.2.1 issue on Sun Solaris

Hi, I am trying to compile the source code for Net-SNMP-5.4.2.1 using the gcc compiler-3.4.6 and 3.4.3 but I am getting the follwoing error with perl enabled: /bin/sh ../libtool --mode=link gcc -g -O2 -Usolaris2 -Dsolaris2=solaris2 -fno-strict-aliasing -pipe -Wdeclaration-after-statement... (2 Replies)
Discussion started by: tisha
2 Replies

8. Solaris

Net-snmp issue in Solaris 8

Hi there, I know this is a common question, but I have not found a satsifactory solution yet, so pardon me for posting similar questions. My problem is the log /var/adm/messages is filling up with this entry every few minutes Please refer below. Oct 4 21:39:46 host last message repeated 3... (5 Replies)
Discussion started by: sundar63
5 Replies

9. Red Hat

RHEL 3 - how to change the SNMP community strings?

I have edited the snmpd.conf file on RHEL3, I changed: com2sec notConfigUser default public to : com2sec notConfigUser default new_string_name BUT, when my security guy scans the box, is still answers to public, I restarted snmpd. Is there more to this than just changing... (0 Replies)
Discussion started by: BG_JrAdmin
0 Replies
Login or Register to Ask a Question
SNMPUSM(1)							     Net-SNMP								SNMPUSM(1)

NAME
snmpusm - creates and maintains SNMPv3 users on a network entity SYNOPSIS
snmpusm [COMMON OPTIONS] create USER [CLONEFROM-USER] snmpusm [COMMON OPTIONS] delete USER snmpusm [COMMON OPTIONS] cloneFrom USER CLONEFROM-USER snmpusm [COMMON OPTIONS] [-Ca] [-Cx] passwd OLD-PASSPHRASE NEW-PASSPHRASE [USER] snmpusm [COMMON OPTIONS] <-Ca | -Cx> -Ck passwd OLD-KEY-OR-PASSPHRASE NEW-KEY-OR-PASSPHRASE [USER] snmpusm [COMMON OPTIONS] [-Ca] [-Cx] changekey [USER] DESCRIPTION
snmpusm is an SNMP application that can be used to do simple maintenance on the users known to an SNMP agent, by manipulating the agent's User-based Security Module (USM) table. The user needs write access to the usmUserTable MIB table. This tool can be used to create, delete, clone, and change the passphrase of users configured on a running SNMP agent. OPTIONS
Common options for all snmpusm commands: -CE ENGINE-ID Set usmUserEngineID to be used as part of the index of the usmUserTable. Default is to use the contextEngineID (set via -E or probed) as the usmUserEngineID. -Cp STRING Set the usmUserPublic value of the (new) user to the specified STRING. Options for the passwd and changekey commands: -Ca Change the authentication key. -Cx Change the privacy key. -Ck Allows to use localized key (must start with 0x) instead of passphrase. When this option is used, either the -Ca or -Cx option (but not both) must also be used. CREATING USERS
An unauthenticated SNMPv3 user can be created using the command snmpusm [OPTIONS] create USER This constructs an (inactive) entry in the usmUserTable, with no authentication or privacy settings. In principle, this user should be useable for 'noAuthNoPriv' requests, but in practise the Net-SNMP agent will not allow such an entry to be made active. In order to activate this entry, it is necessary to "clone" an existing user, using the command snmpusm [OPTIONS] cloneFrom USER CLONEFROM-USER The USER entry then inherits the same authentication and privacy settings (including pass phrases) as the CLONEFROM user. These two steps can be combined into one, by using the command snmpusm [OPTIONS] create USER CLONEFROM-USER The two forms of the create sub-command require that the user being created does not already exist. The cloneFrom sub-command requires that the user being cloned to does already exist. Cloning is the only way to specify which authentication and privacy protocols to use for a given user, and it is only possible to do this once. Subsequent attempts to reclone onto the same user will appear to succeed, but will be silently ignored. This (somewhat unexpected) behaviour is mandated by the SNMPv3 USM specifications (RFC 3414). To change the authentication and privacy settings for a given user, it is necessary to delete and recreate the user entry. This is not necessary for simply changing the pass phrases (see below). This means that the agent must be initialized with at least one user for each combination of authentication and privacy protocols. See the snmpd.conf(5) manual page for details of the createUser configuration directive. DELETING USERS
A user can be deleted from the usmUserTable using the command snmpusm [OPTIONS] delete USER CHANGING PASS PHRASES
User profiles contain private keys that are never transmitted over the wire in clear text (regardless of whether the administration requests are encrypted or not). To change the secret key for a user, it is necessary to specify the user's old passphrase as well as the new one. This uses the command snmpusm [OPTIONS] [-Ca] [-Cx] passwd OLD-PASSPHRASE NEW-PASSPHRASE [USER] After cloning a new user entry from the appropriate template, you should immediately change the new user's passphrase. If USER is not specified, this command will change the passphrase of the (SNMPv3) user issuing the command. If the -Ca or -Cx options are specified, then only the authentication or privacy keys are changed. If these options are not specified, then both the authentication and privacy keys are changed. snmpusm [OPTIONS] [-Ca] [-Cx] changekey [USER] This command changes the key in a perfect-forward-secrecy compliant way through a diffie-helman exchange. The remote agent must support the SNMP-USM-DH-OBJECTS-MIB for this command to work. The resulting keys are printed to the console and may be then set in future command invocations using the --defAuthLocalizedKey and --defPrivLocalizedKey options or in your snmp.conf file using the defAuthLocalizedKey and defPrivLocalizedKey keywords. Note that since these keys are randomly generated based on a diffie helman exchange, they are no longer derived from a more easily typed password. They are, however, much more secure. To change from a localized key back to a password, the following variant of the passwd sub-command is used: snmpusm [OPTIONS] <-Ca | -Cx> -Ck passwd OLD-KEY-OR-PASSPHRASE NEW-KEY-OR-PASSPHRASE [USER] Either the -Ca or the -Cx option must be specified. The OLD-KEY-OR-PASSPHRASE and/or NEW-KEY-OR-PASSPHRASE arguments can either be a passphrase or a localized key starting with "0x", e.g. as printed out by the changekey sub-command. EXAMPLES
Let's assume for our examples that the following VACM and USM configurations lines were in the snmpd.conf file for a Net-SNMP agent. These lines set up a default user called "initial" with the authentication passphrase "setup_passphrase" so that we can perform the initial setup of an agent: # VACM configuration entries rwuser initial # lets add the new user we'll create too: rwuser wes # USM configuration entries createUser initial MD5 setup_passphrase DES Note: the "initial" user's setup should be removed after creating a real user that you grant administrative privileges to (like the user "wes" we'll be creating in this example. Note: passphrases must be 8 characters minimum in length. Create a new user snmpusm -v3 -u initial -n "" -l authNoPriv -a MD5 -A setup_passphrase localhost create wes initial Creates a new user, here named "wes" using the user "initial" to do it. "wes" is cloned from "initial" in the process, so he inher- its that user's passphrase ("setup_passphrase"). Change the user's passphrase snmpusm -v 3 -u wes -n "" -l authNoPriv -a MD5 -A setup_passphrase localhost passwd setup_passphrase new_passphrase After creating the user "wes" with the same passphrase as the "initial" user, we need to change his passphrase for him. The above command changes it from "setup_passphrase", which was inherited from the initial user, to "new_passphrase". Test the new user snmpget -v 3 -u wes -n "" -l authNoPriv -a MD5 -A new_passphrase localhost sysUpTime.0 If the above commands were successful, this command should have properly performed an authenticated SNMPv3 GET request to the agent. Now, go remove the vacm "group" snmpd.conf entry for the "initial" user and you have a valid user 'wes' that you can use for future trans- actions instead of initial. WARNING
Manipulating the usmUserTable using this command can only be done using SNMPv3. This command will not work with the community-based ver- sions, even if they have write access to the table. SEE ALSO
snmpd.conf(5), snmp.conf(5), RFC 3414 4th Berkeley Distribution 22 Oct 2005 SNMPUSM(1)