summaryrefslogtreecommitdiff
path: root/usr.sbin/snmpd
AgeCommit message (Collapse)Author
2014-04-25Support running user-defined actions on receipt of snmp traps.Bret Lambert
testing sthen@ much man page guidance jmc@ ok reyk@
2014-04-24fix copied text in error stringBret Lambert
ok reyk@
2014-04-21Copy the updated proc.c from relayd to use the same file. AdjustReyk Floeter
snmpd accordingly. ok sthen@
2014-04-20Just to be pedantic, fail if strlcpy managed to overflow the socket path.Reyk Floeter
2014-04-20Partially revert the previous: snmp_agentx_ping() didn't leak the pduReyk Floeter
because it is added to a list on the handle and eventually released later with the handle itself. This confuses leak detection tools like clang, so at least add a comment that it is not a leak. ok blambert@
2014-04-20Fix a small leak in the error path.Reyk Floeter
2014-04-18round up some enemy sympathizers found calling RAND_seed().Ted Unangst
ok beck reyk
2014-04-14sundry macro chop;Jason McIntyre
2014-04-14No need to include ber.h here, probably overlooked while importing.andre
ok blambert@
2014-04-14Make snmpd use the AgentX protcol for accepting trap requests.Bret Lambert
AgentX notifications are the only portion implemented right now; get in the tree to flesh out the remainder. ok reyk@ benno@
2014-04-14Fix the following idiom in the following way:Bret Lambert
arc4random_buf(seed, sizeof(seed)); RAND_seed(seed, sizeof(seed)); + explicit_bzero(seed, sizeof(seed)); ok reyk@
2014-04-08Use VM_UVMEXP instead of VM_METER for memory usages and directlyMartin Pieuchot
include <sys/vmmeter.h> where it is needed instead of relying on it being included by <uvm/uvm_extern.h>. miod@ likes it, ok guenther@
2014-03-16lint is dead (long live the lint!), so stop using it as a cpp conditionalPhilip Guenther
(namespace pollution!) or talking about its opinion on code. ok krw@
2014-02-14remove unused function that distracts from cleaning up the imsg_flush() messFlorian Obser
OK hennig@, benno@
2014-01-22relax the cfg file secrecy check slightly to allow group readabilityHenning Brauer
default permissions and mtree NOT changed. prodded by benno, ok phessler benno jmatthew theo pelikan florian
2014-01-18Remove -Wbounded: it is now the compiler default.Martynas Venckus
2013-11-26remove "clever" shortcut that might bite later, ok gilles bennoHenning Brauer
2013-11-25use u_char for buffers in yylex, for ctype callsSebastian Benoit
found by millert@, ok deraadt@
2013-11-21split kernel parts of the if.h into a separate header file if_var.hMike Belopuhov
which allows us to modify ifnet structure in a relatively safe way; discussed with deraadt, ok mpi
2013-11-13handle msgbuf_write() returning EAGAINSebastian Benoit
ok reyk
2013-10-30another simple %i to %d conversion for obviousnessTheo de Raadt
2013-10-19Fix receipt of OID varbinds when sending trapsBret Lambert
ok reyk@
2013-10-17Less ambiguous wording concerning control socket configuration options.Bret Lambert
requested by and ok deraadt@
2013-10-17Update snmpd(8) to use the proc.c privsep style from iked and relayd.Reyk Floeter
ok sthen@ deraadt@
2013-10-16some .Pa;Jason McIntyre
2013-10-16no more -r; ok blambertJason McIntyre
2013-10-16 1) move the creation of 'restricted' communication socketsBret Lambert
into snmpd.conf 2) add the ability to specify an alternate 'control' socket location 3) allow for the creation of multiple 'restricted' sockets (but only one control socket, for the time being) Committing slightly ahead of schedule in order to clear the pipeline for a few other upcoming changes. ok reyk@, sthen@
2013-10-02Fix GETBULK mode that got broken with r1.14.Reyk Floeter
ok sthen@
2013-10-01Add net-snmp's PEN.Reyk Floeter
2013-10-01Tell strvisx() to encode newlines found in octet-strings to avoid uglyReyk Floeter
line wraps.
2013-10-01add ber_oid_cmp() to the listReyk Floeter
2013-10-01fix typoReyk Floeter
2013-10-01Add initial SNMP client utility to snmpctl(8).Reyk Floeter
For example, snmpctl snmp walk 127.0.0.1 commit it deraadt@
2013-10-01Add some PENs and sync the declarations.Reyk Floeter
2013-09-26shuffle some snmpd functions to make them visible in smi.c for snmpctl.Reyk Floeter
ok gerhard@ blambert@
2013-09-26smi is an SNMP term that means "Structure of Managed Information". IReyk Floeter
thought about renaming the functions to just "snmp", but "smi" totally makes sense. So add a comment that explains the meaning of SMI (not life).
2013-09-11According to ITU X.690 (ASN.1 definition document), "octet strings"Bret Lambert
and derived types are allowed to have 0 content octets, whereas "bitstrings" are required to have at least 1 content octet. Adjust the checks in the trap acceptance code to allow for 0-length "octet strings" in SNMP traps. okay reyk@
2013-09-07Plug a memory leak when walking the pfTblAddrTable in PF-MIBJoel Knight
2013-09-07Sync PF-MIB and snmpd up with the pf(4) table byte/packet counters forJoel Knight
'match' rules ok sten ryek
2013-08-26capitalize a section headerMike Belopuhov
2013-07-16use .Mt for email addresses; from Jan Stary <hans at stare dot cz>; ok jmc@Ingo Schwarze
2013-06-21Bzero() the whole key before doing an RB_FIND() because smi_oid_cmp()Gerhard Roth
looks at more members than just 'o_id'. ok reyk@
2013-03-30previous had one backslash too many;Jason McIntyre
2013-03-29Patch from Ilya Bakulin that allows to put snmpd(8) into read-only modeGerhard Roth
so that all "set" requests will be rejected. ok reyk@
2013-03-11Report new PF "translation" counter, indicating that address translationStuart Henderson
has failed due to no free ports in the configured range. ok mikeb@
2013-03-11handle ECONNABORTED errors from accept(). In many code blocks they can beTheo de Raadt
ignored silently and without aborting, much like EINTR and EWOULDBLOCK are. ok's from various maintainers of these directories...
2013-03-06as done in ospf{,6}d/relayd, sync yyerror in various other daemons withStuart Henderson
that from bgpd, so that it logs to syslog when daemonized.
2013-03-04Fix compiler warnings about casts discarding const qualifiers andAlexander Bluhm
comparison between signed and unsigned. No binary change. OK reyk@ joel@ gerhard@
2013-01-24Even if there's no special seclevel required in snmpd.conf, we have toGerhard Roth
validate the user of a received SNMPv3 request. If the configured user has a certain security level (i.e. authentication and maybe encryption), the received message must fulfill this security requirements, too. ok reyk
2013-01-14sm_usmerr should be initialized with OIDVAL, not MIB; ok reyk@Miod Vallat