/* $OpenBSD: snmpc.c,v 1.40 2022/12/26 19:16:03 jmc Exp $ */ /* * Copyright (c) 2019 Martijn van Duren * Copyright (c) 2013 Reyk Floeter * * Permission to use, copy, modify, and distribute this software for any * purpose with or without fee is hereby granted, provided that the above * copyright notice and this permission notice appear in all copies. * * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include "smi.h" #include "snmp.h" #include "usm.h" #define GETOPT_COMMON "A:a:c:E:e:K:k:l:n:O:r:t:u:v:X:x:Z:" int snmpc_get(int, char *[]); int snmpc_walk(int, char *[]); int snmpc_set(int, char *[]); int snmpc_trap(int, char *[]); int snmpc_df(int, char *[]); int snmpc_mibtree(int, char *[]); struct snmp_agent *snmpc_connect(char *, char *); int snmpc_parseagent(char *, char *); int snmpc_print(struct ber_element *); __dead void snmpc_printerror(enum snmp_error, struct ber_element *, int, const char *); char *snmpc_hex2bin(char *, size_t *); ssize_t snmpc_mbswidth(char *); struct ber_element *snmpc_varbindparse(int, char *[]); void usage(void); struct snmp_app { const char *name; const int usecommonopt; const char *optstring; const char *usage; int (*exec)(int, char *[]); }; struct snmp_app snmp_apps[] = { { "get", 1, NULL, "agent oid ...", snmpc_get }, { "getnext", 1, NULL, "agent oid ...", snmpc_get }, { "walk", 1, "C:", "[-C cIipt] [-C E endoid] [-C s skipoid] agent [oid]", snmpc_walk }, { "bulkget", 1, "C:", "[-C nr] agent oid ...", snmpc_get }, { "bulkwalk", 1, "C:", "[-C cipnr] [-C s skipoid] agent [oid]", snmpc_walk }, { "set", 1, NULL, "agent oid type value [oid type value] ...", snmpc_set }, { "trap", 1, NULL, "agent uptime oid [oid type value] ...", snmpc_trap }, { "df", 1, "C:", "[-Ch] [-Cr] agent", snmpc_df }, { "mibtree", 0, "O:", "[-O fnS] [oid ...]", snmpc_mibtree } }; struct snmp_app *snmp_app = NULL; char *community = NULL; struct snmp_v3 *v3; char *mib = "mib_2"; int retries = 5; int timeout = 1; enum snmp_version version = SNMP_V3; int print_equals = 1; int print_varbind_only = 0; int print_summary = 0; int print_time = 0; int print_human = 0; int walk_check_increase = 1; int walk_fallback_oid = 1; int walk_include_oid = 0; int smi_print_hint = 1; int non_repeaters = 0; int max_repetitions = 10; struct ber_oid walk_end = {{0}, 0}; struct ber_oid *walk_skip = NULL; size_t walk_skip_len = 0; enum smi_oid_lookup oid_lookup = smi_oidl_short; enum smi_output_string output_string = smi_os_default; int utf8 = 0; int main(int argc, char *argv[]) { const EVP_MD *md = NULL; const EVP_CIPHER *cipher = NULL; struct snmp_sec *sec; char *user = NULL; enum usm_key_level authkeylevel = USM_KEY_UNSET; char *authkey = NULL; size_t authkeylen = 0; enum usm_key_level privkeylevel = USM_KEY_UNSET; char *privkey = NULL; size_t privkeylen = 0; int seclevel = SNMP_MSGFLAG_REPORT; char *ctxname = NULL; char *ctxengineid = NULL, *secengineid = NULL; size_t ctxengineidlen, secengineidlen; int zflag = 0; long long boots = 0, time = 0; char optstr[BUFSIZ]; const char *errstr; char *strtolp; int ch; size_t i; /* * Determine if output can handle UTF-8 based on locale. */ setlocale(LC_CTYPE, ""); utf8 = MB_CUR_MAX > 1; /* * SMIv2 allows for UTF-8 text at some locations. * Set it explicitly so we can handle it on the input side. */ if (setlocale(LC_CTYPE, "en_US.UTF-8") == NULL) errx(1, "setlocale(LC_CTYPE, \"en_US.UTF-8\") failed"); if (pledge("stdio inet dns unix", NULL) == -1) err(1, "pledge"); if (argc <= 1) usage(); optstr[0] = '\0'; for (i = 0; i < sizeof(snmp_apps)/sizeof(*snmp_apps); i++) { if (strcmp(snmp_apps[i].name, argv[1]) == 0) { snmp_app = &snmp_apps[i]; if (snmp_app->optstring != NULL) { if (strlcpy(optstr, snmp_app->optstring, sizeof(optstr)) > sizeof(optstr)) errx(1, "strlcat"); } break; } } if (snmp_app == NULL) usage(); if (snmp_app->usecommonopt) { if (strlcat(optstr, GETOPT_COMMON, sizeof(optstr)) > sizeof(optstr)) errx(1, "strlcpy"); } argc--; argv++; smi_init(); while ((ch = getopt(argc, argv, optstr)) != -1) { switch (ch) { case 'A': authkey = optarg; authkeylen = strlen(authkey); authkeylevel = USM_KEY_PASSWORD; break; case 'a': if (strcasecmp(optarg, "MD5") == 0) md = EVP_md5(); else if (strcasecmp(optarg, "SHA") == 0) md = EVP_sha1(); else if (strcasecmp(optarg, "SHA-224") == 0) md = EVP_sha224(); else if (strcasecmp(optarg, "SHA-256") == 0) md = EVP_sha256(); else if (strcasecmp(optarg, "SHA-384") == 0) md = EVP_sha384(); else if (strcasecmp(optarg, "SHA-512") == 0) md = EVP_sha512(); else errx(1, "Invalid authentication protocol " "specified after -a flag: %s", optarg); break; case 'c': community = optarg; break; case 'E': ctxengineid = snmpc_hex2bin(optarg, &ctxengineidlen); if (ctxengineid == NULL) { if (errno == EINVAL) errx(1, "Bad engine ID value " "after -3E flag."); err(1, "-3E"); } break; case 'e': secengineid = snmpc_hex2bin(optarg, &secengineidlen); if (secengineid == NULL) { if (errno == EINVAL) errx(1, "Bad engine ID value " "after -3e flag."); err(1, "-3e"); } break; case 'K': privkey = snmpc_hex2bin(optarg, &privkeylen); if (privkey == NULL) { if (errno == EINVAL) errx(1, "Bad key value after " "-3K flag."); errx(1, "-3K"); } privkeylevel = USM_KEY_LOCALIZED; break; case 'k': authkey = snmpc_hex2bin(optarg, &authkeylen); if (authkey == NULL) { if (errno == EINVAL) errx(1, "Bad key value after -k flag."); err(1, "-k"); } authkeylevel = USM_KEY_LOCALIZED; break; case 'l': if (strcasecmp(optarg, "noAuthNoPriv") == 0) seclevel = SNMP_MSGFLAG_REPORT; else if (strcasecmp(optarg, "authNoPriv") == 0) seclevel = SNMP_MSGFLAG_AUTH | SNMP_MSGFLAG_REPORT; else if (strcasecmp(optarg, "authPriv") == 0) seclevel = SNMP_MSGFLAG_AUTH | SNMP_MSGFLAG_PRIV | SNMP_MSGFLAG_REPORT; else errx(1, "Invalid security level specified " "after -l flag: %s", optarg); break; case 'n': ctxname = optarg; break; case 'r': if ((retries = strtonum(optarg, 0, INT_MAX, &errstr)) == 0) { if (errstr != NULL) errx(1, "-r: %s argument", errstr); } break; case 't': if ((timeout = strtonum(optarg, 1, INT_MAX, &errstr)) == 0) { if (errstr != NULL) errx(1, "-t: %s argument", errstr); } break; case 'u': user = optarg; break; case 'v': if (strcmp(optarg, "1") == 0) version = SNMP_V1; else if (strcmp(optarg, "2c") == 0) version = SNMP_V2C; else if (strcmp(optarg, "3") == 0) version = SNMP_V3; else errc(1, EINVAL, "-v"); break; case 'C': for (i = 0; i < strlen(optarg); i++) { switch (optarg[i]) { case 'c': if (strcmp(snmp_app->name, "walk") && strcmp(snmp_app->name, "bulkwalk")) usage(); walk_check_increase = 0; break; case 'h': if (strcmp(snmp_app->name, "df")) usage(); print_human = 1; break; case 'i': if (strcmp(snmp_app->name, "walk") && strcmp(snmp_app->name, "bulkwalk")) usage(); walk_include_oid = 1; break; case 'n': if (strcmp(snmp_app->name, "bulkget") && strcmp(snmp_app->name, "bulkwalk")) usage(); errno = 0; non_repeaters = strtol(&optarg[i + 1], &strtolp, 10); if (non_repeaters < 0 || errno == ERANGE) { if (non_repeaters < 0) errx(1, "%s%s", "-Cn: too small ", "argument"); else errx(1, "%s%s", "-Cn: too large", "argument"); } else if (&optarg[i + 1] == strtolp) errx(1, "-Cn invalid argument"); i = strtolp - optarg - 1; break; case 'p': if (strcmp(snmp_app->name, "walk") && strcmp(snmp_app->name, "bulkwalk")) usage(); print_summary = 1; break; case 'r': if (strcmp(snmp_app->name, "bulkget") && strcmp(snmp_app->name, "bulkwalk") && strcmp(snmp_app->name, "df")) usage(); errno = 0; max_repetitions = strtol(&optarg[i + 1], &strtolp, 10); if (max_repetitions < 0 || errno == ERANGE) { if (max_repetitions < 0) errx(1, "%s%s", "-Cr: too small ", "argument"); else errx(1, "%s%s", "-Cr: too large", "argument"); } else if (&optarg[i + 1] == strtolp) errx(1, "-Cr invalid argument"); i = strtolp - optarg - 1; break; case 's': if (strcmp(snmp_app->name, "walk") && strcmp(snmp_app->name, "bulkwalk")) usage(); if ((walk_skip = recallocarray( walk_skip, walk_skip_len, walk_skip_len + 1, sizeof(*walk_skip))) == NULL) errx(1, "malloc"); if (smi_string2oid(argv[optind], &(walk_skip[walk_skip_len])) != 0) errx(1, "%s: %s", "Unknown Object Identifier", argv[optind]); walk_skip_len++; optind++; break; case 't': if (strcmp(snmp_app->name, "walk")) usage(); print_time = 1; break; case 'E': if (strcmp(snmp_app->name, "walk")) usage(); if (smi_string2oid(argv[optind], &walk_end) != 0) errx(1, "%s: %s", "Unknown Object Identifier", argv[optind]); optind++; continue; case 'I': if (strcmp(snmp_app->name, "walk")) usage(); walk_fallback_oid = 0; break; default: usage(); } if (optarg[i] == 'E') break; } break; case 'O': for (i = 0; i < strlen(optarg); i++) { if (strcmp(snmp_app->name, "mibtree") == 0 && optarg[i] != 'f' && optarg[i] != 'n' && optarg[i] != 'S') usage(); switch (optarg[i]) { case 'a': output_string = smi_os_ascii; break; case 'f': oid_lookup = smi_oidl_full; break; case 'n': oid_lookup = smi_oidl_numeric; break; case 'q': print_equals = 0; smi_print_hint = 0; break; case 'v': print_varbind_only = 1; break; case 'x': output_string = smi_os_hex; break; case 'S': oid_lookup = smi_oidl_short; break; case 'Q': smi_print_hint = 0; break; default: usage(); } } break; case 'X': privkey = optarg; privkeylen = strlen(privkey); privkeylevel = USM_KEY_PASSWORD; break; case 'x': if (strcasecmp(optarg, "DES") == 0) cipher = EVP_des_cbc(); else if (strcasecmp(optarg, "AES") == 0) cipher = EVP_aes_128_cfb128(); else errx(1, "Invalid privacy protocol " "specified after -3x flag: %s", optarg); break; case 'Z': boots = strtoll(optarg, &strtolp, 10); if (boots < 0 || strtolp == optarg || strtolp[0] != ',') usage(); strtolp++; time = strtoll(strtolp, &strtolp, 10); if (boots < 0 || strtolp == optarg) usage(); zflag = 1; break; default: usage(); } } argc -= optind; argv += optind; if (!snmp_app->usecommonopt) { /* No SNMP protocol settings */ } else if (version == SNMP_V1 || version == SNMP_V2C) { if (community == NULL || community[0] == '\0') errx(1, "No community name specified."); } else if (version == SNMP_V3) { /* Setup USM */ if (user == NULL || user[0] == '\0') errx(1, "No securityName specified"); if ((sec = usm_init(user, strlen(user))) == NULL) err(1, "usm_init"); if (seclevel & SNMP_MSGFLAG_AUTH) { if (md == NULL) md = EVP_sha1(); if (authkey == NULL) errx(1, "No authKey or authPassword specified"); if (usm_setauth(sec, md, authkey, authkeylen, authkeylevel) == -1) err(1, "Can't set authkey"); } if (seclevel & SNMP_MSGFLAG_PRIV) { if (cipher == NULL) cipher = EVP_aes_128_cfb128(); if (privkey == NULL) errx(1, "No privKey or privPassword specified"); if (usm_setpriv(sec, cipher, privkey, privkeylen, privkeylevel) == -1) err(1, "Can't set authkey"); } if (secengineid != NULL) { if (usm_setengineid(sec, secengineid, secengineidlen) == -1) err(1, "Can't set secengineid"); } if (zflag) if (usm_setbootstime(sec, boots, time) == -1) err(1, "Can't set boots/time"); v3 = snmp_v3_init(seclevel, ctxname, ctxname == NULL ? 0 : strlen(ctxname), sec); if (v3 == NULL) err(1, "snmp_v3_init"); if (ctxengineid != NULL) { if (snmp_v3_setengineid(v3, ctxengineid, ctxengineidlen) == -1) err(1, "Can't set ctxengineid"); } } return snmp_app->exec(argc, argv); } int snmpc_get(int argc, char *argv[]) { struct ber_oid *oid; struct ber_element *pdu, *varbind; struct snmp_agent *agent; int errorstatus, errorindex; int i; int class; unsigned type; char *hint = NULL; if (argc < 2) usage(); if ((agent = snmpc_connect(argv[0], "161")) == NULL) err(1, "%s", snmp_app->name); agent->timeout = timeout; agent->retries = retries; if (pledge("stdio", NULL) == -1) err(1, "pledge"); argc--; argv++; oid = reallocarray(NULL, argc, sizeof(*oid)); if (oid == NULL) err(1, "malloc"); for (i = 0; i < argc; i++) { if (smi_string2oid(argv[i], &oid[i]) == -1) errx(1, "%s: Unknown object identifier", argv[i]); } if (strcmp(snmp_app->name, "getnext") == 0) { if ((pdu = snmp_getnext(agent, oid, argc)) == NULL) err(1, "getnext"); } else if (strcmp(snmp_app->name, "bulkget") == 0) { if (version < SNMP_V2C) errx(1, "Cannot send V2 PDU on V1 session"); if (non_repeaters > argc) errx(1, "need more objects than -Cn"); if ((pdu = snmp_getbulk(agent, oid, argc, non_repeaters, max_repetitions)) == NULL) err(1, "bulkget"); } else { if ((pdu = snmp_get(agent, oid, argc)) == NULL) err(1, "get"); } (void) ober_scanf_elements(pdu, "t{Sdd{e", &class, &type, &errorstatus, &errorindex, &varbind); if (errorstatus != 0) { if (errorindex >= 1 && errorindex <= argc) hint = argv[errorindex - 1]; snmpc_printerror((enum snmp_error) errorstatus, varbind, errorindex, hint); } if (class == BER_CLASS_CONTEXT && type == SNMP_C_REPORT) printf("Received report:\n"); for (; varbind != NULL; varbind = varbind->be_next) { if (!snmpc_print(varbind)) err(1, "Can't print response"); } ober_free_elements(pdu); snmp_free_agent(agent); return 0; } int snmpc_walk(int argc, char *argv[]) { struct ber_oid oid, loid, noid; struct ber_element *pdu, *varbind, *value; struct timespec start, finish; struct snmp_agent *agent; const char *oids; int n = 0, prev_cmp, skip_cmp; int errorstatus, errorindex; int class; size_t i; unsigned type; if (strcmp(snmp_app->name, "bulkwalk") == 0 && version < SNMP_V2C) errx(1, "Cannot send V2 PDU on V1 session"); if (argc < 1 || argc > 2) usage(); oids = argc == 1 ? mib : argv[1]; if ((agent = snmpc_connect(argv[0], "161"))== NULL) err(1, "%s", snmp_app->name); agent->timeout = timeout; agent->retries = retries; if (pledge("stdio", NULL) == -1) err(1, "pledge"); if (smi_string2oid(oids, &oid) == -1) errx(1, "%s: Unknown object identifier", oids); bcopy(&oid, &noid, sizeof(noid)); if (print_time) clock_gettime(CLOCK_MONOTONIC, &start); if (walk_include_oid) { if ((pdu = snmp_get(agent, &oid, 1)) == NULL) err(1, "%s", snmp_app->name); (void) ober_scanf_elements(pdu, "t{Sdd{e", &class, &type, &errorstatus, &errorindex, &varbind); if (errorstatus != 0) snmpc_printerror((enum snmp_error) errorstatus, varbind, errorindex, oids); if (class == BER_CLASS_CONTEXT && type == SNMP_C_REPORT) printf("Received report:\n"); if (!snmpc_print(varbind)) err(1, "Can't print response"); ober_free_element(pdu); if (class == BER_CLASS_CONTEXT && type == SNMP_C_REPORT) return 1; n++; } while (1) { for (i = 0; i < walk_skip_len; i++) { skip_cmp = ober_oid_cmp(&noid, &(walk_skip[i])); if (skip_cmp == 0 || skip_cmp == 2) { bcopy(&(walk_skip[i]), &noid, sizeof(noid)); noid.bo_id[noid.bo_n -1]++; break; } } bcopy(&noid, &loid, sizeof(loid)); if (strcmp(snmp_app->name, "bulkwalk") == 0) { if ((pdu = snmp_getbulk(agent, &noid, 1, non_repeaters, max_repetitions)) == NULL) err(1, "bulkwalk"); } else { if ((pdu = snmp_getnext(agent, &noid, 1)) == NULL) err(1, "walk"); } (void) ober_scanf_elements(pdu, "t{Sdd{e", &class, &type, &errorstatus, &errorindex, &varbind); if (errorstatus != 0) { snmpc_printerror((enum snmp_error) errorstatus, varbind, errorindex, NULL); } if (class == BER_CLASS_CONTEXT && type == SNMP_C_REPORT) printf("Received report:\n"); for (; varbind != NULL; varbind = varbind->be_next) { (void) ober_scanf_elements(varbind, "{oe}", &noid, &value); if (value->be_class == BER_CLASS_CONTEXT && value->be_type == BER_TYPE_EOC) break; for (i = 0; i < walk_skip_len; i++) { skip_cmp = ober_oid_cmp(&noid, &(walk_skip[i])); if (skip_cmp == 0 || skip_cmp == 2) break; } if (i < walk_skip_len) continue; prev_cmp = ober_oid_cmp(&noid, &loid); if (walk_check_increase && prev_cmp == -1) errx(1, "OID not increasing"); if (prev_cmp == 0 || ober_oid_cmp(&noid, &oid) != 2) break; if (walk_end.bo_n != 0 && ober_oid_cmp(&noid, &walk_end) != -1) break; if (!snmpc_print(varbind)) err(1, "Can't print response"); n++; } ober_free_elements(pdu); if (class == BER_CLASS_CONTEXT && type == SNMP_C_REPORT) return 1; if (varbind != NULL) break; } if (walk_fallback_oid && n == 0) { if ((pdu = snmp_get(agent, &oid, 1)) == NULL) err(1, "%s", snmp_app->name); (void) ober_scanf_elements(pdu, "t{Sdd{e", &class, &type, &errorstatus, &errorindex, &varbind); if (errorstatus != 0) snmpc_printerror((enum snmp_error) errorstatus, varbind, errorindex, oids); if (class == BER_CLASS_CONTEXT && type == SNMP_C_REPORT) printf("Received report:\n"); if (!snmpc_print(varbind)) err(1, "Can't print response"); ober_free_element(pdu); if (class == BER_CLASS_CONTEXT && type == SNMP_C_REPORT) return 1; n++; } if (print_time) clock_gettime(CLOCK_MONOTONIC, &finish); if (print_summary) printf("Variables found: %d\n", n); if (print_time) { if ((finish.tv_nsec -= start.tv_nsec) < 0) { finish.tv_sec -= 1; finish.tv_nsec += 1000000000; } finish.tv_sec -= start.tv_sec; fprintf(stderr, "Total traversal time: %lld.%09ld seconds\n", finish.tv_sec, finish.tv_nsec); } snmp_free_agent(agent); return 0; } int snmpc_set(int argc, char *argv[]) { struct snmp_agent *agent; struct ber_element *pdu, *varbind; int errorstatus, errorindex; int class; unsigned type; char *hint = NULL; if (argc < 4) usage(); if ((agent = snmpc_connect(argv[0], "161")) == NULL) err(1, "%s", snmp_app->name); argc--; argv++; if (pledge("stdio", NULL) == -1) err(1, "pledge"); if ((pdu = snmp_set(agent, snmpc_varbindparse(argc, argv))) == NULL) err(1, "set"); (void) ober_scanf_elements(pdu, "t{Sdd{e", &class, &type, &errorstatus, &errorindex, &varbind); if (errorstatus != 0) { if (errorindex >= 1 && errorindex <= argc / 3) hint = argv[(errorindex - 1) * 3]; snmpc_printerror((enum snmp_error) errorstatus, varbind, errorindex, hint); } if (class == BER_CLASS_CONTEXT && type == SNMP_C_REPORT) printf("Received report:\n"); for (; varbind != NULL; varbind = varbind->be_next) { if (!snmpc_print(varbind)) err(1, "Can't print response"); } ober_free_elements(pdu); snmp_free_agent(agent); return 0; } int snmpc_trap(int argc, char *argv[]) { struct snmp_agent *agent; struct timespec ts; struct ber_oid trapoid; const char *errstr = NULL; long long lval; if (version == SNMP_V1) errx(1, "trap is not supported for snmp v1"); if (argc < 3) usage(); if ((agent = snmpc_connect(argv[0], "162")) == NULL) err(1, "%s", snmp_app->name); if (pledge("stdio", NULL) == -1) err(1, "pledge"); if (argv[1][0] == '\0') { if (clock_gettime(CLOCK_UPTIME, &ts) == -1) err(1, "clock_gettime"); } else { lval = strtonum(argv[1], 0, UINT32_MAX, &errstr); if (errstr != NULL) errx(1, "Bad value notation (%s)", argv[1]); ts.tv_sec = lval / 100; ts.tv_nsec = (lval % 100) * 10000000; } if (smi_string2oid(argv[2], &trapoid) == -1) errx(1, "Invalid oid: %s\n", argv[2]); argc -= 3; argv += 3; snmp_trap(agent, &ts, &trapoid, snmpc_varbindparse(argc, argv)); return 0; } #define INCR_NEXTTAB(x) ((x + 8) & ~7) #define NEXTTAB(x) (8 - (x & 7)) int snmpc_df(int argc, char *argv[]) { struct snmpc_df { uint32_t index; char *descr; int descrwidth; /* Theoretical maximum for 2 32 bit values multiplied */ char size[21]; char used[21]; char avail[21]; char proc[5]; } *df = NULL; struct ber_oid descroid = {{ 1, 3, 6, 1, 2, 1, 25, 2, 3, 1, 3 }, 11}; struct ber_oid unitsoid = {{ 1, 3, 6, 1, 2, 1, 25, 2, 3, 1, 4 }, 11}; struct ber_oid sizeoid = {{ 1, 3, 6, 1, 2, 1, 25, 2, 3, 1, 5 }, 11}; struct ber_oid usedoid = {{ 1, 3, 6, 1, 2, 1, 25, 2, 3, 1, 6 }, 11}; struct ber_oid oid, *reqoid; char oids[SNMP_MAX_OID_STRLEN]; struct ber_element *pdu, *varbind, *elm; struct snmp_agent *agent; int errorstatus, errorindex; int class; size_t i, j, rows = 0; unsigned type; char *string; int descrlen = 0, sizelen = 0, usedlen = 0, availlen = 0, proclen = 0; int len; long long units, size, used; int fmtret; if (argc != 1) usage(); if ((agent = snmpc_connect(argv[0], "161")) == NULL) err(1, "%s", snmp_app->name); agent->timeout = timeout; agent->retries = retries; if (pledge("stdio", NULL) == -1) err(1, "pledge"); descrlen = sizeof("Description") - 1; sizelen = sizeof("Size") - 1; usedlen = sizeof("Used") - 1; availlen = sizeof("Available") - 1; proclen = sizeof("Used%") - 1; bcopy(&descroid, &oid, sizeof(descroid)); i = 0; while(1) { if (version < SNMP_V2C) { if ((pdu = snmp_getnext(agent, &oid, 1)) == NULL) err(1, "df"); } else { if ((pdu = snmp_getbulk(agent, &oid, 1, 0, max_repetitions)) == NULL) err(1, "df"); } (void) ober_scanf_elements(pdu, "t{Sdd{e", &class, &type, &errorstatus, &errorindex, &varbind); if (errorstatus != 0) snmpc_printerror((enum snmp_error) errorstatus, varbind, errorindex, NULL); if (class == BER_CLASS_CONTEXT && type == SNMP_C_REPORT) { printf("Received report:\n"); for (; varbind != NULL; varbind = varbind->be_next) { if (!snmpc_print(varbind)) err(1, "Can't print response"); } return 1; } for (; varbind != NULL; varbind = varbind->be_next) { if (ober_scanf_elements(varbind, "{os", &oid, &string) == -1 || ober_oid_cmp(&oid, &descroid) != 2) break; rows++; } if ((df = reallocarray(df, rows, sizeof(*df))) == NULL) err(1, "malloc"); (void) ober_scanf_elements(pdu, "{SSS{e", &varbind); for (; i < rows; varbind = varbind->be_next, i++) { if (ober_scanf_elements(varbind, "{oe", &oid, &elm) == -1) { i--; rows--; continue; } if (ober_oid_cmp(&oid, &descroid) != 2) break; df[i].index = oid.bo_id[oid.bo_n - 1]; if ((df[i].descr = smi_print_element(&oid, elm, 0, smi_os_ascii, 0, utf8)) == NULL) { smi_oid2string(&oid, oids, sizeof(oids), oid_lookup); warn("df: can't print oid %s", oids); i--; rows--; continue; } if ((df[i].descrwidth = (int) snmpc_mbswidth(df[i].descr)) == -1) err(1, "df: invalid hrStorageDescr"); if (df[i].descrwidth > descrlen) descrlen = df[i].descrwidth; } ober_free_elements(pdu); if (varbind != NULL) break; } if (max_repetitions < 3) max_repetitions = 3; if ((reqoid = reallocarray(NULL, max_repetitions, sizeof(*reqoid))) == NULL) err(1, "malloc"); for (i = 0; i < rows;) { for (j = 0; i + j < rows && j < (size_t)max_repetitions / 3; j++) { bcopy(&unitsoid, &(reqoid[(j * 3) + 0]), sizeof(unitsoid)); reqoid[(j * 3) + 0].bo_id[ reqoid[(j * 3) + 0].bo_n++] = df[i + j].index; bcopy(&sizeoid, &(reqoid[(j * 3) + 1]), sizeof(sizeoid)); reqoid[(j * 3) + 1].bo_id[ reqoid[(j * 3) + 1].bo_n++] = df[i + j].index; bcopy(&usedoid, &(reqoid[(j * 3) + 2]), sizeof(usedoid)); reqoid[(j * 3) + 2].bo_id[ reqoid[(j * 3) + 2].bo_n++] = df[i + j].index; } if ((pdu = snmp_get(agent, reqoid, j * 3)) == NULL) err(1, "df"); (void) ober_scanf_elements(pdu, "t{Sdd{e", &class, &type, &errorstatus, &errorindex, &varbind); if (errorstatus != 0) snmpc_printerror((enum snmp_error) errorstatus, varbind, errorindex, NULL); if (class == BER_CLASS_CONTEXT && type == SNMP_C_REPORT) { printf("Received report:\n"); for (; varbind != NULL; varbind = varbind->be_next) { if (!snmpc_print(varbind)) err(1, "Can't print response"); } } for (j = 0; varbind != NULL; i++) { if (ober_scanf_elements(varbind, "{oi}{oi}{oi}", &(reqoid[0]), &units, &(reqoid[1]), &size, &(reqoid[2]), &used, &varbind) == -1) { break; } varbind = varbind->be_next->be_next->be_next; unitsoid.bo_id[unitsoid.bo_n++] = df[i].index; if (ober_oid_cmp(&unitsoid, &(reqoid[0])) != 0) { warnx("df: received invalid object"); break; } unitsoid.bo_n--; sizeoid.bo_id[sizeoid.bo_n++] = df[i].index; if (ober_oid_cmp(&sizeoid, &(reqoid[1])) != 0) { warnx("df: received invalid object"); break; } sizeoid.bo_n--; usedoid.bo_id[usedoid.bo_n++] = df[i].index; if (ober_oid_cmp(&usedoid, &(reqoid[2])) != 0) { warnx("df: received invalid object"); break; } usedoid.bo_n--; if (print_human) fmtret = fmt_scaled((units * size), df[i].size); if (!print_human || fmtret == -1) snprintf(df[i].size, sizeof(df[i].size), "%lld", (units * size) / 1024); len = (int) strlen(df[i].size); if (len > sizelen) sizelen = len; if (print_human) fmtret = fmt_scaled(units * used, df[i].used); if (!print_human || fmtret == -1) snprintf(df[i].used, sizeof(df[i].used), "%lld", (units * used) / 1024); len = (int) strlen(df[i].used); if (len > usedlen) usedlen = len; if (print_human) fmtret = fmt_scaled(units * (size - used), df[i].avail); if (!print_human || fmtret == -1) snprintf(df[i].avail, sizeof(df[i].avail), "%lld", (units * (size - used)) / 1024); len = (int) strlen(df[i].avail); if (len > availlen) availlen = len; if (size == 0) strlcpy(df[i].proc, "0%", sizeof(df[i].proc)); else { snprintf(df[i].proc, sizeof(df[i].proc), "%lld%%", (used * 100) / size); } len = (int) strlen(df[i].proc); if (len > proclen) proclen = len; j++; } if (j == 0) { warnx("Failed to retrieve information for %s", df[i].descr); memmove(df + i, df + i + 1, (rows - i - 1) * sizeof(*df)); rows--; i--; } } printf("%-*s%*s%*s%*s%*s\n", descrlen, "Description", NEXTTAB(descrlen) + sizelen, "Size", NEXTTAB(sizelen) + usedlen, "Used", NEXTTAB(usedlen) + availlen, "Available", NEXTTAB(availlen) + proclen, "Used%"); for (i = 0; i < rows; i++) { printf("%s%*s%*s%*s%*s%*s\n", df[i].descr, descrlen - df[i].descrwidth, "", NEXTTAB(descrlen) + sizelen, df[i].size, NEXTTAB(sizelen) + usedlen, df[i].used, NEXTTAB(usedlen) + availlen, df[i].avail, NEXTTAB(availlen) + proclen, df[i].proc); } return 0; } int snmpc_mibtree(int argc, char *argv[]) { struct oid *oid; struct ber_oid soid; char buf[BUFSIZ]; int i; if (argc == 0) { for (oid = NULL; (oid = smi_foreach(oid)) != NULL;) { smi_oid2string(&oid->o_id, buf, sizeof(buf), oid_lookup); printf("%s\n", buf); } } else { for (i = 0; i < argc; i++) { if (smi_string2oid(argv[i], &soid) == -1) { warnx("%s: Unknown object identifier", argv[i]); continue; } smi_oid2string(&soid, buf, sizeof(buf), oid_lookup); printf("%s\n", buf); } } return 0; } struct snmp_agent * snmpc_connect(char *host, char *port) { switch (version) { case SNMP_V1: case SNMP_V2C: return snmp_connect_v12(snmpc_parseagent(host, port), version, community); case SNMP_V3: return snmp_connect_v3(snmpc_parseagent(host, port), v3); } return NULL; } int snmpc_print(struct ber_element *elm) { struct ber_oid oid; char oids[SNMP_MAX_OID_STRLEN]; char *value; elm = elm->be_sub; if (ober_get_oid(elm, &oid) != 0) { errno = EINVAL; return 0; } elm = elm->be_next; value = smi_print_element(&oid, elm, smi_print_hint, output_string, oid_lookup, utf8); if (value == NULL) return 0; if (print_varbind_only) printf("%s\n", value); else if (print_equals) { smi_oid2string(&oid, oids, sizeof(oids), oid_lookup); printf("%s = %s\n", oids, value); } else { smi_oid2string(&oid, oids, sizeof(oids), oid_lookup); printf("%s %s\n", oids, value); } free(value); return 1; } __dead void snmpc_printerror(enum snmp_error error, struct ber_element *varbind, int index, const char *hint) { struct ber_oid hoid, vboid; char oids[SNMP_MAX_OID_STRLEN]; const char *oid = NULL; int i; if (index >= 1) { /* Only print if the index is in the reply */ for (i = 1; varbind != NULL && i < index; varbind = varbind->be_next) i++; if (varbind != NULL && ober_get_oid(varbind->be_sub, &vboid) == 0) { /* If user and reply conform print user input */ if (hint != NULL && smi_string2oid(hint, &hoid) == 0 && ober_oid_cmp(&hoid, &vboid) == 0) oid = hint; else oid = smi_oid2string(&vboid, oids, sizeof(oids), oid_lookup); } } if (oid == NULL) oid = "?"; switch (error) { case SNMP_ERROR_NONE: errx(1, "No error, how did I get here?"); case SNMP_ERROR_TOOBIG: errx(1, "Can't parse oid %s: Response too big", oid); case SNMP_ERROR_NOSUCHNAME: errx(1, "Can't parse oid %s: No such object", oid); case SNMP_ERROR_BADVALUE: errx(1, "Can't parse oid %s: Bad value", oid); case SNMP_ERROR_READONLY: errx(1, "Can't parse oid %s: Read only", oid); case SNMP_ERROR_GENERR: errx(1, "Can't parse oid %s: Generic error", oid); case SNMP_ERROR_NOACCESS: errx(1, "Can't parse oid %s: Access denied", oid); case SNMP_ERROR_WRONGTYPE: errx(1, "Can't parse oid %s: Wrong type", oid); case SNMP_ERROR_WRONGLENGTH: errx(1, "Can't parse oid %s: Wrong length", oid); case SNMP_ERROR_WRONGENC: errx(1, "Can't parse oid %s: Wrong encoding", oid); case SNMP_ERROR_WRONGVALUE: errx(1, "Can't parse oid %s: Wrong value", oid); case SNMP_ERROR_NOCREATION: errx(1, "Can't parse oid %s: Can't be created", oid); case SNMP_ERROR_INCONVALUE: errx(1, "Can't parse oid %s: Inconsistent value", oid); case SNMP_ERROR_RESUNAVAIL: errx(1, "Can't parse oid %s: Resource unavailable", oid); case SNMP_ERROR_COMMITFAILED: errx(1, "Can't parse oid %s: Commit failed", oid); case SNMP_ERROR_UNDOFAILED: errx(1, "Can't parse oid %s: Undo failed", oid); case SNMP_ERROR_AUTHERROR: errx(1, "Can't parse oid %s: Authorization error", oid); case SNMP_ERROR_NOTWRITABLE: errx(1, "Can't parse oid %s: Not writable", oid); case SNMP_ERROR_INCONNAME: errx(1, "Can't parse oid %s: Inconsistent name", oid); } errx(1, "Can't parse oid %s: Unknown error (%d)", oid, error); } int snmpc_parseagent(char *agent, char *defaultport) { struct addrinfo hints, *ai, *ai0 = NULL; struct sockaddr_un saddr; char *agentdup, *specifier, *hostname, *port = NULL; int error; int s; if ((agentdup = specifier = strdup(agent)) == NULL) err(1, NULL); bzero(&hints, sizeof(hints)); if ((hostname = strchr(specifier, ':')) != NULL) { *hostname++ = '\0'; if (strcasecmp(specifier, "udp") == 0) { hints.ai_family = AF_INET; hints.ai_socktype = SOCK_DGRAM; } else if (strcasecmp(specifier, "tcp") == 0) { hints.ai_family = AF_INET; hints.ai_socktype = SOCK_STREAM; } else if (strcasecmp(specifier, "udp6") == 0 || strcasecmp(specifier, "udpv6") == 0 || strcasecmp(specifier, "udpipv6") == 0) { hints.ai_family = AF_INET6; hints.ai_socktype = SOCK_DGRAM; } else if (strcasecmp(specifier, "tcp6") == 0 || strcasecmp(specifier, "tcpv6") == 0 || strcasecmp(specifier, "tcpipv6") == 0) { hints.ai_family = AF_INET6; hints.ai_socktype = SOCK_STREAM; } else if (strcasecmp(specifier, "unix") == 0) { hints.ai_family = AF_UNIX; hints.ai_addr = (struct sockaddr *)&saddr; hints.ai_addrlen = sizeof(saddr); saddr.sun_len = sizeof(saddr); saddr.sun_family = AF_UNIX; if (strlcpy(saddr.sun_path, hostname, sizeof(saddr.sun_path)) > sizeof(saddr.sun_path)) errx(1, "Hostname path too long"); ai = &hints; } else { *--hostname = ':'; hostname = specifier; } } else { hostname = specifier; } if (hints.ai_family == AF_INET) { if ((port = strchr(hostname, ':')) != NULL) *port++ = '\0'; } else if (hints.ai_family == AF_INET6 || hints.ai_family == 0) { if (hostname[0] == '[') { hints.ai_family = AF_INET6; hostname++; if ((port = strchr(hostname, ']')) == NULL) errx(1, "invalid agent"); *port++ = '\0'; if (port[0] == ':') *port++ = '\0'; else if (port[0] == '\0') port = NULL; else errx(1, "invalid agent"); } else { if ((port = strrchr(hostname, ':')) != NULL) *port++ = '\0'; } } if (hints.ai_family != AF_UNIX) { if (hints.ai_socktype == 0) hints.ai_socktype = SOCK_DGRAM; if (port == NULL) port = defaultport; error = getaddrinfo(hostname, port, &hints, &ai0); if (error) { if (error != EAI_NODATA || port == defaultport) errx(1, "%s", gai_strerror(error)); *--port = ':'; error = getaddrinfo(hostname, defaultport, &hints, &ai0); if (error) errx(1, "%s", gai_strerror(error)); } s = -1; for (ai = ai0; ai != NULL; ai = ai->ai_next) { if ((s = socket(ai->ai_family, ai->ai_socktype, ai->ai_protocol)) != -1 && connect(s, (struct sockaddr *)ai->ai_addr, ai->ai_addrlen) != -1) break; close(s); s = -1; } } else { s = socket(AF_UNIX, SOCK_STREAM, 0); if (connect(s, (struct sockaddr *)ai->ai_addr, ai->ai_addrlen) == -1) err(1, "Can't connect to %s", agent); } if (s == -1) err(1, "Can't connect to agent %s", agent); if (ai0 != NULL) freeaddrinfo(ai0); free(agentdup); return s; } char * snmpc_hex2bin(char *hexstr, size_t *binlen) { char *decstr; if (hexstr[0] == '0' && hexstr[1] == 'x') hexstr += 2; while (hexstr[0] == ' ' || hexstr[0] == '\t') hexstr++; if ((decstr = malloc((strlen(hexstr) / 2) + 1)) == NULL) return NULL; for (*binlen = 0; hexstr[0] != '\0'; (*binlen)++) { hexstr[0] = toupper(hexstr[0]); hexstr[1] = toupper(hexstr[1]); if (hexstr[0] >= '0' && hexstr[0] <= '9') decstr[*binlen] = (hexstr[0] - '0') << 4; else if (hexstr[0] >= 'A' && hexstr[0] <= 'F') decstr[*binlen] = ((hexstr[0] - 'A') + 10) << 4; else goto fail; if (hexstr[1] >= '0' && hexstr[1] <= '9') decstr[*binlen] |= (hexstr[1] - '0'); else if (hexstr[1] >= 'A' && hexstr[1] <= 'F') decstr[*binlen] |= (hexstr[1] - 'A') + 10; else goto fail; hexstr += 2; while (hexstr[0] == ' ' || hexstr[0] == '\t') hexstr++; } return decstr; fail: errno = EINVAL; free(decstr); return NULL; } ssize_t snmpc_mbswidth(char *str) { wchar_t wc; size_t width = 0; size_t i; int len; for (i = 0; (len = mbtowc(&wc, &(str[i]), MB_CUR_MAX)) != 0; i += len) { if (len == -1) { mbtowc(NULL, NULL, MB_CUR_MAX); return -1; } width += wcwidth(wc); } return width; } struct ber_element * snmpc_varbindparse(int argc, char *argv[]) { struct ber_oid oid, oidval; struct in_addr addr4; char *addr = (char *)&addr4; char *str = NULL, *tmpstr, *endstr; const char *errstr = NULL; struct ber_element *varbind = NULL, *vblist = NULL; int i, ret; size_t strl, byte; long long lval; if (argc % 3 != 0) usage(); for (i = 0; i < argc; i += 3) { if (smi_string2oid(argv[i], &oid) == -1) errx(1, "Invalid oid: %s\n", argv[i]); switch (argv[i + 1][0]) { case 'a': ret = inet_pton(AF_INET, argv[i + 2], &addr4); if (ret == -1) err(1, "inet_pton"); if (ret == 0) errx(1, "%s: Bad value notation (%s)", argv[i], argv[i + 2]); if ((varbind = ober_printf_elements(varbind, "{Oxt}", &oid, addr, sizeof(addr4), BER_CLASS_APPLICATION, SNMP_T_IPADDR)) == NULL) err(1, "ober_printf_elements"); break; case 'b': tmpstr = argv[i + 2]; strl = 0; do { lval = strtoll(tmpstr, &endstr, 10); if (endstr[0] != ' ' && endstr[0] != '\t' && endstr[0] != ',' && endstr[0] != '\0') errx(1, "%s: Bad value notation (%s)", argv[i], argv[i + 2]); if (tmpstr == endstr) { tmpstr++; continue; } if (lval < 0) errx(1, "%s: Bad value notation (%s)", argv[i], argv[i + 2]); byte = lval / 8; if (byte >= strl) { if ((str = recallocarray(str, strl, byte + 1, 1)) == NULL) err(1, "malloc"); strl = byte + 1; } str[byte] |= 0x80 >> (lval % 8); tmpstr = endstr + 1; } while (endstr[0] != '\0'); /* * RFC3416 Section 2.5 * A BITS value is encoded as an OCTET STRING */ goto pastestring; case 'c': lval = strtonum(argv[i + 2], 0, UINT32_MAX, &errstr); if (errstr != NULL) errx(1, "%s: Bad value notation (%s)", argv[i], argv[i + 2]); if ((varbind = ober_printf_elements(varbind, "{Oit}", &oid, lval, BER_CLASS_APPLICATION, SNMP_T_COUNTER32)) == NULL) err(1, "ober_printf_elements"); break; case 'd': /* String always shrinks */ if ((str = malloc(strlen(argv[i + 2]))) == NULL) err(1, "malloc"); tmpstr = argv[i + 2]; strl = 0; do { lval = strtoll(tmpstr, &endstr, 10); if (endstr[0] != ' ' && endstr[0] != '\t' && endstr[0] != '\0') errx(1, "%s: Bad value notation (%s)", argv[i], argv[i + 2]); if (tmpstr == endstr) { tmpstr++; continue; } if (lval < 0 || lval > 0xff) errx(1, "%s: Bad value notation (%s)", argv[i], argv[i + 2]); str[strl++] = (unsigned char) lval; tmpstr = endstr + 1; } while (endstr[0] != '\0'); goto pastestring; case 'i': lval = strtonum(argv[i + 2], INT32_MIN, INT32_MAX, &errstr); if (errstr != NULL) errx(1, "%s: Bad value notation (%s)", argv[i], argv[i + 2]); if ((varbind = ober_printf_elements(varbind, "{Oi}", &oid, lval)) == NULL) err(1, "ober_printf_elements"); break; case 'n': if ((varbind = ober_printf_elements(varbind, "{O0}", &oid)) == NULL) err(1, "ober_printf_elements"); break; case 'o': if (smi_string2oid(argv[i + 2], &oidval) == -1) errx(1, "%s: Unknown Object Identifier (Sub-id " "not found: (top) -> %s)", argv[i], argv[i + 2]); if ((varbind = ober_printf_elements(varbind, "{OO}", &oid, &oidval)) == NULL) err(1, "ober_printf_elements"); break; case 's': if ((str = strdup(argv[i + 2])) == NULL) err(1, NULL); strl = strlen(argv[i + 2]); pastestring: if ((varbind = ober_printf_elements(varbind, "{Ox}", &oid, str, strl)) == NULL) err(1, "ober_printf_elements"); free(str); break; case 't': lval = strtonum(argv[i + 2], 0, UINT32_MAX, &errstr); if (errstr != NULL) errx(1, "%s: Bad value notation (%s)", argv[i], argv[i + 2]); if ((varbind = ober_printf_elements(varbind, "{Oit}", &oid, lval, BER_CLASS_APPLICATION, SNMP_T_TIMETICKS)) == NULL) err(1, "ober_printf_elements"); break; case 'u': lval = strtonum(argv[i + 2], 0, UINT32_MAX, &errstr); if (errstr != NULL) errx(1, "%s: Bad value notation (%s)", argv[i], argv[i + 2]); if ((varbind = ober_printf_elements(varbind, "{Oit}", &oid, lval, BER_CLASS_APPLICATION, SNMP_T_GAUGE32)) == NULL) err(1, "ober_printf_elements"); break; case 'x': /* String always shrinks */ if ((str = malloc(strlen(argv[i + 2]))) == NULL) err(1, "malloc"); tmpstr = argv[i + 2]; strl = 0; do { lval = strtoll(tmpstr, &endstr, 16); if (endstr[0] != ' ' && endstr[0] != '\t' && endstr[0] != '\0') errx(1, "%s: Bad value notation (%s)", argv[i], argv[i + 2]); if (tmpstr == endstr) { tmpstr++; continue; } if (lval < 0 || lval > 0xff) errx(1, "%s: Bad value notation (%s)", argv[i], argv[i + 2]); str[strl++] = (unsigned char) lval; tmpstr = endstr + 1; } while (endstr[0] != '\0'); goto pastestring; default: usage(); } if (vblist == NULL) vblist = varbind; } return vblist; } __dead void usage(void) { size_t i; if (snmp_app != NULL) { fprintf(stderr, "usage: snmp %s%s%s\n", snmp_app->name, snmp_app->usecommonopt ? " [-A authpass] [-a digest] [-c community] [-e secengineid]\n" " [-E ctxengineid] [-K localpriv] [-k localauth] [-l seclevel]\n" " [-n ctxname] [-O afnqvxSQ] [-r retries] [-t timeout] [-u user]\n" " [-v version] [-X privpass] [-x cipher] [-Z boots,time]\n" " " : "", snmp_app->usage == NULL ? " " : snmp_app->usage); exit(1); } for (i = 0; i < (sizeof(snmp_apps)/sizeof(*snmp_apps)); i++) { if (i == 0) fprintf(stderr, "usage: "); else fprintf(stderr, " "); fprintf(stderr, "snmp %s%s %s\n", snmp_apps[i].name, snmp_apps[i].usecommonopt ? " [options]" : "", snmp_apps[i].usage ? snmp_apps[i].usage : ""); } exit(1); }