On Tue, 2021-08-03 at 21:58 +0100, Stuart Henderson wrote: > On 2021/08/03 22:07, Martijn van Duren wrote: > > On Tue, 2021-08-03 at 18:24 +0100, Stuart Henderson wrote: > > > On 2021/06/15 17:39, Stuart Henderson wrote: > > > > > Then again, I don't get the feeling many people use snmpd at this time > > > > > and maybe it's a good moment to bite the bullet and go for safest > > > > > defaults possible at this time. But if that's the case I would like to > > > > > follow up with a diff to changes the default auth to hmac-sha512, > > > > > because snmp drops trailing bytes of the result and enc to aes instead > > > > > of des. > > > > > > > > This is the change that feels most likely to affect existing SNMPv3 > > > > users. > > > > Support in management software beyond aes/sha1 is a bit lacking and > > > > prone > > > > to incompatibility (I had issues with net-snmp and snmpd using > > > > hmac-sha256 > > > > though it seems it will work with hmac-sha512..) > > > > > > BTW, having updated a few machines now, I am finding the change to > > > sha2-256 by default to be a complete pain, especially considering that > > > /etc/examples/snmpd.conf uses "enc aes" but has no setting for auth > > > so relies on defaults for that.. > > > > > I can't do a lot with "a complete pain". > > > > Does something like the diff below make things more intuitive? If not, > > could you be a little more concrete? > > > > martijn@ > > > > Index: snmpd.conf > > =================================================================== > > RCS file: /cvs/src/etc/examples/snmpd.conf,v > > retrieving revision 1.1 > > diff -u -p -r1.1 snmpd.conf > > --- snmpd.conf 11 Jul 2014 21:20:10 -0000 1.1 > > +++ snmpd.conf 3 Aug 2021 20:05:53 -0000 > > @@ -18,7 +18,9 @@ system services 74 > > oid 1.3.6.1.4.1.30155.42.3.1 name testStringValue read-only string "Test" > > oid 1.3.6.1.4.1.30155.42.3.4 name testIntValue read-write integer 1 > > > > -# Enable SNMPv3 USM with authentication, encryption and two defined users > > -#seclevel enc > > -#user "user1" authkey "password123" enc aes enckey "321drowssap" > > -#user "user2" authkey "password456" enckey "654drowssap" > > +# Create two SNMPv3 USM users: > > +# User with default crypto values > > +#user "defaultuser" authkey "password123" enckey "321drowssap" > > +# User with backwards compatible crypto: > > +# Only enable and use when client absolutely can't deal with modern > > defaults. > > +#user "compatuser" authkey "password456" auth hmac-md5 enckey > > "654drowssap" enc des > > > > > > Given the lack of support for SHA2-256 in much management software until > recently AES+SHA is a pretty common configuration. And given the old > snmpd.conf > example I think that is often done by copying/editing so just "enc aes" is > there > with no auth setting. Wondering if that part might not have been such a good > change and what anyone else thinks.. > I think that these management software applications should join 2016 and start implementing it and until then its just two or four minor keywords per user. But I'm not a heavy user of 3rd party mangement software.
Also note that the first time I suggested changing the defaults[0] I offered to help with getting perl's snmp into shape. That offer still stands with the same caveats. Similar for other open source software that I'm not aware of. [0] https://marc.info/?l=openbsd-tech&m=157226549212943&w=2