SNMPKEY(1p) User Contributed Perl Documentation SNMPKEY(1p)NAME
snmpkey - Create SNMPv3 security keys for the Net::SNMP module
USAGE
The "snmpkey" utility generates security keys based on a password and an authoritativeEngineID passed on the command line. This key can
then be used by the Net::SNMP module instead of the plain text password when creating SNMPv3 objects.
snmpkey <authProto> <password> <authEngineID> [<privProto> [<password>]]
DESCRIPTION
The User-based Security Model used by SNMPv3 defines an algorithm which "localizes" a plain text password to a specific
authoritativeEngineID using a one-way hash. This resulting key is used by the SNMP application instead of the plain text password for
security reasons.
The Net::SNMP module allows the user to either provide a plain text password or a localized key to the object constructor when configuring
authentication or privacy. The "snmpkey" utility can be used to generate the key to be used by the -authkey or -privkey named arguments
when they are passed to the Net::SNMP "session()" constructor.
REQUIRED ARGUMENTS
The "snmpkey" utility requires at least three command line arguments. The first argument defines which hash algorithm to use when creating
the authKey. Either HMAC-MD5-96 or HMAC-SHA-96 can be specified with the string 'md5' or 'sha' respectively. This choice must match the
algorithm passed to the -authprotocol argument when creating the Net::SNMP object. The second argument is the plain text password that is
to be localized to create the authKey. The third required argument is the authoritativeEngineID of the remote SNMP engine associated with
the Net::SNMP argument -hostname. The authoritativeEngineID is to be entered as a hexadecimal string 10 to 64 characters (5 to 32 octets)
long and can be prefixed with an optional "0x".
The last two arguments are optional and can be used to determine how the privKey will be generated. By default, the fourth argument
assumes a value of 'des' corresponding to the default privacy protocol defined in the User-based Security Model. The Net::SNMP module
supports CBC-3DES-EDE and CFB128-AES-128 as alternatives to the default protocol CBC-DES. These protocols can be chosen by specifying the
string '3des' or 'aes' respectively. This choice must match the protocol passed to the -privprotocol argument when creating the Net::SNMP
object. The last argument can be used to specify the plain text password that is to be localized to create the privKey. If this argument
is not specified, the authKey password is used.
AUTHOR
David M. Town <dtown@cpan.org>
LICENSE AND COPYRIGHT
Copyright (c) 2001-2009 David M. Town. All rights reserved.
This program is free software; you may redistribute it and/or modify it under the same terms as the Perl 5 programming language system
itself.
SEE ALSO
Net::SNMP
perl v5.12.4 2011-08-24 SNMPKEY(1p)
Check Out this Related Man Page
SNMPUSM(1) Net-SNMP SNMPUSM(1)NAME
snmpusm - creates and maintains SNMPv3 users on a network entity
SYNOPSIS
snmpusm [COMMON OPTIONS] create USER [CLONEFROM-USER]
snmpusm [COMMON OPTIONS] delete USER
snmpusm [COMMON OPTIONS] cloneFrom USER CLONEFROM-USER
snmpusm [COMMON OPTIONS] [-Ca] [-Cx] passwd OLD-PASSPHRASE NEW-PASSPHRASE [USER]
snmpusm [COMMON OPTIONS] <-Ca | -Cx> -Ck passwd OLD-KEY-OR-PASSPHRASE NEW-KEY-OR-PASSPHRASE [USER]
snmpusm [COMMON OPTIONS] [-Ca] [-Cx] changekey [USER]
DESCRIPTION
snmpusm is an SNMP application that can be used to do simple maintenance on the users known to an SNMP agent, by manipulating the agent's
User-based Security Module (USM) table. The user needs write access to the usmUserTable MIB table. This tool can be used to create,
delete, clone, and change the passphrase of users configured on a running SNMP agent.
OPTIONS
Common options for all snmpusm commands:
-CE ENGINE-ID
Set usmUserEngineID to be used as part of the index of the usmUserTable. Default is to use the contextEngineID (set via -E or
probed) as the usmUserEngineID.
-Cp STRING
Set the usmUserPublic value of the (new) user to the specified STRING.
Options for the passwd and changekey commands:
-Ca Change the authentication key.
-Cx Change the privacy key.
-Ck Allows to use localized key (must start with 0x) instead of passphrase. When this option is used, either the -Ca or -Cx option (but
not both) must also be used.
CREATING USERS
An unauthenticated SNMPv3 user can be created using the command
snmpusm [OPTIONS] create USER
This constructs an (inactive) entry in the usmUserTable, with no authentication or privacy settings. In principle, this user should be
useable for 'noAuthNoPriv' requests, but in practise the Net-SNMP agent will not allow such an entry to be made active.
In order to activate this entry, it is necessary to "clone" an existing user, using the command
snmpusm [OPTIONS] cloneFrom USER CLONEFROM-USER
The USER entry then inherits the same authentication and privacy settings (including pass phrases) as the CLONEFROM user.
These two steps can be combined into one, by using the command
snmpusm [OPTIONS] create USER CLONEFROM-USER
The two forms of the create sub-command require that the user being created does not already exist. The cloneFrom sub-command requires
that the user being cloned to does already exist.
Cloning is the only way to specify which authentication and privacy protocols to use for a given user, and it is only possible to do this
once. Subsequent attempts to reclone onto the same user will appear to succeed, but will be silently ignored. This (somewhat unexpected)
behaviour is mandated by the SNMPv3 USM specifications (RFC 3414). To change the authentication and privacy settings for a given user, it
is necessary to delete and recreate the user entry. This is not necessary for simply changing the pass phrases (see below). This means
that the agent must be initialized with at least one user for each combination of authentication and privacy protocols. See the
snmpd.conf(5) manual page for details of the createUser configuration directive.
DELETING USERS
A user can be deleted from the usmUserTable using the command
snmpusm [OPTIONS] delete USER
CHANGING PASS PHRASES
User profiles contain private keys that are never transmitted over the wire in clear text (regardless of whether the administration
requests are encrypted or not). To change the secret key for a user, it is necessary to specify the user's old passphrase as well as the
new one. This uses the command
snmpusm [OPTIONS] [-Ca] [-Cx] passwd OLD-PASSPHRASE NEW-PASSPHRASE [USER]
After cloning a new user entry from the appropriate template, you should immediately change the new user's passphrase.
If USER is not specified, this command will change the passphrase of the (SNMPv3) user issuing the command. If the -Ca or -Cx options are
specified, then only the authentication or privacy keys are changed. If these options are not specified, then both the authentication and
privacy keys are changed.
snmpusm [OPTIONS] [-Ca] [-Cx] changekey [USER]
This command changes the key in a perfect-forward-secrecy compliant way through a diffie-helman exchange. The remote agent must support
the SNMP-USM-DH-OBJECTS-MIB for this command to work. The resulting keys are printed to the console and may be then set in future command
invocations using the --defAuthLocalizedKey and --defPrivLocalizedKey options or in your snmp.conf file using the defAuthLocalizedKey and
defPrivLocalizedKey keywords.
Note that since these keys are randomly generated based on a diffie helman exchange, they are no longer derived from a more easily typed
password. They are, however, much more secure.
To change from a localized key back to a password, the following variant of the passwd sub-command is used:
snmpusm [OPTIONS] <-Ca | -Cx> -Ck passwd OLD-KEY-OR-PASSPHRASE NEW-KEY-OR-PASSPHRASE [USER]
Either the -Ca or the -Cx option must be specified. The OLD-KEY-OR-PASSPHRASE and/or NEW-KEY-OR-PASSPHRASE arguments can either be a
passphrase or a localized key starting with "0x", e.g. as printed out by the changekey sub-command.
EXAMPLES
Let's assume for our examples that the following VACM and USM configurations lines were in the snmpd.conf file for a Net-SNMP agent. These
lines set up a default user called "initial" with the authentication passphrase "setup_passphrase" so that we can perform the initial setup
of an agent:
# VACM configuration entries
rwuser initial
# lets add the new user we'll create too:
rwuser wes
# USM configuration entries
createUser initial MD5 setup_passphrase DES
Note: the "initial" user's setup should be removed after creating a real user that you grant administrative privileges to (like the user
"wes" we'll be creating in this example.
Note: passphrases must be 8 characters minimum in length.
Create a new user
snmpusm -v3 -u initial -n "" -l authNoPriv -a MD5 -A setup_passphrase localhost create wes initial
Creates a new user, here named "wes" using the user "initial" to do it. "wes" is cloned from "initial" in the process, so he inher-
its that user's passphrase ("setup_passphrase").
Change the user's passphrase
snmpusm -v 3 -u wes -n "" -l authNoPriv -a MD5 -A setup_passphrase localhost passwd setup_passphrase new_passphrase
After creating the user "wes" with the same passphrase as the "initial" user, we need to change his passphrase for him. The above
command changes it from "setup_passphrase", which was inherited from the initial user, to "new_passphrase".
Test the new user
snmpget -v 3 -u wes -n "" -l authNoPriv -a MD5 -A new_passphrase localhost sysUpTime.0
If the above commands were successful, this command should have properly performed an authenticated SNMPv3 GET request to the agent.
Now, go remove the vacm "group" snmpd.conf entry for the "initial" user and you have a valid user 'wes' that you can use for future trans-
actions instead of initial.
WARNING
Manipulating the usmUserTable using this command can only be done using SNMPv3. This command will not work with the community-based ver-
sions, even if they have write access to the table.
SEE ALSO snmpd.conf(5), snmp.conf(5), RFC 3414
4th Berkeley Distribution 22 Oct 2005 SNMPUSM(1)