[SNMP4J]Don't receive anymore TRAP from an agent after sending a GET request in SNMPv3 (Debug log attached)

Frank Fock fock at agentpp.com
Thu May 17 23:25:38 CEST 2007


Hi,

Have you made sure that both SNMPv3 entities use different
engine IDs?

Best regards,
Frank

Yves-Gael Billet (ISTASE) wrote:
> Hello,
> 
> Sorry for my english.
> 
> I've got a problem with receiving SNMP TRAP after sending message to an
> agent. I use the same user for receiving TRAP and sending SNMP messages.
> I receive the TRAP (check with Ethereal) but it wasn't process by SNMP4j
> (Not In Time). See Debug log at the end of this message.
> 
> I have not any idea to solve this problem.
> 
> Thanks in advance
> 
> 
> ------------------------------------ LOG
> ---------------------------------------------
> 
> DEBUG    : Initialized Salt to 9e1eecc1e54be674.
> DEBUG    : Adding user MD5DES =
> UsmUser[secName=administrateur,authProtocol=1.3.6.1.6.3.10.1.1.2,authPassphr
> ase=Ifotec_DSL24_CENTRAL,privProtocol=1.3.6.1.6.3.10.1.2.2,privPassphrase=If
> otec_DSL24_CENTRAL,localizationEngineID=null]
> INFO     : UDP receive buffer size for socket 0.0.0.0/162 is set to: 8192
> DEBUG    : Received message from /192.168.1.2/1024 with length 190:
> 30:81:bb:02:01:03:30:11:02:04:55:2a:99:71:02:03:00:ff:e3:04:01:03:02:01:03:0
> 4:41:30:3f:04:0d:80:00:1f:88:80:c4:5f:7c:2f:0e:1f:00:00:02:01:01:02:03:0f:b3
> :a9:04:0e:61:64:6d:69:6e:69:73:74:72:61:74:65:75:72:04:0c:69:3e:6e:e3:44:2a:
> 27:8f:10:81:d4:ee:04:08:00:00:00:01:ff:b4:83:ad:04:60:cb:dc:34:c7:38:56:37:9
> 3:49:d0:7e:c7:00:67:be:2c:cd:07:d9:38:b2:d0:ab:04:9b:12:00:b9:c8:c2:a6:57:c8
> :cd:c9:98:75:38:2f:76:a0:90:14:6e:d8:0d:64:d1:96:65:1a:23:47:5b:d7:84:4e:60:
> e3:05:04:84:4e:be:71:8e:d9:42:1d:59:97:ff:0b:f1:0b:37:4e:7d:47:1c:a5:e3:13:8
> 2:1b:53:cd:9c:82:3c:ae:b7:00:e1:93:1e
> DEBUG    : SNMPv3 header decoded: msgId=1428855153, msgMaxSize=65507,
> msgFlags=03, secModel=3
> DEBUG    : getUser(engineID=80:00:1f:88:80:c4:5f:7c:2f:0e:1f:00:00,
> securityName=administrateur)
> DEBUG    : MD5First digest: 56:81:54:fa:c7:1b:12:c7:98:4c:74:2b:88:3e:5d:c8
> DEBUG    : MD5localized key: 07:e5:31:35:56:45:6e:ea:14:bb:3c:e4:7d:ef:4f:2c
> DEBUG    : MD5First digest: 56:81:54:fa:c7:1b:12:c7:98:4c:74:2b:88:3e:5d:c8
> DEBUG    : MD5localized key: 07:e5:31:35:56:45:6e:ea:14:bb:3c:e4:7d:ef:4f:2c
> DEBUG    : Adding user administrateur =
> UsmUser[secName=administrateur,authProtocol=1.3.6.1.6.3.10.1.1.2,authPassphr
> ase=07:e5:31:35:56:45:6e:ea:14:bb:3c:e4:7d:ef:4f:2c,privProtocol=1.3.6.1.6.3
> .10.1.2.2,privPassphrase=07:e5:31:35:56:45:6e:ea:14:bb:3c:e4:7d:ef:4f:2c,loc
> alizationEngineID=80:00:1f:88:80:c4:5f:7c:2f:0e:1f:00:00]
> DEBUG    : CheckTime: time ok (non authorative)
> DEBUG    : RFC3412 §7.2.10 - Received PDU is NOT a response or internal
> class message -> unchanged PduHandle = PduHandle[1846919695]
> DEBUG    : Fire process PDU event:
> CommandResponderEvent[transportMapping=org.snmp4j.transport.DefaultUdpTransp
> ortMapping at fc9944peerAddress=192.168.1.2/1024, processed=false,
> pdu=[TRAP[reqestID=1846919695, errorStatus=0, errorIndex=0,
> VBS[1.3.6.1.2.1.1.3.0 = 2:51:30.33; 1.3.6.1.6.3.1.1.4.1.0 =
> 1.3.6.1.4.1.21362; 1.3.6.1.4.1.21362.2.2.0 = 1]]],
> securityName=administrateur, securityModel=3, securityLevel=3]
> 
> 
> DEBUG    : Adding user MD5DES =
> UsmUser[secName=administrateur,authProtocol=1.3.6.1.6.3.10.1.1.2,authPassphr
> ase=Ifotec_DSL24_CENTRAL,privProtocol=1.3.6.1.6.3.10.1.2.2,privPassphrase=If
> otec_DSL24_CENTRAL,localizationEngineID=null]
> DEBUG    : RFC3414 §3.1.4.b Outgoing message is not encrypted
> DEBUG    : Adding cache entry:
> StateReference[msgID=1680942742,pduHandle=PduHandle[339869804],securityEngin
> eID=,securityModel=org.snmp4j.security.USM at 13d93f4,securityName=administrate
> ur,securityLevel=1,contextEngineID=,contextName=]
> DEBUG    : Running pending sync request with handle PduHandle[339869804] and
> retry count left 1
> DEBUG    : Sending message to 192.168.1.2/161 with length 61:
> 30:3b:02:01:03:30:11:02:04:64:31:26:96:02:03:00:ff:ff:04:01:04:02:01:03:04:1
> 0:30:0e:04:00:02:01:00:02:01:00:04:00:04:00:04:00:30:11:04:00:04:00:a0:0b:02
> :01:00:02:01:00:02:01:00:30:00
> INFO     : UDP receive buffer size for socket 192.168.1.140/0 is set to:
> 8192
> DEBUG    : Received message from /192.168.1.2/161 with length 105:
> 30:67:02:01:03:30:11:02:04:64:31:26:96:02:03:00:ff:e3:04:01:00:02:01:03:04:1
> e:30:1c:04:0d:80:00:1f:88:80:c4:5f:7c:2f:0e:1f:00:00:02:01:02:02:02:28:18:04
> :00:04:00:04:00:30:2f:04:0d:80:00:1f:88:80:c4:5f:7c:2f:0e:1f:00:00:04:00:a8:
> 1c:02:01:00:02:01:00:02:01:00:30:11:30:0f:06:0a:2b:06:01:06:03:0f:01:01:04:0
> 0:41:01:67
> DEBUG    : SNMPv3 header decoded: msgId=1680942742, msgMaxSize=65507,
> msgFlags=00, secModel=3
> DEBUG    : Accepting zero length security name
> DEBUG    : Removed cache entry:
> StateReference[msgID=1680942742,pduHandle=PduHandle[339869804],securityEngin
> eID=,securityModel=org.snmp4j.security.USM at 13d93f4,securityName=administrate
> ur,securityLevel=1,contextEngineID=,contextName=]
> DEBUG    : RFC3412 §7.2.10 - Received PDU (msgID=1680942742) is a response
> or an internal class message. PduHandle.transactionID = 339869804
> DEBUG    : MPv3 finished
> DEBUG    : Searching pending request with handlePduHandle[339869804]
> DEBUG    : Send new request after report.
> DEBUG    : Context engine ID of scoped PDU is empty! Setting it to
> authoritative engine ID: 80:00:1f:88:80:c4:5f:7c:2f:0e:1f:00:00
> DEBUG    : getUser(engineID=80:00:1f:88:80:c4:5f:7c:2f:0e:1f:00:00,
> securityName=administrateur)
> DEBUG    : MD5First digest: 56:81:54:fa:c7:1b:12:c7:98:4c:74:2b:88:3e:5d:c8
> DEBUG    : MD5localized key: 07:e5:31:35:56:45:6e:ea:14:bb:3c:e4:7d:ef:4f:2c
> DEBUG    : MD5First digest: 56:81:54:fa:c7:1b:12:c7:98:4c:74:2b:88:3e:5d:c8
> DEBUG    : MD5localized key: 07:e5:31:35:56:45:6e:ea:14:bb:3c:e4:7d:ef:4f:2c
> DEBUG    : Adding user administrateur =
> UsmUser[secName=administrateur,authProtocol=1.3.6.1.6.3.10.1.1.2,authPassphr
> ase=07:e5:31:35:56:45:6e:ea:14:bb:3c:e4:7d:ef:4f:2c,privProtocol=1.3.6.1.6.3
> .10.1.2.2,privPassphrase=07:e5:31:35:56:45:6e:ea:14:bb:3c:e4:7d:ef:4f:2c,loc
> alizationEngineID=80:00:1f:88:80:c4:5f:7c:2f:0e:1f:00:00]
> DEBUG    : RFC3414 §3.1.4.a Outgoing message needs to be encrypted
> DEBUG    : Preparing decrypt_params.
> DEBUG    : Preparing iv for encryption.
> DEBUG    : Using padding.
> DEBUG    : Encryption finished.
> DEBUG    : Adding cache entry:
> StateReference[msgID=1680942743,pduHandle=PduHandle[339869804],securityEngin
> eID=80:00:1f:88:80:c4:5f:7c:2f:0e:1f:00:00,securityModel=org.snmp4j.security
> .USM at 13d93f4,securityName=administrateur,securityLevel=3,contextEngineID=80:
> 00:1f:88:80:c4:5f:7c:2f:0e:1f:00:00,contextName=]
> DEBUG    : Sending message to 192.168.1.2/161 with length 148:
> 30:81:91:02:01:03:30:11:02:04:64:31:26:97:02:03:00:ff:ff:04:01:07:02:01:03:0
> 4:3f:30:3d:04:0d:80:00:1f:88:80:c4:5f:7c:2f:0e:1f:00:00:02:01:00:02:01:00:04
> :0e:61:64:6d:69:6e:69:73:74:72:61:74:65:75:72:04:0c:29:32:ea:71:d9:e3:23:0a:
> 7a:54:8c:78:04:08:00:00:00:00:e5:4b:e6:74:04:38:05:93:65:c4:52:63:16:8c:f5:e
> e:cf:56:c9:ba:4d:f7:30:8a:25:d8:5c:39:52:25:28:80:33:ae:78:56:3d:88:f5:fd:4d
> :28:99:6a:4a:3e:18:c0:69:af:9f:01:cd:b4:3a:01:9a:4e:d6:bf:6f:54
> DEBUG    : Received message from /192.168.1.2/161 with length 132:
> 30:81:81:02:01:03:30:11:02:04:64:31:26:97:02:03:00:ff:e3:04:01:01:02:01:03:0
> 4:38:30:36:04:0d:80:00:1f:88:80:c4:5f:7c:2f:0e:1f:00:00:02:01:02:02:02:28:18
> :04:0e:61:64:6d:69:6e:69:73:74:72:61:74:65:75:72:04:0c:4c:a8:cc:d7:be:ad:1d:
> 48:1a:97:fe:e0:04:00:30:2f:04:0d:80:00:1f:88:80:c4:5f:7c:2f:0e:1f:00:00:04:0
> 0:a8:1c:02:01:00:02:01:00:02:01:00:30:11:30:0f:06:0a:2b:06:01:06:03:0f:01:01
> :02:00:41:01:1d
> DEBUG    : SNMPv3 header decoded: msgId=1680942743, msgMaxSize=65507,
> msgFlags=01, secModel=3
> DEBUG    : getUser(engineID=80:00:1f:88:80:c4:5f:7c:2f:0e:1f:00:00,
> securityName=administrateur)
> DEBUG    : CheckTime: time ok (non authorative)
> DEBUG    : Removed cache entry:
> StateReference[msgID=1680942743,pduHandle=PduHandle[339869804],securityEngin
> eID=80:00:1f:88:80:c4:5f:7c:2f:0e:1f:00:00,securityModel=org.snmp4j.security
> .USM at 13d93f4,securityName=administrateur,securityLevel=3,contextEngineID=80:
> 00:1f:88:80:c4:5f:7c:2f:0e:1f:00:00,contextName=]
> DEBUG    : RFC3412 §7.2.10 - Received PDU (msgID=1680942743) is a response
> or an internal class message. PduHandle.transactionID = 339869804
> DEBUG    : MPv3 finished
> DEBUG    : Searching pending request with handlePduHandle[339869804]
> DEBUG    : Send new request after report.
> DEBUG    : getUser(engineID=80:00:1f:88:80:c4:5f:7c:2f:0e:1f:00:00,
> securityName=administrateur)
> DEBUG    : RFC3414 §3.1.4.a Outgoing message needs to be encrypted
> DEBUG    : Preparing decrypt_params.
> DEBUG    : Preparing iv for encryption.
> DEBUG    : Using padding.
> DEBUG    : Encryption finished.
> DEBUG    : Adding cache entry:
> StateReference[msgID=1680942744,pduHandle=PduHandle[339869804],securityEngin
> eID=80:00:1f:88:80:c4:5f:7c:2f:0e:1f:00:00,securityModel=org.snmp4j.security
> .USM at 13d93f4,securityName=administrateur,securityLevel=3,contextEngineID=80:
> 00:1f:88:80:c4:5f:7c:2f:0e:1f:00:00,contextName=]
> DEBUG    : Sending message to 192.168.1.2/161 with length 149:
> 30:81:92:02:01:03:30:11:02:04:64:31:26:98:02:03:00:ff:ff:04:01:07:02:01:03:0
> 4:40:30:3e:04:0d:80:00:1f:88:80:c4:5f:7c:2f:0e:1f:00:00:02:01:02:02:02:28:18
> :04:0e:61:64:6d:69:6e:69:73:74:72:61:74:65:75:72:04:0c:53:bd:1c:c6:b6:c1:9a:
> 92:95:54:58:46:04:08:00:00:00:02:e5:4b:e6:75:04:38:bc:e6:20:50:35:4a:22:9b:0
> 1:7b:be:17:96:eb:c2:09:19:43:eb:0f:0a:8a:cf:9a:3b:17:46:e1:0a:0b:77:7f:fc:0d
> :86:fe:f6:bc:70:f3:58:9f:b3:c2:bd:5f:72:f8:f2:bf:20:63:70:8b:08:89
> DEBUG    : Received message from /192.168.1.2/161 with length 149:
> 30:81:92:02:01:03:30:11:02:04:64:31:26:98:02:03:00:ff:e3:04:01:03:02:01:03:0
> 4:40:30:3e:04:0d:80:00:1f:88:80:c4:5f:7c:2f:0e:1f:00:00:02:01:02:02:02:28:18
> :04:0e:61:64:6d:69:6e:69:73:74:72:61:74:65:75:72:04:0c:27:5e:01:30:54:81:e9:
> a0:a4:6f:f9:41:04:08:00:00:00:02:9d:48:53:05:04:38:ca:48:b1:85:62:b9:fb:d9:a
> 9:d0:3c:4f:1e:46:3a:0d:ed:ca:22:8d:81:d8:48:9b:07:0b:9d:30:a3:50:73:28:92:e4
> :3f:c8:37:24:4a:aa:89:3d:e9:a4:78:1b:ff:ca:68:40:5b:73:ed:db:58:a6
> DEBUG    : SNMPv3 header decoded: msgId=1680942744, msgMaxSize=65507,
> msgFlags=03, secModel=3
> DEBUG    : getUser(engineID=80:00:1f:88:80:c4:5f:7c:2f:0e:1f:00:00,
> securityName=administrateur)
> DEBUG    : CheckTime: time ok (non authorative)
> DEBUG    : Removed cache entry:
> StateReference[msgID=1680942744,pduHandle=PduHandle[339869804],securityEngin
> eID=80:00:1f:88:80:c4:5f:7c:2f:0e:1f:00:00,securityModel=org.snmp4j.security
> .USM at 13d93f4,securityName=administrateur,securityLevel=3,contextEngineID=80:
> 00:1f:88:80:c4:5f:7c:2f:0e:1f:00:00,contextName=]
> DEBUG    : RFC3412 §7.2.10 - Received PDU (msgID=1680942744) is a response
> or an internal class message. PduHandle.transactionID = 339869804
> DEBUG    : MPv3 finished
> DEBUG    : Looking up pending request with handle PduHandle[339869804]
> DEBUG    : Removed pending request with handle: PduHandle[339869804]
> 
> 
> DEBUG    : Received message from /192.168.1.2/1024 with length 190:
> 30:81:bb:02:01:03:30:11:02:04:7d:26:50:1b:02:03:00:ff:e3:04:01:03:02:01:03:0
> 4:41:30:3f:04:0d:80:00:1f:88:80:c4:5f:7c:2f:0e:1f:00:00:02:01:01:02:03:0f:b7
> :91:04:0e:61:64:6d:69:6e:69:73:74:72:61:74:65:75:72:04:0c:ff:7f:66:bd:48:5b:
> 27:ef:8c:11:39:f3:04:08:00:00:00:01:a8:f7:60:10:04:60:1d:9b:b9:ea:45:9b:b9:3
> 6:c1:01:ea:b8:2d:2e:17:78:6a:9a:c1:8a:1a:b3:60:5b:38:f6:37:b3:f5:26:bd:ef:77
> :15:b3:ca:b6:30:f3:48:42:ad:ba:c3:2a:4f:a2:7b:8a:71:68:9e:e7:32:16:f1:4b:f9:
> 78:b0:a7:fe:87:38:1f:46:dc:b2:66:3d:e5:b7:fb:cb:9a:58:2c:f5:e8:f7:bf:62:c7:c
> d:f8:82:6d:78:4b:3f:73:85:0e:41:6a:d4
> DEBUG    : SNMPv3 header decoded: msgId=2099662875, msgMaxSize=65507,
> msgFlags=03, secModel=3
> DEBUG    : getUser(engineID=80:00:1f:88:80:c4:5f:7c:2f:0e:1f:00:00,
> securityName=administrateur)
> DEBUG    : CheckTime: received message outside time window (non authorative)
> DEBUG    : RFC3414 §3.2.7.a Not in time window;
> engineID='80:00:1f:88:80:c4:5f:7c:2f:0e:1f:00:00', engineBoots=1,
> engineTime=1030033
> WARN     : 1.3.6.1.6.3.15.1.1.2.0 = 0
> 
> 
> 
> --------------------------------------------------
> Yves-Gaël BILLET
> Élève Ingénieur ISTASE 2ème année Telecom Reseaux
> Promotion 2008
> 
> Mail : yves.billet at bvra.univ-st-etienne.fr
> --------------------------------------------------  
> 
> _______________________________________________
> SNMP4J mailing list
> SNMP4J at agentpp.org
> http://lists.agentpp.org/mailman/listinfo/snmp4j

-- 
AGENT++
http://www.agentpp.com
http://www.mibexplorer.com
http://www.mibdesigner.com




More information about the SNMP4J mailing list