From nobody Tue Oct 29 19:07:17 2024 X-Original-To: ports-bugs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4XdKWV0sVvz5bp8J for ; Tue, 29 Oct 2024 19:07:18 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R10" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4XdKWT4yvQz4CmZ for ; Tue, 29 Oct 2024 19:07:17 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1730228837; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=U1oD9niwhCnfu8DoNnYhe9yZDHZsSVCPDOn6/y6l2iA=; b=VrJghOtQ9qIUWXVCF/G+JWuutsv1pCR9GIvyJwlUNJi6U39jMZmFAc7gkNMY1aVQqvqkBV JY2zQMB54xRclRGFIkTeo5a+pdYMdHKJzPJY/XXbT66BEiLfmcEhV2yDpwwIZA89wkOHC9 AcHutTmvBflbzkNU/l6Q4Y5cDkDCK99WYazLu5T2N/axZILEjalE0aKpZS3cEVcbSh3GXw qX/sca8e0eAKvcFe7wItSnyvQIGdH8dwOyKZt08dVmukfD7j7WZesBt9aqh/Qtk0AQoLAU hrCfwX6FfO/qcLC/8COGOV9APVZPOt4sgeHYms75wkwhxhlHXA9poGSJZUKaqA== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1730228837; a=rsa-sha256; cv=none; b=Ft39M/Xet5ZMp/nKgziPLU6YQos1ud8AXcatiXR7hjSLL0wjbwYYNkNU98SAiJiBYEX/fb ItoOHXkb2nvmpJlD4WGSksUHc+QA6/SAdgDKAOcdD2GriRDXliK6PSTqQslxSfhLtpKCmJ oQXXnhaN8CMIceWxk0XwsdfYmCQbJrlT/K9sKDItIMZpLb1e1pRtsmhYgUvKwLO3W3oDwt lKyq/z40TOv2sKtXi0BRYigQpR3pcxaE9+MKQaRusuzD/7A5Bu4GjtVA3xbxEwA1gs+NHu lG8Vq6KiYzg4/8Bvg5mh9mSE0M2dokqOfjnIKA1M53uZJV25kfoDoJGWfKabwg== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4XdKWT4ShVzbMV for ; Tue, 29 Oct 2024 19:07:17 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 49TJ7HH1027105 for ; Tue, 29 Oct 2024 19:07:17 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 49TJ7HeO027104 for ports-bugs@FreeBSD.org; Tue, 29 Oct 2024 19:07:17 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: ports-bugs@FreeBSD.org Subject: [Bug 282409] net-mgmt/net-snmp: Date: Tue, 29 Oct 2024 19:07:17 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: freebsd-bugzilla@umpquanet.com X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: zi@FreeBSD.org X-Bugzilla-Flags: maintainer-feedback? X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter flagtypes.name Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Ports bug reports List-Archive: https://lists.freebsd.org/archives/freebsd-ports-bugs List-Help: List-Post: List-Subscribe: List-Unsubscribe: X-BeenThere: freebsd-ports-bugs@freebsd.org Sender: owner-freebsd-ports-bugs@FreeBSD.org MIME-Version: 1.0 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D282409 Bug ID: 282409 Summary: net-mgmt/net-snmp: Product: Ports & Packages Version: Latest Hardware: amd64 OS: Any Status: New Severity: Affects Only Me Priority: --- Component: Individual Port(s) Assignee: zi@FreeBSD.org Reporter: freebsd-bugzilla@umpquanet.com Assignee: zi@FreeBSD.org Flags: maintainer-feedback?(zi@FreeBSD.org) Using the latest version of the net-snmp package, I am seeing an intermitte= nt problem that suggests the snmpd daemon has stopped listening on one or more IPv4 sockets. The localhost socket continues to work, so snmpwalks from the localhost succeed, but remote connections on UDP port 21 to an external are ignored. Fortunately this occurs fairly rarely, but not at any predictable interval.= =20 Once the problem occurs, I haven't found any solution except to restart the snmpd daemon. Symptoms: client # hostname monitor.example.edu client # host jimsdesk.example.edu jimsdesk.example.edu has address 10.10.61.35 client # host mrtg.example.edu mrtg.example.edu is an alias for monitor.example.edu. monitor.example.edu has address 10.10.31.11 When the remote snmpwalk client executes: client # snmpwalk -v 2c -c XXX jimsdesk.example.edu Timeout: No Response from jimsdesk.example.edu The local snmpd server observes: server # sockstat -4 | grep snmpd snmpd snmpd 2305 9 udp4 10.10.61.35:161 *:* snmpd snmpd 2305 10 udp4 127.0.0.1:161 *:* server # grep -i ^agentAddress ~snmpd/net-snmpd.conf agentAddress udp:jimsdesk.example.edu agentAddress udp:localhost server # grep -i ^rocommunity ~snmpd/net-snmpd.conf rocommunity XXX 127.0.0.1 rocommunity XXX jimsdesk.example.edu # jimsdesk rocommunity XXX mrtg.example.edu # mrtg/monitor Traffic definitely arrives at the server's public interface: server # tcpdump -ni public udp and port 161 tcpdump: verbose output suppressed, use -v[v]... for full protocol decode listening on public, link-type EN10MB (Ethernet), snapshot length 262144 by= tes 10:59:45.882875 IP 10.10.31.11.55829 > 10.10.61.35.161: GetNextRequest(25)= =20 .1.3.6.1.2.1 10:59:46.887012 IP 10.10.31.11.55829 > 10.10.61.35.161: GetNextRequest(25)= =20 .1.3.6.1.2.1 10:59:47.950106 IP 10.10.31.11.55829 > 10.10.61.35.161: GetNextRequest(25)= =20 .1.3.6.1.2.1 10:59:48.954301 IP 10.10.31.11.55829 > 10.10.61.35.161: GetNextRequest(25)= =20 .1.3.6.1.2.1 10:59:50.017772 IP 10.10.31.11.55829 > 10.10.61.35.161: GetNextRequest(25)= =20 .1.3.6.1.2.1 10:59:51.081294 IP 10.10.31.11.55829 > 10.10.61.35.161: GetNextRequest(25)= =20 .1.3.6.1.2.1 ^C 6 packets captured 7215 packets received by filter 0 packets dropped by kernel But during these episodic failures, the snmpd daemon does not respond. server # tcpdump -ni public udp and port 161 tcpdump: verbose output suppressed, use -v[v]... for full protocol decode listening on public, link-type EN10MB (Ethernet), snapshot length 262144 by= tes 11:23:38.450344 IP 10.10.31.11.53119 > 10.10.61.35.161: GetNextRequest(25)= =20 .1.3.6.1.2.1 11:23:39.464183 IP 10.10.31.11.53119 > 10.10.61.35.161: GetNextRequest(25)= =20 .1.3.6.1.2.1 11:23:40.470146 IP 10.10.31.11.53119 > 10.10.61.35.161: GetNextRequest(25)= =20 .1.3.6.1.2.1 11:23:41.477932 IP 10.10.31.11.53119 > 10.10.61.35.161: GetNextRequest(25)= =20 .1.3.6.1.2.1 11:23:42.483466 IP 10.10.31.11.53119 > 10.10.61.35.161: GetNextRequest(25)= =20 .1.3.6.1.2.1 11:23:43.546906 IP 10.10.31.11.53119 > 10.10.61.35.161: GetNextRequest(25)= =20 .1.3.6.1.2.1 ^C 6 packets captured 11706 packets received by filter 0 packets dropped by kernel It seems both necessary and sufficient to restart the daemon to restore service: server # service snmpd restart Stopping snmpd. Waiting for PIDS: 2305. Starting snmpd. client # snmpwalk -v 2c -c XXX jimsdesk.example.edu SNMPv2-MIB::sysDescr.0 =3D STRING: FreeBSD jimsdesk.example.edu 14.2-PREREL= EASE FreeBSD 14.2-PRERELEASE #0 stable/14-n269296-5ae76ff5138e: Wed Oct 23 15:48= :38 PDT 2024 root@build.example.edu:/usr/obj/usr/src/amd64.amd64/sys/GENERIC amd64 SNMPv2-MIB::sysObjectID.0 =3D OID: NET-SNMP-MIB::netSnmpAgentOIDs.8 DISMAN-EVENT-MIB::sysUpTimeInstance =3D Timeticks: (92659) 0:15:26.59 SNMPv2-MIB::sysContact.0 =3D STRING: bounce@example.edu SNMPv2-MIB::sysName.0 =3D STRING: jimsdesk.example.edu SNMPv2-MIB::sysLocation.0 =3D STRING: GQ Room 015 ...etc... server # tcpdump -ni public udp and port 161 tcpdump: verbose output suppressed, use -v[v]... for full protocol decode listening on public, link-type EN10MB (Ethernet), snapshot length 262144 by= tes 11:24:15.761782 IP 10.10.31.11.55644 > 10.10.61.35.161: GetNextRequest(25)= =20 .1.3.6.1.2.1 11:24:15.762314 IP 10.10.61.35.161 > 10.10.31.11.55644: GetResponse(248)=20 .1.3.6.1.2.1.1.1.0=3D"FreeBSD jimsdesk.example.edu 14.2-PRERELEASE FreeBSD 14.2-PRERELEASE #0 stable/14-n269296-5ae76ff5138e: Wed Oct 23 15:48:38 PDT = 2024 root@build.example.edu:/usr/obj/usr/src/amd64.amd64/sys/GENERIC amd64" 11:24:15.762661 IP 10.10.31.11.55644 > 10.10.61.35.161: GetNextRequest(28)= =20 .1.3.6.1.2.1.1.1.0 11:24:15.762757 IP 10.10.61.35.161 > 10.10.31.11.55644: GetResponse(38)=20 .1.3.6.1.2.1.1.2.0=3D.1.3.6.1.4.1.8072.3.2.8 11:24:15.763029 IP 10.10.31.11.55644 > 10.10.61.35.161: GetNextRequest(28)= =20 .1.3.6.1.2.1.1.2.0 11:24:15.763096 IP 10.10.61.35.161 > 10.10.31.11.55644: GetResponse(30)=20 .1.3.6.1.2.1.1.3.0=3D919 11:24:15.763395 IP 10.10.31.11.55644 > 10.10.61.35.161: GetNextRequest(28)= =20 .1.3.6.1.2.1.1.3.0 11:24:15.763447 IP 10.10.61.35.161 > 10.10.31.11.55644: GetResponse(43)=20 .1.3.6.1.2.1.1.4.0=3D"bounce@example.edu" 11:24:15.763751 IP 10.10.31.11.55644 > 10.10.61.35.161: GetNextRequest(28)= =20 .1.3.6.1.2.1.1.4.0 11:24:15.763804 IP 10.10.61.35.161 > 10.10.31.11.55644: GetResponse(49)=20 .1.3.6.1.2.1.1.5.0=3D"jimsdesk.example.edu" 11:24:15.764104 IP 10.10.31.11.55644 > 10.10.61.35.161: GetNextRequest(28)= =20 .1.3.6.1.2.1.1.5.0 11:24:15.764152 IP 10.10.61.35.161 > 10.10.31.11.55644: GetResponse(39)=20 .1.3.6.1.2.1.1.6.0=3D"GQ Room 015" 11:24:15.764459 IP 10.10.31.11.55644 > 10.10.61.35.161: GetNextRequest(28)= =20 .1.3.6.1.2.1.1.6.0 ...etc... --=20 You are receiving this mail because: You are the assignee for the bug.=