Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1190679 - In IPv6, snmp packet does not send from specified interface assigned by clientaddr option in snmpd.conf.
In IPv6, snmp packet does not send from specified interface assigned by clien...
Status: CLOSED ERRATA
Product: Red Hat Enterprise Linux 7
Classification: Red Hat
Component: net-snmp (Show other bugs)
7.0
All Linux
medium Severity low
: rc
: ---
Assigned To: Jan Safranek
Dalibor Pospíšil
Mark Flitter
:
Depends On:
Blocks: 1205796 1279501
  Show dependency treegraph
 
Reported: 2015-02-09 07:20 EST by Keigo Noha
Modified: 2015-11-19 06:45 EST (History)
3 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
SNMP now correctly obeys the clientaddr directive over IPv6 Previously, the *clientaddr* option in `snmp.conf` only affected outgoing messages sent over IPv4. With this release, the outgoing IPv6 messages are correctly sent from the interface specified by *clientaddr*.
Story Points: ---
Clone Of:
: 1279501 (view as bug list)
Environment:
Last Closed: 2015-11-19 06:45:49 EST
Type: Bug
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2015:2345 normal SHIPPED_LIVE Moderate: net-snmp security and bug fix update 2015-11-19 05:30:06 EST

  None (edit)
Description Keigo Noha 2015-02-09 07:20:43 EST
Description of problem:
In IPv6, snmp trap packet does not send from specified interface assigned by clientaddr option in snmpd.conf.

Version-Release number of selected component (if applicable):
net-snmp-5.7.2-18.el7

How reproducible:
Always.

Steps to Reproduce:
1. Prepare two nics for the server.
2. Assign IPv6 address to two NICs.
e.x.
~~~
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN 
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
    inet6 ::1/128 scope host 
       valid_lft forever preferred_lft forever
2: ens3: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP qlen 1000
    link/ether 52:54:00:e1:9e:6c brd ff:ff:ff:ff:ff:ff
    inet6 2001:db4::101/64 scope global 
       valid_lft forever preferred_lft forever
    inet6 fe80::5054:ff:fee1:9e6c/64 scope link 
       valid_lft forever preferred_lft forever
3: ens7: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP qlen 1000
    link/ether 52:54:00:61:3e:3e brd ff:ff:ff:ff:ff:ff
    inet6 2001:db4::1/64 scope global 
       valid_lft forever preferred_lft forever
    inet6 fe80::5054:ff:fe61:3e3e/64 scope link 
       valid_lft forever preferred_lft forever
~~~

3. Assigned clientaddr to ens3
- /etc/snmp/snmpd.conf
~~~
clientaddr 2001:db4::101
~~~

4. Send snmp trap to another server.
5. Check source address in the packet.

Actual results:
The source address is not the assigned address.

Expected results:
The source address is the assigned address in clientaddr option.

Additional info:
This bug is reported from NEC. And upstream has a fix for this issue.

http://sourceforge.net/p/net-snmp/bugs/2584/
Comment 9 errata-xmlrpc 2015-11-19 06:45:49 EST
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://rhn.redhat.com/errata/RHSA-2015-2345.html

Note You need to log in before you can comment on or make changes to this bug.