Movatterモバイル変換


[0]ホーム

URL:


[RFC Home] [TEXT|PDF|HTML] [Tracker] [IPR] [Info page]

Obsoleted by:1592 EXPERIMENTAL
Network Working Group                                       G. CarpenterRequest for Comments: 1228                                     B. Wijnen                                  T.J. Watson Research Center, IBM Corp.                                                                May 1991SNMP-DPISimple Network Management ProtocolDistributed Program InterfaceStatus of this Memo   This RFC describes a protocol that International Business Machines   Corporation (IBM) has been implementing in most of its SNMP agents to   allow dynamic extension of supported MIBs.  This is an Experimental   Protocol for the Internet community.  Discussion and suggestions for   improvement are requested.  Please refer to the current edition of   the "IAB Official Protocol Standards" for the standardization state   and status of this protocol.  Distribution of this memo is unlimited.ABSTRACT   The Simple Network Management Protocol (SNMP) [1] Distributed Program   Interface (DPI) is an extension to SNMP agents that permits end-users   to dynamically add, delete or replace management variables in the   local Management Information Base without requiring recompilation of   the SNMP agent.  This is achieved by writing a so-called sub-agent   that communicates with the agent via the SNMP-DPI.   For the author of a sub-agent, the SNMP-DPI eliminates the need to   know the details of ASN.1 [2] or SNMP PDU (Protocol Data Unit)   encoding/decoding [1,3].   This protocol has been in use within IBM since 1989 and is included   in the SNMP agents for VM, MVS and OS/2.   Potentially useful sample sub-agent code and implementation examples   are available for anonymous FTP from the University of Toronto.MOTIVATION   The Simple Network Management Protocol [1] defines a protocol that   permits operations on a collection of variables.  This set of   variables is called the Management Information Base (MIB) and a core   set of variables has previously been defined [4,5]; however, the   design of the MIB makes provision for extension of this core set.   Thus, an enterprise or individual can define variables of their own   which represent information of use to them.  An example of aCarpenter & Wijnen                                              [Page 1]

RFC 1228                        SNMP-DPI                        May 1991   potentially interesting variable which is not in the core MIB would   be CPU utilization (percent busy).  Unfortunately, conventional SNMP   agent implementations provide no means for an end-user to make   available new variables.   The SNMP DPI addresses this issue by providing a light-weight   mechanism by which a process can register the existence of a MIB   variable with the SNMP agent.  When requests for the variable are   received by the SNMP agent, it will pass the query on to the process   acting as a sub-agent.  This sub-agent then returns an appropriate   answer to the SNMP agent.  The SNMP agent eventually packages an SNMP   response packet and sends the answer back to the remote network   management station that initiated the request.   None of the remote network management stations have any knowledge   that the SNMP agent calls on other processes to obtain an answer.  As   far as they can tell, there is only one network management   application running on the host.THEORY OF OPERATIONCONNECTION ESTABLISHMENT   Communication between the SNMP Agent and its clients (sub-agents)   takes place over a stream connection.  This is typically a TCP   connection, but other stream-oriented transport mechanisms can be   used.  As an example, the VM SNMP agent allows DPI connections over   IUCV (Inter-User Communications Vehicle) [6,7].  Other than the   connection establishment procedure, the protocol used is identical in   these environments.REGISTRATION   Regardless of the connection-oriented transport mechanism used, after   establishing a connection to the SNMP agent, the sub-agent registers   the set of variables it supports.  Finally, when all the variable   classes have been registered, the sub-agent then waits for requests   from the SNMP agent or generates traps as required.DPI ARCHITECTURE   There are three requests that can be initiated by the SNMP agent:   GET, GET-NEXT and SET.  These correspond directly to the three SNMP   requests that a network management station can make.  The sub-agent   responds to a request with a RESPONSE packet.   There are currently two requests that can be initiated by a sub-   agent: REGISTER and TRAP.Carpenter & Wijnen                                              [Page 2]

RFC 1228                        SNMP-DPI                        May 1991------------------------------------------------------------------------*---------------------------------*|  SNMP Network                   ||  Management Station             ||                                 ||---------------------------------||  SNMP Protocol                  |*---------------------------------*      A      | Get         A      |      | GetNext     |  GetResponse Trap |      | Set         |      |      V             |*---------------------------------*            *----------------------*|     SNMP Protocol               |            |   DPI Interface      ||---------------------------------|  Reply     |    *-----------------||                        |        |<-----------|    |                 ||     SNMP Agent         |        |            |    |   Client        ||     A      *-----------+->      | MIB query  |    |                 ||     |      | Get/Set   |        |----------->|    |     or          || Trap|      | info      |  SNMP  |            |    |                 ||-----+------+-------*   |        |  trap      |    |   SNMP          ||     |      V       |   |  DPI   |<-----------|    |   Sub-Agent     || TCP/IP layers,     |   |        |            |    |                 || Kernel             |   |        |<-----------|    |                 |*---------------------------------*  Register  *----------------------*------------------------------------------------------------------------Figure 1. SNMP DPI overviewRemarks for Figure 1:   o   The SNMP agent communicates with the SNMP manager via the       standard SNMP protocol.   o   The SNMP agent communicates with the TCP/IP layers and kernel       (operating system) in an implementation-dependent manner.  It       potentially implements the standard MIB view in this way.   o   An SNMP sub-agent, running as a separate process (potentially       even on another machine), can register objects with the SNMP       agent.   o   The SNMP agent will decode SNMP Packets.  If such a packet       contains a Get/GetNext or Set request for an object registered       by a sub-agent, it will send the request to the sub-agent via       the corresponding query packet.   o   The SNMP sub-agent sends responses back via a RESPONSE packet.   o   The SNMP agent then encodes the reply into an SNMP packet and       sends it back to the requesting SNMP manager.   o   If the sub-agent wants to report an important state change, itCarpenter & Wijnen                                              [Page 3]

RFC 1228                        SNMP-DPI                        May 1991       sends a TRAP packet to the SNMP agent, which will encode it       into an SNMP trap packet and send it to the manager(s).SNMP DPI PROTOCOL   This section describes the actual protocol used between the SNMP   agent and sub-agents.  This information has not previously been   published.CONNECTION ESTABLISHMENT   In a TCP/IP environment, the SNMP agent listens on an arbitrary TCP   port for a connection request from a sub-agent.  It is important to   realize that a well-known port is not used:  every invocation of the   SNMP agent will potentially result in a different TCP port being   used.   A sub-agent needs to determine this port number to establish a   connection.  The sub-agent learns the port number from the agent by   sending it one conventional SNMP get-request PDU.   The port number   is maintained by the SNMP agent as the object whose identifier is   1.3.6.1.4.1.2.2.1.1.0; this variable is registered under the IBM   enterprise-specific tree.  The SNMP agent replies with a conventional   SNMP response PDU that contains the port number to be used.  This   response is examined by the sub-agent and the port number is   extracted.  The sub-agent then establishes the connection to the   specified port.   On the surface, this procedure appears to mean that the sub-agent   must be able to create and parse SNMP packets, but this is not the   case.  The DPI Application Program Interface (API) has a library   routine, query_DPI_port(), which can be used to generate and parse   the required SNMP packets.  This routine is very small (under 100   lines of C), so it does not greatly increase the size of any sub-   agent).   For completeness, byte-by-byte descriptions of the packets generated   by the SNMP DPI API routine query_DPI_port() are provided below.   This is probably of little interest to most readers and reading the   source to query_DPI_port() provides much of the same information.SNMP PDU TO GET THE AGENT'S DPI PORT   As noted, before a TCP connection to the SNMP agent can be made, the   sub-agent must learn which TCP port that the agent is listening on.   To do so, it can issue an SNMP GET for an IBM enterprise-specific   variable 1.3.6.1.4.1.2.2.1.1.0.Carpenter & Wijnen                                              [Page 4]

RFC 1228                        SNMP-DPI                        May 1991   NOTE:  the object instance of ".0" is included for clarity in this   document.   The SNMP PDU can be constructed as shown below.  This PDU must be   sent to UDP port 161 on the host where the agent runs (probably the   same host where the sub-agent runs).Carpenter & Wijnen                                              [Page 5]

RFC 1228                        SNMP-DPI                        May 1991+----------------------------------------------------------------------+| Table 1. SNMP PDU for GET DPI_port.  This is the layout of an SNMP   ||          PDU for GET DPI_port                                        |+-----------------+-----------------+----------------------------------+| OFFSET          | VALUE           | FIELD                            |+-----------------+-----------------+----------------------------------+| 0               | 0x30            | ASN.1 header                     |+-----------------+-----------------+----------------------------------+| 1               | 34 + len        | pdu_length, see formula below    |+-----------------+-----------------+----------------------------------+| 2               | 0x02 0x01 0x00  | version (integer, length=1,      ||                 | 0x04            | value=0), community name         ||                 |                 | (string)                         |+-----------------+-----------------+----------------------------------+| 6               | len             | length of community name         |+-----------------+-----------------+----------------------------------+| 7               | community name  |                                  |+-----------------+-----------------+----------------------------------+| 7 + len         | 0xa0 0x1b       | SNMP GET request:                ||                 |                 | request_type=0xa0, length=0x1b   |+-----------------+-----------------+----------------------------------+| 7 + len + 2     | 0x02 0x01 0x01  | SNMP request ID: integer,        ||                 |                 | length=1, ID=1                   |+-----------------+-----------------+----------------------------------+| 7 + len + 5     | 0x02 0x01 0x00  | SNMP error status: integer,      ||                 |                 | length=1, error=0                |+-----------------+-----------------+----------------------------------+| 7 + len + 8     | 0x02 0x01 0x00  | SNMP index: integer, length=1,   ||                 |                 | index=0                          |+-----------------+-----------------+----------------------------------+| 7 + len + 11    | 0x30 0x10       | Varbind list, length=0x10        |+-----------------+-----------------+----------------------------------+| 7 + len + 13    | 0x30 0x0e       | Varbind, length=0x0e             |+-----------------+-----------------+----------------------------------+| 7 + len + 15    | 0x06 0x0a       | Object ID, length=0x0a           |+-----------------+-----------------+----------------------------------+| 7 + len + 17    | 0x2b 0x06 0x01  | Object instance:                 ||                 | 0x04 0x01 0x02  | 1.3.6.1.4.1.2.2.1.1.0            ||                 | 0x02 0x01 0x01  |                                  ||                 | 0x00            |                                  |+-----------------+-----------------+----------------------------------+| 7 + len + 27    | 0x05 0x00       | null value, length=0             |+-----------------+-----------------+----------------------------------++----------------------------------------------------------------------+The formula to calculate the length field "pdu_length" is as follows:  pdu_length =   length of version field and string tag (4 bytes)Carpenter & Wijnen                                              [Page 6]

RFC 1228                        SNMP-DPI                        May 1991             +   length of community length field (1 byte)             +   length of community name (depends...)             +   length of SNMP GET request (29 bytes)             =   34 + length of community nameCarpenter & Wijnen                                              [Page 7]

RFC 1228                        SNMP-DPI                        May 1991SNMP PDU CONTAINING THE RESPONSE TO THE GETAssuming that no errors occured, then the port is returned in the last 2octets of the received packet.  The format of the packet is shown below:+----------------------------------------------------------------------+| Table 2. SNMP RESPONSE PDU for GET of Agent's DPI port.  This is the ||          layout of an SNMP RESPONSE PDU for GET DPI_port             |+-----------------+-----------------+----------------------------------+| OFFSET          | VALUE           | FIELD                            |+-----------------+-----------------+----------------------------------+| 0               | 0x30            | ASN.1 header                     |+-----------------+-----------------+----------------------------------+| 1               | 36 + len        | length, see formula below        |+-----------------+-----------------+----------------------------------+| 2               | 0x02 0x01 0x00  | version (integer, length=1,      ||                 | 0x04            | value=0), community name         ||                 |                 | (string)                         |+-----------------+-----------------+----------------------------------+| 6               | len             | length of community name         |+-----------------+-----------------+----------------------------------+| 7               | community name  |                                  |+-----------------+-----------------+----------------------------------+| 7 + len         | 0xa2 0x1d       | SNMP RESPONSE:                   ||                 |                 | request_type=0xa2, length=0x1d   |+-----------------+-----------------+----------------------------------+| 7 + len + 2     | 0x02 0x01 0x01  | SNMP request ID: integer,        ||                 |                 | length=1, ID=1                   |+-----------------+-----------------+----------------------------------+| 7 + len + 5     | 0x02 0x01 0x00  | SNMP error status: integer,      ||                 |                 | length=1, error=0                |+-----------------+-----------------+----------------------------------+| 7 + len + 8     | 0x02 0x01 0x00  | SNMP index: integer, length=1,   ||                 |                 | index=0                          |+-----------------+-----------------+----------------------------------+| 7 + len + 11    | 0x30 0x12       | Varbind list, length=0x12        |+-----------------+-----------------+----------------------------------+| 7 + len + 13    | 0x30 0x10       | Varbind, length=0x10             |+-----------------+-----------------+----------------------------------+| 7 + len + 15    | 0x06 0x0a       | Object ID, length=0x0a           |+-----------------+-----------------+----------------------------------++----------------------------------------------------------------------+Carpenter & Wijnen                                              [Page 8]

RFC 1228                        SNMP-DPI                        May 1991+----------------------------------------------------------------------+| Table 2. SNMP RESPONSE PDU for GET of Agent's DPI port.  This is the ||          layout of an SNMP RESPONSE PDU for GET DPI_port             |+-----------------+-----------------+----------------------------------+| OFFSET          | VALUE           | FIELD                            |+-----------------+-----------------+----------------------------------+| 7 + len + 17    | 0x2b 0x06 0x01  | Object instance:                 ||                 | 0x04 0x01 0x02  | 1.3.6.1.4.1.2.2.1.1.0            ||                 | 0x02 0x01 0x01  |                                  ||                 | 0x00            |                                  |+-----------------+-----------------+----------------------------------+| 7 + len + 27    | 0x02 0x02       | integer, length=2                |+-----------------+-----------------+----------------------------------+| 7 + len + 29    | msb lsb         | port number (msb, lsb)           |+-----------------+-----------------+----------------------------------++----------------------------------------------------------------------+The formula to calculate the length field "pdu_length" is as follows:  pdu_length =   length of version field and string tag (4 bytes)             +   length of community length field (1 byte)             +   length of community name (depends...)             +   length of SNMP RESPONSE (31 bytes)             =   36 + length of community nameSNMP DPI PACKET FORMATS   Each request to or response from the agent is constructed as a   "packet" and is written to the stream.   Each packet is prefaced with the length of the data remaining in the   packet.  The length is stored in network byte order (most significant   byte first, least significant last).  The receiving side will read   the packet by doing something similar to:      unsigned char len_bfr[2];      char *bfr;      int len;      read(fd,len_bfr,2);      len = len_bfr[0] * 256 + len_bfr[1];      bfr = malloc(len);      read(fd,bfr,len);   NOTE:  the above example makes no provisions for error handling or a   read returning less than the requested amount of data.  This is not a   suggested coding style.Carpenter & Wijnen                                              [Page 9]

RFC 1228                        SNMP-DPI                        May 1991   The first part of every packet identifies the application protocol   being used, as well as some version information.  The protocol major   version is intended to indicate in broad terms what version of the   protocol is used.  The protocol minor version is intended to identify   major incompatible versions of the protocol.  The protocol release is   intended to indicate incremental modifications to the protocol.  The   constants that are valid for these fields are defined in Table 10 on   page 18.   The next (common) field in all packets is the packet type.  This   field indicates what kind of packet we're dealing with (SNMP DPI GET,   GET-NEXT, SET, TRAP, RESPONSE or REGISTER).  The permitted values for   this field are defined in Table 11 on page 18.+----------------------------------------------------------------------+| Table 3. SNMP DPI packet header.  This header is present in all      ||          packets.                                                    |+-------------+--------------------------------------------------------+| OFFSET      | FIELD                                                  |+-------------+--------------------------------------------------------+| 0           | packet length to follow (MSB)                          |+-------------+--------------------------------------------------------+| 1           | packet length to follow (LSB)                          |+-------------+--------------------------------------------------------+| 2           | protocol major version                                 |+-------------+--------------------------------------------------------+| 3           | protocol minor version                                 |+-------------+--------------------------------------------------------+| 4           | protocol release                                       |+-------------+--------------------------------------------------------+| 5           | packet type                                            |+-------------+--------------------------------------------------------++----------------------------------------------------------------------+>From this point onwards, the contents of the packet are defined by theprotocol being used.  The remainder of this section describes:   o   the structure of packets for the SNMP DPI protocol, version 1.0.   o   The constants as defined with this version of the protocol.Carpenter & Wijnen                                             [Page 10]

RFC 1228                        SNMP-DPI                        May 1991REGISTER   In order to register a branch in the MIB tree, an SNMP sub-agent   sends an SNMP DPI REGISTER packet to the agent.   Such a packet contains the standard SNMP DPI header plus REGISTER-   specific data, which basically is a null terminated string   representing the object ID in dotted ASN.1 notation (with a trailing   dot!).+----------------------------------------------------------------------+| Table 4. SNMP DPI REGISTER packet.  This is the layout of an SNMP    ||          DPI REGISTER packet                                         |+-------------+--------------------------------------------------------+| OFFSET      | FIELD                                                  |+-------------+--------------------------------------------------------+| 0           | packet length to follow (MSB)                          |+-------------+--------------------------------------------------------+| 1           | packet length to follow (LSB)                          |+-------------+--------------------------------------------------------+| 2           | protocol major version                                 |+-------------+--------------------------------------------------------+| 3           | protocol minor version                                 |+-------------+--------------------------------------------------------+| 4           | protocol release                                       |+-------------+--------------------------------------------------------+| 5           | packet type = SNMP_DPI_REGISTER                        |+-------------+--------------------------------------------------------+| 6           | null terminated object ID                              |+-------------+--------------------------------------------------------++----------------------------------------------------------------------+Carpenter & Wijnen                                             [Page 11]

RFC 1228                        SNMP-DPI                        May 1991GET   When the SNMP agent receives a PDU containing an SNMP GET request for   a variable that a sub-agent registered with the agent, it passes an   SNMP DPI GET packet to the sub-agent.   Such a packet contains the standard SNMP DPI header plus GET-specific   data, which is basically a null terminated string representing the   object ID in dotted ASN.1 notation.+----------------------------------------------------------------------+| Table 5. SNMP DPI GET packet.  This is the layout of an SNMP DPI GET ||          packet                                                      |+-------------+--------------------------------------------------------+| OFFSET      | FIELD                                                  |+-------------+--------------------------------------------------------+| 0           | packet length to follow (MSB)                          |+-------------+--------------------------------------------------------+| 1           | packet length to follow (LSB)                          |+-------------+--------------------------------------------------------+| 2           | protocol major version                                 |+-------------+--------------------------------------------------------+| 3           | protocol minor version                                 |+-------------+--------------------------------------------------------+| 4           | protocol release                                       |+-------------+--------------------------------------------------------+| 5           | packet type = SNMP_DPI_GET                             |+-------------+--------------------------------------------------------+| 6           | null terminated object ID                              |+-------------+--------------------------------------------------------++----------------------------------------------------------------------+Carpenter & Wijnen                                             [Page 12]

RFC 1228                        SNMP-DPI                        May 1991GET-NEXT   When the SNMP agent receives a PDU containing an SNMP GET-NEXT   request for a variable for which a sub-agent may be authoritative, it   passes an SNMP DPI GET-NEXT packet to the sub-agent.   Such a packet contains the standard SNMP DPI header plus GET-NEXT-   specific data.  These data take the form of two null terminated   strings.  The first string represents the object ID in dotted ASN.1   notation; the second string represents the group ID in dotted ASN.1   notation.+----------------------------------------------------------------------+| Table 6. SNMP DPI GET NEXT packet.  This is the layout of an SNMP    ||          DPI GET NEXT packet                                         |+-------------+--------------------------------------------------------+| OFFSET      | FIELD                                                  |+-------------+--------------------------------------------------------+| 0           | packet length to follow (MSB)                          |+-------------+--------------------------------------------------------+| 1           | packet length to follow (LSB)                          |+-------------+--------------------------------------------------------+| 2           | protocol major version                                 |+-------------+--------------------------------------------------------+| 3           | protocol minor version                                 |+-------------+--------------------------------------------------------+| 4           | protocol release                                       |+-------------+--------------------------------------------------------+| 5           | packet type = SNMP_DPI_GET_NEXT                        |+-------------+--------------------------------------------------------+| 6           | null terminated object ID                              |+-------------+--------------------------------------------------------+| 6 + len     | null terminated group ID                               |+-------------+--------------------------------------------------------+| NOTE:  len=strlen(object ID)+1                                       |+----------------------------------------------------------------------++----------------------------------------------------------------------+Carpenter & Wijnen                                             [Page 13]

RFC 1228                        SNMP-DPI                        May 1991SET   When the SNMP agent receives a PDU containing an SNMP SET request for   a variable that a sub-agent registered with the agent, it passes an   SNMP DPI SET packet to the sub-agent.   Such a packet contains the standard SNMP DPI header plus SET specific   data, which is basically a null terminated string representing the   object ID in ASN.1 notation, with the type, value length and value to   be set.  The permitted types for the type field are defined in Table   12 on page 19.  Integer values are sent as 4-byte elements in network   byte order (most significant byte first, least significant byte   last).+----------------------------------------------------------------------+| Table 7. SNMP DPI SET packet.  This is the layout of an SNMP DPI SET ||          packet                                                      |+-------------+--------------------------------------------------------+| OFFSET      | FIELD                                                  |+-------------+--------------------------------------------------------+| 0           | packet length to follow (MSB)                          |+-------------+--------------------------------------------------------+| 1           | packet length to follow (LSB)                          |+-------------+--------------------------------------------------------+| 2           | protocol major version                                 |+-------------+--------------------------------------------------------+| 3           | protocol minor version                                 |+-------------+--------------------------------------------------------+| 4           | protocol release                                       |+-------------+--------------------------------------------------------+| 5           | packet type = SNMP_DPI_SET                             |+-------------+--------------------------------------------------------+| 6           | null terminated object ID                              |+-------------+--------------------------------------------------------+| 6 + len     | SNMP Variable Type Value                               |+-------------+--------------------------------------------------------+| 6 + len + 1 | Length of value (MSB)                                  |+-------------+--------------------------------------------------------+| 6 + len + 2 | Length of value (LSB)                                  |+-------------+--------------------------------------------------------+| 6 + len + 3 | Value                                                  |+-------------+--------------------------------------------------------+| NOTE:  len=strlen(object ID)+1                                       |+----------------------------------------------------------------------++----------------------------------------------------------------------+Carpenter & Wijnen                                             [Page 14]

RFC 1228                        SNMP-DPI                        May 1991RESPONSE   An SNMP sub-agent must respond to a GET, GET_NEXT or SET request that   it has received from the agent (unless it fails or has a bug).  To do   so, it sends an SNMP DPI RESPONSE packet to the agent.   Such a packet contains the standard SNMP DPI header plus RESPONSE   specific data, which basically is an error_code plus (if there was no   error), the name/type/value tuple representing the returned object.   This is described as by a string representing the object ID in ASN.1   notation, plus the type, value length and value of the object that   was manipulated.  The permitted types for the type field are defined   in Table 12 on page 19.  Integer values are sent as 4-byte elements   in network byte order (most significant byte first, least significant   byte last).Carpenter & Wijnen                                             [Page 15]

RFC 1228                        SNMP-DPI                        May 1991+----------------------------------------------------------------------+| Table 8. SNMP DPI RESPONSE packet.  This is the layout of an SNMP    ||          DPI RESPONSE packet                                         |+-------------+--------------------------------------------------------+| OFFSET      | FIELD                                                  |+-------------+--------------------------------------------------------+| 0           | packet length to follow (MSB)                          |+-------------+--------------------------------------------------------+| 1           | packet length to follow (LSB)                          |+-------------+--------------------------------------------------------+| 2           | protocol major version                                 |+-------------+--------------------------------------------------------+| 3           | protocol minor version                                 |+-------------+--------------------------------------------------------+| 4           | protocol release                                       |+-------------+--------------------------------------------------------+| 5           | packet type = SNMP_DPI_RESPONSE                        |+-------------+--------------------------------------------------------+| 6           | SNMP error code                                        |+-------------+--------------------------------------------------------+| 7           | null terminated object ID                              |+-------------+--------------------------------------------------------+| 7 + len     | SNMP Variable Type Value                               |+-------------+--------------------------------------------------------+| 7 + len + 1 | Length of value (MSB)                                  |+-------------+--------------------------------------------------------+| 7 + len + 2 | Length of value (LSB)                                  |+-------------+--------------------------------------------------------+| 7 + len + 3 | Value                                                  |+-------------+--------------------------------------------------------+| NOTE:  len=strlen(object ID)+1                                       |+----------------------------------------------------------------------++----------------------------------------------------------------------+TRAP   An SNMP sub-agent can request the agent to generate a TRAP by sending   an SNMP DPI TRAP packet to the agent.   Such a packet contains the standard SNMP DPI header plus TRAP   specific data, which is basically the generic and specific trap code,   plus a name/type/value tuple.  The tuple is described by a string   representing the object ID in ASN.1 notation, plus the type, value   length and value of the object that is being sent in the trap.  The   permitted types for the type field are defined in Table 12 on page   19.  Integer values are sent as 4-byte elements in network byte order   (most significant byte first, least significant byte last).Carpenter & Wijnen                                             [Page 16]

RFC 1228                        SNMP-DPI                        May 1991+----------------------------------------------------------------------+| Table 9. SNMP DPI TRAP packet.  This is the layout of an SNMP DPI    ||          TRAP packet                                                 |+-------------+--------------------------------------------------------+| OFFSET      | FIELD                                                  |+-------------+--------------------------------------------------------+| 0           | packet length to follow (MSB)                          |+-------------+--------------------------------------------------------+| 1           | packet length to follow (LSB)                          |+-------------+--------------------------------------------------------+| 2           | protocol major version                                 |+-------------+--------------------------------------------------------+| 3           | protocol minor version                                 |+-------------+--------------------------------------------------------+| 4           | protocol release                                       |+-------------+--------------------------------------------------------+| 5           | packet type - SNMP_DPI_TRAP                            |+-------------+--------------------------------------------------------+| 6           | SNMP generic trap code                                 |+-------------+--------------------------------------------------------+| 7           | SNMP specific trap code                                |+-------------+--------------------------------------------------------+| 8           | null terminated object ID                              |+-------------+--------------------------------------------------------+| 8 + len     | SNMP Variable Type Value                               |+-------------+--------------------------------------------------------+| 8 + len + 1 | Length of value (MSB)                                  |+-------------+--------------------------------------------------------+| 8 + len + 2 | Length of value (LSB)                                  |+-------------+--------------------------------------------------------+| 8 + len + 3 | Value                                                  |+-------------+--------------------------------------------------------+| NOTE:  len=strlen(object ID)+1                                       |+----------------------------------------------------------------------++----------------------------------------------------------------------+Carpenter & Wijnen                                             [Page 17]

RFC 1228                        SNMP-DPI                        May 1991CONSTANTS AND VALUES   This section describes the constants that have been defined for this   version of the SNMP DPI Protocol.PROTOCOL VERSION AND RELEASE VALUES+----------------------------------------------------------------------+| Table 10. Protocol version and release values                        |+-----------------------------------+----------------------------------+| FIELD                             | VALUE                            |+-----------------------------------+----------------------------------+| protocol major version            | 2 (SNMP DPI protocol)            |+-----------------------------------+----------------------------------+| protocol minor version            | 1 (version 1)                    |+-----------------------------------+----------------------------------+| protocol release                  | 0 (release 0)                    |+-----------------------------------+----------------------------------++----------------------------------------------------------------------+Any other values are currently undefined.PACKET TYPE VALUES   The packet type field can have the following values:+----------------------------------------------------------------------+| Table 11. Valid values for the packet type field                     |+-------+--------------------------------------------------------------+| VALUE | PACKET TYPE                                                  |+-------+--------------------------------------------------------------+| 1     | SNMP_DPI_GET                                                 |+-------+--------------------------------------------------------------+| 2     | SNMP_DPI_GET_NEXT                                            |+-------+--------------------------------------------------------------+| 3     | SNMP_DPI_SET                                                 |+-------+--------------------------------------------------------------+| 4     | SNMP_DPI_TRAP                                                |+-------+--------------------------------------------------------------+| 5     | SNMP_DPI_RESPONSE                                            |+-------+--------------------------------------------------------------+| 6     | SNMP_DPI_REGISTER                                            |+-------+--------------------------------------------------------------++----------------------------------------------------------------------+Carpenter & Wijnen                                             [Page 18]

RFC 1228                        SNMP-DPI                        May 1991VARIABLE TYPE VALUES   The variable type field can have the following values:+----------------------------------------------------------------------+| Table 12. Valid values for the Value Type field                      |+-------+--------------------------------------------------------------+| VALUE | VALUE TYPE                                                   |+-------+--------------------------------------------------------------+| 0     | text representation                                          |+-------+--------------------------------------------------------------+| 129   | number (integer)                                             |+-------+--------------------------------------------------------------+| 2     | octet string                                                 |+-------+--------------------------------------------------------------+| 3     | object identifier                                            |+-------+--------------------------------------------------------------+| 4     | empty (no value)                                             |+-------+--------------------------------------------------------------+| 133   | internet address                                             |+-------+--------------------------------------------------------------+| 134   | counter (unsigned)                                           |+-------+--------------------------------------------------------------+| 135   | gauge (unsigned)                                             |+-------+--------------------------------------------------------------+| 136   | time ticks (1/100ths seconds)                                |+-------+--------------------------------------------------------------+| 9     | display string                                               |+-------+--------------------------------------------------------------++----------------------------------------------------------------------+   NOTE:  Fields which represent values that are stored as a 4-byte   integer are indicated by ORing their base type value with 128.Error Code Values for SNMP Agent Detected Errors   The error code can have one of the following values:Carpenter & Wijnen                                             [Page 19]

RFC 1228                        SNMP-DPI                        May 1991+----------------------------------------------------------------------+| Table 13. Valid values for the SNMP Agent Minor Error Code field     |+-------+--------------------------------------------------------------+| VALUE | SNMP AGENT ERROR CODE                                        |+-------+--------------------------------------------------------------+| 0     | no error                                                     |+-------+--------------------------------------------------------------+| 1     | too big                                                      |+-------+--------------------------------------------------------------+| 2     | no such name                                                 |+-------+--------------------------------------------------------------+| 3     | bad value                                                    |+-------+--------------------------------------------------------------+| 4     | read only                                                    |+-------+--------------------------------------------------------------+| 5     | general error                                                |+-------+--------------------------------------------------------------++----------------------------------------------------------------------+SNMP DPI APPLICATION PROGRAM INTERFACE   This section documents an API that implements the SNMP DPI.  This   information has been previously published [6,8], but the information   provided below is more current as of May 14, 1991.OVERVIEW OF REQUEST PROCESSINGGET PROCESSING   A GET request is the easiest to process.  When the DPI packet is   parsed, the parse tree holds the object ID of the variable being   requested.   If the specified object is not supported by the sub-agent, it would   return an error indication of "no such name".  No name/type/value   information would be returned.        unsigned char *cp;        cp = mkDPIresponse(SNMP_NO_SUCH_NAME,0);   If the object is recognized, then the sub-agent creates a parse tree   representing the name/type/value of the object in question (using the   DPI API routine mkDPIset()), and returns no error indication.  This   is demonstrated below (a string is being returned).Carpenter & Wijnen                                             [Page 20]

RFC 1228                        SNMP-DPI                        May 1991        char *obj_id;        unsigned char *cp;        struct dpi_set_packet *ret_value;        char *data;        /* obj_id = object ID of variable, like 1.3.6.1.2.1.1.1 */        /* should be identical to object ID sent in get request */        data = "a string to be returned";        ret_value = mkDPIset(obj_id,SNMP_TYPE_STRING,                        strlen(data)+1,data);        cp = mkDPIresponse(0,ret_value);SET PROCESSING   Processing a SET request is only slightly more difficult than a GET   request.  In this case, additional information is made available in   the parse tree, namely the type, length and value to be set.   The sub-agent may return an error indication of "no such name" if the   variable is unrecognized, just as in a GET request.  If the variable   is recognized, but cannot be set, an error indication of "no such   name" should be also be returned, although it is tempting to return a   "read only" error.GET NEXT PROCESSING   GET-NEXT requests are the most complicated requests to process.   After parsing a GET-NEXT request, the parse tree will contain two   parameters.  One is the object ID on which the GET-NEXT operation is   being performed.  The semantics of the operation are that the sub-   agent is to return the name/type/value of the next variable it   supports whose name lexicographically follows the passed object ID.   It is important to realize that a given sub-agent may support several   discontiguous sections of the MIB tree.  In such a situation it would   be incorrect to jump from one section to another.  This problem is   correctly handled by examining the second parameter which is passed.   This parameter represents the "reason" why the sub-agent is being   called.  It holds the prefix of the tree that the sub-agent had   indicated it supported.   If the next variable supported by the sub-agent does not begin with   that prefix, the sub-agent must return an error indication of "no   such name".  If required, the SNMP agent will call upon the sub-agent   again, but pass it a different group prefix.  This is illustrated in   the discussion below:Carpenter & Wijnen                                             [Page 21]

RFC 1228                        SNMP-DPI                        May 1991   Assume there are two sub-agents.  The first sub-agent registers two   distinct sections of the tree, A and C.  In reality, the sub-agent   supports variables A.1 and A.2, but it correctly registers the   minimal prefix required to uniquely identify the variable class it   supports.   The second sub-agent registers a different section, B, which appears   between the two sections registered by the first agent.   If a remote management station begins dumping the MIB, starting from   A, the following sequence of queries would be performed:     Sub-agent 1 gets called:            get-next(A,A) == A.1            get-next(A.1,A) = A.2            get-next(A.2,A) = error(no such name)     Sub-agent 2 is then called:            get-next(A.2,B) = B.1            get-next(B.1,B) = error(no such name)     Sub-agent 1 gets called again:            get-next(B.1,C) = C.1REGISTER REQUESTS   A sub-agent must register the variables it supports with the SNMP   agent.  The appropriate packets may be created using the DPI API   library routine mkDPIregister().         unsigned char *cp;         cp = mkDPIregister("1.3.6.1.2.1.1.2.");NOTE:  object IDs are registered with a trailing dot (".").TRAP REQUESTS   A sub-agent can request that the SNMP agent generate a trap for it.   The sub-agent must provide the desired values for the generic and   specific parameters of the trap.  It may optionally provide a   name/type/value parameter that will be included in the trap packet.   The DPI API library routine mkDPItrap() can be used to generate the   required packet.Carpenter & Wijnen                                             [Page 22]

RFC 1228                        SNMP-DPI                        May 1991DPI API LIBRARY ROUTINES   This section documents Application Program Interfaces to the DPI.   QUERY_DPI_PORT()     int port;     char *hostname, *community_name;     port = query_DPI_port(hostname, community_name);   The query_DPI_port() function is used by a DPI client to determine   what TCP port number is associated with the DPI.  This port number is   needed to connect() to the SNMP agent.  If the port cannot be   determined, -1 is returned.   The function is passed two arguments:  a string representing the   host's name or IP address and the community name to be used when   making the request.   This function enables a DPI client to "bootstrap" itself.  The port   number is obtained via an SNMP GET request, but the DPI client does   not have to be able to create and parse SNMP packets--this is all   done by the query_DPI_port() function.   NOTE:  the query_DPI_port() function assumes that the community name   does not contain any null characters.  If this is not the case, use   the _query_DPI_port() function which takes a third parameter, the   length of the community name.MKDPIREGISTER     #include "snmp_dpi.h"     unsigned char *packet;     int len;     /* register sysDescr variable */     packet = mkDPIregister("1.3.6.1.2.1.1.1.");     len = *packet * 256 + *(packet + 1);     len += 2;  /* include length bytes */   The mkDPIregister() function creates the necessary register-request   packet and returns a pointer to a static buffer holding the packet   contents.  The null pointer (0) is returned if there is an error   detected during the creation of the packet.Carpenter & Wijnen                                             [Page 23]

RFC 1228                        SNMP-DPI                        May 1991   The length of the remainder packet is stored in the first two bytes   of the packet, as demonstrated in the example above.   NOTE:  object identifiers are registered with a trailing dot (".").MKDPISET     #include "snmp_dpi.h"     struct dpi_set_packet *set_value;     char *obj_id;     int type, length;     char *value;     set_value = mkDPIset(obj_id, type, length, value);   The mkDPIset() function can be used to create the portion of a parse   tree that represents a name/value pair (as would be normally be   returned in a response packet).  It returns a pointer to a   dynamically allocated parse tree representing the name/type/value   information.  If there is an error detected while creating the parse   tree, the null pointer (0) is returned.   The value of type can be one of the following (which are defined in   the include file "snmp_dpi.h"):      o   SNMP_TYPE_NUMBER      o   SNMP_TYPE_STRING      o   SNMP_TYPE_OBJECT      o   SNMP_TYPE_INTERNET      o   SNMP_TYPE_COUNTER      o   SNMP_TYPE_GAUGE      o   SNMP_TYPE_TICKS   The value parameter is always a pointer to the first byte of the   object's value.   NOTE:  the parse tree is dynamically allocated and copies are made of   the passed parameters.  After a successful call to mkDPIset(), they   can be disposed of in any manner the application chooses without   affecting the parse tree contents.MKDPIRESPONSE     #include "snmp_dpi.h"     unsigned char *packet;Carpenter & Wijnen                                             [Page 24]

RFC 1228                        SNMP-DPI                        May 1991     int error_code;     struct dpi_set_packet *ret_value;     packet = mkDPIresponse(error_code, ret_value);     len = *packet * 256 + *(packet + 1);     len += 2;  /* include length bytes */   The mkDPIresponse() function creates an appropriate response packet.   It takes two parameters.  The first is the error code to be returned.   It may be 0 (indicating no error) or one of the following (which are   defined in the include file "snmp_dpi.h"):      o   SNMP_NO_ERROR      o   SNMP_TOO_BIG      o   SNMP_NO_SUCH_NAME      o   SNMP_BAD_VALUE      o   SNMP_READ_ONLY      o   SNMP_GEN_ERR   If the error code indicates no error, then the second parameter is a   pointer to a parse tree (created by mkDPIset()) which represents the   name/type/value information being returned.  If an error is   indicated, the second parameter is passed as a null pointer (0).   If the packet can be created, a pointer to a static buffer containing   the packet contents is returned.  This is the same buffer used by   mkDPIregister().  If an error is encountered while creating the   packet, the null pointer (0) is returned.   The length of the remainder packet is stored in the first two bytes   of the packet, as demonstrated in the example above.   NOTE:  mkDPIresponse() always frees the passed parse tree.MKDPITRAP     #include "snmp_dpi.h"     unsigned char *packet;     int generic, specific;     struct dpi_set_packet *ret_value;     packet = mkDPItrap(generic, specific, ret_value);     len = *packet * 256 + *(packet + 1);     len += 2;  /* include length bytes */Carpenter & Wijnen                                             [Page 25]

RFC 1228                        SNMP-DPI                        May 1991   The mkDPItrap() function creates an appropriate trap request packet.   The first two parameters correspond to to value of the generic and   specific fields in the SNMP trap packet.  The third field can be used   to pass a name/value pair to be provided in the SNMP trap packet.   This information is passed as the set-packet portion of the parse   tree.  As an example, a linkDown trap for interface 3 might be   generated by the following:     struct dpi_set_packet *if_index_value;     unsigned long data;     unsigned char *packet;     int len;     data = 3;  /* interface number = 3 */     if_index_value = mkDPIset("1.3.6.1.2.1.2.2.1.1", SNMP_TYPE_NUMBER,             sizeof(unsigned long), &data);     packet = mkDPItrap(2, 0, if_index_value);     len = *packet * 256 + *(packet + 1);     len += 2;  /* include length bytes */     write(fd,packet,len);   If the packet can be created, a pointer to a static buffer containing   the packet contents is returned.  This is the same buffer used by   mkDPIregister().  If an error is encountered while creating the   packet, the null pointer (0) is returned.   The length of the remainder packet is stored in the first two bytes   of the packet, as demonstrated in the example above.   NOTE:  mkDPItrap() always frees the passed parse tree.PDPIPACKET     #include "snmp_dpi.h"     unsigned char *packet;     struct snmp_dpi_hdr *hdr;     hdr = pDPIpacket(packet)   The pDPIpacket() function parses a DPI packet and returns a parse   tree representing its contents.  The parse tree is dynamically   allocated and contains copies of the information within the DPI   packet.  After a successful call to pDPIpacket(), the packet may be   disposed of in any manner the application chooses without affecting   the contents of the parse tree.  If an error is encountered during   the parse, the null pointer (0) is returned.Carpenter & Wijnen                                             [Page 26]

RFC 1228                        SNMP-DPI                        May 1991   NOTE:  the relevant parse tree structures are defined in the include   file "snmp_dpi.h", and that file remains the definitive reference.   The root of the parse tree is represented by a snmp_dpi_hdr   structure:     struct snmp_dpi_hdr {         unsigned char  proto_major;         unsigned char  proto_minor;         unsigned char  proto_release;         unsigned char  packet_type;         union {              struct dpi_get_packet    *dpi_get;              struct dpi_next_packet   *dpi_next;              struct dpi_set_packet    *dpi_set;              struct dpi_resp_packet   *dpi_response;              struct dpi_trap_packet   *dpi_trap;         } packet_body;     };   The field of immediate interest is packet_type.  This field can have   one of the following values (which are defined in the include file   "snmp_dpi.h"):      o   SNMP_DPI_GET      o   SNMP_DPI_GET_NEXT      o   SNMP_DPI_SET   The packet_type field indicates what request is being made of the DPI   client.  For each of these requests, the remainder of the packet_body   will be different.   If a get request is indicated, the object ID of the desired variable   is passed in a dpi_get_packet structure:     struct dpi_get_packet {         char *object_id;     };   A get-next request is similar, but the dpi_next_packet structure also   contains the object ID prefix of the group that is currently being   traversed:     struct dpi_next_packet {         char *object_id;         char *group_id;     };Carpenter & Wijnen                                             [Page 27]

RFC 1228                        SNMP-DPI                        May 1991   If the next object whose object ID lexicographically follows the   object ID indicated by object_id does not begin with the suffix   indicated by group_id, the DPI client must return an error indication   of SNMP_NO_SUCH_NAME.   A set request has the most amount of data associated with it and this   is contained in a dpi_set_packet structure:     struct dpi_set_packet {         char      *object_id;         unsigned char  type;         unsigned short value_len;         char      *value;     };   The object ID of the variable to be modified is indicated by   object_id The type of the variable is provided in type and may have   one of the following values:      o   SNMP_TYPE_NUMBER      o   SNMP_TYPE_STRING      o   SNMP_TYPE_OBJECT      o   SNMP_TYPE_EMPTY      o   SNMP_TYPE_INTERNET      o   SNMP_TYPE_COUNTER      o   SNMP_TYPE_GAUGE      o   SNMP_TYPE_TICKS   The length of the value to be set is stored in value_len and value   contains a pointer to the value.   NOTE:  the storage pointed to by value will be reclaimed when the   parse tree is freed.  The DPI client must make provision for copying   the value contents.FDPIPARSE     #include "snmp_dpi.h"     struct snmp_dpi_hdr *hdr;     fDPIparse(hdr);   The routine fDPIparse() frees a parse tree previously created by a   call to pDPIpacket This routine is declared as void--it has no return   value.   NOTE:  after calling fDPIparse(), no further references to the parseCarpenter & Wijnen                                             [Page 28]

RFC 1228                        SNMP-DPI                        May 1991   tree can be made.AGENT IMPLEMENTATION ISSUES   Although the SNMP DPI protocol is completely documented in this   paper, the document itself is somewhat biased towards clearly   defining the interface provided to sub-agents (i.e., it provides a   specification of a C language API).  This detailed coverage is   possible because the client side of the interface is completely   self-contained.   The agent side of the interface has to be integrated into individual   vendor implementations, many of which may have a unique   organizational structure in an attempt to address various performance   and storage constraints.  This makes it infeasible to provide much   more than suggestions for SNMP agent implementers.  Unfortunately,   this leaves room for a large amount of interpretation which can lead   to implementations that don't necessarily work they way they should-   -too much ambiguity can be a bad thing.   The following characteristics of an agent implementation are to be   considered mandatory:DUPLICATE REGISTRATIONS   With this release of the protocol, order of registration is   significant.  The last sub-agent to register a variable is the one   that is deemed to be authoritative.  Variables implemented by the   base SNMP agent are considered to have been registered prior to any   sub-agent registrations.  Thus sub-agents may re-implement support   for variables that were incorrectly implemented by a vendor.AUTOMATIC DEREGISTRATION ON CLOSE   All SNMP DPI connections are carried over a stream connection.  When   the connection is closed by the client (no matter what the cause),   the agent must automatically unregister all of the variables that   were registered by the sub-agent.TIMELY RESPONSE CONSTRAINTS   A sub-agent must respond to a request in a timely fashion.  In this   version of the protocol, we specify that a sub-agent must respond to   a request by the SNMP agent within 5 seconds.  If the sub-agent does   not respond in time, the SNMP agent should terminate the connection   and unregister all of the variables that were previously registered   by the sub-agent in question.Carpenter & Wijnen                                             [Page 29]

RFC 1228                        SNMP-DPI                        May 1991   NOTE:  agent implementations that do not have access to a timer may   not be able to implement this.  In that case, they leave themselves   open to being placed in a state where they are blocked forever if the   sub-agent malfunctions.SUPPORT FOR MULTIPLE MIB VIEWS   Some agents allow different MIB views to be selected based on the   community name used.  It is not the intention of this document to   pass judgement on the various approaches that have been proposed or   implemented, but instead merely to recognize the existence of   implementations that support this feature.   The point of this discussion is to specify clearly that objects   supported by an SNMP DPI sub-agent are to be registered under the MIB   view that was selected by the community name used in the SNMP GET   request that obtained the DPI_port value.   The SNMP DPI does not specify a reserved port, but instead sub-agents   bootstrap themselves by making an SNMP GET request for the DPI_port   variable.  This variable represents the TCP port to which the sub-   agent should connect.  It should be understood that there is no   reason why the SNMP agent cannot have several listens (passive opens)   active, each corresponding to a distinct MIB view.  The port number   returned then would be different based on the community name used in   the SNMP GET request for the DPI_port variable.CONSIDERATIONS FOR THE NEXT RELEASE   The SNMP DPI protocol makes provision for extension and parallel use   of potentially incompatible releases.  The discussion above documents   the protocol as it is currently in use and has not discussed features   of interest that should be considered for a future revision.UNREGISTER   For closure, an UNREGISTER request could be of use.SUPPORT FOR ATOMIC SETS   The SNMP protocol [1] specifies that:      Each variable assignment specified by the SetRequest-PDU should be      effected as if simultaneously set with respect to all other      assignments specified in the same message.   The SNMP DPI has no provision for backing out a successfully   processed SET request if one of the subsequent variable assignmentsCarpenter & Wijnen                                             [Page 30]

RFC 1228                        SNMP-DPI                        May 1991   fails.  This omission is a reflection of several biases:   o   the SNMP DPI was intended to be light-weight.   o   a belief that the SNMP RFC prescribes semantics which are infeasible       to implement unless the range of applications is restricted.   It has been suggested that a new request, TEST_SET, be added to the   DPI protocol.  Processing of a SET request would then be performed as   follows:   o   all variables would be processed using TEST_SET unless any error       occurred.  The subagents would verify that they could process the       request.   o   if no error occurred, each of the variables would be reprocessed,       this time with a SET request.   A problem with such an approach is that it relies on the TEST_SET   operation to make an assertion that the request can be successfully   performed.  If this is not possible, then it cannot be asserted that   the prescribed semantics will be provided.  Such situations do exist,   for example, a SET request that causes the far-end channel service   unit to be looped up--one does not know if the operation will be   successful until it is performed.SAMPLE SNMP DPI API IMPLEMENTATION   The following C language sources show an example implementation of   the SNMP DPI Application Programming Interface as it would be exposed   to the sub-agents.SAMPLE SNMP DPI INCLUDE FILE  /* SNMP distributed program interface */  #define SNMP_DPI_GET            1  #define SNMP_DPI_GET_NEXT       2  #define SNMP_DPI_SET            3  #define SNMP_DPI_TRAP           4  #define SNMP_DPI_RESPONSE       5  #define SNMP_DPI_REGISTER       6  #define SNMP_DPI_PROTOCOL       2  #define SNMP_DPI_VERSION        1  #define SNMP_DPI_RELEASE        0  /* SNMP error codes fromRFC 1098 (1067) */Carpenter & Wijnen                                             [Page 31]

RFC 1228                        SNMP-DPI                        May 1991  #define SNMP_NO_ERROR           0  #define SNMP_TOO_BIG            1  #define SNMP_NO_SUCH_NAME       2  #define SNMP_BAD_VALUE          3  #define SNMP_READ_ONLY          4  #define SNMP_GEN_ERR            5  /* variable types */  #define SNMP_TYPE_TEXT          0       /* textual representation */  #define SNMP_TYPE_NUMBER        (128|1) /* number */  #define SNMP_TYPE_STRING        2       /* text string */  #define SNMP_TYPE_OBJECT        3       /* object identifier */  #define SNMP_TYPE_EMPTY         4       /* no value */  #define SNMP_TYPE_INTERNET      (128|5) /* internet address */  #define SNMP_TYPE_COUNTER       (128|6) /* counter */  #define SNMP_TYPE_GAUGE         (128|7) /* gauge */  #define SNMP_TYPE_TICKS         (128|8) /* time ticks (1/100th sec) */  #define SNMP_TYPE_MASK          0x7f    /* mask for type */  struct dpi_get_packet {          char    *object_id;  };  struct dpi_next_packet {          char    *object_id;          char    *group_id;  };  struct dpi_set_packet {          char            *object_id;          unsigned char   type;          unsigned short  value_len;          char            *value;  };  struct dpi_resp_packet {          unsigned char   ret_code;          struct dpi_set_packet   *ret_data;  };  struct dpi_trap_packet {          unsigned char   generic;          unsigned char   specific;          struct dpi_set_packet   *info;  };  struct snmp_dpi_hdr {Carpenter & Wijnen                                             [Page 32]

RFC 1228                        SNMP-DPI                        May 1991          unsigned char   proto_major;          unsigned char   proto_minor;          unsigned char   proto_release;          unsigned char   packet_type;          union {                  struct dpi_get_packet   *dpi_get;                  struct dpi_next_packet  *dpi_next;                  struct dpi_set_packet   *dpi_set;                  struct dpi_resp_packet  *dpi_response;                  struct dpi_trap_packet  *dpi_trap;          } packet_body;  };  extern struct snmp_dpi_hdr *pDPIpacket();  extern void fDPIparse();  extern unsigned char *mkMIBquery();  extern unsigned char *mkDPIregister();  extern unsigned char *mkDPIresponse();  extern unsigned char *mkDPItrap();  extern struct dpi_set_packet *mkDPIset();SAMPLE QUERY_DPI_PORT() FUNCTION  #ifdef VM  #include <manifest.h>  #include <snmp_vm.h>  #include <bsdtime.h>  #include <bsdtypes.h>  #include <socket.h>  #include <in.h>  #include <netdb.h>  #include <inet.h>  #else  #include <sys/time.h>  #include <sys/types.h>  #include <sys/socket.h>  #include <netinet/in.h>  #include <netdb.h>  #include <arpa/inet.h>  #endif  static unsigned char asn1_hdr[] = {0x30};Carpenter & Wijnen                                             [Page 33]

RFC 1228                        SNMP-DPI                        May 1991  /* insert length of remaining packet, not including this */  static unsigned char version[] = {0x02, 0x01, 0x00, 0x04};  /* integer, len=1, value=0, string */  /* insert community name length and community name */  static unsigned char request[] = {      0xa0, 0x1b,         /* get request, len=0x1b */      0x02, 0x01, 0x01,   /* integer, len=1,request_id = 1 */      0x02, 0x01, 0x00,   /* integer, len=1, error_status = 0 */      0x02, 0x01, 0x00,   /* integer, len=1, error_index = 0 */      0x30, 0x10,         /* varbind list, len=0x10 */      0x30, 0x0e,         /* varbind , len=0x0e */      0x06, 0x0a,         /* object ID, len=0x0a */      0x2b, 0x06, 0x01, 0x04, 0x01, 0x02, 0x02, 0x01, 0x01, 0x00,      0x05, 0x00          /* value, len = 0 */  };  static          extract_DPI_port();  query_DPI_port(hostname, community_name)  char           *hostname;  char           *community_name;  {      int             community_len;      int             rc;      community_len = strlen(community_name);      rc = _query_DPI_port(hostname, community_name, community_len);      return (rc);  }  /* use if community_name has embedded nulls */  _query_DPI_port(hostname, community_name, community_len)  char           *hostname;  char           *community_name;  int             community_len;  {      unsigned char   packet[1024];      int             packet_len;      int             remaining_len;      int             fd, rc, sock_len;      struct sockaddr_in sock, dest_sock;      struct timeval  timeout;      unsigned long   host_addr, read_mask;      int             tries;Carpenter & Wijnen                                             [Page 34]

RFC 1228                        SNMP-DPI                        May 1991      host_addr = lookup_host(hostname);      packet_len = 0;      bcopy(asn1_hdr, packet, sizeof(asn1_hdr));      packet_len += sizeof(asn1_hdr);      remaining_len = sizeof(version) + 1 +        community_len + sizeof(request);      packet[packet_len++] = remaining_len & 0xff;      bcopy(version, packet + packet_len, sizeof(version));      packet_len += sizeof(version);      packet[packet_len++] = community_len & 0xff;      bcopy(community_name, packet + packet_len, community_len);      packet_len += community_len;      bcopy(request, packet + packet_len, sizeof(request));      packet_len += sizeof(request);      fd = socket(AF_INET, SOCK_DGRAM, 0);      if (fd < 0) {      return (-1);      }      bzero(&sock, sizeof(sock));      sock.sin_family = AF_INET;      sock.sin_port = 0;      sock.sin_addr.s_addr = 0;      rc = bind(fd, &sock, sizeof(sock));      if (rc < 0)      return (-1);      timeout.tv_sec = 3;      timeout.tv_usec = 0;      bzero(&dest_sock, sizeof(dest_sock));      dest_sock.sin_family = AF_INET;      dest_sock.sin_port = htons(161);      dest_sock.sin_addr.s_addr = host_addr;      tries = 0;      while (++tries < 4) {      rc = sendto(fd, packet, packet_len, 0, &dest_sock,               sizeof(dest_sock));      read_mask = 1 << fd;      rc = select(read_mask + 1, &read_mask, 0, 0, &timeout);      if (rc <= 0)          continue;      sock_len = sizeof(dest_sock);      packet_len = recvfrom(fd, packet, sizeof(packet), 0,                      &dest_sock, &sock_len);      if (packet_len <= 0) {          return (-1);Carpenter & Wijnen                                             [Page 35]

RFC 1228                        SNMP-DPI                        May 1991      }      rc = extract_DPI_port(packet, packet_len);      return (rc);      }      return (-1);  }  static          extract_DPI_port(packet, len)  unsigned char   packet[];  int             len;  {      int             offset;      int             port;      /* should do error checking (like for noSuchName) */      offset = len - 2;      port = (packet[offset] << 8) + packet[offset + 1];      return (port);  }SAMPLE DPI FUNCTIONS  /* DPI parser */  #ifdef VM  #include "manifest.h"  #endif  #include "snmp_dpi.h"  static struct dpi_get_packet *pDPIget();  static struct dpi_next_packet *pDPInext();  static struct dpi_set_packet *pDPIset();  static struct dpi_trap_packet *pDPItrap();  static struct dpi_resp_packet *pDPIresponse();  static void     fDPIget();  static void     fDPInext();  static void     fDPIset();  static void     fDPItrap();  static void     fDPIresponse();  static int      cDPIget();  static int      cDPInext();  static int      cDPIset();  static int      cDPItrap();  static int      cDPIresponse();Carpenter & Wijnen                                             [Page 36]

RFC 1228                        SNMP-DPI                        May 1991  static struct snmp_dpi_hdr *mkDPIhdr();  static struct dpi_get_packet *mkDPIget();  static struct dpi_next_packet *mkDPInext();  struct dpi_set_packet *mkDPIset();  extern char    *malloc();  static unsigned char new_packet[1024];  static int      packet_len;  struct snmp_dpi_hdr *pDPIpacket(packet)  unsigned char  *packet;  {      struct snmp_dpi_hdr *hdr;      int             len, offset;      hdr = (struct snmp_dpi_hdr *) malloc(sizeof(struct snmp_dpi_hdr));      if (hdr == 0)          return (0);      len = (packet[0] << 8) + packet[1];      len += 2;      offset = 2;      hdr->proto_major = packet[offset++];      hdr->proto_minor = packet[offset++];      hdr->proto_release = packet[offset++];      hdr->packet_type = packet[offset++];      switch (hdr->packet_type) {      case SNMP_DPI_GET:      case SNMP_DPI_REGISTER:          hdr->packet_body.dpi_get =            pDPIget(packet + offset, len - offset);          break;      case SNMP_DPI_GET_NEXT:          hdr->packet_body.dpi_next =            pDPInext(packet + offset, len - offset);          break;      case SNMP_DPI_SET:          hdr->packet_body.dpi_set =            pDPIset(packet + offset, len - offset);          break;      case SNMP_DPI_TRAP:          hdr->packet_body.dpi_trap =            pDPItrap(packet + offset, len - offset);          break;      case SNMP_DPI_RESPONSE:Carpenter & Wijnen                                             [Page 37]

RFC 1228                        SNMP-DPI                        May 1991          hdr->packet_body.dpi_response =            pDPIresponse(packet + offset, len - offset);          break;      }      return (hdr);  }  static struct dpi_get_packet *pDPIget(packet, len)  unsigned char  *packet;  int             len;  {      struct dpi_get_packet *get;      int             l;      get = (struct dpi_get_packet *)        malloc(sizeof(struct dpi_get_packet));      if (get == 0)          return (0);      l = strlen(packet) + 1;      get->object_id = malloc(l);      strcpy(get->object_id, packet);      return (get);  }  static struct dpi_next_packet *pDPInext(packet, len)  unsigned char  *packet;  int             len;  {      struct dpi_next_packet *next;      int             l;      unsigned char  *cp;      next = (struct dpi_next_packet *)        malloc(sizeof(struct dpi_next_packet));      if (next == 0)          return (0);      cp = packet;      l = strlen(cp) + 1;      next->object_id = malloc(l);      strcpy(next->object_id, cp);      cp += l;      l = strlen(cp) + 1;      next->group_id = malloc(l);      strcpy(next->group_id, cp);      return (next);  }  static struct dpi_set_packet *pDPIset(packet, len)Carpenter & Wijnen                                             [Page 38]

RFC 1228                        SNMP-DPI                        May 1991  unsigned char  *packet;  int             len;  {      struct dpi_set_packet *set;      int             l;      unsigned char  *cp;      if (len == 0)          return (0);     /* nothing to parse */      set = (struct dpi_set_packet *)        malloc(sizeof(struct dpi_set_packet));      if (set == 0)          return (0);      cp = packet;      l = strlen(cp) + 1;      set->object_id = malloc(l);      strcpy(set->object_id, cp);      cp += l;      set->type = *(cp++);      l = (*(cp++) << 8);      l += *(cp++);      set->value_len = l;      set->value = malloc(l);      bcopy(cp, set->value, l);      return (set);  }  static struct dpi_trap_packet *pDPItrap(packet, len)  unsigned char  *packet;  int             len;  {      struct dpi_trap_packet *trap;      trap = (struct dpi_trap_packet *)        malloc(sizeof(struct dpi_trap_packet));      if (trap == 0)          return (0);      trap->generic = *packet;      trap->specific = *(packet + 1);      trap->info = pDPIset(packet + 2, len - 2);      return (trap);  }  static struct dpi_resp_packet *pDPIresponse(packet, len)  unsigned char  *packet;  int             len;Carpenter & Wijnen                                             [Page 39]

RFC 1228                        SNMP-DPI                        May 1991  {      struct dpi_resp_packet *resp;      resp = (struct dpi_resp_packet *)        malloc(sizeof(struct dpi_resp_packet));      if (resp == 0)          return (0);      resp->ret_code = *packet;      resp->ret_data = pDPIset(packet + 1, len - 1);      return (resp);  }  void            fDPIparse(hdr)  struct snmp_dpi_hdr *hdr;  {      if (hdr == 0)          return;      switch (hdr->packet_type) {      case SNMP_DPI_GET:      case SNMP_DPI_REGISTER:          fDPIget(hdr);          break;      case SNMP_DPI_GET_NEXT:          fDPInext(hdr);          break;      case SNMP_DPI_SET:          fDPIset(hdr);          break;      case SNMP_DPI_TRAP:          fDPItrap(hdr);          break;      case SNMP_DPI_RESPONSE:          fDPIresponse(hdr);          break;      }      free(hdr);  }  static void     fDPIget(hdr)  struct snmp_dpi_hdr *hdr;  {      struct dpi_get_packet *get;      get = hdr->packet_body.dpi_get;      if (get == 0)          return;      if (get->object_id)Carpenter & Wijnen                                             [Page 40]

RFC 1228                        SNMP-DPI                        May 1991          free(get->object_id);      free(get);  }  static void     fDPInext(hdr)  struct snmp_dpi_hdr *hdr;  {      struct dpi_next_packet *next;      next = hdr->packet_body.dpi_next;      if (next == 0)          return;      if (next->object_id)          free(next->object_id);      if (next->group_id)          free(next->group_id);      free(next);  }  static void     fDPIset(hdr)  struct snmp_dpi_hdr *hdr;  {      struct dpi_set_packet *set;      set = hdr->packet_body.dpi_set;      if (set == 0)          return;      if (set->object_id)          free(set->object_id);      if (set->value)          free(set->value);      free(set);  }  static void     fDPItrap(hdr)  struct snmp_dpi_hdr *hdr;  {      struct dpi_trap_packet *trap;      struct dpi_set_packet *set;      trap = hdr->packet_body.dpi_trap;      if (trap == 0)          return;      set = trap->info;      if (set != 0) {          if (set->object_id)              free(set->object_id);Carpenter & Wijnen                                             [Page 41]

RFC 1228                        SNMP-DPI                        May 1991          if (set->value)              free(set->value);          free(set);      }      free(trap);  }  static void     fDPIresponse(hdr)  struct snmp_dpi_hdr *hdr;  {      struct dpi_resp_packet *resp;      struct dpi_set_packet *set;      resp = hdr->packet_body.dpi_response;      if (resp == 0)          return;      set = resp->ret_data;      if (set != 0) {          if (set->object_id)              free(set->object_id);          if (set->value)              free(set->value);          free(set);      }      free(resp);  }  unsigned char  *cDPIpacket(hdr)  struct snmp_dpi_hdr *hdr;  {      int             rc, len;      if (hdr == 0) {          return (0);      }      packet_len = 2;      new_packet[packet_len++] = hdr->proto_major;      new_packet[packet_len++] = hdr->proto_minor;      new_packet[packet_len++] = hdr->proto_release;      new_packet[packet_len++] = hdr->packet_type;      switch (hdr->packet_type) {      case SNMP_DPI_GET:      case SNMP_DPI_REGISTER:          rc = cDPIget(hdr->packet_body.dpi_get);          break;      case SNMP_DPI_GET_NEXT:          rc = cDPInext(hdr->packet_body.dpi_next);          break;Carpenter & Wijnen                                             [Page 42]

RFC 1228                        SNMP-DPI                        May 1991      case SNMP_DPI_SET:          rc = cDPIset(hdr->packet_body.dpi_set);          break;      case SNMP_DPI_TRAP:          rc = cDPItrap(hdr->packet_body.dpi_trap);          break;      case SNMP_DPI_RESPONSE:          rc = cDPIresponse(hdr->packet_body.dpi_response);          break;      }      if (rc == -1)          return (0);      len = packet_len - 2;      new_packet[1] = len & 0xff;      len >>= 8;      new_packet[0] = len & 0xff;      return (new_packet);  }  static int      cDPIget(get)  struct dpi_get_packet *get;  {      if (get->object_id == 0)          return (-1);      strcpy(&new_packet[packet_len], get->object_id);      packet_len += strlen(get->object_id) + 1;      return (0);  }  static int      cDPInext(next)  struct dpi_next_packet *next;  {      if (next->object_id == 0)          return (-1);      if (next->group_id == 0)          return (-1);      strcpy(&new_packet[packet_len], next->object_id);      packet_len += strlen(next->object_id) + 1;      strcpy(&new_packet[packet_len], next->group_id);      packet_len += strlen(next->group_id) + 1;      return (0);  }  static int      cDPIset(set)  struct dpi_set_packet *set;  {Carpenter & Wijnen                                             [Page 43]

RFC 1228                        SNMP-DPI                        May 1991      int             len;      if (set->object_id == 0)          return (-1);      if ((set->value == 0) && (set->value_len != 0))          return (-1);      strcpy(&new_packet[packet_len], set->object_id);      packet_len += strlen(set->object_id) + 1;      new_packet[packet_len++] = set->type;      len = set->value_len >> 8;      new_packet[packet_len++] = len & 0xff;      new_packet[packet_len++] = set->value_len & 0xff;      bcopy(set->value, &new_packet[packet_len], set->value_len);      packet_len += set->value_len;      return (0);  }  static int      cDPIresponse(resp)  struct dpi_resp_packet *resp;  {      int             rc;      if (resp == 0)          return (-1);      new_packet[packet_len++] = resp->ret_code;      if (resp->ret_data != 0) {          rc = cDPIset(resp->ret_data);      } else          rc = 0;      return (rc);  }  static int      cDPItrap(trap)  struct dpi_trap_packet *trap;  {      int             rc;      new_packet[packet_len++] = trap->generic;      new_packet[packet_len++] = trap->specific;      if (trap->info != 0)          rc = cDPIset(trap->info);      else          rc = 0;      return (rc);  }Carpenter & Wijnen                                             [Page 44]

RFC 1228                        SNMP-DPI                        May 1991  unsigned char  *mkMIBquery(cmd, oid_name, group_oid, type, len, value)  int             cmd;  char           *oid_name, *group_oid;  int             type, len;  char           *value;  {      struct snmp_dpi_hdr *hdr;      unsigned char  *cp;      hdr = mkDPIhdr(cmd);      if (hdr == 0)          return (0);      switch (hdr->packet_type) {      case SNMP_DPI_GET:      case SNMP_DPI_REGISTER:          hdr->packet_body.dpi_get = mkDPIget(oid_name);          break;      case SNMP_DPI_GET_NEXT:          hdr->packet_body.dpi_next = mkDPInext(oid_name, group_oid);          break;      case SNMP_DPI_SET:          hdr->packet_body.dpi_set =            mkDPIset(oid_name, type, len, value);          break;      }      cp = cDPIpacket(hdr);      fDPIparse(hdr);      return (cp);  }  unsigned char  *mkDPIregister(oid_name)  char           *oid_name;  {      return (mkMIBquery(SNMP_DPI_REGISTER, oid_name));  }  unsigned char  *mkDPIresponse(ret_code, value_list)  int             ret_code;  struct dpi_set_packet *value_list;  {      struct snmp_dpi_hdr *hdr;      struct dpi_resp_packet *resp;      unsigned char  *cp;      hdr = mkDPIhdr(SNMP_DPI_RESPONSE);      resp = (struct dpi_resp_packet *)        malloc(sizeof(struct dpi_resp_packet));      if (resp == 0) {Carpenter & Wijnen                                             [Page 45]

RFC 1228                        SNMP-DPI                        May 1991          free(hdr);          return (0);      }      hdr->packet_body.dpi_response = resp;      resp->ret_code = ret_code;      resp->ret_data = value_list;      cp = cDPIpacket(hdr);      fDPIparse(hdr);      return (cp);  }  unsigned char  *mkDPItrap(generic, specific, value_list)  int             generic, specific;  struct dpi_set_packet *value_list;  {      struct snmp_dpi_hdr *hdr;      struct dpi_trap_packet *trap;      unsigned char  *cp;      hdr = mkDPIhdr(SNMP_DPI_TRAP);      trap = (struct dpi_trap_packet *)        malloc(sizeof(struct dpi_trap_packet));      if (trap == 0) {          free(hdr);          return (0);      }      hdr->packet_body.dpi_trap = trap;      trap->generic = generic;      trap->specific = specific;      trap->info = value_list;      cp = cDPIpacket(hdr);      fDPIparse(hdr);      return (cp);  }  static struct snmp_dpi_hdr *mkDPIhdr(type)  int             type;  {      struct snmp_dpi_hdr *hdr;      hdr = (struct snmp_dpi_hdr *) malloc(sizeof(struct snmp_dpi_hdr));      if (hdr == 0)          return (0);      hdr->proto_major = SNMP_DPI_PROTOCOL;      hdr->proto_minor = SNMP_DPI_VERSION;      hdr->proto_release = SNMP_DPI_RELEASE;      hdr->packet_type = type;Carpenter & Wijnen                                             [Page 46]

RFC 1228                        SNMP-DPI                        May 1991      return (hdr);  }  static struct dpi_get_packet *mkDPIget(oid_name)  char           *oid_name;  {      struct dpi_get_packet *get;      int             l;      get = (struct dpi_get_packet *)        malloc(sizeof(struct dpi_get_packet));      if (get == 0)          return (0);      l = strlen(oid_name) + 1;      get->object_id = malloc(l);      strcpy(get->object_id, oid_name);      return (get);  }  static struct dpi_next_packet *mkDPInext(oid_name, group_oid)  char           *oid_name;  char           *group_oid;  {      struct dpi_next_packet *next;      int             l;      next = (struct dpi_next_packet *)        malloc(sizeof(struct dpi_next_packet));      if (next == 0)          return (0);      l = strlen(oid_name) + 1;      next->object_id = malloc(l);      strcpy(next->object_id, oid_name);      l = strlen(group_oid) + 1;      next->group_id = malloc(l);      strcpy(next->group_id, group_oid);      return (next);  }  struct dpi_set_packet *mkDPIset(oid_name, type, len, value)  char           *oid_name;  int             type;  int             len;  char           *value;  {      struct dpi_set_packet *set;      int             l;Carpenter & Wijnen                                             [Page 47]

RFC 1228                        SNMP-DPI                        May 1991      set = (struct dpi_set_packet *)        malloc(sizeof(struct dpi_set_packet));      if (set == 0)          return (0);      l = strlen(oid_name) + 1;      set->object_id = malloc(l);      strcpy(set->object_id, oid_name);      set->type = type;      set->value_len = len;      set->value = malloc(len);      bcopy(value, set->value, len);      return (set);  }SAMPLE SOURCES FOR ANONYMOUS FTP   The complete source to two SNMP DPI-related programs is available for   anonymous ftp from the University of Toronto.  The host name to use   is "vm.utcs.utoronto.ca" (128.100.100.2).  The files are in the   "anonymou.204" minidisk, so one must issue a "cd anonymou.204" after   having logged in.  Don't forget to use the binary transmission mode.The Ping Engine   This program is an SNMP DPI sub-agent which allows network management   stations to perform remote PINGs.  The source to this applications is   in the file "ping_eng.tarbin".  The source to the SNMP DPI API is   also contained within the archive.The DPI->SMUX daemon   This program illustrates what is required to include the SNMP DPI in   an SNMP agent.  This is actually a SMUX-based agent that works with   the ISODE SNMP agent and provides an interface for SNMP DPI sub-   agents.  The source to this program is in the file "dpid.tarbin".   ISODE 6.7, or later, is a prerequisite.References   [1] Case, J., Fedor, M., Schoffstall, M., and J. Davin, "Simple       Network Management Protocol",RFC 1157, SNMP Research,       Performance Systems International, Performance Systems       International, MIT Laboratory for Computer Science, May 1990.   [2] Information processing systems - Open Systems Interconnection,       "Specification of Abstract Syntax Notation One (ASN.1)",Carpenter & Wijnen                                             [Page 48]

RFC 1228                        SNMP-DPI                        May 1991       International Organization for Standardization, International       Standard 8824, December 1987.   [3] Information processing systems - Open Systems Interconnection,       "Specification of Basic Encoding Rules for Abstract Syntax       Notation One (ASN.1)", International Organization for       Standardization, International Standard 8825, December 1987.   [4] McCloghrie K., and M. Rose, "Management Information Base for       Network Management of TCP/IP-based internets",RFC 1156,       Performance Systems International and Hughes LAN Systems, May       1990.   [5] Rose, M., and K. McCloghrie, "Structure and Identification of       Management Information for TCP/IP-based internets",RFC 1155,       Performance Systems International and Hughes LAN Systems, May       1990.   [6] International Business Machines, Inc., "TCP/IP for VM:       Programmer's Reference", SC31-6084-0, 1990.   [7] International Business Machines, Inc., "Virtual Machine System       Facilities for Programming, Release 6", SC24-5288-01, 1988.   [8] International Business Machines, Inc., "TCP/IP Version 1.1 for       OS/2 EE:  Programmer's Reference", SC31-6077-1, 1990.Security Considerations   Security issues are not discussed in this memo.Carpenter & Wijnen                                             [Page 49]

RFC 1228                        SNMP-DPI                        May 1991Authors' Addresses   Geoffrey C. Carpenter   IBM T. J. Watson Research Center   P. O. Box 218   Yorktown Heights, NY  10598   Phone:  (914) 945-1970   Email:  gcc@watson.ibm.com   Bert Wijnen   IBM International Operations   Watsonweg 2   1423 ND Uithoorn   The Netherlands   Phone:  +31-2975-53316   Email:  wijnen@uitvm2.iinus1.ibm.comCarpenter & Wijnen                                             [Page 50]

[8]ページ先頭

©2009-2025 Movatter.jp