blob: 20f5cc3cb744639b27a44bd873b5e023f65be25a [file] [log] [blame]
.TH encode_keychange 1 "16 Nov 2006" VVERSIONINFO "Net-SNMP"
.SH NAME
encode_keychange - produce the KeyChange string for SNMPv3
.SH SYNOPSIS
.B encode_keychange
\-t md5|sha1
[\fIOPTIONS\fR]
.SH DESCRIPTION
.B encode_keychange
produces a KeyChange string using the old and new passphrases
as described in Section 5 of RFC 2274 "User-based Security Model (USM) for
version 3 of the Simple Network Management Protocol (SNMPv3)". \fB\-t\fR
option is mandatory and specifies the hash transform type to use.
The transform is used to convert passphrase to master key for a given
user (Ku), convert master key to the localized key (Kul), and to hash the
old Kul with the random bits.
Passphrases are obtained by examining a number of sources until success
(in order listed):
.IP
command line options (see
.B \-N
and
.B \-O
options below);
.IP
the file
.B $HOME/.snmp/passphrase.ek
which should only contain two lines with old and new passphrase;
.IP
standard input \fB\-or\-\fR user input from the terminal.
.PP
.SH OPTIONS
.TP
\fB\-E\fR [0x]<\fIengineID\fR> EngineID used for Kul generation.
<\fIengineID\fR> is intepreted as a hex string when preceded by 0x,
otherwise it is treated as a text string. If no <\fIengineID\fR> is
specified, it is constructed from the first IP address for the local
host.
.TP
\fB\-f\fR
Force passphrases to be read from standard input.
.TP
\fB\-h\fR
Display the help message.
.TP
\fB\-N\fR "<\fInew_passphrase\fR>"
Passphrase used to generate the new Ku.
.TP
\fB\-O\fR "<\fIold_passphrase\fR>"
Passphrase used to generate the old Ku.
.TP
\fB\-P\fR
Turn off the prompt for passphrases when getting data from standard input.
.TP
\fB\-v\fR
Be verbose.
.TP
\fB\-V\fR
Echo passphrases to terminal.
.PP
.SH "SEE ALSO"
The localized key method is defined in RFC 2274, Sections 2.6 and A.2, and
originally documented in
.IP
U. Blumenthal, N. C. Hien, B. Wijnen,
"Key Derivation for Network Management Applications",
IEEE Network Magazine, April/May issue, 1997.