Index: m4/netsnmp.m4 =================================================================== --- m4/netsnmp.m4.orig 2023-09-25 12:26:59.951273749 +0200 +++ m4/netsnmp.m4 2023-10-17 22:18:29.154010921 +0200 @@ -169,7 +169,22 @@ session.securityAuthProto = usmHMAC384SH ],[ AC_MSG_RESULT(no) ]) - +################## monkey patching.... + dnl Check if MD5 auth is removed + AC_MSG_CHECKING(for disabled MD5 auth protocol support) + AC_TRY_LINK([ +#include +#include + ],[ +struct snmp_session session; +session.securityAuthProto = usmHMACMD5AuthProtocol; + ],[ + AC_DEFINE(HAVE_NETSNMP_NO_MD5_AUTH, 1, [Define to 1 if MD5 auth protocols is disabled.]) + AC_MSG_RESULT(yes) + ],[ + AC_MSG_RESULT(no) + ]) +################## end monkey patching.... dnl Check for AES192/256 protocol support for privacy AC_MSG_CHECKING(for strong AES privacy protocol support) AC_LINK_IFELSE([AC_LANG_PROGRAM([[ Index: src/zabbix_server/poller/checks_snmp.c =================================================================== --- src/zabbix_server/poller/checks_snmp.c.orig 2023-09-25 12:27:00.031274243 +0200 +++ src/zabbix_server/poller/checks_snmp.c 2023-10-17 22:18:29.154010921 +0200 @@ -356,10 +356,12 @@ static int zbx_snmpv3_set_auth_protocol( switch (item->snmpv3_authprotocol) { +#ifdef usmHMACMD5AuthProtocol case ITEM_SNMPV3_AUTHPROTOCOL_MD5: session->securityAuthProto = usmHMACMD5AuthProtocol; session->securityAuthProtoLen = USM_AUTH_PROTO_MD5_LEN; break; +#endif case ITEM_SNMPV3_AUTHPROTOCOL_SHA1: session->securityAuthProto = usmHMACSHA1AuthProtocol; session->securityAuthProtoLen = USM_AUTH_PROTO_SHA_LEN;