[Pkg-nagios-devel] Bug#547092: Bug#547092: Bug#547092: nrpe ssl security problem

Michael Friedrich michael.friedrich at gmail.com
Thu Feb 7 23:55:53 UTC 2013


On 08.02.2013 00:31, Markus Frosch wrote:
> Just my 2 cents (without any hat on):
>
> TLS integration in NRPE was broken from the beginning and more or less
> by design.
>
> The "real" and only security feature is to configure a appropriate
> allowed_hosts list, which might be enough security for internal
> networks in respect of TCP sessions.
>
> Question is: Do we really want to remove NRPE from testing because of
> it promising a incomplete feature?
>
> It should be pointed out that the TLS feature is broken, but still
> allowing users to use NRPE.
>
> Because the problem is: we (Debian) might not be able to change it -
> but I personally don't want users to use some self built stuff.

i've tried the idea of the ssl x509 patch in an unofficial nrpe fork.
lives in git here, until it dies, and will never get released, so 
beware: https://git.icinga.org/?p=icinga-irpe.git;a=summary

the nrpe implementation as is an entire mess, and one would rather 
rewrite it entirely than fix the ssl issue just for sanity. besides - 
the dh key gets generated on each configure run. so at least only the 
same package revisions share the same key.
you may figure, that not only nrpe is hard to maintain, but also nsca 
(and code wise, nagios is horrible, so is icinga 1.x).

so unless there's an idea about what to fix now or likewise, a 
maintainer capable of managing what upstream did and does wrong, there's 
not much chance to fix it. in the past you already had to fix broken 
upstream releases of nrpe/nsca/nagios and that's not really the job of a 
packager to take care of upstream's fuckups. thing is - people use and 
depend on nrpe, with or without ssl. rather then cutting that off now 
enforcing people to compile nrpe once again on their debian systems, i'd 
rather adapt the readme.

anyhow, for the alternatives - check_by_ssh or snmp. the checkmk agent 
is not capable of ssl itsself nor does it support ipv6 natively. you'd 
have to used xinetd with a ssh tunnel to make this work (and while at 
it, you could tunnel nrpe then too).


the future in icinga regards will introduce a new agent, based on the 
(already in dev) existing icinga2 message protocol (native v4/v6, x509, 
compression). but it's not yet implemented as it's planned for a later 
milestone this year.

kind regards,
Michael


-- 
DI (FH) Michael Friedrich

mail:     michael.friedrich at gmail.com
twitter:  https://twitter.com/dnsmichi
jabber:   dnsmichi at jabber.ccc.de
irc:      irc.freenode.net/icinga dnsmichi

icinga open source monitoring
position: lead core developer
url:      https://www.icinga.org



More information about the Pkg-nagios-devel mailing list