scanning NagiosXI vulnerability ...
scanning NagiosXI vulnerability ...
The information security department scan the NagiosXI vulnerability and found several weakness, how to fix those vulnerability?!
You do not have the required permissions to view the files attached to this post.
Re: scanning NagiosXI vulnerability ...
The vulnerability scanning company gave some update advice including ...
-- httpd update to httpd-2.4.6-80.0.1.el7.x86_64
-- update openssl to openssl-1.0.2k-19.el7.x86_64
-- PHP update to official php5.4.16
-- try to use SNMP V3
-- prohibit Httpd to use below TLS1.2
-- in the /etc/httpd/conf.d/ssl.conf add SSLProtocol all -SSLv2 -SSLv3 -TLSv1 -TLSv1.1
-- in the /etc/httpd/conf.d/ssl.conf add SSLCipherSuite kEECDH:+kEECDH+SHA:kEDH:+kEDH+SHA:+kEDH+CAMELLIA:kECDH:+kECDH+SHA:kRSA:+kRSA+SHA:+kRSA+CAMELLIA:!aNULL:!eNULL:!SSLv2:!RC4:!MD5:!DES:!EXP:!SEED:!IDEA:!3DES
but the NagiosXI administrator wonder if update those objects will affect NagiosXI or not?
-- httpd update to httpd-2.4.6-80.0.1.el7.x86_64
-- update openssl to openssl-1.0.2k-19.el7.x86_64
-- PHP update to official php5.4.16
-- try to use SNMP V3
-- prohibit Httpd to use below TLS1.2
-- in the /etc/httpd/conf.d/ssl.conf add SSLProtocol all -SSLv2 -SSLv3 -TLSv1 -TLSv1.1
-- in the /etc/httpd/conf.d/ssl.conf add SSLCipherSuite kEECDH:+kEECDH+SHA:kEDH:+kEDH+SHA:+kEDH+CAMELLIA:kECDH:+kECDH+SHA:kRSA:+kRSA+SHA:+kRSA+CAMELLIA:!aNULL:!eNULL:!SSLv2:!RC4:!MD5:!DES:!EXP:!SEED:!IDEA:!3DES
but the NagiosXI administrator wonder if update those objects will affect NagiosXI or not?
Re: scanning NagiosXI vulnerability ...
especially for the openssl
-
scottwilkerson
- DevOps Engineer
- Posts: 19396
- Joined: Tue Nov 15, 2011 3:11 pm
- Location: Nagios Enterprises
- Contact:
Re: scanning NagiosXI vulnerability ...
openssl, php and httpd are updated/pached by the OS, not by Nagios.xpertech wrote:especially for the openssl
If you are on a CentOS/RHEL system you can get all the patches by running
Code: Select all
yum update -yRe: scanning NagiosXI vulnerability ...
but if run the update-all command on OS, will it affect NagiosXI plugin if some plugin not compatible with updated patches?
-
scottwilkerson
- DevOps Engineer
- Posts: 19396
- Joined: Tue Nov 15, 2011 3:11 pm
- Location: Nagios Enterprises
- Contact:
Re: scanning NagiosXI vulnerability ...
No it will not, this is safe to do, and as a matter of fact should be done as routine maintenance to apply patches for various OS related security patches.xpertech wrote:but if run the update-all command on OS, will it affect NagiosXI plugin if some plugin not compatible with updated patches?