NRPE security
Posted: Mon Jul 06, 2015 3:41 pm
Hello,
We are new to Nagios XI and through various conversations, a training session, and lots of questions and research, we landed on using the NSClient++ (NSCP-0.4.3.143-x64.msi) with NRPE for our Windows hosts.
Along the way, we've trimmed and customized nsclient.ini until we landed on the configuration below.
All is working well so far, but security has become the topic around here. Specifically around the vulnerabilities raised by setting both "allow nasty characters" and "allow arguments" in the NRPE section of the config to true. This article directly notes serious vulnerability concerns with this configuration. That data is over a year old, so I'm hoping things have changed. My questions are:
1. Have things changed? Are these vulnerabilities still around?
2. The Windows hosts we are monitoring are public servers that are behind an external firewall. They are also separated from the rest of our environment by an internal firewall that only has port 5667 open from the monitored server to the Nagios server. What kind of exploits, if any, are we open to with this configuration?
3. For security concerns alone, should we be considering another agent/server/check? NCPA? check_nt?
Thanks!
Mike
We are new to Nagios XI and through various conversations, a training session, and lots of questions and research, we landed on using the NSClient++ (NSCP-0.4.3.143-x64.msi) with NRPE for our Windows hosts.
Along the way, we've trimmed and customized nsclient.ini until we landed on the configuration below.
Code: Select all
[/settings/default]
;A comma separated list of allowed hosts. You can use netmasks (/ syntax) or * to create ranges.
allowed hosts=[IP.OF.NAGIOS.SERVER]
[/modules]
;Various system related checks, such as CPU load, process state, service state memory usage and PDH counters.
CheckSystem=1
;Various file and disk related things.
CheckDisk=1
;Listens for incoming NRPE connection and processes incoming requests.
NRPEServer=1
;Execute external scripts
CheckExternalScripts=enabled
[/settings/NRPE/server]
allowed ciphers=ADH
;Allow characters in command definitions
allow nasty characters=1
;Allow -a arguments in command definitions
allow arguments=1
[/settings/external scripts]
;Allow arguments to be passed to external scripts
allow arguments=1
[/settings/log]
;Enable debug level logging
;file name = nsclient.log
;level = debug1. Have things changed? Are these vulnerabilities still around?
2. The Windows hosts we are monitoring are public servers that are behind an external firewall. They are also separated from the rest of our environment by an internal firewall that only has port 5667 open from the monitored server to the Nagios server. What kind of exploits, if any, are we open to with this configuration?
3. For security concerns alone, should we be considering another agent/server/check? NCPA? check_nt?
Thanks!
Mike