Page 1 of 1
NCPA_Security
Posted: Wed Jul 15, 2020 4:23 am
by ybadrou
Hello Dear community,
I have just installed NCPA_Agent on a set of equipements. My question is about NCPA security. I have noticed that NCPA had provided a better level of security through SSL/TLS encryption.
- So my question is what is the limit of this amelioration! and what must be done to keep this security strong. I was wondering of it is a necessity to change the auto-signed certificates as they come by default after the installation of the NCPA Agent and so provide my own certificates?
- what other security vulnerabilities still exist on NCPA agent ?
Thank you
Re: NCPA_Security
Posted: Wed Jul 15, 2020 3:59 pm
by benjaminsmith
Hi
@ybadrou,
Thank you for trying out Nagios! Out of the box, NCPA uses a self-signed certificate, but you have the option to set your own if you'd like. This is done using the certificate option in the configuration file.
See:
https://www.nagios.org/ncpa/help/2.0/configuration.html
In regards to other vulnerabilities, we work hard to keep everything secure. The best practice is to keep everything up-to-date, both NCPA and Nagios XI.
Let us know if you have more questions.
Re: NCPA_Security
Posted: Fri Jul 17, 2020 4:49 am
by ybadrou
hi @benjaminsmith
Thank you for your answer.
-I have another two questions about SSL certificate. As I will leave the default certificates provided by Nagios after the NCPA installation, does this present a security vulnerability ? In other word, are they the same in every host ? I wanna now if all NCPA agent come with the same certificate or does it change in every installation?
- How the exchange of certificates between Nagios server and NCPA Client is performed. Is it while trying to pair the client to the server or what ?
Thank you so much
Re: NCPA_Security
Posted: Fri Jul 17, 2020 2:11 pm
by benjaminsmith
HI
@yabadrou,
Your welcome. In regards to your other questions, see below:
1. It's a self-signed certificate, and but in this use case, it's acceptable for most users since the certificate is used between components of the same system, and not between a server and unknown agents, so there really isn't a need for a 3rd party. When you install NCPA, a certificate is generated, so it's not the same for every installation.
Regarding, the HTTP handshake between check_ncpa.py and NCPA(server), that's handled by the SSL module in python.
See:
https://docs.python.org/3/library/ssl.html#ssl-security
2. As far as other vulnerabilities, I would recommend keeping everything updates to date. We are quick to respond to any CVE, you can follow the project on GitHub for the latest as well.
https://github.com/NagiosEnterprises/nc ... HANGES.rst
Reference:
Security at Nagios