nsca version problems?
Mark Musone
mmusone at shatterit.com
Wed Jan 7 17:12:08 CET 2004
ok,looking at the code, the nsca 2.1 server is checking:
if(ntohs(receive_packet.packet_version)!=NSCA_PACKET_VERSION_2)
while the nsca 2.4 client is sending NSCA_PACKET_VERSION_3
However..i don’t see _any_ difference in the packet structure…
so..can I modify the nsca 2.1 server to allow either
NSCA_PACKET_VERSION_2 or NSCA_PACKET_VERSION_3 ??
-Mark
-----Original Message-----
From: nagios-users-admin at lists.sourceforge.net
[mailto:nagios-users-admin at lists.sourceforge.net] On Behalf Of Mark
Musone
Sent: Wednesday, January 07, 2004 11:03 AM
To: Nagios-users at lists.sourceforge.net
Subject: [Nagios-users] nsca version problems?
hi all, I recently upgraded to nsca 2.4 from nsca 2.1 …but heres the
rub..
the nsca server is running 2.1, and I have most servers currently
running nsca 2.1
I have some new servers running 2.4 ..
but the nsca 2.4 clients cant seem to communicate with the nsca 2.1
server.
I’m getting the following error in the server logs:
Received invalid packet type/version from client - possibly due to
client using wrong pass
word or crypto algorithm?
however the 2.1 clients, 2.1 server and 2.4 clients all have
decryption_method=1 (simple XOR)
was there a change in the simple xor method??
is there a reason why a 2.4 client cant work with a 2.1 server?
what if I make the server 2.4? will 2.1 clients work with a 2.4 server?
any help is greatly appreciated!
Thanks,
Mark
---
Outgoing mail is certified Virus Free.
Checked by AVG anti-virus system (http://www.grisoft.com).
Version: 6.0.557 / Virus Database: 349 - Release Date: 12/30/2003
---
Incoming mail is certified Virus Free.
Checked by AVG anti-virus system (http://www.grisoft.com).
Version: 6.0.557 / Virus Database: 349 - Release Date: 12/30/2003
---
Outgoing mail is certified Virus Free.
Checked by AVG anti-virus system (http://www.grisoft.com).
Version: 6.0.557 / Virus Database: 349 - Release Date: 12/30/2003
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://www.monitoring-lists.org/archive/users/attachments/20040107/6534723c/attachment.html>
More information about the Users
mailing list