NRPE vs. check_by_ssh
Michael Medin
michael at medin.name
Wed Mar 25 23:23:01 CET 2009
Kevin Keane skrev:
> Michael Medin wrote:
>
>> Kevin Keane skrev:
>>
>>> Wouldn't the SSL certificates provide authentication comparable to
>>> SSH keys? I'm not familiar with how NRPE uses SSL, but I would assume
>>> that you could also use client certificates?
>>>
>>>
>> I am no expert but AFAIK it merely encrypts the traffic ie, no
>> certificates at all. If someone knows hoe to use certificates please
>> feel free to let me know so I can add it to NSClient++ but what I have
>> seen it is not possible...
>>
> No, that wouldn't be possible. Encryption always requires some form of
> key or another. In SSL, the key is embedded in the server's certificate.
> The client certificate is optional; it also contains a second encryption
> key. If you use client certificates, in effect the traffic is doubly
> encrypted.
>
Humm.
The cipher used is ADH which is "anonymous DH cipher suites" in addition
to a "pre shared *known* secret" (read un-secret). Again I am no expert
but I always interpreted the "secret key" (DH) thingy as a key and not a
certificate but mayhap I got it all wrong? (in which case it might be
possible to use proper certificates?)
And I am actually using openssl but mayhap it has a built-in keystore as
well?
// Michael Medin
> You almost certainly *are* using certificates in NSClient++. But if you
> are using the standard Windows API functions, Windows transparently
> hides most of that complexity from you; the MSXML object and its ilk
> take care of it. You would be using the certificates from the Internet
> Explorer key store.
>
>
> Actually, when I described how the SSL connection can use single or
> double encryption, I lied. It is more complicated than that. The SSL
> keys are extremely long (1024, 2048 bits or more), and they have to be
> because by nature they don't change over years. SSL keys in the
> certificates are also the public keys of a public/private key pair.
> These factors make using the SSL key for encryption *extremely* slow.
> That is why in reality, public key encryption is only used for extremely
> short messages (measured in bytes, not kilobytes).
>
> To work around that, the client and the server generate yet another
> random key, this time a symmetric key (which has to be kept secret from
> anybody). This symmetric key is usually 128 bits or 256 bits. Unlike
> public-key encryption, symmetric encryption can be implemented very
> fast. This key is sent using the slow public-key encryption. The actual
> traffic is then encrypted using this second key, which will be thrown
> away after the connection ends.
>
> Incidentally, SSH works basically the same way. The only substantial
> difference is that the public keys comes from the authorized_keys file
> instead of a certificate.
>
> Both SSL and SSH actually allow you to use various different encryption
> algorithms and mechanisms for exchanging keys under the hood. You may,
> for instance, see DHE for the key exchange, RSA for the public/private
> encryption, and AES for the symmetric encryption and SHA for hashing
> (which I haven't even touched on).
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://www.monitoring-lists.org/archive/users/attachments/20090325/dad7f5b7/attachment.html>
-------------- next part --------------
------------------------------------------------------------------------------
-------------- next part --------------
_______________________________________________
Nagios-users mailing list
Nagios-users at lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/nagios-users
::: Please include Nagios version, plugin version (-v) and OS when reporting any issue.
::: Messages without supporting info will risk being sent to /dev/null
More information about the Users
mailing list