Kevin Keane wrote:
> Andreas Ericsson wrote:
>> Kevin Keane wrote:
>>> Christopher McAtackney wrote:
2009/3/25 Kevin Keane :
> I think you are comparing apples and oranges here, because in most
> situations that I can think of, the decision is dictated by the
> network
Charlie Reddington wrote:
>
> +1 on the control master. We have about 1000 checks over 300 hosts and
> using control master made the box much more stable and quite frankly
> usable. Saved a lot of plug in time outs as well.
>
> Think about 1000 checks every 5 or 10 minutes. That's 1000 encryp
On Mar 26, 2009, at 11:05 AM, Kevin Keane wrote:
> Andreas Ericsson wrote:
>> Kevin Keane wrote:
>>> Christopher McAtackney wrote:
2009/3/25 Kevin Keane :
> I think you are comparing apples and oranges here, because in most
> situations that I can think of, the decision is dicta
Andreas Ericsson wrote:
> Kevin Keane wrote:
>> Christopher McAtackney wrote:
>>> 2009/3/25 Kevin Keane :
>>>
I think you are comparing apples and oranges here, because in most
situations that I can think of, the decision is dictated by the
network
topology. If you are exclus
Kevin Keane wrote:
> Christopher McAtackney wrote:
>> 2009/3/25 Kevin Keane :
>>
>>> I think you are comparing apples and oranges here, because in most
>>> situations that I can think of, the decision is dictated by the network
>>> topology. If you are exclusively on a trusted private network,
>
Michael Medin wrote:
> Kevin Keane skrev:
>> Michael Medin wrote:
>>
>>> Kevin Keane skrev:
>>>
Wouldn't the SSL certificates provide authentication comparable to
SSH keys? I'm not familiar with how NRPE uses SSL, but I would assume
that you could also use client certificat
Kevin Keane skrev:
Michael Medin wrote:
Kevin Keane skrev:
Wouldn't the SSL certificates provide authentication comparable to
SSH keys? I'm not familiar with how NRPE uses SSL, but I would assume
that you could also use client certificates?
I am no expert but AFAIK it merely
Charlie Reddington wrote:
On Mar 25, 2009, at 2:30 PM, RijilV wrote:
2009/3/24 Christopher McAtackney :
Hi all,
I was wondering if someone could give a brief overview of the pros /
cons of using NRPE to monitor my remote hosts versus using the
check_by_ssh command?
I'm aware that che
On Mar 25, 2009, at 2:30 PM, RijilV wrote:
> 2009/3/24 Christopher McAtackney :
>> Hi all,
>>
>> I was wondering if someone could give a brief overview of the pros /
>> cons of using NRPE to monitor my remote hosts versus using the
>> check_by_ssh command?
>>
>> I'm aware that check_by_ssh increa
Michael Medin wrote:
> Kevin Keane skrev:
>> Wouldn't the SSL certificates provide authentication comparable to
>> SSH keys? I'm not familiar with how NRPE uses SSL, but I would assume
>> that you could also use client certificates?
>>
> I am no expert but AFAIK it merely encrypts the traffic
2009/3/24 Christopher McAtackney :
> Hi all,
>
> I was wondering if someone could give a brief overview of the pros /
> cons of using NRPE to monitor my remote hosts versus using the
> check_by_ssh command?
>
> I'm aware that check_by_ssh increases the CPU overhead, but I'm not
> clear on the level
On Wed, Mar 25, 2009 at 06:44:00PM +, Christopher McAtackney wrote:
> 2009/3/25 Kevin Keane :
> > I think you are comparing apples and oranges here, because in most
> > situations that I can think of, the decision is dictated by the network
> > topology. If you are exclusively on a trusted priv
Christopher McAtackney wrote:
> 2009/3/25 Kevin Keane :
>
>> I think you are comparing apples and oranges here, because in most
>> situations that I can think of, the decision is dictated by the network
>> topology. If you are exclusively on a trusted private network,
>> check_by_ssh really does
Kevin Keane skrev:
> Wouldn't the SSL certificates provide authentication comparable to SSH
> keys? I'm not familiar with how NRPE uses SSL, but I would assume that
> you could also use client certificates?
>
I am no expert but AFAIK it merely encrypts the traffic ie, no
certificates at all.
2009/3/25 Kevin Keane :
> I think you are comparing apples and oranges here, because in most
> situations that I can think of, the decision is dictated by the network
> topology. If you are exclusively on a trusted private network,
> check_by_ssh really doesn't offer any benefits. Conversely, if yo
Wouldn't the SSL certificates provide authentication comparable to SSH
keys? I'm not familiar with how NRPE uses SSL, but I would assume that
you could also use client certificates?
Michael Medin wrote:
> Sorry to barge in (without reading the thread but...)
>
> Security wise NRPE lacks any form
Sorry to barge in (without reading the thread but...)
Security wise NRPE lacks any form of authentication which is something
SSH has so in this regard SSH is the more secure one...
// Michael Medin
Idriss ARABBAJ skrev:
> Hi Kevin,
>
> I carefully read your speech about this subject and I foun
Hi Idriss,
What I think? I think I learned something new! Thanks for telling me
about the NRPE-with-SSL option; I was not aware of that.
That said, I suspect that the overhead for SSL and SSH will be very
similar, because under the hood they use quite similar algorithms. I
want to say, they ac
2009/3/25 Idriss ARABBAJ :
> Hi Kevin,
>
> I carefully read your speech about this subject and I found you a lot
> of insist on security offering by ssh, but you can also configure
> nrpe to work with ssl so I think we will have no difference at this
> level, then what do you think?
> best regar
Hi Kevin,
I carefully read your speech about this subject and I found you a lot
of insist on security offering by ssh, but you can also configure
nrpe to work with ssl so I think we will have no difference at this
level, then what do you think?
best regards
2009/3/25 Kevin Keane :
> I think yo
I think you are comparing apples and oranges here, because in most
situations that I can think of, the decision is dictated by the network
topology. If you are exclusively on a trusted private network,
check_by_ssh really doesn't offer any benefits. Conversely, if your
topology involves the Int
2009/3/24 Michael Schwartzkopff :
> Am Dienstag, 24. März 2009 10:45:08 schrieb Christopher McAtackney:
>> Hi all,
>>
>> I was wondering if someone could give a brief overview of the pros /
>> cons of using NRPE to monitor my remote hosts versus using the
>> check_by_ssh command?
>>
>> I'm aware th
Am Dienstag, 24. März 2009 10:45:08 schrieb Christopher McAtackney:
> Hi all,
>
> I was wondering if someone could give a brief overview of the pros /
> cons of using NRPE to monitor my remote hosts versus using the
> check_by_ssh command?
>
> I'm aware that check_by_ssh increases the CPU overhead,
Hi all,
I was wondering if someone could give a brief overview of the pros /
cons of using NRPE to monitor my remote hosts versus using the
check_by_ssh command?
I'm aware that check_by_ssh increases the CPU overhead, but I'm not
clear on the level of impact here - does this increase the load on
I'm looking to monitor remote disk, cpu, mem etc and wondering if there's a way
to pick your crypto with nrpe like with nsca? Otherwise thinking check_by_ssh,
don't want to have to deal with all the keying. Is nrpe secure, if so
comparable to ssh?
Thanks,
Jim
-
25 matches
Mail list logo