Kevin Keane wrote:
Andreas Ericsson wrote:
Kevin Keane wrote:
Christopher McAtackney wrote:
2009/3/25 Kevin Keane subscript...@kkeane.com:
I think you are comparing apples and oranges here, because in most
situations that I can think of, the decision is dictated by the
network
Charlie Reddington wrote:
+1 on the control master. We have about 1000 checks over 300 hosts and
using control master made the box much more stable and quite frankly
usable. Saved a lot of plug in time outs as well.
Think about 1000 checks every 5 or 10 minutes. That's 1000 encrypted
Kevin Keane wrote:
Christopher McAtackney wrote:
2009/3/25 Kevin Keane subscript...@kkeane.com:
I think you are comparing apples and oranges here, because in most
situations that I can think of, the decision is dictated by the network
topology. If you are exclusively on a trusted private
Andreas Ericsson wrote:
Kevin Keane wrote:
Christopher McAtackney wrote:
2009/3/25 Kevin Keane subscript...@kkeane.com:
I think you are comparing apples and oranges here, because in most
situations that I can think of, the decision is dictated by the
network
topology. If you are
On Mar 26, 2009, at 11:05 AM, Kevin Keane wrote:
Andreas Ericsson wrote:
Kevin Keane wrote:
Christopher McAtackney wrote:
2009/3/25 Kevin Keane subscript...@kkeane.com:
I think you are comparing apples and oranges here, because in most
situations that I can think of, the decision is
Hi Kevin,
I carefully read your speech about this subject and I found you a lot
of insist on security offering by ssh, but you can also configure
nrpe to work with ssl so I think we will have no difference at this
level, then what do you think?
best regards
2009/3/25 Kevin Keane
2009/3/25 Idriss ARABBAJ arab...@gmail.com:
Hi Kevin,
I carefully read your speech about this subject and I found you a lot
of insist on security offering by ssh, but you can also configure
nrpe to work with ssl so I think we will have no difference at this
level, then what do you think?
Hi Idriss,
What I think? I think I learned something new! Thanks for telling me
about the NRPE-with-SSL option; I was not aware of that.
That said, I suspect that the overhead for SSL and SSH will be very
similar, because under the hood they use quite similar algorithms. I
want to say, they
Sorry to barge in (without reading the thread but...)
Security wise NRPE lacks any form of authentication which is something
SSH has so in this regard SSH is the more secure one...
// Michael Medin
Idriss ARABBAJ skrev:
Hi Kevin,
I carefully read your speech about this subject and I found
Wouldn't the SSL certificates provide authentication comparable to SSH
keys? I'm not familiar with how NRPE uses SSL, but I would assume that
you could also use client certificates?
Michael Medin wrote:
Sorry to barge in (without reading the thread but...)
Security wise NRPE lacks any form
2009/3/25 Kevin Keane subscript...@kkeane.com:
I think you are comparing apples and oranges here, because in most
situations that I can think of, the decision is dictated by the network
topology. If you are exclusively on a trusted private network,
check_by_ssh really doesn't offer any
Kevin Keane skrev:
Wouldn't the SSL certificates provide authentication comparable to SSH
keys? I'm not familiar with how NRPE uses SSL, but I would assume that
you could also use client certificates?
I am no expert but AFAIK it merely encrypts the traffic ie, no
certificates at all. If
Christopher McAtackney wrote:
2009/3/25 Kevin Keane subscript...@kkeane.com:
I think you are comparing apples and oranges here, because in most
situations that I can think of, the decision is dictated by the network
topology. If you are exclusively on a trusted private network,
On Wed, Mar 25, 2009 at 06:44:00PM +, Christopher McAtackney wrote:
2009/3/25 Kevin Keane subscript...@kkeane.com:
I think you are comparing apples and oranges here, because in most
situations that I can think of, the decision is dictated by the network
topology. If you are exclusively
2009/3/24 Christopher McAtackney crist...@gmail.com:
Hi all,
I was wondering if someone could give a brief overview of the pros /
cons of using NRPE to monitor my remote hosts versus using the
check_by_ssh command?
I'm aware that check_by_ssh increases the CPU overhead, but I'm not
clear
Michael Medin wrote:
Kevin Keane skrev:
Wouldn't the SSL certificates provide authentication comparable to
SSH keys? I'm not familiar with how NRPE uses SSL, but I would assume
that you could also use client certificates?
I am no expert but AFAIK it merely encrypts the traffic ie, no
On Mar 25, 2009, at 2:30 PM, RijilV wrote:
2009/3/24 Christopher McAtackney crist...@gmail.com:
Hi all,
I was wondering if someone could give a brief overview of the pros /
cons of using NRPE to monitor my remote hosts versus using the
check_by_ssh command?
I'm aware that check_by_ssh
Charlie Reddington wrote:
On Mar 25, 2009, at 2:30 PM, RijilV wrote:
2009/3/24 Christopher McAtackney crist...@gmail.com:
Hi all,
I was wondering if someone could give a brief overview of the pros /
cons of using NRPE to monitor my remote hosts versus using the
check_by_ssh command?
Kevin Keane skrev:
Michael Medin wrote:
Kevin Keane skrev:
Wouldn't the SSL certificates provide authentication comparable to
SSH keys? I'm not familiar with how NRPE uses SSL, but I would assume
that you could also use client certificates?
I am no expert but AFAIK it merely
Michael Medin wrote:
Kevin Keane skrev:
Michael Medin wrote:
Kevin Keane skrev:
Wouldn't the SSL certificates provide authentication comparable to
SSH keys? I'm not familiar with how NRPE uses SSL, but I would assume
that you could also use client certificates?
I am
Hi all,
I was wondering if someone could give a brief overview of the pros /
cons of using NRPE to monitor my remote hosts versus using the
check_by_ssh command?
I'm aware that check_by_ssh increases the CPU overhead, but I'm not
clear on the level of impact here - does this increase the load on
2009/3/24 Michael Schwartzkopff mi...@multinet.de:
Am Dienstag, 24. März 2009 10:45:08 schrieb Christopher McAtackney:
Hi all,
I was wondering if someone could give a brief overview of the pros /
cons of using NRPE to monitor my remote hosts versus using the
check_by_ssh command?
I'm aware
I think you are comparing apples and oranges here, because in most
situations that I can think of, the decision is dictated by the network
topology. If you are exclusively on a trusted private network,
check_by_ssh really doesn't offer any benefits. Conversely, if your
topology involves the
I'm looking to monitor remote disk, cpu, mem etc and wondering if there's a way
to pick your crypto with nrpe like with nsca? Otherwise thinking check_by_ssh,
don't want to have to deal with all the keying. Is nrpe secure, if so
comparable to ssh?
Thanks,
Jim
24 matches
Mail list logo