Re: [Shinken-devel] Authentification between daemons

2011-01-14 Thread nap
2011/1/14 Grégory Starck > > > Le 14 janvier 2011 12:40, Grégory Starck a écrit : > > 2011/1/14 Laurent Guyon >> >> Le vendredi 14 janvier 2011 à 10:58 +0100, Hartmut Goebel a écrit : >>> >>> > Yes, and send the password unencrypted. *gnaa* >>> >>> A channel can be encrypted but not authenticat

Re: [Shinken-devel] Authentification between daemons

2011-01-14 Thread Grégory Starck
Le 14 janvier 2011 12:40, Grégory Starck a écrit : > 2011/1/14 Laurent Guyon > > Le vendredi 14 janvier 2011 à 10:58 +0100, Hartmut Goebel a écrit : >> >> > Yes, and send the password unencrypted. *gnaa* >> >> A channel can be encrypted but not authenticated ^^ > > >> Laurent >> >> > > Hi, > > I

Re: [Shinken-devel] Authentification between daemons

2011-01-14 Thread Grégory Starck
2011/1/14 Laurent Guyon > Le vendredi 14 janvier 2011 à 10:58 +0100, Hartmut Goebel a écrit : > > > Yes, and send the password unencrypted. *gnaa* > > A channel can be encrypted but not authenticated ^^ > Laurent > > Hi, I followed this thread quite "diagonally" (so sorry if this reply looks

Re: [Shinken-devel] Authentification between daemons

2011-01-14 Thread Laurent Guyon
Le vendredi 14 janvier 2011 à 10:58 +0100, Hartmut Goebel a écrit : > Yes, and send the password unencrypted. *gnaa* A channel can be encrypted but not authenticated ^^ Laurent -- Protect Your Site and Customers from

Re: [Shinken-devel] Authentification between daemons

2011-01-14 Thread Flyinvap
Le 14/01/2011 10:59, Hartmut Goebel a écrit : > But nevertheless please stop full-quoting. Thanks! And HTML posting and this list would become readable ;-) Thanks ! -- Fly -- Protect Your Site and Customers from Malware

Re: [Shinken-devel] Authentification between daemons

2011-01-14 Thread nap
On Fri, Jan 14, 2011 at 10:58 AM, Hartmut Goebel wrote: > Am 14.01.2011 10:55, schrieb nap: > > Oh sound fun and quite useful. Can be an arbiter module. The arbiter > > should open a "non ssl" port so others can connect, and then ask/send > > passphrase and get the certificate. I add it in the id

Re: [Shinken-devel] Authentification between daemons

2011-01-14 Thread Hartmut Goebel
Am 14.01.2011 10:56, schrieb nap: > I hope realms and all the distributed features are considered as > "enterprise grade" features too ;) Of course. I should have written "another". But nevertheless please stop full-quoting. Thanks! -- Schönen Gruß - Regards Hartmut Goebel Dipl.-Informatiker (u

Re: [Shinken-devel] Authentification between daemons

2011-01-14 Thread Hartmut Goebel
Am 14.01.2011 10:55, schrieb nap: > Oh sound fun and quite useful. Can be an arbiter module. The arbiter > should open a "non ssl" port so others can connect, and then ask/send > passphrase and get the certificate. I add it in the ideas + trac to > see if people are interesting in it :) Yes, and s

Re: [Shinken-devel] Authentification between daemons

2011-01-14 Thread nap
I hope realms and all the distributed features are considered as "enterprise grade" features too ;) Jean On Fri, Jan 14, 2011 at 10:38 AM, Hartmut Goebel wrote: > Am 14.01.2011 10:37, schrieb Laurent Guyon: > > Perhaps such a thing could be sexy in the future, so you only create the > > CA on

Re: [Shinken-devel] Authentification between daemons

2011-01-14 Thread nap
On Fri, Jan 14, 2011 at 10:37 AM, Laurent Guyon wrote: > Le vendredi 14 janvier 2011 à 09:52 +0100, nap a écrit : > > > Yes it's true. I'll update the "security" chapter of the > > documentation. But with lazy admin, you can't have security. No matter > > what the application does, the worse the a

Re: [Shinken-devel] Authentification between daemons

2011-01-14 Thread Hartmut Goebel
Am 14.01.2011 10:37, schrieb Laurent Guyon: > Perhaps such a thing could be sexy in the future, so you only create the > CA on the arbiter (done by distro package why not), and all other steps > (server certificates creation and distribution) are done automagically ? Hey, you are proposing "enterpr

Re: [Shinken-devel] Authentification between daemons

2011-01-14 Thread Laurent Guyon
Le vendredi 14 janvier 2011 à 09:52 +0100, nap a écrit : > Yes it's true. I'll update the "security" chapter of the > documentation. But with lazy admin, you can't have security. No matter > what the application does, the worse the admin is, the worse the > system will be :) > > With this way of

Re: [Shinken-devel] Authentification between daemons

2011-01-14 Thread nap
On Fri, Jan 14, 2011 at 9:42 AM, Laurent Guyon wrote: > > > The current code use certificates, so what certif did you give to your > > rogue arbiter? The sample cetifs are just samples. Every one got the > > same, so they are not good for authentification. I put a doc about how > > create new ones

Re: [Shinken-devel] Authentification between daemons

2011-01-14 Thread Laurent Guyon
> The current code use certificates, so what certif did you give to your > rogue arbiter? The sample cetifs are just samples. Every one got the > same, so they are not good for authentification. I put a doc about how > create new ones in the wiki. The only problem I see is precisely supplying a f

Re: [Shinken-devel] Authentification between daemons

2011-01-13 Thread nap
The current code use certificates, so what certif did you give to your rogue arbiter? The sample cetifs are just samples. Every one got the same, so they are not good for authentification. I put a doc about how create new ones in the wiki. I think we won't go any thurser that X50 certificates, if

Re: [Shinken-devel] Authentification between daemons

2011-01-13 Thread Gerhard Lausser
Hi, > In the same way, imho, securing the livestatus module socket > should be thought about (for example limiting hosts/IP that > can send requests), against malveillant users that could send > external commands or malformed requests (DoS). that's true, but i don't think this belongs into the

[Shinken-devel] Authentification between daemons

2011-01-13 Thread Laurent Guyon
Hi Jean, I just seen on git that you have begin to work on securing communications using SSL. My question : will the SSL be used only to encrypt communications, or also to make some authentication between daemons to secure the infrastructure ? Because I've made some experiments today and actuall