-
Notifications
You must be signed in to change notification settings - Fork 132
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Debian - check_nrpe 3.0.1-3 Could not complete SSL handshake (rc=-1 SSL-error=5) #113
Comments
If |
I installed 3.0.1 for testing issue #112. While in there, I discovered that |
I have the same issue, option "-n" does not work. |
@Widmo Did you check the |
Yes, i check it. I had Debian 8, NRPE configured correctly with icinga2 server (doesn't matter) It works:
after upgrade debian do 9
Debian 9 logs:
It look like SSL problem. The same query, without SSL:
|
Same problem like @Widmo, tough with nrpe-server on Ubuntu 17.04 Zesty |
Same problem here. Nagios host is a Debian8 and i have check_nrpe versions 2.* and 3.* |
@jfrickson can we open this issue? Thank You :) |
Same issue as @viyullas :( |
@jfrickson Is no longer available to re-open issues. I'll take a peek when I get a few. |
Likely related to the OpenSSL changes. Can I see the versions of those with problems of your ssl libs used for compiling? |
OpenSSL 1.1.0f 25 May 2017 on Debian 9 (Stretch) |
Before I can get around to this, maybe all of you could check out the following document and see if this can help with a fix for the time being: https://support.nagios.com/kb/article.php?id=519 FYI: this issue is actually related to SSL and not NRPE, if I understand the problem correctly. Thanks! |
When i explicitly mention "ssl_client_certs=0" in my nrpe.cfg it does not work (i never had it mentioned before by the way). But i did not use SSL before at all. So i guess "NRPE" now expects you to use a certificate or there is still a issue with NRPE in regards to SSL? |
I didn't compile the nrpe server, used the one form debian 9 repository. |
@viyullas same here. |
Compiling or installing a distributed package won't make any difference with this issue. It has to do with OpenSSL dropping support for the method we use to initiate anonymous SSL connections. So, the options right now (as I see them) are:
We're actually reviewing our options pretty intensely here, and an actual fix should be incorporated into the codebase shortly. |
Are you planning to update nrpe to stop using the deprecated method? |
Forcing people to use ssl certificates on NRPE communication is a bit harsh, was this changed announced? Or are we mistaken? Like @viyullas said i think a lot of people use NRPE without ssl certificates and this will force a lot of people to reconfigure their whole monitoring environment. |
@imtek - I don't know how many times to say it but this was a change from OpenSSL, NOT NRPE - The ability to use certificates has been present in NRPE for a while now. @viyullas - I am furiously working on trying to get another anonymous method (AECDH) working. As soon as I have a fix I'll push it to the maint branch and issue a statement of some kind to this post. |
@hedenface no problem thank you for explaining, maybe i did not understand it fully. But if you are not using any certificates why would this impact NRPE/Nagios? |
Because something has changed in the newer versions of OpenSSL that are causing the anonymous method we use to stop working. Unfortunately this is the most technical answer I have at this time :) I am working on this as a priority, as it is not only affecting the few of you in this thread, but actually quite a lot more people. I will keep the thread updated with information I find along with any other relevant info. |
Thanks a lot @hedenface |
@skelgaard Yes, but you're still stuck with a truly insecure method of transport unless you use public/private keys. |
well i transport no password or other important info over the nrpe, so if it is secure isn't really a concern... and they all run over private network, so not a problem either. |
I'd like to say that setting up public/private keys would solve the problem as it sits without the need for any recompiling, as long as use_adh is set to 0 everywhere. |
I'm suffering with this issue also on a Debian 8 system upgraded to Debian 9, however even after compiling the latest "maint" branch, I'm still seeing it. I checkout out the git repo, checked out the "maint" branch and ran:
Have I missed a step?
Unfortunately my hosting provider run the Nagios system which interacts with this agent on my server for health-checks, so I can't modify or confirm the Nagios configuration. |
@pandy06269 The maint branch is considered unstable at the moment, as this is where all the changes are going for 3.2.0. I swear it worked at some point yesterday :) |
@pandy06269 It should be fixed (again) via 1715dcd |
NRPE 3.1.1 built with OpenSSL 1.1.0 is now available in stretch-backports for Debian stable users. |
I'm not sure if this is the correct place for this post, might be better When trying to apply 99b0de9 on 3.0.1 as bundled in Stretch I found the
So the upstream patch won't help in this case. After some further digging I think I found the issue. It is By disabling
We skip the following part of the configure script (love the indentation…):
Which includes the definition of
And that is causing the code to disable DH in nrpe.c:
I'm no C programmer and not very good at openssl but I guess that it is |
@theseal See c339ba2 which was committed for #143. And yes, the indentation in the configure script is wonderful. The entire block around the need_dh is as follows:
|
@theseal wrote:
NRPE 3.0.1 fails to build with OpenSSL 1.1.0 in stretch, the support for OpenSSL 1.1.0 was added in NRPE 3.1.x, which is now available in stretch-backports. Both the NRPE 3.0.x & 3.1.x packages have the issue that setting I've updated the Debian package to address this issue in the following revision:
The updates for unstable & stretch-backports have been uploaded and will be available on the mirrors in a few hours. @theseal, can you build the proposed update for stretch and confirm that also fixes the issue for you? |
After getting the new nrpe package from backports the issues still remain for me (running without a certificate) like a lot of people (will move to certificate validation soon). The allowed host is still running Debian Jessie (due to these issues on Stretch). Jul 6 15:41:11 hostname nrpe[14160]: CONN_CHECK_PEER: is this a blessed machine: x.x.x.x port 10971 Am i missing something? |
nagios-nrpe (3.1.1-1~bpo9+1) in stretch-backports doesn't have the SSL support (without certificates configured) hasn't worked with the NRPE 3.x Debian packages, which is why SSL support was disabled by default (with the |
@sebastic hopefully the patch(es) will help with that so that we can upgrade all our jessie machines to stretch, we never enabled SSL on our setup SSL support (without certificates configured) has never been configured on our side (just working without any certificates right now). |
@sebastic Just built the proposed update for stretch and it worked like it should, great work! 👍 |
Upgraded to 3.1.1-1~bpo9+2, no changes for me am i missing something? |
@imtek, if you enable
This is related to the
After restarting the
nagios-nrpe (3.1.1-1~bpo9+3) has been uploaded to stretch-backports which sets the |
Set both options and also upgraded NRPE to 3.1.1-1~bpo9+2, still getting same errors (logfiles identical tho those i pasted yesterday) :( |
@hedenface thanks, hopefully that will get into a Debian package release some day. For now i cannot upgrade any of my Debian machines because of this, moving to ssl certificates is my only option i think (or i hope at least). Ugh ... |
You can upgrade your Debian machines to stretch, but you'll need to disable SSL until the proposed-update is available. I've done this for all my private systems and at $DAYJOB. I've finished testing the proposed-update to confirm that SSL support (without certificates configured) between NRPE 2.x (2.15 on Debian jessie) and NRPE 3.x (3.0.1 & 3.1.1 on Debian stretch and 3.2.0 on Debian unstable) works as expected again. Debian Bug #867567 has been filed to request permission from the Debian stable Release Manager to upload the proposed-update. |
@sebastic how can i disable SSL when i never configured SSL? Thanks! Because -n is already set in de /etc/default file for NRPE. |
The check_nrpe command also needs to use the |
@sebastic you are a champ, a little search and replace on my nagios box and i am up and running again on Stretch! |
I still have a issue on CentOS 7 when applying -n on monitoring probes side, how can i disable ssl on nrpe (of the checked host) on CentOS ? on Debian i can change it in /etc/default/nagios-nrpe-server but in CentOS there is no such file? |
Edit |
In debugging this problem I discovered a change in |
Files with the RedHat/Fedora/CentOS work similiarly with upgrades where the files use the |
nagios-nrpe (3.0.1-3+deb9u1) with the fix for this issue has been released as part of the Debian 9.1 stable update. The updated package also enables SSL support by default again too. |
@sebastic Seems to work fine over here, thanks! |
On stable Debian 8.7, I installed:
When I try to connect to the NRPE server:
Without SSL (-n option)
Client:
Server:
With SSL
Client:
Server:
What I tried:
ssl_logging
level (I read on another issue that it had lead to a segfault). Same errorssl_*
variables). Same errorMore details
Nagios host:
Server host:
I am on the same network, with no firewall on the path
The text was updated successfully, but these errors were encountered: