Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[nrpe/ssl] manage ssl protocols even if ssl authentication is unused #60

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

ymartin-ovh
Copy link

Pull Request (PR) description

I want to be able to configure ssl protocol settings even if I don't use ssl cert authentication.
SSL directive can be included all time even if daemon is started with no-ssl flag.

This Pull Request (PR) fixes the following issues

@ymartin-ovh ymartin-ovh force-pushed the dev/yannick.martin/ssl-cert-not-required branch 11 times, most recently from 80279f6 to 574e241 Compare October 25, 2021 13:29
@ymartin-ovh
Copy link
Author

ymartin-ovh commented Nov 2, 2021

Hello @smortex / @bastelfreak / @alexjfisher

I submit this patch to allow nagios ssl tuning even if we don't want to use ssl authentication.
Is it ok for you ?

Regards

@ymartin-ovh
Copy link
Author

ymartin-ovh commented Apr 15, 2022

Hello

Do I need to fix something ?

Regards

Copy link
Member

@smortex smortex left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Some minor comments. I am not a user of this module so take this with a grain of salt if it does not make sense in this context 😉

Comment on lines 156 to 160
'DHE-RSA-AES256-SHA256',
'DHE-RSA-AES256-SHA256'
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This does not look right. I would expect CI to catch this (we want trailing comas)… weird… can you revert it?

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I will fix this.

group => $nrpe::nrpe_group,
mode => '0640',
content => $nrpe::ssl_privatekey_file_content,
if $nrpe::ssl_cert_file_content {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The condition being on $nrpe::ssl_cert_file_content only looks odd. Regarding TLS in general, I would expect that either CA+Cert+Key are provided or none of them, and anything else is invalid and raise an error. Some systems might have an optional CA / CRL. Here the certificate without a key looks odd.

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I simply move if condition check from parent file to this one.

… unused

enable ADH to address issue with openssl-1.1 and default module SSL cipher suite
@ymartin-ovh ymartin-ovh force-pushed the dev/yannick.martin/ssl-cert-not-required branch from 574e241 to 0a433be Compare May 11, 2022 15:48
@ymartin-ovh
Copy link
Author

Hello,

Is there anything against this contrib ?

Regards

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants