Menu

NCSA Passive check password prob w/NC_Net v5

Elias Ross
2011-08-25
2013-04-25
  • Elias Ross

    Elias Ross - 2011-08-25

    I have configured NCSA checks and they are "working" in that data is being sent from my client to the server…

    Aug 25 19:40:54 opsdev002 nsca: Handling the connection…
    Aug 25 19:40:55 opsdev002 nsca: Received invalid packet type/version from client - possibly due to client using wrong password or crypto algorithm?

    I have configured the same password on both sides, as well as XOR encryption…

    startup.cfg
    pass_passive aaa
    encrip_passive 1

    On Nagios side:
    nsca.cfg
    password=aaa
    decryption_method=1

    I looked at the Wireshark dump (network tool) and do see the packets encrypted (I see them decrypted if I turn off the option), so I don't really know what's going on… The problem could be a version mismatch.

    $ rpm -query -a | grep nsca
    nagios-nsca-2.7.2-2.el5.rf
    nagios-nsca-client-2.7.2-2.el5.rf

     
  • Elias Ross

    Elias Ross - 2011-08-25

    I tested using "send_ncsa" (a perl script) I downloaded from http://search.cpan.org/~dougdude/Net-NSCA-Client-0.006/lib/Net/NSCA/Client.pm
    and it sends successfully using encrypted XOR and the password above.

    I guess my questions are:
    1. What's possibly wrong with my configuration?
    2. Is there a version or compatibility issue?
    2. Is there source code I can look at to see what's actually going on?

     

Log in to post a comment.

Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.