Path to this page:
./
net/nagios-nrpe,
Nagios remote program execution daemon
Branch: CURRENT,
Version: 4.1.0nb1,
Package name: nagios-nrpe-4.1.0nb1,
Maintainer: pkgsrc-usersThis Nagios addon is designed to provide a way for executing plugins on
a remote host. The check_nrpe plugin runs on the Nagios host and is used
to send plugin execution requests to the nrpe agent on the remote
host. The nrpe agent will then run an appropriate plugins on the
remote host and return the plugin output and return code to the
check_nrpe plugin on the Nagios host.
Required to run:[
security/openssl]
Required to build:[
pkgtools/cwrappers]
Package options: ssl, tcpwrappers
Master sites:
Filesize: 515.848 KB
Version history: (Expand)
- (2023-10-25) Updated to version: nagios-nrpe-4.1.0nb1
- (2023-05-30) Updated to version: nagios-nrpe-4.1.0
- (2022-06-28) Updated to version: nagios-nrpe-3.2.0nb7
- (2021-05-25) Updated to version: nagios-nrpe-3.2.0nb6
- (2020-09-01) Updated to version: nagios-nrpe-3.2.0nb5
- (2020-01-19) Updated to version: nagios-nrpe-3.2.0nb4
CVS history: (Expand)
2023-10-25 00:11:51 by Thomas Klausner | Files touched by this commit (2298) |
Log message:
*: bump for openssl 3
|
2023-05-30 12:45:30 by Mark Davies | Files touched by this commit (2) | |
Log message:
nagios-nrpe: update to 4.1.0
4.1.0 - 2022-06-??
------------------
**ENHANCEMENTS**
- Add support for OpenSSL 3 (and EL9/Debian 11/Ubuntu 22)
- Allow tcpd/libwrap to be excluded from build when present on the system
- Allow loading of full certificate chains
- Change -u (connection issues return UNKNOWN) to include all SSL-layer failures.
- Disable renegotiation and enforce server cipher order when using SSL
- Verify that private keys match certificates when using SSL
**FIXES**
- Fixed incorrect default for nasty_metachars in nrpe.cfg
- Fixed incorrect help text for --use-adh
- Fixed potential out-of-bound read when used with IPv6
[4.0.3] - 2020-04-28
----------------------------------------------------------------------------
**FIXES**
- Fixed nasty_metachars not being read from config file (Sebastian Wolf)
[4.0.2] - 2020-03-11
----------------------------------------------------------------------------
**FIXES**
- Fixed buffer length calculations/writing past memory boundaries on some
systems (Andreas Baumann, hariwe, Sebastian Wolf)
- Fixed use of uninitialized variable when validating requests (hariwe, \
Sebastian Wolf)
[4.0.1] - 2020-01-22
----------------------------------------------------------------------------
**FIXES**
* Fixed syslog flooding with CRC-checking errors when both plugin and agent
were updated to version 4 (Sebastian Wolf)
[4.0.0] - 2019-01-13
----------------------------------------------------------------------------
Note: This update includes security fixes which affect both the check_nrpe
plugin and the NRPE daemon. The latest version of NRPE is still able to
interoperate with previous versions, but for best results, both programs
should be updated.
**ENHANCEMENTS**
* Added TLSv1.3 and TLSv1.3+ support for systems that have it (Nigel Yong, Rahul \
Golam)
* Added IPv6 ip address to list of default allow_from hosts (Troy Lea)
* Added -D option to disable logging to syslog (Tom Griep, Sebastian Wolf)
* Added -3 option to force check_nrpe to use NRPE v3 packets
* OpenRC: provide a default path for nrpe.cfg (Michael Orlitzky)
* OpenRC: Use RC_SVCNAME over a hard-coded PID file (j-licht)
**FIXES**
* Checks for '!' now only occur inside the command buffer (Joni Eskelinen)
* NRPE daemon is more resilient to DOS attacks (Leonid Vasiliev)
* allowed_hosts will no longer test getaddrinfo records against the wrong protocol
(dombenson)
* nasty_metachars will now handle C escape sequences properly when specified in the
config file (Sebastian Wolf)
* Calculated packet sizes now struct padding/alignment when sending and receiving
messages (Sebastian Wolf)
* Buffer sizes are now checked before use in packet size calculation (Sebastian Wolf)
* When using `include_dir`, individual files' errors do not prevent the remaining
files from being read (Sebastian Wolf)
[3.2.1] - 2017-08-31
----------------------------------------------------------------------------
**FIXES**
* Change seteuid error messages to warning/debug (Bryan Heden)
* Fix segfault when no nrpe_user is specified (Stephen Smoogen, Bryan Heden)
* Added additional strings to error messages to remove duplicates (Bryan Heden)
* Fix nrpe.spec for rpmbuild (Bryan Heden)
* Fix error for drop_privileges when using inetd (xalasys-luc, Bryan Heden)
|
2022-06-28 13:38:00 by Thomas Klausner | Files touched by this commit (3952) |
Log message:
*: recursive bump for perl 5.36
|
2021-10-26 13:07:15 by Nia Alarie | Files touched by this commit (958) |
Log message:
net: Replace RMD160 checksums with BLAKE2s checksums
All checksums have been double-checked against existing RMD160 and
SHA512 hashes
Not committed (merge conflicts...):
net/radsecproxy/distinfo
The following distfiles could not be fetched (fetched conditionally?):
./net/citrix_ica/distinfo citrix_ica-10.6.115659/en.linuxx86.tar.gz
./net/djbdns/distinfo dnscache-1.05-multiple-ip.patch
./net/djbdns/distinfo djbdns-1.05-test28.diff.xz
./net/djbdns/distinfo djbdns-1.05-ignoreip2.patch
./net/djbdns/distinfo djbdns-1.05-multiip.diff
./net/djbdns/distinfo djbdns-cachestats.patch
|
2021-10-07 16:43:07 by Nia Alarie | Files touched by this commit (962) |
Log message:
net: Remove SHA1 hashes for distfiles
|
2021-05-24 21:56:06 by Thomas Klausner | Files touched by this commit (3575) |
Log message:
*: recursive bump for perl 5.34
|
2020-08-31 20:13:29 by Thomas Klausner | Files touched by this commit (3631) |
Log message:
*: bump PKGREVISION for perl-5.32.
|
2020-01-18 22:51:16 by Jonathan Perkin | Files touched by this commit (1836) |
Log message:
*: Recursive revision bump for openssl 1.1.1.
|