Question

NSclient++ web server vulnerabilities

  • 29 September 2023
  • 1 reply
  • 142 views

Badge +1

Hello everyone,

Do you know, how could I block in nsclient++ for the web server (host: 8443) the protocol SSL/TLS and the cipher suites?

I have tried several configuration, but I still have the sames vulnerabilities.

I saw that is possible using NRPE using:

[/settings/NRPE/server]

use ssl = true
insecure = false
ssl options = no-sslv2,no-sslv3,no-tlsv1.0,no-tlsv1.1
allowed ciphers=HIGH:!aNULL:!MD5:!3DES

But like i said i’m using [/settings/WEB/server] for the restapi monitoring

But that don’t work

Do you have a solution?

Best regards


1 reply

Userlevel 5
Badge +14

Hello

sorry but you won’t find a solution with NSClient, the software is no longer updated/maintained and nothing in the code has been done for the “webserver” to be able to use these parameters.

 

there is a NSClient alternative (I still need to try it) : snclient ConSol-Monitoring/snclient: SNClient+ - Cross platform monitoring agent (github.com)

it support the restapi for checks, and is being implemented (not fully as you can see on the git, a few windows check are missing)

 

as I’ve said, I have not yet tried this, but will soon

Reply