[Xymon] Xymon security concern raised

Ralph Mitchell ralphmitchell at gmail.com
Sat Dec 8 05:36:40 CET 2012


iptables on the xymon server could allow a list or range of IP addresses
and/or block any address outside the segments that contain servers you want
to allow.  That can be implemented right now, outside xymon, to limit the
risk.

Ralph Mitchell


On Fri, Dec 7, 2012 at 10:41 PM, Shawn Heisey <hobbit at elyograg.org> wrote:

> On 12/5/2012 1:38 PM, Novosielski, Ryan wrote:
>
>> -----BEGIN PGP SIGNED MESSAGE-----
>> Hash: SHA1
>>
>> My understanding is that it's fairly easy to do, also. I don't know if
>> having a proxy in between helps at all or any of that, but my
>> understanding is that what's sent is fairly simple and plain text (I
>> believe there's info about the protocol in the manual).
>>
>> That said, I'm not 100% sure what nefarious thing someone could do
>> with that information. I guess they could open the rlogin port or
>> something and then send a status message to indicate it's still closed?
>>
>
> Nefarious users can create false alarms that must be investigated.  They
> can "drop" your host entries and therefore wipe out incredible amounts of
> RRD graph history.  If you have tests with delayed notification, it would
> be possible to prevent notifications on real alarm conditions.  There are
> probably other nasty things I haven't thought of.
>
> Thanks,
> Shawn
>
>
> ______________________________**_________________
> Xymon mailing list
> Xymon at xymon.com
> http://lists.xymon.com/**mailman/listinfo/xymon<http://lists.xymon.com/mailman/listinfo/xymon>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.xymon.com/pipermail/xymon/attachments/20121207/81acee70/attachment.html>


More information about the Xymon mailing list