Your message dated Sun, 04 Dec 2016 18:03:23 +0000
with message-id <[email protected]>
and subject line Bug#547092: fixed in nagios-nrpe 3.0.1-1~exp1
has caused the Debian Bug report #547092,
regarding nagios-nrpe-server: Insecure 'SSL' option, key identical for all 
debian systems
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
547092: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=547092
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: nagios-nrpe-server
Version: <= 2.12
Severity: important
Tags: patch

The SSL option of the NRPE plugin and server does not perform any kind of 
authentication. It has no certificates, only a DH key, which is generated at 
compile time.

This means that the nrpe key is identical to all debian systems, but subject to 
change every time the package maintainer uses the  ./configure script.

My patch adds full SSL certificate verification to nrpe. Note that this breaks 
backwards commandline compatibility, because the previous mode was insecure. 
This means that the check_nrpe rules must be edited in the nagios configuration 
as well.




-- System Information:
Debian Release: 5.0.3
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.30-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
diff -urN nagios-nrpe-2.12/src/check_nrpe.c nagios-nrpe-2.12.fullssl/src/check_nrpe.c
--- nagios-nrpe-2.12/src/check_nrpe.c	2008-03-10 22:04:43.000000000 +0100
+++ nagios-nrpe-2.12.fullssl/src/check_nrpe.c	2009-09-17 02:41:42.000000000 +0200
@@ -38,10 +38,12 @@
 int show_version=FALSE;
 
 #ifdef HAVE_SSL
-SSL_METHOD *meth;
 SSL_CTX *ctx;
 SSL *ssl;
 int use_ssl=TRUE;
+char *cert_file=NULL;
+char *cacert_file=NULL;
+char *privatekey_file=NULL;
 #else
 int use_ssl=FALSE;
 #endif
@@ -77,25 +79,28 @@
 		printf("Last Modified: %s\n",MODIFICATION_DATE);
 		printf("License: GPL v2 with exemptions (-l for more info)\n");
 #ifdef HAVE_SSL
-		printf("SSL/TLS Available: Anonymous DH Mode, OpenSSL 0.9.6 or higher required\n");
+		printf("SSL/TLS Available, OpenSSL 0.9.6 or higher required\n");
 #endif
 		printf("\n");
 	        }
 
 	if(result!=OK || show_help==TRUE){
 
-		printf("Usage: check_nrpe -H <host> [-n] [-u] [-p <port>] [-t <timeout>] [-c <command>] [-a <arglist...>]\n");
+		printf("Usage: check_nrpe -H <host> -C <certificate> -k <key> -r <ca-certificate> [-n] [-u] [-p <port>] [-t <timeout>] [-c <command>] [-a <arglist...>]\n");
 		printf("\n");
 		printf("Options:\n");
-		printf(" -n         = Do no use SSL\n");
-		printf(" -u         = Make socket timeouts return an UNKNOWN state instead of CRITICAL\n");
-		printf(" <host>     = The address of the host running the NRPE daemon\n");
-		printf(" [port]     = The port on which the daemon is running (default=%d)\n",DEFAULT_SERVER_PORT);
-		printf(" [timeout]  = Number of seconds before connection times out (default=%d)\n",DEFAULT_SOCKET_TIMEOUT);
-		printf(" [command]  = The name of the command that the remote daemon should run\n");
-		printf(" [arglist]  = Optional arguments that should be passed to the command.  Multiple\n");
-		printf("              arguments should be separated by a space.  If provided, this must be\n");
-		printf("              the last option supplied on the command line.\n");
+		printf(" -n               = Do no use SSL\n");
+		printf(" -u               = Make socket timeouts return an UNKNOWN state instead of CRITICAL\n");
+		printf(" <host>           = The address of the host running the NRPE daemon\n");
+		printf(" <certificate>    = The client certificate to use\n");
+		printf(" <ca-certificate> = The client certificate to use\n");
+		printf(" <key>            = The private key to be used with the certificate\n");
+		printf(" [port]           = The port on which the daemon is running (default=%d)\n",DEFAULT_SERVER_PORT);
+		printf(" [timeout]        = Number of seconds before connection times out (default=%d)\n",DEFAULT_SOCKET_TIMEOUT);
+		printf(" [command]        = The name of the command that the remote daemon should run\n");
+		printf(" [arglist]        = Optional arguments that should be passed to the command.  Multiple\n");
+		printf("                    arguments should be separated by a space. If provided, this must be\n");
+		printf("                    the last option supplied on the command line.\n");
 		printf("\n");
 		printf("Note:\n");
 		printf("This plugin requires that you have the NRPE daemon running on the remote host.\n");
@@ -121,11 +126,10 @@
 #ifdef HAVE_SSL
 	/* initialize SSL */
 	if(use_ssl==TRUE){
-		SSL_library_init();
-		SSLeay_add_ssl_algorithms();
-		meth=SSLv23_client_method();
 		SSL_load_error_strings();
-		if((ctx=SSL_CTX_new(meth))==NULL){
+		SSL_library_init();
+		ctx = SSL_CTX_new(SSLv23_client_method());
+		if(ctx == NULL){
 			printf("CHECK_NRPE: Error - could not create SSL context.\n");
 			exit(STATE_CRITICAL);
 		        }
@@ -133,6 +137,19 @@
 		/* ADDED 01/19/2004 */
 		/* use only TLSv1 protocol */
 		SSL_CTX_set_options(ctx,SSL_OP_NO_SSLv2 | SSL_OP_NO_SSLv3);
+
+		if (SSL_CTX_use_certificate_file(ctx, cert_file, SSL_FILETYPE_PEM) <= 0) {
+			ERR_print_errors_fp(stderr);
+			exit(1);
+			}
+		if (SSL_CTX_use_PrivateKey_file(ctx, privatekey_file, SSL_FILETYPE_PEM) <= 0) {
+			ERR_print_errors_fp(stderr);
+			exit(1);
+			}
+		if (SSL_CTX_load_verify_locations(ctx, cacert_file, NULL) <= 0) {
+			ERR_print_errors_fp(stderr);
+			exit(1);
+			}
                 }
 #endif
 
@@ -149,7 +166,9 @@
 	/* do SSL handshake */
 	if(result==STATE_OK && use_ssl==TRUE){
 		if((ssl=SSL_new(ctx))!=NULL){
-			SSL_CTX_set_cipher_list(ctx,"ADH");
+			X509 *peer;
+			char peer_CN[256];
+
 			SSL_set_fd(ssl,sd);
 			if((rc=SSL_connect(ssl))!=1){
 				printf("CHECK_NRPE: Error - Could not complete SSL handshake.\n");
@@ -165,7 +184,24 @@
 #endif
 				result=STATE_CRITICAL;
 			        }
-		        }
+			if ((peer = SSL_get_peer_certificate(ssl))) {
+				if (SSL_get_verify_result(ssl) != X509_V_OK) {
+					printf("CHECK_NRPE: Error - Failed to verify server certificate.\n");
+					result = STATE_CRITICAL;
+					}
+				X509_NAME_get_text_by_NID(X509_get_subject_name(peer),
+						NID_commonName, peer_CN, sizeof(peer_CN));
+				if (strcmp(peer_CN, server_name) != 0) {
+					printf("CHECK_NRPE: Error - Common Name in server certificate does not match host name.\n");
+					result = STATE_CRITICAL;
+					}
+				free(peer);
+				}
+			else {
+				printf("CHECK_NRPE: Error - Failed to get peer certificate.\n");
+				result = STATE_CRITICAL;
+				}
+			}
 		else{
 			printf("CHECK_NRPE: Error - Could not create SSL connection structure.\n");
 			result=STATE_CRITICAL;
@@ -184,7 +220,7 @@
 	if(result==STATE_OK){
 
 		/* clear the packet buffer */
-		bzero(&send_packet,sizeof(send_packet));
+		memset(&send_packet, 0, sizeof(send_packet));
 
 		/* fill the packet with semi-random data */
 		randomize_buffer((char *)&send_packet,sizeof(send_packet));
@@ -257,7 +293,7 @@
 
 		/* receive underflow */
 		else if(bytes_to_recv<sizeof(receive_packet)){
-			printf("CHECK_NRPE: Receive underflow - only %d bytes received (%d expected).\n",bytes_to_recv,sizeof(receive_packet));
+			printf("CHECK_NRPE: Receive underflow - only %d bytes received (%ld expected).\n",bytes_to_recv,sizeof(receive_packet));
 			return STATE_UNKNOWN;
 		        }
 
@@ -321,6 +357,9 @@
 	static struct option long_options[]={
 		{"host", required_argument, 0, 'H'},
 		{"command", required_argument, 0, 'c'},
+		{"ca-certificate", required_argument, 0, 'r'},
+		{"certificate", required_argument, 0, 'C'},
+		{"privatekey", required_argument, 0, 'k'},
 		{"args", required_argument, 0, 'a'},
 		{"no-ssl", no_argument, 0, 'n'},
 		{"unknown-timeout", no_argument, 0, 'u'},
@@ -336,7 +375,7 @@
 	if(argc<2)
 		return ERROR;
 
-	snprintf(optchars,MAX_INPUT_BUFFER,"H:c:a:t:p:nuhl");
+	snprintf(optchars,MAX_INPUT_BUFFER,"H:C:k:r:c:a:t:p:nuhl");
 
 	while(1){
 #ifdef HAVE_GETOPT_LONG
@@ -373,6 +412,15 @@
 		case 'H':
 			server_name=strdup(optarg);
 			break;
+		case 'C':
+			cert_file=strdup(optarg);
+			break;
+		case 'r':
+			cacert_file=strdup(optarg);
+			break;
+		case 'k':
+			privatekey_file=strdup(optarg);
+			break;
 		case 'c':
 			command_name=strdup(optarg);
 			break;
@@ -414,6 +462,8 @@
 	if(server_name==NULL && show_help==FALSE && show_version==FALSE  && show_license==FALSE)
 		return ERROR;
 
+	if ((cert_file==NULL || cacert_file==NULL || privatekey_file==NULL) && use_ssl && show_help==FALSE && show_version==FALSE && show_license==FALSE)
+		return ERROR;
 
 	return OK;
         }
diff -urN nagios-nrpe-2.12/src/nrpe.c nagios-nrpe-2.12.fullssl/src/nrpe.c
--- nagios-nrpe-2.12/src/nrpe.c	2008-03-10 22:04:43.000000000 +0100
+++ nagios-nrpe-2.12.fullssl/src/nrpe.c	2009-09-17 02:08:11.000000000 +0200
@@ -24,7 +24,7 @@
 #include "../include/utils.h"
 
 #ifdef HAVE_SSL
-#include "../include/dh.h"
+#include <ssl.h>
 #endif
 
 #ifdef HAVE_LIBWRAP
@@ -33,7 +33,6 @@
 #endif
 
 #ifdef HAVE_SSL
-SSL_METHOD *meth;
 SSL_CTX *ctx;
 int use_ssl=TRUE;
 #else
@@ -56,6 +55,11 @@
 int     connection_timeout=DEFAULT_CONNECTION_TIMEOUT;
 char    *command_prefix=NULL;
 
+/* SSL/TLS additions */
+char	*cert_file=NULL;
+char	*cacert_file=NULL;
+char	*privatekey_file=NULL;
+
 command *command_list=NULL;
 
 char    *nrpe_user=NULL;
@@ -87,11 +91,6 @@
 	int x;
 	char buffer[MAX_INPUT_BUFFER];
 	char *env_string=NULL;
-#ifdef HAVE_SSL
-	DH *dh;
-	char seedfile[FILENAME_MAX];
-	int i,c;
-#endif
 
 	/* set some environment variables */
 	asprintf(&env_string,"NRPE_MULTILINESUPPORT=1");
@@ -206,46 +205,40 @@
 #ifdef HAVE_SSL
 	/* initialize SSL */
 	if(use_ssl==TRUE){
-		SSL_library_init();
-		SSLeay_add_ssl_algorithms();
-		meth=SSLv23_server_method();
 		SSL_load_error_strings();
+		SSL_library_init();
 
-		/* use week random seed if necessary */
-		if(allow_weak_random_seed && (RAND_status()==0)){
-
-			if(RAND_file_name(seedfile,sizeof(seedfile)-1))
-				if(RAND_load_file(seedfile,-1))
-					RAND_write_file(seedfile);
-
-			if(RAND_status()==0){
-				syslog(LOG_ERR,"Warning: SSL/TLS uses a weak random seed which is highly discouraged");
-				srand(time(NULL));
-				for(i=0;i<500 && RAND_status()==0;i++){
-					for(c=0;c<sizeof(seedfile);c+=sizeof(int)){
-						*((int *)(seedfile+c))=rand();
-					        }
-					RAND_seed(seedfile,sizeof(seedfile));
-					}
-				}
-			}
-
-		if((ctx=SSL_CTX_new(meth))==NULL){
+		ctx = SSL_CTX_new(SSLv23_server_method());
+		if (ctx == NULL) {
 			syslog(LOG_ERR,"Error: could not create SSL context.\n");
+			SSL_CTX_free(ctx);
 			exit(STATE_CRITICAL);
-		        }
+			}
 
 		/* ADDED 01/19/2004 */
 		/* use only TLSv1 protocol */
 		SSL_CTX_set_options(ctx,SSL_OP_NO_SSLv2 | SSL_OP_NO_SSLv3);
 
-		/* use anonymous DH ciphers */
-		SSL_CTX_set_cipher_list(ctx,"ADH");
-		dh=get_dh512();
-		SSL_CTX_set_tmp_dh(ctx,dh);
-		DH_free(dh);
+		if(!SSL_CTX_use_certificate_file(ctx, cert_file, SSL_FILETYPE_PEM)) {
+			SSL_CTX_free(ctx);
+			syslog(LOG_ERR, "Error: could not use certificate file '%s'.\n", cert_file);
+			exit(STATE_CRITICAL);
+			}
+		if (!SSL_CTX_use_PrivateKey_file(ctx, privatekey_file, SSL_FILETYPE_PEM)) {
+			SSL_CTX_free(ctx);
+			syslog(LOG_ERR, "Error: could not use private key file '%s'.\n", privatekey_file);
+			exit(STATE_CRITICAL);
+			}
+		SSL_CTX_set_verify(ctx, SSL_VERIFY_PEER | SSL_VERIFY_FAIL_IF_NO_PEER_CERT, NULL);
+		if (!SSL_CTX_load_verify_locations(ctx, cacert_file, NULL)) {
+			SSL_CTX_free(ctx);
+			syslog(LOG_ERR, "Error: could not use CA certificate '%s'.\n", cacert_file);
+			exit(STATE_CRITICAL);
+			}
+		
 		if(debug==TRUE)
 			syslog(LOG_INFO,"INFO: SSL/TLS initialized. All network traffic will be encrypted.");
+
 	        }
 	else{
 		if(debug==TRUE)
@@ -502,6 +495,15 @@
 		else if(!strcmp(varname,"pid_file"))
 			pid_file=strdup(varvalue);
 
+		else if(!strcmp(varname,"cert_file"))
+			cert_file=strdup(varvalue);
+		
+		else if(!strcmp(varname,"cacert_file"))
+			cacert_file=strdup(varvalue);
+
+		else if(!strcmp(varname,"privatekey_file"))
+			privatekey_file=strdup(varvalue);
+
 		else if(!strcmp(varname,"log_facility")){
 			if((get_log_facility(varvalue))==OK){
 				/* re-open log using new facility */
@@ -698,7 +700,7 @@
 	struct sockaddr_in *nptr;
 	struct sockaddr addr;
 	int rc;
-	int sock, new_sd;
+	int sock, new_sd=0;
 	socklen_t addrlen;
 	pid_t pid;
 	int flag=1;
@@ -730,7 +732,7 @@
 
 	myname.sin_family=AF_INET;
 	myname.sin_port=htons(server_port);
- 	bzero(&myname.sin_zero,8);
+ 	memset(&myname.sin_zero, 0, 8);
 
 	/* what address should we bind to? */
         if(!strlen(server_address))
@@ -1087,7 +1089,7 @@
 		rc=recvall(sock,(char *)&receive_packet,&bytes_to_recv,socket_timeout);
 #ifdef HAVE_SSL
 	else{
-                while(((rc=SSL_read(ssl,&receive_packet,bytes_to_recv))<=0) && (SSL_get_error(ssl,rc)==SSL_ERROR_WANT_READ));
+	        while(((rc=SSL_read(ssl,&receive_packet,bytes_to_recv))<=0) && (SSL_get_error(ssl,rc)==SSL_ERROR_WANT_READ));
 		}
 #endif
 
@@ -1245,7 +1247,7 @@
 		buffer[strlen(buffer)-1]='\x0';
 
 	/* clear the response packet buffer */
-	bzero(&send_packet,sizeof(send_packet));
+	memset(&send_packet, 0, sizeof(send_packet));
 
 	/* fill the packet with semi-random data */
 	randomize_buffer((char *)&send_packet,sizeof(send_packet));


--- End Message ---
--- Begin Message ---
Source: nagios-nrpe
Source-Version: 3.0.1-1~exp1

We believe that the bug you reported is fixed in the latest version of
nagios-nrpe, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Bas Couwenberg <[email protected]> (supplier of updated nagios-nrpe package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sun, 04 Dec 2016 18:36:54 +0100
Source: nagios-nrpe
Binary: nagios-nrpe-server nagios-nrpe-plugin
Architecture: source amd64
Version: 3.0.1-1~exp1
Distribution: experimental
Urgency: medium
Maintainer: Debian Nagios Maintainer Group 
<[email protected]>
Changed-By: Bas Couwenberg <[email protected]>
Description:
 nagios-nrpe-plugin - Nagios Remote Plugin Executor Plugin
 nagios-nrpe-server - Nagios Remote Plugin Executor Server
Closes: 547092 660583 662247 662249 728218 755507 756410 756414 773441 775924 
834857 843805
Changes:
 nagios-nrpe (3.0.1-1~exp1) experimental; urgency=medium
 .
   [ Alexander Wirt ]
   * Sync uploaders with reality.
     (closes: #773441)
 .
   [ Bas Couwenberg ]
   * New upstream release.
     - Reworked SSL/TLS. See the README.SSL.md file for full info.
     (closes: #547092)
   * Add myself to Uploaders.
   * Add Vcs-* fields to control file.
     (closes: #755507)
   * Change nagios-plugins dependencies to monitoring-plugins.
   * Switch from dpatch to source format 3.0 (quilt).
     (closes: #756410)
   * Drop obsolete patch: 04_weird_output.dpatch.
   * Restructure control file with cme.
   * Reorder (build) dependencies.
   * Add Homepage field to control file.
   * Update copyright file using copyright-format 1.0.
   * Add gbp.conf to use pristine-tar by default.
   * Update build dependency to use openssl 1.0.
   * Enable all hardening buildflags.
     (closes: #728218)
   * Enable parallel builds.
   * Suggest xinetd | inetd.
     (closes: #662247)
   * Include PDF & ODT documentation in docs.
     (closes: #662249)
   * Update watch file to handle common issues.
   * Add upstream metadata.
   * Merge nrpe.cfg patches into single patch.
     (closes: #660583)
   * Use configure option to set custom PID directory instead of patch.
   * Drop 09_noremove_pid.patch, fixed upstream. Refresh remaining patches.
   * Add patch to use pre-generated dh.h for reproducible builds.
   * Override dh_auto_build to build all targets.
   * Use dh-autoreconf instead of autotools-dev.
   * Use exit status 0 in init script when inetd is configured.
     (closes: #775924)
   * Include README.SSL.md in docs.
   * Bump Standards-Version to 3.9.8, changes:
     Vcs-* fields, copyright-format 1.0.
 .
   [ Benjamin Drung ]
   * Use dh_auto_configure to enable default hardening flags.
     (closes: #843805)
   * Fix copyright-refers-to-symlink-license.
     (closes: #756414)
 .
   [ Chris Lamb ]
   * Make the build reproducible.
     (closes: #834857)
Checksums-Sha1:
 8cc57beb3cb67ef9deb3546042fd281b72f9f50c 2102 nagios-nrpe_3.0.1-1~exp1.dsc
 e2b79bba41b1198c9d3dec0c559fc932fb12a429 514097 nagios-nrpe_3.0.1.orig.tar.gz
 912e6cdf82213a9a9559a0b2aeee134e62ff95f8 12736 
nagios-nrpe_3.0.1-1~exp1.debian.tar.xz
 0bd6eea3f01b4f464eef9bc45ec8a7c8dbf8b705 53366 
nagios-nrpe-plugin-dbgsym_3.0.1-1~exp1_amd64.deb
 4a286c3cef3ddc1acc9b7baab199133d7508bd00 29254 
nagios-nrpe-plugin_3.0.1-1~exp1_amd64.deb
 bc0128fb2be0af50dccb36584192041edb9a006a 72952 
nagios-nrpe-server-dbgsym_3.0.1-1~exp1_amd64.deb
 e4e6d6599413de839f8b18580c1deafdb8c97da5 345136 
nagios-nrpe-server_3.0.1-1~exp1_amd64.deb
 f6038221d886eb3cf49294aff0e5b41b7133163c 6081 
nagios-nrpe_3.0.1-1~exp1_amd64.buildinfo
Checksums-Sha256:
 063453ab1983f4676755222baf0580fba1be311cccf69448a25973dd2e3a3e7a 2102 
nagios-nrpe_3.0.1-1~exp1.dsc
 8f56da2d74f6beca1a04fe04ead84427e582b9bb88611e04e290f59617ca3ea3 514097 
nagios-nrpe_3.0.1.orig.tar.gz
 cca437bf8eecf71d9baca79bd8c5e9deeac5b4a883e00901228fff5ff5040f65 12736 
nagios-nrpe_3.0.1-1~exp1.debian.tar.xz
 c9fecfef407d434cb126ff0a860afeca5b4e686a3ef00c068b05da4de0882717 53366 
nagios-nrpe-plugin-dbgsym_3.0.1-1~exp1_amd64.deb
 6adc4c684c943f03032addeb461bdb7e27a84675d1b16f4882fcdad82744efd9 29254 
nagios-nrpe-plugin_3.0.1-1~exp1_amd64.deb
 3bbbfb797e1465956ebc99dd392e16fa489c284180968663ecebdab67caec180 72952 
nagios-nrpe-server-dbgsym_3.0.1-1~exp1_amd64.deb
 914e5665f4bee19d99f0a3e6efea1bdf5aa50e39478c1083ecbb26bec9d70293 345136 
nagios-nrpe-server_3.0.1-1~exp1_amd64.deb
 6177b27184012765c4f4e7682fef0edcca309109efd5e23c8a484c2445696f04 6081 
nagios-nrpe_3.0.1-1~exp1_amd64.buildinfo
Files:
 c3f8a9a9c05a6b8b810c977e569186b0 2102 net optional nagios-nrpe_3.0.1-1~exp1.dsc
 8c81f251d9ee0903e5ff0191e99f7981 514097 net optional 
nagios-nrpe_3.0.1.orig.tar.gz
 10b7bfe2e0a2a30c895f773ad50fd203 12736 net optional 
nagios-nrpe_3.0.1-1~exp1.debian.tar.xz
 5daff3dd0ffcf1997d77be09614f3355 53366 debug extra 
nagios-nrpe-plugin-dbgsym_3.0.1-1~exp1_amd64.deb
 bfaa2dc3ee62894ffb3edbedf5ddab7c 29254 net optional 
nagios-nrpe-plugin_3.0.1-1~exp1_amd64.deb
 319c915240286dee87629e07c0d48ab5 72952 debug extra 
nagios-nrpe-server-dbgsym_3.0.1-1~exp1_amd64.deb
 958f74614dae92a01b634331c7154568 345136 net optional 
nagios-nrpe-server_3.0.1-1~exp1_amd64.deb
 1857c951ceef5ca2a30bdae4bc1ebe8d 6081 net optional 
nagios-nrpe_3.0.1-1~exp1_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBCgAGBQJYRFgGAAoJEGdQ8QrojUrxUFEP/1RU25K2El7YtGn+djZohFPO
bLrGDcY5p2TW13iSmNUXb2ThmCz8pt8fGsIlOAt6C8GpczgwzjpSmvJwkFrrCe8k
r+D+/v5xZb/8JkrMjmxpv2NNBE+8noO96YjWdAq6gQbX9D+L1a0iev7KR57ZkNu1
wbRcESkqRDo0cV+pAg1z0Rj6ae9D5CiHuGoino2cOes20FRDNvr2jIf3dBs5ItO8
wRoch+3fK0AOHuHZRRygAbRIDgkc+zO9TEzoIHhRyM9vDni1ANwz5ii1gorDLj8N
1Ryk4U2ZHCzZJuUWV9bsril5N06z8Zmy2p8UkBHq90gaUAWXy2IRiF24UIyQAd6T
o+BtrVGgOahCnxNyAijBW1ta+AfxcL1AjQ30s54WILebZ9YmYNa3UvRAnxynWx4o
l2MaOY/ljnsyDl26EfoRzIRjFpROeudd+KuEpdgaoodAzjHiI5B1jDC/esoMZ3tb
k/huvUOT+H64Bd11Hc1vpSE86XqFo5gKaJ1wQBvJybMfXeG+ZGNxjfsU7XMYczJx
rxSCLFw40s8+L88OSN5RscTjupdDh3ase08SC1zbPf7pIMzjLLO5jR3nugBc0tq6
7HppQ+oYSLVW1Eo/iWaAnjvJI8TsuBeRN5bWC1DfeAlDSbWUD8UBR95rnXWV/eMX
Ba+zNgS0KNkYhiWCxXdB
=8ZLb
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to