<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>
	Comments on: Network monitoring with Raspberry PI and NEMS (Nagios)	</title>
	<atom:link href="https://peppe8o.com/network-monitoring-with-raspberry-pi-and-nems-nagios/feed/" rel="self" type="application/rss+xml" />
	<link>https://peppe8o.com/network-monitoring-with-raspberry-pi-and-nems-nagios/</link>
	<description>Raspberry PI, Arduino and Electronics made simple</description>
	<lastBuildDate>Wed, 20 Mar 2024 07:07:03 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>
		By: peppe8o		</title>
		<link>https://peppe8o.com/network-monitoring-with-raspberry-pi-and-nems-nagios/#comment-26661</link>

		<dc:creator><![CDATA[peppe8o]]></dc:creator>
		<pubDate>Wed, 20 Mar 2024 07:07:03 +0000</pubDate>
		<guid isPermaLink="false">https://peppe8o.com/?p=2821#comment-26661</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://peppe8o.com/network-monitoring-with-raspberry-pi-and-nems-nagios/#comment-26646&quot;&gt;LangleeHoHoHo&lt;/a&gt;.

Hi LangleeHoHoHo,
thank you for your interesting check and opinions. I think that you could email the NEMS team to make them aware of your improvement suggestions, every sane developer would accept criticism focused to make a software more reliable and secure]]></description>
			<content:encoded><![CDATA[<p>In reply to <a href="https://peppe8o.com/network-monitoring-with-raspberry-pi-and-nems-nagios/#comment-26646">LangleeHoHoHo</a>.</p>
<p>Hi LangleeHoHoHo,<br />
thank you for your interesting check and opinions. I think that you could email the NEMS team to make them aware of your improvement suggestions, every sane developer would accept criticism focused to make a software more reliable and secure</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: LangleeHoHoHo		</title>
		<link>https://peppe8o.com/network-monitoring-with-raspberry-pi-and-nems-nagios/#comment-26646</link>

		<dc:creator><![CDATA[LangleeHoHoHo]]></dc:creator>
		<pubDate>Tue, 19 Mar 2024 21:46:48 +0000</pubDate>
		<guid isPermaLink="false">https://peppe8o.com/?p=2821#comment-26646</guid>

					<description><![CDATA[The idiot admins of this distro use the KNOWN-BROKEN md5 hashing algorithm for their downloads with NO SIGNATURES for better security and integrity verification. Even though this is standard practice elsewhere.
Unlike some noobs, I have sadly seen md5 checksum matches on two files that the sha256 differed on. So it can indeed matter in the REAL world, not just for the sake of what some naive people call &#039;paranoia&#039;. I immediately distrust security-related distros and software that is apparently this level of ignorant at admin level. Also, the downloads are hosted on a completely different domain - dittodistro com -  requiring even more verification.
There is also a changelog from as recently as 2019, where they intentionally dumb-down their standards to fit ESX-i software, which was ignorantly using the SHA1 algorithm which is ALSO somewhat insecure. In 2019, not 2009... Was this retrograde decision reversed in more recent releases? Couldn&#039;t the world get ESX-i to get a patch instead? The mind boggles at times.
People like this appear not to live in the real technological world where threats as relating to the above verification needs, are not real. They are, they are automated, and they happen in seconds. Security through obscurity (being lucky when using sloppy methods) is NOT real security. With all due respect, Wake up!]]></description>
			<content:encoded><![CDATA[<p>The idiot admins of this distro use the KNOWN-BROKEN md5 hashing algorithm for their downloads with NO SIGNATURES for better security and integrity verification. Even though this is standard practice elsewhere.<br />
Unlike some noobs, I have sadly seen md5 checksum matches on two files that the sha256 differed on. So it can indeed matter in the REAL world, not just for the sake of what some naive people call &#8216;paranoia&#8217;. I immediately distrust security-related distros and software that is apparently this level of ignorant at admin level. Also, the downloads are hosted on a completely different domain &#8211; dittodistro com &#8211;  requiring even more verification.<br />
There is also a changelog from as recently as 2019, where they intentionally dumb-down their standards to fit ESX-i software, which was ignorantly using the SHA1 algorithm which is ALSO somewhat insecure. In 2019, not 2009&#8230; Was this retrograde decision reversed in more recent releases? Couldn&#8217;t the world get ESX-i to get a patch instead? The mind boggles at times.<br />
People like this appear not to live in the real technological world where threats as relating to the above verification needs, are not real. They are, they are automated, and they happen in seconds. Security through obscurity (being lucky when using sloppy methods) is NOT real security. With all due respect, Wake up!</p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>
