You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
will trigger it to send a packet containing the community string to your chosen IP address.
Thoughts:
Could make snmp_exporter default to listen on localhost only, rather than all interfaces. This would secure snmp_exporter in the common case where it runs on the same host as prometheus.
Users would then have to make an explicit choice to open it up if they want to access it remotely, and at that point can consider things like iptables rules to restrict access.
Documentation could recommend that users leave it bound to localhost, and expose it via a reverse proxy which enforces HTTP Basic Auth (and ideally HTTPS to protect the Basic Auth secret)
Prometheus core is already able to send statically-configured HTTP Basic Auth on scrape jobs.
This approach is well-known, but involves the user installing a bunch of extra bits.
Could consider adding HTTP Basic Auth and/or HTTPS and/or client cert authentication to snmp_exporter itself; that adds complexity.
The text was updated successfully, but these errors were encountered:
snmp_exporter exposes a trivial way for anyone with network access to harvest SNMP (<v3) community strings:
will trigger it to send a packet containing the community string to your chosen IP address.
Thoughts:
Could make snmp_exporter default to listen on localhost only, rather than all interfaces. This would secure snmp_exporter in the common case where it runs on the same host as prometheus.
Users would then have to make an explicit choice to open it up if they want to access it remotely, and at that point can consider things like iptables rules to restrict access.
Documentation could recommend that users leave it bound to localhost, and expose it via a reverse proxy which enforces HTTP Basic Auth (and ideally HTTPS to protect the Basic Auth secret)
Prometheus core is already able to send statically-configured HTTP Basic Auth on scrape jobs.
This approach is well-known, but involves the user installing a bunch of extra bits.
Could consider adding HTTP Basic Auth and/or HTTPS and/or client cert authentication to snmp_exporter itself; that adds complexity.
The text was updated successfully, but these errors were encountered: