/usr/share/doc/nsca-ng-client/TODO is in nsca-ng-client 1.5-2build2.
This file is owned by root:root, with mode 0o644.
The actual contents of the file can be viewed below.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 | NSCA-ng Task List
=================
The to-do items are listed in no particular order.
Wish List Items for NSCA-ng
---------------------------
- Let the server support command authorization based on host and service
groups. This requires the server to actually parse the submitted
commands, as oppposed to simply matching them against the user-supplied
regular expressions.
- Let the server support a `clients` or `sources` directive that allows the
user to specify one or more subnets (globally and/or per-client).
Connections from source addresses outside these subnets should be
rejected.
- Let the server support proxying of (selected or all) data (with `forward`
blocks in the configuration, for example).
- Support requests for status and configuration data in order to provide a
full-blown remote API.
- Let the client execute standard Nagios plugins directly (as an alternative
to using a script such as `contrib/invoke_check`), and maybe provide a
daemon mode with poor man's check scheduling (i.e., add `check_interval`
and `retry_interval` directives to the client configuration).
- If the server is not available, let the client queue commands and results
using local storage and submit them as soon as the server comes up again.
- Let the client talk to multiple servers.
- Port the client to Microsoft Windows.
- Create a client library with Perl (and maybe Python) bindings.
Wish List Items for OpenSSL
---------------------------
- Add IPv6 support to OpenSSL's `BIO_s_connect(3)` API, so that the client
can use IPv6. (The server supports IPv6 already.) There's a [ticket][1]
with a patch in OpenSSL's tracker, and a related [discussion][2] on the
OpenSSL development mailing list.
- Support NULL encryption TLS-PSK cipher suites as defined in [RFC 4785][3].
This should make it easier to use tools such as `tcpdump(8)` for debugging
NSCA-ng sessions. There's an [older][4] and a [newer][5] patch in
OpenSSL's tracker.
- Support SHA-256/384 (and GCM) TLS-PSK cipher suites as per [RFC 5487][6].
Someone [played around with this][7] already.
[1]: http://rt.openssl.org/Ticket/Display.html?id=1365
[2]: http://thread.gmane.org/gmane.comp.encryption.openssl.devel/11207
[3]: http://tools.ietf.org/html/rfc4785
[4]: http://rt.openssl.org/Ticket/Display.html?id=1886
[5]: http://rt.openssl.org/Ticket/Display.html?id=2299
[6]: http://tools.ietf.org/html/rfc5487
[7]: http://permalink.gmane.org/gmane.comp.encryption.openssl.user/44388
<!-- vim:set filetype=markdown textwidth=76 joinspaces: -->
|