Ad Widget

Collapse

Secure Zabbix server behind a public IP to deny unauthorised active agents

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • systemservice
    Junior Member
    • Aug 2024
    • 3

    #1

    Secure Zabbix server behind a public IP to deny unauthorised active agents

    Hello,

    I have read multiple official and not official Zabbix security descriptions but I still looking for the right way / best practice to secure connection between Zabbix server and Zabbix active agent.

    Zabbix server's port 10051/tcp is be accessible on a public IP.
    Zabbix active proxies and agents are NOT accessible on a public IP, they only connect to the server's port 10051/tcp.

    Zabbix active proxies connect to the server securely using PSK and their source addresses are limited by Administration->Proxies->Proxy address.
    So I believe that this connection is secure (I understand that Cert is considered more secure than PSK).

    Zabbix active agents connect to the server using PSK.
    But here is the main problem.
    An attacker can setup an active Zabbix agent using a hostname like "192.168.1.100" with TLSConnect=unencrypted that is connecting to my Zabbix server.
    As you know, new hosts in Zabbix do not habe PSK/Cert enabled by default.
    Now if a discovery rule (or maybe somebody from my team) creates a host with the hostname "192.168.1.100" without a PSK/Cert on my server then it would by compromised.
    I tested it, you don't even need to add an agent interface to the host, but it you add, it doesn't matter also.

    It looks like a big security risk, right?
    Are there any options available in Zabbix to reduce this risk, for example deny all connections without PSK/Cert or limit active agents by their source address?

    Otherwise I would limit the source addresses in the firewall.

    Thank you.
  • jhboricua
    Senior Member
    • Dec 2021
    • 113

    #2
    Are you filtering the inbound traffic to your Zabbix public endpoint to only accept traffic from the remote sites that need to talk to it on your firewall?

    Comment

    • systemservice
      Junior Member
      • Aug 2024
      • 3

      #3
      Originally posted by jhboricua
      Are you filtering the inbound traffic to your Zabbix public endpoint to only accept traffic from the remote sites that need to talk to it on your firewall?
      No, Zabbix Server Port 10051/tcp is not filtered except that only certain proxies are allowed in Zabbix configuration (Proxy->"Proxy address"). But I believe there is no such option for the agents to limit them by their agent interface for example.
      The option I am missing is either:
      a) limit active agents by the agent interface address
      OR
      b) allow encrypted connections only.

      Otherwise Zabbix server accepts any agent from the Internet...

      Option b) would be the best for me, because for the option a) I'd need to manage a lot of dynamic DNS addresses and I would avoid filtering them in the firewall, it would be easier in Zabbix.

      Comment

      Working...