Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

cisco_meraki: fix webhook configuration and behavior #9415

Merged
merged 1 commit into from Mar 25, 2024

Conversation

efd6
Copy link
Contributor

@efd6 efd6 commented Mar 21, 2024

Proposed commit message

Cisco Meraki's approach to 'authentication' is not actually based on authentication. Instead a shared secret is passed as part of the event that is sent in the web hook publication[1]. So, in order to prevent ingestion of invalid or unauthorised events, check for shared secret matching in the ingest pipeline and drop event that do not match.

Note that Cisco Meraki's approach does not provide any mechanism to prevent unauthorized connections.

[1]https://developer.cisco.com/meraki/webhooks/introduction/#shared-secret

Checklist

  • I have reviewed tips for building integrations and this pull request is aligned with them.
  • I have verified that all data streams collect metrics or logs.
  • I have added an entry to my package's changelog.yml file.
  • I have verified that Kibana version constraints are current according to guidelines.

Author's Checklist

  • [ ]

How to test this PR locally

Related issues

Screenshots

@efd6 efd6 self-assigned this Mar 21, 2024
@efd6 efd6 force-pushed the 9388-cisco_meraki branch 2 times, most recently from ac540bb to 27df016 Compare March 21, 2024 23:42
Cisco Meraki's approach to 'authentication' is not actually based on
authentication. Instead a shared secret is passed as part of the event that is
sent in the web hook publication[1]. So, in order to prevent ingestion of
invalid or unauthorised events, check for shared secret matching in the ingest
pipeline and drop event that do not match.

Note that Cisco Meraki's approach does not provide any mechanism to prevent
unauthorized connections.

[1]https://developer.cisco.com/meraki/webhooks/introduction/#shared-secret
@elasticmachine
Copy link

🚀 Benchmarks report

To see the full report comment with /test benchmark fullreport

@elasticmachine
Copy link

💚 Build Succeeded

History

cc @efd6

Copy link

@efd6 efd6 marked this pull request as ready for review March 22, 2024 00:29
@efd6 efd6 requested a review from a team as a code owner March 22, 2024 00:29
@elasticmachine
Copy link

Pinging @elastic/security-service-integrations (Team:Security-Service Integrations)

Copy link
Contributor

@kcreddy kcreddy left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM 👍🏼

@efd6 efd6 merged commit 76eb715 into elastic:main Mar 25, 2024
5 checks passed
@elasticmachine
Copy link

Package cisco_meraki - 1.21.2 containing this change is available at https://epr.elastic.co/search?package=cisco_meraki

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Cisco Meraki Integration - shared secret not working
3 participants