pkg-monitoring-plugins/plugins/check_ssh.c

329 lines
7.6 KiB
C
Raw Permalink Normal View History

2013-11-26 22:55:28 +00:00
/*****************************************************************************
*
2014-07-11 19:01:00 +00:00
* Monitoring check_ssh plugin
2013-11-26 22:55:28 +00:00
*
2013-11-26 22:53:19 +00:00
* License: GPL
2014-07-11 19:01:00 +00:00
* Copyright (c) 2000-2007 Monitoring Plugins Development Team
2013-11-26 22:55:28 +00:00
*
2013-11-26 22:53:19 +00:00
* Description:
2013-11-26 22:55:28 +00:00
*
2013-11-26 22:53:19 +00:00
* This file contains the check_ssh plugin
2013-11-26 22:55:28 +00:00
*
* Try to connect to an SSH server at specified server and port
*
*
* This program is free software: you can redistribute it and/or modify
2013-11-26 22:53:19 +00:00
* it under the terms of the GNU General Public License as published by
2013-11-26 22:55:28 +00:00
* the Free Software Foundation, either version 3 of the License, or
2013-11-26 22:53:19 +00:00
* (at your option) any later version.
2013-11-26 22:55:28 +00:00
*
2013-11-26 22:53:19 +00:00
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
2013-11-26 22:55:28 +00:00
*
2013-11-26 22:53:19 +00:00
* You should have received a copy of the GNU General Public License
2013-11-26 22:55:28 +00:00
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*
2013-11-26 22:53:19 +00:00
*
2013-11-26 22:55:28 +00:00
*****************************************************************************/
2013-11-26 22:53:19 +00:00
const char *progname = "check_ssh";
2013-11-26 22:55:28 +00:00
const char *copyright = "2000-2007";
2014-07-11 19:01:00 +00:00
const char *email = "devel@monitoring-plugins.org";
2013-11-26 22:53:19 +00:00
#include "common.h"
#include "netutils.h"
#include "utils.h"
#ifndef MSG_DONTWAIT
#define MSG_DONTWAIT 0
#endif
#define SSH_DFL_PORT 22
#define BUFF_SZ 256
int port = -1;
char *server_name = NULL;
char *remote_version = NULL;
2014-07-11 19:01:00 +00:00
char *remote_protocol = NULL;
2013-11-26 22:53:19 +00:00
int verbose = FALSE;
int process_arguments (int, char **);
int validate_arguments (void);
void print_help (void);
void print_usage (void);
2014-07-11 19:01:00 +00:00
int ssh_connect (char *haddr, int hport, char *remote_version, char *remote_protocol);
2013-11-26 22:53:19 +00:00
int
main (int argc, char **argv)
{
int result = STATE_UNKNOWN;
setlocale (LC_ALL, "");
bindtextdomain (PACKAGE, LOCALEDIR);
textdomain (PACKAGE);
2013-11-26 22:55:28 +00:00
/* Parse extra opts if any */
argv=np_extra_opts (&argc, argv, progname);
2013-11-26 22:53:19 +00:00
if (process_arguments (argc, argv) == ERROR)
usage4 (_("Could not parse arguments"));
/* initialize alarm signal handling */
signal (SIGALRM, socket_timeout_alarm_handler);
2013-11-26 22:53:19 +00:00
alarm (socket_timeout);
/* ssh_connect exits if error is found */
2014-07-11 19:01:00 +00:00
result = ssh_connect (server_name, port, remote_version, remote_protocol);
2013-11-26 22:53:19 +00:00
alarm (0);
return (result);
}
/* process command-line arguments */
int
process_arguments (int argc, char **argv)
{
int c;
int option = 0;
static struct option longopts[] = {
{"help", no_argument, 0, 'h'},
{"version", no_argument, 0, 'V'},
2013-11-26 22:53:44 +00:00
{"host", required_argument, 0, 'H'}, /* backward compatibility */
{"hostname", required_argument, 0, 'H'},
2013-11-26 22:53:19 +00:00
{"port", required_argument, 0, 'p'},
{"use-ipv4", no_argument, 0, '4'},
{"use-ipv6", no_argument, 0, '6'},
{"timeout", required_argument, 0, 't'},
{"verbose", no_argument, 0, 'v'},
{"remote-version", required_argument, 0, 'r'},
2014-07-11 19:01:00 +00:00
{"remote-protcol", required_argument, 0, 'P'},
2013-11-26 22:53:19 +00:00
{0, 0, 0, 0}
};
if (argc < 2)
return ERROR;
for (c = 1; c < argc; c++)
if (strcmp ("-to", argv[c]) == 0)
strcpy (argv[c], "-t");
while (1) {
2014-07-11 19:01:00 +00:00
c = getopt_long (argc, argv, "+Vhv46t:r:H:p:P:", longopts, &option);
2013-11-26 22:53:19 +00:00
if (c == -1 || c == EOF)
break;
switch (c) {
case '?': /* help */
2013-11-26 22:53:44 +00:00
usage5 ();
2013-11-26 22:53:19 +00:00
case 'V': /* version */
print_revision (progname, NP_VERSION);
2016-11-30 11:36:55 +00:00
exit (STATE_UNKNOWN);
2013-11-26 22:53:19 +00:00
case 'h': /* help */
print_help ();
2016-11-30 11:36:55 +00:00
exit (STATE_UNKNOWN);
2013-11-26 22:53:19 +00:00
case 'v': /* verbose */
verbose = TRUE;
break;
case 't': /* timeout period */
if (!is_integer (optarg))
usage2 (_("Timeout interval must be a positive integer"), optarg);
else
socket_timeout = atoi (optarg);
break;
case '4':
address_family = AF_INET;
break;
case '6':
#ifdef USE_IPV6
address_family = AF_INET6;
#else
usage4 (_("IPv6 support not available"));
#endif
break;
case 'r': /* remote version */
remote_version = optarg;
break;
2014-07-11 19:01:00 +00:00
case 'P': /* remote version */
remote_protocol = optarg;
break;
2013-11-26 22:53:19 +00:00
case 'H': /* host */
if (is_host (optarg) == FALSE)
usage2 (_("Invalid hostname/address"), optarg);
server_name = optarg;
break;
case 'p': /* port */
if (is_intpos (optarg)) {
port = atoi (optarg);
}
else {
usage2 (_("Port number must be a positive integer"), optarg);
}
}
}
c = optind;
if (server_name == NULL && c < argc) {
if (is_host (argv[c])) {
server_name = argv[c++];
}
}
if (port == -1 && c < argc) {
if (is_intpos (argv[c])) {
port = atoi (argv[c++]);
}
else {
print_usage ();
exit (STATE_UNKNOWN);
}
}
return validate_arguments ();
}
int
validate_arguments (void)
{
if (server_name == NULL)
return ERROR;
if (port == -1) /* funky, but allows -p to override stray integer in args */
port = SSH_DFL_PORT;
return OK;
}
/************************************************************************
*
* Try to connect to SSH server at specified server and port
*
*-----------------------------------------------------------------------*/
int
2014-07-11 19:01:00 +00:00
ssh_connect (char *haddr, int hport, char *remote_version, char *remote_protocol)
2013-11-26 22:53:19 +00:00
{
int sd;
int result;
char *output = NULL;
char *buffer = NULL;
char *ssh_proto = NULL;
char *ssh_server = NULL;
static char *rev_no = VERSION;
2013-11-26 22:58:53 +00:00
struct timeval tv;
double elapsed_time;
gettimeofday(&tv, NULL);
2013-11-26 22:53:19 +00:00
result = my_tcp_connect (haddr, hport, &sd);
if (result != STATE_OK)
return result;
output = (char *) malloc (BUFF_SZ + 1);
memset (output, 0, BUFF_SZ + 1);
recv (sd, output, BUFF_SZ, 0);
if (strncmp (output, "SSH", 3)) {
printf (_("Server answer: %s"), output);
2013-11-26 22:54:57 +00:00
close(sd);
2013-11-26 22:53:19 +00:00
exit (STATE_CRITICAL);
}
else {
strip (output);
if (verbose)
printf ("%s\n", output);
ssh_proto = output + 4;
ssh_server = ssh_proto + strspn (ssh_proto, "-0123456789. ");
ssh_proto[strspn (ssh_proto, "0123456789. ")] = 0;
xasprintf (&buffer, "SSH-%s-check_ssh_%s\r\n", ssh_proto, rev_no);
2013-11-26 22:53:19 +00:00
send (sd, buffer, strlen (buffer), MSG_DONTWAIT);
if (verbose)
printf ("%s\n", buffer);
if (remote_version && strcmp(remote_version, ssh_server)) {
printf
2016-11-30 11:36:55 +00:00
(_("SSH CRITICAL - %s (protocol %s) version mismatch, expected '%s'\n"),
2013-11-26 22:53:19 +00:00
ssh_server, ssh_proto, remote_version);
2013-11-26 22:54:57 +00:00
close(sd);
2016-11-30 11:36:55 +00:00
exit (STATE_CRITICAL);
2013-11-26 22:53:19 +00:00
}
2014-07-11 19:01:00 +00:00
if (remote_protocol && strcmp(remote_protocol, ssh_proto)) {
printf
2016-11-30 11:36:55 +00:00
(_("SSH CRITICAL - %s (protocol %s) protocol version mismatch, expected '%s'\n"),
2014-07-11 19:01:00 +00:00
ssh_server, ssh_proto, remote_protocol);
close(sd);
2016-11-30 11:36:55 +00:00
exit (STATE_CRITICAL);
2014-07-11 19:01:00 +00:00
}
2013-11-26 22:58:53 +00:00
elapsed_time = (double)deltime(tv) / 1.0e6;
2013-11-26 22:53:19 +00:00
printf
2013-11-26 22:58:53 +00:00
(_("SSH OK - %s (protocol %s) | %s\n"),
ssh_server, ssh_proto, fperfdata("time", elapsed_time, "s",
FALSE, 0, FALSE, 0, TRUE, 0, TRUE, (int)socket_timeout));
2013-11-26 22:53:19 +00:00
close(sd);
exit (STATE_OK);
}
}
void
print_help (void)
{
char *myport;
xasprintf (&myport, "%d", SSH_DFL_PORT);
2013-11-26 22:53:19 +00:00
print_revision (progname, NP_VERSION);
2013-11-26 22:53:19 +00:00
printf ("Copyright (c) 1999 Remi Paulmier <remi@sinfomic.fr>\n");
printf (COPYRIGHT, copyright, email);
printf ("%s\n", _("Try to connect to an SSH server at specified server and port"));
printf ("\n\n");
print_usage ();
2013-11-26 22:57:29 +00:00
printf (UT_HELP_VRSN);
printf (UT_EXTRA_OPTS);
2013-11-26 22:53:19 +00:00
2013-11-26 22:57:29 +00:00
printf (UT_HOST_PORT, 'p', myport);
2013-11-26 22:53:19 +00:00
2013-11-26 22:57:29 +00:00
printf (UT_IPv46);
2013-11-26 22:53:19 +00:00
2014-07-11 19:01:00 +00:00
printf (UT_CONN_TIMEOUT, DEFAULT_SOCKET_TIMEOUT);
2013-11-26 22:53:19 +00:00
printf (" %s\n", "-r, --remote-version=STRING");
2016-11-30 11:36:55 +00:00
printf (" %s\n", _("Alert if string doesn't match expected server version (ex: OpenSSH_3.9p1)"));
2014-07-11 19:01:00 +00:00
printf (" %s\n", "-P, --remote-protocol=STRING");
2016-11-30 11:36:55 +00:00
printf (" %s\n", _("Alert if protocol doesn't match expected protocol version (ex: 2.0)"));
2014-07-11 19:01:00 +00:00
2013-11-26 22:57:29 +00:00
printf (UT_VERBOSE);
2013-11-26 22:53:19 +00:00
2013-11-26 22:57:29 +00:00
printf (UT_SUPPORT);
2013-11-26 22:53:19 +00:00
}
void
print_usage (void)
{
2013-11-26 22:57:29 +00:00
printf ("%s\n", _("Usage:"));
printf ("%s [-4|-6] [-t <timeout>] [-r <remote version>] [-p <port>] <host>\n", progname);
2013-11-26 22:53:19 +00:00
}