diff options
Diffstat (limited to 'plugins/check_smtp.c')
| -rw-r--r-- | plugins/check_smtp.c | 1438 |
1 files changed, 784 insertions, 654 deletions
diff --git a/plugins/check_smtp.c b/plugins/check_smtp.c index 986c3e18..e806ad29 100644 --- a/plugins/check_smtp.c +++ b/plugins/check_smtp.c | |||
| @@ -1,265 +1,302 @@ | |||
| 1 | /***************************************************************************** | 1 | /***************************************************************************** |
| 2 | * | 2 | * |
| 3 | * Monitoring check_smtp plugin | 3 | * Monitoring check_smtp plugin |
| 4 | * | 4 | * |
| 5 | * License: GPL | 5 | * License: GPL |
| 6 | * Copyright (c) 2000-2023 Monitoring Plugins Development Team | 6 | * Copyright (c) 2000-2024 Monitoring Plugins Development Team |
| 7 | * | 7 | * |
| 8 | * Description: | 8 | * Description: |
| 9 | * | 9 | * |
| 10 | * This file contains the check_smtp plugin | 10 | * This file contains the check_smtp plugin |
| 11 | * | 11 | * |
| 12 | * This plugin will attempt to open an SMTP connection with the host. | 12 | * This plugin will attempt to open an SMTP connection with the host. |
| 13 | * | 13 | * |
| 14 | * | 14 | * |
| 15 | * This program is free software: you can redistribute it and/or modify | 15 | * This program is free software: you can redistribute it and/or modify |
| 16 | * it under the terms of the GNU General Public License as published by | 16 | * it under the terms of the GNU General Public License as published by |
| 17 | * the Free Software Foundation, either version 3 of the License, or | 17 | * the Free Software Foundation, either version 3 of the License, or |
| 18 | * (at your option) any later version. | 18 | * (at your option) any later version. |
| 19 | * | 19 | * |
| 20 | * This program is distributed in the hope that it will be useful, | 20 | * This program is distributed in the hope that it will be useful, |
| 21 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | 21 | * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 22 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | 22 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
| 23 | * GNU General Public License for more details. | 23 | * GNU General Public License for more details. |
| 24 | * | 24 | * |
| 25 | * You should have received a copy of the GNU General Public License | 25 | * You should have received a copy of the GNU General Public License |
| 26 | * along with this program. If not, see <http://www.gnu.org/licenses/>. | 26 | * along with this program. If not, see <http://www.gnu.org/licenses/>. |
| 27 | * | 27 | * |
| 28 | * | 28 | * |
| 29 | *****************************************************************************/ | 29 | *****************************************************************************/ |
| 30 | |||
| 31 | const char *progname = "check_smtp"; | ||
| 32 | const char *copyright = "2000-2007"; | ||
| 33 | const char *email = "devel@monitoring-plugins.org"; | ||
| 34 | 30 | ||
| 35 | #include "common.h" | 31 | #include "common.h" |
| 36 | #include "netutils.h" | 32 | #include "netutils.h" |
| 33 | #include "output.h" | ||
| 34 | #include "perfdata.h" | ||
| 35 | #include "thresholds.h" | ||
| 37 | #include "utils.h" | 36 | #include "utils.h" |
| 38 | #include "base64.h" | 37 | #include "base64.h" |
| 38 | #include "regex.h" | ||
| 39 | 39 | ||
| 40 | #include <bits/getopt_ext.h> | ||
| 40 | #include <ctype.h> | 41 | #include <ctype.h> |
| 42 | #include <string.h> | ||
| 43 | #include "check_smtp.d/config.h" | ||
| 44 | #include "../lib/states.h" | ||
| 41 | 45 | ||
| 42 | #ifdef HAVE_SSL | 46 | const char *progname = "check_smtp"; |
| 43 | bool check_cert = false; | 47 | const char *copyright = "2000-2024"; |
| 44 | int days_till_exp_warn, days_till_exp_crit; | 48 | const char *email = "devel@monitoring-plugins.org"; |
| 45 | # define my_recv(buf, len) (((use_starttls || use_ssl) && ssl_established) ? np_net_ssl_read(buf, len) : read(sd, buf, len)) | ||
| 46 | # define my_send(buf, len) (((use_starttls || use_ssl) && ssl_established) ? np_net_ssl_write(buf, len) : send(sd, buf, len, 0)) | ||
| 47 | #else /* ifndef HAVE_SSL */ | ||
| 48 | # define my_recv(buf, len) read(sd, buf, len) | ||
| 49 | # define my_send(buf, len) send(sd, buf, len, 0) | ||
| 50 | #endif | ||
| 51 | 49 | ||
| 52 | enum { | 50 | #define PROXY_PREFIX "PROXY TCP4 0.0.0.0 0.0.0.0 25 25\r\n" |
| 53 | SMTP_PORT = 25, | 51 | #define SMTP_HELO "HELO " |
| 54 | SMTPS_PORT = 465 | 52 | #define SMTP_EHLO "EHLO " |
| 55 | }; | 53 | #define SMTP_LHLO "LHLO " |
| 56 | #define PROXY_PREFIX "PROXY TCP4 0.0.0.0 0.0.0.0 25 25\r\n" | 54 | #define SMTP_QUIT "QUIT\r\n" |
| 57 | #define SMTP_EXPECT "220" | 55 | #define SMTP_STARTTLS "STARTTLS\r\n" |
| 58 | #define SMTP_HELO "HELO " | ||
| 59 | #define SMTP_EHLO "EHLO " | ||
| 60 | #define SMTP_LHLO "LHLO " | ||
| 61 | #define SMTP_QUIT "QUIT\r\n" | ||
| 62 | #define SMTP_STARTTLS "STARTTLS\r\n" | ||
| 63 | #define SMTP_AUTH_LOGIN "AUTH LOGIN\r\n" | 56 | #define SMTP_AUTH_LOGIN "AUTH LOGIN\r\n" |
| 64 | 57 | ||
| 65 | #define EHLO_SUPPORTS_STARTTLS 1 | 58 | #define EHLO_SUPPORTS_STARTTLS 1 |
| 66 | 59 | ||
| 67 | int process_arguments (int, char **); | 60 | typedef struct { |
| 68 | int validate_arguments (void); | 61 | int errorcode; |
| 69 | void print_help (void); | 62 | check_smtp_config config; |
| 70 | void print_usage (void); | 63 | } check_smtp_config_wrapper; |
| 71 | void smtp_quit(void); | 64 | static check_smtp_config_wrapper process_arguments(int /*argc*/, char ** /*argv*/); |
| 72 | int recvline(char *, size_t); | ||
| 73 | int recvlines(char *, size_t); | ||
| 74 | int my_close(void); | ||
| 75 | 65 | ||
| 76 | #include "regex.h" | 66 | int my_recv(check_smtp_config config, void *buf, int num, int socket_descriptor, |
| 77 | char regex_expect[MAX_INPUT_BUFFER] = ""; | 67 | bool ssl_established) { |
| 78 | regex_t preg; | 68 | #ifdef HAVE_SSL |
| 79 | regmatch_t pmatch[10]; | 69 | if ((config.use_starttls || config.use_ssl) && ssl_established) { |
| 80 | char timestamp[20] = ""; | 70 | return np_net_ssl_read(buf, num); |
| 81 | char errbuf[MAX_INPUT_BUFFER]; | 71 | } |
| 82 | int cflags = REG_EXTENDED | REG_NOSUB | REG_NEWLINE; | 72 | return (int)read(socket_descriptor, buf, (size_t)num); |
| 83 | int eflags = 0; | 73 | #else /* ifndef HAVE_SSL */ |
| 84 | int errcode, excode; | 74 | return read(socket_descriptor, buf, len) |
| 85 | 75 | #endif | |
| 86 | int server_port = SMTP_PORT; | 76 | } |
| 87 | int server_port_option = 0; | ||
| 88 | char *server_address = NULL; | ||
| 89 | char *server_expect = NULL; | ||
| 90 | char *mail_command = NULL; | ||
| 91 | char *from_arg = NULL; | ||
| 92 | int send_mail_from=0; | ||
| 93 | int ncommands=0; | ||
| 94 | int command_size=0; | ||
| 95 | int nresponses=0; | ||
| 96 | int response_size=0; | ||
| 97 | char **commands = NULL; | ||
| 98 | char **responses = NULL; | ||
| 99 | char *authtype = NULL; | ||
| 100 | char *authuser = NULL; | ||
| 101 | char *authpass = NULL; | ||
| 102 | double warning_time = 0; | ||
| 103 | bool check_warning_time = false; | ||
| 104 | double critical_time = 0; | ||
| 105 | bool check_critical_time = false; | ||
| 106 | int verbose = 0; | ||
| 107 | bool use_ssl = false; | ||
| 108 | bool use_starttls = false; | ||
| 109 | bool use_sni = false; | ||
| 110 | bool use_proxy_prefix = false; | ||
| 111 | bool use_ehlo = false; | ||
| 112 | bool use_lhlo = false; | ||
| 113 | bool ssl_established = false; | ||
| 114 | char *localhostname = NULL; | ||
| 115 | int sd; | ||
| 116 | char buffer[MAX_INPUT_BUFFER]; | ||
| 117 | enum { | ||
| 118 | TCP_PROTOCOL = 1, | ||
| 119 | UDP_PROTOCOL = 2, | ||
| 120 | }; | ||
| 121 | bool ignore_send_quit_failure = false; | ||
| 122 | |||
| 123 | |||
| 124 | int | ||
| 125 | main (int argc, char **argv) | ||
| 126 | { | ||
| 127 | bool supports_tls = false; | ||
| 128 | int n = 0; | ||
| 129 | double elapsed_time; | ||
| 130 | long microsec; | ||
| 131 | int result = STATE_UNKNOWN; | ||
| 132 | char *cmd_str = NULL; | ||
| 133 | char *helocmd = NULL; | ||
| 134 | char *error_msg = ""; | ||
| 135 | char *server_response = NULL; | ||
| 136 | struct timeval tv; | ||
| 137 | 77 | ||
| 138 | /* Catch pipe errors in read/write - sometimes occurs when writing QUIT */ | 78 | int my_send(check_smtp_config config, void *buf, int num, int socket_descriptor, |
| 139 | (void) signal (SIGPIPE, SIG_IGN); | 79 | bool ssl_established) { |
| 80 | #ifdef HAVE_SSL | ||
| 81 | if ((config.use_starttls || config.use_ssl) && ssl_established) { | ||
| 82 | |||
| 83 | return np_net_ssl_write(buf, num); | ||
| 84 | } | ||
| 85 | return (int)send(socket_descriptor, buf, (size_t)num, 0); | ||
| 86 | #else /* ifndef HAVE_SSL */ | ||
| 87 | return send(socket_descriptor, buf, len, 0); | ||
| 88 | #endif | ||
| 89 | } | ||
| 90 | |||
| 91 | static void print_help(void); | ||
| 92 | void print_usage(void); | ||
| 93 | static char *smtp_quit(check_smtp_config /*config*/, char /*buffer*/[MAX_INPUT_BUFFER], | ||
| 94 | int /*socket_descriptor*/, bool /*ssl_established*/); | ||
| 95 | static int recvline(char * /*buf*/, size_t /*bufsize*/, check_smtp_config /*config*/, | ||
| 96 | int /*socket_descriptor*/, bool /*ssl_established*/); | ||
| 97 | static int recvlines(check_smtp_config /*config*/, char * /*buf*/, size_t /*bufsize*/, | ||
| 98 | int /*socket_descriptor*/, bool /*ssl_established*/); | ||
| 99 | static int my_close(int /*socket_descriptor*/); | ||
| 140 | 100 | ||
| 141 | setlocale (LC_ALL, ""); | 101 | static int verbose = 0; |
| 142 | bindtextdomain (PACKAGE, LOCALEDIR); | 102 | |
| 143 | textdomain (PACKAGE); | 103 | int main(int argc, char **argv) { |
| 104 | setlocale(LC_ALL, ""); | ||
| 105 | bindtextdomain(PACKAGE, LOCALEDIR); | ||
| 106 | textdomain(PACKAGE); | ||
| 144 | 107 | ||
| 145 | /* Parse extra opts if any */ | 108 | /* Parse extra opts if any */ |
| 146 | argv=np_extra_opts (&argc, argv, progname); | 109 | argv = np_extra_opts(&argc, argv, progname); |
| 110 | |||
| 111 | check_smtp_config_wrapper tmp_config = process_arguments(argc, argv); | ||
| 147 | 112 | ||
| 148 | if (process_arguments (argc, argv) == ERROR) | 113 | if (tmp_config.errorcode == ERROR) { |
| 149 | usage4 (_("Could not parse arguments")); | 114 | usage4(_("Could not parse arguments")); |
| 115 | } | ||
| 116 | |||
| 117 | const check_smtp_config config = tmp_config.config; | ||
| 118 | |||
| 119 | if (config.output_format_is_set) { | ||
| 120 | mp_set_format(config.output_format); | ||
| 121 | } | ||
| 150 | 122 | ||
| 151 | /* If localhostname not set on command line, use gethostname to set */ | 123 | /* If localhostname not set on command line, use gethostname to set */ |
| 152 | if(! localhostname){ | 124 | char *localhostname = config.localhostname; |
| 153 | localhostname = malloc (HOST_MAX_BYTES); | 125 | if (!localhostname) { |
| 154 | if(!localhostname){ | 126 | localhostname = malloc(HOST_MAX_BYTES); |
| 127 | if (!localhostname) { | ||
| 155 | printf(_("malloc() failed!\n")); | 128 | printf(_("malloc() failed!\n")); |
| 156 | return STATE_CRITICAL; | 129 | exit(STATE_CRITICAL); |
| 157 | } | 130 | } |
| 158 | if(gethostname(localhostname, HOST_MAX_BYTES)){ | 131 | if (gethostname(localhostname, HOST_MAX_BYTES)) { |
| 159 | printf(_("gethostname() failed!\n")); | 132 | printf(_("gethostname() failed!\n")); |
| 160 | return STATE_CRITICAL; | 133 | exit(STATE_CRITICAL); |
| 161 | } | 134 | } |
| 162 | } | 135 | } |
| 163 | if(use_lhlo) | ||
| 164 | xasprintf (&helocmd, "%s%s%s", SMTP_LHLO, localhostname, "\r\n"); | ||
| 165 | else if(use_ehlo) | ||
| 166 | xasprintf (&helocmd, "%s%s%s", SMTP_EHLO, localhostname, "\r\n"); | ||
| 167 | else | ||
| 168 | xasprintf (&helocmd, "%s%s%s", SMTP_HELO, localhostname, "\r\n"); | ||
| 169 | 136 | ||
| 170 | if (verbose) | 137 | char *helocmd = NULL; |
| 138 | if (config.use_lhlo) { | ||
| 139 | xasprintf(&helocmd, "%s%s%s", SMTP_LHLO, localhostname, "\r\n"); | ||
| 140 | } else if (config.use_ehlo) { | ||
| 141 | xasprintf(&helocmd, "%s%s%s", SMTP_EHLO, localhostname, "\r\n"); | ||
| 142 | } else { | ||
| 143 | xasprintf(&helocmd, "%s%s%s", SMTP_HELO, localhostname, "\r\n"); | ||
| 144 | } | ||
| 145 | |||
| 146 | if (verbose) { | ||
| 171 | printf("HELOCMD: %s", helocmd); | 147 | printf("HELOCMD: %s", helocmd); |
| 148 | } | ||
| 172 | 149 | ||
| 150 | char *mail_command = strdup("MAIL "); | ||
| 151 | char *cmd_str = NULL; | ||
| 173 | /* initialize the MAIL command with optional FROM command */ | 152 | /* initialize the MAIL command with optional FROM command */ |
| 174 | xasprintf (&cmd_str, "%sFROM:<%s>%s", mail_command, from_arg, "\r\n"); | 153 | xasprintf(&cmd_str, "%sFROM:<%s>%s", mail_command, config.from_arg, "\r\n"); |
| 154 | |||
| 155 | if (verbose && config.send_mail_from) { | ||
| 156 | printf("FROM CMD: %s", cmd_str); | ||
| 157 | } | ||
| 175 | 158 | ||
| 176 | if (verbose && send_mail_from) | 159 | /* Catch pipe errors in read/write - sometimes occurs when writing QUIT */ |
| 177 | printf ("FROM CMD: %s", cmd_str); | 160 | (void)signal(SIGPIPE, SIG_IGN); |
| 178 | 161 | ||
| 179 | /* initialize alarm signal handling */ | 162 | /* initialize alarm signal handling */ |
| 180 | (void) signal (SIGALRM, socket_timeout_alarm_handler); | 163 | (void)signal(SIGALRM, socket_timeout_alarm_handler); |
| 181 | 164 | ||
| 182 | /* set socket timeout */ | 165 | /* set socket timeout */ |
| 183 | (void) alarm (socket_timeout); | 166 | (void)alarm(socket_timeout); |
| 184 | 167 | ||
| 168 | struct timeval start_time; | ||
| 185 | /* start timer */ | 169 | /* start timer */ |
| 186 | gettimeofday (&tv, NULL); | 170 | gettimeofday(&start_time, NULL); |
| 171 | |||
| 172 | int socket_descriptor = 0; | ||
| 187 | 173 | ||
| 188 | /* try to connect to the host at the given port number */ | 174 | /* try to connect to the host at the given port number */ |
| 189 | result = my_tcp_connect (server_address, server_port, &sd); | 175 | mp_state_enum tcp_result = |
| 190 | 176 | my_tcp_connect(config.server_address, config.server_port, &socket_descriptor); | |
| 191 | if (result == STATE_OK) { /* we connected */ | 177 | |
| 192 | /* If requested, send PROXY header */ | 178 | mp_check overall = mp_check_init(); |
| 193 | if (use_proxy_prefix) { | 179 | mp_subcheck sc_tcp_connect = mp_subcheck_init(); |
| 194 | if (verbose) | 180 | char buffer[MAX_INPUT_BUFFER]; |
| 195 | printf ("Sending header %s\n", PROXY_PREFIX); | 181 | bool ssl_established = false; |
| 196 | my_send(PROXY_PREFIX, strlen(PROXY_PREFIX)); | 182 | |
| 183 | if (tcp_result != STATE_OK) { | ||
| 184 | // Connect failed | ||
| 185 | sc_tcp_connect = mp_set_subcheck_state(sc_tcp_connect, STATE_CRITICAL); | ||
| 186 | xasprintf(&sc_tcp_connect.output, "TCP connect to '%s' failed", config.server_address); | ||
| 187 | mp_add_subcheck_to_check(&overall, sc_tcp_connect); | ||
| 188 | mp_exit(overall); | ||
| 189 | } | ||
| 190 | |||
| 191 | /* we connected */ | ||
| 192 | /* If requested, send PROXY header */ | ||
| 193 | if (config.use_proxy_prefix) { | ||
| 194 | if (verbose) { | ||
| 195 | printf("Sending header %s\n", PROXY_PREFIX); | ||
| 197 | } | 196 | } |
| 197 | my_send(config, PROXY_PREFIX, strlen(PROXY_PREFIX), socket_descriptor, ssl_established); | ||
| 198 | } | ||
| 198 | 199 | ||
| 199 | #ifdef HAVE_SSL | 200 | #ifdef HAVE_SSL |
| 200 | if (use_ssl) { | 201 | if (config.use_ssl) { |
| 201 | result = np_net_ssl_init_with_hostname(sd, (use_sni ? server_address : NULL)); | 202 | int tls_result = np_net_ssl_init_with_hostname( |
| 202 | if (result != STATE_OK) { | 203 | socket_descriptor, (config.use_sni ? config.server_address : NULL)); |
| 203 | printf (_("CRITICAL - Cannot create SSL context.\n")); | 204 | |
| 204 | close(sd); | 205 | mp_subcheck sc_tls_connection = mp_subcheck_init(); |
| 205 | np_net_ssl_cleanup(); | 206 | |
| 206 | return STATE_CRITICAL; | 207 | if (tls_result != STATE_OK) { |
| 207 | } else { | 208 | close(socket_descriptor); |
| 208 | ssl_established = 1; | 209 | np_net_ssl_cleanup(); |
| 209 | } | 210 | |
| 211 | sc_tls_connection = mp_set_subcheck_state(sc_tls_connection, STATE_CRITICAL); | ||
| 212 | xasprintf(&sc_tls_connection.output, "cannot create TLS context"); | ||
| 213 | mp_add_subcheck_to_check(&overall, sc_tls_connection); | ||
| 214 | mp_exit(overall); | ||
| 210 | } | 215 | } |
| 216 | |||
| 217 | sc_tls_connection = mp_set_subcheck_state(sc_tls_connection, STATE_OK); | ||
| 218 | xasprintf(&sc_tls_connection.output, "TLS context established"); | ||
| 219 | mp_add_subcheck_to_check(&overall, sc_tls_connection); | ||
| 220 | ssl_established = true; | ||
| 221 | } | ||
| 211 | #endif | 222 | #endif |
| 212 | 223 | ||
| 213 | /* watch for the SMTP connection string and */ | 224 | /* watch for the SMTP connection string and */ |
| 214 | /* return a WARNING status if we couldn't read any data */ | 225 | /* return a WARNING status if we couldn't read any data */ |
| 215 | if (recvlines(buffer, MAX_INPUT_BUFFER) <= 0) { | 226 | if (recvlines(config, buffer, MAX_INPUT_BUFFER, socket_descriptor, ssl_established) <= 0) { |
| 216 | printf (_("recv() failed\n")); | 227 | mp_subcheck sc_read_data = mp_subcheck_init(); |
| 217 | return STATE_WARNING; | 228 | sc_read_data = mp_set_subcheck_state(sc_read_data, STATE_WARNING); |
| 229 | xasprintf(&sc_read_data.output, "recv() failed"); | ||
| 230 | mp_add_subcheck_to_check(&overall, sc_read_data); | ||
| 231 | mp_exit(overall); | ||
| 232 | } | ||
| 233 | |||
| 234 | char *server_response = NULL; | ||
| 235 | /* save connect return (220 hostname ..) for later use */ | ||
| 236 | xasprintf(&server_response, "%s", buffer); | ||
| 237 | |||
| 238 | /* send the HELO/EHLO command */ | ||
| 239 | my_send(config, helocmd, (int)strlen(helocmd), socket_descriptor, ssl_established); | ||
| 240 | |||
| 241 | /* allow for response to helo command to reach us */ | ||
| 242 | if (recvlines(config, buffer, MAX_INPUT_BUFFER, socket_descriptor, ssl_established) <= 0) { | ||
| 243 | mp_subcheck sc_read_data = mp_subcheck_init(); | ||
| 244 | sc_read_data = mp_set_subcheck_state(sc_read_data, STATE_WARNING); | ||
| 245 | xasprintf(&sc_read_data.output, "recv() failed"); | ||
| 246 | mp_add_subcheck_to_check(&overall, sc_read_data); | ||
| 247 | mp_exit(overall); | ||
| 248 | } | ||
| 249 | |||
| 250 | bool supports_tls = false; | ||
| 251 | if (config.use_ehlo || config.use_lhlo) { | ||
| 252 | if (strstr(buffer, "250 STARTTLS") != NULL || strstr(buffer, "250-STARTTLS") != NULL) { | ||
| 253 | supports_tls = true; | ||
| 218 | } | 254 | } |
| 255 | } | ||
| 219 | 256 | ||
| 220 | /* save connect return (220 hostname ..) for later use */ | 257 | if (config.use_starttls && !supports_tls) { |
| 221 | xasprintf(&server_response, "%s", buffer); | 258 | smtp_quit(config, buffer, socket_descriptor, ssl_established); |
| 222 | 259 | ||
| 223 | /* send the HELO/EHLO command */ | 260 | mp_subcheck sc_read_data = mp_subcheck_init(); |
| 224 | my_send(helocmd, strlen(helocmd)); | 261 | sc_read_data = mp_set_subcheck_state(sc_read_data, STATE_WARNING); |
| 262 | xasprintf(&sc_read_data.output, "StartTLS not supported by server"); | ||
| 263 | mp_add_subcheck_to_check(&overall, sc_read_data); | ||
| 264 | mp_exit(overall); | ||
| 265 | } | ||
| 225 | 266 | ||
| 226 | /* allow for response to helo command to reach us */ | 267 | #ifdef HAVE_SSL |
| 227 | if (recvlines(buffer, MAX_INPUT_BUFFER) <= 0) { | 268 | if (config.use_starttls) { |
| 228 | printf (_("recv() failed\n")); | 269 | /* send the STARTTLS command */ |
| 229 | return STATE_WARNING; | 270 | send(socket_descriptor, SMTP_STARTTLS, strlen(SMTP_STARTTLS), 0); |
| 230 | } else if(use_ehlo || use_lhlo){ | 271 | |
| 231 | if(strstr(buffer, "250 STARTTLS") != NULL || | 272 | mp_subcheck sc_starttls_init = mp_subcheck_init(); |
| 232 | strstr(buffer, "250-STARTTLS") != NULL){ | 273 | recvlines(config, buffer, MAX_INPUT_BUFFER, socket_descriptor, |
| 233 | supports_tls=true; | 274 | ssl_established); /* wait for it */ |
| 234 | } | 275 | if (!strstr(buffer, SMTP_EXPECT)) { |
| 276 | smtp_quit(config, buffer, socket_descriptor, ssl_established); | ||
| 277 | |||
| 278 | xasprintf(&sc_starttls_init.output, "StartTLS not supported by server"); | ||
| 279 | sc_starttls_init = mp_set_subcheck_state(sc_starttls_init, STATE_UNKNOWN); | ||
| 280 | mp_add_subcheck_to_check(&overall, sc_starttls_init); | ||
| 281 | mp_exit(overall); | ||
| 235 | } | 282 | } |
| 236 | 283 | ||
| 237 | if(use_starttls && ! supports_tls){ | 284 | mp_state_enum starttls_result = np_net_ssl_init_with_hostname( |
| 238 | printf(_("WARNING - TLS not supported by server\n")); | 285 | socket_descriptor, (config.use_sni ? config.server_address : NULL)); |
| 239 | smtp_quit(); | 286 | if (starttls_result != STATE_OK) { |
| 240 | return STATE_WARNING; | 287 | close(socket_descriptor); |
| 288 | np_net_ssl_cleanup(); | ||
| 289 | |||
| 290 | sc_starttls_init = mp_set_subcheck_state(sc_starttls_init, STATE_CRITICAL); | ||
| 291 | xasprintf(&sc_starttls_init.output, "failed to create StartTLS context"); | ||
| 292 | mp_add_subcheck_to_check(&overall, sc_starttls_init); | ||
| 293 | mp_exit(overall); | ||
| 241 | } | 294 | } |
| 295 | sc_starttls_init = mp_set_subcheck_state(sc_starttls_init, STATE_OK); | ||
| 296 | xasprintf(&sc_starttls_init.output, "created StartTLS context"); | ||
| 297 | mp_add_subcheck_to_check(&overall, sc_starttls_init); | ||
| 242 | 298 | ||
| 243 | #ifdef HAVE_SSL | 299 | ssl_established = true; |
| 244 | if(use_starttls) { | ||
| 245 | /* send the STARTTLS command */ | ||
| 246 | send(sd, SMTP_STARTTLS, strlen(SMTP_STARTTLS), 0); | ||
| 247 | |||
| 248 | recvlines(buffer, MAX_INPUT_BUFFER); /* wait for it */ | ||
| 249 | if (!strstr (buffer, SMTP_EXPECT)) { | ||
| 250 | printf (_("Server does not support STARTTLS\n")); | ||
| 251 | smtp_quit(); | ||
| 252 | return STATE_UNKNOWN; | ||
| 253 | } | ||
| 254 | result = np_net_ssl_init_with_hostname(sd, (use_sni ? server_address : NULL)); | ||
| 255 | if(result != STATE_OK) { | ||
| 256 | printf (_("CRITICAL - Cannot create SSL context.\n")); | ||
| 257 | close(sd); | ||
| 258 | np_net_ssl_cleanup(); | ||
| 259 | return STATE_CRITICAL; | ||
| 260 | } else { | ||
| 261 | ssl_established = 1; | ||
| 262 | } | ||
| 263 | 300 | ||
| 264 | /* | 301 | /* |
| 265 | * Resend the EHLO command. | 302 | * Resend the EHLO command. |
| @@ -272,218 +309,287 @@ main (int argc, char **argv) | |||
| 272 | * reason, some MTAs will not allow an AUTH LOGIN command before | 309 | * reason, some MTAs will not allow an AUTH LOGIN command before |
| 273 | * we resent EHLO via TLS. | 310 | * we resent EHLO via TLS. |
| 274 | */ | 311 | */ |
| 275 | if (my_send(helocmd, strlen(helocmd)) <= 0) { | 312 | if (my_send(config, helocmd, (int)strlen(helocmd), socket_descriptor, ssl_established) <= |
| 276 | printf("%s\n", _("SMTP UNKNOWN - Cannot send EHLO command via TLS.")); | 313 | 0) { |
| 277 | my_close(); | 314 | my_close(socket_descriptor); |
| 278 | return STATE_UNKNOWN; | 315 | |
| 316 | mp_subcheck sc_ehlo = mp_subcheck_init(); | ||
| 317 | sc_ehlo = mp_set_subcheck_state(sc_ehlo, STATE_UNKNOWN); | ||
| 318 | xasprintf(&sc_ehlo.output, "cannot send EHLO command via StartTLS"); | ||
| 319 | mp_add_subcheck_to_check(&overall, sc_ehlo); | ||
| 320 | mp_exit(overall); | ||
| 279 | } | 321 | } |
| 280 | if (verbose) | 322 | |
| 323 | if (verbose) { | ||
| 281 | printf(_("sent %s"), helocmd); | 324 | printf(_("sent %s"), helocmd); |
| 282 | if ((n = recvlines(buffer, MAX_INPUT_BUFFER)) <= 0) { | ||
| 283 | printf("%s\n", _("SMTP UNKNOWN - Cannot read EHLO response via TLS.")); | ||
| 284 | my_close(); | ||
| 285 | return STATE_UNKNOWN; | ||
| 286 | } | 325 | } |
| 326 | |||
| 327 | if (recvlines(config, buffer, MAX_INPUT_BUFFER, socket_descriptor, ssl_established) <= 0) { | ||
| 328 | my_close(socket_descriptor); | ||
| 329 | |||
| 330 | mp_subcheck sc_ehlo = mp_subcheck_init(); | ||
| 331 | sc_ehlo = mp_set_subcheck_state(sc_ehlo, STATE_UNKNOWN); | ||
| 332 | xasprintf(&sc_ehlo.output, "cannot read EHLO response via StartTLS"); | ||
| 333 | mp_add_subcheck_to_check(&overall, sc_ehlo); | ||
| 334 | mp_exit(overall); | ||
| 335 | } | ||
| 336 | |||
| 287 | if (verbose) { | 337 | if (verbose) { |
| 288 | printf("%s", buffer); | 338 | printf("%s", buffer); |
| 289 | } | 339 | } |
| 340 | } | ||
| 341 | |||
| 342 | # ifdef USE_OPENSSL | ||
| 343 | if (ssl_established) { | ||
| 344 | net_ssl_check_cert_result cert_check_result = | ||
| 345 | np_net_ssl_check_cert2(config.days_till_exp_warn, config.days_till_exp_crit); | ||
| 346 | |||
| 347 | mp_subcheck sc_cert_check = mp_subcheck_init(); | ||
| 348 | |||
| 349 | switch (cert_check_result.errors) { | ||
| 350 | case ALL_OK: { | ||
| 351 | |||
| 352 | if (cert_check_result.result_state != STATE_OK && | ||
| 353 | config.ignore_certificate_expiration) { | ||
| 354 | xasprintf(&sc_cert_check.output, | ||
| 355 | "Remaining certificate lifetime: %d days. Expiration will be ignored", | ||
| 356 | (int)(cert_check_result.remaining_seconds / 86400)); | ||
| 357 | sc_cert_check = mp_set_subcheck_state(sc_cert_check, STATE_OK); | ||
| 358 | } else { | ||
| 359 | xasprintf(&sc_cert_check.output, "Remaining certificate lifetime: %d days", | ||
| 360 | (int)(cert_check_result.remaining_seconds / 86400)); | ||
| 361 | sc_cert_check = | ||
| 362 | mp_set_subcheck_state(sc_cert_check, cert_check_result.result_state); | ||
| 363 | } | ||
| 364 | } break; | ||
| 365 | case NO_SERVER_CERTIFICATE_PRESENT: { | ||
| 366 | xasprintf(&sc_cert_check.output, "no server certificate present"); | ||
| 367 | sc_cert_check = mp_set_subcheck_state(sc_cert_check, cert_check_result.result_state); | ||
| 368 | } break; | ||
| 369 | case UNABLE_TO_RETRIEVE_CERTIFICATE_SUBJECT: { | ||
| 370 | xasprintf(&sc_cert_check.output, "can not retrieve certificate subject"); | ||
| 371 | sc_cert_check = mp_set_subcheck_state(sc_cert_check, cert_check_result.result_state); | ||
| 372 | } break; | ||
| 373 | case WRONG_TIME_FORMAT_IN_CERTIFICATE: { | ||
| 374 | xasprintf(&sc_cert_check.output, "wrong time format in certificate"); | ||
| 375 | sc_cert_check = mp_set_subcheck_state(sc_cert_check, cert_check_result.result_state); | ||
| 376 | } break; | ||
| 377 | }; | ||
| 378 | |||
| 379 | mp_add_subcheck_to_check(&overall, sc_cert_check); | ||
| 380 | } | ||
| 381 | # endif /* USE_OPENSSL */ | ||
| 290 | 382 | ||
| 291 | # ifdef USE_OPENSSL | ||
| 292 | if ( check_cert ) { | ||
| 293 | result = np_net_ssl_check_cert(days_till_exp_warn, days_till_exp_crit); | ||
| 294 | smtp_quit(); | ||
| 295 | my_close(); | ||
| 296 | return result; | ||
| 297 | } | ||
| 298 | # endif /* USE_OPENSSL */ | ||
| 299 | } | ||
| 300 | #endif | 383 | #endif |
| 301 | 384 | ||
| 302 | if (verbose) | 385 | if (verbose) { |
| 303 | printf ("%s", buffer); | 386 | printf("%s", buffer); |
| 304 | 387 | } | |
| 305 | /* save buffer for later use */ | 388 | |
| 306 | xasprintf(&server_response, "%s%s", server_response, buffer); | 389 | /* save buffer for later use */ |
| 307 | /* strip the buffer of carriage returns */ | 390 | xasprintf(&server_response, "%s%s", server_response, buffer); |
| 308 | strip (server_response); | 391 | /* strip the buffer of carriage returns */ |
| 309 | 392 | strip(server_response); | |
| 310 | /* make sure we find the droids we are looking for */ | 393 | |
| 311 | if (!strstr (server_response, server_expect)) { | 394 | /* make sure we find the droids we are looking for */ |
| 312 | if (server_port == SMTP_PORT) | 395 | mp_subcheck sc_expect_response = mp_subcheck_init(); |
| 313 | printf (_("Invalid SMTP response received from host: %s\n"), server_response); | 396 | |
| 314 | else | 397 | if (!strstr(server_response, config.server_expect)) { |
| 315 | printf (_("Invalid SMTP response received from host on port %d: %s\n"), | 398 | sc_expect_response = mp_set_subcheck_state(sc_expect_response, STATE_WARNING); |
| 316 | server_port, server_response); | 399 | if (config.server_port == SMTP_PORT) { |
| 317 | return STATE_WARNING; | 400 | xasprintf(&sc_expect_response.output, _("invalid SMTP response received from host: %s"), |
| 401 | server_response); | ||
| 402 | } else { | ||
| 403 | xasprintf(&sc_expect_response.output, | ||
| 404 | _("invalid SMTP response received from host on port %d: %s"), | ||
| 405 | config.server_port, server_response); | ||
| 318 | } | 406 | } |
| 407 | exit(STATE_WARNING); | ||
| 408 | } else { | ||
| 409 | xasprintf(&sc_expect_response.output, "received valid SMTP response '%s' from host: '%s'", | ||
| 410 | config.server_expect, server_response); | ||
| 411 | sc_expect_response = mp_set_subcheck_state(sc_expect_response, STATE_OK); | ||
| 412 | } | ||
| 413 | |||
| 414 | mp_add_subcheck_to_check(&overall, sc_expect_response); | ||
| 319 | 415 | ||
| 320 | if (send_mail_from) { | 416 | if (config.send_mail_from) { |
| 321 | my_send(cmd_str, strlen(cmd_str)); | 417 | my_send(config, cmd_str, (int)strlen(cmd_str), socket_descriptor, ssl_established); |
| 322 | if (recvlines(buffer, MAX_INPUT_BUFFER) >= 1 && verbose) | 418 | if (recvlines(config, buffer, MAX_INPUT_BUFFER, socket_descriptor, ssl_established) >= 1 && |
| 323 | printf("%s", buffer); | 419 | verbose) { |
| 420 | printf("%s", buffer); | ||
| 324 | } | 421 | } |
| 422 | } | ||
| 423 | |||
| 424 | size_t counter = 0; | ||
| 425 | while (counter < config.ncommands) { | ||
| 426 | xasprintf(&cmd_str, "%s%s", config.commands[counter], "\r\n"); | ||
| 427 | my_send(config, cmd_str, (int)strlen(cmd_str), socket_descriptor, ssl_established); | ||
| 428 | if (recvlines(config, buffer, MAX_INPUT_BUFFER, socket_descriptor, ssl_established) >= 1 && | ||
| 429 | verbose) { | ||
| 430 | printf("%s", buffer); | ||
| 431 | } | ||
| 432 | |||
| 433 | strip(buffer); | ||
| 434 | |||
| 435 | if (counter < config.nresponses) { | ||
| 436 | int cflags = REG_EXTENDED | REG_NOSUB | REG_NEWLINE; | ||
| 437 | regex_t preg; | ||
| 438 | int errcode = regcomp(&preg, config.responses[counter], cflags); | ||
| 439 | char errbuf[MAX_INPUT_BUFFER]; | ||
| 440 | if (errcode != 0) { | ||
| 441 | regerror(errcode, &preg, errbuf, MAX_INPUT_BUFFER); | ||
| 442 | printf(_("Could Not Compile Regular Expression")); | ||
| 443 | exit(STATE_UNKNOWN); | ||
| 444 | } | ||
| 325 | 445 | ||
| 326 | n = 0; | 446 | regmatch_t pmatch[10]; |
| 327 | while (n < ncommands) { | 447 | int eflags = 0; |
| 328 | xasprintf (&cmd_str, "%s%s", commands[n], "\r\n"); | 448 | int excode = regexec(&preg, buffer, 10, pmatch, eflags); |
| 329 | my_send(cmd_str, strlen(cmd_str)); | 449 | mp_subcheck sc_expected_responses = mp_subcheck_init(); |
| 330 | if (recvlines(buffer, MAX_INPUT_BUFFER) >= 1 && verbose) | 450 | if (excode == 0) { |
| 331 | printf("%s", buffer); | 451 | xasprintf(&sc_expected_responses.output, "valid response '%s' to command '%s'", |
| 332 | strip (buffer); | 452 | buffer, config.commands[counter]); |
| 333 | if (n < nresponses) { | 453 | sc_expected_responses = mp_set_subcheck_state(sc_expected_responses, STATE_OK); |
| 334 | cflags |= REG_EXTENDED | REG_NOSUB | REG_NEWLINE; | 454 | } else if (excode == REG_NOMATCH) { |
| 335 | errcode = regcomp (&preg, responses[n], cflags); | 455 | sc_expected_responses = mp_set_subcheck_state(sc_expected_responses, STATE_WARNING); |
| 336 | if (errcode != 0) { | 456 | xasprintf(&sc_expected_responses.output, "invalid response '%s' to command '%s'", |
| 337 | regerror (errcode, &preg, errbuf, MAX_INPUT_BUFFER); | 457 | buffer, config.commands[counter]); |
| 338 | printf (_("Could Not Compile Regular Expression")); | 458 | } else { |
| 339 | return ERROR; | 459 | regerror(excode, &preg, errbuf, MAX_INPUT_BUFFER); |
| 460 | xasprintf(&sc_expected_responses.output, "regexec execute error: %s", errbuf); | ||
| 461 | sc_expected_responses = mp_set_subcheck_state(sc_expected_responses, STATE_UNKNOWN); | ||
| 462 | } | ||
| 463 | } | ||
| 464 | counter++; | ||
| 465 | } | ||
| 466 | |||
| 467 | if (config.authtype != NULL) { | ||
| 468 | mp_subcheck sc_auth = mp_subcheck_init(); | ||
| 469 | |||
| 470 | if (strcmp(config.authtype, "LOGIN") == 0) { | ||
| 471 | char *abuf; | ||
| 472 | int ret; | ||
| 473 | do { | ||
| 474 | /* send AUTH LOGIN */ | ||
| 475 | my_send(config, SMTP_AUTH_LOGIN, strlen(SMTP_AUTH_LOGIN), socket_descriptor, | ||
| 476 | ssl_established); | ||
| 477 | |||
| 478 | if (verbose) { | ||
| 479 | printf(_("sent %s\n"), "AUTH LOGIN"); | ||
| 340 | } | 480 | } |
| 341 | excode = regexec (&preg, buffer, 10, pmatch, eflags); | 481 | |
| 342 | if (excode == 0) { | 482 | if ((ret = recvlines(config, buffer, MAX_INPUT_BUFFER, socket_descriptor, |
| 343 | result = STATE_OK; | 483 | ssl_established)) <= 0) { |
| 484 | xasprintf(&sc_auth.output, _("recv() failed after AUTH LOGIN")); | ||
| 485 | sc_auth = mp_set_subcheck_state(sc_auth, STATE_WARNING); | ||
| 486 | break; | ||
| 344 | } | 487 | } |
| 345 | else if (excode == REG_NOMATCH) { | 488 | |
| 346 | result = STATE_WARNING; | 489 | if (verbose) { |
| 347 | printf (_("SMTP %s - Invalid response '%s' to command '%s'\n"), state_text (result), buffer, commands[n]); | 490 | printf(_("received %s\n"), buffer); |
| 348 | } | 491 | } |
| 349 | else { | 492 | |
| 350 | regerror (excode, &preg, errbuf, MAX_INPUT_BUFFER); | 493 | if (strncmp(buffer, "334", 3) != 0) { |
| 351 | printf (_("Execute Error: %s\n"), errbuf); | 494 | xasprintf(&sc_auth.output, "invalid response received after AUTH LOGIN"); |
| 352 | result = STATE_UNKNOWN; | 495 | sc_auth = mp_set_subcheck_state(sc_auth, STATE_CRITICAL); |
| 496 | break; | ||
| 353 | } | 497 | } |
| 354 | } | ||
| 355 | n++; | ||
| 356 | } | ||
| 357 | 498 | ||
| 358 | if (authtype != NULL) { | 499 | /* encode authuser with base64 */ |
| 359 | if (strcmp (authtype, "LOGIN") == 0) { | 500 | base64_encode_alloc(config.authuser, strlen(config.authuser), &abuf); |
| 360 | char *abuf; | 501 | xasprintf(&abuf, "%s\r\n", abuf); |
| 361 | int ret; | 502 | my_send(config, abuf, (int)strlen(abuf), socket_descriptor, ssl_established); |
| 362 | do { | 503 | if (verbose) { |
| 363 | if (authuser == NULL) { | 504 | printf(_("sent %s\n"), abuf); |
| 364 | result = STATE_CRITICAL; | 505 | } |
| 365 | xasprintf(&error_msg, _("no authuser specified, ")); | 506 | |
| 366 | break; | 507 | if ((ret = recvlines(config, buffer, MAX_INPUT_BUFFER, socket_descriptor, |
| 367 | } | 508 | ssl_established)) <= 0) { |
| 368 | if (authpass == NULL) { | 509 | xasprintf(&sc_auth.output, "recv() failed after sending authuser"); |
| 369 | result = STATE_CRITICAL; | 510 | sc_auth = mp_set_subcheck_state(sc_auth, STATE_CRITICAL); |
| 370 | xasprintf(&error_msg, _("no authpass specified, ")); | ||
| 371 | break; | ||
| 372 | } | ||
| 373 | |||
| 374 | /* send AUTH LOGIN */ | ||
| 375 | my_send(SMTP_AUTH_LOGIN, strlen(SMTP_AUTH_LOGIN)); | ||
| 376 | if (verbose) | ||
| 377 | printf (_("sent %s\n"), "AUTH LOGIN"); | ||
| 378 | |||
| 379 | if ((ret = recvlines(buffer, MAX_INPUT_BUFFER)) <= 0) { | ||
| 380 | xasprintf(&error_msg, _("recv() failed after AUTH LOGIN, ")); | ||
| 381 | result = STATE_WARNING; | ||
| 382 | break; | ||
| 383 | } | ||
| 384 | if (verbose) | ||
| 385 | printf (_("received %s\n"), buffer); | ||
| 386 | |||
| 387 | if (strncmp (buffer, "334", 3) != 0) { | ||
| 388 | result = STATE_CRITICAL; | ||
| 389 | xasprintf(&error_msg, _("invalid response received after AUTH LOGIN, ")); | ||
| 390 | break; | ||
| 391 | } | ||
| 392 | |||
| 393 | /* encode authuser with base64 */ | ||
| 394 | base64_encode_alloc (authuser, strlen(authuser), &abuf); | ||
| 395 | xasprintf(&abuf, "%s\r\n", abuf); | ||
| 396 | my_send(abuf, strlen(abuf)); | ||
| 397 | if (verbose) | ||
| 398 | printf (_("sent %s\n"), abuf); | ||
| 399 | |||
| 400 | if ((ret = recvlines(buffer, MAX_INPUT_BUFFER)) <= 0) { | ||
| 401 | result = STATE_CRITICAL; | ||
| 402 | xasprintf(&error_msg, _("recv() failed after sending authuser, ")); | ||
| 403 | break; | ||
| 404 | } | ||
| 405 | if (verbose) { | ||
| 406 | printf (_("received %s\n"), buffer); | ||
| 407 | } | ||
| 408 | if (strncmp (buffer, "334", 3) != 0) { | ||
| 409 | result = STATE_CRITICAL; | ||
| 410 | xasprintf(&error_msg, _("invalid response received after authuser, ")); | ||
| 411 | break; | ||
| 412 | } | ||
| 413 | /* encode authpass with base64 */ | ||
| 414 | base64_encode_alloc (authpass, strlen(authpass), &abuf); | ||
| 415 | xasprintf(&abuf, "%s\r\n", abuf); | ||
| 416 | my_send(abuf, strlen(abuf)); | ||
| 417 | if (verbose) { | ||
| 418 | printf (_("sent %s\n"), abuf); | ||
| 419 | } | ||
| 420 | if ((ret = recvlines(buffer, MAX_INPUT_BUFFER)) <= 0) { | ||
| 421 | result = STATE_CRITICAL; | ||
| 422 | xasprintf(&error_msg, _("recv() failed after sending authpass, ")); | ||
| 423 | break; | ||
| 424 | } | ||
| 425 | if (verbose) { | ||
| 426 | printf (_("received %s\n"), buffer); | ||
| 427 | } | ||
| 428 | if (strncmp (buffer, "235", 3) != 0) { | ||
| 429 | result = STATE_CRITICAL; | ||
| 430 | xasprintf(&error_msg, _("invalid response received after authpass, ")); | ||
| 431 | break; | ||
| 432 | } | ||
| 433 | break; | 511 | break; |
| 434 | } while (0); | 512 | } |
| 435 | } else { | ||
| 436 | result = STATE_CRITICAL; | ||
| 437 | xasprintf(&error_msg, _("only authtype LOGIN is supported, ")); | ||
| 438 | } | ||
| 439 | } | ||
| 440 | 513 | ||
| 441 | /* tell the server we're done */ | 514 | if (verbose) { |
| 442 | smtp_quit(); | 515 | printf(_("received %s\n"), buffer); |
| 516 | } | ||
| 443 | 517 | ||
| 444 | /* finally close the connection */ | 518 | if (strncmp(buffer, "334", 3) != 0) { |
| 445 | close (sd); | 519 | xasprintf(&sc_auth.output, "invalid response received after authuser"); |
| 446 | } | 520 | sc_auth = mp_set_subcheck_state(sc_auth, STATE_CRITICAL); |
| 521 | break; | ||
| 522 | } | ||
| 447 | 523 | ||
| 448 | /* reset the alarm */ | 524 | /* encode authpass with base64 */ |
| 449 | alarm (0); | 525 | base64_encode_alloc(config.authpass, strlen(config.authpass), &abuf); |
| 526 | xasprintf(&abuf, "%s\r\n", abuf); | ||
| 527 | my_send(config, abuf, (int)strlen(abuf), socket_descriptor, ssl_established); | ||
| 450 | 528 | ||
| 451 | microsec = deltime (tv); | 529 | if (verbose) { |
| 452 | elapsed_time = (double)microsec / 1.0e6; | 530 | printf(_("sent %s\n"), abuf); |
| 531 | } | ||
| 453 | 532 | ||
| 454 | if (result == STATE_OK) { | 533 | if ((ret = recvlines(config, buffer, MAX_INPUT_BUFFER, socket_descriptor, |
| 455 | if (check_critical_time && elapsed_time > critical_time) | 534 | ssl_established)) <= 0) { |
| 456 | result = STATE_CRITICAL; | 535 | xasprintf(&sc_auth.output, "recv() failed after sending authpass"); |
| 457 | else if (check_warning_time && elapsed_time > warning_time) | 536 | sc_auth = mp_set_subcheck_state(sc_auth, STATE_CRITICAL); |
| 458 | result = STATE_WARNING; | 537 | break; |
| 538 | } | ||
| 539 | |||
| 540 | if (verbose) { | ||
| 541 | printf(_("received %s\n"), buffer); | ||
| 542 | } | ||
| 543 | |||
| 544 | if (strncmp(buffer, "235", 3) != 0) { | ||
| 545 | xasprintf(&sc_auth.output, "invalid response received after authpass"); | ||
| 546 | sc_auth = mp_set_subcheck_state(sc_auth, STATE_CRITICAL); | ||
| 547 | break; | ||
| 548 | } | ||
| 549 | break; | ||
| 550 | } while (false); | ||
| 551 | } else { | ||
| 552 | sc_auth = mp_set_subcheck_state(sc_auth, STATE_CRITICAL); | ||
| 553 | xasprintf(&sc_auth.output, "only authtype LOGIN is supported"); | ||
| 554 | } | ||
| 555 | |||
| 556 | mp_add_subcheck_to_check(&overall, sc_auth); | ||
| 459 | } | 557 | } |
| 460 | 558 | ||
| 461 | printf (_("SMTP %s - %s%.3f sec. response time%s%s|%s\n"), | 559 | /* tell the server we're done */ |
| 462 | state_text (result), | 560 | smtp_quit(config, buffer, socket_descriptor, ssl_established); |
| 463 | error_msg, | ||
| 464 | elapsed_time, | ||
| 465 | verbose?", ":"", verbose?buffer:"", | ||
| 466 | fperfdata ("time", elapsed_time, "s", | ||
| 467 | (int)check_warning_time, warning_time, | ||
| 468 | (int)check_critical_time, critical_time, | ||
| 469 | true, 0, false, 0)); | ||
| 470 | 561 | ||
| 471 | return result; | 562 | /* finally close the connection */ |
| 472 | } | 563 | close(socket_descriptor); |
| 473 | 564 | ||
| 565 | /* reset the alarm */ | ||
| 566 | alarm(0); | ||
| 474 | 567 | ||
| 568 | long microsec = deltime(start_time); | ||
| 569 | double elapsed_time = (double)microsec / 1.0e6; | ||
| 475 | 570 | ||
| 476 | /* process command-line arguments */ | 571 | mp_perfdata pd_elapsed_time = perfdata_init(); |
| 477 | int | 572 | pd_elapsed_time = mp_set_pd_value(pd_elapsed_time, elapsed_time); |
| 478 | process_arguments (int argc, char **argv) | 573 | pd_elapsed_time.label = "time"; |
| 479 | { | 574 | pd_elapsed_time.uom = "s"; |
| 480 | int c; | ||
| 481 | char* temp; | ||
| 482 | 575 | ||
| 483 | bool implicit_tls = false; | 576 | pd_elapsed_time = mp_pd_set_thresholds(pd_elapsed_time, config.connection_time); |
| 577 | |||
| 578 | mp_subcheck sc_connection_time = mp_subcheck_init(); | ||
| 579 | xasprintf(&sc_connection_time.output, "connection time: %.3gs", elapsed_time); | ||
| 580 | sc_connection_time = | ||
| 581 | mp_set_subcheck_state(sc_connection_time, mp_get_pd_status(pd_elapsed_time)); | ||
| 582 | mp_add_subcheck_to_check(&overall, sc_connection_time); | ||
| 583 | |||
| 584 | mp_exit(overall); | ||
| 585 | } | ||
| 484 | 586 | ||
| 587 | /* process command-line arguments */ | ||
| 588 | check_smtp_config_wrapper process_arguments(int argc, char **argv) { | ||
| 485 | enum { | 589 | enum { |
| 486 | SNI_OPTION | 590 | SNI_OPTION = CHAR_MAX + 1, |
| 591 | output_format_index, | ||
| 592 | ignore_certificate_expiration_index, | ||
| 487 | }; | 593 | }; |
| 488 | 594 | ||
| 489 | int option = 0; | 595 | int option = 0; |
| @@ -509,173 +615,194 @@ process_arguments (int argc, char **argv) | |||
| 509 | {"lmtp", no_argument, 0, 'L'}, | 615 | {"lmtp", no_argument, 0, 'L'}, |
| 510 | {"ssl", no_argument, 0, 's'}, | 616 | {"ssl", no_argument, 0, 's'}, |
| 511 | {"tls", no_argument, 0, 's'}, | 617 | {"tls", no_argument, 0, 's'}, |
| 512 | {"starttls",no_argument,0,'S'}, | 618 | {"starttls", no_argument, 0, 'S'}, |
| 513 | {"sni", no_argument, 0, SNI_OPTION}, | 619 | {"sni", no_argument, 0, SNI_OPTION}, |
| 514 | {"certificate",required_argument,0,'D'}, | 620 | {"certificate", required_argument, 0, 'D'}, |
| 515 | {"ignore-quit-failure",no_argument,0,'q'}, | 621 | {"ignore-quit-failure", no_argument, 0, 'q'}, |
| 516 | {"proxy",no_argument,0,'r'}, | 622 | {"proxy", no_argument, 0, 'r'}, |
| 517 | {0, 0, 0, 0} | 623 | {"ignore-certificate-expiration", no_argument, 0, ignore_certificate_expiration_index}, |
| 624 | {"output-format", required_argument, 0, output_format_index}, | ||
| 625 | {0, 0, 0, 0}}; | ||
| 626 | |||
| 627 | check_smtp_config_wrapper result = { | ||
| 628 | .config = check_smtp_config_init(), | ||
| 629 | .errorcode = OK, | ||
| 518 | }; | 630 | }; |
| 519 | 631 | ||
| 520 | if (argc < 2) | 632 | if (argc < 2) { |
| 521 | return ERROR; | 633 | result.errorcode = ERROR; |
| 634 | return result; | ||
| 635 | } | ||
| 522 | 636 | ||
| 523 | for (c = 1; c < argc; c++) { | 637 | for (int index = 1; index < argc; index++) { |
| 524 | if (strcmp ("-to", argv[c]) == 0) | 638 | if (strcmp("-to", argv[index]) == 0) { |
| 525 | strcpy (argv[c], "-t"); | 639 | strcpy(argv[index], "-t"); |
| 526 | else if (strcmp ("-wt", argv[c]) == 0) | 640 | } else if (strcmp("-wt", argv[index]) == 0) { |
| 527 | strcpy (argv[c], "-w"); | 641 | strcpy(argv[index], "-w"); |
| 528 | else if (strcmp ("-ct", argv[c]) == 0) | 642 | } else if (strcmp("-ct", argv[index]) == 0) { |
| 529 | strcpy (argv[c], "-c"); | 643 | strcpy(argv[index], "-c"); |
| 644 | } | ||
| 530 | } | 645 | } |
| 531 | 646 | ||
| 532 | while (1) { | 647 | unsigned long command_size = 0; |
| 533 | c = getopt_long (argc, argv, "+hVv46Lrt:p:f:e:c:w:H:C:R:sSD:F:A:U:P:q", | 648 | unsigned long response_size = 0; |
| 534 | longopts, &option); | 649 | bool implicit_tls = false; |
| 650 | int server_port_option = 0; | ||
| 651 | while (true) { | ||
| 652 | int opt_index = | ||
| 653 | getopt_long(argc, argv, "+hVv46Lrt:p:f:e:c:w:H:C:R:sSD:F:A:U:P:q", longopts, &option); | ||
| 535 | 654 | ||
| 536 | if (c == -1 || c == EOF) | 655 | if (opt_index == -1 || opt_index == EOF) { |
| 537 | break; | 656 | break; |
| 657 | } | ||
| 538 | 658 | ||
| 539 | switch (c) { | 659 | switch (opt_index) { |
| 540 | case 'H': /* hostname */ | 660 | case 'H': /* hostname */ |
| 541 | if (is_host (optarg)) { | 661 | if (is_host(optarg)) { |
| 542 | server_address = optarg; | 662 | result.config.server_address = optarg; |
| 543 | } | 663 | } else { |
| 544 | else { | 664 | usage2(_("Invalid hostname/address"), optarg); |
| 545 | usage2 (_("Invalid hostname/address"), optarg); | ||
| 546 | } | 665 | } |
| 547 | break; | 666 | break; |
| 548 | case 'p': /* port */ | 667 | case 'p': /* port */ |
| 549 | if (is_intpos (optarg)) | 668 | if (is_intpos(optarg)) { |
| 550 | server_port_option = atoi (optarg); | 669 | server_port_option = atoi(optarg); |
| 551 | else | 670 | } else { |
| 552 | usage4 (_("Port must be a positive integer")); | 671 | usage4(_("Port must be a positive integer")); |
| 672 | } | ||
| 553 | break; | 673 | break; |
| 554 | case 'F': | 674 | case 'F': |
| 555 | /* localhostname */ | 675 | /* localhostname */ |
| 556 | localhostname = strdup(optarg); | 676 | result.config.localhostname = strdup(optarg); |
| 557 | break; | 677 | break; |
| 558 | case 'f': /* from argument */ | 678 | case 'f': /* from argument */ |
| 559 | from_arg = optarg + strspn(optarg, "<"); | 679 | result.config.from_arg = optarg + strspn(optarg, "<"); |
| 560 | from_arg = strndup(from_arg, strcspn(from_arg, ">")); | 680 | result.config.from_arg = |
| 561 | send_mail_from = 1; | 681 | strndup(result.config.from_arg, strcspn(result.config.from_arg, ">")); |
| 682 | result.config.send_mail_from = true; | ||
| 562 | break; | 683 | break; |
| 563 | case 'A': | 684 | case 'A': |
| 564 | authtype = optarg; | 685 | result.config.authtype = optarg; |
| 565 | use_ehlo = true; | 686 | result.config.use_ehlo = true; |
| 566 | break; | 687 | break; |
| 567 | case 'U': | 688 | case 'U': |
| 568 | authuser = optarg; | 689 | result.config.authuser = optarg; |
| 569 | break; | 690 | break; |
| 570 | case 'P': | 691 | case 'P': |
| 571 | authpass = optarg; | 692 | result.config.authpass = optarg; |
| 572 | break; | 693 | break; |
| 573 | case 'e': /* server expect string on 220 */ | 694 | case 'e': /* server expect string on 220 */ |
| 574 | server_expect = optarg; | 695 | result.config.server_expect = optarg; |
| 575 | break; | 696 | break; |
| 576 | case 'C': /* commands */ | 697 | case 'C': /* commands */ |
| 577 | if (ncommands >= command_size) { | 698 | if (result.config.ncommands >= command_size) { |
| 578 | command_size+=8; | 699 | command_size += 8; |
| 579 | commands = realloc (commands, sizeof(char *) * command_size); | 700 | result.config.commands = |
| 580 | if (commands == NULL) | 701 | realloc(result.config.commands, sizeof(char *) * command_size); |
| 581 | die (STATE_UNKNOWN, | 702 | if (result.config.commands == NULL) { |
| 582 | _("Could not realloc() units [%d]\n"), ncommands); | 703 | die(STATE_UNKNOWN, _("Could not realloc() units [%lu]\n"), |
| 704 | result.config.ncommands); | ||
| 705 | } | ||
| 583 | } | 706 | } |
| 584 | commands[ncommands] = (char *) malloc (sizeof(char) * 255); | 707 | result.config.commands[result.config.ncommands] = (char *)malloc(sizeof(char) * 255); |
| 585 | strncpy (commands[ncommands], optarg, 255); | 708 | strncpy(result.config.commands[result.config.ncommands], optarg, 255); |
| 586 | ncommands++; | 709 | result.config.ncommands++; |
| 587 | break; | 710 | break; |
| 588 | case 'R': /* server responses */ | 711 | case 'R': /* server responses */ |
| 589 | if (nresponses >= response_size) { | 712 | if (result.config.nresponses >= response_size) { |
| 590 | response_size += 8; | 713 | response_size += 8; |
| 591 | responses = realloc (responses, sizeof(char *) * response_size); | 714 | result.config.responses = |
| 592 | if (responses == NULL) | 715 | realloc(result.config.responses, sizeof(char *) * response_size); |
| 593 | die (STATE_UNKNOWN, | 716 | if (result.config.responses == NULL) { |
| 594 | _("Could not realloc() units [%d]\n"), nresponses); | 717 | die(STATE_UNKNOWN, _("Could not realloc() units [%lu]\n"), |
| 718 | result.config.nresponses); | ||
| 719 | } | ||
| 595 | } | 720 | } |
| 596 | responses[nresponses] = (char *) malloc (sizeof(char) * 255); | 721 | result.config.responses[result.config.nresponses] = (char *)malloc(sizeof(char) * 255); |
| 597 | strncpy (responses[nresponses], optarg, 255); | 722 | strncpy(result.config.responses[result.config.nresponses], optarg, 255); |
| 598 | nresponses++; | 723 | result.config.nresponses++; |
| 599 | break; | 724 | break; |
| 600 | case 'c': /* critical time threshold */ | 725 | case 'c': /* critical time threshold */ { |
| 601 | if (!is_nonnegative (optarg)) | 726 | mp_range_parsed tmp = mp_parse_range_string(optarg); |
| 602 | usage4 (_("Critical time must be a positive")); | 727 | if (tmp.error != MP_PARSING_SUCCES) { |
| 603 | else { | 728 | die(STATE_UNKNOWN, "failed to parse critical time threshold"); |
| 604 | critical_time = strtod (optarg, NULL); | ||
| 605 | check_critical_time = true; | ||
| 606 | } | 729 | } |
| 607 | break; | 730 | result.config.connection_time = |
| 608 | case 'w': /* warning time threshold */ | 731 | mp_thresholds_set_warn(result.config.connection_time, tmp.range); |
| 609 | if (!is_nonnegative (optarg)) | 732 | } break; |
| 610 | usage4 (_("Warning time must be a positive")); | 733 | case 'w': /* warning time threshold */ { |
| 611 | else { | 734 | mp_range_parsed tmp = mp_parse_range_string(optarg); |
| 612 | warning_time = strtod (optarg, NULL); | 735 | if (tmp.error != MP_PARSING_SUCCES) { |
| 613 | check_warning_time = true; | 736 | die(STATE_UNKNOWN, "failed to parse warning time threshold"); |
| 614 | } | 737 | } |
| 615 | break; | 738 | result.config.connection_time = |
| 616 | case 'v': /* verbose */ | 739 | mp_thresholds_set_crit(result.config.connection_time, tmp.range); |
| 740 | } break; | ||
| 741 | case 'v': /* verbose */ | ||
| 617 | verbose++; | 742 | verbose++; |
| 618 | break; | 743 | break; |
| 619 | case 'q': | 744 | case 'q': |
| 620 | ignore_send_quit_failure = true; /* ignore problem sending QUIT */ | 745 | result.config.ignore_send_quit_failure = true; /* ignore problem sending QUIT */ |
| 621 | break; | 746 | break; |
| 622 | case 't': /* timeout */ | 747 | case 't': /* timeout */ |
| 623 | if (is_intnonneg (optarg)) { | 748 | if (is_intnonneg(optarg)) { |
| 624 | socket_timeout = atoi (optarg); | 749 | socket_timeout = atoi(optarg); |
| 625 | } | 750 | } else { |
| 626 | else { | 751 | usage4(_("Timeout interval must be a positive integer")); |
| 627 | usage4 (_("Timeout interval must be a positive integer")); | ||
| 628 | } | 752 | } |
| 629 | break; | 753 | break; |
| 630 | case 'D': | 754 | case 'D': { |
| 631 | /* Check SSL cert validity */ | 755 | /* Check SSL cert validity */ |
| 632 | #ifdef USE_OPENSSL | 756 | #ifdef USE_OPENSSL |
| 633 | if ((temp=strchr(optarg,','))!=NULL) { | 757 | char *temp; |
| 634 | *temp='\0'; | 758 | if ((temp = strchr(optarg, ',')) != NULL) { |
| 635 | if (!is_intnonneg (optarg)) | 759 | *temp = '\0'; |
| 636 | usage2 ("Invalid certificate expiration period", optarg); | 760 | if (!is_intnonneg(optarg)) { |
| 637 | days_till_exp_warn = atoi(optarg); | 761 | usage2("Invalid certificate expiration period", optarg); |
| 638 | *temp=','; | 762 | } |
| 639 | temp++; | 763 | result.config.days_till_exp_warn = atoi(optarg); |
| 640 | if (!is_intnonneg (temp)) | 764 | *temp = ','; |
| 641 | usage2 (_("Invalid certificate expiration period"), temp); | 765 | temp++; |
| 642 | days_till_exp_crit = atoi (temp); | 766 | if (!is_intnonneg(temp)) { |
| 643 | } | 767 | usage2(_("Invalid certificate expiration period"), temp); |
| 644 | else { | 768 | } |
| 645 | days_till_exp_crit=0; | 769 | result.config.days_till_exp_crit = atoi(temp); |
| 646 | if (!is_intnonneg (optarg)) | 770 | } else { |
| 647 | usage2 ("Invalid certificate expiration period", optarg); | 771 | result.config.days_till_exp_crit = 0; |
| 648 | days_till_exp_warn = atoi (optarg); | 772 | if (!is_intnonneg(optarg)) { |
| 649 | } | 773 | usage2("Invalid certificate expiration period", optarg); |
| 650 | check_cert = true; | 774 | } |
| 651 | ignore_send_quit_failure = true; | 775 | result.config.days_till_exp_warn = atoi(optarg); |
| 776 | } | ||
| 777 | result.config.ignore_send_quit_failure = true; | ||
| 652 | #else | 778 | #else |
| 653 | usage (_("SSL support not available - install OpenSSL and recompile")); | 779 | usage(_("SSL support not available - install OpenSSL and recompile")); |
| 654 | #endif | 780 | #endif |
| 655 | implicit_tls = true; | 781 | implicit_tls = true; |
| 656 | // fallthrough | 782 | // fallthrough |
| 657 | case 's': | 783 | case 's': |
| 658 | /* ssl */ | 784 | /* ssl */ |
| 659 | use_ssl = true; | 785 | result.config.use_ssl = true; |
| 660 | server_port = SMTPS_PORT; | 786 | result.config.server_port = SMTPS_PORT; |
| 661 | break; | 787 | break; |
| 662 | case 'S': | 788 | case 'S': |
| 663 | /* starttls */ | 789 | /* starttls */ |
| 664 | use_starttls = true; | 790 | result.config.use_starttls = true; |
| 665 | use_ehlo = true; | 791 | result.config.use_ehlo = true; |
| 666 | break; | 792 | break; |
| 793 | } | ||
| 667 | case SNI_OPTION: | 794 | case SNI_OPTION: |
| 668 | #ifdef HAVE_SSL | 795 | #ifdef HAVE_SSL |
| 669 | use_sni = true; | 796 | result.config.use_sni = true; |
| 670 | #else | 797 | #else |
| 671 | usage (_("SSL support not available - install OpenSSL and recompile")); | 798 | usage(_("SSL support not available - install OpenSSL and recompile")); |
| 672 | #endif | 799 | #endif |
| 673 | break; | 800 | break; |
| 674 | case 'r': | 801 | case 'r': |
| 675 | use_proxy_prefix = true; | 802 | result.config.use_proxy_prefix = true; |
| 676 | break; | 803 | break; |
| 677 | case 'L': | 804 | case 'L': |
| 678 | use_lhlo = true; | 805 | result.config.use_lhlo = true; |
| 679 | break; | 806 | break; |
| 680 | case '4': | 807 | case '4': |
| 681 | address_family = AF_INET; | 808 | address_family = AF_INET; |
| @@ -684,102 +811,109 @@ process_arguments (int argc, char **argv) | |||
| 684 | #ifdef USE_IPV6 | 811 | #ifdef USE_IPV6 |
| 685 | address_family = AF_INET6; | 812 | address_family = AF_INET6; |
| 686 | #else | 813 | #else |
| 687 | usage4 (_("IPv6 support not available")); | 814 | usage4(_("IPv6 support not available")); |
| 688 | #endif | 815 | #endif |
| 689 | break; | 816 | break; |
| 690 | case 'V': /* version */ | 817 | case 'V': /* version */ |
| 691 | print_revision (progname, NP_VERSION); | 818 | print_revision(progname, NP_VERSION); |
| 692 | exit (STATE_UNKNOWN); | 819 | exit(STATE_UNKNOWN); |
| 693 | case 'h': /* help */ | 820 | case 'h': /* help */ |
| 694 | print_help (); | 821 | print_help(); |
| 695 | exit (STATE_UNKNOWN); | 822 | exit(STATE_UNKNOWN); |
| 696 | case '?': /* help */ | 823 | case '?': /* help */ |
| 697 | usage5 (); | 824 | usage5(); |
| 825 | case output_format_index: { | ||
| 826 | parsed_output_format parser = mp_parse_output_format(optarg); | ||
| 827 | if (!parser.parsing_success) { | ||
| 828 | // TODO List all available formats here, maybe add anothoer usage function | ||
| 829 | printf("Invalid output format: %s\n", optarg); | ||
| 830 | exit(STATE_UNKNOWN); | ||
| 831 | } | ||
| 832 | |||
| 833 | result.config.output_format_is_set = true; | ||
| 834 | result.config.output_format = parser.output_format; | ||
| 835 | break; | ||
| 836 | } | ||
| 837 | case ignore_certificate_expiration_index: { | ||
| 838 | result.config.ignore_certificate_expiration = true; | ||
| 839 | } | ||
| 698 | } | 840 | } |
| 699 | } | 841 | } |
| 700 | 842 | ||
| 701 | c = optind; | 843 | int c = optind; |
| 702 | if (server_address == NULL) { | 844 | if (result.config.server_address == NULL) { |
| 703 | if (argv[c]) { | 845 | if (argv[c]) { |
| 704 | if (is_host (argv[c])) | 846 | if (is_host(argv[c])) { |
| 705 | server_address = argv[c]; | 847 | result.config.server_address = argv[c]; |
| 706 | else | 848 | } else { |
| 707 | usage2 (_("Invalid hostname/address"), argv[c]); | 849 | usage2(_("Invalid hostname/address"), argv[c]); |
| 708 | } | 850 | } |
| 709 | else { | 851 | } else { |
| 710 | xasprintf (&server_address, "127.0.0.1"); | 852 | result.config.server_address = strdup("localhost"); |
| 711 | } | 853 | } |
| 712 | } | 854 | } |
| 713 | 855 | ||
| 714 | if (server_expect == NULL) | 856 | if (result.config.use_starttls && result.config.use_ssl) { |
| 715 | server_expect = strdup (SMTP_EXPECT); | ||
| 716 | |||
| 717 | if (mail_command == NULL) | ||
| 718 | mail_command = strdup("MAIL "); | ||
| 719 | |||
| 720 | if (from_arg==NULL) | ||
| 721 | from_arg = strdup(" "); | ||
| 722 | |||
| 723 | if (use_starttls && use_ssl) { | ||
| 724 | if (implicit_tls) { | 857 | if (implicit_tls) { |
| 725 | use_ssl = false; | 858 | result.config.use_ssl = false; |
| 726 | server_port = SMTP_PORT; | ||
| 727 | } else { | 859 | } else { |
| 728 | usage4 (_("Set either -s/--ssl/--tls or -S/--starttls")); | 860 | usage4(_("Set either -s/--ssl/--tls or -S/--starttls")); |
| 729 | } | 861 | } |
| 730 | } | 862 | } |
| 731 | 863 | ||
| 732 | if (server_port_option != 0) { | 864 | if (server_port_option != 0) { |
| 733 | server_port = server_port_option; | 865 | result.config.server_port = server_port_option; |
| 734 | } | 866 | } |
| 735 | 867 | ||
| 736 | return validate_arguments (); | 868 | if (result.config.authtype) { |
| 737 | } | 869 | if (strcmp(result.config.authtype, "LOGIN") == 0) { |
| 738 | 870 | if (result.config.authuser == NULL) { | |
| 739 | 871 | usage4("no authuser specified"); | |
| 872 | } | ||
| 873 | if (result.config.authpass == NULL) { | ||
| 874 | usage4("no authpass specified"); | ||
| 875 | } | ||
| 876 | } else { | ||
| 877 | usage4("only authtype LOGIN is supported"); | ||
| 878 | } | ||
| 879 | } | ||
| 740 | 880 | ||
| 741 | int | 881 | return result; |
| 742 | validate_arguments (void) | ||
| 743 | { | ||
| 744 | return OK; | ||
| 745 | } | 882 | } |
| 746 | 883 | ||
| 747 | 884 | char *smtp_quit(check_smtp_config config, char buffer[MAX_INPUT_BUFFER], int socket_descriptor, | |
| 748 | void | 885 | bool ssl_established) { |
| 749 | smtp_quit(void) | 886 | int sent_bytes = |
| 750 | { | 887 | my_send(config, SMTP_QUIT, strlen(SMTP_QUIT), socket_descriptor, ssl_established); |
| 751 | int bytes; | 888 | if (sent_bytes < 0) { |
| 752 | int n; | 889 | if (config.ignore_send_quit_failure) { |
| 753 | 890 | if (verbose) { | |
| 754 | n = my_send(SMTP_QUIT, strlen(SMTP_QUIT)); | ||
| 755 | if(n < 0) { | ||
| 756 | if(ignore_send_quit_failure) { | ||
| 757 | if(verbose) { | ||
| 758 | printf(_("Connection closed by server before sending QUIT command\n")); | 891 | printf(_("Connection closed by server before sending QUIT command\n")); |
| 759 | } | 892 | } |
| 760 | return; | 893 | return buffer; |
| 761 | } | 894 | } |
| 762 | die (STATE_UNKNOWN, | 895 | die(STATE_UNKNOWN, _("Connection closed by server before sending QUIT command\n")); |
| 763 | _("Connection closed by server before sending QUIT command\n")); | ||
| 764 | } | 896 | } |
| 765 | 897 | ||
| 766 | if (verbose) | 898 | if (verbose) { |
| 767 | printf(_("sent %s\n"), "QUIT"); | 899 | printf(_("sent %s\n"), "QUIT"); |
| 900 | } | ||
| 768 | 901 | ||
| 769 | /* read the response but don't care about problems */ | 902 | /* read the response but don't care about problems */ |
| 770 | bytes = recvlines(buffer, MAX_INPUT_BUFFER); | 903 | int bytes = recvlines(config, buffer, MAX_INPUT_BUFFER, socket_descriptor, ssl_established); |
| 771 | if (verbose) { | 904 | if (verbose) { |
| 772 | if (bytes < 0) | 905 | if (bytes < 0) { |
| 773 | printf(_("recv() failed after QUIT.")); | 906 | printf(_("recv() failed after QUIT.")); |
| 774 | else if (bytes == 0) | 907 | } else if (bytes == 0) { |
| 775 | printf(_("Connection reset by peer.")); | 908 | printf(_("Connection reset by peer.")); |
| 776 | else { | 909 | } else { |
| 777 | buffer[bytes] = '\0'; | 910 | buffer[bytes] = '\0'; |
| 778 | printf(_("received %s\n"), buffer); | 911 | printf(_("received %s\n"), buffer); |
| 779 | } | 912 | } |
| 780 | } | 913 | } |
| 781 | } | ||
| 782 | 914 | ||
| 915 | return buffer; | ||
| 916 | } | ||
| 783 | 917 | ||
| 784 | /* | 918 | /* |
| 785 | * Receive one line, copy it into buf and nul-terminate it. Returns the | 919 | * Receive one line, copy it into buf and nul-terminate it. Returns the |
| @@ -790,24 +924,23 @@ smtp_quit(void) | |||
| 790 | * function which buffers the data, move that to netutils.c and change | 924 | * function which buffers the data, move that to netutils.c and change |
| 791 | * check_smtp and other plugins to use that. Also, remove (\r)\n. | 925 | * check_smtp and other plugins to use that. Also, remove (\r)\n. |
| 792 | */ | 926 | */ |
| 793 | int | 927 | int recvline(char *buf, size_t bufsize, check_smtp_config config, int socket_descriptor, |
| 794 | recvline(char *buf, size_t bufsize) | 928 | bool ssl_established) { |
| 795 | { | ||
| 796 | int result; | 929 | int result; |
| 797 | unsigned i; | 930 | size_t counter; |
| 798 | 931 | ||
| 799 | for (i = result = 0; i < bufsize - 1; i++) { | 932 | for (counter = result = 0; counter < bufsize - 1; counter++) { |
| 800 | if ((result = my_recv(&buf[i], 1)) != 1) | 933 | if ((result = my_recv(config, &buf[counter], 1, socket_descriptor, ssl_established)) != 1) { |
| 801 | break; | 934 | break; |
| 802 | if (buf[i] == '\n') { | 935 | } |
| 803 | buf[++i] = '\0'; | 936 | if (buf[counter] == '\n') { |
| 804 | return i; | 937 | buf[++counter] = '\0'; |
| 938 | return (int)counter; | ||
| 805 | } | 939 | } |
| 806 | } | 940 | } |
| 807 | return (result == 1 || i == 0) ? -2 : result; /* -2 if out of space */ | 941 | return (result == 1 || counter == 0) ? -2 : result; /* -2 if out of space */ |
| 808 | } | 942 | } |
| 809 | 943 | ||
| 810 | |||
| 811 | /* | 944 | /* |
| 812 | * Receive one or more lines, copy them into buf and nul-terminate it. Returns | 945 | * Receive one or more lines, copy them into buf and nul-terminate it. Returns |
| 813 | * the number of bytes written to buf (excluding the '\0') or 0 on EOF or <0 on | 946 | * the number of bytes written to buf (excluding the '\0') or 0 on EOF or <0 on |
| @@ -822,117 +955,114 @@ recvline(char *buf, size_t bufsize) | |||
| 822 | * | 955 | * |
| 823 | * TODO: Move this to netutils.c. Also, remove \r and possibly the final \n. | 956 | * TODO: Move this to netutils.c. Also, remove \r and possibly the final \n. |
| 824 | */ | 957 | */ |
| 825 | int | 958 | int recvlines(check_smtp_config config, char *buf, size_t bufsize, int socket_descriptor, |
| 826 | recvlines(char *buf, size_t bufsize) | 959 | bool ssl_established) { |
| 827 | { | 960 | int result; |
| 828 | int result, i; | 961 | int counter; |
| 829 | 962 | ||
| 830 | for (i = 0; /* forever */; i += result) | 963 | for (counter = 0; /* forever */; counter += result) { |
| 831 | if (!((result = recvline(buf + i, bufsize - i)) > 3 && | 964 | if (!((result = recvline(buf + counter, bufsize - counter, config, socket_descriptor, |
| 832 | isdigit((int)buf[i]) && | 965 | ssl_established)) > 3 && |
| 833 | isdigit((int)buf[i + 1]) && | 966 | isdigit((int)buf[counter]) && isdigit((int)buf[counter + 1]) && |
| 834 | isdigit((int)buf[i + 2]) && | 967 | isdigit((int)buf[counter + 2]) && buf[counter + 3] == '-')) { |
| 835 | buf[i + 3] == '-')) | ||
| 836 | break; | 968 | break; |
| 969 | } | ||
| 970 | } | ||
| 837 | 971 | ||
| 838 | return (result <= 0) ? result : result + i; | 972 | return (result <= 0) ? result : result + counter; |
| 839 | } | 973 | } |
| 840 | 974 | ||
| 841 | 975 | int my_close(int socket_descriptor) { | |
| 842 | int | ||
| 843 | my_close (void) | ||
| 844 | { | ||
| 845 | int result; | 976 | int result; |
| 846 | result = close(sd); | 977 | result = close(socket_descriptor); |
| 847 | #ifdef HAVE_SSL | 978 | #ifdef HAVE_SSL |
| 848 | np_net_ssl_cleanup(); | 979 | np_net_ssl_cleanup(); |
| 849 | #endif | 980 | #endif |
| 850 | return result; | 981 | return result; |
| 851 | } | 982 | } |
| 852 | 983 | ||
| 853 | 984 | void print_help(void) { | |
| 854 | void | ||
| 855 | print_help (void) | ||
| 856 | { | ||
| 857 | char *myport; | 985 | char *myport; |
| 858 | xasprintf (&myport, "%d", SMTP_PORT); | 986 | xasprintf(&myport, "%d", SMTP_PORT); |
| 859 | 987 | ||
| 860 | print_revision (progname, NP_VERSION); | 988 | print_revision(progname, NP_VERSION); |
| 861 | 989 | ||
| 862 | printf ("Copyright (c) 1999-2001 Ethan Galstad <nagios@nagios.org>\n"); | 990 | printf("Copyright (c) 1999-2001 Ethan Galstad <nagios@nagios.org>\n"); |
| 863 | printf (COPYRIGHT, copyright, email); | 991 | printf(COPYRIGHT, copyright, email); |
| 864 | 992 | ||
| 865 | printf("%s\n", _("This plugin will attempt to open an SMTP connection with the host.")); | 993 | printf("%s\n", _("This plugin will attempt to open an SMTP connection with the host.")); |
| 866 | 994 | ||
| 867 | printf ("\n\n"); | 995 | printf("\n\n"); |
| 868 | 996 | ||
| 869 | print_usage (); | 997 | print_usage(); |
| 870 | 998 | ||
| 871 | printf (UT_HELP_VRSN); | 999 | printf(UT_HELP_VRSN); |
| 872 | printf (UT_EXTRA_OPTS); | 1000 | printf(UT_EXTRA_OPTS); |
| 873 | 1001 | ||
| 874 | printf (UT_HOST_PORT, 'p', myport); | 1002 | printf(UT_HOST_PORT, 'p', myport); |
| 875 | 1003 | ||
| 876 | printf (UT_IPv46); | 1004 | printf(UT_IPv46); |
| 877 | 1005 | ||
| 878 | printf (" %s\n", "-e, --expect=STRING"); | 1006 | printf(" %s\n", "-e, --expect=STRING"); |
| 879 | printf (_(" String to expect in first line of server response (default: '%s')\n"), SMTP_EXPECT); | 1007 | printf(_(" String to expect in first line of server response (default: '%s')\n"), |
| 880 | printf (" %s\n", "-C, --command=STRING"); | 1008 | SMTP_EXPECT); |
| 881 | printf (" %s\n", _("SMTP command (may be used repeatedly)")); | 1009 | printf(" %s\n", "-C, --command=STRING"); |
| 882 | printf (" %s\n", "-R, --response=STRING"); | 1010 | printf(" %s\n", _("SMTP command (may be used repeatedly)")); |
| 883 | printf (" %s\n", _("Expected response to command (may be used repeatedly)")); | 1011 | printf(" %s\n", "-R, --response=STRING"); |
| 884 | printf (" %s\n", "-f, --from=STRING"); | 1012 | printf(" %s\n", _("Expected response to command (may be used repeatedly)")); |
| 885 | printf (" %s\n", _("FROM-address to include in MAIL command, required by Exchange 2000")), | 1013 | printf(" %s\n", "-f, --from=STRING"); |
| 886 | printf (" %s\n", "-F, --fqdn=STRING"); | 1014 | printf(" %s\n", _("FROM-address to include in MAIL command, required by Exchange 2000")), |
| 887 | printf (" %s\n", _("FQDN used for HELO")); | 1015 | printf(" %s\n", "-F, --fqdn=STRING"); |
| 888 | printf (" %s\n", "-r, --proxy"); | 1016 | printf(" %s\n", _("FQDN used for HELO")); |
| 889 | printf (" %s\n", _("Use PROXY protocol prefix for the connection.")); | 1017 | printf(" %s\n", "-r, --proxy"); |
| 1018 | printf(" %s\n", _("Use PROXY protocol prefix for the connection.")); | ||
| 890 | #ifdef HAVE_SSL | 1019 | #ifdef HAVE_SSL |
| 891 | printf (" %s\n", "-D, --certificate=INTEGER[,INTEGER]"); | 1020 | printf(" %s\n", "-D, --certificate=INTEGER[,INTEGER]"); |
| 892 | printf (" %s\n", _("Minimum number of days a certificate has to be valid.")); | 1021 | printf(" %s\n", _("Minimum number of days a certificate has to be valid.")); |
| 893 | printf (" %s\n", "-s, --ssl, --tls"); | 1022 | printf(" %s\n", "-s, --ssl, --tls"); |
| 894 | printf (" %s\n", _("Use SSL/TLS for the connection.")); | 1023 | printf(" %s\n", _("Use SSL/TLS for the connection.")); |
| 895 | printf (_(" Sets default port to %d.\n"), SMTPS_PORT); | 1024 | printf(_(" Sets default port to %d.\n"), SMTPS_PORT); |
| 896 | printf (" %s\n", "-S, --starttls"); | 1025 | printf(" %s\n", "-S, --starttls"); |
| 897 | printf (" %s\n", _("Use STARTTLS for the connection.")); | 1026 | printf(" %s\n", _("Use STARTTLS for the connection.")); |
| 898 | printf (" %s\n", "--sni"); | 1027 | printf(" %s\n", "--sni"); |
| 899 | printf (" %s\n", _("Enable SSL/TLS hostname extension support (SNI)")); | 1028 | printf(" %s\n", _("Enable SSL/TLS hostname extension support (SNI)")); |
| 900 | #endif | 1029 | #endif |
| 901 | 1030 | ||
| 902 | printf (" %s\n", "-A, --authtype=STRING"); | 1031 | printf(" %s\n", "-A, --authtype=STRING"); |
| 903 | printf (" %s\n", _("SMTP AUTH type to check (default none, only LOGIN supported)")); | 1032 | printf(" %s\n", _("SMTP AUTH type to check (default none, only LOGIN supported)")); |
| 904 | printf (" %s\n", "-U, --authuser=STRING"); | 1033 | printf(" %s\n", "-U, --authuser=STRING"); |
| 905 | printf (" %s\n", _("SMTP AUTH username")); | 1034 | printf(" %s\n", _("SMTP AUTH username")); |
| 906 | printf (" %s\n", "-P, --authpass=STRING"); | 1035 | printf(" %s\n", "-P, --authpass=STRING"); |
| 907 | printf (" %s\n", _("SMTP AUTH password")); | 1036 | printf(" %s\n", _("SMTP AUTH password")); |
| 908 | printf (" %s\n", "-L, --lmtp"); | 1037 | printf(" %s\n", "-L, --lmtp"); |
| 909 | printf (" %s\n", _("Send LHLO instead of HELO/EHLO")); | 1038 | printf(" %s\n", _("Send LHLO instead of HELO/EHLO")); |
| 910 | printf (" %s\n", "-q, --ignore-quit-failure"); | 1039 | printf(" %s\n", "-q, --ignore-quit-failure"); |
| 911 | printf (" %s\n", _("Ignore failure when sending QUIT command to server")); | 1040 | printf(" %s\n", _("Ignore failure when sending QUIT command to server")); |
| 912 | 1041 | printf(" %s\n", "--ignore-certificate-expiration"); | |
| 913 | printf (UT_WARN_CRIT); | 1042 | printf(" %s\n", _("Ignore certificate expiration")); |
| 914 | |||
| 915 | printf (UT_CONN_TIMEOUT, DEFAULT_SOCKET_TIMEOUT); | ||
| 916 | 1043 | ||
| 917 | printf (UT_VERBOSE); | 1044 | printf(UT_WARN_CRIT); |
| 918 | 1045 | ||
| 919 | printf("\n"); | 1046 | printf(UT_CONN_TIMEOUT, DEFAULT_SOCKET_TIMEOUT); |
| 920 | printf ("%s\n", _("Successful connects return STATE_OK, refusals and timeouts return")); | ||
| 921 | printf ("%s\n", _("STATE_CRITICAL, other errors return STATE_UNKNOWN. Successful")); | ||
| 922 | printf ("%s\n", _("connects, but incorrect response messages from the host result in")); | ||
| 923 | printf ("%s\n", _("STATE_WARNING return values.")); | ||
| 924 | 1047 | ||
| 925 | printf (UT_SUPPORT); | 1048 | printf(UT_OUTPUT_FORMAT); |
| 926 | } | ||
| 927 | 1049 | ||
| 1050 | printf(UT_VERBOSE); | ||
| 928 | 1051 | ||
| 1052 | printf("\n"); | ||
| 1053 | printf("%s\n", _("Successful connects return STATE_OK, refusals and timeouts return")); | ||
| 1054 | printf("%s\n", _("STATE_CRITICAL, other errors return STATE_UNKNOWN. Successful")); | ||
| 1055 | printf("%s\n", _("connects, but incorrect response messages from the host result in")); | ||
| 1056 | printf("%s\n", _("STATE_WARNING return values.")); | ||
| 929 | 1057 | ||
| 930 | void | 1058 | printf(UT_SUPPORT); |
| 931 | print_usage (void) | ||
| 932 | { | ||
| 933 | printf ("%s\n", _("Usage:")); | ||
| 934 | printf ("%s -H host [-p port] [-4|-6] [-e expect] [-C command] [-R response] [-f from addr]\n", progname); | ||
| 935 | printf ("[-A authtype -U authuser -P authpass] [-w warn] [-c crit] [-t timeout] [-q]\n"); | ||
| 936 | printf ("[-F fqdn] [-S] [-L] [-D warn days cert expire[,crit days cert expire]] [-r] [--sni] [-v] \n"); | ||
| 937 | } | 1059 | } |
| 938 | 1060 | ||
| 1061 | void print_usage(void) { | ||
| 1062 | printf("%s\n", _("Usage:")); | ||
| 1063 | printf("%s -H host [-p port] [-4|-6] [-e expect] [-C command] [-R response] [-f from addr]\n", | ||
| 1064 | progname); | ||
| 1065 | printf("[-A authtype -U authuser -P authpass] [-w warn] [-c crit] [-t timeout] [-q]\n"); | ||
| 1066 | printf("[-F fqdn] [-S] [-L] [-D warn days cert expire[,crit days cert expire]] [-r] [--sni] " | ||
| 1067 | "[-v] \n"); | ||
| 1068 | } | ||
