/***************************************************************************** * * Monitoring check_ssh plugin * * License: GPL * Copyright (c) 2000-2024 Monitoring Plugins Development Team * * Description: * * This file contains the check_ssh plugin * * Try to connect to an SSH server at specified server and port * * * This program is free software: you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation, either version 3 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program. If not, see . * * *****************************************************************************/ #include "output.h" #include "perfdata.h" #include "states.h" const char *progname = "check_ssh"; const char *copyright = "2000-2024"; const char *email = "devel@monitoring-plugins.org"; #include "./common.h" #include "./netutils.h" #include "utils.h" #include "./check_ssh.d/config.h" #ifndef MSG_DONTWAIT # define MSG_DONTWAIT 0 #endif #define BUFF_SZ 256 static bool verbose = false; typedef struct process_arguments_wrapper { int errorcode; check_ssh_config config; } process_arguments_wrapper; static process_arguments_wrapper process_arguments(int /*argc*/, char ** /*argv*/); static void print_help(void); void print_usage(void); static int ssh_connect(mp_check *overall, char *haddr, int hport, char *remote_version, char *remote_protocol); int main(int argc, char **argv) { setlocale(LC_ALL, ""); bindtextdomain(PACKAGE, LOCALEDIR); textdomain(PACKAGE); /* Parse extra opts if any */ argv = np_extra_opts(&argc, argv, progname); process_arguments_wrapper tmp_config = process_arguments(argc, argv); if (tmp_config.errorcode == ERROR) { usage4(_("Could not parse arguments")); } check_ssh_config config = tmp_config.config; mp_check overall = mp_check_init(); if (config.output_format_is_set) { overall.format = config.output_format; } /* initialize alarm signal handling */ signal(SIGALRM, socket_timeout_alarm_handler); alarm(socket_timeout); /* ssh_connect exits if error is found */ ssh_connect(&overall, config.server_name, config.port, config.remote_version, config.remote_protocol); alarm(0); mp_exit(overall); } #define output_format_index CHAR_MAX + 1 /* process command-line arguments */ process_arguments_wrapper process_arguments(int argc, char **argv) { static struct option longopts[] = {{"help", no_argument, 0, 'h'}, {"version", no_argument, 0, 'V'}, {"host", required_argument, 0, 'H'}, /* backward compatibility */ {"hostname", required_argument, 0, 'H'}, {"port", required_argument, 0, 'p'}, {"use-ipv4", no_argument, 0, '4'}, {"use-ipv6", no_argument, 0, '6'}, {"timeout", required_argument, 0, 't'}, {"verbose", no_argument, 0, 'v'}, {"remote-version", required_argument, 0, 'r'}, {"remote-protocol", required_argument, 0, 'P'}, {"output-format", required_argument, 0, output_format_index}, {0, 0, 0, 0}}; process_arguments_wrapper result = { .config = check_ssh_config_init(), .errorcode = OK, }; if (argc < 2) { result.errorcode = ERROR; return result; } for (int i = 1; i < argc; i++) { if (strcmp("-to", argv[i]) == 0) { strcpy(argv[i], "-t"); } } int option_char; while (true) { int option = 0; option_char = getopt_long(argc, argv, "+Vhv46t:r:H:p:P:", longopts, &option); if (option_char == -1 || option_char == EOF) { break; } switch (option_char) { case '?': /* help */ usage5(); case 'V': /* version */ print_revision(progname, NP_VERSION); exit(STATE_UNKNOWN); case 'h': /* help */ print_help(); exit(STATE_UNKNOWN); case 'v': /* verbose */ verbose = true; break; case 't': /* timeout period */ if (!is_intpos(optarg)) { usage2(_("Timeout interval must be a positive integer"), optarg); } else { socket_timeout = (unsigned int) atoi(optarg); } break; case '4': address_family = AF_INET; break; case '6': #ifdef USE_IPV6 address_family = AF_INET6; #else usage4(_("IPv6 support not available")); #endif break; case 'r': /* remote version */ result.config.remote_version = optarg; break; case 'P': /* remote version */ result.config.remote_protocol = optarg; break; case 'H': /* host */ if (!is_host(optarg)) { usage2(_("Invalid hostname/address"), optarg); } result.config.server_name = optarg; break; case 'p': /* port */ if (is_intpos(optarg)) { result.config.port = atoi(optarg); } else { usage2(_("Port number must be a positive integer"), optarg); } case output_format_index: { parsed_output_format parser = mp_parse_output_format(optarg); if (!parser.parsing_success) { // TODO List all available formats here, maybe add anothoer usage function printf("Invalid output format: %s\n", optarg); exit(STATE_UNKNOWN); } result.config.output_format_is_set = true; result.config.output_format = parser.output_format; break; } } } option_char = optind; if (result.config.server_name == NULL && option_char < argc) { if (is_host(argv[option_char])) { result.config.server_name = argv[option_char++]; } } if (result.config.port == -1 && option_char < argc) { if (is_intpos(argv[option_char])) { result.config.port = atoi(argv[option_char++]); } else { print_usage(); exit(STATE_UNKNOWN); } } if (result.config.server_name == NULL) { result.errorcode = ERROR; return result; } return result; } /************************************************************************ * * Try to connect to SSH server at specified server and port * *-----------------------------------------------------------------------*/ int ssh_connect(mp_check *overall, char *haddr, int hport, char *desired_remote_version, char *desired_remote_protocol) { struct timeval tv; gettimeofday(&tv, NULL); int socket; int result = my_tcp_connect(haddr, hport, &socket); if (result != STATE_OK) { return result; } char *output = (char *)calloc(BUFF_SZ + 1, sizeof(char)); char *buffer = NULL; size_t recv_ret = 0; char *version_control_string = NULL; size_t byte_offset = 0; while ((version_control_string == NULL) && (recv_ret = recv(socket, output + byte_offset, (unsigned long)( BUFF_SZ - byte_offset), 0) > 0)) { if (strchr(output, '\n')) { /* we've got at least one full line, start parsing*/ byte_offset = 0; char *index = NULL; unsigned long len = 0; while ((index = strchr(output + byte_offset, '\n')) != NULL) { /*Partition the buffer so that this line is a separate string, * by replacing the newline with NUL*/ output[(index - output)] = '\0'; len = strlen(output + byte_offset); if ((len >= 4) && (strncmp(output + byte_offset, "SSH-", 4) == 0)) { /*if the string starts with SSH-, this _should_ be a valid version control string*/ version_control_string = output + byte_offset; break; } /*the start of the next line (if one exists) will be after the current one (+ NUL)*/ byte_offset += (len + 1); } if (version_control_string == NULL) { /* move unconsumed data to beginning of buffer, null rest */ memmove((void *)output, (void *)(output + byte_offset + 1), BUFF_SZ - len + 1); memset(output + byte_offset + 1, 0, BUFF_SZ - byte_offset + 1); /*start reading from end of current line chunk on next recv*/ byte_offset = strlen(output); } } else { byte_offset += recv_ret; } } mp_subcheck connection_sc = mp_subcheck_init(); if (recv_ret < 0) { connection_sc = mp_set_subcheck_state(connection_sc, STATE_CRITICAL); xasprintf(&connection_sc.output, "%s", "SSH CRITICAL - %s", strerror(errno)); mp_add_subcheck_to_check(overall, connection_sc); return OK; } if (version_control_string == NULL) { connection_sc = mp_set_subcheck_state(connection_sc, STATE_CRITICAL); xasprintf(&connection_sc.output, "%s", "SSH CRITICAL - No version control string received"); mp_add_subcheck_to_check(overall, connection_sc); return OK; } connection_sc = mp_set_subcheck_state(connection_sc, STATE_OK); xasprintf(&connection_sc.output, "%s", "Initial connection succeded"); mp_add_subcheck_to_check(overall, connection_sc); /* * "When the connection has been established, both sides MUST send an * identification string. This identification string MUST be * * SSH-protoversion-softwareversion SP comments CR LF" * - RFC 4253:4.2 */ strip(version_control_string); if (verbose) { printf("%s\n", version_control_string); } char *ssh_proto = version_control_string + 4; /* * We assume the protoversion is of the form Major.Minor, although * this is not _strictly_ required. See * * "Both the 'protoversion' and 'softwareversion' strings MUST consist of * printable US-ASCII characters, with the exception of whitespace * characters and the minus sign (-)" * - RFC 4253:4.2 * and, * * "As stated earlier, the 'protoversion' specified for this protocol is * "2.0". Earlier versions of this protocol have not been formally * documented, but it is widely known that they use 'protoversion' of * "1.x" (e.g., "1.5" or "1.3")." * - RFC 4253:5 */ char *ssh_server = ssh_proto + strspn(ssh_proto, "0123456789.") + 1; /* (+1 for the '-' separating protoversion from softwareversion) */ /* If there's a space in the version string, whatever's after the space is a comment * (which is NOT part of the server name/version)*/ char *tmp = strchr(ssh_server, ' '); if (tmp) { ssh_server[tmp - ssh_server] = '\0'; } mp_subcheck protocol_validity_sc = mp_subcheck_init(); if (strlen(ssh_proto) == 0 || strlen(ssh_server) == 0) { protocol_validity_sc = mp_set_subcheck_state(protocol_validity_sc, STATE_CRITICAL); xasprintf(&protocol_validity_sc.output, "Invalid protocol version control string %s", version_control_string); mp_add_subcheck_to_check(overall, protocol_validity_sc); return OK; } protocol_validity_sc = mp_set_subcheck_state(protocol_validity_sc, STATE_OK); xasprintf(&protocol_validity_sc.output, "Valid protocol version control string %s", version_control_string); mp_add_subcheck_to_check(overall, protocol_validity_sc); ssh_proto[strspn(ssh_proto, "0123456789. ")] = 0; static char *rev_no = VERSION; xasprintf(&buffer, "SSH-%s-check_ssh_%s\r\n", ssh_proto, rev_no); send(socket, buffer, strlen(buffer), MSG_DONTWAIT); if (verbose) { printf("%s\n", buffer); } if (desired_remote_version && strcmp(desired_remote_version, ssh_server)) { mp_subcheck remote_version_sc = mp_subcheck_init(); remote_version_sc = mp_set_subcheck_state(remote_version_sc, STATE_CRITICAL); xasprintf(&remote_version_sc.output, _("%s (protocol %s) version mismatch, expected '%s'"), ssh_server, ssh_proto, desired_remote_version); close(socket); mp_add_subcheck_to_check(overall, remote_version_sc); return OK; } double elapsed_time = (double)deltime(tv) / 1.0e6; mp_perfdata time_pd = perfdata_init(); time_pd.value = mp_create_pd_value(elapsed_time); time_pd.label = "time"; time_pd.max_present = true; time_pd.max = mp_create_pd_value(socket_timeout); mp_subcheck protocol_version_sc = mp_subcheck_init(); mp_add_perfdata_to_subcheck(&protocol_version_sc, time_pd); if (desired_remote_protocol && strcmp(desired_remote_protocol, ssh_proto)) { protocol_version_sc = mp_set_subcheck_state(protocol_version_sc, STATE_CRITICAL); xasprintf(&protocol_version_sc.output, _("%s (protocol %s) protocol version mismatch, expected '%s'"), ssh_server, ssh_proto, desired_remote_protocol); } else { protocol_version_sc = mp_set_subcheck_state(protocol_version_sc, STATE_OK); xasprintf(&protocol_version_sc.output, "SSH server verison: %s (protocol version: %s)", ssh_server, ssh_proto); } mp_add_subcheck_to_check(overall, protocol_version_sc); close(socket); return OK; } void print_help(void) { char *myport; xasprintf(&myport, "%d", default_ssh_port); print_revision(progname, NP_VERSION); printf("Copyright (c) 1999 Remi Paulmier \n"); printf(COPYRIGHT, copyright, email); printf("%s\n", _("Try to connect to an SSH server at specified server and port")); printf("\n\n"); print_usage(); printf(UT_HELP_VRSN); printf(UT_EXTRA_OPTS); printf(UT_HOST_PORT, 'p', myport); printf(UT_IPv46); printf(UT_CONN_TIMEOUT, DEFAULT_SOCKET_TIMEOUT); printf(" %s\n", "-r, --remote-version=STRING"); printf(" %s\n", _("Alert if string doesn't match expected server version (ex: OpenSSH_3.9p1)")); printf(" %s\n", "-P, --remote-protocol=STRING"); printf(" %s\n", _("Alert if protocol doesn't match expected protocol version (ex: 2.0)")); printf(UT_OUTPUT_FORMAT); printf(UT_VERBOSE); printf(UT_SUPPORT); } void print_usage(void) { printf("%s\n", _("Usage:")); printf("%s [-4|-6] [-t ] [-r ] [-p ] --hostname \n", progname); }