/***************************************************************************** * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. * *****************************************************************************/ #include "config.h" #include "common.h" #include "netutils.h" #include "utils.h" #ifdef HAVE_SSL_H # include # include # include # include # include # include #else # ifdef HAVE_OPENSSL_SSL_H # include # include # include # include # include # include # endif #endif #ifdef HAVE_SSL SSL_CTX *ctx; SSL *ssl; int connect_SSL (void); #endif enum { TCP_PROTOCOL = 1, UDP_PROTOCOL = 2, MAXBUF = 1024 }; int process_arguments (int, char **); void print_usage (void); void print_help (void); int my_recv (void); char *SERVICE = NULL; char *SEND = NULL; char *EXPECT = NULL; char *QUIT = NULL; int PROTOCOL = 0; int PORT = 0; int server_port = 0; char *server_address = NULL; char *server_send = NULL; char *server_quit = NULL; char **server_expect = NULL; int server_expect_count = 0; int maxbytes = 0; char **warn_codes = NULL; int warn_codes_count = 0; char **crit_codes = NULL; int crit_codes_count = 0; int delay = 0; double warning_time = 0; int check_warning_time = FALSE; double critical_time = 0; int check_critical_time = FALSE; double elapsed_time = 0; int verbose = FALSE; int use_ssl = FALSE; int sd = 0; char *buffer = ""; /* progname changes depending on symlink called */ char *progname = "check_tcp"; const char *revision = "$Revision$"; const char *copyright = "1999-2003"; const char *email = "nagiosplug-devel@lists.sourceforge.net"; void print_usage (void) { printf (_("\ Usage: %s -H host -p port [-w ] [-c ]\n\ [-s ] [-e ] [-q ]\n\ [-m ] [-d ] [-t ]\n\ [-r ] [-v] [-4|-6]\n"), progname); printf (" %s (-h|--help)\n", progname); printf (" %s (-V|--version)\n", progname); } void print_help (void) { print_revision (progname, revision); printf (_(COPYRIGHT), copyright, email); printf (_("This plugin tests %s connections with the specified host.\n\n"), SERVICE); print_usage (); printf (_(UT_HELP_VRSN)); printf (_(UT_HOST_PORT), 'p', "none"); printf (_(UT_IPv46)); printf (_("\ -s, --send=STRING\n\ String to send to the server\n\ -e, --expect=STRING\n\ String to expect in server response\n\ -q, --quit=STRING\n\ String to send server to initiate a clean close of the connection\n")); printf (_("\ -r, --refuse=ok|warn|crit\n\ Accept tcp refusals with states ok, warn, crit (default: crit)\n\ -m, --maxbytes=INTEGER\n\ Close connection once more than this number of bytes are received\n\ -d, --delay=INTEGER\n\ Seconds to wait between sending string and polling for response\n")); printf (_(UT_WARN_CRIT)); printf (_(UT_TIMEOUT), DEFAULT_SOCKET_TIMEOUT); printf (_(UT_VERBOSE)); printf (_(UT_SUPPORT)); } int main (int argc, char **argv) { int result; int i; char *status = ""; struct timeval tv; setlocale (LC_ALL, ""); bindtextdomain (PACKAGE, LOCALEDIR); textdomain (PACKAGE); if (strstr (argv[0], "check_udp")) { progname = strdup ("check_udp"); SERVICE = strdup ("UDP"); SEND = NULL; EXPECT = NULL; QUIT = NULL; PROTOCOL = UDP_PROTOCOL; PORT = 0; } else if (strstr (argv[0], "check_tcp")) { progname = strdup ("check_tcp"); SERVICE = strdup ("TCP"); SEND = NULL; EXPECT = NULL; QUIT = NULL; PROTOCOL = TCP_PROTOCOL; PORT = 0; } else if (strstr (argv[0], "check_ftp")) { progname = strdup ("check_ftp"); SERVICE = strdup ("FTP"); SEND = NULL; EXPECT = strdup ("220"); QUIT = strdup ("QUIT\r\n"); PROTOCOL = TCP_PROTOCOL; PORT = 21; } else if (strstr (argv[0], "check_smtp")) { progname = strdup ("check_smtp"); SERVICE = strdup ("SMTP"); SEND = NULL; EXPECT = strdup ("220"); QUIT = strdup ("QUIT\r\n"); PROTOCOL = TCP_PROTOCOL; PORT = 25; } else if (strstr (argv[0], "check_pop")) { progname = strdup ("check_pop"); SERVICE = strdup ("POP"); SEND = NULL; EXPECT = strdup ("+OK"); QUIT = strdup ("QUIT\r\n"); PROTOCOL = TCP_PROTOCOL; PORT = 110; } else if (strstr (argv[0], "check_imap")) { progname = strdup ("check_imap"); SERVICE = strdup ("IMAP"); SEND = NULL; EXPECT = strdup ("* OK"); QUIT = strdup ("a1 LOGOUT\r\n"); PROTOCOL = TCP_PROTOCOL; PORT = 143; } #ifdef HAVE_SSL else if (strstr(argv[0],"check_simap")) { progname = strdup ("check_simap"); SERVICE = strdup ("SIMAP"); SEND=NULL; EXPECT = strdup ("* OK"); QUIT = strdup ("a1 LOGOUT\r\n"); PROTOCOL=TCP_PROTOCOL; use_ssl=TRUE; PORT=993; } else if (strstr(argv[0],"check_spop")) { progname = strdup ("check_spop"); SERVICE = strdup ("SPOP"); SEND=NULL; EXPECT = strdup ("+OK"); QUIT = strdup ("QUIT\r\n"); PROTOCOL=TCP_PROTOCOL; use_ssl=TRUE; PORT=995; } #endif else if (strstr (argv[0], "check_nntp")) { progname = strdup ("check_nntp"); SERVICE = strdup ("NNTP"); SEND = NULL; EXPECT = NULL; server_expect = realloc (server_expect, ++server_expect_count); asprintf (&server_expect[server_expect_count - 1], "200"); server_expect = realloc (server_expect, ++server_expect_count); asprintf (&server_expect[server_expect_count - 1], "201"); asprintf (&QUIT, "QUIT\r\n"); PROTOCOL = TCP_PROTOCOL; PORT = 119; } else { usage (_("ERROR: Generic check_tcp called with unknown service\n")); } server_address = strdup ("127.0.0.1"); server_port = PORT; server_send = SEND; server_quit = QUIT; if (process_arguments (argc, argv) == ERROR) usage (_("Could not parse arguments\n")); /* use default expect if none listed in process_arguments() */ if (EXPECT && server_expect_count == 0) { server_expect = malloc (++server_expect_count); server_expect[server_expect_count - 1] = EXPECT; } /* initialize alarm signal handling */ signal (SIGALRM, socket_timeout_alarm_handler); /* set socket timeout */ alarm (socket_timeout); /* try to connect to the host at the given port number */ gettimeofday (&tv, NULL); #ifdef HAVE_SSL if (use_ssl) result = connect_SSL (); else #endif { if (PROTOCOL == UDP_PROTOCOL) result = my_udp_connect (server_address, server_port, &sd); else /* default is TCP */ result = my_tcp_connect (server_address, server_port, &sd); } if (result == STATE_CRITICAL) return STATE_CRITICAL; if (server_send != NULL) { /* Something to send? */ asprintf (&server_send, "%s\r\n", server_send); #ifdef HAVE_SSL if (use_ssl) SSL_write(ssl, server_send, strlen (server_send)); else #endif send (sd, server_send, strlen (server_send), 0); } if (delay > 0) { tv.tv_sec += delay; sleep (delay); } if (server_send || server_expect_count > 0) { buffer = malloc (MAXBUF); memset (buffer, '\0', MAXBUF); /* watch for the expect string */ while ((i = my_recv ()) > 0) { buffer[i] = '\0'; asprintf (&status, "%s%s", status, buffer); if (buffer[i-2] == '\r' && buffer[i-1] == '\n') break; if (maxbytes>0 && strlen(status) >= (unsigned)maxbytes) break; } /* return a CRITICAL status if we couldn't read any data */ if (status == NULL) terminate (STATE_CRITICAL, _("No data received from host\n")); strip (status); if (status && verbose) printf ("%s\n", status); if (server_expect_count > 0) { for (i = 0;; i++) { if (verbose) printf ("%d %d\n", i, server_expect_count); if (i >= server_expect_count) terminate (STATE_WARNING, _("Invalid response from host\n")); if (strstr (status, server_expect[i])) break; } } } if (server_quit != NULL) { #ifdef HAVE_SSL if (use_ssl) { SSL_write (ssl, server_quit, strlen (server_quit)); SSL_shutdown (ssl); SSL_free (ssl); SSL_CTX_free (ctx); } else { #endif send (sd, server_quit, strlen (server_quit), 0); #ifdef HAVE_SSL } #endif } /* close the connection */ if (sd) close (sd); elapsed_time = delta_time (tv); if (check_critical_time == TRUE && elapsed_time > critical_time) result = STATE_CRITICAL; else if (check_warning_time == TRUE && elapsed_time > warning_time) result = STATE_WARNING; /* reset the alarm */ alarm (0); printf (_("%s %s%s - %.3f second response time on port %d"), SERVICE, state_text (result), (was_refused) ? " (refused)" : "", elapsed_time, server_port); if (status && strlen(status) > 0) printf (" [%s]", status); printf ("|time=%.3f\n", elapsed_time); return result; } /* process command-line arguments */ int process_arguments (int argc, char **argv) { int c; int option_index = 0; static struct option long_options[] = { {"hostname", required_argument, 0, 'H'}, {"critical-time", required_argument, 0, 'c'}, {"warning-time", required_argument, 0, 'w'}, {"critical-codes", required_argument, 0, 'C'}, {"warning-codes", required_argument, 0, 'W'}, {"timeout", required_argument, 0, 't'}, {"protocol", required_argument, 0, 'P'}, {"port", required_argument, 0, 'p'}, {"send", required_argument, 0, 's'}, {"expect", required_argument, 0, 'e'}, {"maxbytes", required_argument, 0, 'm'}, {"quit", required_argument, 0, 'q'}, {"delay", required_argument, 0, 'd'}, {"refuse", required_argument, 0, 'r'}, {"use-ipv4", no_argument, 0, '4'}, {"use-ipv6", no_argument, 0, '6'}, {"verbose", no_argument, 0, 'v'}, {"version", no_argument, 0, 'V'}, {"help", no_argument, 0, 'h'}, {0, 0, 0, 0} }; if (argc < 2) usage ("No arguments found\n"); /* backwards compatibility */ for (c = 1; c < argc; c++) { if (strcmp ("-to", argv[c]) == 0) strcpy (argv[c], "-t"); else if (strcmp ("-wt", argv[c]) == 0) strcpy (argv[c], "-w"); else if (strcmp ("-ct", argv[c]) == 0) strcpy (argv[c], "-c"); } if (!is_option (argv[1])) { server_address = argv[1]; argv[1] = argv[0]; argv = &argv[1]; argc--; } while (1) { c = getopt_long (argc, argv, "+hVv46H:s:e:q:m:c:w:t:p:C:W:d:Sr:", long_options, &option_index); if (c == -1 || c == EOF || c == 1) break; switch (c) { case '?': /* print short usage statement if args not parsable */ printf (_("%s: Unknown argument: %s\n\n"), progname, optarg); print_usage (); exit (STATE_UNKNOWN); case 'h': /* help */ print_help (); exit (STATE_OK); case 'V': /* version */ print_revision (progname, "$Revision$"); exit (STATE_OK); case 'v': /* verbose mode */ verbose = TRUE; break; case '4': address_family = AF_INET; break; case '6': #ifdef USE_IPV6 address_family = AF_INET6; #else usage (_("IPv6 support not available\n")); #endif break; case 'H': /* hostname */ if (is_host (optarg) == FALSE) usage2 (_("invalid host name or address"), optarg); server_address = optarg; break; case 'c': /* critical */ if (!is_intnonneg (optarg)) usage (_("Critical threshold must be a nonnegative integer\n")); critical_time = strtod (optarg, NULL); check_critical_time = TRUE; break; case 'w': /* warning */ if (!is_intnonneg (optarg)) usage (_("Warning threshold must be a nonnegative integer\n")); warning_time = strtod (optarg, NULL); check_warning_time = TRUE; break; case 'C': crit_codes = realloc (crit_codes, ++crit_codes_count); crit_codes[crit_codes_count - 1] = optarg; break; case 'W': warn_codes = realloc (warn_codes, ++warn_codes_count); warn_codes[warn_codes_count - 1] = optarg; break; case 't': /* timeout */ if (!is_intpos (optarg)) usage (_("Timeout interval must be a positive integer\n")); socket_timeout = atoi (optarg); break; case 'p': /* port */ if (!is_intpos (optarg)) usage (_("Server port must be a positive integer\n")); server_port = atoi (optarg); break; case 's': server_send = optarg; break; case 'e': /* expect string (may be repeated) */ EXPECT = NULL; if (server_expect_count == 0) server_expect = malloc (++server_expect_count); else server_expect = realloc (server_expect, ++server_expect_count); server_expect[server_expect_count - 1] = optarg; break; case 'm': if (!is_intpos (optarg)) usage (_("Maxbytes must be a positive integer\n")); maxbytes = atoi (optarg); case 'q': server_quit = optarg; break; case 'r': if (!strncmp(optarg,"ok",2)) econn_refuse_state = STATE_OK; else if (!strncmp(optarg,"warn",4)) econn_refuse_state = STATE_WARNING; else if (!strncmp(optarg,"crit",4)) econn_refuse_state = STATE_CRITICAL; else usage (_("Refuse mut be one of ok, warn, crit\n")); break; case 'd': if (is_intpos (optarg)) delay = atoi (optarg); else usage (_("Delay must be a positive integer\n")); break; case 'S': #ifndef HAVE_SSL terminate (STATE_UNKNOWN, _("SSL support not available. Install OpenSSL and recompile.")); #endif use_ssl = TRUE; break; } } if (server_address == NULL) usage (_("You must provide a server address\n")); return OK; } #ifdef HAVE_SSL int connect_SSL (void) { SSL_METHOD *meth; /* Initialize SSL context */ SSLeay_add_ssl_algorithms (); meth = SSLv2_client_method (); SSL_load_error_strings (); if ((ctx = SSL_CTX_new (meth)) == NULL) { printf (_("ERROR: Cannot create SSL context.\n")); return STATE_CRITICAL; } /* Initialize alarm signal handling */ signal (SIGALRM, socket_timeout_alarm_handler); /* Set socket timeout */ alarm (socket_timeout); /* Save start time */ time (&start_time); /* Make TCP connection */ if (my_tcp_connect (server_address, server_port, &sd) == STATE_OK && was_refused == FALSE) { /* Do the SSL handshake */ if ((ssl = SSL_new (ctx)) != NULL) { SSL_set_fd (ssl, sd); if (SSL_connect (ssl) != -1) return OK; ERR_print_errors_fp (stderr); } else { printf (_("ERROR: Cannot initiate SSL handshake.\n")); } SSL_free (ssl); } SSL_CTX_free (ctx); close (sd); return STATE_CRITICAL; } #endif int my_recv (void) { int i; #ifdef HAVE_SSL if (use_ssl) { i = SSL_read (ssl, buffer, MAXBUF - 1); } else { #endif i = read (sd, buffer, MAXBUF - 1); #ifdef HAVE_SSL } #endif return i; }