[Nagiosplug-devel] PATCH: SMTP auth support in nagios plugin check_smtp.c
Lubomir Host
rajo at platon.sk
Mon Oct 31 13:23:00 CET 2005
Hi developers!
Here is a patch that adds the ability to confirm that your SMTP AUTH
mechanism is working on your smtp server.
First version of this kind of patch was sent to mailinglist 2003-07-31.
Check following links:
http://sourceforge.net/mailarchive/forum.php?thread_id=2876441&forum_id=8499
http://sourceforge.net/mailarchive/forum.php?thread_id=2876984&forum_id=8499
Why this patch was never included?
My new version is rewritten. SMTP AUTH now works with SSL/TLS and also
withouth TLS. Patch is againts fresh CVS version.
Please, apply ASAP. Thanks
rajo
--
Lubomir Host 'rajo' <rajo AT platon.sk> ICQ #: 257322664 ,''`.
Platon Software Development Group http://platon.sk/ : :' :
Homepage: http://rajo.platon.sk/en/references `. `'
http://www.gnu.org/philosophy/no-word-attachments.html `-
-------------- next part --------------
Index: check_smtp.c
===================================================================
RCS file: /cvsroot/nagiosplug/nagiosplug/plugins/check_smtp.c,v
retrieving revision 1.49
diff -u -r1.49 check_smtp.c
--- check_smtp.c 19 Oct 2005 20:22:00 -0000 1.49
+++ check_smtp.c 31 Oct 2005 20:58:30 -0000
@@ -45,6 +45,7 @@
#define SMTP_EHLO "EHLO "
#define SMTP_QUIT "QUIT\r\n"
#define SMTP_STARTTLS "STARTTLS\r\n"
+#define SMTP_AUTH_LOGIN "AUTH LOGIN\r\n"
#ifndef HOST_MAX_BYTES
#define HOST_MAX_BYTES 255
@@ -82,6 +83,9 @@
int response_size=0;
char **commands = NULL;
char **responses = NULL;
+char *authtype = NULL;
+char *authuser = NULL;
+char *authpass = NULL;
int warning_time = 0;
int check_warning_time = FALSE;
int critical_time = 0;
@@ -99,6 +103,47 @@
MAXBUF = 1024
};
+/* written by lauri alanko */
+static char *
+base64 (const char *bin, size_t len)
+{
+
+ char *buf = (char *) malloc ((len + 2) / 3 * 4 + 1);
+ size_t i = 0, j = 0;
+
+ char BASE64_END = '=';
+ char base64_table[64];
+ strncpy (base64_table, "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/", 64);
+
+ while (j < len - 2) {
+ buf[i++] = base64_table[bin[j] >> 2];
+ buf[i++] = base64_table[((bin[j] & 3) << 4) | (bin[j + 1] >> 4)];
+ buf[i++] = base64_table[((bin[j + 1] & 15) << 2) | (bin[j + 2] >> 6)];
+ buf[i++] = base64_table[bin[j + 2] & 63];
+ j += 3;
+ }
+
+ switch (len - j) {
+ case 1:
+ buf[i++] = base64_table[bin[j] >> 2];
+ buf[i++] = base64_table[(bin[j] & 3) << 4];
+ buf[i++] = BASE64_END;
+ buf[i++] = BASE64_END;
+ break;
+ case 2:
+ buf[i++] = base64_table[bin[j] >> 2];
+ buf[i++] = base64_table[((bin[j] & 3) << 4) | (bin[j + 1] >> 4)];
+ buf[i++] = base64_table[(bin[j + 1] & 15) << 2];
+ buf[i++] = BASE64_END;
+ break;
+ case 0:
+ break;
+ }
+
+ buf[i] = '\0';
+ return buf;
+}
+
int
main (int argc, char **argv)
{
@@ -109,6 +154,7 @@
int result = STATE_UNKNOWN;
char *cmd_str = NULL;
char *helocmd = NULL;
+ char *error_msg = NULL;
struct timeval tv;
struct hostent *hp;
@@ -293,6 +339,92 @@
n++;
}
+ if (authtype != NULL) {
+ if (strcmp (authtype, "LOGIN") == 0) {
+ char *abuf;
+ int ret;
+ do {
+ if (authuser == NULL) {
+ result = STATE_CRITICAL;
+ error_msg = _("no authuser specified, ");
+ break;
+ }
+ if (authpass == NULL) {
+ result = STATE_CRITICAL;
+ error_msg = _("no authpass specified, ");
+ break;
+ }
+
+ /* send AUTH LOGIN */
+ my_send(SMTP_AUTH_LOGIN, strlen(SMTP_AUTH_LOGIN));
+ if (verbose)
+ printf (_("sent %s\n"), "AUTH LOGIN");
+
+ if((ret = my_recv(buffer, MAXBUF - 1)) < 0){
+ error_msg = _("recv() failed after AUTH LOGIN, \n");
+ result = STATE_WARNING;
+ break;
+ }
+ buffer[ret] = 0;
+ if (verbose)
+ printf (_("received %s\n"), buffer);
+
+ if (strncmp (buffer, "334", 3) != 0) {
+ result = STATE_CRITICAL;
+ error_msg = _("invalid response received after AUTH LOGIN, ");
+ break;
+ }
+
+ /* encode authuser with base64 */
+ abuf = base64 (authuser, strlen(authuser));
+ strcat (abuf, "\r\n");
+ my_send(abuf, strlen(abuf));
+ if (verbose)
+ printf (_("sent %s\n"), abuf);
+
+ if ((ret = my_recv(buffer, MAX_INPUT_BUFFER-1)) == -1) {
+ result = STATE_CRITICAL;
+ error_msg = _("recv() failed after sending authuser, ");
+ break;
+ }
+ buffer[ret] = 0;
+ if (verbose) {
+ printf (_("received %s\n"), buffer);
+ }
+ if (strncmp (buffer, "334", 3) != 0) {
+ result = STATE_CRITICAL;
+ error_msg = _("invalid response received after authuser, ");
+ break;
+ }
+ /* encode authpass with base64 */
+ abuf = base64 (authpass, strlen(authpass));
+ strcat (abuf, "\r\n");
+ my_send(abuf, strlen(abuf));
+ if (verbose) {
+ printf (_("sent %s\n"), abuf);
+ }
+ if ((ret = my_recv(buffer, MAX_INPUT_BUFFER-1)) == -1) {
+ result = STATE_CRITICAL;
+ error_msg = _("recv() failed after sending authpass, ");
+ break;
+ }
+ buffer[ret] = 0;
+ if (verbose) {
+ printf (_("received %s\n"), buffer);
+ }
+ if (strncmp (buffer, "235", 3) != 0) {
+ result = STATE_CRITICAL;
+ error_msg = _("invalid response received after authpass, ");
+ break;
+ }
+ break;
+ } while (0);
+ } else {
+ result = STATE_CRITICAL;
+ error_msg = _("only authtype LOGIN is supported, ");
+ }
+ }
+
/* tell the server we're done */
my_send (SMTP_QUIT, strlen (SMTP_QUIT));
@@ -313,13 +445,15 @@
result = STATE_WARNING;
}
- printf (_("SMTP %s - %.3f sec. response time%s%s|%s\n"),
- state_text (result), elapsed_time,
- verbose?", ":"", verbose?buffer:"",
- fperfdata ("time", elapsed_time, "s",
- (int)check_warning_time, warning_time,
- (int)check_critical_time, critical_time,
- TRUE, 0, FALSE, 0));
+ printf (_("SMTP %s - %s%.3f sec. response time%s%s|%s\n"),
+ state_text (result),
+ (error_msg == NULL ? "" : error_msg),
+ elapsed_time,
+ verbose?", ":"", verbose?buffer:"",
+ fperfdata ("time", elapsed_time, "s",
+ (int)check_warning_time, warning_time,
+ (int)check_critical_time, critical_time,
+ TRUE, 0, FALSE, 0));
return result;
}
@@ -342,6 +476,9 @@
{"port", required_argument, 0, 'p'},
{"from", required_argument, 0, 'f'},
{"fqdn", required_argument, 0, 'F'},
+ {"authtype", required_argument, 0, 'A'},
+ {"authuser", required_argument, 0, 'U'},
+ {"authpass", required_argument, 0, 'P'},
{"command", required_argument, 0, 'C'},
{"response", required_argument, 0, 'R'},
{"nocommand", required_argument, 0, 'n'},
@@ -368,7 +505,7 @@
}
while (1) {
- c = getopt_long (argc, argv, "+hVv46t:p:f:e:c:w:H:C:R:SD:F:",
+ c = getopt_long (argc, argv, "+hVv46t:p:f:e:c:w:H:C:R:SD:F:A:U:P:",
longopts, &option);
if (c == -1 || c == EOF)
@@ -397,6 +534,15 @@
from_arg = optarg;
smtp_use_dummycmd = 1;
break;
+ case 'A':
+ authtype = optarg;
+ break;
+ case 'U':
+ authuser = optarg;
+ break;
+ case 'P':
+ authpass = optarg;
+ break;
case 'e': /* server expect string on 220 */
server_expect = optarg;
break;
@@ -562,6 +708,15 @@
Use STARTTLS for the connection.\n"));
#endif
+ printf("\
+ -A, --authtype=STRING\n\
+ SMTP AUTH type to check (default none, only LOGIN supported)\n\
+ -U, --authuser=STRING\n\
+ SMTP AUTH username\n\
+ -P, --authpass=STRING\n\
+ SMTP AUTH password\n\
+ ");
+
printf (_(UT_WARN_CRIT));
printf (_(UT_TIMEOUT), DEFAULT_SOCKET_TIMEOUT);
@@ -584,6 +739,7 @@
{
printf ("\
Usage: %s -H host [-p port] [-e expect] [-C command] [-f from addr]\n\
+ [-A authtype -U authuser -P authpass]\n\
[-w warn] [-c crit] [-t timeout] [-S] [-D days] [-n] [-v] [-4|-6]\n", progname);
}
More information about the Devel
mailing list