Nagios Exchange
  • Home
  • Directory
  • About

Advanced Search

Build precise queries to find exactly what you need

Search Logic

Select compatible versions

Press ESC to close

Sign In Sign Up

Join our next live webinar: “Advanced Nagios Monitoring Techniques” – Register Now

Plugins4379Themes and Skins11Addons732Documentation283Graphics and Logos36View All Categories
LinuxSecuritySNMPFile SystemCloud
New Listings Recently Updated Listings Most Favored Listings Most Popular Listings Most Rated Listings Most Reviewed Listings
Random Project
Network and Systems Management check_unifi – check Ubiquiti UniFi Controller and APs
RSS Feed
Newest Listings Updated Listings
Top Contributors
Julien DESMAREST (4)Davide Lemma (4)deskwork_itunes142 (4)Joerg Hoerter (3)TcoUpLoad (1)
See More
Newest Contributors
Community Member (51)Davide Lemma (4)Alarig Le Lay (1)Penn Rabb (1)Sean Falzon (1)
See More
Home > CWSI
C

CWSI

@CWSI

User Stats

Favorites0

Views646

Projects2

Check_client_cert_CAs_sent
Security
Check_client_cert_CAs_sent
This check uses OpenSSL to connect to a host:port and either confirm that it is specifying at least one accepted client certificate CA name, or…
0.0 (0)
6K
0
CWSI
check_cert_signing_algorithm_secure
Security
check_cert_signing_algorithm_secure
This check connects to a specified host:port with OpenSSL to determine if the signing algorithm used on the server certificate is secure.
0.0 (0)
6.2K
0
CWSI
GPL
check_heartbleed

Works great for some hosts but not others?

Hey, The plugin works great for some hosts, but is failing for a fairly large number, not sure if this is an issue at my side but I don't think so - [root@host scripts]# ./check_heartbleed.py -H www.google.com -p 443 OK: Server www.google.com TLSv1.0 is not vulnerable. TLSv1.1 is not vulnerable. TLSv1.2 is not vulnerable. SSLv3.0 is not vulnerable. [root@host scripts]# ./check_heartbleed.py -H www.test.com -p 443 UNKNOWN: Server www.test.com closed connection without sending Server Hello. Any thoughts?

Reviewed 10 years ago

check_ssl_cert_alternative

Love it, but issue with hyphens in hostnames

Love the script. There's an issue with hostnames that have a hyphen in them however, so the likes of myserver.my-domain.com:443 causes a failure of the script. I'm not familiar with Perl so could not work out exactly why, but the following REGEX drops everything before the hypen in the hostname (so it would try to check the expiry of domain.com:443 in my example above) - if ($cmd_options{H} =~ /([w+.*]+:d+)/){ $hostname_port_number=$1; Changing this to the below solved it for me, but I'm not sure if the author was trying to use the REGEX to clean up the hostname in some way so this fix may not be ideal, but it does work - if ($cmd_options{H} =~ /([w+.*]+:d+)/){ $hostname_port_number=$cmd_options{H};

Reviewed 10 years ago

No Favorites Found

Copyright © 2009-2025 Nagios Enterprises, LLC. All rights reserved.

Privacy PolicyTerms of UseTrademarks