Build precise queries to find exactly what you need
Press ESC to close
Join our next live webinar: “Advanced Nagios Monitoring Techniques” – Register Now
@CWSI
Favorites0
Views646
Projects2
Hey, The plugin works great for some hosts, but is failing for a fairly large number, not sure if this is an issue at my side but I don't think so - [root@host scripts]# ./check_heartbleed.py -H www.google.com -p 443 OK: Server www.google.com TLSv1.0 is not vulnerable. TLSv1.1 is not vulnerable. TLSv1.2 is not vulnerable. SSLv3.0 is not vulnerable. [root@host scripts]# ./check_heartbleed.py -H www.test.com -p 443 UNKNOWN: Server www.test.com closed connection without sending Server Hello. Any thoughts?
Reviewed 10 years ago
Love the script. There's an issue with hostnames that have a hyphen in them however, so the likes of myserver.my-domain.com:443 causes a failure of the script. I'm not familiar with Perl so could not work out exactly why, but the following REGEX drops everything before the hypen in the hostname (so it would try to check the expiry of domain.com:443 in my example above) - if ($cmd_options{H} =~ /([w+.*]+:d+)/){ $hostname_port_number=$1; Changing this to the below solved it for me, but I'm not sure if the author was trying to use the REGEX to clean up the hostname in some way so this fix may not be ideal, but it does work - if ($cmd_options{H} =~ /([w+.*]+:d+)/){ $hostname_port_number=$cmd_options{H};