Search Exchange

Search All Sites

Nagios Live Webinars

Let our experts show you how Nagios can help your organization.

Contact Us

Phone: 1-888-NAGIOS-1
Email: sales@nagios.com

Login

Remember Me

Directory Tree

Perl check radius

Rating
7 votes
Favoured:
0
Hits
113956
Files:
FileDescription
check_radius.plcheck_radius.pl
Nagios CSP

Meet The New Nagios Core Services Platform

Built on over 25 years of monitoring experience, the Nagios Core Services Platform provides insightful monitoring dashboards, time-saving monitoring wizards, and unmatched ease of use. Use it for free indefinitely.

Monitoring Made Magically Better

  • Nagios Core on Overdrive
  • Powerful Monitoring Dashboards
  • Time-Saving Configuration Wizards
  • Open Source Powered Monitoring On Steroids
  • And So Much More!
This simplified plugin is written in Perl and uses the Authen::Radius module.
# ./check_radius.pl -h

Copyright (C) 2006 Carlos Vicente

Checks if a Radius server can authenticate a username/password

usage: ./check_radius.pl -H host -u username -p password -s secret

[-n nas-ip] [-P port] [-t timeout]


Options:
-h, --help

Print detailed help screen

-H, --hostname=ADDRESS

Host name or IP Address

-P, --port=INTEGER

Port number (default: 1812)

-u, --username=STRING

The user to authenticate

-p, --password=STRING

Password for autentication (SECURITY RISK)

-n, --nas-ip=STRING

NAS IP Address (default: 127.0.0.1)

-s, --secret=STRING

Radius secret

-t, --timeout=INTEGER

Seconds before connection times out (default: 5)


This plugin checks if a username/password can be authenticated against a
Radius Server.

The password option presents a substantial security issue because the
password can be determined by careful watching of the command line in
a process listing. This risk is exacerbated because nagios will
run the plugin at regular predictable intervals. Please make sure that
the password used does not allow access to sensitive system resources,
otherwise, a compromise could occur.
Reviews (5)
byMajed, June 27, 2018
Except would have loved to see the response time... and even perf data
Authen perl module has some errors, I fixed it by applying this patch.

https://bugs.archlinux.org/task/42132

Now the plugin works just fine.
byventz, November 5, 2013
1 of 1 people found this review helpful
Works very well.

Similar to what we have written in house.

To everyone that has problems, just take out the "-w" flag in the first line of the script (#!/usr/bin/perl)

This flag is for "with warnings", and as advertised -- it displays warnings about the Module you are using (different issue). Either way, it works fine and you need to return back a single word for Nagios -- thus, getting rid of the warnings makes it nagios compatible.
bystruiaj17, September 23, 2013
It appears to be broken on newer versions of Linux. I get this on Ubuntu 11.10:

Use of uninitialized value $vendor_name in hash element at /usr/share/perl5/Authen/Radius.pm line 431
./check_radius.pl -H servername -u vpntest -p password -s secret
Use of uninitialized value in hash element at /usr/lib/perl5/site_perl/5.8.8/Authen/Radius.pm line 432.
Use of uninitialized value in hash element at /usr/lib/perl5/site_perl/5.8.8/Authen/Radius.pm line 432.
Use of uninitialized value in hash element at /usr/lib/perl5/site_perl/5.8.8/Authen/Radius.pm line 432.
Use of uninitialized value in hash element at /usr/lib/perl5/site_perl/5.8.8/Authen/Radius.pm line 432.
Use of uninitialized value in hash element at /usr/lib/perl5/site_perl/5.8.8/Authen/Radius.pm line 432.
Use of uninitialized value in hash element at /usr/lib/perl5/site_perl/5.8.8/Authen/Radius.pm line 432.
CRITICAL

No hint as to what it's looking for or why it is failing.