Build precise queries to find exactly what you need
Press ESC to close
Your review has been submitted and is pending approval.
This simplified plugin is written in Perl and uses the Authen::Radius module.
Current Version
Last Release Date
June 23, 2009
Owner
Nagios Exchange
# ./check_radius.pl -h
Copyright (C) 2006 Carlos Vicente
Checks if a Radius server can authenticate a username/password
usage: ./check_radius.pl -H host -u username -p password -s secret
[-n nas-ip] [-P port] [-t timeout]
Options: -h, --help
Print detailed help screen
-H, --hostname=ADDRESS
Host name or IP Address
-P, --port=INTEGER
Port number (default: 1812)
-u, --username=STRING
The user to authenticate
-p, --password=STRING
Password for autentication (SECURITY RISK)
-n, --nas-ip=STRING
NAS IP Address (default: 127.0.0.1)
-s, --secret=STRING
Radius secret
-t, --timeout=INTEGER
Seconds before connection times out (default: 5)
This plugin checks if a username/password can be authenticated against a Radius Server.
The password option presents a substantial security issue because the password can be determined by careful watching of the command line in a process listing. This risk is exacerbated because nagios will run the plugin at regular predictable intervals. Please make sure that the password used does not allow access to sensitive system resources, otherwise, a compromise could occur.
Except would have loved to see the response time... and even perf data
Authen perl module has some errors, I fixed it by applying this patch. https://bugs.archlinux.org/task/42132 Now the plugin works just fine.
Works very well. Similar to what we have written in house. To everyone that has problems, just take out the "-w" flag in the first line of the script (#!/usr/bin/perl) This flag is for "with warnings", and as advertised -- it displays warnings about the Module you are using (different issue). Either way, it works fine and you need to return back a single word for Nagios -- thus, getting rid of the warnings makes it nagios compatible.
It appears to be broken on newer versions of Linux. I get this on Ubuntu 11.10: Use of uninitialized value $vendor_name in hash element at /usr/share/perl5/Authen/Radius.pm line 431
./check_radius.pl -H servername -u vpntest -p password -s secret Use of uninitialized value in hash element at /usr/lib/perl5/site_perl/5.8.8/Authen/Radius.pm line 432. Use of uninitialized value in hash element at /usr/lib/perl5/site_perl/5.8.8/Authen/Radius.pm line 432. Use of uninitialized value in hash element at /usr/lib/perl5/site_perl/5.8.8/Authen/Radius.pm line 432. Use of uninitialized value in hash element at /usr/lib/perl5/site_perl/5.8.8/Authen/Radius.pm line 432. Use of uninitialized value in hash element at /usr/lib/perl5/site_perl/5.8.8/Authen/Radius.pm line 432. Use of uninitialized value in hash element at /usr/lib/perl5/site_perl/5.8.8/Authen/Radius.pm line 432. CRITICAL No hint as to what it's looking for or why it is failing.
You must be logged in to submit a review.
To:
From: