Home Directory

Search Exchange

Search All Sites

Nagios Live Webinars

Let our experts show you how Nagios can help your organization.

Contact Us

Phone: 1-888-NAGIOS-1
Email: sales@nagios.com


Remember Me




The plugin works great for some hosts, but is failing for a fairly large number, not sure if this is an issue at my side but I don't think so -

[root@host scripts]# ./check_heartbleed.py -H www.google.com -p 443
OK: Server www.google.com TLSv1.0 is not vulnerable. TLSv1.1 is not vulnerable. TLSv1.2 is not vulnerable. SSLv3.0 is not vulnerable.

[root@host scripts]# ./check_heartbleed.py -H www.test.com -p 443
UNKNOWN: Server www.test.com closed connection without sending Server Hello.

Any thoughts?
Love the script. There's an issue with hostnames that have a hyphen in them however, so the likes of myserver.my-domain.com:443 causes a failure of the script.

I'm not familiar with Perl so could not work out exactly why, but the following REGEX drops everything before the hypen in the hostname (so it would try to check the expiry of domain.com:443 in my example above) -
if ($cmd_options{H} =~ /([\w+\.*]+\:\d+)/){

Changing this to the below solved it for me, but I'm not sure if the author was trying to use the REGEX to clean up the hostname in some way so this fix may not be ideal, but it does work -
if ($cmd_options{H} =~ /([\w+\.*]+\:\d+)/){