1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
|
package Smokeping::probes::SSH;
=head1 301 Moved Permanently
This is a Smokeping probe module. Please use the command
C<smokeping -man Smokeping::probes::SSH>
to view the documentation or the command
C<smokeping -makepod Smokeping::probes::SSH>
to generate the POD document.
=cut
use strict;
use base qw(Smokeping::probes::basefork);
use IPC::Open3;
use Symbol;
use Carp;
use Time::HiRes qw(gettimeofday tv_interval);
sub pod_hash {
return {
name => <<DOC,
Smokeping::probes::SSH - Secure Shell Probe for SmokePing
DOC
description => <<DOC,
Integrates ssh-keyscan as a probe into smokeping. The variable B<binary> must
point to your copy of the ssh-keyscan program. If it is not installed on
your system yet, you should install openssh >= 3.8p1
The Probe asks the given host n-times for it's public key, where n is
the amount specified in the config File.
As part of the initialization, the probe asks localhost for it's public key
and tries to parse the output. Make sure you have SSH running on the
localhost as well.
DOC
authors => <<'DOC',
Christian Recktenwald <smokeping-contact@citecs.de>
DOC
}
}
my $ssh_re=qr/^# \S+ SSH-/i;
sub new($$$)
{
my $proto = shift;
my $class = ref($proto) || $proto;
my $self = $class->SUPER::new(@_);
# no need for this if we run as a cgi
unless ( $ENV{SERVER_SOFTWARE} ) {
my $call = "$self->{properties}{binary} -t dsa,rsa,rsa1 localhost";
my $return = `$call 2>&1`;
if ($return =~ m/$ssh_re/s){
print "### parsing ssh-keyscan output...OK\n";
} else {
croak "ERROR: output of '$call' does not match $ssh_re\n";
}
};
return $self;
}
sub ProbeDesc($){
my $self = shift;
return "SSH requests";
}
sub pingone ($){
my $self = shift;
my $target = shift;
my $inh = gensym;
my $outh = gensym;
my $errh = gensym;
my $host = $target->{addr};
my $query = "$self->{properties}{binary} -t $target->{vars}->{keytype} -p $target->{vars}->{port} $host";
my @times;
# get the user and system times before and after the test
$self->do_debug("query=$query\n");
for (my $run = 0; $run < $self->pings; $run++) {
my $t0 = [gettimeofday];
my $pid = open3($inh,$outh,$errh, $query);
while (<$errh>) {
if (/$ssh_re/i) {
push @times, tv_interval($t0);
last;
}
}
waitpid $pid,0;
close $errh;
close $inh;
close $outh;
}
@times = map {sprintf "%.10e", $_ } sort {$a <=> $b} @times;
# $self->do_debug("time=@times\n");
return @times;
}
sub probevars {
my $class = shift;
return $class->_makevars($class->SUPER::probevars, {
_mandatory => [ 'binary' ],
binary => {
_doc => "The location of your ssh-keyscan binary.",
_example => '/usr/bin/ssh-keyscan',
_sub => sub {
my $val = shift;
-x $val or return "ERROR: binary '$val' is not executable";
return undef;
},
},
})
}
sub targetvars {
my $class = shift;
return $class->_makevars($class->SUPER::targetvars, {
keytype => {
_doc => "Type of key, used in ssh-keyscan -t I<keytype>",
_re => "[dt]sa1*",
_example => 'dsa',
_default => 'rsa',
},
port => {
_doc => "Port to use when testing the ssh connection -p I<port>",
_re => '\d+',
_example => '5000',
_default => '22',
},
})
}
1;
|