Your message dated Sat, 24 Sep 2011 12:02:51 +0200
with message-id <[email protected]>
and subject line Re: Bug#416535: nagios-nrpe-plugin: check_nrpe crash if nrpe 
server doesn't allow the client IP address
has caused the Debian Bug report #416535,
regarding nagios-nrpe-plugin: check_nrpe crash if nrpe server doesn't allow the 
client IP address
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
416535: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=416535
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: nagios-nrpe-plugin
Version: 2.5.1-3
Severity: important

When check_nrpe contacts a NRPE server who doesn't allow the IP address it exit 
with return code 141.
It should normally return 3.

I've tried with the original source and it works, so there is a problem with 
the patch but I can't find it.

Here is the test case with the check_nrpe provided by the package :
nagios:/# /usr/lib/nagios/plugins/check_nrpe -H 10.3.0.24 -c check_cpu
nagios:/# echo $?
141

The interesting part of the strace is the end :
write(3, "\27\3\1\0 \350\237Or{X\343\2521l\301\346\360\353\273\313"..., 1114) = 
1114
read(3, 0x805d3b8, 5)                   = -1 ECONNRESET (Connection reset by 
peer)
alarm(0)                                = 10
write(3, "\25\3\1\0 \326\17\341\2627\232,\240\304\363\30/\233\327"..., 37) = -1 
EPIPE (Broken pipe)

This is a problem because Nagios considers this result as OK.

The NRPE server is a windows XP with NSClient++-20070306-1940 installed.
I've been able to reproduce this problem on a another machine just by removing 
the IP address of the
Nagios server

Now the test case with the same source but with patch not applied :
nagios:~/nagios-nrpe-2.5.1/src# ./check_nrpe -H 10.3.0.24 -c check_cpu
CHECK_NRPE: Received 0 bytes from daemon.  Check the remote server logs for 
error messages.
superca-nagios:~/nrpe-2.7.1/src# echo $?
3

I have searched in the patch but I don't find any idea to correct this problem.


-- System Information:
Debian Release: 4.0
 APT prefers testing
 APT policy: (500, 'testing')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-4-vserver-k7
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)

Versions of packages nagios-nrpe-plugin depends on:
ii  libc6                       2.3.6.ds1-13 GNU C Library: Shared libraries
ii  libssl0.9.8                 0.9.8c-4     SSL shared libraries

Versions of packages nagios-nrpe-plugin recommends:
pn  nagios                        <none>     (no description available)

-- no debconf information




--- End Message ---
--- Begin Message ---
Julien Desfossez schrieb am Wednesday, den 28. March 2007:

> Package: nagios-nrpe-plugin
> Version: 2.5.1-3
> Severity: important
> 
> When check_nrpe contacts a NRPE server who doesn't allow the IP address it 
> exit with return code 141.
> It should normally return 3.
> 
> I've tried with the original source and it works, so there is a problem with 
> the patch but I can't find it.
> 
> Here is the test case with the check_nrpe provided by the package :
> nagios:/# /usr/lib/nagios/plugins/check_nrpe -H 10.3.0.24 -c check_cpu
> nagios:/# echo $?
> 141
> 
> The interesting part of the strace is the end :
> write(3, "\27\3\1\0 \350\237Or{X\343\2521l\301\346\360\353\273\313"..., 1114) 
> = 1114
> read(3, 0x805d3b8, 5)                   = -1 ECONNRESET (Connection reset by 
> peer)
> alarm(0)                                = 10
> write(3, "\25\3\1\0 \326\17\341\2627\232,\240\304\363\30/\233\327"..., 37) = 
> -1 EPIPE (Broken pipe)
> 
> This is a problem because Nagios considers this result as OK.
> 
> The NRPE server is a windows XP with NSClient++-20070306-1940 installed.
> I've been able to reproduce this problem on a another machine just by 
> removing the IP address of the
> Nagios server
> 
> Now the test case with the same source but with patch not applied :
> nagios:~/nagios-nrpe-2.5.1/src# ./check_nrpe -H 10.3.0.24 -c check_cpu
> CHECK_NRPE: Received 0 bytes from daemon.  Check the remote server logs for 
> error messages.
> superca-nagios:~/nrpe-2.7.1/src# echo $?
> 3
> 
> I have searched in the patch but I don't find any idea to correct this 
> problem.
There was no feedback on our question for years and we can't reproduce the
problem. I close this bug now, please reopen if you disagree.

Thanks

Alex



--- End Message ---

Reply via email to