Your message dated Thu, 18 Jul 2019 12:58:08 +0200
with message-id <[email protected]>
and subject line Re: [Pkg-nagios-devel] Bug#932355: could not complete ssl
handshake
has caused the Debian Bug report #932355,
regarding could not complete ssl handshake
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
932355: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=932355
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: nagios-nrpe-plugin
Version: 3.2.1-2
After upgrading from stretch to buster when Checking a Windows Server
with nrpe I get the following error:
CHECK_NRPE: (ssl_err != 5) Error - Could not complete SSL handshake with
10.0.0.1
SSL flags didn't make any difference and we ended up using the old
check_nrpe version from stretch to get it working again.
Commandline was:
'-2' '-H' 'xxxx.xxxx.de' '-c' 'check_drivesize' '-t' '60' '-a' 'drive=*'
'warning=total_used_pct gt 85 and total_free lt 15G'
'critical=total_used_pct gt 90 and total_free lt 10G' 'exclude=C:\'
'filter=name not regexp '\''(TSM.*_Data[00-99].|System
Reserved|CODEMETER)'\'' and type in (fixed)' 'empty-state=OK'
If you need additional information, please let me know.
Thanks
Jakob-Tobias
--- End Message ---
--- Begin Message ---
On 2019-07-18 12:32, Jakob-Tobias Winter wrote:
After upgrading from stretch to buster when Checking a Windows Server
with nrpe I get the following error:
CHECK_NRPE: (ssl_err != 5) Error - Could not complete SSL handshake
with 10.0.0.1
SSL flags didn't make any difference and we ended up using the old
check_nrpe version from stretch to get it working again.
Try changing the OpenSSL defaults back as documented in the
release-notes:
https://www.debian.org/releases/buster/amd64/release-notes/ch-information.en.html#openssl-defaults
If that doesn't work you'll need to disable SSL for those hosts:
check_nrpe -n -H ...
And disable SSL in nsclient.ini:
use ssl = false
This is not something we can fix in NRPE.
Kind Regards,
Bas
--- End Message ---