Page 4 of 5

Re: ssl handshake error

Posted: Mon Nov 21, 2016 5:42 pm
by avandemore
I linked to a document earlier in this thread: https://support.nagios.com/forum/viewto ... 00#p203107

Please use those instructions to install NRPE 3.0.1. You will needs to place the extracted files on a file systems which does not have the noexec option active.

Re: ssl handshake error

Posted: Thu Nov 24, 2016 7:50 am
by baber
avandemore wrote:I linked to a document earlier in this thread: https://support.nagios.com/forum/viewto ... 00#p203107

Please use those instructions to install NRPE 3.0.1. You will needs to place the extracted files on a file systems which does not have the noexec option active.

so thanks

but i use from that doc and type these commands but problem not solved

Code: Select all

cd  nrpe-3.0
./configure
make all
make install
make install-config

add this line to /etc/services

nrpe            5666/tcp                # NRPE

make install-init
service xinetd restart


finally when type :

Code: Select all

netstat -at | egrep "nrpe|5666"
this error appear

Code: Select all

getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
tcp        0      0 *:nrpe                      *:*                         LISTEN      
tcp        0      0 *:nrpe                      *:*                         LISTEN      
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed
getnameinfo failed

Re: ssl handshake error

Posted: Mon Nov 28, 2016 2:17 pm
by rkennedy
Please show us the exact commands you typed along with what was returned on the Nagios portion.

As for the netstat problem, please run this netstat -np | grep 5666 to stop it from trying to resolve.

Re: ssl handshake error

Posted: Tue Nov 29, 2016 10:25 am
by baber
rkennedy wrote:Please show us the exact commands you typed along with what was returned on the Nagios portion.

As for the netstat problem, please run this netstat -np | grep 5666 to stop it from trying to resolve.

i have attached all commands with output

BR

Re: ssl handshake error

Posted: Tue Nov 29, 2016 5:21 pm
by avandemore
/usr/local/nagios/libexec/check_nrpe is installed by nagios-plugins, so that is the information in the document you need to be concerned about.

check_nrpe will not work correctly until ldd returns correct information. Example:

Code: Select all

[root@avandemore-centos7 mail]# ldd /usr/local/nagios/libexec/check_nrpe
        linux-vdso.so.1 =>  (0x00007fffbe199000)
        libssl.so.10 => /lib64/libssl.so.10 (0x00007fe0492e9000)
        libcrypto.so.10 => /lib64/libcrypto.so.10 (0x00007fe048f01000)
        libnsl.so.1 => /lib64/libnsl.so.1 (0x00007fe048ce7000)
        libc.so.6 => /lib64/libc.so.6 (0x00007fe048925000)
        libgssapi_krb5.so.2 => /lib64/libgssapi_krb5.so.2 (0x00007fe0486d9000)
        libkrb5.so.3 => /lib64/libkrb5.so.3 (0x00007fe0483f3000)
        libcom_err.so.2 => /lib64/libcom_err.so.2 (0x00007fe0481ef000)
        libk5crypto.so.3 => /lib64/libk5crypto.so.3 (0x00007fe047fbd000)
        libdl.so.2 => /lib64/libdl.so.2 (0x00007fe047db8000)
        libz.so.1 => /lib64/libz.so.1 (0x00007fe047ba2000)
        /lib64/ld-linux-x86-64.so.2 (0x00007fe049561000)
        libkrb5support.so.0 => /lib64/libkrb5support.so.0 (0x00007fe047993000)
        libkeyutils.so.1 => /lib64/libkeyutils.so.1 (0x00007fe04778e000)
        libresolv.so.2 => /lib64/libresolv.so.2 (0x00007fe047574000)
        libpthread.so.0 => /lib64/libpthread.so.0 (0x00007fe047358000)
        libselinux.so.1 => /lib64/libselinux.so.1 (0x00007fe047132000)
        libpcre.so.1 => /lib64/libpcre.so.1 (0x00007fe046ed1000)
        liblzma.so.5 => /lib64/liblzma.so.5 (0x00007fe046cac000)
What does ldd /usr/local/nagios/libexec/check_nrpe return for you now?

Re: ssl handshake error

Posted: Wed Nov 30, 2016 1:37 am
by baber
avandemore wrote:/usr/local/nagios/libexec/check_nrpe is installed by nagios-plugins, so that is the information in the document you need to be concerned about.

check_nrpe will not work correctly until ldd returns correct information. Example:

Code: Select all

[root@avandemore-centos7 mail]# ldd /usr/local/nagios/libexec/check_nrpe
        linux-vdso.so.1 =>  (0x00007fffbe199000)
        libssl.so.10 => /lib64/libssl.so.10 (0x00007fe0492e9000)
        libcrypto.so.10 => /lib64/libcrypto.so.10 (0x00007fe048f01000)
        libnsl.so.1 => /lib64/libnsl.so.1 (0x00007fe048ce7000)
        libc.so.6 => /lib64/libc.so.6 (0x00007fe048925000)
        libgssapi_krb5.so.2 => /lib64/libgssapi_krb5.so.2 (0x00007fe0486d9000)
        libkrb5.so.3 => /lib64/libkrb5.so.3 (0x00007fe0483f3000)
        libcom_err.so.2 => /lib64/libcom_err.so.2 (0x00007fe0481ef000)
        libk5crypto.so.3 => /lib64/libk5crypto.so.3 (0x00007fe047fbd000)
        libdl.so.2 => /lib64/libdl.so.2 (0x00007fe047db8000)
        libz.so.1 => /lib64/libz.so.1 (0x00007fe047ba2000)
        /lib64/ld-linux-x86-64.so.2 (0x00007fe049561000)
        libkrb5support.so.0 => /lib64/libkrb5support.so.0 (0x00007fe047993000)
        libkeyutils.so.1 => /lib64/libkeyutils.so.1 (0x00007fe04778e000)
        libresolv.so.2 => /lib64/libresolv.so.2 (0x00007fe047574000)
        libpthread.so.0 => /lib64/libpthread.so.0 (0x00007fe047358000)
        libselinux.so.1 => /lib64/libselinux.so.1 (0x00007fe047132000)
        libpcre.so.1 => /lib64/libpcre.so.1 (0x00007fe046ed1000)
        liblzma.so.5 => /lib64/liblzma.so.5 (0x00007fe046cac000)
What does ldd /usr/local/nagios/libexec/check_nrpe return for you now?
this is output of command:

Code: Select all

ldd /usr/local/nagios/libexec/check_nrpe
        linux-vdso.so.1 =>  (0x00007fff71dff000)
        libssl.so.10 => /usr/lib64/libssl.so.10 (0x000000323ca00000)
        libcrypto.so.10 => /usr/lib64/libcrypto.so.10 (0x0000003237a00000)
        libnsl.so.1 => /lib64/libnsl.so.1 (0x000000323c600000)
        libc.so.6 => /lib64/libc.so.6 (0x000000322c200000)
        libgssapi_krb5.so.2 => /lib64/libgssapi_krb5.so.2 (0x000000323a200000)
        libkrb5.so.3 => /lib64/libkrb5.so.3 (0x0000003238200000)
        libcom_err.so.2 => /lib64/libcom_err.so.2 (0x0000003237200000)
        libk5crypto.so.3 => /lib64/libk5crypto.so.3 (0x0000003238a00000)
        libdl.so.2 => /lib64/libdl.so.2 (0x000000322be00000)
        libz.so.1 => /lib64/libz.so.1 (0x000000322da00000)
        /lib64/ld-linux-x86-64.so.2 (0x000000322ba00000)
        libkrb5support.so.0 => /lib64/libkrb5support.so.0 (0x0000003237600000)
        libkeyutils.so.1 => /lib64/libkeyutils.so.1 (0x0000003238600000)
        libresolv.so.2 => /lib64/libresolv.so.2 (0x000000322e200000)
        libpthread.so.0 => /lib64/libpthread.so.0 (0x000000322c600000)
        libselinux.so.1 => /lib64/libselinux.so.1 (0x000000322d600000)


i think don't have these 2 packages

libpcre.so.1 => /lib64/libpcre.so.1 (0x00007fe046ed1000)
liblzma.so.5 => /lib64/liblzma.so.5 (0x00007fe046cac000)

but my problem is nagios is installed on redhat 6.2 Os and my nagios server don't have access to internet i have to install packages offline

what do i have to do ?

BR

Re: ssl handshake error

Posted: Wed Nov 30, 2016 12:25 pm
by dwhitfield
Those packages don't appear to be necessary on Cent6

Code: Select all

[root@centos6x64 ~]# ldd /usr/local/nagios/libexec/check_nrpe
        linux-vdso.so.1 =>  (0x00007ffef7491000)
        libssl.so.10 => /usr/lib64/libssl.so.10 (0x00007f4dd4f01000)
        libcrypto.so.10 => /usr/lib64/libcrypto.so.10 (0x00007f4dd4b1d000)
        libnsl.so.1 => /lib64/libnsl.so.1 (0x00007f4dd4903000)
        libc.so.6 => /lib64/libc.so.6 (0x00007f4dd456f000)
        libgssapi_krb5.so.2 => /lib64/libgssapi_krb5.so.2 (0x00007f4dd432b000)
        libkrb5.so.3 => /lib64/libkrb5.so.3 (0x00007f4dd4043000)
        libcom_err.so.2 => /lib64/libcom_err.so.2 (0x00007f4dd3e3f000)
        libk5crypto.so.3 => /lib64/libk5crypto.so.3 (0x00007f4dd3c13000)
        libdl.so.2 => /lib64/libdl.so.2 (0x00007f4dd3a0e000)
        libz.so.1 => /lib64/libz.so.1 (0x00007f4dd37f8000)
        /lib64/ld-linux-x86-64.so.2 (0x00007f4dd517a000)
        libkrb5support.so.0 => /lib64/libkrb5support.so.0 (0x00007f4dd35ed000)
        libkeyutils.so.1 => /lib64/libkeyutils.so.1 (0x00007f4dd33e9000)
        libresolv.so.2 => /lib64/libresolv.so.2 (0x00007f4dd31cf000)
        libpthread.so.0 => /lib64/libpthread.so.0 (0x00007f4dd2fb2000)
        libselinux.so.1 => /lib64/libselinux.so.1 (0x00007f4dd2d92000)
Let's take a step back. This is a "server --> host" NRPE setup, not a "server --> passthrough --> Host" setup, correct? Is there any reason you can't use check_by_ssh? The check_by_ssh plugin will be more secure (but it does introduce more load). I suggest this because I know working through all of this on a system without Internet is a pain. https://assets.nagios.com/downloads/nag ... ng_SSH.pdf is for XI, but the mechanics are still the same.

Could you clarify the version of Red Hat you are using and where? You've mentioned 6.2, 6.4, and 6.8 in the thread. I'm not aware of any specific issues with specific versions, but if we are going to dig into that, we need to know what we are working with.

Re: ssl handshake error

Posted: Wed Nov 30, 2016 1:10 pm
by baber
dwhitfield wrote:Those packages don't appear to be necessary on Cent6

Code: Select all

[root@centos6x64 ~]# ldd /usr/local/nagios/libexec/check_nrpe
        linux-vdso.so.1 =>  (0x00007ffef7491000)
        libssl.so.10 => /usr/lib64/libssl.so.10 (0x00007f4dd4f01000)
        libcrypto.so.10 => /usr/lib64/libcrypto.so.10 (0x00007f4dd4b1d000)
        libnsl.so.1 => /lib64/libnsl.so.1 (0x00007f4dd4903000)
        libc.so.6 => /lib64/libc.so.6 (0x00007f4dd456f000)
        libgssapi_krb5.so.2 => /lib64/libgssapi_krb5.so.2 (0x00007f4dd432b000)
        libkrb5.so.3 => /lib64/libkrb5.so.3 (0x00007f4dd4043000)
        libcom_err.so.2 => /lib64/libcom_err.so.2 (0x00007f4dd3e3f000)
        libk5crypto.so.3 => /lib64/libk5crypto.so.3 (0x00007f4dd3c13000)
        libdl.so.2 => /lib64/libdl.so.2 (0x00007f4dd3a0e000)
        libz.so.1 => /lib64/libz.so.1 (0x00007f4dd37f8000)
        /lib64/ld-linux-x86-64.so.2 (0x00007f4dd517a000)
        libkrb5support.so.0 => /lib64/libkrb5support.so.0 (0x00007f4dd35ed000)
        libkeyutils.so.1 => /lib64/libkeyutils.so.1 (0x00007f4dd33e9000)
        libresolv.so.2 => /lib64/libresolv.so.2 (0x00007f4dd31cf000)
        libpthread.so.0 => /lib64/libpthread.so.0 (0x00007f4dd2fb2000)
        libselinux.so.1 => /lib64/libselinux.so.1 (0x00007f4dd2d92000)
Let's take a step back. This is a "server --> host" NRPE setup, not a "server --> passthrough --> Host" setup, correct? Is there any reason you can't use check_by_ssh? The check_by_ssh plugin will be more secure (but it does introduce more load). I suggest this because I know working through all of this on a system without Internet is a pain. https://assets.nagios.com/downloads/nag ... ng_SSH.pdf is for XI, but the mechanics are still the same.

Could you clarify the version of Red Hat you are using and where? You've mentioned 6.2, 6.4, and 6.8 in the thread. I'm not aware of any specific issues with specific versions, but if we are going to dig into that, we need to know what we are working with.

so thanks

my means was nagios server is installed on Red Hat Enterprise Linux Server release 6.2 (Santiago)

and that server i want to add nagios is Red Hat Enterprise Linux Server release 6.8 (Santiago)

excuseme the correct output this is :

Code: Select all

ldd /usr/local/nagios/libexec/check_nrpe
        linux-vdso.so.1 =>  (0x00007ffc1cb59000)
        libssl.so.10 => /usr/lib64/libssl.so.10 (0x0000003b48400000)
        libcrypto.so.10 => /usr/lib64/libcrypto.so.10 (0x0000003b42800000)
        libnsl.so.1 => /lib64/libnsl.so.1 (0x0000003b49400000)
        libc.so.6 => /lib64/libc.so.6 (0x0000003b37000000)
        libgssapi_krb5.so.2 => /lib64/libgssapi_krb5.so.2 (0x0000003b47400000)
        libkrb5.so.3 => /lib64/libkrb5.so.3 (0x0000003b46400000)
        libcom_err.so.2 => /lib64/libcom_err.so.2 (0x0000003b45400000)
        libk5crypto.so.3 => /lib64/libk5crypto.so.3 (0x0000003b46c00000)
        libresolv.so.2 => /lib64/libresolv.so.2 (0x0000003b38c00000)
        libdl.so.2 => /lib64/libdl.so.2 (0x0000003b36c00000)
        libz.so.1 => /lib64/libz.so.1 (0x0000003b37c00000)
        /lib64/ld-linux-x86-64.so.2 (0x0000003b36800000)
        libkrb5support.so.0 => /lib64/libkrb5support.so.0 (0x0000003b46800000)
        libkeyutils.so.1 => /lib64/libkeyutils.so.1 (0x0000003b45c00000)
        libpthread.so.0 => /lib64/libpthread.so.0 (0x0000003b37400000)
        libselinux.so.1 => /lib64/libselinux.so.1 (0x0000003b38800000)


i don't have centos all of my os are redhat
now what do i have to do ?
will my problem solve?

Re: ssl handshake error

Posted: Wed Nov 30, 2016 1:26 pm
by dwhitfield
CentOS and Red Hat should have package compatibility, so that's probably not the issue. AV sent you the package list for Cent/Red Hat 7, so that's why I sent the ones I had on 6...just to clarify that you didn't need the two you asked about.

You have two servers in our situation, so I think check_by_ssh should work for you. Do you just want to use NRPE because that is what you are using on your other servers? Did you look at https://assets.nagios.com/downloads/nag ... ng_SSH.pdf? We seem to be hitting a roadblock with NRPE, so I just want to be sure that's the only method that is going to work for you. http://www.techrepublic.com/blog/linux- ... sh-plugin/ gives a third-party view about check_by_ssh.

Re: ssl handshake error

Posted: Wed Nov 30, 2016 1:58 pm
by baber
dwhitfield wrote:CentOS and Red Hat should have package compatibility, so that's probably not the issue. AV sent you the package list for Cent/Red Hat 7, so that's why I sent the ones I had on 6...just to clarify that you didn't need the two you asked about.

You have two servers in our situation, so I think check_by_ssh should work for you. Do you just want to use NRPE because that is what you are using on your other servers? Did you look at https://assets.nagios.com/downloads/nag ... ng_SSH.pdf? We seem to be hitting a roadblock with NRPE, so I just want to be sure that's the only method that is going to work for you. http://www.techrepublic.com/blog/linux- ... sh-plugin/ gives a third-party view about check_by_ssh.
So thanks

But i am so confused because i have added about 140 virtual machines (linux) with different version of redhat 4.2 , 6.4) to nagios server
And use nrpe for all of them why nrpe not work on this version of redhat(6.4)?

Is your means use check_by_ssh instead of check_nrpe for monitor this server?

BR