• Stars
    star
    285
  • Rank 145,115 (Top 3 %)
  • Language
    Shell
  • License
    Other
  • Created over 8 years ago
  • Updated 7 months ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Script to check validity and expiration of TLS/SSL certificate on hosts. May be used with Zabbix or standalone.

Script to check validity and expiration of TLS/SSL certificate on remote host. Supports: TLS SNI and STARTTLS for protocols like SMTP; internationalized domain names with Punycode(uses libidn); allowing self-signed certs as valid; JSON output; supports any additional s_client options.

May be used standalone or with Zabbix. See the "Zabbix integration" section below.

user@host:~$ ./ssl_cert_check.sh valid google.com
1

# Check 74.125.131.138 on port 443 for days left before certificate expiration
# TLS SNI(Server Name Indication) is set to google.com
# Check timeout is 15 seconds(default is 5)
# TLS protocol version is forced to 1.2, no auto-negotiation
user@host:~$ ./ssl_cert_check.sh expire 74.125.131.138 443 google.com 15 tls1_2
56

# JSON output of the certificate
user@host:~$ ./ssl_cert_check.sh json google.com
{"expire_days": 56, "valid": 1, "return_code": 0, "return_text": "ok"}

Usage

ssl_cert_check.sh valid|expire|json <hostname or IP> [port[/starttls protocol]] [domain for TLS SNI] [check timeout (seconds)] [tls_version|tls_auto,[self_signed_ok]] [ s_client_option1 ] [ ... ] [ s_client_optionN ]

  • [port] optional, default is 443

  • [starttls protocol] optional, use protocol-specific message to switch to TLS communication. See man s_client option -starttls for supported protocols, like smtp, ftp, ldap.

  • [domain for TLS SNI] optional, default is <hostname or IP>.
    SNI(Server Name Indication) is used to specify certificate domain name if it differs from the hostname.

  • [check timeout (seconds)] optional, default is 5 seconds

  • [tls_version|tls_auto,[self_signed_ok]] predefined options comma (,) separated, flag is optional. Set what is needed, no order of parameters is present of the available options below.

    • [tls_version] if it is not given a TLS version will be negotiated. Override the TLS version as you need, like: tls1_2, tls1_3, no_tls1, dtls and so on. See the "TLS Version Options" section of man openssl or man s_client for the available options.
    • [self_signed_ok] is optional. When this flag is set all self-signed certificates will be seen as valid. Otherwise these will be rendered invalid. It will allow OpenSSL return codes 18, 19, 20 & 21. See the Diagnostics section at https://www.openssl.org/docs/man1.0.2/man1/verify.html.
    • [tls_auto] means auto negotiating TLS protocol. That is the default, this option is used as separator if you want to speficy additional s_client options after it.
  • [ s_client_option1 ] [ ... ] [ s_client_optionN ] is optional. But all other parameters are required to be set. Everything you append after all parameters will be added/appended on the OpenSSL s_client command. See all s_client options at https://www.openssl.org/docs/man1.0.2/man1/s_client.html.

Return values

expire or valid
  • 1|0 for validity check: 1 - valid, 0 - invalid, expired or unavailable
  • N number of days left for expiration check. Zero or negative value means certificate is expired
  • -65535 site was unavailable for check timeout or incorrect script parameters
json: JSON output
  • JSON object with a summary of the result, which can be used by Zabbix (JSONPath)
    • expire_days: the amount of days before the certificate is expired
    • valid: see valid check
    • return_code: the OpenSSL return code
    • return_text: the OpenSSL return text which gives helpful insights
  • JSON object with the error code and message
    • error_code: $error_code
    • error_message: The output of the error message

Exit code is always 0, otherwise zabbix agent fails to get the item value.

If the script is running without terminal(from zabbix), error messages are not printed, only the exit code. The reason is that zabbix merges stdout and strerr to get an item value.

Examples

user@host:~$ ./ssl_cert_check.sh valid google.com
1

user@host:~$ ./ssl_cert_check.sh valid imap.gmail.com 993
1

# SMTP on port 587 with STARTTLS to switch to TLS communication
user@host:~$ ./ssl_cert_check.sh valid smtp.gmail.com 587/smtp
1

user@host:~$ ./ssl_cert_check.sh valid self-signed.badssl.com
0

# Expired certificate is not valid
user@host:~$ ./ssl_cert_check.sh valid expired.badssl.com
0

user@host:~$ ./ssl_cert_check.sh expire google.com
56

user@host:~$ ./ssl_cert_check.sh expire expired.badssl.com
-2606

# JSON output of the certificate (can be combined with/piped to `jq`)
user@host:~$ ./ssl_cert_check.sh json google.com
{"expire_days": 56, "valid": 1, "return_code": 0, "return_text": "ok"}

# NOTE: an error message is shown to stderr only when running on a terminal
# Without terminal(from zabbix), only the result is printed to stdout
user@host:~$ ./ssl_cert_check.sh expire unavailable.example.com
-65535
ERROR: Failed to get certificate

# Check 74.125.131.138:443 for a valid certificate for google.com
# TLS SNI(Server Name Indication) is set to google.com
# Check timeout is 10 seconds(default is 5)
user@host:~$ ./ssl_cert_check.sh valid 74.125.131.138 443 google.com 10
1

# Check a certificate on an endpoint only accepting TLS 1.2 and use TLS 1.2, which is valid.
user@host:~$ ./ssl_cert_check.sh valid tls-v1-2.badssl.com 1012 tls-v1-2.badssl.com 10 tls1_2
1

# Check a certificate on an endpoint only accepting TLS 1.2, but use TLS 1.1, which is invalid.
user@host:~$ ./ssl_cert_check.sh valid tls-v1-2.badssl.com 1012 tls-v1-2.badssl.com 10 tls1_1
-65535
ERROR: Failed to get certificate

# Check a self-signed certificate endpoint using TLS 1.2, without assuming self-signed is valid.
user@host:~$ ./ssl_cert_check.sh json self-signed.badssl.com 443 self-signed.badssl.com 10 tls1_2
{"expire_days": 708, "valid": 0, "return_code": 18, "return_text": "self signed certificate"}

# Check a self-signed certificate endpoint using TLS 1.2, with assuming self-signed is valid.
user@host:~$ ./ssl_cert_check.sh json self-signed.badssl.com 443 self-signed.badssl.com 10 tls1_2,self_signed_ok
{"expire_days": 708, "valid": 1, "return_code": 18, "return_text": "self signed certificate"}

Zabbix integration

Example of Zabbix user parameters is in userparameters_ssl_cert_check.conf.

You can write your own template or use one of two example templates in zabbix_template_examples directory.

basic - basic template and userparameter for monitoring of one SSL cert per host

  • copy userparameters_ssl_cert_check.conf file into /etc/zabbix/zabbix_agentd.d on host
  • import template in zabbix server, assign to host, fill macros on that host

advanced - advanced template and userparameter for monitoring of multiple ssl certs per hosts

  • copy userparameters_ssl_cert_check.conf file into /etc/zabbix/zabbix_agentd.d
  • copy and modify ssl_cert_list into /etc/zabbix/scripts/ssl_cert_list
  • import template in zabbix server, assign to host, either run discovery or wait

Support for Internationalized Domain Names with Punycode

If idn executable(libidn) is available, unicode host and domain names be will supported by converting to Punycode representation. Absence of idn does not break the script, but unicode domains will not be supported.

Using with busybox, like Alpine-based Docker images

Busybox date can not parse date format from openssl. If you are using the script in busybox, for example in Alpine-based Docker images, install coreutils and bash packages.

P.S.

If this code is useful for you - don't forget to put a star on it's github repo.

More Repositories

1

thinclient

Tools to build custom Ubuntu image, that boots over network and works entirely from RAM.
Shell
149
star
2

ansible-ssh

Script to connect to managed hosts using Ansible inventory and config.
Shell
61
star
3

bash-debug

Simple debugger for bash
Shell
49
star
4

kibana-backup-simple

Simple backup/restore for Kibana saved objects: config, index patterns, dashboards, saved searches, etc.
Python
42
star
5

ansible_ipmi_lan_manage

Ansible role for managing IPMI LAN settings with ipmitool.
Shell
28
star
6

selivan.github.io-socks

Scripts to create self-hosted socks5 or shadowsocks server
19
star
7

bacula_zabbix_integration

Scripts and template to integrate bacula with zabbix.
Python
16
star
8

ansible-set-user-password-expire

Ansible playbook to set user password expiration time on Linux. If you find this useful, please star it on GitHub.
14
star
9

inet-failover

Failver for Linux router with 2 uplinks.
Shell
14
star
10

selivan.github.io

my blog
JavaScript
12
star
11

zabbix-import

Utility to import Zabbix XML configuration: templates, hosts, host groups
Python
11
star
12

mongodb-backup-simple

Simple mongodb backup for server running secondaries for all shards.
Python
6
star
13

ansible-inventory-from-git-branch

Switch ansible inventory file accordingly to current git branch.
Shell
5
star
14

redmine-on-mysql-encrypted-backup-to-S3

Encrypted backup and restore redmine+mysql instance to AWS S3.
Shell
4
star
15

opvn-2uplinks-failover

Failover for OpenVPN L3 channel from client with 2 uplinks.
Shell
4
star
16

apt-strict

Install precise versions of exactly pointed dependencies: libxxx=0.2 (APT always installs highest avaliable). Utility and ansible module.
Python
3
star
17

gnu_linux_intro

Materials to my course "Introduction to GNU/Linux". Russian language
Shell
2
star
18

ipset-http

Simple HTTP API to add ipset entries with timeout
Python
2
star
19

shadowsocks-with-cloak-in-docker

Docker compose to create shadowsocks server behind cloak https disguise
Dockerfile
2
star
20

openssl-gost-engine-debian-package-builder

Docker image to easily build Ubuntu/Debian package for OpenSSL GOST engine.
Shell
1
star
21

dotfiles

Shell
1
star
22

percona-xtradb-cluster-5.5-with-ipv6

Settings to make Percona XtraDB Cluster 5.5 work with IPv6.
1
star