Skip to content

A Python script to be executed under Nagios, Zabbix to monitor a RADIUS load balancer or server

Notifications You must be signed in to change notification settings

Bonn93/radius-python-sanity-check

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

20 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Radius-Python-Sanity-Check

This is a core set of scripts to verify a MS based Radius server is responding and to authentication/authorisation requests. MS Windows will report the service as running, however it could have many errors returned, and an actual authentication problem be present.

Version

1.0

Tech

Lots of hacky stuff from Java, MS to get MSCHAPv2 objects / auth working

  • [check_radius.py] - Core script called by the executors, relies on mschapv2.py and lib/ lib/dicts
  • [mschapv2.py] - MSCHAPv2 Handler
  • [zabbix_executor.sh] - Zabbix External Script
  • [lvs_executor.sh] - RHEL LVS Script to feed into IPVSADM/LVS

Installation

You need Python 2.7

$ coming soon

Usage

./check_radius.py --username 'your_username' --password 'said_users_password' --port 'your_radius_port' --host 'raidus_host_or_balancer' --secret 'your_radius_secret'

LVS and Zabbix shell scripts to run the above and input pre-configred details.

Credit and Notes

Credit to Lee Webb for the initial script and finding the Java Reverse Engineering sections for MSCHAP.

About

A Python script to be executed under Nagios, Zabbix to monitor a RADIUS load balancer or server

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published