The attached patch adds a "port" config variable to the SSH probe.
This allows probing hosts which run SSH on a non-standard port.

(although it is not documented, ssh-keyscan(1) understands -p <port>)

DES
-- 
Dag-Erling Smørgrav
Senior Software Developer
Linpro AS - www.linpro.no

--- /usr/share/perl5/smokeping/Smokeping/probes/SSH.pm.orig     2007-04-26 
08:01:04.000000000 +0000
+++ /usr/share/perl5/smokeping/Smokeping/probes/SSH.pm  2007-04-26 
08:11:46.000000000 +0000
@@ -82,7 +82,7 @@
 
     my $host = $target->{addr};
 
-    my $query = "$self->{properties}{binary} -t $target->{vars}->{keytype} 
$host";
+    my $query = "$self->{properties}{binary} -t $target->{vars}->{keytype} -p 
$target->{vars}->{port} $host";
     my @times;
 
     # get the user and system times before and after the test
@@ -134,6 +134,12 @@
                _example => 'dsa',
                 _default => 'rsa',
            },
+           port => {
+               _doc => "Port number, used in ssh-keyscan -p <port>",
+              _re => "\\d+",
+               _example => '22',
+                _default => '22',
+           },
        })
 }
 1;
_______________________________________________
smokeping-users mailing list
[email protected]
https://lists.oetiker.ch/cgi-bin/listinfo/smokeping-users

Reply via email to