Your message dated Fri, 02 Jan 2015 12:21:39 +0000
with message-id <[email protected]>
and subject line Bug#774307: Removed package(s) from unstable
has caused the Debian Bug report #580556,
regarding openvas-server: Server takes 5 minutes to launch. Connecting with 
client causes openvasd to read from disk forever.
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
580556: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=580556
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: openvas-server
Version: 2.0.3-3
Severity: important

openvasd should not be launched with the '-q' option in 
/etc/init.d/openvas-server;
It takes about 5-minutes to load the 17,000 plugins, meanwhile the user gets no
feedback as to what is happening.

But the main problem I'm seeing is that when I try to connect to the server 
(running on localhost) it simply hangs after asking me to verify the 
certificate.
While I'm waiting, iotop shows that openvasd is reading from the disk like 
crazy.

I have let things run for about 10 minutes, but it never moves beyond 
"initiating
connection". 


-- System Information:
Debian Release: squeeze/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: i386 (i686)

Kernel: Linux 2.6.32-trunk-686 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages openvas-server depends on:
ii  debconf [debconf-2.0]         1.5.32     Debian configuration management sy
ii  libc6                         2.10.2-6   Embedded GNU C Library: Shared lib
ii  libgcrypt11                   1.4.5-2    LGPL Crypto library - runtime libr
ii  libglib2.0-0                  2.24.0-1   The GLib library of C routines
ii  libgnutls26                   2.8.6-1    the GNU TLS library - runtime libr
ii  libgpg-error0                 1.6-1      library for common error values an
ii  libgpgme11                    1.2.0-1.2  GPGME - GnuPG Made Easy
ii  libopenvas2                   2.0.4-2    remote network security auditor - 
ii  libopenvasnasl2               2.0.2-2    OpenVAS shared libraries
ii  libpcap0.8                    1.1.1-2    system interface for user-level pa
ii  libwrap0                      7.6.q-18   Wietse Venema's TCP wrappers libra
ii  openssl                       0.9.8n-1   Secure Socket Layer (SSL) binary a

Versions of packages openvas-server recommends:
ii  openvas-plugins-base        1:20100320-1 remote network security auditor - 

Versions of packages openvas-server suggests:
ii  openvas-client              2.0.5-1      Remote network security auditor, t
ii  openvas-plugins-dfsg        1:20100320-1 remote network security auditor - 

-- debconf information:
  openvas-server/srvlifetime: 365
  openvas-server/califetime: 1460
  openvas-server/location:
  openvas-server/country:
  openvas-server/organization: OpenVAS
  openvas-server/certificate:
  openvas-server/province:



--- End Message ---
--- Begin Message ---
Version: 2.0.3-6+rm

Dear submitter,

as the package openvas-server has just been removed from the Debian archive
unstable we hereby close the associated bug reports.  We are sorry
that we couldn't deal with your issue properly.

For details on the removal, please see https://bugs.debian.org/774307

The version of this package that was in Debian prior to this removal
can still be found using http://snapshot.debian.org/.

This message was generated automatically; if you believe that there is
a problem with it please contact the archive administrators by mailing
[email protected].

Debian distribution maintenance software
pp.
Scott Kitterman (the ftpmaster behind the curtain)

--- End Message ---

Reply via email to