Jan,

Thanks for all your work in setting this up.

Could we discuss the OpenVAS/OpenSSL problem again?

I can find several articles that claim we could use legally build OpenVAS on 
any OS that shipped OpenSSL with the OS.  The OpenSSL site says that "the major 
Linux and BSD distributions" ship with OpenSSL.  Could we restrict ourselves to 
these distributions?

Do we need to distribute binary packages?

Has anyone looked into the details of replacing OpenSSL with GNU/TLS?  What 
OpenSSL functions are called?  You said that the OpenSSL compatibility 
interface will not work.  What work was done to test this?

As to whether we could ship OpenVAS without SSL.  I think that there are two 
general uses of SSL:  1. As part of the process of gathering information from 
scanned systems.  2. To encrypt the communications between the server and the 
client.  I think we could forgo use 2 for V1.0.  As for use 1, it all depends 
on what target systems we want V1.0 to scan.  I assumed we would choose a small 
set of target systems (Windows, Debian, Web Server, RedHat, Solaris, MacOS, 
etc) and insure that we have both a solid server and a set of plugins that 
accurately probe these.

We cannot let the perfect stop us from producing the good.

I think we need to determine who we want to target V1.0 of OpenVAS at.  We are 
never going to get done if we try to have 13,000 plugins and a system to 
support them at initial release.  One of the targets for OpenVAS is for your 
company to have a tool that can be freely distributed to Germany companies.  
Could this be a reasonable starting point?  So what systems are those companies 
running?  I assume mostly Windows?  Am I wrong?  I think that once we say that 
we are scanning Windows systems for problems we will need to do a reasonably 
thorough job and keep doing it as new vulnerabilities develop.  I think it will 
be better for the project to say "We don't scan Macs" that to sorta kinda scan 
them.  If these targets require SSL then we will have answered your question.

What are your thoughts?

Norm


-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Jan-Oliver Wagner
Sent: Monday, March 12, 2007 4:41 PM
To: openvas-devel@wald.intevation.org
Subject: [Openvas-devel] Start: replacing OpenSSL by GNU/TLS

Hi,

after the infrastructure is back, I'd like to see the coding works
re-start.

The major and most important task, IMHO, is to replace OpenSSL by
GNU/TLS. There is no OpenSSL exception for the server
part. It is therefore illegal to distribute binary packages.

This should be motivation enough to help doing this job ;-)

Please speak up if you offer help (coding, testing, sponsoring
coders, ...). The intitial tasks I see so far are:

- sync openvas-libraries with nessus-libraries
- clean up openvas-libraries (renaming etc)
- replace OpenSSL by OpenVAS (my tests last year
  showed that it will not be sufficient to apply the
  OpenSSL compatibility mode of GNU/TLS for openvas-server;
  probably this holds true for openvas-libraries as well).


One question occured to me:

Does it make sense at all to allow compilation without SSL?
IMHO, SSL should be mandatory, but I'd be happy to stand corrected.

Best

        Jan
 
-- 
Dr. Jan-Oliver Wagner                                   Intevation GmbH
Amtsgericht Osnabrück, HR B 18998             http://www.intevation.de/
Geschäftsführer: Frank Koormann, Bernhard Reiter, Dr. Jan-Oliver Wagner
_______________________________________________
Openvas-devel mailing list
Openvas-devel@wald.intevation.org
http://lists.wald.intevation.org/mailman/listinfo/openvas-devel



_______________________________________________
Openvas-devel mailing list
Openvas-devel@wald.intevation.org
http://lists.wald.intevation.org/mailman/listinfo/openvas-devel

Reply via email to