*** Yungwei Chen <[email protected]> wrote: > 2. Restarted openvas server. Scanning 192.168.0.1 again shows the following. > [Wed Mar 10 08:39:02 2010][10165] user x starts a new scan. Target(s) : > 192.168.0.1, with max_hosts = 20 and max_checks = 4 > [Wed Mar 10 08:39:02 2010][10165] user x : testing 192.168.0.1 > (::ffff:192.168.0.1) [10176] > [Wed Mar 10 08:39:46 2010][10176] user x : The remote host (192.168.0.1) is > dead > [Wed Mar 10 08:39:47 2010][10176] Finished testing 192.168.0.1. Time : 44.80 > secs
Is "log_whole_attack = yes" in openvassd.conf? Probably not. Otherwise you should see something like that: user mime : testing 192.168.2.5 (::ffff:192.168.2.5) [26946] user mime : launching toolcheck.nasl against 192.168.2.5 [26957] toolcheck.nasl (process 26951) finished its job in 0.162 seconds user mime : launching smb_authorization.nasl against 192.168.2.5 [26958] smb_authorization.nasl (process 26958) finished its job in 0.056 seconds user mime : launching ping_host.nasl against 192.168.2.5 [26965] ping_host.nasl (process 26965) finished its job in 10.733 seconds user mime : launching openvas_tcp_scanner.nes against 192.168.2.5[27181] user mime : The remote host (192.168.2.5) is dead Micha -- Michael Meyer OpenPGP Key: 76E050B9 http://www.intevation.de Intevation GmbH, Neuer Graben 17, 49074 Osnabrück; AG Osnabrück, HR B 18998 Geschäftsführer: Frank Koormann, Bernhard Reiter, Dr. Jan-Oliver Wagner _______________________________________________ Openvas-discuss mailing list [email protected] http://lists.wald.intevation.org/mailman/listinfo/openvas-discuss
