*** Yungwei Chen <[email protected]> wrote:

> 2. Restarted openvas server. Scanning 192.168.0.1 again shows the following. 
> [Wed Mar 10 08:39:02 2010][10165] user x starts a new scan. Target(s) : 
> 192.168.0.1, with max_hosts = 20 and max_checks = 4 
> [Wed Mar 10 08:39:02 2010][10165] user x : testing 192.168.0.1 
> (::ffff:192.168.0.1) [10176] 
> [Wed Mar 10 08:39:46 2010][10176] user x : The remote host (192.168.0.1) is 
> dead 
> [Wed Mar 10 08:39:47 2010][10176] Finished testing 192.168.0.1. Time : 44.80 
> secs 

Is "log_whole_attack = yes" in openvassd.conf? Probably not. Otherwise
you should see something like that:

user mime : testing 192.168.2.5 (::ffff:192.168.2.5) [26946]
user mime : launching toolcheck.nasl against 192.168.2.5 [26957]
toolcheck.nasl (process 26951) finished its job in 0.162 seconds
user mime : launching smb_authorization.nasl against 192.168.2.5 [26958]
smb_authorization.nasl (process 26958) finished its job in 0.056 seconds 
user mime : launching ping_host.nasl against 192.168.2.5 [26965]
ping_host.nasl (process 26965) finished its job in 10.733 seconds 
user mime : launching openvas_tcp_scanner.nes against 192.168.2.5[27181] 
user mime : The remote host (192.168.2.5) is dead 

Micha

-- 
Michael Meyer                                         OpenPGP Key: 76E050B9
http://www.intevation.de
Intevation GmbH, Neuer Graben 17, 49074 Osnabrück; AG Osnabrück, HR B 18998
Geschäftsführer:   Frank Koormann,  Bernhard Reiter,  Dr. Jan-Oliver Wagner
_______________________________________________
Openvas-discuss mailing list
[email protected]
http://lists.wald.intevation.org/mailman/listinfo/openvas-discuss

Reply via email to