Hi Team
I have install openvas successfully on a Linux system but the reports
doesn't seem to be up to date as I am able to found hardly 1 or 2 high
vulnerability. where as other vulnerability applications gave me more
results
Need to know where Openvas is falling short, below is the result of
openvas-check-setup
openvas-check-setup 2.2.0
Test completeness and readiness of OpenVAS-5
Please report us any non-detected problems and
help us to improve this check routine:
http://lists.wald.intevation.org/mailman/listinfo/openvas-discuss
Send us the log-file (/tmp/openvas-check-setup.log) to help analyze
the problem.
Use the parameter --server to skip checks for client tools
like GSD and OpenVAS-CLI.
Step 1: Checking OpenVAS Scanner ...
OK: OpenVAS Scanner is present in version 3.3.1.
OK: OpenVAS Scanner CA Certificate is present as
/var/lib/openvas/CA/cacert.pem.
OK: NVT collection in /var/lib/openvas/plugins contains 25841 NVTs.
WARNING: Signature checking of NVTs is not enabled in OpenVAS
Scanner.
SUGGEST: Enable signature checking (see
http://www.openvas.org/trusted-nvts.html).
Step 2: Checking OpenVAS Manager ...
OK: OpenVAS Manager is present in version 3.0.1.
OK: OpenVAS Manager client certificate is present as
/var/lib/openvas/CA/clientcert.pem.
OK: OpenVAS Manager database found in
/var/lib/openvas/mgr/tasks.db.
OK: Access rights for the OpenVAS Manager database are correct.
OK: sqlite3 found, extended checks of the OpenVAS Manager
installation enabled.
OK: OpenVAS Manager database is at revision 56.
OK: OpenVAS Manager expects database at revision 56.
OK: Database schema is up to date.
OK: OpenVAS Manager database contains information about 25839 NVTs.
OK: xsltproc found.
Step 3: Checking OpenVAS Administrator ...
OK: OpenVAS Administrator is present in version 1.2.0.
OK: At least one user exists.
OK: At least one admin user exists.
Step 4: Checking Greenbone Security Assistant (GSA) ...
OK: Greenbone Security Assistant is present in version 3.0.1.
Step 5: Checking OpenVAS CLI ...
OK: OpenVAS CLI version 1.1.4.SVN.
Step 6: Checking Greenbone Security Desktop (GSD) ...
OK: Greenbone Security Desktop is present in Version 1.2.2.
Step 7: Checking if OpenVAS services are up and running ...
OK: netstat found, extended checks of the OpenVAS services enabled.
OK: OpenVAS Scanner is running and listening on all interfaces.
OK: OpenVAS Scanner is listening on port 9391, which is the
default port.
OK: OpenVAS Manager is running and listening on all interfaces.
OK: OpenVAS Manager is listening on port 9390, which is the
default port.
OK: OpenVAS Administrator is listening on port 9393, which is
the default port.
WARNING: Greenbone Security Assistant is listening on port 9392
9392, which is NOT the default port!
SUGGEST: Ensure Greenbone Security Assistant is listening on
one of the following ports: 80, 443, 9392.
./openvas-check-setup: line 596: [: too many arguments
Step 8: Checking nmap installation ...
WARNING: Your version of nmap is not fully supported: 5.21
SUGGEST: You should install nmap 5.51.
Step 9: Checking presence of optional tools ...
OK: pdflatex found.
OK: PDF generation successful. The PDF report format is likely
to work.
OK: ssh-keygen found, LSC credential generation for GNU/Linux
targets is likely to work.
OK: rpm found, LSC credential package generation for RPM based
targets is likely to work.
WARNING: Could not find alien binary, LSC credential package
generation for DEB based targets will not work.
SUGGEST: Install alien.
OK: nsis found, LSC credential package generation for Microsoft
Windows targets is likely to work.
It seems like your OpenVAS-5 installation is OK.
If you think it is not OK, please report your observation
and help us to improve this check routine:
http://lists.wald.intevation.org/mailman/listinfo/openvas-discuss
Please attach the log-file (/tmp/openvas-check-setup.log) to help us
analyze the problem.
--
*Regards*
*Sachin Murudkar*
*Sr.Systems Administrator*
************************************************************************************************************************************************************************************************************
Disclaimer: This e-mail may contain confidential information and is intended
only for the person to whom it is addressed. If you are not the intended
recipient you may not disclose, distribute or copy this document in any manner
whatsoever.
Prime Focus does not accept any liability for damage, loss or expense arising
from this e-mail or from accessing it.s attachments.
************************************************************************************************************************************************************************************************************
_______________________________________________
Openvas-discuss mailing list
[email protected]
http://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss