-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 I setup openvas scanner 3.3.1 on ubuntu 12.04.1 as well as the certificates according to the default standards
I also setup openvas manager 3.0.3 and generate the default certificates. I started the openvas server but couldn't get the manager to connect to it. The log of openvasmd reports: lib serv:WARNING:2012-09-24 05h57.56 utc:3658: Failed to gnutls_bye: GnuTLS internal error. lib serv:WARNING:2012-09-24 05h58.16 utc:3661: openvas_server_connect: failed to shake hands with server: The TLS connection was non-properly terminated. lib serv:WARNING:2012-09-24 05h58.16 utc:3661: Failed to gnutls_bye: GnuTLS internal error. I decided to try out a connection from the manager on gnutls-serv on port 9393 and I got the following log from gnutls-serv which shows a handshake failure : * Accepted connection from IPv4 127.0.0.1 port 50757 on Mon Sep 24 11:38:24 2012 |<2>| ASSERT: gnutls_constate.c:695 |<4>| REC[0x934c8a0]: Allocating epoch #1 |<4>| REC[0x934c8a0]: Expected Packet[0] Handshake(22) with length: 1 |<4>| REC[0x934c8a0]: Received Packet[0] Handshake(22) with length: 108 |<4>| REC[0x934c8a0]: Decrypted Packet[0] Handshake(22) with length: 108 |<3>| HSK[0x934c8a0]: CLIENT HELLO was received [108 bytes] |<3>| HSK[0x934c8a0]: Client's version: 3.3 |<2>| ASSERT: gnutls_db.c:326 |<2>| ASSERT: gnutls_db.c:246 |<2>| EXT[0x934c8a0]: Parsing extension 'SAFE RENEGOTIATION/65281' (1 bytes) |<2>| EXT[0x934c8a0]: Parsing extension 'SIGNATURE ALGORITHMS/13' (16 bytes) |<2>| EXT[SIGA]: rcvd signature algo (4.1) RSA-SHA256 |<2>| EXT[SIGA]: rcvd signature algo (4.2) DSA-SHA256 |<2>| EXT[SIGA]: rcvd signature algo (4.3) GOST R 34.10-94 |<2>| EXT[SIGA]: rcvd signature algo (5.1) RSA-SHA384 |<2>| EXT[SIGA]: rcvd signature algo (5.3) GOST R 34.10-94 |<2>| EXT[SIGA]: rcvd signature algo (6.1) RSA-SHA512 |<2>| EXT[SIGA]: rcvd signature algo (6.3) GOST R 34.10-94 |<2>| ASSERT: gnutls_handshake.c:3348 |<1>| Could not find an appropriate certificate: Insufficient credentials for that request. |<3>| HSK[0x934c8a0]: Removing ciphersuite: DHE_DSS_ARCFOUR_SHA1 |<3>| HSK[0x934c8a0]: Removing ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1 |<3>| HSK[0x934c8a0]: Removing ciphersuite: DHE_DSS_AES_128_CBC_SHA1 |<3>| HSK[0x934c8a0]: Removing ciphersuite: DHE_DSS_AES_256_CBC_SHA1 |<3>| HSK[0x934c8a0]: Removing ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA1 |<3>| HSK[0x934c8a0]: Removing ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA1 |<3>| HSK[0x934c8a0]: Removing ciphersuite: DHE_DSS_AES_128_CBC_SHA256 |<3>| HSK[0x934c8a0]: Removing ciphersuite: DHE_DSS_AES_256_CBC_SHA256 |<3>| HSK[0x934c8a0]: Removing ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1 |<3>| HSK[0x934c8a0]: Removing ciphersuite: DHE_RSA_AES_128_CBC_SHA1 |<3>| HSK[0x934c8a0]: Removing ciphersuite: DHE_RSA_AES_256_CBC_SHA1 |<3>| HSK[0x934c8a0]: Removing ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA1 |<3>| HSK[0x934c8a0]: Removing ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA1 |<3>| HSK[0x934c8a0]: Removing ciphersuite: DHE_RSA_AES_128_CBC_SHA256 |<3>| HSK[0x934c8a0]: Removing ciphersuite: DHE_RSA_AES_256_CBC_SHA256 |<3>| HSK[0x934c8a0]: Removing ciphersuite: RSA_ARCFOUR_SHA1 |<3>| HSK[0x934c8a0]: Removing ciphersuite: RSA_ARCFOUR_MD5 |<3>| HSK[0x934c8a0]: Removing ciphersuite: RSA_3DES_EDE_CBC_SHA1 |<3>| HSK[0x934c8a0]: Removing ciphersuite: RSA_AES_128_CBC_SHA1 |<3>| HSK[0x934c8a0]: Removing ciphersuite: RSA_AES_256_CBC_SHA1 |<3>| HSK[0x934c8a0]: Removing ciphersuite: RSA_CAMELLIA_128_CBC_SHA1 |<3>| HSK[0x934c8a0]: Removing ciphersuite: RSA_CAMELLIA_256_CBC_SHA1 |<3>| HSK[0x934c8a0]: Removing ciphersuite: RSA_AES_128_CBC_SHA256 |<3>| HSK[0x934c8a0]: Removing ciphersuite: RSA_AES_256_CBC_SHA256 |<2>| ASSERT: gnutls_handshake.c:921 |<2>| ASSERT: gnutls_handshake.c:586 |<2>| ASSERT: gnutls_handshake.c:2358 |<2>| ASSERT: gnutls_handshake.c:2991 Error in handshake Error: Could not negotiate a supported cipher suite. |<4>| REC: Sending Alert[2|40] - Handshake failed |<4>| REC[0x934c8a0]: Sending Packet[0] Alert(21) with length: 2 |<4>| REC[0x934c8a0]: Sent Packet[1] Alert(21) with length: 7 |<2>| ASSERT: gnutls_record.c:276 |<4>| REC[0x934c8a0]: Epoch #0 freed |<4>| REC[0x934c8a0]: Epoch #1 freed With the simulated gnutls-serv openvasmd log shows a different handshake error , albeit still related to gnutls lib serv:WARNING:2012-09-24 08h31.48 utc:7430: Failed to gnutls_bye: GnuTLS internal error. lib serv:WARNING:2012-09-24 08h38.24 utc:7627: openvas_server_connect: failed to shake hands with server: A TLS fatal alert has been received. lib serv:WARNING:2012-09-24 08h38.24 utc:7627: Failed to gnutls_bye: GnuTLS internal error. It seems there is some sort of certificate issue between openvasmd and openvassd. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://www.enigmail.net/ iQIcBAEBCgAGBQJQYDZfAAoJEF9xp9NDNF0kIK0P/jsrqlplT75UB6lDwUwyHaHd 7hNcvgoF2DM1P8+AfG/KL5emCnD7NMsfVSrD9MR2VKwwUvLEHS0V88L2PbiJ+7Ny a/6oJ7haopFJMylB9n/3nEWYRGeN/UPCYbjTymoBZjde7l++zq5iFKKnA/EKIzp7 spnucWeGV8PCyeeH1dng5WfJuzb+k3yS9A9CgkXeOWt2lM4Zs1GgTouDDdiHvrc+ vuwNdxGYlnSB3CDIlvb0fWo+E3RfhZgZyLCqBr3YFQkr35MeLQ1YbU8oVBj0/Rdy NY4X/UfOdE2QZKOnNDJ0cW1RtpBZk69awYok+vif7PAwpHAg2Psjo7JVw5KheXtj PLLLdpWquOjYV5HbtBeRztka3lSbTu//6PyLJyeEfflFp01LgIJ+fNTNJVCtc7Vf 3FWa02wng0+AiPYQMmIVtSxHuPhGe8h4W2W1idM+c0beCrgVIEw5l/cyCipfg+69 23esLa6r/rOZC0OyP+GWI+lK4pT8lvwhv3VHoZ20Nzn2iyIBAXZ4V+/5ab6MuB9v RpEgCUCnSFXROLxAv//dNawr7YVbf+QZCquDzKT5vOv4GKaSHZ4RLNpzIiJdK9wE ImT9uvFFAtjn60qxnwarSeZj4aa9m6jBIwcv24Y+9XhMUxGojIZNjyXzhaA18efJ mh+qlcO5IdQE3J3gUbS2 =vlG4 -----END PGP SIGNATURE----- _______________________________________________ Openvas-discuss mailing list [email protected] http://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss
