I forgot to paste the openvas-check-setup output. Please find below. # ./openvas-check-setup openvas-check-setup 2.2.5 Test completeness and readiness of OpenVAS-7 (add '--v4', '--v5', '--v6' or '--v8' if you want to check for another OpenVAS version)
Please report us any non-detected problems and help us to improve this check routine: http://lists.wald.intevation.org/mailman/listinfo/openvas-discuss Send us the log-file (/tmp/openvas-check-setup.log) to help analyze the problem. Use the parameter --server to skip checks for client tools like GSD and OpenVAS-CLI. Step 1: Checking OpenVAS Scanner ... OK: OpenVAS Scanner is present in version 4.0.1. OK: OpenVAS Scanner CA Certificate is present as /usr/local/var/lib/openvas/CA/cacert.pem. OK: NVT collection in /usr/local/var/lib/openvas/plugins contains 35454 NVTs. OK: Signature checking of NVTs is enabled in OpenVAS Scanner. OK: The NVT cache in /usr/local/var/cache/openvas contains 35454 files for 35454 NVTs. Step 2: Checking OpenVAS Manager ... OK: OpenVAS Manager is present in version 5.0.2. OK: OpenVAS Manager client certificate is present as /usr/local/var/lib/openvas/CA/clientcert.pem. OK: OpenVAS Manager database found in /usr/local/var/lib/openvas/mgr/tasks.db. OK: Access rights for the OpenVAS Manager database are correct. OK: sqlite3 found, extended checks of the OpenVAS Manager installation enabled. OK: OpenVAS Manager database is at revision 123. OK: OpenVAS Manager expects database at revision 123. OK: Database schema is up to date. OK: OpenVAS Manager database contains information about 35454 NVTs. OK: OpenVAS SCAP database found in /usr/local/var/lib/openvas/scap-data/scap.db. OK: OpenVAS CERT database found in /usr/local/var/lib/openvas/cert-data/cert.db. OK: xsltproc found. Step 3: Checking user configuration ... OK: The password policy file at /usr/local/etc/openvas/pwpolicy.conf contains entries. Step 4: Checking Greenbone Security Assistant (GSA) ... OK: Greenbone Security Assistant is present in version 5.0.1. Step 5: Checking OpenVAS CLI ... OK: OpenVAS CLI version 1.3.0. Step 6: Checking Greenbone Security Desktop (GSD) ... SKIP: Skipping check for Greenbone Security Desktop. Step 7: Checking if OpenVAS services are up and running ... OK: netstat found, extended checks of the OpenVAS services enabled. OK: OpenVAS Scanner is running and listening on all interfaces. OK: OpenVAS Scanner is listening on port 9391, which is the default port. OK: OpenVAS Manager is running and listening on all interfaces. OK: OpenVAS Manager is listening on port 9390, which is the default port. OK: Greenbone Security Assistant is running and listening on all interfaces. OK: Greenbone Security Assistant is listening on port 80, which is the default port. Step 8: Checking nmap installation ... WARNING: Your version of nmap is not fully supported: 6.00 SUGGEST: You should install nmap 5.51. Step 9: Checking presence of optional tools ... OK: pdflatex found. OK: PDF generation successful. The PDF report format is likely to work. OK: ssh-keygen found, LSC credential generation for GNU/Linux targets is likely to work. OK: rpm found, LSC credential package generation for RPM based targets is likely to work. OK: alien found, LSC credential package generation for DEB based targets is likely to work. OK: nsis found, LSC credential package generation for Microsoft Windows targets is likely to work. It seems like your OpenVAS-7 installation is OK. If you think it is not OK, please report your observation and help us to improve this check routine: http://lists.wald.intevation.org/mailman/listinfo/openvas-discuss Please attach the log-file (/tmp/openvas-check-setup.log) to help us analyze the problem. On Fri, Jul 4, 2014 at 5:49 PM, Ricardo Iramar dos Santos <[email protected] > wrote: > Hi All, > > I did a fresh install of OpenVAS from source following INSTALL files in a > Ubuntu 12.04.4 LTS (AWS server). > Everything looks fine when I ran openvas-check-setup (below I'll paste the > output). > Just to test the installation I created the task below but I aways get 0 > results. > > *Name:**Zero Test*Comment: > Scan Config:Full and very deep ultimate > <http://localhost/omp?cmd=get_config&config_id=74db13d6-7489-11df-91b9-002264764cea&token=45046f35-bb7b-4b9c-8637-c7c75beebf61> > Alerts: > Schedule:(Next due: over)Target:Zero > <http://localhost/omp?cmd=get_target&target_id=96121a7c-51b3-41d3-95e3-f26c95b8bc7a&token=45046f35-bb7b-4b9c-8637-c7c75beebf61> > Order > for target hosts:SequentialNetwork Source Interface: > Slave: > Status: > Done > Reports:3 > <http://localhost/omp?cmd=get_reports&replace_task_id=1&filt_id=-2&filter=task_id=c1f88cd2-57f5-4752-81ef-46703b40197a%20apply_overrides=1%20sort-reverse=name&task_filter=task_id%3Dc1f88cd2-57f5-4752-81ef-46703b40197a%20apply_overrides%3D1%20sort-reverse%3Dname&task_filt_id=0&token=45046f35-bb7b-4b9c-8637-c7c75beebf61> > (Finished: 3 > <http://localhost/omp?cmd=get_reports&replace_task_id=1&filt_id=-2&filter=task_id=c1f88cd2-57f5-4752-81ef-46703b40197a%20and%20status=Done%20apply_overrides=1%20sort-reverse=name&task_filter=task_id%3Dc1f88cd2-57f5-4752-81ef-46703b40197a%20apply_overrides%3D1%20sort-reverse%3Dname&task_filt_id=0&token=45046f35-bb7b-4b9c-8637-c7c75beebf61>, > Last: Jul 4 2014 > <http://localhost/omp?cmd=get_report&report_id=8acf9e4f-d1bd-4022-bae6-c3c4030f6620&overrides=1&token=45046f35-bb7b-4b9c-8637-c7c75beebf61> > ) Add to Assets:yesAlterable Task:noNotes:0 > <http://localhost/omp?cmd=get_notes&filter=task_id=c1f88cd2-57f5-4752-81ef-46703b40197a%20sort=nvt%20permission=any&filt_id=0&token=45046f35-bb7b-4b9c-8637-c7c75beebf61> > Overrides:0 > <http://localhost/omp?cmd=get_overrides&filter=task_id=c1f88cd2-57f5-4752-81ef-46703b40197a%20sort=nvt%20permission=any&filt_id=0&token=45046f35-bb7b-4b9c-8637-c7c75beebf61> > Scan > Intensity Maximum concurrently executed NVTs per host:4Maximum > concurrently scanned hosts:20 > The target is just a vulnerable website for testing. > > *Name:**Zero*Comment:Just for policy testing.Hosts:zero.webappsecurity.com > Exclude > Hosts: > Reverse Lookup Only:NoReverse Lookup Unify:NoMaximum number of hosts:1Port > List:All IANA assigned TCP 2012-02-10 > <http://localhost/omp?cmd=get_port_list&port_list_id=33d0cd82-57c6-11e1-8ed1-406186ea4fc5&token=45046f35-bb7b-4b9c-8637-c7c75beebf61> > SSH > Credential: > SMB Credential: > Alive Test:Scan Config Default > I think it's missing something since this target it should have at least > one result. > Anyone had the same problem? > > Thanks > Ricardo Iramar >
_______________________________________________ Openvas-discuss mailing list [email protected] https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss
