I see "Failed to shake hands with peer: Could not negotiate a supported cipher
suite." and "serve_client: failed to attach client session to socket 9".


Yes, I'm doing a localhost scan, and as soon as I added the user account to the
sudoers file it started working.  I'm sure it didn't relate directly to anything
functionally wrong with OpenVAS.

> 
>     On July 1, 2015 at 1:26 PM Michael Meyer <[email protected]>
> wrote:
> 
> 
>     *** Brian Thompson wrote:
> 
>     > "It was not possible to login using the provided SSH credentials.
>     >
>     > Hence authenticated checks are not enabled."
> 
>     Anything in the targets sshd logs about this try?
> 
>     > I've got my system locked down fairly tight so as a test, I added the
>     > local
>     > account I created (openvas) to the sudoers file so that it can sudo
>     > (passwd
>     > required), I am now able to get the more complete results and "SSH
>     > Authorization
>     > Check" reports a successful login attempt. (NOTE: In case it matters,
>     > I'm
>     > running OpenVAS v8 on CentOS v6.4.)
> 
>     If you add the user to the sudoers file of the target, the *login* is
> successful?
>     A login with the same user had failed because the user was not in the
> sudoers
>     file? I don't think that this is related to OpenVAS.
> 
>     Micha
> 
>     --
>     Michael Meyer OpenPGP Key: 0xAF069E9152A6EFA6
>     http://www.greenbone.net/
>     Greenbone Networks GmbH, Neuer Graben 17, 49074 Osnabrück | AG
>     Osnabrück, HR B 202460
>     Geschäftsführer: Lukas Grunwald, Dr. Jan-Oliver Wagner
>     _______________________________________________
>     Openvas-discuss mailing list
>     [email protected]
>     https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss
>
_______________________________________________
Openvas-discuss mailing list
[email protected]
https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss

Reply via email to