I see "Failed to shake hands with peer: Could not negotiate a supported cipher
suite." and "serve_client: failed to attach client session to socket 9".
Yes, I'm doing a localhost scan, and as soon as I added the user account to the
sudoers file it started working. I'm sure it didn't relate directly to anything
functionally wrong with OpenVAS.
>
> On July 1, 2015 at 1:26 PM Michael Meyer <[email protected]>
> wrote:
>
>
> *** Brian Thompson wrote:
>
> > "It was not possible to login using the provided SSH credentials.
> >
> > Hence authenticated checks are not enabled."
>
> Anything in the targets sshd logs about this try?
>
> > I've got my system locked down fairly tight so as a test, I added the
> > local
> > account I created (openvas) to the sudoers file so that it can sudo
> > (passwd
> > required), I am now able to get the more complete results and "SSH
> > Authorization
> > Check" reports a successful login attempt. (NOTE: In case it matters,
> > I'm
> > running OpenVAS v8 on CentOS v6.4.)
>
> If you add the user to the sudoers file of the target, the *login* is
> successful?
> A login with the same user had failed because the user was not in the
> sudoers
> file? I don't think that this is related to OpenVAS.
>
> Micha
>
> --
> Michael Meyer OpenPGP Key: 0xAF069E9152A6EFA6
> http://www.greenbone.net/
> Greenbone Networks GmbH, Neuer Graben 17, 49074 Osnabrück | AG
> Osnabrück, HR B 202460
> Geschäftsführer: Lukas Grunwald, Dr. Jan-Oliver Wagner
> _______________________________________________
> Openvas-discuss mailing list
> [email protected]
> https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss
>
_______________________________________________
Openvas-discuss mailing list
[email protected]
https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss