On 11/04/14 13:56, ni...@openbsd.org wrote: > On 09/30/14 23:43, Peter Ezetta wrote: >> On Sep 30, 2014, at 9:40 AM, Nigel Taylor <njtay...@asterisk.demon.co.uk >> <mailto:njtay...@asterisk.demon.co.uk>> wrote: >> >>> On 09/30/14 15:47, Stuart Henderson wrote: >>>> OK to remove this from ports? It went closed-source in 2005 and I don't >>>> see much benefit in keeping a 9-year-old vulnerability scanner in ports. >>>> >>>> If anyone is upset by this, feel free to submit an OpenVAS port >>>> instead :) >>>> >>>> >>> OpenVAS is in OpenBSD-wip plus other supporting ports. >>> >>> If I have time available I might have another look at a more recent >>> version of OpenVAS. >>> >>> Last worked on end of 2012. Needed patching to get working. >> >> I am pretty new to porting, but I would be interested in working with >> someone to test and patch a new OpenVAS port. I don’t know how much use >> I would be, but if help is needed, I’m happy to jump in and give it a >> go. I would just need a bit of direction to get started, and probably >> an evening to re-read the porter’s handbook. >> >> Regards, >> * >> * >> *Peter H. Ezetta* | Network Engineer >> 18200 Cascade Ave. S. Seattle, WA 98188 >> 1.877.THE.EVIR | p 206.878.2459 | c 206.892.8494 | f 206.878.3082 >> >> ------------------------------------------------------------------------ >> >> Confidentiality Notice: This e-mail may contain proprietary information >> some of which may be legally privileged. It is for the intended >> recipient(s) only. If you believe that it has been sent to you in error, >> please notify the sender by reply e-mail and delete the message. Any >> disclosure, copying, distribution or use of this information by someone >> other than the intended recipient(s) is prohibited and may be unlawful. > > I started OpenVAS updates to v7, it's all been placed in openbsd-wip... > > The first port is www/libmicrohttpd, this library is used in providing a > web interface for OpenVAS. Built / Tested on amd64. Can be found here... > > https://github.com/jasperla/openbsd-wip/tree/master/www/libmicrohttpd > > > OpenVAS v7 can be found here... > https://github.com/jasperla/openbsd-wip/tree/master/security/openvas > > OpenVAS, just released newer versions, they are in openbsd-wip > > libraries 7.0.5 > Scanner 4.0.4 > Manager 5.0.5 > cli 1.3.1 > gsa 5.0.4 > > I had no chance to test yet, doubt I will see any improvements. > > > Being able to build OpenVAS is still a long way from being ready to > submit as a port. That why work stopped, OpenVAS uses gnutls, I see the > same error as here, > > https://wald.intevation.org/tracker/?func=detail&atid=220&aid=6572&group_id=29 > > The issue has been reported before a number of times. Towards the end of > 2012 was when OpenBSD ports went from gnutls 2.x to 3.x, gnutls 3.x > breaks OpenVAS on OpenBSD. It's not just OpenBSD that hits the problem. > > Can use scripts to download plugins is about all that works. > > > > > . >
Some improvments...., openvas-check-setup now runs as below still more work needed, openvasmd --rebuild worked fixing the NVT issue, getting past the gnutls issue. openbsd-wip contains the latest updates, some permission issues missing directories, before it runs. More testing is required. openvas-check-setup 2.2.6 (Modified for OpenBSD) Test completeness and readiness of OpenVAS-7 (add '--v4', '--v5', '--v6' or '--v8' if you want to check for another OpenVAS version) Please report us any non-detected problems and help us to improve this check routine: http://lists.wald.intevation.org/mailman/listinfo/openvas-discuss Send us the log-file (/tmp/openvas-check-setup.log) to help analyze the problem. Use the parameter --server to skip checks for client tools like GSD and OpenVAS-CLI. Step 1: Checking OpenVAS Scanner ... OK: OpenVAS Scanner is present in version 4.0.4. OK: OpenVAS Scanner CA Certificate is present as /var/openvas/CA/cacert.pem. OK: NVT collection in /var/openvas/plugins contains 36919 NVTs. OK: Signature checking of NVTs is enabled in OpenVAS Scanner. OK: The NVT cache in /var/cache/openvas contains 36919 files for 36919 NVTs. Step 2: Checking OpenVAS Manager ... OK: OpenVAS Manager is present in version 5.0.5. OK: OpenVAS Manager client certificate is present as /var/openvas/CA/clientcert.pem. OK: OpenVAS Manager database found in /var/openvas/mgr/tasks.db. OK: Access rights for the OpenVAS Manager database are correct. OK: sqlite3 found, extended checks of the OpenVAS Manager installation enabled. OK: OpenVAS Manager database is at revision 123. OK: OpenVAS Manager expects database at revision 123. OK: Database schema is up to date. OK: OpenVAS Manager database contains information about 36919 NVTs. OK: OpenVAS SCAP database found in /var/openvas/scap-data/scap.db. OK: OpenVAS CERT database found in /var/openvas/cert-data/cert.db. OK: xsltproc found. Step 3: Checking user configuration ... WARNING: Your password policy is empty. SUGGEST: Edit the /etc/openvas/pwpolicy.conf file to set a password policy. Step 4: Checking Greenbone Security Assistant (GSA) ... OK: Greenbone Security Assistant is present in version 5.0.4. Step 5: Checking OpenVAS CLI ... OK: OpenVAS CLI version 1.3.1. Step 6: Checking Greenbone Security Desktop (GSD) ... SKIP: Skipping check for Greenbone Security Desktop. Step 7: Checking if OpenVAS services are up and running ... OK: netstat found, extended checks of the OpenVAS services enabled. OK: OpenVAS Scanner is running and listening only on the local interface. OK: OpenVAS Scanner is listening on port 9391, which is the default port. OK: OpenVAS Manager is running and listening only on the local interface. OK: OpenVAS Manager is listening on port 9390, which is the default port. OK: Greenbone Security Assistant is running and listening only on the local interface. OK: Greenbone Security Assistant is listening on port 8443, which is the default port. Step 8: Checking nmap installation ... WARNING: Your version of nmap is not fully supported: 6.47 SUGGEST: You should install nmap 5.51. Step 9: Checking presence of optional tools ... OK: pdflatex found. OK: PDF generation successful. The PDF report format is likely to work. OK: ssh-keygen found, LSC credential generation for GNU/Linux targets is likely to work. WARNING: Could not find rpm binary, LSC credential package generation for RPM and DEB based targets will not work. SUGGEST: Install rpm. WARNING: Could not find makensis binary, LSC credential package generation for Microsoft Windows targets will not work. SUGGEST: Install nsis. It seems like your OpenVAS-7 installation is OK. If you think it is not OK, please report your observation and help us to improve this check routine: http://lists.wald.intevation.org/mailman/listinfo/openvas-discuss Please attach the log-file (/tmp/openvas-check-setup.log) to help us analyze the problem.