To be able to see openvas logs more easily a new service openvas is
added. This service tails over /var/log/openvas/openvas.log.
Additionally an configuration step configure-openvas is added. This
sets the openvas log level to 128 and changes to log output to
/var/log/openvas/openvas.log instead of /var/log/gvm/openvas.log.
To change the log level you can replace the 128 to the desired log
level.
Add: openvas logs
To be able to see openvas logs more easily a new service
openvas
is added. This service tails over/var/log/openvas/openvas.log
.Additionally an configuration step
configure-openvas
is added. This sets the openvas log level to 128 and changes to log output to/var/log/openvas/openvas.log
instead of/var/log/gvm/openvas.log
.To change the log level you can replace the
128
to the desired log level.Add: openvasd Remove: notus
With https://github.com/greenbone/openvas-scanner/pull/1519 notus is deprecated in favour of openvasd/notus endpoint.
For more details see: https://greenbone.github.io/scanner-api/ for a general overview of the API implemented by openvasd.
This removes the dependencies of a mqtt broker as well as notus service.
Doc: remove notus-scanner and explain openvasd installation
To test it I used:
and spawned a vulnerable slackware version by executing:
got the ip via:
and created a target with the ssh credentials:
gvm:gvm
and runfull and fast
configuration.In the report vulnerable packages should show up.