network/greenbone-security-assistant: Updated for version 6.0.1.

Signed-off-by: Willy Sudiarto Raharjo <willysr@slackbuilds.org>
This commit is contained in:
Kent Fritz 2015-04-17 08:04:33 +07:00 committed by Willy Sudiarto Raharjo
parent 32bee7bf0b
commit 944f3840c8
3 changed files with 48 additions and 25 deletions

View file

@ -23,76 +23,99 @@ This is the UI the Open Vulnerability Assessment System (OpenVAS).
not available as slackbuilds at this time. Stay tuned.
- If you're running in a VM environment, or on a headless server, then
installing haveged is recommended, particularly for step 9 below.
installing haveged is recommended, particularly for step 11 below.
###### Upgrade Notes ######
If you're updating from OpenVAS-7 to OpenVAS-8, please note the following.
(See: http://www.openvas.org/install-source.html if you're unsure which
version you're running.)
Openvas now uses redis as a temporary database while running scans. You will
need redis installed and running, as well as hiredis. See step 2 below on
how to configure redis.
Before running openvas-manager, you'll need to migrate the database. Simply
run:
# openvasmd --migrate
###### Installation Instructions ######
These instructions assume you're familiar with slackbuilds. If not, please
refer to http://slackbuilds.org/howto/ .
1. Build and install openvas-libraries.
1. Build and install hiredis.
2. Build and install openvas-scanner.
2. Build and install redis. You need to uncomment the following 2 lines in the
/etc/redis/redis.conf file:
#unixsocket /tmp/redis.sock
#unixsocketperm 700
Now start up redis:
# sh /etc/rc.d/rc.redis start
3. You need a Certificate Authority and server certificate. Run the following
3. Build and install openvas-libraries.
4. Build and install openvas-scanner.
5. You need a Certificate Authority and server certificate. Run the following
command:
# openvas-mkcert
4. You need the NVT's (Network Vulnerability Tests). Run the following
6. You need the NVT's (Network Vulnerability Tests). Run the following
command to sync. In the future, you can do this through the
greenbone-security-assistant interface. This will take a minute or so
with a blazing fast internet connection. YMMV.
# openvas-nvt-sync
5. Start the openvas-scanner daemon.
7. Start the openvas-scanner daemon.
# sh /etc/rc.d/rc.openvassd start
6. Build and install openvas-manager.
8. Build and install openvas-manager.
7. You need client certificates for manager to talk to scanner. Use the
9. You need client certificates for manager to talk to scanner. Use the
following command.
# openvas-mkcert-client -n -i
8. Initialize the manager database. This will take a while, so be patient.
10. Initialize the manager database. This will take a while, so be patient.
# openvasmd --rebuild
9. You want encrypted credentials in the DB, so do this now.
11. You want encrypted credentials in the DB, so do this now.
# openvasmd --create-credentials-encryption-key
This may take a while, so it's best to create some entropy by skipping to
#11-#13 and then coming back, if needed.
#13-#15 and then coming back, if needed.
10. Create a user.
12. Create a user.
# openvasmd --create-user=cary
If you find the assigned password hard to remember, you can change it
right now.
# openvasmd --user=cary --new-password=mekmitasdigoat
11. Sync SCAP data. This will take some time.
13. Sync SCAP data. This will take some time.
# openvas-scapdata-sync
12. Sync CERT data.
14. Sync CERT data.
# openvas-certdata-sync
13. Update port names.
15. Update port names.
# wget http://www.iana.org/assignments/service-names-port-numbers/service-names-port-numbers.xml
# openvas-portnames-update service-names-port-numbers.xml
# rm service-names-port-numbers.xml
14. Start the openvas-manager daemon.
16. Start the openvas-manager daemon.
# sh /etc/rc.d/rc.openvasmd start
15. Build and install libmicrohttpd.
17. Build and install libmicrohttpd.
16. Build and install greenbone-security-assistant.
18. Build and install greenbone-security-assistant.
17. Launch the greenbone-security-assistant.
19. Launch the greenbone-security-assistant.
# sh /etc/rc.d/rc.gsad start
18. Point your browser at https://<YOUR IP OR HOSTNAME>:9392
20. Point your browser at https://<YOUR IP OR HOSTNAME>:9392
You'll get a certificate error, of course (fixing this is left as an
excercise for the reader). Log in with your username/password from #10.
19. [Optional] Build and install openvas-cli. You'll need this if you ever
21. [Optional] Build and install openvas-cli. You'll need this if you ever
want to script tests.
That's it! If you run into any problems, you can try running the

View file

@ -23,7 +23,7 @@
# ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
PRGNAM=greenbone-security-assistant
VERSION=${VERSION:-5.0.6}
VERSION=${VERSION:-6.0.1}
BUILD=${BUILD:-1}
TAG=${TAG:-_SBo}

View file

@ -1,8 +1,8 @@
PRGNAM="greenbone-security-assistant"
VERSION="5.0.6"
VERSION="6.0.1"
HOMEPAGE="http://www.openvas.org"
DOWNLOAD="http://wald.intevation.org/frs/download.php/1967/greenbone-security-assistant-5.0.6.tar.gz"
MD5SUM="df21a4ebcd062baeb42c4f112a296fd0"
DOWNLOAD="http://wald.intevation.org/frs/download.php/2018/greenbone-security-assistant-6.0.1.tar.gz"
MD5SUM="907eb7afd1734463abc2530a35dd6f39"
DOWNLOAD_x86_64=""
MD5SUM_x86_64=""
REQUIRES="openvas-libraries libmicrohttpd"