Hi Christian, Thanks for your quick answer. I checked every parameters you mentioned and I confirm those are not set (empty string) in my current scan config:
* Nmap (NASL wrapper) Do not randomize the order in which ports are scanned = "no" Do not scan targets not in the file = "no" Fragment IP packets (bypasses firewalls) = "no" Log nmap output = "no" RPC port scan = "no" Run dangerous port scans even if safe checks are set = "no" Service scan = "no" Data length = "" Host Timeout (ms) = "" Initial RTT timeout (ms) = "" Max RTT Timeout (ms) = "" Max Retries = "" Maximum wait between probes (ms) = "" Min RTT Timeout (ms) = "" Minimum wait between probes (ms) = "" Ports scanned in parallel (max) = "" Ports scanned in parallel (min) = "" Source port = "" File containing grepable results = "" TCP scanning technique = connect() Timing policy = Polite And the same goes for: * Launch Nmap for Network Scanning Aggressive OS detection = "no" Disable DNS resolution = "no" Fragment IP packets (bypasses firewalls) = "no" Identify the remote OS = "no" RPC port scan = "no" Service scan = "no" Trace hop path to each host = "no" Treat all hosts as online = "no" Exclude hosts = "" Host Timeout (ms) = "" Hosts scanned in parallel (max) = "" Hosts scanned in parallel (min) = "" Initial RTT timeout (ms) = "" Max RTT Timeout (ms) = "" Min RTT Timeout (ms) = "" Minimum wait between probes (ms) = "" Ports scanned in parallel (max) = "" Ports scanned in parallel (min) = "" Source port = "" File containing XML results = "" TCP scanning technique = connect() Timing policy = Polite Am I supposed to see an additionnal argument in the NMAP command lines like I expect? Any other idea why the "timing policy" is not taken into account? Regards, On Thu, Jun 7, 2018 at 12:20 PM, Christian Fischer < christian.fisc...@greenbone.net> wrote: > Hi, > > could you make sure that you havn't changed any of the following > settings of the "nmap.nasl" preferences from the default / empty string: > > Max Retries : > Host Timeout (ms) : > Min RTT Timeout (ms) : > Max RTT Timeout (ms) : > Initial RTT Timeout (ms) : > Ports scanned in parallel (min) > Ports scanned in parallel (max) > Minimum wait between probes (ms) > Maximum wait between probes (ms) > > As soon as one or more of the above preferences has any data set the > "Timing policy :" doesn't apply anymore. > > Regards, > > On 07.06.2018 08:53, Alexandre Brasseur wrote: > > Hi everyone, > > > > I am mostly performing scans on networks were bandwidth consumption is > > critical and should therefore be as low as possible. > > From my first observations, the most bandwidth-intensive part of the scan > > is the beginning, were lots of NMAP processes are being triggered, like > so: > > ---openvassd: testing AAA.BBB.CCC.DDD (/var/lib/openvas/plugins/ > nmap.nasl) > > ---nmap -n -Pn -oG /tmp/nmap-AAA.BBB.CCC.DDD -sT -sU -p T:1-65535,U: ... > > > > As a consequence, I am looking for a way to lower the "aggressiveness" of > > those NMAP processes (see "timing template" of NMAP MANPAGE) > > After looking in "/var/lib/openvas/plugins/nmap.nasl" and > > "/var/cache/openvas/nmap.nasl.nvti", such a configuration seems > possible by > > modifying the "Scans Configs" using the "Greenbone" web interface. > > But even after switching from "Normal" to "Polite", the command line > > arguments remained the same, while I was expecting the option "-T<0-5>" > to > > appear in those. > > > > Here is my current working config under Debian Stretch 9.3 (Kernel > > 4.9.0-5-amd64): > > ii greenbone-security-assistant 6.0.11+dfsg.1-2 > > amd64 remote network security auditor - web interface > > ii greenbone-security-assistant-common 6.0.11+dfsg.1-2 > all > > architecture independent files for greenbone-security-assistant > > ii libopenvas8 8.0.8-2 > > amd64 remote network security auditor - shared libraries > > ii openvas 6.0.9-2 > > amd64 remote network security auditor - metapackage > > ii openvas-cli 1.4.5-1 > > amd64 Command Line Tools for OpenVAS > > ii openvas-manager 6.0.9-2 > > amd64 Manager Module of OpenVAS > > ii openvas-manager-common 6.0.9-2 > all > > architecture independent files for openvas-manager > > ii openvas-scanner 5.0.7-3 > > amd64 remote network security auditor - scanner > > > > Thanks in advance for your help, > > > > Regards. > > > > > > > > _______________________________________________ > > Openvas-discuss mailing list > > Openvas-discuss@wald.intevation.org > > https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/ > openvas-discuss > > > > -- > > Christian Fischer | PGP Key: 0x54F3CE5B76C597AD > Greenbone Networks GmbH | https://www.greenbone.net > Neumarkt 12, 49074 Osnabrück, Germany | AG Osnabrück, HR B 202460 > Geschäftsführer: Lukas Grunwald, Dr. Jan-Oliver Wagner > > -- Alexandre Brasseur Quality Assurance Engineer Escaux Escaux, Communication as easy as the web Chaussée de Bruxelles 408, 1300 Wavre, Belgium Direct: +3227887554 Main: +3226860900 www.escaux.com Dit bericht is onderworpen aan de voorwaarden beschikbaar op onze website <https://www.escaux.com/docs/ContractInfo.html>. Ce message est soumis aux conditions disponibles sur notre site web <https://www.escaux.com/docs/ContractInfo.html>. This message is subject to the terms and conditions available on our website <https://www.escaux.com/docs/ContractInfo.html>.
_______________________________________________ Openvas-discuss mailing list Openvas-discuss@wald.intevation.org https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss