Actually, after doing some testing, I realized that I was looking at the wrong 
directory (/var/lib/openvas/plugins/plugins), and was able to get the 
signatures to work by toggling nasl_no_signature_check on and off.

I think the root cause of the issue with openvassd may instead be an issue with 
LXC container permissions (https://github.com/lxc/lxd/issues/2004 
<https://github.com/lxc/lxd/issues/2004>) and redis not running consistently. 
If this isn't the fix I'll do some more digging.


Aug 20, 2018, 11:49 PM by excessamer...@tutanota.com:

> I've had issues with the openvas scanner (openvassd) service crashing 
> frequently, and the cause appears to be that some of the plugins 
> (/var/lib/openvas/plugins/2013) don't have a valid checksum. OpenVAS was 
> installed on Ubuntu 16.04 using the PPA.
>
> # openvassd -f
> base gpgme-Message: Setting GnuPG dir to '/etc/openvas/gnupg'
> base gpgme-Message: Using OpenPGP engine version '2.1.11'
> No checksum for 
> /var/lib/openvas/plugins/plugins/gb_fedora_2013_2766_mate-settings-daemon_fc17.naslNo
>  checksum for 
> /var/lib/openvas/plugins/plugins/gb_mysql_unspecified_vuln02_oct13_win.naslNo 
> checksum for 
> /var/lib/openvas/plugins/plugins/gb_fedora_2013_13112_kblackbox_fc18.naslNo 
> checksum for 
> /var/lib/openvas/plugins/plugins/gb_fedora_2013_18931_ReviewBoard_fc19.naslNo 
> checksum for /var/lib/openvas/plugins/plugins/gb_ubuntu_USN_2062_1.naslNo 
> checksum for /var/lib/openvas/plugins/plugins/gb_suse_2013_0459_1.naslNo 
> checksum for 
> /var/lib/openvas/plugins/plugins/gb_ds3_authentication_server_mult_vuln.naslNo
>  checksum for /var/lib/openvas/plugins/plugins/gb_zeroshell_lfi_08_13.naslNo 
> checksum for 
> /var/lib/openvas/plugins/plugins/gb_plesk_multiple_rce_vuln.naslNo checksum 
> for 
> /var/lib/openvas/plugins/plugins/gb_mozilla_firefox_esr_mult_vuln01_sep13_win.naslNo
>  checksum for 
> /var/lib/openvas/plugins/plugins/gb_fedora_2013_13112_kiten_fc18.naslNo 
> checksum for /var/lib/openvas/plugins/plugins/gb_ubuntu_USN_1804_2.naslNo 
> checksum for 
> /var/lib/openvas/plugins/plugins/gb_fedora_2013_17047_xulrunner_fc18.naslNo 
> checksum for 
> /var/lib/openvas/plugins/plugins/gb_mozilla_prdts_mult_vuln05_jan13_win.naslNo
>  checksum for 
> /var/lib/openvas/plugins/plugins/gb_fedora_2013_3462_euca2ools_fc18.naslNo 
> checksum for /var/lib/openvas/plugins/plugins/gb_ubuntu_USN_1780_1.naslNo 
> checksum for 
> /var/lib/openvas/plugins/plugins/gb_sharekm_server_dos_vuln.naslNo checksum 
> for /var/lib/openvas/plugins/plugins/gb_fedora_2013_2984_libtasn1_fc17.naslNo 
> checksum for /var/lib/openvas/plugins/plugins/gb_ubuntu_USN_2057_1.naslNo 
> checksum for 
> /var/lib/openvas/plugins/plugins/gb_fedora_2013_3436_perl_fc18.nasl
>
> I did just start using the new Greenbone Community Feed integrity gpg key 
> (fingerprint 0ED1E580), but that didn't seem to help.
>
> I thought had this working yesterday, but think the issue popped up again 
> after my daily feed update.
>
> This is what I've been doing to do a daily update vulnerability 
> definitions/plugins, is this correct? 
>
> greenbone-nvt-sync
> greenbone-scapdata-sync
> greenbone-certdata-sync
> openvasmd --rebuild --progress
> service openvas-scanner restart
>
> For now, I can work around it by doing either nasl_no_signature_check = no or 
> removing that /plugins/2013 directory. However, I would rather not have to do 
> either of those, is there a better solution?
>

_______________________________________________
Openvas-discuss mailing list
Openvas-discuss@wald.intevation.org
https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss

Reply via email to