summaryrefslogtreecommitdiffstats
path: root/network/greenbone-security-assistant/README
diff options
context:
space:
mode:
Diffstat (limited to 'network/greenbone-security-assistant/README')
-rw-r--r--network/greenbone-security-assistant/README12
1 files changed, 1 insertions, 11 deletions
diff --git a/network/greenbone-security-assistant/README b/network/greenbone-security-assistant/README
index 82c8f6f5bb..30a9d5b984 100644
--- a/network/greenbone-security-assistant/README
+++ b/network/greenbone-security-assistant/README
@@ -6,16 +6,6 @@ This is the UI the Open Vulnerability Assessment System (OpenVAS).
- PDF report generation is broken. This may get fixed in a future slackbuild.
-- The libssh-0.5.4 shipped with Slackware (at the time of this writing) is
- broken. If you need to run "credentialed" scans against targets running
- OpenSSH 6.7 or beyond (including Slackware), you have 2 options:
- 1. Enable diffie-hellman-group1-sha1 as a KexAlgorithm in the sshd_config
- of your targets.
- 2. Update your libssh to the latest.
- You also may have problems with targets running Dropbear SSH server. See
- this thread on LinuxQuestions for more information:
- http://www.linuxquestions.org/questions/showthread.php?t=4175533193
-
- All the daemons run as root. There's no (working) configuration options
or documentation to change this behavior.
@@ -113,7 +103,7 @@ refer to http://slackbuilds.org/howto/ .
20. Point your browser at https://<YOUR IP OR HOSTNAME>:9392
You'll get a certificate error, of course (fixing this is left as an
- excercise for the reader). Log in with your username/password from #10.
+ excercise for the reader). Log in with your username/password from #12.
21. [Optional] Build and install openvas-cli. You'll need this if you ever
want to script tests.