[Openvas-discuss] Port 25 weak ciphers
h.reindl at thelounge.net
Tue Jan 3 17:52:15 CET 2017
Am 03.01.2017 um 17:46 schrieb Michael Meyer:
> *** Reindl Harald wrote:
>> the scan is from yesterday, the issues are months old (includinmg
>> the openssh windows bruteforce nonsense on linux machines with
>> key-only-auth on recent Fedora steups)
> "openssh windows bruteforce nonsense on linux machines"?
>> [root at openvas:~]$ cat /usr/local/bin/openvas-sync
>> openvasmd --rebuild
>> killall -s SIGHUP openvassd
> Looks like you are not a big fan of error handling?
looks like that all should not bee needed and a simple "openvas-sync"
doe anything which is needed including reload/restart and *then* have a
single exit code
More information about the Openvas-discuss