trying to test the whether or not credentialed scans would affect the
CentOS issue I am having (as mentioned in the other thread), I have also
run into this.  I don't often do credential scans, but when I do, they are
passphrase-protected keys.  These worked previously, but they are failing
now.  I can manually use the key & passphrase to log onto the target system.

If there is anything I can test/try, I am happy to help.  I am using the
following for my OpenVAS system.  I believe I am one maintenance release
behind.

[ ~]# cat /etc/redhat-release
CentOS release 6.6 (Final)

 [~]# yum list installed |grep -i openvas
openvas.noarch         1.0-15.el6.art
@atomic
openvas-cli.x86_64     1.3.1-6.el6.art
@atomic
openvas-libraries.x86_64
openvas-manager.x86_64 5.0.7-25.el6.art
@atomic
openvas-scanner.x86_64 4.0.5-17.el6.art @atomic

On Wed, Feb 4, 2015 at 9:15 AM, Michael Meyer <[email protected]>
wrote:

> *** John weo wrote:
> > I use a set of ssh credentials, public/private key with pass-phrase.
> >
> > After I updated the nvt's (03.02.2015), the following test "SSH
> > Authorization Check (OID: 1.3.6.1.4.1.25623.1.0.90022)" Revision:
> > 948 is reporting that the "It was not possible to login using the
> > provided SSH credentials"
>
> We'll have a look on this...
>
> Micha
>
> --
> Michael Meyer                  OpenPGP Key: 0xAF069E9152A6EFA6
> http://www.greenbone.net/
> Greenbone Networks GmbH, Neuer Graben 17, 49074 Osnabrück | AG
> Osnabrück, HR B 202460
> Geschäftsführer: Lukas Grunwald, Dr. Jan-Oliver Wagner
> _______________________________________________
> Openvas-discuss mailing list
> [email protected]
> https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss
>
_______________________________________________
Openvas-discuss mailing list
[email protected]
https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss

Reply via email to