1
- # INSTALLATION INSTRUCTIONS FOR GREENBONE VULNERABILITY MANAGER
1
+ # Installation Instructions for Greenbone Vulnerability Manager Daemon
2
2
3
3
Please note: The reference system used by most of the developers is Debian
4
- GNU/Linux 'Buster' 10 . The build might fail on any other system. Also, it is
5
- necessary to install dependent development packages.
4
+ stable . The build might fail on any other system. Also, it is necessary to
5
+ install dependent development packages.
6
6
7
- ## Prerequisites for Greenbone Vulnerability Manager
7
+ ## Prerequisites for Greenbone Vulnerability Manager Daemon
8
8
9
9
Prerequisites:
10
- * GCC (Debian package: gcc)
11
- * cmake >= 3.0 (Debian package: cmake)
12
- * cJSON >= 1.7.14 (Debian package: libcjson-dev)
13
- * glib-2.0 >= 2.42 (Debian package: libglib2.0-dev)
14
- * gnutls >= 3.2.15 (Debian package: libgnutls28-dev)
15
- * libgvm_base, libgvm_util, libgvm_osp, libgvm_gmp >= 20.08.0 ([ gvm-libs] ( https://github.com/greenbone/gvm-libs/tree/gvm-libs-20.08 ) component)
16
- * PostgreSQL database >= 9.6 (Debian packages: libpq-dev postgresql-server-dev-11)
17
- * pkg-config (Debian package: pkg-config)
18
- * libical >= 1.0.0 (Debian package: libical-dev)
19
- * xsltproc (Debian package: xsltproc)
20
- * gpgme
21
10
22
- Install these prerequisites on Debian GNU/Linux 'Buster' 10:
11
+ * cJSON >= 1.7.14
12
+ * cmake >= 3.0
13
+ * GCC
14
+ * glib-2.0 >= 2.42
15
+ * gnutls >= 3.2.15
16
+ * gpgme
17
+ * [ gvm-libs] ( https://github.com/greenbone/gvm-libs/ ) >= 22.12
18
+ * libical >= 1.0.0
19
+ * libbsd
20
+ * pkg-config
21
+ * PostgreSQL database >= 9.6
22
+ * xsltproc
23
23
24
- apt-get install gcc cmake libcjson-dev libglib2.0-dev libgnutls28-dev libpq-dev postgresql-server-dev-11 pkg-config libical-dev xsltproc libgpgme-dev
24
+ Install these prerequisites on Debian stable:
25
+
26
+ apt-get install \
27
+ cmake \
28
+ gcc \
29
+ libcjson-dev \
30
+ libglib2.0-dev \
31
+ libgnutls28-dev \
32
+ libgpgme-dev \
33
+ libical-dev \
34
+ libpq-dev \
35
+ pkg-config \
36
+ postgresql-server-dev-all \
37
+ xsltproc
25
38
26
39
Prerequisites for building documentation:
40
+
27
41
* Doxygen
28
42
* xsltproc (for building the GMP HTML documentation)
29
43
* xmltoman (optional, for building man page)
30
44
31
45
Prerequisites for building tests:
46
+
32
47
* Cgreen (optional, for building tests)
33
48
34
49
Please see the section "Prerequisites for Optional Features" below additional
35
50
optional prerequisites.
36
51
37
-
38
52
## Compiling Greenbone Vulnerability Manager
39
53
40
54
If you have installed required libraries to a non-standard location, remember to
@@ -73,7 +87,6 @@ you have specified a prefix for which your user does not have full permissions.
73
87
To clean up the build environment, simply remove the contents of the ` build `
74
88
directory you created above.
75
89
76
-
77
90
## Choosing the Connection Type
78
91
79
92
Greenbone Vulnerability Manager can serve client connections on either a TCP
@@ -91,7 +104,6 @@ To use a TCP socket, call gvmd with the --listen option, for example:
91
104
92
105
gvmd --listen=127.0.0.1
93
106
94
-
95
107
## Certificate Generation
96
108
97
109
All TCP-based communication with Greenbone Vulnerability Manager uses the TLS
@@ -116,7 +128,6 @@ If certificates have expired or in other ways there is need to update
116
128
certificates for scanners, please see also section `Updating Scanner
117
129
Certificates`.
118
130
119
-
120
131
## Configure PostgreSQL Database Backend
121
132
122
133
### Setting up the PostgreSQL database
@@ -220,7 +231,6 @@ SELECT nspname || '.' || relname AS "relation",
220
231
221
232
These queries were taken from https://wiki.postgresql.org/wiki/Disk_Usage
222
233
223
-
224
234
## Migrating the Database (e.g. during an upgrade of GVM)
225
235
226
236
If you have used Manager before (e.g. an older version which got upgraded to
@@ -234,7 +244,6 @@ Use this command to run the migration:
234
244
235
245
gvmd --migrate
236
246
237
-
238
247
# # Creating an administrator user for GVM
239
248
240
249
You can create an administrator user with the ` --create-user` option of ` gvmd` :
@@ -248,7 +257,6 @@ clients like the Greenbone Security Assistant (GSA).
248
257
249
258
Also, the new user can change their password via GSA.
250
259
251
-
252
260
## Set the Feed Import Owner
253
261
254
262
Certain resources that were previously part of the gvmd source code are now
@@ -262,7 +270,6 @@ The UUIDs of all created users can be found using
262
270
263
271
gvmd --get-users --verbose
264
272
265
-
266
273
## Keeping the feeds up-to-date
267
274
268
275
The `gvmd Data`, `SCAP` and `CERT` Feeds should be kept up-to-date by calling the
@@ -300,9 +307,9 @@ Please note: The `CERT` feed sync depends on data provided by the `SCAP` feed
300
307
and should be called after syncing the latter.
301
308
You will need the `rsync` tool for a successful synchronization.
302
309
303
- ## Configure the default OSPD scanner socket path
310
+ ## Configure the default ospd scanner socket path
304
311
305
- By default, Manager tries to connect to the default OSPD scanner via the following path:
312
+ By default, Manager tries to connect to the default ospd scanner via the following path:
306
313
307
314
/var/run/ospd/ospd.sock
308
315
@@ -316,7 +323,6 @@ Update the path (example, path needs to be adapted accordingly):
316
323
317
324
gvmd --modify-scanner=< uuid of OpenVAS Default scanner> --scanner-host=< install-prefix> /var/run/ospd/ospd-openvas.sock
318
325
319
-
320
326
# # Logging Configuration
321
327
322
328
By default, Manager writes logs to the file
@@ -360,7 +366,6 @@ Logging to `syslog` can be enabled in each domain like:
360
366
syslog_facility=daemon
361
367
level=128
362
368
363
-
364
369
# # Optimizing the database
365
370
366
371
Greenbone Vulnerability Manager offers the command line option
@@ -460,7 +465,6 @@ supported values for `<name>` are:
460
465
This creates the cache containing the unfiltered result counts of all reports
461
466
that are not cached yet.
462
467
463
-
464
468
# # Encrypted Credentials
465
469
466
470
By default, the Manager stores private key and password parts of target
@@ -521,7 +525,6 @@ No encryption: If for backward compatibility reasons encrypted credentials
521
525
are not desired, the manager must _always_ be started with the option
522
526
`--disable-encrypted-credentials`.
523
527
524
-
525
528
## Resetting Credentials Encryption Key
526
529
527
530
If you lost some part of the encryption key, neither a regular migration nor
@@ -549,7 +552,6 @@ Create a new key:
549
552
550
553
Finally, reset all credentials, by hand.
551
554
552
-
553
555
## Updating Scanner Certificates
554
556
555
557
If you have changed the CA certificate used to sign the server and client
@@ -598,7 +600,6 @@ Replace the path to the pem-file with the one of your setup. The
598
600
UUID is the fixed one of the immutable global setting for the default
599
601
CA certificate and thus does not need to be changed.
600
602
601
-
602
603
## Changing the Maximum Number of Rows per Page
603
604
604
605
The maximum number of rows returned by the GMP `GET` commands, like `GET_TARGETS`,
@@ -618,12 +619,12 @@ This changes the global value of the setting, and so applies to all users.
618
619
Adding ` --user` to the command will set a value for maximum rows only for that
619
620
user.
620
621
621
-
622
622
# # Prerequisites for Optional Features
623
623
624
624
Certain features of the Manager also require some programs at run time:
625
625
626
626
Prerequisites for generating PDF reports:
627
+
627
628
* pdflatex
628
629
629
630
On Debian GNU/Linux ' Stretch' 9 the following packages can be installed to
@@ -633,23 +634,29 @@ Prerequisites for generating PDF reports:
633
634
apt-get install texlive-fonts-recommended
634
635
635
636
Prerequisites for generating HTML reports:
637
+
636
638
* xsltproc
637
639
638
640
Prerequisites for generating verinice reports:
641
+
639
642
* xsltproc, xmlstarlet, zip
640
643
641
644
Prerequisites for generating credential RPM packages:
645
+
642
646
* rpm
643
647
* fakeroot
644
648
645
649
Prerequisites for generating credential DEB packages:
650
+
646
651
* dpkg
647
652
* fakeroot
648
653
649
654
Prerequisites for generating credentials .exe packages:
655
+
650
656
* makensis (usually distributed as part of nsis)
651
657
652
658
Prerequisites for generating system reports:
659
+
653
660
* A program in the ` PATH` , with usage ` gvmcg seconds type` , where
654
661
seconds is the number of seconds before now that the report covers,
655
662
and type is the type of report. When called with type ` titles` the
@@ -662,48 +669,61 @@ Prerequisites for generating system reports:
662
669
indicate failure by simply refraining from printing.
663
670
664
671
Prerequisites for signature verification:
672
+
665
673
* gnupg
666
674
667
675
Prerequisites for HTTP alerts:
676
+
668
677
* wget
669
678
670
679
Prerequisites for Alemba vFire alert:
680
+
671
681
* A program in the ` PATH` called ` greenbone_vfire_connector` that takes the
672
682
path to an XML file as described by doc/vfire-data-xml.rnc as an argument.
673
683
674
684
Prerequisites for Sourcefire Connector alert:
685
+
675
686
* A program in the ` PATH` called ` greenbone_sourcefire_connector` that takes
676
687
args IP, port, PKCS12 file and report file in Sourcefire format.
677
688
678
689
Prerequisites for verinice .PRO Connector alert:
690
+
679
691
* A program in the ` PATH` called ` greenbone_verinice_connector` that takes args
680
692
IP, port, username, password and report file in verinice .PRO format.
681
693
682
694
Prerequisites for SCP alert:
695
+
683
696
* sshpass
684
697
* scp
685
698
686
699
Prerequisites for Send alert:
700
+
687
701
* socat
688
702
689
703
Prerequisites for SNMP alert:
704
+
690
705
* snmp
691
706
692
707
Prerequisites for SMB alert:
708
+
693
709
* python3
694
710
* smbclient
695
711
696
712
Prerequisites for Tipping Point alert:
713
+
697
714
* python3
698
715
* python3-lxml
699
716
700
717
Prerequisites for key generation on systems with low entropy:
718
+
701
719
* haveged (or a similar tool)
702
720
703
721
Prerequisites for S/MIME support (e.g. email encryption):
722
+
704
723
* GNU privacy guard - S/MIME version (Debian package: gpgsm)
705
724
706
725
Prerequisites for certificate generation:
726
+
707
727
* GnuTLS certtool (Debian package: gnutls-bin)
708
728
709
729
# # Static code analysis with the Clang Static Analyzer
0 commit comments