ssh credentials does not work without net-libs/libssh. cat /var/log/openvas/openvassd.dump kb_ssh_login: ovsdebug kb_ssh_password: qwerty1 [5728](/var/lib/openvas/plugins/ssh_authorization.nasl) gcry_cipher_open failed: User defined source 1/Invalid cipher algorithm [5728](/var/lib/openvas/plugins/ssh_authorization.nasl) get_array_elem: requesting character after end of string crypted (1 >= 0) [5728](/var/lib/openvas/plugins/ssh_authorization.nasl) get_array_elem: requesting character after end of string crypted (0 >= 0) [5774](/var/lib/openvas/plugins/ssh_detect.nasl) gcry_cipher_open failed: User defined source 1/Invalid cipher algorithm [5774](/var/lib/openvas/plugins/ssh_detect.nasl) get_array_elem: requesting character after end of string crypted (1 >= 0) [5774](/var/lib/openvas/plugins/ssh_detect.nasl) get_array_elem: requesting character after end of string crypted (0 >= 0) [5785](/var/lib/openvas/plugins/gb_greenbone_os_detect.nasl) gcry_cipher_open failed: User defined source 1/Invalid cipher algorithm [5785](/var/lib/openvas/plugins/gb_greenbone_os_detect.nasl) get_array_elem: requesting character after end of string crypted (1 >= 0) [5785](/var/lib/openvas/plugins/gb_greenbone_os_detect.nasl) get_array_elem: requesting character after end of string crypted (0 >= 0) [5906](/var/lib/openvas/plugins/nortel_default_username_password.nasl) gcry_cipher_open failed: User defined source 1/Invalid cipher algorithm [5906](/var/lib/openvas/plugins/nortel_default_username_password.nasl) get_array_elem: requesting character after end of string crypted (1 >= 0) [5906](/var/lib/openvas/plugins/nortel_default_username_password.nasl) get_array_elem: requesting character after end of string crypted (0 >= 0) [5910](/var/lib/openvas/plugins/gather-hardware-info.nasl) gcry_cipher_open failed: User defined source 1/Invalid cipher algorithm [5910](/var/lib/openvas/plugins/gather-hardware-info.nasl) get_array_elem: requesting character after end of string crypted (1 >= 0) [5910](/var/lib/openvas/plugins/gather-hardware-info.nasl) get_array_elem: requesting character after end of string crypted (0 >= 0) [5906](/var/lib/openvas/plugins/nortel_default_username_password.nasl) gcry_cipher_open failed: User defined source 1/Invalid cipher algorithm [5906](/var/lib/openvas/plugins/nortel_default_username_password.nasl) get_array_elem: requesting character after end of string crypted (1 >= 0) [5906](/var/lib/openvas/plugins/nortel_default_username_password.nasl) get_array_elem: requesting character after end of string crypted (0 >= 0) [5984](/var/lib/openvas/plugins/ssh_proto_version.nasl) gcry_cipher_open failed: User defined source 1/Invalid cipher algorithm [5984](/var/lib/openvas/plugins/ssh_proto_version.nasl) get_array_elem: requesting character after end of string crypted (1 >= 0) [5984](/var/lib/openvas/plugins/ssh_proto_version.nasl) get_array_elem: requesting character after end of string crypted (0 >= 0) [6038](/var/lib/openvas/plugins/slad_fetch_results.nasl) gcry_cipher_open failed: User defined source 1/Invalid cipher algorithm [6038](/var/lib/openvas/plugins/slad_fetch_results.nasl) get_array_elem: requesting character after end of string crypted (1 >= 0) [6038](/var/lib/openvas/plugins/slad_fetch_results.nasl) get_array_elem: requesting character after end of string crypted (0 >= 0) [6113](/var/lib/openvas/plugins/gb_tandberg_46107.nasl) gcry_cipher_open failed: User defined source 1/Invalid cipher algorithm [6113](/var/lib/openvas/plugins/gb_tandberg_46107.nasl) get_array_elem: requesting character after end of string crypted (1 >= 0) [6113](/var/lib/openvas/plugins/gb_tandberg_46107.nasl) get_array_elem: requesting character after end of string crypted (0 >= 0) [6120](/var/lib/openvas/plugins/gb_f5_bigip_ssh_root_auth_bypass.nasl) gcry_cipher_open failed: User defined source 1/Invalid cipher algorithm [6120](/var/lib/openvas/plugins/gb_f5_bigip_ssh_root_auth_bypass.nasl) get_array_elem: requesting character after end of string crypted (1 >= 0) [6120](/var/lib/openvas/plugins/gb_f5_bigip_ssh_root_auth_bypass.nasl) get_array_elem: requesting character after end of string crypted (0 >= 0) [6121](/var/lib/openvas/plugins/gb_symantec_messaging_gateway_mult_vuln.nasl) gcry_cipher_open failed: User defined source 1/Invalid cipher algorithm [6121](/var/lib/openvas/plugins/gb_symantec_messaging_gateway_mult_vuln.nasl) get_array_elem: requesting character after end of string crypted (1 >= 0) [6121](/var/lib/openvas/plugins/gb_symantec_messaging_gateway_mult_vuln.nasl) get_array_elem: requesting character after end of string crypted (0 >= 0) [6127](/var/lib/openvas/plugins/2013/gb_barracuda_57537.nasl) gcry_cipher_open failed: User defined source 1/Invalid cipher algorithm [6127](/var/lib/openvas/plugins/2013/gb_barracuda_57537.nasl) get_array_elem: requesting character after end of string crypted (1 >= 0) [6127](/var/lib/openvas/plugins/2013/gb_barracuda_57537.nasl) get_array_elem: requesting character after end of string crypted (0 >= 0) [6128](/var/lib/openvas/plugins/2013/gb_hp_d2d_storeonce_backdoor_06_13.nasl) gcry_cipher_open failed: User defined source 1/Invalid cipher algorithm [6128](/var/lib/openvas/plugins/2013/gb_hp_d2d_storeonce_backdoor_06_13.nasl) get_array_elem: requesting character after end of string crypted (1 >= 0) [6128](/var/lib/openvas/plugins/2013/gb_hp_d2d_storeonce_backdoor_06_13.nasl) get_array_elem: requesting character after end of string crypted (0 >= 0) [6127](/var/lib/openvas/plugins/2013/gb_barracuda_57537.nasl) gcry_cipher_open failed: User defined source 1/Invalid cipher algorithm [6127](/var/lib/openvas/plugins/2013/gb_barracuda_57537.nasl) get_array_elem: requesting character after end of string crypted (1 >= 0) [6127](/var/lib/openvas/plugins/2013/gb_barracuda_57537.nasl) get_array_elem: requesting character after end of string crypted (0 >= 0) [6139](/var/lib/openvas/plugins/default_ssh_credentials.nasl) gcry_cipher_open failed: User defined source 1/Invalid cipher algorithm [6139](/var/lib/openvas/plugins/default_ssh_credentials.nasl) get_array_elem: requesting character after end of string crypted (1 >= 0) [6139](/var/lib/openvas/plugins/default_ssh_credentials.nasl) get_array_elem: requesting character after end of string crypted (0 >= 0) SSHd log 2013-08-16T17:05:11.983615+04:00 dntest sshd[24084]: Bad protocol version identification 'GET / HTTP/1.0' from 10.0.0.1 2013-08-16T17:05:18.154861+04:00 dntest sshd[24086]: SSH: Server;Ltype: Version;Remote: 10.0.0.1-58299;Protocol: 2.0;Client: OpenVAS 2013-08-16T17:05:18.160561+04:00 dntest sshd[24086]: SSH: Server;Ltype: Kex;Remote: 10.0.0.1-58299;Enc: blowfish-cbc;MAC: hmac-sha1;Comp: none [preauth] 2013-08-16T17:05:18.261199+04:00 dntest sshd[24086]: Bad packet length 4243730460. [preauth] 2013-08-16T17:05:23.233096+04:00 dntest sshd[24086]: Connection closed by 10.0.0.1 [preauth] 2013-08-16T17:05:38.984302+04:00 dntest sshd[24122]: SSH: Server;Ltype: Version;Remote: 10.0.0.1-58308;Protocol: 2.0;Client: OpenVAS 2013-08-16T17:05:38.991876+04:00 dntest sshd[24122]: SSH: Server;Ltype: Kex;Remote: 10.0.0.1-58308;Enc: blowfish-cbc;MAC: hmac-sha1;Comp: none [preauth] 2013-08-16T17:05:39.155076+04:00 dntest sshd[24122]: Bad packet length 4054096269. [preauth] 2013-08-16T17:05:40.988921+04:00 dntest sshd[24131]: SSH: Server;Ltype: Version;Remote: 10.0.0.1-58309;Protocol: 2.0;Client: OpenVAS 2013-08-16T17:05:40.995896+04:00 dntest sshd[24131]: SSH: Server;Ltype: Kex;Remote: 10.0.0.1-58309;Enc: blowfish-cbc;MAC: hmac-sha1;Comp: none [preauth] 2013-08-16T17:05:41.092971+04:00 dntest sshd[24131]: Bad packet length 443780648. [preauth] 2013-08-16T17:05:44.123941+04:00 dntest sshd[24122]: Connection closed by 10.0.0.1 [preauth] 2013-08-16T17:05:46.066566+04:00 dntest sshd[24131]: Connection closed by 10.0.0.1 [preauth] 2013-08-16T17:05:54.260141+04:00 dntest sshd[24133]: Bad protocol version identification 'QUIT' from 10.0.0.1 2013-08-16T17:06:16.304194+04:00 dntest sshd[24181]: SSH: Server;Ltype: Version;Remote: 10.0.0.1-58321;Protocol: 2.0;Client: OpenVAS 2013-08-16T17:06:16.310654+04:00 dntest sshd[24181]: SSH: Server;Ltype: Kex;Remote: 10.0.0.1-58321;Enc: blowfish-cbc;MAC: hmac-sha1;Comp: none [preauth] 2013-08-16T17:06:16.449408+04:00 dntest sshd[24181]: Bad packet length 767414783. [preauth] 2013-08-16T17:06:16.452939+04:00 dntest sshd[24183]: Did not receive identification string from 10.0.0.1 2013-08-16T17:06:16.900870+04:00 dntest sshd[24184]: SSH: Server;Ltype: Version;Remote: 10.0.0.1-58323;Protocol: 2.0;Client: OpenVAS 2013-08-16T17:06:16.905973+04:00 dntest sshd[24184]: SSH: Server;Ltype: Kex;Remote: 10.0.0.1-58323;Enc: blowfish-cbc;MAC: hmac-sha1;Comp: none [preauth] 2013-08-16T17:06:17.008987+04:00 dntest sshd[24184]: Bad packet length 1545860610. [preauth] 2013-08-16T17:06:17.484043+04:00 dntest sshd[24180]: Did not receive identification string from 10.0.0.1 2013-08-16T17:06:21.413721+04:00 dntest sshd[24181]: Connection closed by 10.0.0.1 [preauth] 2013-08-16T17:06:21.438965+04:00 dntest sshd[24186]: SSH: Server;Ltype: Version;Remote: 10.0.0.1-58324;Protocol: 2.0;Client: OpenVAS 2013-08-16T17:06:21.442794+04:00 dntest sshd[24186]: SSH: Server;Ltype: Kex;Remote: 10.0.0.1-58324;Enc: blowfish-cbc;MAC: hmac-sha1;Comp: none [preauth] 2013-08-16T17:06:21.545625+04:00 dntest sshd[24186]: Bad packet length 3608879617. [preauth] 2013-08-16T17:06:21.982099+04:00 dntest sshd[24184]: Connection closed by 10.0.0.1 [preauth] 2013-08-16T17:06:26.522229+04:00 dntest sshd[24186]: Connection closed by 10.0.0.1 [preauth] 2013-08-16T17:06:39.137407+04:00 dntest sshd[24221]: Did not receive identification string from 10.0.0.1 2013-08-16T17:06:39.137488+04:00 dntest sshd[24222]: SSH: Server;Ltype: Version;Remote: 10.0.0.1-58329;Protocol: 1.33;Client: OpenVASSSH_1.0 2013-08-16T17:06:39.137498+04:00 dntest sshd[24222]: Protocol major versions differ for 10.0.0.1: SSH-2.0-OpenSSH_5.9p1-hpn13v11lpk vs. SSH-1.33-OpenVASSSH_1.0 2013-08-16T17:06:39.170381+04:00 dntest sshd[24223]: SSH: Server;Ltype: Version;Remote: 10.0.0.1-58330;Protocol: 1.5;Client: OpenVASSSH_1.0 2013-08-16T17:06:39.170449+04:00 dntest sshd[24223]: Protocol major versions differ for 10.0.0.1: SSH-2.0-OpenSSH_5.9p1-hpn13v11lpk vs. SSH-1.5-OpenVASSSH_1.0 2013-08-16T17:06:39.198266+04:00 dntest sshd[24224]: SSH: Server;Ltype: Version;Remote: 10.0.0.1-58331;Protocol: 1.99;Client: OpenVASSSH_1.0 2013-08-16T17:06:39.206476+04:00 dntest sshd[24224]: Connection closed by 10.0.0.1 [preauth] 2013-08-16T17:06:39.230855+04:00 dntest sshd[24226]: SSH: Server;Ltype: Version;Remote: 10.0.0.1-58332;Protocol: 2.0;Client: OpenVASSSH_1.0 2013-08-16T17:06:39.251871+04:00 dntest sshd[24226]: Connection closed by 10.0.0.1 [preauth] 2013-08-16T17:06:39.286849+04:00 dntest sshd[24231]: SSH: Server;Ltype: Version;Remote: 10.0.0.1-58333;Protocol: 2.0;Client: OpenVAS 2013-08-16T17:06:39.295702+04:00 dntest sshd[24231]: SSH: Server;Ltype: Kex;Remote: 10.0.0.1-58333;Enc: blowfish-cbc;MAC: hmac-sha1;Comp: none [preauth] 2013-08-16T17:06:39.393018+04:00 dntest sshd[24231]: Bad packet length 3139688958. [preauth] 2013-08-16T17:06:44.363138+04:00 dntest sshd[24231]: Connection closed by 10.0.0.1 [preauth] 2013-08-16T17:07:09.605677+04:00 dntest sshd[24244]: SSH: Server;Ltype: Version;Remote: 10.0.0.1-58347;Protocol: 2.0;Client: OpenVAS 2013-08-16T17:07:09.614286+04:00 dntest sshd[24244]: SSH: Server;Ltype: Kex;Remote: 10.0.0.1-58347;Enc: blowfish-cbc;MAC: hmac-sha1;Comp: none [preauth] 2013-08-16T17:07:09.729202+04:00 dntest sshd[24244]: Bad packet length 4275974566. [preauth] 2013-08-16T17:07:14.707061+04:00 dntest sshd[24244]: Connection closed by 10.0.0.1 [preauth] 2013-08-16T17:07:43.688080+04:00 dntest sshd[24329]: Bad protocol version identification '\026\003' from 10.0.0.1 2013-08-16T17:07:44.688293+04:00 dntest sshd[24331]: SSH: Server;Ltype: Version;Remote: 10.0.0.1-58352;Protocol: 2.0;Client: OpenVAS 2013-08-16T17:07:44.701258+04:00 dntest sshd[24331]: SSH: Server;Ltype: Kex;Remote: 10.0.0.1-58352;Enc: blowfish-cbc;MAC: hmac-sha1;Comp: none [preauth] 2013-08-16T17:07:44.804975+04:00 dntest sshd[24331]: Bad packet length 4109247975. [preauth] 2013-08-16T17:07:49.782358+04:00 dntest sshd[24331]: Connection closed by 10.0.0.1 [preauth] 2013-08-16T17:07:52.067176+04:00 dntest sshd[24333]: SSH: Server;Ltype: Version;Remote: 10.0.0.1-58353;Protocol: 2.0;Client: OpenVAS 2013-08-16T17:07:52.075491+04:00 dntest sshd[24333]: SSH: Server;Ltype: Kex;Remote: 10.0.0.1-58353;Enc: blowfish-cbc;MAC: hmac-sha1;Comp: none [preauth] 2013-08-16T17:07:52.181158+04:00 dntest sshd[24333]: Bad packet length 3370688811. [preauth] 2013-08-16T17:07:56.050994+04:00 dntest sshd[24335]: SSH: Server;Ltype: Version;Remote: 10.0.0.1-58354;Protocol: 2.0;Client: OpenVAS 2013-08-16T17:07:56.057586+04:00 dntest sshd[24335]: SSH: Server;Ltype: Kex;Remote: 10.0.0.1-58354;Enc: blowfish-cbc;MAC: hmac-sha1;Comp: none [preauth] 2013-08-16T17:07:56.173072+04:00 dntest sshd[24335]: Bad packet length 176133203. [preauth] 2013-08-16T17:07:57.154542+04:00 dntest sshd[24333]: Connection closed by 10.0.0.1 [preauth] 2013-08-16T17:07:58.609267+04:00 dntest sshd[24337]: SSH: Server;Ltype: Version;Remote: 10.0.0.1-58355;Protocol: 2.0;Client: OpenVAS 2013-08-16T17:07:58.615562+04:00 dntest sshd[24337]: SSH: Server;Ltype: Kex;Remote: 10.0.0.1-58355;Enc: blowfish-cbc;MAC: hmac-sha1;Comp: none [preauth] 2013-08-16T17:07:58.733063+04:00 dntest sshd[24337]: Bad packet length 1547044071. [preauth] 2013-08-16T17:08:01.152199+04:00 dntest sshd[24335]: Connection closed by 10.0.0.1 [preauth] 2013-08-16T17:08:01.226122+04:00 dntest sshd[24339]: SSH: Server;Ltype: Version;Remote: 10.0.0.1-58356;Protocol: 2.0;Client: OpenVAS 2013-08-16T17:08:01.231772+04:00 dntest sshd[24339]: SSH: Server;Ltype: Kex;Remote: 10.0.0.1-58356;Enc: blowfish-cbc;MAC: hmac-sha1;Comp: none [preauth] 2013-08-16T17:08:01.337021+04:00 dntest sshd[24339]: Bad packet length 3468516094. [preauth] 2013-08-16T17:08:03.704165+04:00 dntest sshd[24337]: Connection closed by 10.0.0.1 [preauth] 2013-08-16T17:08:03.729025+04:00 dntest sshd[24341]: SSH: Server;Ltype: Version;Remote: 10.0.0.1-58357;Protocol: 2.0;Client: OpenVAS 2013-08-16T17:08:03.733674+04:00 dntest sshd[24341]: SSH: Server;Ltype: Kex;Remote: 10.0.0.1-58357;Enc: blowfish-cbc;MAC: hmac-sha1;Comp: none [preauth] 2013-08-16T17:08:03.832969+04:00 dntest sshd[24341]: Bad packet length 2809075979. [preauth] 2013-08-16T17:08:06.327940+04:00 dntest sshd[24339]: Connection closed by 10.0.0.1 [preauth] 2013-08-16T17:08:08.310099+04:00 dntest sshd[24343]: SSH: Server;Ltype: Version;Remote: 10.0.0.1-58358;Protocol: 2.0;Client: OpenVAS 2013-08-16T17:08:08.315747+04:00 dntest sshd[24343]: SSH: Server;Ltype: Kex;Remote: 10.0.0.1-58358;Enc: blowfish-cbc;MAC: hmac-sha1;Comp: none [preauth] 2013-08-16T17:08:08.425030+04:00 dntest sshd[24343]: Bad packet length 599794370. [preauth] 2013-08-16T17:08:08.814072+04:00 dntest sshd[24341]: Connection closed by 10.0.0.1 [preauth] 2013-08-16T17:08:13.423700+04:00 dntest sshd[24343]: Connection closed by 10.0.0.1 [preauth] 2013-08-16T17:08:39.495703+04:00 dntest sshd[24395]: SSH: Server;Ltype: Version;Remote: 127.0.0.1-52594;Protocol: 2.0;Client: check_ssh_1.4.16 2013-08-16T17:08:39.502180+04:00 dntest sshd[24395]: Connection closed by 127.0.0.1 [preauth] 2013-08-16T17:09:43.667758+04:00 dntest sshd[24330]: Did not receive identification string from 10.0.0.1 2013-08-16T17:11:07.161241+04:00 dntest sshd[24562]: Bad protocol version identification '\200t\001\003\001' from 10.0.0.1 2013-08-16T17:12:12.536299+04:00 dntest sshd[24646]: Did not receive identification string from 10.0.0.1 2013-08-16T17:13:39.455305+04:00 dntest sshd[24741]: SSH: Server;Ltype: Version;Remote: 127.0.0.1-52596;Protocol: 2.0;Client: check_ssh_1.4.16 2013-08-16T17:13:39.459238+04:00 dntest sshd[24741]: Connection closed by 127.0.0.1 [preauth] Reproducible: Always
Ping?
fixed with openvas-libraries-7.0.2