File: control

package info (click to toggle)
ospd-openvas 22.10.0-1
  • links: PTS, VCS
  • area: main
  • in suites: sid
  • size: 1,648 kB
  • sloc: python: 14,197; xml: 1,913; makefile: 45; sh: 29
file content (45 lines) | stat: -rw-r--r-- 1,802 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
Source: ospd-openvas
Section: admin
Priority: optional
Maintainer: Debian Security Tools <team+pkg-security@tracker.debian.org>
Uploaders: Sophie Brun <sophie@kali.org>
Build-Depends: debhelper-compat (= 13),
               dh-python,
	       pybuild-plugin-pyproject,
               python3-all,
	       python3-defusedxml,
	       python3-gnupg,
	       python3-lxml,
	       python3-packaging,
	       python3-paho-mqtt,
	       python3-poetry-core,
               python3-psutil,
               python3-redis,
               python3-setuptools
Standards-Version: 4.7.2
Rules-Requires-Root: no
Homepage: https://www.greenbone.net/
Vcs-Browser: https://salsa.debian.org/pkg-security-team/ospd-openvas
Vcs-Git: https://salsa.debian.org/pkg-security-team/ospd-openvas.git
Testsuite: autopkgtest-pkg-python

Package: ospd-openvas
Architecture: all
Depends: openvas-scanner (>= 22.4.0), ${misc:Depends}, ${python3:Depends}, sudo
Replaces: python3-ospd (<< 21.4.5)
Breaks: python3-ospd (<< 21.4.5)
Provides: python3-ospd
Description: OSP server implementation to allow GVM to remotely control an OpenVAS Scanner
 This package contains an OSP server implementation to allow GVM to remotely
 control OpenVAS.
 .
 It is a command line tool with parameters to start a daemon which keeps
 waiting for instructions to update the feed of vulnerability tests and to
 start a scan. The second part of the interface is the redis store where the
 parameters about a scan task need to be placed and from where the results can
 be retrieved, being the unique communication channel between OSPD-OpenVAS and
 OpenVAS.
 .
 Once running, you need to configure OpenVAS for the Greenbone Vulnerability
 Manager, for example via the web interface Greenbone Security Assistant. Then
 you can create scan tasks to use OpenVAS.