GSM Community Edition and lagging OpenVAS Plugin Feed

As I already wrote in “Installing OpenVAS 9 from the sources“, since May 2017 OpenVAS 9 is available in a form of free virtual appliance. It is called GSM Community Edition (GCE) and is based on Greenbone commercial product GSM ONE.

What’s the difference between GSM ONE and free GCE? GSM Community Edition uses different Community Feed of NASL plugins, it can’t be updated automatically and does not have some management features. The most important, in my opinion, is that it does not support OpenVAS Management Protocol (OMP), API for managing scanners. Only HTTPS for WebGUI and SSH are available.

GSM start screen

Talking about different NASL plugin feeds, I need to mention recent message by Jan-Oliver Wagner in Openvas-announce list.

That seems like Greenbone is rather tired of developing OpenVAS by themselves and watching how other companies use theirs engine and feeds, positioning themselves as an “alternative to Greenbone’s product at a better price”. So, they decided:

  1. “OpenVAS NVT Feed” will be renamed to “Greenbone Community Feed”
  2. Public access to the “openvas-nvts” SVN repository will be forbidden, but the license of nasl plugins won’t be changed.
  3. Now Community Feed lags 14 days from commercial feed, but Greenbone would like to make an actual feed, but without some features for enterprise customers.

I really care about Greenbone and they, of course, do as they think is better for the company and OpenVAS community, but at the same time it reminds me situation with Tenable and Nessus. Maybe not so radical. But definitely in the same direction.

Feed delayed for 2 week can’t be used effectively for obvious reasons. If you see exploitation of critical vulnerability like WannaCry in the wild and will need to wait 2 weeks to check your infrastructure, it’s a nonsense! šŸ™‚ That’s mean that you just can’t rely on OpenVAS anymore. And if you use it, you should think about migration on commercial solution, for example on Greenbone’s GSM, or think about getting actual plugin feed somewhere else.

The good thing, it might show customers once again that knowledge base of Vulnerability Management solution is important and stimulate other security content developers to make own nasl scripts and feeds.

But let’s go back to GSM Community Edition. Detailed description of installation process you can find on official site. I will just describe my own experience.

I couldn’t open small OVA to GSM-CE-4.0.5-init.ova

GCE VirtualBox Error

So I created virtual machine manually using recommendations on the official site. I created oneĀ NAT network interface with configured port forwarding.

VirtualBox NAT port forwarding

Then I downloaded iso http://dl.greenbone.net/download/VM/gsm_ce_4.0.5.isoĀ attached it to the virtual machine and switched it on.

Installation process is pretty straightforward:

GCE setup

Setup -> Yes (Want to continue)

GCMCE prepared

Create admin user (admin/1)

Success!

GCE Success

GRUB Screen:

GreenboneOS grub

It will boot and then reboot automatically some seconds later. Finally, we can see “Welcome to Greenbone OS 4.0”:

GCE welcome

After login you will see the screen to complete setup:

GCE OS administration

We need to create web-admin user:

GCE webadmin create

admin/1:

GCE new admin

Choose subscription key (if you have one). I will choose “No” and Community Feed.

GCE subscription key

Than GCE shows recommendation to update feed from the setup menu.

The main setup menu looks like this. To update the vulnerability feed I choose Maintenance:

GCE Administration Menu

Then Feed:

GCE Feed menu

And finally press Update:

GCE Update Feed

Greenbone Community Edition does some work in background, but whether it has finished updating the Feed or not is not clear.

GCE Information

I had a problem here, because GCE did not re-build database automatically. So I did it manually in console.

You can get root access to the appliance in Advanced -> Support -> Superuser

And then go to Advanced -> Support -> Shell

GCE Create Superuser Account

And now in shell you can rebuild openvasmd database manually:

OpenVAS NVT cache

Now we can go to https://localhost:2222, authenticate with web-user password:

OpenVAS start screen

As you can see, detection plugins (NVTs) are in the database, but not SCAP content and CVEs.Ā  However, this will be enough for vulnerability scanning.

GSM NVTs

And it scans remote hosts pretty fine:

OpenVAS scan results

Conclusions

  1. You can use GCE for scanning. But I will continue installing OpenVAS from the sources or from Ubuntu packages. First of all, because it’s not possible to use the API with GCE. It certainly can be corrected manually, but it seems not ethical to me.
  2. Old-school text interface for configuring appliance is cool. Maybe I’ll do something similar for openvas_commander.
  3. Delayed OpenVAS plugin feed is a very bad news. Maybe we need to develop an alternative feed. If this bothers you too, let me know in the comments below.

Leave a Reply

Your email address will not be published. Required fields are marked *