Install this package:
emerge -a net-analyzer/ospd-openvas
If the package is masked, you can unmask it using the autounmask tool or standard emerge options:
autounmask net-analyzer/ospd-openvas
Or alternatively:
emerge --autounmask-write -a net-analyzer/ospd-openvas
<pkgmetadata> <maintainer type="person" proxied="yes"> <email>foti.giuseppe@gmail.com</email> <name>Giuseppe Foti</name> </maintainer> <maintainer type="project" proxied="proxy"> <email>proxy-maint@gentoo.org</email> <name>Proxy Maintainers</name> </maintainer> <longdescription lang="en"> This is an OSP server implementation to allow GVM to remotely control OpenVAS. Once running, you need to configure OpenVAS for the Greenbone Vulnerability Manager, for example via the web interface Greenbone Security Assistant. Then you can create scan tasks to use OpenVAS. </longdescription> <use> <flag name="notus">Set systemd service file to use notus-scanner</flag> </use> <upstream> <remote-id type="github">greenbone/ospd-openvas</remote-id> </upstream> </pkgmetadata>
Manage flags for this package:
euse -i <flag> -p net-analyzer/ospd-openvas |
euse -E <flag> -p net-analyzer/ospd-openvas |
euse -D <flag> -p net-analyzer/ospd-openvas
| Flag | Description | 22.9.0 | 22.10.1 |
|---|---|---|---|
| doc | Add extra documentation (API, Javadoc, etc). It is recommended to enable per package instead of globally | ✓ | ✓ |
| notus | Set systemd service file to use notus-scanner | ⊕ | ⊕ |
| Type | File | Size | Versions |
|---|---|---|---|
| DIST | ospd-openvas-22.10.1.tar.gz | 256447 bytes | 22.10.1 |
| DIST | ospd-openvas-22.9.0.tar.gz | 250165 bytes | 22.9.0 |
| Type | File | Size |
|---|