Enable https (SSL) to openvas.mydomain.com

Hi,

I have generated a Let’s Encrypt certificate for https://openvas.mydomain.com. Is there a way to enable SSL for https://openvas.mydomain.com FQDN? I am running CentOS Linux release 8.3.2011

[root@openvas ~]# cat /usr/lib/systemd/system/gsad.service
[Unit]
Description=Greenbone Security Assistant (OpenVAS)
After=network.target
After=ospd-openvas.service
After=gvmd.service

[Service]
Type=forking
EnvironmentFile=-/etc/sysconfig/gsad
PIDFile=/var/run/gsad.pid
ExecStart=/usr/sbin/gsad --munix-socket=/var/run/gvm/gvmd.sock $OPTIONS
User=root
Group=root

[Install]
WantedBy=multi-user.target

[root@openvas ~]# cat /usr/lib/systemd/system/gvmd.service
[Unit]
Description=GVM Manager
After=network.target
After=ospd-openvas.service
Before=gsad.service

[Service]
Environment=“PATH=/opt/atomicorp/atomic/root/usr/bin/:/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin”
Type=forking
EnvironmentFile=-/etc/sysconfig/gvmd
ExecStart=/usr/sbin/gvmd --osp-vt-update=/var/run/ospd/ospd.sock $OPTIONS
Restart=always
RestartSec=1
User=gvm
Group=gvm
TimeoutSec=1200
PIDFile=/var/run/gvm/gvmd.pid
WorkingDirectory=/var/lib/gvm/

[Install]
WantedBy=multi-user.target
Alias=openvas-manager.service

[root@openvas ~]#
rpm -qil gvm-20.8.0-14930.el8.art.noarch
Name : gvm
Version : 20.8.0
Release : 14930.el8.art
Architecture: noarch
Install Date: Tue Dec 15 19:52:14 2020
Group : System Environment/Libraries
Size : 87933
License : AGPL
Signature : RSA/SHA256, Sun Sep 13 03:40:24 2020, Key ID ffbd5d0a4520afa9
Source RPM : gvm-20.8.0-14930.el8.art.src.rpm
Build Date : Sun Sep 13 03:40:23 2020
Build Host : unallocated.barefruit.co.uk
Relocations : /usr
Packager : https://www.atomicorp.com
Vendor : Greenbone https://www.greenbone.net
URL : http://www.openvas.org
Summary : The Greenbone Vulnerability Management (GVM) suite
Description :
Greenbone Vulnerability Management (GVM) is a meta-package encompassing all of the components from GVM including OpenVAS.
/etc/cron.daily/gvm
/etc/sudoers.d/gvm
/usr/bin/gvm-setup
/usr/bin/openvas-setup
/usr/share/licenses/greenbone-vulnerability-management/LICENSE
/usr/share/licenses/gvm
/usr/share/licenses/gvm/LICENSE
/usr/share/texlive/texmf-local/tex/latex/comment/comment.sty

#gvmd --version
Greenbone Vulnerability Manager 20.08.0
Manager DB revision 233
Copyright © 2010-2020 Greenbone Networks GmbH
License: AGPL-3.0-or-later
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.

Thanks in advance

Best Regards,

Kaushal

@kaushalshriyan Hello, if I was you I would probably set up a NGINX proxy and apply your Lets Encrypt certificates. I’ve done this in the past myself and it worked good. Working on next revision which will include running 20.08 behind nginx proxy but if curious you can check the older configuration to achieve this here: https://www.libellux.com/openvas/#openvas-behind-nginx-proxy

Anyway, hope you solve it.

Best regards,
Fredrik

1 Like

Why doing such a useless thing ? Please have a look here where the topic as discussed and a solution is available:

1 Like

Please have a look here for the solution. I suggest you search first for a solution before opening additional topics.

1 Like