Ospd-openvas don't have permission to capture on that device

Back to the initial message:

In GVM < 11 it was required to run the openvassd daemon as root so that it is capable to do package forgery:

Please note that although you can start openvassd as a user without elevated privileges, it is recommended that you start openvassd as root since a number of Network Vulnerability Tests (NVTs) require root privileges to perform certain operations like packet forgery. If you run openvassd as a user without permission to perform these operations, your scan results are likely to be incomplete.
openvas-scanner/INSTALL.md at v6.0.1 · greenbone/openvas-scanner · GitHub

IIUC since GVM-11 openvassd is just openvas which is called by ospd-openvas (See https://community.greenbone.net/t/goodbye-otp/1739, OpenVAS = Open Vulnerability Assessment Scanner - Greenbone Community Edition - Greenbone Community Forum) and to my understanding (which seems to be confirmed by the MR below) you can either run ospd-openvas as root (discouraged) or setup sudo by following the description in the MR (seem this hasn’t made it into the documentation).

3 Likes