From owner-freebsd-pkg@freebsd.org Sun Sep 20 21:00:52 2020 Return-Path: Delivered-To: freebsd-pkg@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 9807F3F1705 for ; Sun, 20 Sep 2020 21:00:52 +0000 (UTC) (envelope-from bugzilla-noreply@FreeBSD.org) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 4Bvg2r3cfwz4Ws6 for ; Sun, 20 Sep 2020 21:00:52 +0000 (UTC) (envelope-from bugzilla-noreply@FreeBSD.org) Received: by mailman.nyi.freebsd.org (Postfix) id 7C1643F1459; Sun, 20 Sep 2020 21:00:52 +0000 (UTC) Delivered-To: pkg@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 7BD643F154D for ; Sun, 20 Sep 2020 21:00:52 +0000 (UTC) (envelope-from bugzilla-noreply@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Bvg2r2lznz4Ws5 for ; Sun, 20 Sep 2020 21:00:52 +0000 (UTC) (envelope-from bugzilla-noreply@FreeBSD.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 42B8223264 for ; Sun, 20 Sep 2020 21:00:52 +0000 (UTC) (envelope-from bugzilla-noreply@FreeBSD.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 08KL0qDG090493 for ; Sun, 20 Sep 2020 21:00:52 GMT (envelope-from bugzilla-noreply@FreeBSD.org) Received: (from bugzilla@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 08KL0qxW090492 for pkg@FreeBSD.org; Sun, 20 Sep 2020 21:00:52 GMT (envelope-from bugzilla-noreply@FreeBSD.org) Message-Id: <202009202100.08KL0qxW090492@kenobi.freebsd.org> X-Authentication-Warning: kenobi.freebsd.org: bugzilla set sender to bugzilla-noreply@FreeBSD.org using -f From: bugzilla-noreply@FreeBSD.org To: pkg@FreeBSD.org Subject: Problem reports for pkg@FreeBSD.org that need special attention Date: Sun, 20 Sep 2020 21:00:52 +0000 MIME-Version: 1.0 Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.33 X-BeenThere: freebsd-pkg@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Binary package management and package tools discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 20 Sep 2020 21:00:52 -0000 To view an individual PR, use: https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=(Bug Id). The following is a listing of current problems submitted by FreeBSD users, which need special attention. These represent problem reports covering all versions including experimental development code and obsolete releases. Status | Bug Id | Description ------------+-----------+--------------------------------------------------- Open | 220049 | ports-mgmt/pkg installs unneeded packages Open | 237369 | ports-mgmt/pkg: pkg delete removes required NLS d 2 problems total for which you should take action. From owner-freebsd-pkg@freebsd.org Tue Sep 22 21:06:57 2020 Return-Path: Delivered-To: freebsd-pkg@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 5711A3F7069 for ; Tue, 22 Sep 2020 21:06:57 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (mailman.nyi.freebsd.org [IPv6:2610:1c1:1:606c::50:13]) by mx1.freebsd.org (Postfix) with ESMTP id 4Bwv4x1gsjz4dsc for ; Tue, 22 Sep 2020 21:06:57 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id 398183F712A; Tue, 22 Sep 2020 21:06:57 +0000 (UTC) Delivered-To: pkg@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 394CA3F7068 for ; Tue, 22 Sep 2020 21:06:57 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Bwv4x0qwwz4dmm for ; Tue, 22 Sep 2020 21:06:57 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id EFE9325A0D for ; Tue, 22 Sep 2020 21:06:56 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 08ML6uga044677 for ; Tue, 22 Sep 2020 21:06:56 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 08ML6usE044676 for pkg@FreeBSD.org; Tue, 22 Sep 2020 21:06:56 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: pkg@FreeBSD.org Subject: [Bug 238381] [patch] ports-mgmt/pkg periodic/security/410.pkg-audit gives verbose output Date: Tue, 22 Sep 2020 21:06:56 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: matt@tnpi.net X-Bugzilla-Status: In Progress X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: pkg@FreeBSD.org X-Bugzilla-Flags: maintainer-feedback? X-Bugzilla-Changed-Fields: cc Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-pkg@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Binary package management and package tools discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 22 Sep 2020 21:06:57 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D238381 Matt Simerson changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |matt@tnpi.net --- Comment #2 from Matt Simerson --- In a very related (verbose output), how about not spitting out empty jail n= ames when they have no output? Here's a little patch demonstrating it. for j in $jails ; do output=3D'' for t in audit expiration deprecation; do output=3D${output}$(${t}_pkgs "-j ${j%|*}" ${j##*|}) last_rc=3D$? [ $last_rc -gt 1 ] && rc=3D$last_rc done if [ -n "$output" ]; then echo echo "jail: ${j%|*}" echo $output fi done Thanks for your consideration. --=20 You are receiving this mail because: You are the assignee for the bug.= From owner-freebsd-pkg@freebsd.org Thu Sep 24 10:42:32 2020 Return-Path: Delivered-To: freebsd-pkg@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 091D63F37C1 for ; Thu, 24 Sep 2020 10:42:32 +0000 (UTC) (envelope-from yigithanbilge@sabanciuniv.edu) Received: from mail-qk1-x731.google.com (mail-qk1-x731.google.com [IPv6:2607:f8b0:4864:20::731]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Bxs7V6hV4z4HGN for ; Thu, 24 Sep 2020 10:42:30 +0000 (UTC) (envelope-from yigithanbilge@sabanciuniv.edu) Received: by mail-qk1-x731.google.com with SMTP id f142so2705724qke.13 for ; Thu, 24 Sep 2020 03:42:30 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sabanciuniv-edu.20150623.gappssmtp.com; s=20150623; h=mime-version:from:date:message-id:subject:to; bh=o48rrDD5mneOxpLkPr86IJh5tVR75O4xt7Zk88+U9Q8=; b=QDDExAvF438mnRddm7LJEJfJF+9lCY5lfRpx0G4GbFxsJFYmFF+d/J52FxiM8v50Kw zcpVPEKDIfGPfjvC+LvF0UsQfVlhwZN+hwYueRBd54ap1bWSKxx567U8v3DJu5P0Viop KMzHkOBha+bpRaodF8D38oQzhUdvBc1nsiPotQsUjEKlLygWiaLl+ZVOa2tFsHOIP85S KBU2uCM52XWTjmRLmJjRGyWpgX8zNN+gRhky7IEsrQrv+KQTGBOp48A3lv6inAJvyE/Y UmFsyccSWHl/7aNY0hTGrLhEKVfmSYQyTgM7EKVq4AfQF5h47jU0dFPVtQ0qOJwDEeqK A6iw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=o48rrDD5mneOxpLkPr86IJh5tVR75O4xt7Zk88+U9Q8=; b=lg2n5qaW8H3nPtMqC338iTcou37jaXc/wLOUvr9wl/yc8VDDzr+w89ltqBfccl6AbM LJjvmqTf3dCZmGItVVKPNH3ido1DRsAs0vP7Ki8MaSPx9Qt08iCS46UojP+ciAtPQFKJ PPYayKo5AtftlV+2Zv6TaX6HKR/lGI9Sazvv0Q3QTC+ij0jNCaXDQ/++kzt6gX+s3QRN 3q2/+OqlemXlhXysUna+U3dvw+1DS8VacDVf3Hd64PmmHkBuySWD6OfHtimYMQKw+sO0 +1E85Q6YnP+uroBA+SFahXYnlFOySNSgF+ELuvpuG2mJVaUtzheGggQB/qKbAzGYlB8e JKQw== X-Gm-Message-State: AOAM532OsZ4aVTluIvaYN5XgjQ6FmC0jba74KPAMldMU2qEYc9JjEzwr Rr6wxdJcGvDajhWwV8z1ud/fltjOGlQaL2CJQpbL74sUJ5o4jw== X-Google-Smtp-Source: ABdhPJzkh2cQv5qFYuLAuh+yWOWKW4zZMnM11HVO00TGqdfOQJTd3SdGAkZzYEdjmyVZQKkuPJnL6WAFseGa4jv5Qzc= X-Received: by 2002:a37:4cc9:: with SMTP id z192mr4046233qka.364.1600944149538; Thu, 24 Sep 2020 03:42:29 -0700 (PDT) MIME-Version: 1.0 From: "Yigithan Bilge (Student)" Date: Thu, 24 Sep 2020 13:42:41 +0300 Message-ID: Subject: FreeBSD OpenVAS Configuration To: freebsd-pkg@freebsd.org Content-Type: multipart/mixed; boundary="00000000000056de3905b00cdb48" X-Rspamd-Queue-Id: 4Bxs7V6hV4z4HGN X-Spamd-Bar: / Authentication-Results: mx1.freebsd.org; dkim=pass header.d=sabanciuniv-edu.20150623.gappssmtp.com header.s=20150623 header.b=QDDExAvF; dmarc=none; spf=pass (mx1.freebsd.org: domain of yigithanbilge@sabanciuniv.edu designates 2607:f8b0:4864:20::731 as permitted sender) smtp.mailfrom=yigithanbilge@sabanciuniv.edu X-Spamd-Result: default: False [-0.75 / 15.00]; RCVD_TLS_ALL(0.00)[]; ARC_NA(0.00)[]; R_DKIM_ALLOW(-0.20)[sabanciuniv-edu.20150623.gappssmtp.com:s=20150623]; NEURAL_HAM_MEDIUM(-0.96)[-0.959]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36]; HAS_ATTACHMENT(0.00)[]; MIME_GOOD(-0.10)[multipart/mixed,multipart/alternative,text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-pkg@freebsd.org]; MIME_BASE64_TEXT_BOGUS(1.00)[]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_LONG(-0.99)[-0.993]; TO_DN_NONE(0.00)[]; DKIM_TRACE(0.00)[sabanciuniv-edu.20150623.gappssmtp.com:+]; MIME_BASE64_TEXT(0.10)[]; CTYPE_MIXED_BOGUS(1.00)[]; RCVD_IN_DNSWL_NONE(0.00)[2607:f8b0:4864:20::731:from]; NEURAL_HAM_SHORT(-0.39)[-0.394]; DMARC_NA(0.00)[sabanciuniv.edu]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:+,3:~,4:+]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; RCVD_COUNT_TWO(0.00)[2]; MAILMAN_DEST(0.00)[freebsd-pkg] X-Content-Filtered-By: Mailman/MimeDel 2.1.33 X-BeenThere: freebsd-pkg@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Binary package management and package tools discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 24 Sep 2020 10:42:32 -0000 --00000000000056de3905b00cdb48 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Hey, I currently work on a project to scan a network and find vulnerabilities which has to be on FreeBSD. So, as a first step, I installed packages of openvas9 and scanned the network by using the web interface. There is also a server on ubuntu to see what openvas will find. On the report, there is a vulnerability called =E2=80=9CReport outdated / end-of-life Scan Engine / Environment (local)=E2=80=9D which makes me think= the system isn=E2=80=99t working quite well since the server has apache2 and op= en port 80 HTTP but couldn=E2=80=99t tell any of these as a vulnerability. There is also a part on the report as: Vulnerability Detection Result: Installed GVM Libraries (gvm-libs) version: 9.0.1 Latest available GVM Libraries (gvm-libs) version: 10.0.2 I couldn=E2=80=99t update this gvm library, and I couldn=E2=80=99t even fin= d this library to update in the list of packages. All conversations and videos are on Kali or etc. I have got in touch with the greenbone community and got thia reply *"Greenbone is not in charge for your version of our software. Therefore you should contact the provider of your packages (most likely your distribution) and create a request for updated packages."* I also add the report, I hope someone can help me to solve the errors I mentioned in the upper text. Sorry if I wrote something unnecessary or irrelevant with this page, I am a student and quite new in this field. Thank you --00000000000056de3905b00cdb48 Content-Type: text/plain; charset="US-ASCII"; name="openVAS report- FandVDU all ip block.txt" Content-Disposition: attachment; filename="openVAS report- FandVDU all ip block.txt" Content-Transfer-Encoding: base64 Content-ID: X-Attachment-Id: f_kfgot8tq0 SSBTdW1tYXJ5Cj09PT09PT09PQoKVGhpcyBkb2N1bWVudCByZXBvcnRzIG9uIHRoZSByZXN1bHRz IG9mIGFuIGF1dG9tYXRpYyBzZWN1cml0eSBzY2FuLgpUaGUgcmVwb3J0IGZpcnN0IHN1bW1hcmlz ZXMgdGhlIHJlc3VsdHMgZm91bmQuClRoZW4sIGZvciBlYWNoIGhvc3QsIHRoZSByZXBvcnQgZGVz Y3JpYmVzIGV2ZXJ5IGlzc3VlIGZvdW5kLgpQbGVhc2UgY29uc2lkZXIgdGhlIGFkdmljZSBnaXZl biBpbiBlYWNoIGRlc2NyaXB0aW9uLCBpbiBvcmRlciB0byByZWN0aWZ5CnRoZSBpc3N1ZS4KCkFs bCBkYXRlcyBhcmUgZGlzcGxheWVkIHVzaW5nIHRoZSB0aW1lem9uZSAiQ29vcmRpbmF0ZWQgVW5p dmVyc2FsIFRpbWUiLAp3aGljaCBpcyBhYmJyZXZpYXRlZCAiVVRDIi4KClZlbmRvciBzZWN1cml0 eSB1cGRhdGVzIGFyZSBub3QgdHJ1c3RlZC4KCk92ZXJyaWRlcyBhcmUgb24uICBXaGVuIGEgcmVz dWx0IGhhcyBhbiBvdmVycmlkZSwgdGhpcyByZXBvcnQgdXNlcyB0aGUKdGhyZWF0IG9mIHRoZSBv dmVycmlkZS4KCk5vdGVzIGFyZSBpbmNsdWRlZCBpbiB0aGUgcmVwb3J0LkluZm9ybWF0aW9uIG9u IG92ZXJyaWRlcyBpcyBpbmNsdWRlZCBpbiB0aGUgcmVwb3J0LgoKVGhpcyByZXBvcnQgbWlnaHQg bm90IHNob3cgZGV0YWlscyBvZiBhbGwgaXNzdWVzIHRoYXQgd2VyZSBmb3VuZC4KSXQgb25seSBs aXN0cyBob3N0cyB0aGF0IHByb2R1Y2VkIGlzc3Vlcy4KSXNzdWVzIHdpdGggdGhlIHRocmVhdCBs ZXZlbCAiTG9nIiBhcmUgbm90IHNob3duLgpJc3N1ZXMgd2l0aCB0aGUgdGhyZWF0IGxldmVsICJE ZWJ1ZyIgYXJlIG5vdCBzaG93bi4KSXNzdWVzIHdpdGggdGhlIHRocmVhdCBsZXZlbCAiRmFsc2Ug UG9zaXRpdmUiIGFyZSBub3Qgc2hvd24uCk9ubHkgcmVzdWx0cyB3aXRoIGEgbWluaW11bSBRb0Qg b2YgNzAgYXJlIHNob3duLgoKVGhpcyByZXBvcnQgY29udGFpbnMgYWxsIDEyIHJlc3VsdHMgc2Vs ZWN0ZWQgYnkgdGhlCmZpbHRlcmluZyBkZXNjcmliZWQgYWJvdmUuICBCZWZvcmUgZmlsdGVyaW5n IHRoZXJlIHdlcmUgMjkzIHJlc3VsdHMuCgpTY2FuIHN0YXJ0ZWQ6IApTY2FuIGVuZGVkOiAgIApU YXNrOiAgICAgICAgIFNlcnZlciBTY2FubmluZyAtIEFwYWNoZTIKCkhvc3QgU3VtbWFyeQoqKioq KioqKioqKioKCkhvc3QgICAgICAgICAgICBIaWdoICBNZWRpdW0gIExvdyAgTG9nICBGYWxzZSBQ b3NpdGl2ZQoxNzIuMjAuMTAuMiAgICAgICAgMiAgICAgICAwICAgIDAgICAgMCAgICAgICAgICAg ICAgIDAKMTcyLjIwLjEwLjQgICAgICAgIDIgICAgICAgMCAgICAwICAgIDAgICAgICAgICAgICAg ICAwCjE3Mi4yMC4xMC4xMiAgICAgICAyICAgICAgIDAgICAgMCAgICAwICAgICAgICAgICAgICAg MAoxNzIuMjAuMTAuMTEgICAgICAgMiAgICAgICAwICAgIDAgICAgMCAgICAgICAgICAgICAgIDAK MTcyLjIwLjEwLjggICAgICAgIDIgICAgICAgMCAgICAwICAgIDAgICAgICAgICAgICAgICAwCjE3 Mi4yMC4xMC4xICAgICAgICAyICAgICAgIDAgICAgMCAgICAwICAgICAgICAgICAgICAgMApUb3Rh bDogNiAgICAgICAgICAxMiAgICAgICAwICAgIDAgICAgMCAgICAgICAgICAgICAgIDAKCgpJSSBS ZXN1bHRzIHBlciBIb3N0Cj09PT09PT09PT09PT09PT09PT0KCkhvc3QgMTcyLjIwLjEwLjIKKioq KioqKioqKioqKioqKgoKU2Nhbm5pbmcgb2YgdGhpcyBob3N0IHN0YXJ0ZWQgYXQ6IApOdW1iZXIg b2YgcmVzdWx0czogMgoKUG9ydCBTdW1tYXJ5IGZvciBIb3N0IDE3Mi4yMC4xMC4yCi0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLQoKU2VydmljZSAoUG9ydCkgICAgICAgICAgVGhyZWF0 IExldmVsCmdlbmVyYWwvdGNwICAgICAgICAgICAgIEhpZ2gKZ2VuZXJhbC90Y3AgICAgICAgICAg ICAgSGlnaApnZW5lcmFsL3RjcCAgICAgICAgICAgICBIaWdoCmdlbmVyYWwvdGNwICAgICAgICAg ICAgIEhpZ2gKZ2VuZXJhbC90Y3AgICAgICAgICAgICAgSGlnaApnZW5lcmFsL3RjcCAgICAgICAg ICAgICBIaWdoCgpTZWN1cml0eSBJc3N1ZXMgZm9yIEhvc3QgMTcyLjIwLjEwLjIKLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tCgpJc3N1ZQotLS0tLQpOVlQ6ICAgIFJlcG9ydCBv dXRkYXRlZCAvIGVuZC1vZi1saWZlIFNjYW4gRW5naW5lIC8gRW52aXJvbm1lbnQgKGxvY2FsKQpP SUQ6ICAgIDEuMy42LjEuNC4xLjI1NjIzLjEuMC4xMDg1NjAKVGhyZWF0OiBIaWdoIChDVlNTOiAx MC4wKQpQb3J0OiAgIGdlbmVyYWwvdGNwCgpTdW1tYXJ5OgpUaGlzIHNjcmlwdCBjaGVja3MgYW5k IHJlcG9ydHMgYW4gb3V0ZGF0ZWQgb3IgZW5kLW9mLWxpZmUgc2NhbiBlbmdpbmUKICBmb3IgdGhl IGZvbGxvd2luZyBlbnZpcm9ubWVudHM6CiAgLSBHcmVlbmJvbmUgU291cmNlIEVkaXRpb24gKEdT RSkKICAtIEdyZWVuYm9uZSBDb21tdW5pdHkgRWRpdGlvbiAoR0NFKQogIHVzZWQgZm9yIHRoaXMg c2Nhbi4KICBOT1RFOiBXaGlsZSB0aGlzIGlzIG5vdCwgaW4gYW5kIG9mIGl0c2VsZiwgYSBzZWN1 cml0eSB2dWxuZXJhYmlsaXR5LCBhIHNldmVyaXQhCnkgaXMgcmVwb3J0ZWQgdG8gbWFrZSB5b3Ug YXdhcmUKICBvZiBhIHBvc3NpYmxlIGRlY3JlYXNlZCBzY2FuIGNvdmVyYWdlIG9yIG1pc3Npbmcg ZGV0ZWN0aW9uIG9mIHZ1bG5lcmFiaWxpdGllcyAhCm9uIHRoZSB0YXJnZXQgZHVlIHRvIGUuZy46 CiAgLSBtaXNzaW5nIGZ1bmN0aW9uYWxpdGllcwogIC0gbWlzc2luZyBidWdmaXhlcwogIC0gaW5j b21wYXRpYmlsaXRpZXMgd2l0aGluIHRoZSBmZWVkLgoKVnVsbmVyYWJpbGl0eSBEZXRlY3Rpb24g UmVzdWx0OgpJbnN0YWxsZWQgR1ZNIExpYnJhcmllcyAoZ3ZtLWxpYnMpIHZlcnNpb246ICAgICAg ICA5LjAuMQpMYXRlc3QgYXZhaWxhYmxlIEdWTSBMaWJyYXJpZXMgKGd2bS1saWJzKSB2ZXJzaW9u OiAxMC4wLjIKUmVmZXJlbmNlIFVSTChzKSBmb3IgdGhlIGxhdGVzdCBhdmFpbGFibGUgdmVyc2lv bjogaHR0cHM6Ly9jb21tdW5pdHkuZ3JlZW5ib25lLm4hCmV0L3QvZ3ZtLTExLXN0YWJsZS1pbml0 aWFsLXJlbGVhc2UtMjAxOS0xMC0xNC8zNjc0IC8gaHR0cHM6Ly9jb21tdW5pdHkuZ3JlZW5ib25l IQoubmV0L3QvZ3ZtLTEwLW9sZC1zdGFibGUtaW5pdGlhbC1yZWxlYXNlLTIwMTktMDQtMDUvMjA4 CgpTb2x1dGlvbjoKU29sdXRpb24gdHlwZTogVmVuZG9yRml4ClVwZGF0ZSB0byB0aGUgbGF0ZXN0 IGF2YWlsYWJsZSBzdGFibGUgcmVsZWFzZSBmb3IgeW91ciBzY2FuIGVudmlyb25tZW50LiBQbGVh c2UgIQpjaGVjayB0aGUKICByZWZlcmVuY2VzIGZvciBtb3JlIGluZm9ybWF0aW9uLiBJZiB5b3Un cmUgdXNpbmcgcGFja2FnZXMgcHJvdmlkZWQgYnkgeW91ciBMaW4hCnV4IGRpc3RyaWJ1dGlvbiBw bGVhc2UgY29udGFjdCB0aGUgbWFpbnRhaW5lcgogIG9mIHRoZSB1c2VkIGRpc3RyaWJ1dGlvbiAv IHJlcG9zaXRvcnkgYW5kIHJlcXVlc3QgdXBkYXRlZCBwYWNrYWdlcy4KICBJZiB5b3Ugd2FudCB0 byBhY2NlcHQgdGhlIHJpc2sgb2YgYSBwb3NzaWJsZSBkZWNyZWFzZWQgc2NhbiBjb3ZlcmFnZSBv ciBtaXNzaW4hCmcgZGV0ZWN0aW9uIG9mIHZ1bG5lcmFiaWxpdGllcyBvbiB0aGUgdGFyZ2V0IHlv dQogIGNhbiBzZXQgYSBnbG9iYWwgb3ZlcnJpZGUgZm9yIHRoaXMgc2NyaXB0IGFzIGRlc2NyaWJl ZCBpbiB0aGUgbGlua2VkIG1hbnVhbHMuCgpWdWxuZXJhYmlsaXR5IERldGVjdGlvbiBNZXRob2Q6 CkRldGFpbHM6ClJlcG9ydCBvdXRkYXRlZCAvIGVuZC1vZi1saWZlIFNjYW4gRW5naW5lIC8gRW52 aXJvbm1lbnQgKGxvY2FsKQooT0lEOiAxLjMuNi4xLjQuMS4yNTYyMy4xLjAuMTA4NTYwKQpWZXJz aW9uIHVzZWQ6IDIwMjAtMDYtMTBUMTM6MjQ6MjArMDAwMAoKUmVmZXJlbmNlczoKT3RoZXI6CiAg ICBodHRwczovL3d3dy5ncmVlbmJvbmUubmV0L2VuL2luc3RhbGxfdXNlX2djZS8KICAgIGh0dHBz Oi8vY29tbXVuaXR5LmdyZWVuYm9uZS5uZXQvdC9ndm0tOS1lbmQtb2YtbGlmZS1pbml0aWFsLXJl bGVhc2UtMjAxNy0wMy0wNy8yMTEKICAgIGh0dHBzOi8vY29tbXVuaXR5LmdyZWVuYm9uZS5uZXQv dC9ndm0tMTAtb2xkLXN0YWJsZS1pbml0aWFsLXJlbGVhc2UtMjAxOS0wNC0wNS8yMDgKICAgIGh0 dHBzOi8vY29tbXVuaXR5LmdyZWVuYm9uZS5uZXQvdC9ndm0tMTEtc3RhYmxlLWluaXRpYWwtcmVs ZWFzZS0yMDE5LTEwLTE0LzM2NzQKICAgIGh0dHBzOi8vZG9jcy5ncmVlbmJvbmUubmV0L0dTTS1N YW51YWwvZ29zLTQvZW4vcmVwb3J0cy5odG1sI2NyZWF0aW5nLWFuLW92ZXJyaWRlCiAgICBodHRw czovL2RvY3MuZ3JlZW5ib25lLm5ldC9HU00tTWFudWFsL2dvcy01L2VuL3JlcG9ydHMuaHRtbCNj cmVhdGluZy1hbi1vdmVycmlkZQogICAgaHR0cHM6Ly9kb2NzLmdyZWVuYm9uZS5uZXQvR1NNLU1h bnVhbC9nb3MtNi9lbi9yZXBvcnRzLmh0bWwjY3JlYXRpbmctYW4tb3ZlcnJpZGUKCgpJc3N1ZQot LS0tLQpOVlQ6ICAgIEltcG9ydGFudCBBbm5vdW5jZW1lbnQKT0lEOiAgICAxLjMuNi4xLjQuMS4y NTYyMy4xLjAuOTk5OTk4ClRocmVhdDogSGlnaCAoQ1ZTUzogMTAuMCkKUG9ydDogICBnZW5lcmFs L3RjcAoKU3VtbWFyeToKQVRURU5USU9OOgpZb3VyIHZ1bG5lcmFiaWxpdHkgdGVzdHMgYXJlIG91 dCBvZiBtYWludGVuYW5jZSBhbmQgbm90IHVwZGF0ZWQgc2luY2UgU2VwdGVtYmVyICEKMXN0IDIw MjAuIFlvdXIgc2V0dXAgb2YgR3JlZW5ib25lIFNvdXJjZSBFZGl0aW9uIHdpbGwgbm90IHJlcG9y dCBhYm91dCBhbnkgbmV3IHQhCmhyZWF0cyBpbiB5b3VyIHNjYW5uZWQgZW52aXJvbm1lbnQgc2lu Y2UgdGhpcyBkYXRlIQpSRUFTT046CllvdXIgR3JlZW5ib25lIHNldHVwIGlzIGNvbm5lY3RlZCB0 byBhIGRpc2NvbnRpbnVlZCBkb3dubG9hZCBzZXJ2ZXIgb2YgdGhlIEdyZWVuIQpib25lIENvbW11 bml0eSBGZWVkLiBUaGUgR3JlZW5ib25lIENvbW11bml0eSBGZWVkIGlzIHN0aWxsIGF2YWlsYWJs ZSB2aWEgYSBuZXcgZCEKb3dubG9hZCBzZXJ2ZXIuIFRoZSBkaXNjb250aW51YXRpb24gYW5ub3Vu Y2VtZW50IHdhcyBwb3N0ZWQgb24gTWF5IDEzdGggYXQgdGhlIEchCnJlZW5ib25lIENvbW11bml0 eSBQb3J0YWwuClNPTFVUSU9OOgpZb3UgY2FuIGNvbnNpZGVyIHRvIHVwZ3JhZGUgeW91ciBzZXR1 cCB0byBhIEdyZWVuYm9uZSBlbnRlcnByaXNlIHByb2R1Y3Qgd2hpY2ggYSEKbHNvIHByb3ZpZGVz IHlvdSB0aGUgZnVsbCBzY2FuIGNvdmVyYWdlIHZpYSBHcmVlbmJvbmUgU2VjdXJpdHkgRmVlZCAo c2VlIFBST0ZFU1MhCklPTkFMIFNPTFVUSU9OKS4gQWx0ZXJuYXRpdmVseSB5b3UgY2FuIGNvbnRp bnVlIHdpdGggdGhlIEdyZWVuYm9uZSBDb21tdW5pdHkgRmVlIQpkIChzZWUgRlJFRSBDT01NVU5J VFkgU09MVVRJT04pLgpQUk9GRVNTSU9OQUwgU09MVVRJT04gKFVwZ3JhZGluZyB0byBmdWxsIGNv dmVyYWdlIHNjYW5uaW5nKQpXZSBhcmUgaGFwcHkgdGhhdCBvdXIgdGVjaG5vbG9neSBhbHJlYWR5 IHRvZGF5IGhlbHBzIHlvdSB0byByZWR1Y2UgdGhlIGF0dGFjayBzdSEKcmZhY2Ugb2YgeW91ciBj b3Jwb3JhdGUgSVQgaW5mcmFzdHJ1Y3R1cmUuIE91ciBlbnRlcnByaXNlIHByb2R1Y3RzIGNsb3Nl IGJsaW5kIHMhCnBvdHMgb2YgdGhlIGNvbW11bml0eSBmZWVkIGFuZCBnaXZlIGFjY2VzcyB0byBH cmVlbmJvbmUgc2VydmljZSBkZXNrLgpQbGVhc2UgY29udGFjdAp1cGdyYWRlQGdyZWVuYm9uZS5u ZXQKYW5kIHByb3ZpZGUgdGhlIGZvbGxvd2luZyBkZXRhaWxzICh1c2UgY29weSZwYXN0ZSkuIFBs ZWFzZSB1bmRlcnN0YW5kIHRoYXQgd2Ugd2khCmxsIG5vdCByZXBseSB0byB5b3UgaWYgeW91IGRv IG5vdCBwcm92aWRlIGFsbCB0aGUgZGV0YWlscy4KICAtIENvbXBhbnkgbmFtZToKICAtIENvbXBh bnkgaG9tZXBhZ2U6CiAgLSBZb3VyIG5hbWU6CiAgLSBZb3VyIHBvc2l0aW9uIGluIHRoZSBjb21w YW55OgogIC0gVGhlIG51bWJlciBvZiBJUCBhZGRyZXNzZXMgeW91IGFyZSBzY2FubmluZyB3aXRo IEdyZWVuYm9uZSAoY2EuKToKICAtIFRoZSBudW1iZXIgb2Ygc2Nhbm5lciBpbnN0YW5jZXMgeW91 IGFyZSB1c2luZyB0byBzY2FuOgogIC0gQXJlIHlvdSB1c2luZyBhIG1hc3Rlci1zZW5zb3IgY29u ZmlndXJhdGlvbjogeWVzL25vCkZlZWwgZnJlZSB0byBhZGQgYW55IGFkZGl0aW9uYWwgaW5mb3Jt YXRpb24geW91IHJlZ2FyZCBoZWxwZnVsIHRvIHVuZGVyc3RhbmQgeW91IQpyIHNldHVwLgpPdXIg dGVhbSB3aWxsIHJlY29tbWVuZCB0byB5b3UgYSBzdWl0YWJsZSBjb21tZXJjaWFsIG9wdGlvbi4g V2UgYXJlIGhhcHB5IHRvIGRpcyEKY3VzcyBsYXJnZXIgc2V0dXBzIGluIGRpcmVjdCBjb21tdW5p Y2F0aW9uLgpZb3UgY2FuIGluZm9ybSB5b3Vyc2VsZiBhYm91dCBvdXIgc3RhbmRhcmQgcHJvZHVj dHMgaGVyZToKaHR0cHM6Ly93d3cuZ3JlZW5ib25lLm5ldC9lbi9wcm9kdWN0cy1zb2x1dGlvbnMv CkZSRUUgQ09NTVVOSVRZIFNPTFVUSU9OOiBDb250aW51ZSBzY2FubmluZyB3aXRoIGNvbW11bml0 eSBmZWVkClRoZSBHcmVlbmJvbmUgQ29tbXVuaXR5IEZlZWQgaXMgc3RpbGwgYXZhaWxhYmxlIGFu ZCB1cGRhdGVkIGRhaWx5LiBZb3UgbWF5IGhhdmUgIQpqdXN0IG1pc3NlZCB0aGUgdGVjaG5pY2Fs IG5vdGVzIGFuZCBhbm5vdW5jZW1lbnQgaGVyZToKaHR0cHM6Ly9jb21tdW5pdHkuZ3JlZW5ib25l Lm5ldC90L2NvbW11bml0eS1mZWVkLXVybC1jb25zb2xpZGF0aW9uLzUzMzgKClZ1bG5lcmFiaWxp dHkgRGV0ZWN0aW9uIFJlc3VsdDoKQVRURU5USU9OOgpZb3VyIHZ1bG5lcmFiaWxpdHkgdGVzdHMg YXJlIG91dCBvZiBtYWludGVuYW5jZSBhbmQgbm90IHVwZGF0ZWQgc2luY2UgU2VwdGVtYmVyICEK MXN0IDIwMjAuIFlvdXIgc2V0dXAgb2YgR3JlZW5ib25lIFNvdXJjZSBFZGl0aW9uIHdpbGwgbm90 IHJlcG9ydCBhYm91dCBhbnkgbmV3IHQhCmhyZWF0cyBpbiB5b3VyIHNjYW5uZWQgZW52aXJvbm1l bnQgc2luY2UgdGhpcyBkYXRlIQpSRUFTT046CllvdXIgR3JlZW5ib25lIHNldHVwIGlzIGNvbm5l Y3RlZCB0byBhIGRpc2NvbnRpbnVlZCBkb3dubG9hZCBzZXJ2ZXIgb2YgdGhlIEdyZWVuIQpib25l IENvbW11bml0eSBGZWVkLiBUaGUgR3JlZW5ib25lIENvbW11bml0eSBGZWVkIGlzIHN0aWxsIGF2 YWlsYWJsZSB2aWEgYSBuZXcgZCEKb3dubG9hZCBzZXJ2ZXIuIFRoZSBkaXNjb250aW51YXRpb24g YW5ub3VuY2VtZW50IHdhcyBwb3N0ZWQgb24gTWF5IDEzdGggYXQgdGhlIEchCnJlZW5ib25lIENv bW11bml0eSBQb3J0YWwuClNPTFVUSU9OOgpZb3UgY2FuIGNvbnNpZGVyIHRvIHVwZ3JhZGUgeW91 ciBzZXR1cCB0byBhIEdyZWVuYm9uZSBlbnRlcnByaXNlIHByb2R1Y3Qgd2hpY2ggYSEKbHNvIHBy b3ZpZGVzIHlvdSB0aGUgZnVsbCBzY2FuIGNvdmVyYWdlIHZpYSBHcmVlbmJvbmUgU2VjdXJpdHkg RmVlZCAoc2VlIFBST0ZFU1MhCklPTkFMIFNPTFVUSU9OKS4gQWx0ZXJuYXRpdmVseSB5b3UgY2Fu IGNvbnRpbnVlIHdpdGggdGhlIEdyZWVuYm9uZSBDb21tdW5pdHkgRmVlIQpkIChzZWUgRlJFRSBD T01NVU5JVFkgU09MVVRJT04pLgpQUk9GRVNTSU9OQUwgU09MVVRJT04gKFVwZ3JhZGluZyB0byBm dWxsIGNvdmVyYWdlIHNjYW5uaW5nKQpXZSBhcmUgaGFwcHkgdGhhdCBvdXIgdGVjaG5vbG9neSBh bHJlYWR5IHRvZGF5IGhlbHBzIHlvdSB0byByZWR1Y2UgdGhlIGF0dGFjayBzdSEKcmZhY2Ugb2Yg eW91ciBjb3Jwb3JhdGUgSVQgaW5mcmFzdHJ1Y3R1cmUuIE91ciBlbnRlcnByaXNlIHByb2R1Y3Rz IGNsb3NlIGJsaW5kIHMhCnBvdHMgb2YgdGhlIGNvbW11bml0eSBmZWVkIGFuZCBnaXZlIGFjY2Vz cyB0byBHcmVlbmJvbmUgc2VydmljZSBkZXNrLgpQbGVhc2UgY29udGFjdAp1cGdyYWRlQGdyZWVu Ym9uZS5uZXQKYW5kIHByb3ZpZGUgdGhlIGZvbGxvd2luZyBkZXRhaWxzICh1c2UgY29weSZwYXN0 ZSkuIFBsZWFzZSB1bmRlcnN0YW5kIHRoYXQgd2Ugd2khCmxsIG5vdCByZXBseSB0byB5b3UgaWYg eW91IGRvIG5vdCBwcm92aWRlIGFsbCB0aGUgZGV0YWlscy4KICAtIENvbXBhbnkgbmFtZToKICAt IENvbXBhbnkgaG9tZXBhZ2U6CiAgLSBZb3VyIG5hbWU6CiAgLSBZb3VyIHBvc2l0aW9uIGluIHRo ZSBjb21wYW55OgogIC0gVGhlIG51bWJlciBvZiBJUCBhZGRyZXNzZXMgeW91IGFyZSBzY2Fubmlu ZyB3aXRoIEdyZWVuYm9uZSAoY2EuKToKICAtIFRoZSBudW1iZXIgb2Ygc2Nhbm5lciBpbnN0YW5j ZXMgeW91IGFyZSB1c2luZyB0byBzY2FuOgogIC0gQXJlIHlvdSB1c2luZyBhIG1hc3Rlci1zZW5z b3IgY29uZmlndXJhdGlvbjogeWVzL25vCkZlZWwgZnJlZSB0byBhZGQgYW55IGFkZGl0aW9uYWwg aW5mb3JtYXRpb24geW91IHJlZ2FyZCBoZWxwZnVsIHRvIHVuZGVyc3RhbmQgeW91IQpyIHNldHVw LgpPdXIgdGVhbSB3aWxsIHJlY29tbWVuZCB0byB5b3UgYSBzdWl0YWJsZSBjb21tZXJjaWFsIG9w dGlvbi4gV2UgYXJlIGhhcHB5IHRvIGRpcyEKY3VzcyBsYXJnZXIgc2V0dXBzIGluIGRpcmVjdCBj b21tdW5pY2F0aW9uLgpZb3UgY2FuIGluZm9ybSB5b3Vyc2VsZiBhYm91dCBvdXIgc3RhbmRhcmQg cHJvZHVjdHMgaGVyZToKaHR0cHM6Ly93d3cuZ3JlZW5ib25lLm5ldC9lbi9wcm9kdWN0cy1zb2x1 dGlvbnMvCkZSRUUgQ09NTVVOSVRZIFNPTFVUSU9OOiBDb250aW51ZSBzY2FubmluZyB3aXRoIGNv bW11bml0eSBmZWVkClRoZSBHcmVlbmJvbmUgQ29tbXVuaXR5IEZlZWQgaXMgc3RpbGwgYXZhaWxh YmxlIGFuZCB1cGRhdGVkIGRhaWx5LiBZb3UgbWF5IGhhdmUgIQpqdXN0IG1pc3NlZCB0aGUgdGVj aG5pY2FsIG5vdGVzIGFuZCBhbm5vdW5jZW1lbnQgaGVyZToKaHR0cHM6Ly9jb21tdW5pdHkuZ3Jl ZW5ib25lLm5ldC90L2NvbW11bml0eS1mZWVkLXVybC1jb25zb2xpZGF0aW9uLzUzMzgKClZ1bG5l cmFiaWxpdHkgRGV0ZWN0aW9uIE1ldGhvZDoKRGV0YWlsczoKSW1wb3J0YW50IEFubm91bmNlbWVu dAooT0lEOiAxLjMuNi4xLjQuMS4yNTYyMy4xLjAuOTk5OTk4KQpWZXJzaW9uIHVzZWQ6IDIwMjAt MDctMTRUMTE6MzE6NDgrMDAwMAoKUmVmZXJlbmNlczoKT3RoZXI6CiAgICBodHRwczovL2NvbW11 bml0eS5ncmVlbmJvbmUubmV0L3QvY29tbXVuaXR5LWZlZWQtdXJsLWNvbnNvbGlkYXRpb24vNTMz OAoKCkhvc3QgMTcyLjIwLjEwLjQKKioqKioqKioqKioqKioqKgoKU2Nhbm5pbmcgb2YgdGhpcyBo b3N0IHN0YXJ0ZWQgYXQ6IApOdW1iZXIgb2YgcmVzdWx0czogMgoKUG9ydCBTdW1tYXJ5IGZvciBI b3N0IDE3Mi4yMC4xMC40Ci0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLQoKU2Vydmlj ZSAoUG9ydCkgICAgICAgICAgVGhyZWF0IExldmVsCmdlbmVyYWwvdGNwICAgICAgICAgICAgIEhp Z2gKZ2VuZXJhbC90Y3AgICAgICAgICAgICAgSGlnaApnZW5lcmFsL3RjcCAgICAgICAgICAgICBI aWdoCmdlbmVyYWwvdGNwICAgICAgICAgICAgIEhpZ2gKZ2VuZXJhbC90Y3AgICAgICAgICAgICAg SGlnaApnZW5lcmFsL3RjcCAgICAgICAgICAgICBIaWdoCgpTZWN1cml0eSBJc3N1ZXMgZm9yIEhv c3QgMTcyLjIwLjEwLjQKLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tCgpJc3N1 ZQotLS0tLQpOVlQ6ICAgIFJlcG9ydCBvdXRkYXRlZCAvIGVuZC1vZi1saWZlIFNjYW4gRW5naW5l IC8gRW52aXJvbm1lbnQgKGxvY2FsKQpPSUQ6ICAgIDEuMy42LjEuNC4xLjI1NjIzLjEuMC4xMDg1 NjAKVGhyZWF0OiBIaWdoIChDVlNTOiAxMC4wKQpQb3J0OiAgIGdlbmVyYWwvdGNwCgpTdW1tYXJ5 OgpUaGlzIHNjcmlwdCBjaGVja3MgYW5kIHJlcG9ydHMgYW4gb3V0ZGF0ZWQgb3IgZW5kLW9mLWxp ZmUgc2NhbiBlbmdpbmUKICBmb3IgdGhlIGZvbGxvd2luZyBlbnZpcm9ubWVudHM6CiAgLSBHcmVl bmJvbmUgU291cmNlIEVkaXRpb24gKEdTRSkKICAtIEdyZWVuYm9uZSBDb21tdW5pdHkgRWRpdGlv biAoR0NFKQogIHVzZWQgZm9yIHRoaXMgc2Nhbi4KICBOT1RFOiBXaGlsZSB0aGlzIGlzIG5vdCwg aW4gYW5kIG9mIGl0c2VsZiwgYSBzZWN1cml0eSB2dWxuZXJhYmlsaXR5LCBhIHNldmVyaXQhCnkg aXMgcmVwb3J0ZWQgdG8gbWFrZSB5b3UgYXdhcmUKICBvZiBhIHBvc3NpYmxlIGRlY3JlYXNlZCBz Y2FuIGNvdmVyYWdlIG9yIG1pc3NpbmcgZGV0ZWN0aW9uIG9mIHZ1bG5lcmFiaWxpdGllcyAhCm9u IHRoZSB0YXJnZXQgZHVlIHRvIGUuZy46CiAgLSBtaXNzaW5nIGZ1bmN0aW9uYWxpdGllcwogIC0g bWlzc2luZyBidWdmaXhlcwogIC0gaW5jb21wYXRpYmlsaXRpZXMgd2l0aGluIHRoZSBmZWVkLgoK VnVsbmVyYWJpbGl0eSBEZXRlY3Rpb24gUmVzdWx0OgpJbnN0YWxsZWQgR1ZNIExpYnJhcmllcyAo Z3ZtLWxpYnMpIHZlcnNpb246ICAgICAgICA5LjAuMQpMYXRlc3QgYXZhaWxhYmxlIEdWTSBMaWJy YXJpZXMgKGd2bS1saWJzKSB2ZXJzaW9uOiAxMC4wLjIKUmVmZXJlbmNlIFVSTChzKSBmb3IgdGhl IGxhdGVzdCBhdmFpbGFibGUgdmVyc2lvbjogaHR0cHM6Ly9jb21tdW5pdHkuZ3JlZW5ib25lLm4h CmV0L3QvZ3ZtLTExLXN0YWJsZS1pbml0aWFsLXJlbGVhc2UtMjAxOS0xMC0xNC8zNjc0IC8gaHR0 cHM6Ly9jb21tdW5pdHkuZ3JlZW5ib25lIQoubmV0L3QvZ3ZtLTEwLW9sZC1zdGFibGUtaW5pdGlh bC1yZWxlYXNlLTIwMTktMDQtMDUvMjA4CgpTb2x1dGlvbjoKU29sdXRpb24gdHlwZTogVmVuZG9y Rml4ClVwZGF0ZSB0byB0aGUgbGF0ZXN0IGF2YWlsYWJsZSBzdGFibGUgcmVsZWFzZSBmb3IgeW91 ciBzY2FuIGVudmlyb25tZW50LiBQbGVhc2UgIQpjaGVjayB0aGUKICByZWZlcmVuY2VzIGZvciBt b3JlIGluZm9ybWF0aW9uLiBJZiB5b3UncmUgdXNpbmcgcGFja2FnZXMgcHJvdmlkZWQgYnkgeW91 ciBMaW4hCnV4IGRpc3RyaWJ1dGlvbiBwbGVhc2UgY29udGFjdCB0aGUgbWFpbnRhaW5lcgogIG9m IHRoZSB1c2VkIGRpc3RyaWJ1dGlvbiAvIHJlcG9zaXRvcnkgYW5kIHJlcXVlc3QgdXBkYXRlZCBw YWNrYWdlcy4KICBJZiB5b3Ugd2FudCB0byBhY2NlcHQgdGhlIHJpc2sgb2YgYSBwb3NzaWJsZSBk ZWNyZWFzZWQgc2NhbiBjb3ZlcmFnZSBvciBtaXNzaW4hCmcgZGV0ZWN0aW9uIG9mIHZ1bG5lcmFi aWxpdGllcyBvbiB0aGUgdGFyZ2V0IHlvdQogIGNhbiBzZXQgYSBnbG9iYWwgb3ZlcnJpZGUgZm9y IHRoaXMgc2NyaXB0IGFzIGRlc2NyaWJlZCBpbiB0aGUgbGlua2VkIG1hbnVhbHMuCgpWdWxuZXJh YmlsaXR5IERldGVjdGlvbiBNZXRob2Q6CkRldGFpbHM6ClJlcG9ydCBvdXRkYXRlZCAvIGVuZC1v Zi1saWZlIFNjYW4gRW5naW5lIC8gRW52aXJvbm1lbnQgKGxvY2FsKQooT0lEOiAxLjMuNi4xLjQu MS4yNTYyMy4xLjAuMTA4NTYwKQpWZXJzaW9uIHVzZWQ6IDIwMjAtMDYtMTBUMTM6MjQ6MjArMDAw MAoKUmVmZXJlbmNlczoKT3RoZXI6CiAgICBodHRwczovL3d3dy5ncmVlbmJvbmUubmV0L2VuL2lu c3RhbGxfdXNlX2djZS8KICAgIGh0dHBzOi8vY29tbXVuaXR5LmdyZWVuYm9uZS5uZXQvdC9ndm0t OS1lbmQtb2YtbGlmZS1pbml0aWFsLXJlbGVhc2UtMjAxNy0wMy0wNy8yMTEKICAgIGh0dHBzOi8v Y29tbXVuaXR5LmdyZWVuYm9uZS5uZXQvdC9ndm0tMTAtb2xkLXN0YWJsZS1pbml0aWFsLXJlbGVh c2UtMjAxOS0wNC0wNS8yMDgKICAgIGh0dHBzOi8vY29tbXVuaXR5LmdyZWVuYm9uZS5uZXQvdC9n dm0tMTEtc3RhYmxlLWluaXRpYWwtcmVsZWFzZS0yMDE5LTEwLTE0LzM2NzQKICAgIGh0dHBzOi8v ZG9jcy5ncmVlbmJvbmUubmV0L0dTTS1NYW51YWwvZ29zLTQvZW4vcmVwb3J0cy5odG1sI2NyZWF0 aW5nLWFuLW92ZXJyaWRlCiAgICBodHRwczovL2RvY3MuZ3JlZW5ib25lLm5ldC9HU00tTWFudWFs L2dvcy01L2VuL3JlcG9ydHMuaHRtbCNjcmVhdGluZy1hbi1vdmVycmlkZQogICAgaHR0cHM6Ly9k b2NzLmdyZWVuYm9uZS5uZXQvR1NNLU1hbnVhbC9nb3MtNi9lbi9yZXBvcnRzLmh0bWwjY3JlYXRp bmctYW4tb3ZlcnJpZGUKCgpJc3N1ZQotLS0tLQpOVlQ6ICAgIEltcG9ydGFudCBBbm5vdW5jZW1l bnQKT0lEOiAgICAxLjMuNi4xLjQuMS4yNTYyMy4xLjAuOTk5OTk4ClRocmVhdDogSGlnaCAoQ1ZT UzogMTAuMCkKUG9ydDogICBnZW5lcmFsL3RjcAoKU3VtbWFyeToKQVRURU5USU9OOgpZb3VyIHZ1 bG5lcmFiaWxpdHkgdGVzdHMgYXJlIG91dCBvZiBtYWludGVuYW5jZSBhbmQgbm90IHVwZGF0ZWQg c2luY2UgU2VwdGVtYmVyICEKMXN0IDIwMjAuIFlvdXIgc2V0dXAgb2YgR3JlZW5ib25lIFNvdXJj ZSBFZGl0aW9uIHdpbGwgbm90IHJlcG9ydCBhYm91dCBhbnkgbmV3IHQhCmhyZWF0cyBpbiB5b3Vy IHNjYW5uZWQgZW52aXJvbm1lbnQgc2luY2UgdGhpcyBkYXRlIQpSRUFTT046CllvdXIgR3JlZW5i b25lIHNldHVwIGlzIGNvbm5lY3RlZCB0byBhIGRpc2NvbnRpbnVlZCBkb3dubG9hZCBzZXJ2ZXIg b2YgdGhlIEdyZWVuIQpib25lIENvbW11bml0eSBGZWVkLiBUaGUgR3JlZW5ib25lIENvbW11bml0 eSBGZWVkIGlzIHN0aWxsIGF2YWlsYWJsZSB2aWEgYSBuZXcgZCEKb3dubG9hZCBzZXJ2ZXIuIFRo ZSBkaXNjb250aW51YXRpb24gYW5ub3VuY2VtZW50IHdhcyBwb3N0ZWQgb24gTWF5IDEzdGggYXQg dGhlIEchCnJlZW5ib25lIENvbW11bml0eSBQb3J0YWwuClNPTFVUSU9OOgpZb3UgY2FuIGNvbnNp ZGVyIHRvIHVwZ3JhZGUgeW91ciBzZXR1cCB0byBhIEdyZWVuYm9uZSBlbnRlcnByaXNlIHByb2R1 Y3Qgd2hpY2ggYSEKbHNvIHByb3ZpZGVzIHlvdSB0aGUgZnVsbCBzY2FuIGNvdmVyYWdlIHZpYSBH cmVlbmJvbmUgU2VjdXJpdHkgRmVlZCAoc2VlIFBST0ZFU1MhCklPTkFMIFNPTFVUSU9OKS4gQWx0 ZXJuYXRpdmVseSB5b3UgY2FuIGNvbnRpbnVlIHdpdGggdGhlIEdyZWVuYm9uZSBDb21tdW5pdHkg RmVlIQpkIChzZWUgRlJFRSBDT01NVU5JVFkgU09MVVRJT04pLgpQUk9GRVNTSU9OQUwgU09MVVRJ T04gKFVwZ3JhZGluZyB0byBmdWxsIGNvdmVyYWdlIHNjYW5uaW5nKQpXZSBhcmUgaGFwcHkgdGhh dCBvdXIgdGVjaG5vbG9neSBhbHJlYWR5IHRvZGF5IGhlbHBzIHlvdSB0byByZWR1Y2UgdGhlIGF0 dGFjayBzdSEKcmZhY2Ugb2YgeW91ciBjb3Jwb3JhdGUgSVQgaW5mcmFzdHJ1Y3R1cmUuIE91ciBl bnRlcnByaXNlIHByb2R1Y3RzIGNsb3NlIGJsaW5kIHMhCnBvdHMgb2YgdGhlIGNvbW11bml0eSBm ZWVkIGFuZCBnaXZlIGFjY2VzcyB0byBHcmVlbmJvbmUgc2VydmljZSBkZXNrLgpQbGVhc2UgY29u dGFjdAp1cGdyYWRlQGdyZWVuYm9uZS5uZXQKYW5kIHByb3ZpZGUgdGhlIGZvbGxvd2luZyBkZXRh aWxzICh1c2UgY29weSZwYXN0ZSkuIFBsZWFzZSB1bmRlcnN0YW5kIHRoYXQgd2Ugd2khCmxsIG5v dCByZXBseSB0byB5b3UgaWYgeW91IGRvIG5vdCBwcm92aWRlIGFsbCB0aGUgZGV0YWlscy4KICAt IENvbXBhbnkgbmFtZToKICAtIENvbXBhbnkgaG9tZXBhZ2U6CiAgLSBZb3VyIG5hbWU6CiAgLSBZ b3VyIHBvc2l0aW9uIGluIHRoZSBjb21wYW55OgogIC0gVGhlIG51bWJlciBvZiBJUCBhZGRyZXNz ZXMgeW91IGFyZSBzY2FubmluZyB3aXRoIEdyZWVuYm9uZSAoY2EuKToKICAtIFRoZSBudW1iZXIg b2Ygc2Nhbm5lciBpbnN0YW5jZXMgeW91IGFyZSB1c2luZyB0byBzY2FuOgogIC0gQXJlIHlvdSB1 c2luZyBhIG1hc3Rlci1zZW5zb3IgY29uZmlndXJhdGlvbjogeWVzL25vCkZlZWwgZnJlZSB0byBh ZGQgYW55IGFkZGl0aW9uYWwgaW5mb3JtYXRpb24geW91IHJlZ2FyZCBoZWxwZnVsIHRvIHVuZGVy c3RhbmQgeW91IQpyIHNldHVwLgpPdXIgdGVhbSB3aWxsIHJlY29tbWVuZCB0byB5b3UgYSBzdWl0 YWJsZSBjb21tZXJjaWFsIG9wdGlvbi4gV2UgYXJlIGhhcHB5IHRvIGRpcyEKY3VzcyBsYXJnZXIg c2V0dXBzIGluIGRpcmVjdCBjb21tdW5pY2F0aW9uLgpZb3UgY2FuIGluZm9ybSB5b3Vyc2VsZiBh Ym91dCBvdXIgc3RhbmRhcmQgcHJvZHVjdHMgaGVyZToKaHR0cHM6Ly93d3cuZ3JlZW5ib25lLm5l dC9lbi9wcm9kdWN0cy1zb2x1dGlvbnMvCkZSRUUgQ09NTVVOSVRZIFNPTFVUSU9OOiBDb250aW51 ZSBzY2FubmluZyB3aXRoIGNvbW11bml0eSBmZWVkClRoZSBHcmVlbmJvbmUgQ29tbXVuaXR5IEZl ZWQgaXMgc3RpbGwgYXZhaWxhYmxlIGFuZCB1cGRhdGVkIGRhaWx5LiBZb3UgbWF5IGhhdmUgIQpq dXN0IG1pc3NlZCB0aGUgdGVjaG5pY2FsIG5vdGVzIGFuZCBhbm5vdW5jZW1lbnQgaGVyZToKaHR0 cHM6Ly9jb21tdW5pdHkuZ3JlZW5ib25lLm5ldC90L2NvbW11bml0eS1mZWVkLXVybC1jb25zb2xp ZGF0aW9uLzUzMzgKClZ1bG5lcmFiaWxpdHkgRGV0ZWN0aW9uIFJlc3VsdDoKQVRURU5USU9OOgpZ b3VyIHZ1bG5lcmFiaWxpdHkgdGVzdHMgYXJlIG91dCBvZiBtYWludGVuYW5jZSBhbmQgbm90IHVw ZGF0ZWQgc2luY2UgU2VwdGVtYmVyICEKMXN0IDIwMjAuIFlvdXIgc2V0dXAgb2YgR3JlZW5ib25l IFNvdXJjZSBFZGl0aW9uIHdpbGwgbm90IHJlcG9ydCBhYm91dCBhbnkgbmV3IHQhCmhyZWF0cyBp biB5b3VyIHNjYW5uZWQgZW52aXJvbm1lbnQgc2luY2UgdGhpcyBkYXRlIQpSRUFTT046CllvdXIg R3JlZW5ib25lIHNldHVwIGlzIGNvbm5lY3RlZCB0byBhIGRpc2NvbnRpbnVlZCBkb3dubG9hZCBz ZXJ2ZXIgb2YgdGhlIEdyZWVuIQpib25lIENvbW11bml0eSBGZWVkLiBUaGUgR3JlZW5ib25lIENv bW11bml0eSBGZWVkIGlzIHN0aWxsIGF2YWlsYWJsZSB2aWEgYSBuZXcgZCEKb3dubG9hZCBzZXJ2 ZXIuIFRoZSBkaXNjb250aW51YXRpb24gYW5ub3VuY2VtZW50IHdhcyBwb3N0ZWQgb24gTWF5IDEz dGggYXQgdGhlIEchCnJlZW5ib25lIENvbW11bml0eSBQb3J0YWwuClNPTFVUSU9OOgpZb3UgY2Fu IGNvbnNpZGVyIHRvIHVwZ3JhZGUgeW91ciBzZXR1cCB0byBhIEdyZWVuYm9uZSBlbnRlcnByaXNl IHByb2R1Y3Qgd2hpY2ggYSEKbHNvIHByb3ZpZGVzIHlvdSB0aGUgZnVsbCBzY2FuIGNvdmVyYWdl IHZpYSBHcmVlbmJvbmUgU2VjdXJpdHkgRmVlZCAoc2VlIFBST0ZFU1MhCklPTkFMIFNPTFVUSU9O KS4gQWx0ZXJuYXRpdmVseSB5b3UgY2FuIGNvbnRpbnVlIHdpdGggdGhlIEdyZWVuYm9uZSBDb21t dW5pdHkgRmVlIQpkIChzZWUgRlJFRSBDT01NVU5JVFkgU09MVVRJT04pLgpQUk9GRVNTSU9OQUwg U09MVVRJT04gKFVwZ3JhZGluZyB0byBmdWxsIGNvdmVyYWdlIHNjYW5uaW5nKQpXZSBhcmUgaGFw cHkgdGhhdCBvdXIgdGVjaG5vbG9neSBhbHJlYWR5IHRvZGF5IGhlbHBzIHlvdSB0byByZWR1Y2Ug dGhlIGF0dGFjayBzdSEKcmZhY2Ugb2YgeW91ciBjb3Jwb3JhdGUgSVQgaW5mcmFzdHJ1Y3R1cmUu IE91ciBlbnRlcnByaXNlIHByb2R1Y3RzIGNsb3NlIGJsaW5kIHMhCnBvdHMgb2YgdGhlIGNvbW11 bml0eSBmZWVkIGFuZCBnaXZlIGFjY2VzcyB0byBHcmVlbmJvbmUgc2VydmljZSBkZXNrLgpQbGVh c2UgY29udGFjdAp1cGdyYWRlQGdyZWVuYm9uZS5uZXQKYW5kIHByb3ZpZGUgdGhlIGZvbGxvd2lu ZyBkZXRhaWxzICh1c2UgY29weSZwYXN0ZSkuIFBsZWFzZSB1bmRlcnN0YW5kIHRoYXQgd2Ugd2kh CmxsIG5vdCByZXBseSB0byB5b3UgaWYgeW91IGRvIG5vdCBwcm92aWRlIGFsbCB0aGUgZGV0YWls cy4KICAtIENvbXBhbnkgbmFtZToKICAtIENvbXBhbnkgaG9tZXBhZ2U6CiAgLSBZb3VyIG5hbWU6 CiAgLSBZb3VyIHBvc2l0aW9uIGluIHRoZSBjb21wYW55OgogIC0gVGhlIG51bWJlciBvZiBJUCBh ZGRyZXNzZXMgeW91IGFyZSBzY2FubmluZyB3aXRoIEdyZWVuYm9uZSAoY2EuKToKICAtIFRoZSBu dW1iZXIgb2Ygc2Nhbm5lciBpbnN0YW5jZXMgeW91IGFyZSB1c2luZyB0byBzY2FuOgogIC0gQXJl IHlvdSB1c2luZyBhIG1hc3Rlci1zZW5zb3IgY29uZmlndXJhdGlvbjogeWVzL25vCkZlZWwgZnJl ZSB0byBhZGQgYW55IGFkZGl0aW9uYWwgaW5mb3JtYXRpb24geW91IHJlZ2FyZCBoZWxwZnVsIHRv IHVuZGVyc3RhbmQgeW91IQpyIHNldHVwLgpPdXIgdGVhbSB3aWxsIHJlY29tbWVuZCB0byB5b3Ug YSBzdWl0YWJsZSBjb21tZXJjaWFsIG9wdGlvbi4gV2UgYXJlIGhhcHB5IHRvIGRpcyEKY3VzcyBs YXJnZXIgc2V0dXBzIGluIGRpcmVjdCBjb21tdW5pY2F0aW9uLgpZb3UgY2FuIGluZm9ybSB5b3Vy c2VsZiBhYm91dCBvdXIgc3RhbmRhcmQgcHJvZHVjdHMgaGVyZToKaHR0cHM6Ly93d3cuZ3JlZW5i b25lLm5ldC9lbi9wcm9kdWN0cy1zb2x1dGlvbnMvCkZSRUUgQ09NTVVOSVRZIFNPTFVUSU9OOiBD b250aW51ZSBzY2FubmluZyB3aXRoIGNvbW11bml0eSBmZWVkClRoZSBHcmVlbmJvbmUgQ29tbXVu aXR5IEZlZWQgaXMgc3RpbGwgYXZhaWxhYmxlIGFuZCB1cGRhdGVkIGRhaWx5LiBZb3UgbWF5IGhh dmUgIQpqdXN0IG1pc3NlZCB0aGUgdGVjaG5pY2FsIG5vdGVzIGFuZCBhbm5vdW5jZW1lbnQgaGVy ZToKaHR0cHM6Ly9jb21tdW5pdHkuZ3JlZW5ib25lLm5ldC90L2NvbW11bml0eS1mZWVkLXVybC1j b25zb2xpZGF0aW9uLzUzMzgKClZ1bG5lcmFiaWxpdHkgRGV0ZWN0aW9uIE1ldGhvZDoKRGV0YWls czoKSW1wb3J0YW50IEFubm91bmNlbWVudAooT0lEOiAxLjMuNi4xLjQuMS4yNTYyMy4xLjAuOTk5 OTk4KQpWZXJzaW9uIHVzZWQ6IDIwMjAtMDctMTRUMTE6MzE6NDgrMDAwMAoKUmVmZXJlbmNlczoK T3RoZXI6CiAgICBodHRwczovL2NvbW11bml0eS5ncmVlbmJvbmUubmV0L3QvY29tbXVuaXR5LWZl ZWQtdXJsLWNvbnNvbGlkYXRpb24vNTMzOAoKCkhvc3QgMTcyLjIwLjEwLjEyCioqKioqKioqKioq KioqKioqCgpTY2FubmluZyBvZiB0aGlzIGhvc3Qgc3RhcnRlZCBhdDogCk51bWJlciBvZiByZXN1 bHRzOiAyCgpQb3J0IFN1bW1hcnkgZm9yIEhvc3QgMTcyLjIwLjEwLjEyCi0tLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0KClNlcnZpY2UgKFBvcnQpICAgICAgICAgIFRocmVhdCBMZXZl bApnZW5lcmFsL3RjcCAgICAgICAgICAgICBIaWdoCmdlbmVyYWwvdGNwICAgICAgICAgICAgIEhp Z2gKZ2VuZXJhbC90Y3AgICAgICAgICAgICAgSGlnaApnZW5lcmFsL3RjcCAgICAgICAgICAgICBI aWdoCmdlbmVyYWwvdGNwICAgICAgICAgICAgIEhpZ2gKZ2VuZXJhbC90Y3AgICAgICAgICAgICAg SGlnaAoKU2VjdXJpdHkgSXNzdWVzIGZvciBIb3N0IDE3Mi4yMC4xMC4xMgotLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tCgpJc3N1ZQotLS0tLQpOVlQ6ICAgIFJlcG9ydCBvdXRk YXRlZCAvIGVuZC1vZi1saWZlIFNjYW4gRW5naW5lIC8gRW52aXJvbm1lbnQgKGxvY2FsKQpPSUQ6 ICAgIDEuMy42LjEuNC4xLjI1NjIzLjEuMC4xMDg1NjAKVGhyZWF0OiBIaWdoIChDVlNTOiAxMC4w KQpQb3J0OiAgIGdlbmVyYWwvdGNwCgpTdW1tYXJ5OgpUaGlzIHNjcmlwdCBjaGVja3MgYW5kIHJl cG9ydHMgYW4gb3V0ZGF0ZWQgb3IgZW5kLW9mLWxpZmUgc2NhbiBlbmdpbmUKICBmb3IgdGhlIGZv bGxvd2luZyBlbnZpcm9ubWVudHM6CiAgLSBHcmVlbmJvbmUgU291cmNlIEVkaXRpb24gKEdTRSkK ICAtIEdyZWVuYm9uZSBDb21tdW5pdHkgRWRpdGlvbiAoR0NFKQogIHVzZWQgZm9yIHRoaXMgc2Nh bi4KICBOT1RFOiBXaGlsZSB0aGlzIGlzIG5vdCwgaW4gYW5kIG9mIGl0c2VsZiwgYSBzZWN1cml0 eSB2dWxuZXJhYmlsaXR5LCBhIHNldmVyaXQhCnkgaXMgcmVwb3J0ZWQgdG8gbWFrZSB5b3UgYXdh cmUKICBvZiBhIHBvc3NpYmxlIGRlY3JlYXNlZCBzY2FuIGNvdmVyYWdlIG9yIG1pc3NpbmcgZGV0 ZWN0aW9uIG9mIHZ1bG5lcmFiaWxpdGllcyAhCm9uIHRoZSB0YXJnZXQgZHVlIHRvIGUuZy46CiAg LSBtaXNzaW5nIGZ1bmN0aW9uYWxpdGllcwogIC0gbWlzc2luZyBidWdmaXhlcwogIC0gaW5jb21w YXRpYmlsaXRpZXMgd2l0aGluIHRoZSBmZWVkLgoKVnVsbmVyYWJpbGl0eSBEZXRlY3Rpb24gUmVz dWx0OgpJbnN0YWxsZWQgR1ZNIExpYnJhcmllcyAoZ3ZtLWxpYnMpIHZlcnNpb246ICAgICAgICA5 LjAuMQpMYXRlc3QgYXZhaWxhYmxlIEdWTSBMaWJyYXJpZXMgKGd2bS1saWJzKSB2ZXJzaW9uOiAx MC4wLjIKUmVmZXJlbmNlIFVSTChzKSBmb3IgdGhlIGxhdGVzdCBhdmFpbGFibGUgdmVyc2lvbjog aHR0cHM6Ly9jb21tdW5pdHkuZ3JlZW5ib25lLm4hCmV0L3QvZ3ZtLTExLXN0YWJsZS1pbml0aWFs LXJlbGVhc2UtMjAxOS0xMC0xNC8zNjc0IC8gaHR0cHM6Ly9jb21tdW5pdHkuZ3JlZW5ib25lIQou bmV0L3QvZ3ZtLTEwLW9sZC1zdGFibGUtaW5pdGlhbC1yZWxlYXNlLTIwMTktMDQtMDUvMjA4CgpT b2x1dGlvbjoKU29sdXRpb24gdHlwZTogVmVuZG9yRml4ClVwZGF0ZSB0byB0aGUgbGF0ZXN0IGF2 YWlsYWJsZSBzdGFibGUgcmVsZWFzZSBmb3IgeW91ciBzY2FuIGVudmlyb25tZW50LiBQbGVhc2Ug IQpjaGVjayB0aGUKICByZWZlcmVuY2VzIGZvciBtb3JlIGluZm9ybWF0aW9uLiBJZiB5b3UncmUg dXNpbmcgcGFja2FnZXMgcHJvdmlkZWQgYnkgeW91ciBMaW4hCnV4IGRpc3RyaWJ1dGlvbiBwbGVh c2UgY29udGFjdCB0aGUgbWFpbnRhaW5lcgogIG9mIHRoZSB1c2VkIGRpc3RyaWJ1dGlvbiAvIHJl cG9zaXRvcnkgYW5kIHJlcXVlc3QgdXBkYXRlZCBwYWNrYWdlcy4KICBJZiB5b3Ugd2FudCB0byBh Y2NlcHQgdGhlIHJpc2sgb2YgYSBwb3NzaWJsZSBkZWNyZWFzZWQgc2NhbiBjb3ZlcmFnZSBvciBt aXNzaW4hCmcgZGV0ZWN0aW9uIG9mIHZ1bG5lcmFiaWxpdGllcyBvbiB0aGUgdGFyZ2V0IHlvdQog IGNhbiBzZXQgYSBnbG9iYWwgb3ZlcnJpZGUgZm9yIHRoaXMgc2NyaXB0IGFzIGRlc2NyaWJlZCBp biB0aGUgbGlua2VkIG1hbnVhbHMuCgpWdWxuZXJhYmlsaXR5IERldGVjdGlvbiBNZXRob2Q6CkRl dGFpbHM6ClJlcG9ydCBvdXRkYXRlZCAvIGVuZC1vZi1saWZlIFNjYW4gRW5naW5lIC8gRW52aXJv bm1lbnQgKGxvY2FsKQooT0lEOiAxLjMuNi4xLjQuMS4yNTYyMy4xLjAuMTA4NTYwKQpWZXJzaW9u IHVzZWQ6IDIwMjAtMDYtMTBUMTM6MjQ6MjArMDAwMAoKUmVmZXJlbmNlczoKT3RoZXI6CiAgICBo dHRwczovL3d3dy5ncmVlbmJvbmUubmV0L2VuL2luc3RhbGxfdXNlX2djZS8KICAgIGh0dHBzOi8v Y29tbXVuaXR5LmdyZWVuYm9uZS5uZXQvdC9ndm0tOS1lbmQtb2YtbGlmZS1pbml0aWFsLXJlbGVh c2UtMjAxNy0wMy0wNy8yMTEKICAgIGh0dHBzOi8vY29tbXVuaXR5LmdyZWVuYm9uZS5uZXQvdC9n dm0tMTAtb2xkLXN0YWJsZS1pbml0aWFsLXJlbGVhc2UtMjAxOS0wNC0wNS8yMDgKICAgIGh0dHBz Oi8vY29tbXVuaXR5LmdyZWVuYm9uZS5uZXQvdC9ndm0tMTEtc3RhYmxlLWluaXRpYWwtcmVsZWFz ZS0yMDE5LTEwLTE0LzM2NzQKICAgIGh0dHBzOi8vZG9jcy5ncmVlbmJvbmUubmV0L0dTTS1NYW51 YWwvZ29zLTQvZW4vcmVwb3J0cy5odG1sI2NyZWF0aW5nLWFuLW92ZXJyaWRlCiAgICBodHRwczov L2RvY3MuZ3JlZW5ib25lLm5ldC9HU00tTWFudWFsL2dvcy01L2VuL3JlcG9ydHMuaHRtbCNjcmVh dGluZy1hbi1vdmVycmlkZQogICAgaHR0cHM6Ly9kb2NzLmdyZWVuYm9uZS5uZXQvR1NNLU1hbnVh bC9nb3MtNi9lbi9yZXBvcnRzLmh0bWwjY3JlYXRpbmctYW4tb3ZlcnJpZGUKCgpJc3N1ZQotLS0t LQpOVlQ6ICAgIEltcG9ydGFudCBBbm5vdW5jZW1lbnQKT0lEOiAgICAxLjMuNi4xLjQuMS4yNTYy My4xLjAuOTk5OTk4ClRocmVhdDogSGlnaCAoQ1ZTUzogMTAuMCkKUG9ydDogICBnZW5lcmFsL3Rj cAoKU3VtbWFyeToKQVRURU5USU9OOgpZb3VyIHZ1bG5lcmFiaWxpdHkgdGVzdHMgYXJlIG91dCBv ZiBtYWludGVuYW5jZSBhbmQgbm90IHVwZGF0ZWQgc2luY2UgU2VwdGVtYmVyICEKMXN0IDIwMjAu IFlvdXIgc2V0dXAgb2YgR3JlZW5ib25lIFNvdXJjZSBFZGl0aW9uIHdpbGwgbm90IHJlcG9ydCBh Ym91dCBhbnkgbmV3IHQhCmhyZWF0cyBpbiB5b3VyIHNjYW5uZWQgZW52aXJvbm1lbnQgc2luY2Ug dGhpcyBkYXRlIQpSRUFTT046CllvdXIgR3JlZW5ib25lIHNldHVwIGlzIGNvbm5lY3RlZCB0byBh IGRpc2NvbnRpbnVlZCBkb3dubG9hZCBzZXJ2ZXIgb2YgdGhlIEdyZWVuIQpib25lIENvbW11bml0 eSBGZWVkLiBUaGUgR3JlZW5ib25lIENvbW11bml0eSBGZWVkIGlzIHN0aWxsIGF2YWlsYWJsZSB2 aWEgYSBuZXcgZCEKb3dubG9hZCBzZXJ2ZXIuIFRoZSBkaXNjb250aW51YXRpb24gYW5ub3VuY2Vt ZW50IHdhcyBwb3N0ZWQgb24gTWF5IDEzdGggYXQgdGhlIEchCnJlZW5ib25lIENvbW11bml0eSBQ b3J0YWwuClNPTFVUSU9OOgpZb3UgY2FuIGNvbnNpZGVyIHRvIHVwZ3JhZGUgeW91ciBzZXR1cCB0 byBhIEdyZWVuYm9uZSBlbnRlcnByaXNlIHByb2R1Y3Qgd2hpY2ggYSEKbHNvIHByb3ZpZGVzIHlv dSB0aGUgZnVsbCBzY2FuIGNvdmVyYWdlIHZpYSBHcmVlbmJvbmUgU2VjdXJpdHkgRmVlZCAoc2Vl IFBST0ZFU1MhCklPTkFMIFNPTFVUSU9OKS4gQWx0ZXJuYXRpdmVseSB5b3UgY2FuIGNvbnRpbnVl IHdpdGggdGhlIEdyZWVuYm9uZSBDb21tdW5pdHkgRmVlIQpkIChzZWUgRlJFRSBDT01NVU5JVFkg U09MVVRJT04pLgpQUk9GRVNTSU9OQUwgU09MVVRJT04gKFVwZ3JhZGluZyB0byBmdWxsIGNvdmVy YWdlIHNjYW5uaW5nKQpXZSBhcmUgaGFwcHkgdGhhdCBvdXIgdGVjaG5vbG9neSBhbHJlYWR5IHRv ZGF5IGhlbHBzIHlvdSB0byByZWR1Y2UgdGhlIGF0dGFjayBzdSEKcmZhY2Ugb2YgeW91ciBjb3Jw b3JhdGUgSVQgaW5mcmFzdHJ1Y3R1cmUuIE91ciBlbnRlcnByaXNlIHByb2R1Y3RzIGNsb3NlIGJs aW5kIHMhCnBvdHMgb2YgdGhlIGNvbW11bml0eSBmZWVkIGFuZCBnaXZlIGFjY2VzcyB0byBHcmVl bmJvbmUgc2VydmljZSBkZXNrLgpQbGVhc2UgY29udGFjdAp1cGdyYWRlQGdyZWVuYm9uZS5uZXQK YW5kIHByb3ZpZGUgdGhlIGZvbGxvd2luZyBkZXRhaWxzICh1c2UgY29weSZwYXN0ZSkuIFBsZWFz ZSB1bmRlcnN0YW5kIHRoYXQgd2Ugd2khCmxsIG5vdCByZXBseSB0byB5b3UgaWYgeW91IGRvIG5v dCBwcm92aWRlIGFsbCB0aGUgZGV0YWlscy4KICAtIENvbXBhbnkgbmFtZToKICAtIENvbXBhbnkg aG9tZXBhZ2U6CiAgLSBZb3VyIG5hbWU6CiAgLSBZb3VyIHBvc2l0aW9uIGluIHRoZSBjb21wYW55 OgogIC0gVGhlIG51bWJlciBvZiBJUCBhZGRyZXNzZXMgeW91IGFyZSBzY2FubmluZyB3aXRoIEdy ZWVuYm9uZSAoY2EuKToKICAtIFRoZSBudW1iZXIgb2Ygc2Nhbm5lciBpbnN0YW5jZXMgeW91IGFy ZSB1c2luZyB0byBzY2FuOgogIC0gQXJlIHlvdSB1c2luZyBhIG1hc3Rlci1zZW5zb3IgY29uZmln dXJhdGlvbjogeWVzL25vCkZlZWwgZnJlZSB0byBhZGQgYW55IGFkZGl0aW9uYWwgaW5mb3JtYXRp b24geW91IHJlZ2FyZCBoZWxwZnVsIHRvIHVuZGVyc3RhbmQgeW91IQpyIHNldHVwLgpPdXIgdGVh bSB3aWxsIHJlY29tbWVuZCB0byB5b3UgYSBzdWl0YWJsZSBjb21tZXJjaWFsIG9wdGlvbi4gV2Ug YXJlIGhhcHB5IHRvIGRpcyEKY3VzcyBsYXJnZXIgc2V0dXBzIGluIGRpcmVjdCBjb21tdW5pY2F0 aW9uLgpZb3UgY2FuIGluZm9ybSB5b3Vyc2VsZiBhYm91dCBvdXIgc3RhbmRhcmQgcHJvZHVjdHMg aGVyZToKaHR0cHM6Ly93d3cuZ3JlZW5ib25lLm5ldC9lbi9wcm9kdWN0cy1zb2x1dGlvbnMvCkZS RUUgQ09NTVVOSVRZIFNPTFVUSU9OOiBDb250aW51ZSBzY2FubmluZyB3aXRoIGNvbW11bml0eSBm ZWVkClRoZSBHcmVlbmJvbmUgQ29tbXVuaXR5IEZlZWQgaXMgc3RpbGwgYXZhaWxhYmxlIGFuZCB1 cGRhdGVkIGRhaWx5LiBZb3UgbWF5IGhhdmUgIQpqdXN0IG1pc3NlZCB0aGUgdGVjaG5pY2FsIG5v dGVzIGFuZCBhbm5vdW5jZW1lbnQgaGVyZToKaHR0cHM6Ly9jb21tdW5pdHkuZ3JlZW5ib25lLm5l dC90L2NvbW11bml0eS1mZWVkLXVybC1jb25zb2xpZGF0aW9uLzUzMzgKClZ1bG5lcmFiaWxpdHkg RGV0ZWN0aW9uIFJlc3VsdDoKQVRURU5USU9OOgpZb3VyIHZ1bG5lcmFiaWxpdHkgdGVzdHMgYXJl IG91dCBvZiBtYWludGVuYW5jZSBhbmQgbm90IHVwZGF0ZWQgc2luY2UgU2VwdGVtYmVyICEKMXN0 IDIwMjAuIFlvdXIgc2V0dXAgb2YgR3JlZW5ib25lIFNvdXJjZSBFZGl0aW9uIHdpbGwgbm90IHJl cG9ydCBhYm91dCBhbnkgbmV3IHQhCmhyZWF0cyBpbiB5b3VyIHNjYW5uZWQgZW52aXJvbm1lbnQg c2luY2UgdGhpcyBkYXRlIQpSRUFTT046CllvdXIgR3JlZW5ib25lIHNldHVwIGlzIGNvbm5lY3Rl ZCB0byBhIGRpc2NvbnRpbnVlZCBkb3dubG9hZCBzZXJ2ZXIgb2YgdGhlIEdyZWVuIQpib25lIENv bW11bml0eSBGZWVkLiBUaGUgR3JlZW5ib25lIENvbW11bml0eSBGZWVkIGlzIHN0aWxsIGF2YWls YWJsZSB2aWEgYSBuZXcgZCEKb3dubG9hZCBzZXJ2ZXIuIFRoZSBkaXNjb250aW51YXRpb24gYW5u b3VuY2VtZW50IHdhcyBwb3N0ZWQgb24gTWF5IDEzdGggYXQgdGhlIEchCnJlZW5ib25lIENvbW11 bml0eSBQb3J0YWwuClNPTFVUSU9OOgpZb3UgY2FuIGNvbnNpZGVyIHRvIHVwZ3JhZGUgeW91ciBz ZXR1cCB0byBhIEdyZWVuYm9uZSBlbnRlcnByaXNlIHByb2R1Y3Qgd2hpY2ggYSEKbHNvIHByb3Zp ZGVzIHlvdSB0aGUgZnVsbCBzY2FuIGNvdmVyYWdlIHZpYSBHcmVlbmJvbmUgU2VjdXJpdHkgRmVl ZCAoc2VlIFBST0ZFU1MhCklPTkFMIFNPTFVUSU9OKS4gQWx0ZXJuYXRpdmVseSB5b3UgY2FuIGNv bnRpbnVlIHdpdGggdGhlIEdyZWVuYm9uZSBDb21tdW5pdHkgRmVlIQpkIChzZWUgRlJFRSBDT01N VU5JVFkgU09MVVRJT04pLgpQUk9GRVNTSU9OQUwgU09MVVRJT04gKFVwZ3JhZGluZyB0byBmdWxs IGNvdmVyYWdlIHNjYW5uaW5nKQpXZSBhcmUgaGFwcHkgdGhhdCBvdXIgdGVjaG5vbG9neSBhbHJl YWR5IHRvZGF5IGhlbHBzIHlvdSB0byByZWR1Y2UgdGhlIGF0dGFjayBzdSEKcmZhY2Ugb2YgeW91 ciBjb3Jwb3JhdGUgSVQgaW5mcmFzdHJ1Y3R1cmUuIE91ciBlbnRlcnByaXNlIHByb2R1Y3RzIGNs b3NlIGJsaW5kIHMhCnBvdHMgb2YgdGhlIGNvbW11bml0eSBmZWVkIGFuZCBnaXZlIGFjY2VzcyB0 byBHcmVlbmJvbmUgc2VydmljZSBkZXNrLgpQbGVhc2UgY29udGFjdAp1cGdyYWRlQGdyZWVuYm9u ZS5uZXQKYW5kIHByb3ZpZGUgdGhlIGZvbGxvd2luZyBkZXRhaWxzICh1c2UgY29weSZwYXN0ZSku IFBsZWFzZSB1bmRlcnN0YW5kIHRoYXQgd2Ugd2khCmxsIG5vdCByZXBseSB0byB5b3UgaWYgeW91 IGRvIG5vdCBwcm92aWRlIGFsbCB0aGUgZGV0YWlscy4KICAtIENvbXBhbnkgbmFtZToKICAtIENv bXBhbnkgaG9tZXBhZ2U6CiAgLSBZb3VyIG5hbWU6CiAgLSBZb3VyIHBvc2l0aW9uIGluIHRoZSBj b21wYW55OgogIC0gVGhlIG51bWJlciBvZiBJUCBhZGRyZXNzZXMgeW91IGFyZSBzY2FubmluZyB3 aXRoIEdyZWVuYm9uZSAoY2EuKToKICAtIFRoZSBudW1iZXIgb2Ygc2Nhbm5lciBpbnN0YW5jZXMg eW91IGFyZSB1c2luZyB0byBzY2FuOgogIC0gQXJlIHlvdSB1c2luZyBhIG1hc3Rlci1zZW5zb3Ig Y29uZmlndXJhdGlvbjogeWVzL25vCkZlZWwgZnJlZSB0byBhZGQgYW55IGFkZGl0aW9uYWwgaW5m b3JtYXRpb24geW91IHJlZ2FyZCBoZWxwZnVsIHRvIHVuZGVyc3RhbmQgeW91IQpyIHNldHVwLgpP dXIgdGVhbSB3aWxsIHJlY29tbWVuZCB0byB5b3UgYSBzdWl0YWJsZSBjb21tZXJjaWFsIG9wdGlv bi4gV2UgYXJlIGhhcHB5IHRvIGRpcyEKY3VzcyBsYXJnZXIgc2V0dXBzIGluIGRpcmVjdCBjb21t dW5pY2F0aW9uLgpZb3UgY2FuIGluZm9ybSB5b3Vyc2VsZiBhYm91dCBvdXIgc3RhbmRhcmQgcHJv ZHVjdHMgaGVyZToKaHR0cHM6Ly93d3cuZ3JlZW5ib25lLm5ldC9lbi9wcm9kdWN0cy1zb2x1dGlv bnMvCkZSRUUgQ09NTVVOSVRZIFNPTFVUSU9OOiBDb250aW51ZSBzY2FubmluZyB3aXRoIGNvbW11 bml0eSBmZWVkClRoZSBHcmVlbmJvbmUgQ29tbXVuaXR5IEZlZWQgaXMgc3RpbGwgYXZhaWxhYmxl IGFuZCB1cGRhdGVkIGRhaWx5LiBZb3UgbWF5IGhhdmUgIQpqdXN0IG1pc3NlZCB0aGUgdGVjaG5p Y2FsIG5vdGVzIGFuZCBhbm5vdW5jZW1lbnQgaGVyZToKaHR0cHM6Ly9jb21tdW5pdHkuZ3JlZW5i b25lLm5ldC90L2NvbW11bml0eS1mZWVkLXVybC1jb25zb2xpZGF0aW9uLzUzMzgKClZ1bG5lcmFi aWxpdHkgRGV0ZWN0aW9uIE1ldGhvZDoKRGV0YWlsczoKSW1wb3J0YW50IEFubm91bmNlbWVudAoo T0lEOiAxLjMuNi4xLjQuMS4yNTYyMy4xLjAuOTk5OTk4KQpWZXJzaW9uIHVzZWQ6IDIwMjAtMDct MTRUMTE6MzE6NDgrMDAwMAoKUmVmZXJlbmNlczoKT3RoZXI6CiAgICBodHRwczovL2NvbW11bml0 eS5ncmVlbmJvbmUubmV0L3QvY29tbXVuaXR5LWZlZWQtdXJsLWNvbnNvbGlkYXRpb24vNTMzOAoK Ckhvc3QgMTcyLjIwLjEwLjExCioqKioqKioqKioqKioqKioqCgpTY2FubmluZyBvZiB0aGlzIGhv c3Qgc3RhcnRlZCBhdDogCk51bWJlciBvZiByZXN1bHRzOiAyCgpQb3J0IFN1bW1hcnkgZm9yIEhv c3QgMTcyLjIwLjEwLjExCi0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0KClNlcnZp Y2UgKFBvcnQpICAgICAgICAgIFRocmVhdCBMZXZlbApnZW5lcmFsL3RjcCAgICAgICAgICAgICBI aWdoCmdlbmVyYWwvdGNwICAgICAgICAgICAgIEhpZ2gKZ2VuZXJhbC90Y3AgICAgICAgICAgICAg SGlnaApnZW5lcmFsL3RjcCAgICAgICAgICAgICBIaWdoCmdlbmVyYWwvdGNwICAgICAgICAgICAg IEhpZ2gKZ2VuZXJhbC90Y3AgICAgICAgICAgICAgSGlnaAoKU2VjdXJpdHkgSXNzdWVzIGZvciBI b3N0IDE3Mi4yMC4xMC4xMQotLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tCgpJ c3N1ZQotLS0tLQpOVlQ6ICAgIFJlcG9ydCBvdXRkYXRlZCAvIGVuZC1vZi1saWZlIFNjYW4gRW5n aW5lIC8gRW52aXJvbm1lbnQgKGxvY2FsKQpPSUQ6ICAgIDEuMy42LjEuNC4xLjI1NjIzLjEuMC4x MDg1NjAKVGhyZWF0OiBIaWdoIChDVlNTOiAxMC4wKQpQb3J0OiAgIGdlbmVyYWwvdGNwCgpTdW1t YXJ5OgpUaGlzIHNjcmlwdCBjaGVja3MgYW5kIHJlcG9ydHMgYW4gb3V0ZGF0ZWQgb3IgZW5kLW9m LWxpZmUgc2NhbiBlbmdpbmUKICBmb3IgdGhlIGZvbGxvd2luZyBlbnZpcm9ubWVudHM6CiAgLSBH cmVlbmJvbmUgU291cmNlIEVkaXRpb24gKEdTRSkKICAtIEdyZWVuYm9uZSBDb21tdW5pdHkgRWRp dGlvbiAoR0NFKQogIHVzZWQgZm9yIHRoaXMgc2Nhbi4KICBOT1RFOiBXaGlsZSB0aGlzIGlzIG5v dCwgaW4gYW5kIG9mIGl0c2VsZiwgYSBzZWN1cml0eSB2dWxuZXJhYmlsaXR5LCBhIHNldmVyaXQh CnkgaXMgcmVwb3J0ZWQgdG8gbWFrZSB5b3UgYXdhcmUKICBvZiBhIHBvc3NpYmxlIGRlY3JlYXNl ZCBzY2FuIGNvdmVyYWdlIG9yIG1pc3NpbmcgZGV0ZWN0aW9uIG9mIHZ1bG5lcmFiaWxpdGllcyAh Cm9uIHRoZSB0YXJnZXQgZHVlIHRvIGUuZy46CiAgLSBtaXNzaW5nIGZ1bmN0aW9uYWxpdGllcwog IC0gbWlzc2luZyBidWdmaXhlcwogIC0gaW5jb21wYXRpYmlsaXRpZXMgd2l0aGluIHRoZSBmZWVk LgoKVnVsbmVyYWJpbGl0eSBEZXRlY3Rpb24gUmVzdWx0OgpJbnN0YWxsZWQgR1ZNIExpYnJhcmll cyAoZ3ZtLWxpYnMpIHZlcnNpb246ICAgICAgICA5LjAuMQpMYXRlc3QgYXZhaWxhYmxlIEdWTSBM aWJyYXJpZXMgKGd2bS1saWJzKSB2ZXJzaW9uOiAxMC4wLjIKUmVmZXJlbmNlIFVSTChzKSBmb3Ig dGhlIGxhdGVzdCBhdmFpbGFibGUgdmVyc2lvbjogaHR0cHM6Ly9jb21tdW5pdHkuZ3JlZW5ib25l Lm4hCmV0L3QvZ3ZtLTExLXN0YWJsZS1pbml0aWFsLXJlbGVhc2UtMjAxOS0xMC0xNC8zNjc0IC8g aHR0cHM6Ly9jb21tdW5pdHkuZ3JlZW5ib25lIQoubmV0L3QvZ3ZtLTEwLW9sZC1zdGFibGUtaW5p dGlhbC1yZWxlYXNlLTIwMTktMDQtMDUvMjA4CgpTb2x1dGlvbjoKU29sdXRpb24gdHlwZTogVmVu ZG9yRml4ClVwZGF0ZSB0byB0aGUgbGF0ZXN0IGF2YWlsYWJsZSBzdGFibGUgcmVsZWFzZSBmb3Ig eW91ciBzY2FuIGVudmlyb25tZW50LiBQbGVhc2UgIQpjaGVjayB0aGUKICByZWZlcmVuY2VzIGZv ciBtb3JlIGluZm9ybWF0aW9uLiBJZiB5b3UncmUgdXNpbmcgcGFja2FnZXMgcHJvdmlkZWQgYnkg eW91ciBMaW4hCnV4IGRpc3RyaWJ1dGlvbiBwbGVhc2UgY29udGFjdCB0aGUgbWFpbnRhaW5lcgog IG9mIHRoZSB1c2VkIGRpc3RyaWJ1dGlvbiAvIHJlcG9zaXRvcnkgYW5kIHJlcXVlc3QgdXBkYXRl ZCBwYWNrYWdlcy4KICBJZiB5b3Ugd2FudCB0byBhY2NlcHQgdGhlIHJpc2sgb2YgYSBwb3NzaWJs ZSBkZWNyZWFzZWQgc2NhbiBjb3ZlcmFnZSBvciBtaXNzaW4hCmcgZGV0ZWN0aW9uIG9mIHZ1bG5l cmFiaWxpdGllcyBvbiB0aGUgdGFyZ2V0IHlvdQogIGNhbiBzZXQgYSBnbG9iYWwgb3ZlcnJpZGUg Zm9yIHRoaXMgc2NyaXB0IGFzIGRlc2NyaWJlZCBpbiB0aGUgbGlua2VkIG1hbnVhbHMuCgpWdWxu ZXJhYmlsaXR5IERldGVjdGlvbiBNZXRob2Q6CkRldGFpbHM6ClJlcG9ydCBvdXRkYXRlZCAvIGVu ZC1vZi1saWZlIFNjYW4gRW5naW5lIC8gRW52aXJvbm1lbnQgKGxvY2FsKQooT0lEOiAxLjMuNi4x LjQuMS4yNTYyMy4xLjAuMTA4NTYwKQpWZXJzaW9uIHVzZWQ6IDIwMjAtMDYtMTBUMTM6MjQ6MjAr MDAwMAoKUmVmZXJlbmNlczoKT3RoZXI6CiAgICBodHRwczovL3d3dy5ncmVlbmJvbmUubmV0L2Vu L2luc3RhbGxfdXNlX2djZS8KICAgIGh0dHBzOi8vY29tbXVuaXR5LmdyZWVuYm9uZS5uZXQvdC9n dm0tOS1lbmQtb2YtbGlmZS1pbml0aWFsLXJlbGVhc2UtMjAxNy0wMy0wNy8yMTEKICAgIGh0dHBz Oi8vY29tbXVuaXR5LmdyZWVuYm9uZS5uZXQvdC9ndm0tMTAtb2xkLXN0YWJsZS1pbml0aWFsLXJl bGVhc2UtMjAxOS0wNC0wNS8yMDgKICAgIGh0dHBzOi8vY29tbXVuaXR5LmdyZWVuYm9uZS5uZXQv dC9ndm0tMTEtc3RhYmxlLWluaXRpYWwtcmVsZWFzZS0yMDE5LTEwLTE0LzM2NzQKICAgIGh0dHBz Oi8vZG9jcy5ncmVlbmJvbmUubmV0L0dTTS1NYW51YWwvZ29zLTQvZW4vcmVwb3J0cy5odG1sI2Ny ZWF0aW5nLWFuLW92ZXJyaWRlCiAgICBodHRwczovL2RvY3MuZ3JlZW5ib25lLm5ldC9HU00tTWFu dWFsL2dvcy01L2VuL3JlcG9ydHMuaHRtbCNjcmVhdGluZy1hbi1vdmVycmlkZQogICAgaHR0cHM6 Ly9kb2NzLmdyZWVuYm9uZS5uZXQvR1NNLU1hbnVhbC9nb3MtNi9lbi9yZXBvcnRzLmh0bWwjY3Jl YXRpbmctYW4tb3ZlcnJpZGUKCgpJc3N1ZQotLS0tLQpOVlQ6ICAgIEltcG9ydGFudCBBbm5vdW5j ZW1lbnQKT0lEOiAgICAxLjMuNi4xLjQuMS4yNTYyMy4xLjAuOTk5OTk4ClRocmVhdDogSGlnaCAo Q1ZTUzogMTAuMCkKUG9ydDogICBnZW5lcmFsL3RjcAoKU3VtbWFyeToKQVRURU5USU9OOgpZb3Vy IHZ1bG5lcmFiaWxpdHkgdGVzdHMgYXJlIG91dCBvZiBtYWludGVuYW5jZSBhbmQgbm90IHVwZGF0 ZWQgc2luY2UgU2VwdGVtYmVyICEKMXN0IDIwMjAuIFlvdXIgc2V0dXAgb2YgR3JlZW5ib25lIFNv dXJjZSBFZGl0aW9uIHdpbGwgbm90IHJlcG9ydCBhYm91dCBhbnkgbmV3IHQhCmhyZWF0cyBpbiB5 b3VyIHNjYW5uZWQgZW52aXJvbm1lbnQgc2luY2UgdGhpcyBkYXRlIQpSRUFTT046CllvdXIgR3Jl ZW5ib25lIHNldHVwIGlzIGNvbm5lY3RlZCB0byBhIGRpc2NvbnRpbnVlZCBkb3dubG9hZCBzZXJ2 ZXIgb2YgdGhlIEdyZWVuIQpib25lIENvbW11bml0eSBGZWVkLiBUaGUgR3JlZW5ib25lIENvbW11 bml0eSBGZWVkIGlzIHN0aWxsIGF2YWlsYWJsZSB2aWEgYSBuZXcgZCEKb3dubG9hZCBzZXJ2ZXIu IFRoZSBkaXNjb250aW51YXRpb24gYW5ub3VuY2VtZW50IHdhcyBwb3N0ZWQgb24gTWF5IDEzdGgg YXQgdGhlIEchCnJlZW5ib25lIENvbW11bml0eSBQb3J0YWwuClNPTFVUSU9OOgpZb3UgY2FuIGNv bnNpZGVyIHRvIHVwZ3JhZGUgeW91ciBzZXR1cCB0byBhIEdyZWVuYm9uZSBlbnRlcnByaXNlIHBy b2R1Y3Qgd2hpY2ggYSEKbHNvIHByb3ZpZGVzIHlvdSB0aGUgZnVsbCBzY2FuIGNvdmVyYWdlIHZp YSBHcmVlbmJvbmUgU2VjdXJpdHkgRmVlZCAoc2VlIFBST0ZFU1MhCklPTkFMIFNPTFVUSU9OKS4g QWx0ZXJuYXRpdmVseSB5b3UgY2FuIGNvbnRpbnVlIHdpdGggdGhlIEdyZWVuYm9uZSBDb21tdW5p dHkgRmVlIQpkIChzZWUgRlJFRSBDT01NVU5JVFkgU09MVVRJT04pLgpQUk9GRVNTSU9OQUwgU09M VVRJT04gKFVwZ3JhZGluZyB0byBmdWxsIGNvdmVyYWdlIHNjYW5uaW5nKQpXZSBhcmUgaGFwcHkg dGhhdCBvdXIgdGVjaG5vbG9neSBhbHJlYWR5IHRvZGF5IGhlbHBzIHlvdSB0byByZWR1Y2UgdGhl IGF0dGFjayBzdSEKcmZhY2Ugb2YgeW91ciBjb3Jwb3JhdGUgSVQgaW5mcmFzdHJ1Y3R1cmUuIE91 ciBlbnRlcnByaXNlIHByb2R1Y3RzIGNsb3NlIGJsaW5kIHMhCnBvdHMgb2YgdGhlIGNvbW11bml0 eSBmZWVkIGFuZCBnaXZlIGFjY2VzcyB0byBHcmVlbmJvbmUgc2VydmljZSBkZXNrLgpQbGVhc2Ug Y29udGFjdAp1cGdyYWRlQGdyZWVuYm9uZS5uZXQKYW5kIHByb3ZpZGUgdGhlIGZvbGxvd2luZyBk ZXRhaWxzICh1c2UgY29weSZwYXN0ZSkuIFBsZWFzZSB1bmRlcnN0YW5kIHRoYXQgd2Ugd2khCmxs IG5vdCByZXBseSB0byB5b3UgaWYgeW91IGRvIG5vdCBwcm92aWRlIGFsbCB0aGUgZGV0YWlscy4K ICAtIENvbXBhbnkgbmFtZToKICAtIENvbXBhbnkgaG9tZXBhZ2U6CiAgLSBZb3VyIG5hbWU6CiAg LSBZb3VyIHBvc2l0aW9uIGluIHRoZSBjb21wYW55OgogIC0gVGhlIG51bWJlciBvZiBJUCBhZGRy ZXNzZXMgeW91IGFyZSBzY2FubmluZyB3aXRoIEdyZWVuYm9uZSAoY2EuKToKICAtIFRoZSBudW1i ZXIgb2Ygc2Nhbm5lciBpbnN0YW5jZXMgeW91IGFyZSB1c2luZyB0byBzY2FuOgogIC0gQXJlIHlv dSB1c2luZyBhIG1hc3Rlci1zZW5zb3IgY29uZmlndXJhdGlvbjogeWVzL25vCkZlZWwgZnJlZSB0 byBhZGQgYW55IGFkZGl0aW9uYWwgaW5mb3JtYXRpb24geW91IHJlZ2FyZCBoZWxwZnVsIHRvIHVu ZGVyc3RhbmQgeW91IQpyIHNldHVwLgpPdXIgdGVhbSB3aWxsIHJlY29tbWVuZCB0byB5b3UgYSBz dWl0YWJsZSBjb21tZXJjaWFsIG9wdGlvbi4gV2UgYXJlIGhhcHB5IHRvIGRpcyEKY3VzcyBsYXJn ZXIgc2V0dXBzIGluIGRpcmVjdCBjb21tdW5pY2F0aW9uLgpZb3UgY2FuIGluZm9ybSB5b3Vyc2Vs ZiBhYm91dCBvdXIgc3RhbmRhcmQgcHJvZHVjdHMgaGVyZToKaHR0cHM6Ly93d3cuZ3JlZW5ib25l Lm5ldC9lbi9wcm9kdWN0cy1zb2x1dGlvbnMvCkZSRUUgQ09NTVVOSVRZIFNPTFVUSU9OOiBDb250 aW51ZSBzY2FubmluZyB3aXRoIGNvbW11bml0eSBmZWVkClRoZSBHcmVlbmJvbmUgQ29tbXVuaXR5 IEZlZWQgaXMgc3RpbGwgYXZhaWxhYmxlIGFuZCB1cGRhdGVkIGRhaWx5LiBZb3UgbWF5IGhhdmUg IQpqdXN0IG1pc3NlZCB0aGUgdGVjaG5pY2FsIG5vdGVzIGFuZCBhbm5vdW5jZW1lbnQgaGVyZToK aHR0cHM6Ly9jb21tdW5pdHkuZ3JlZW5ib25lLm5ldC90L2NvbW11bml0eS1mZWVkLXVybC1jb25z b2xpZGF0aW9uLzUzMzgKClZ1bG5lcmFiaWxpdHkgRGV0ZWN0aW9uIFJlc3VsdDoKQVRURU5USU9O OgpZb3VyIHZ1bG5lcmFiaWxpdHkgdGVzdHMgYXJlIG91dCBvZiBtYWludGVuYW5jZSBhbmQgbm90 IHVwZGF0ZWQgc2luY2UgU2VwdGVtYmVyICEKMXN0IDIwMjAuIFlvdXIgc2V0dXAgb2YgR3JlZW5i b25lIFNvdXJjZSBFZGl0aW9uIHdpbGwgbm90IHJlcG9ydCBhYm91dCBhbnkgbmV3IHQhCmhyZWF0 cyBpbiB5b3VyIHNjYW5uZWQgZW52aXJvbm1lbnQgc2luY2UgdGhpcyBkYXRlIQpSRUFTT046Cllv dXIgR3JlZW5ib25lIHNldHVwIGlzIGNvbm5lY3RlZCB0byBhIGRpc2NvbnRpbnVlZCBkb3dubG9h ZCBzZXJ2ZXIgb2YgdGhlIEdyZWVuIQpib25lIENvbW11bml0eSBGZWVkLiBUaGUgR3JlZW5ib25l IENvbW11bml0eSBGZWVkIGlzIHN0aWxsIGF2YWlsYWJsZSB2aWEgYSBuZXcgZCEKb3dubG9hZCBz ZXJ2ZXIuIFRoZSBkaXNjb250aW51YXRpb24gYW5ub3VuY2VtZW50IHdhcyBwb3N0ZWQgb24gTWF5 IDEzdGggYXQgdGhlIEchCnJlZW5ib25lIENvbW11bml0eSBQb3J0YWwuClNPTFVUSU9OOgpZb3Ug Y2FuIGNvbnNpZGVyIHRvIHVwZ3JhZGUgeW91ciBzZXR1cCB0byBhIEdyZWVuYm9uZSBlbnRlcnBy aXNlIHByb2R1Y3Qgd2hpY2ggYSEKbHNvIHByb3ZpZGVzIHlvdSB0aGUgZnVsbCBzY2FuIGNvdmVy YWdlIHZpYSBHcmVlbmJvbmUgU2VjdXJpdHkgRmVlZCAoc2VlIFBST0ZFU1MhCklPTkFMIFNPTFVU SU9OKS4gQWx0ZXJuYXRpdmVseSB5b3UgY2FuIGNvbnRpbnVlIHdpdGggdGhlIEdyZWVuYm9uZSBD b21tdW5pdHkgRmVlIQpkIChzZWUgRlJFRSBDT01NVU5JVFkgU09MVVRJT04pLgpQUk9GRVNTSU9O QUwgU09MVVRJT04gKFVwZ3JhZGluZyB0byBmdWxsIGNvdmVyYWdlIHNjYW5uaW5nKQpXZSBhcmUg aGFwcHkgdGhhdCBvdXIgdGVjaG5vbG9neSBhbHJlYWR5IHRvZGF5IGhlbHBzIHlvdSB0byByZWR1 Y2UgdGhlIGF0dGFjayBzdSEKcmZhY2Ugb2YgeW91ciBjb3Jwb3JhdGUgSVQgaW5mcmFzdHJ1Y3R1 cmUuIE91ciBlbnRlcnByaXNlIHByb2R1Y3RzIGNsb3NlIGJsaW5kIHMhCnBvdHMgb2YgdGhlIGNv bW11bml0eSBmZWVkIGFuZCBnaXZlIGFjY2VzcyB0byBHcmVlbmJvbmUgc2VydmljZSBkZXNrLgpQ bGVhc2UgY29udGFjdAp1cGdyYWRlQGdyZWVuYm9uZS5uZXQKYW5kIHByb3ZpZGUgdGhlIGZvbGxv d2luZyBkZXRhaWxzICh1c2UgY29weSZwYXN0ZSkuIFBsZWFzZSB1bmRlcnN0YW5kIHRoYXQgd2Ug d2khCmxsIG5vdCByZXBseSB0byB5b3UgaWYgeW91IGRvIG5vdCBwcm92aWRlIGFsbCB0aGUgZGV0 YWlscy4KICAtIENvbXBhbnkgbmFtZToKICAtIENvbXBhbnkgaG9tZXBhZ2U6CiAgLSBZb3VyIG5h bWU6CiAgLSBZb3VyIHBvc2l0aW9uIGluIHRoZSBjb21wYW55OgogIC0gVGhlIG51bWJlciBvZiBJ UCBhZGRyZXNzZXMgeW91IGFyZSBzY2FubmluZyB3aXRoIEdyZWVuYm9uZSAoY2EuKToKICAtIFRo ZSBudW1iZXIgb2Ygc2Nhbm5lciBpbnN0YW5jZXMgeW91IGFyZSB1c2luZyB0byBzY2FuOgogIC0g QXJlIHlvdSB1c2luZyBhIG1hc3Rlci1zZW5zb3IgY29uZmlndXJhdGlvbjogeWVzL25vCkZlZWwg ZnJlZSB0byBhZGQgYW55IGFkZGl0aW9uYWwgaW5mb3JtYXRpb24geW91IHJlZ2FyZCBoZWxwZnVs IHRvIHVuZGVyc3RhbmQgeW91IQpyIHNldHVwLgpPdXIgdGVhbSB3aWxsIHJlY29tbWVuZCB0byB5 b3UgYSBzdWl0YWJsZSBjb21tZXJjaWFsIG9wdGlvbi4gV2UgYXJlIGhhcHB5IHRvIGRpcyEKY3Vz cyBsYXJnZXIgc2V0dXBzIGluIGRpcmVjdCBjb21tdW5pY2F0aW9uLgpZb3UgY2FuIGluZm9ybSB5 b3Vyc2VsZiBhYm91dCBvdXIgc3RhbmRhcmQgcHJvZHVjdHMgaGVyZToKaHR0cHM6Ly93d3cuZ3Jl ZW5ib25lLm5ldC9lbi9wcm9kdWN0cy1zb2x1dGlvbnMvCkZSRUUgQ09NTVVOSVRZIFNPTFVUSU9O OiBDb250aW51ZSBzY2FubmluZyB3aXRoIGNvbW11bml0eSBmZWVkClRoZSBHcmVlbmJvbmUgQ29t bXVuaXR5IEZlZWQgaXMgc3RpbGwgYXZhaWxhYmxlIGFuZCB1cGRhdGVkIGRhaWx5LiBZb3UgbWF5 IGhhdmUgIQpqdXN0IG1pc3NlZCB0aGUgdGVjaG5pY2FsIG5vdGVzIGFuZCBhbm5vdW5jZW1lbnQg aGVyZToKaHR0cHM6Ly9jb21tdW5pdHkuZ3JlZW5ib25lLm5ldC90L2NvbW11bml0eS1mZWVkLXVy bC1jb25zb2xpZGF0aW9uLzUzMzgKClZ1bG5lcmFiaWxpdHkgRGV0ZWN0aW9uIE1ldGhvZDoKRGV0 YWlsczoKSW1wb3J0YW50IEFubm91bmNlbWVudAooT0lEOiAxLjMuNi4xLjQuMS4yNTYyMy4xLjAu OTk5OTk4KQpWZXJzaW9uIHVzZWQ6IDIwMjAtMDctMTRUMTE6MzE6NDgrMDAwMAoKUmVmZXJlbmNl czoKT3RoZXI6CiAgICBodHRwczovL2NvbW11bml0eS5ncmVlbmJvbmUubmV0L3QvY29tbXVuaXR5 LWZlZWQtdXJsLWNvbnNvbGlkYXRpb24vNTMzOAoKCkhvc3QgMTcyLjIwLjEwLjgKKioqKioqKioq KioqKioqKgoKU2Nhbm5pbmcgb2YgdGhpcyBob3N0IHN0YXJ0ZWQgYXQ6IApOdW1iZXIgb2YgcmVz dWx0czogMgoKUG9ydCBTdW1tYXJ5IGZvciBIb3N0IDE3Mi4yMC4xMC44Ci0tLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLQoKU2VydmljZSAoUG9ydCkgICAgICAgICAgVGhyZWF0IExldmVs CmdlbmVyYWwvdGNwICAgICAgICAgICAgIEhpZ2gKZ2VuZXJhbC90Y3AgICAgICAgICAgICAgSGln aApnZW5lcmFsL3RjcCAgICAgICAgICAgICBIaWdoCmdlbmVyYWwvdGNwICAgICAgICAgICAgIEhp Z2gKZ2VuZXJhbC90Y3AgICAgICAgICAgICAgSGlnaApnZW5lcmFsL3RjcCAgICAgICAgICAgICBI aWdoCgpTZWN1cml0eSBJc3N1ZXMgZm9yIEhvc3QgMTcyLjIwLjEwLjgKLS0tLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tCgpJc3N1ZQotLS0tLQpOVlQ6ICAgIFJlcG9ydCBvdXRkYXRl ZCAvIGVuZC1vZi1saWZlIFNjYW4gRW5naW5lIC8gRW52aXJvbm1lbnQgKGxvY2FsKQpPSUQ6ICAg IDEuMy42LjEuNC4xLjI1NjIzLjEuMC4xMDg1NjAKVGhyZWF0OiBIaWdoIChDVlNTOiAxMC4wKQpQ b3J0OiAgIGdlbmVyYWwvdGNwCgpTdW1tYXJ5OgpUaGlzIHNjcmlwdCBjaGVja3MgYW5kIHJlcG9y dHMgYW4gb3V0ZGF0ZWQgb3IgZW5kLW9mLWxpZmUgc2NhbiBlbmdpbmUKICBmb3IgdGhlIGZvbGxv d2luZyBlbnZpcm9ubWVudHM6CiAgLSBHcmVlbmJvbmUgU291cmNlIEVkaXRpb24gKEdTRSkKICAt IEdyZWVuYm9uZSBDb21tdW5pdHkgRWRpdGlvbiAoR0NFKQogIHVzZWQgZm9yIHRoaXMgc2Nhbi4K ICBOT1RFOiBXaGlsZSB0aGlzIGlzIG5vdCwgaW4gYW5kIG9mIGl0c2VsZiwgYSBzZWN1cml0eSB2 dWxuZXJhYmlsaXR5LCBhIHNldmVyaXQhCnkgaXMgcmVwb3J0ZWQgdG8gbWFrZSB5b3UgYXdhcmUK ICBvZiBhIHBvc3NpYmxlIGRlY3JlYXNlZCBzY2FuIGNvdmVyYWdlIG9yIG1pc3NpbmcgZGV0ZWN0 aW9uIG9mIHZ1bG5lcmFiaWxpdGllcyAhCm9uIHRoZSB0YXJnZXQgZHVlIHRvIGUuZy46CiAgLSBt aXNzaW5nIGZ1bmN0aW9uYWxpdGllcwogIC0gbWlzc2luZyBidWdmaXhlcwogIC0gaW5jb21wYXRp YmlsaXRpZXMgd2l0aGluIHRoZSBmZWVkLgoKVnVsbmVyYWJpbGl0eSBEZXRlY3Rpb24gUmVzdWx0 OgpJbnN0YWxsZWQgR1ZNIExpYnJhcmllcyAoZ3ZtLWxpYnMpIHZlcnNpb246ICAgICAgICA5LjAu MQpMYXRlc3QgYXZhaWxhYmxlIEdWTSBMaWJyYXJpZXMgKGd2bS1saWJzKSB2ZXJzaW9uOiAxMC4w LjIKUmVmZXJlbmNlIFVSTChzKSBmb3IgdGhlIGxhdGVzdCBhdmFpbGFibGUgdmVyc2lvbjogaHR0 cHM6Ly9jb21tdW5pdHkuZ3JlZW5ib25lLm4hCmV0L3QvZ3ZtLTExLXN0YWJsZS1pbml0aWFsLXJl bGVhc2UtMjAxOS0xMC0xNC8zNjc0IC8gaHR0cHM6Ly9jb21tdW5pdHkuZ3JlZW5ib25lIQoubmV0 L3QvZ3ZtLTEwLW9sZC1zdGFibGUtaW5pdGlhbC1yZWxlYXNlLTIwMTktMDQtMDUvMjA4CgpTb2x1 dGlvbjoKU29sdXRpb24gdHlwZTogVmVuZG9yRml4ClVwZGF0ZSB0byB0aGUgbGF0ZXN0IGF2YWls YWJsZSBzdGFibGUgcmVsZWFzZSBmb3IgeW91ciBzY2FuIGVudmlyb25tZW50LiBQbGVhc2UgIQpj aGVjayB0aGUKICByZWZlcmVuY2VzIGZvciBtb3JlIGluZm9ybWF0aW9uLiBJZiB5b3UncmUgdXNp bmcgcGFja2FnZXMgcHJvdmlkZWQgYnkgeW91ciBMaW4hCnV4IGRpc3RyaWJ1dGlvbiBwbGVhc2Ug Y29udGFjdCB0aGUgbWFpbnRhaW5lcgogIG9mIHRoZSB1c2VkIGRpc3RyaWJ1dGlvbiAvIHJlcG9z aXRvcnkgYW5kIHJlcXVlc3QgdXBkYXRlZCBwYWNrYWdlcy4KICBJZiB5b3Ugd2FudCB0byBhY2Nl cHQgdGhlIHJpc2sgb2YgYSBwb3NzaWJsZSBkZWNyZWFzZWQgc2NhbiBjb3ZlcmFnZSBvciBtaXNz aW4hCmcgZGV0ZWN0aW9uIG9mIHZ1bG5lcmFiaWxpdGllcyBvbiB0aGUgdGFyZ2V0IHlvdQogIGNh biBzZXQgYSBnbG9iYWwgb3ZlcnJpZGUgZm9yIHRoaXMgc2NyaXB0IGFzIGRlc2NyaWJlZCBpbiB0 aGUgbGlua2VkIG1hbnVhbHMuCgpWdWxuZXJhYmlsaXR5IERldGVjdGlvbiBNZXRob2Q6CkRldGFp bHM6ClJlcG9ydCBvdXRkYXRlZCAvIGVuZC1vZi1saWZlIFNjYW4gRW5naW5lIC8gRW52aXJvbm1l bnQgKGxvY2FsKQooT0lEOiAxLjMuNi4xLjQuMS4yNTYyMy4xLjAuMTA4NTYwKQpWZXJzaW9uIHVz ZWQ6IDIwMjAtMDYtMTBUMTM6MjQ6MjArMDAwMAoKUmVmZXJlbmNlczoKT3RoZXI6CiAgICBodHRw czovL3d3dy5ncmVlbmJvbmUubmV0L2VuL2luc3RhbGxfdXNlX2djZS8KICAgIGh0dHBzOi8vY29t bXVuaXR5LmdyZWVuYm9uZS5uZXQvdC9ndm0tOS1lbmQtb2YtbGlmZS1pbml0aWFsLXJlbGVhc2Ut MjAxNy0wMy0wNy8yMTEKICAgIGh0dHBzOi8vY29tbXVuaXR5LmdyZWVuYm9uZS5uZXQvdC9ndm0t MTAtb2xkLXN0YWJsZS1pbml0aWFsLXJlbGVhc2UtMjAxOS0wNC0wNS8yMDgKICAgIGh0dHBzOi8v Y29tbXVuaXR5LmdyZWVuYm9uZS5uZXQvdC9ndm0tMTEtc3RhYmxlLWluaXRpYWwtcmVsZWFzZS0y MDE5LTEwLTE0LzM2NzQKICAgIGh0dHBzOi8vZG9jcy5ncmVlbmJvbmUubmV0L0dTTS1NYW51YWwv Z29zLTQvZW4vcmVwb3J0cy5odG1sI2NyZWF0aW5nLWFuLW92ZXJyaWRlCiAgICBodHRwczovL2Rv Y3MuZ3JlZW5ib25lLm5ldC9HU00tTWFudWFsL2dvcy01L2VuL3JlcG9ydHMuaHRtbCNjcmVhdGlu Zy1hbi1vdmVycmlkZQogICAgaHR0cHM6Ly9kb2NzLmdyZWVuYm9uZS5uZXQvR1NNLU1hbnVhbC9n b3MtNi9lbi9yZXBvcnRzLmh0bWwjY3JlYXRpbmctYW4tb3ZlcnJpZGUKCgpJc3N1ZQotLS0tLQpO VlQ6ICAgIEltcG9ydGFudCBBbm5vdW5jZW1lbnQKT0lEOiAgICAxLjMuNi4xLjQuMS4yNTYyMy4x LjAuOTk5OTk4ClRocmVhdDogSGlnaCAoQ1ZTUzogMTAuMCkKUG9ydDogICBnZW5lcmFsL3RjcAoK U3VtbWFyeToKQVRURU5USU9OOgpZb3VyIHZ1bG5lcmFiaWxpdHkgdGVzdHMgYXJlIG91dCBvZiBt YWludGVuYW5jZSBhbmQgbm90IHVwZGF0ZWQgc2luY2UgU2VwdGVtYmVyICEKMXN0IDIwMjAuIFlv dXIgc2V0dXAgb2YgR3JlZW5ib25lIFNvdXJjZSBFZGl0aW9uIHdpbGwgbm90IHJlcG9ydCBhYm91 dCBhbnkgbmV3IHQhCmhyZWF0cyBpbiB5b3VyIHNjYW5uZWQgZW52aXJvbm1lbnQgc2luY2UgdGhp cyBkYXRlIQpSRUFTT046CllvdXIgR3JlZW5ib25lIHNldHVwIGlzIGNvbm5lY3RlZCB0byBhIGRp c2NvbnRpbnVlZCBkb3dubG9hZCBzZXJ2ZXIgb2YgdGhlIEdyZWVuIQpib25lIENvbW11bml0eSBG ZWVkLiBUaGUgR3JlZW5ib25lIENvbW11bml0eSBGZWVkIGlzIHN0aWxsIGF2YWlsYWJsZSB2aWEg YSBuZXcgZCEKb3dubG9hZCBzZXJ2ZXIuIFRoZSBkaXNjb250aW51YXRpb24gYW5ub3VuY2VtZW50 IHdhcyBwb3N0ZWQgb24gTWF5IDEzdGggYXQgdGhlIEchCnJlZW5ib25lIENvbW11bml0eSBQb3J0 YWwuClNPTFVUSU9OOgpZb3UgY2FuIGNvbnNpZGVyIHRvIHVwZ3JhZGUgeW91ciBzZXR1cCB0byBh IEdyZWVuYm9uZSBlbnRlcnByaXNlIHByb2R1Y3Qgd2hpY2ggYSEKbHNvIHByb3ZpZGVzIHlvdSB0 aGUgZnVsbCBzY2FuIGNvdmVyYWdlIHZpYSBHcmVlbmJvbmUgU2VjdXJpdHkgRmVlZCAoc2VlIFBS T0ZFU1MhCklPTkFMIFNPTFVUSU9OKS4gQWx0ZXJuYXRpdmVseSB5b3UgY2FuIGNvbnRpbnVlIHdp dGggdGhlIEdyZWVuYm9uZSBDb21tdW5pdHkgRmVlIQpkIChzZWUgRlJFRSBDT01NVU5JVFkgU09M VVRJT04pLgpQUk9GRVNTSU9OQUwgU09MVVRJT04gKFVwZ3JhZGluZyB0byBmdWxsIGNvdmVyYWdl IHNjYW5uaW5nKQpXZSBhcmUgaGFwcHkgdGhhdCBvdXIgdGVjaG5vbG9neSBhbHJlYWR5IHRvZGF5 IGhlbHBzIHlvdSB0byByZWR1Y2UgdGhlIGF0dGFjayBzdSEKcmZhY2Ugb2YgeW91ciBjb3Jwb3Jh dGUgSVQgaW5mcmFzdHJ1Y3R1cmUuIE91ciBlbnRlcnByaXNlIHByb2R1Y3RzIGNsb3NlIGJsaW5k IHMhCnBvdHMgb2YgdGhlIGNvbW11bml0eSBmZWVkIGFuZCBnaXZlIGFjY2VzcyB0byBHcmVlbmJv bmUgc2VydmljZSBkZXNrLgpQbGVhc2UgY29udGFjdAp1cGdyYWRlQGdyZWVuYm9uZS5uZXQKYW5k IHByb3ZpZGUgdGhlIGZvbGxvd2luZyBkZXRhaWxzICh1c2UgY29weSZwYXN0ZSkuIFBsZWFzZSB1 bmRlcnN0YW5kIHRoYXQgd2Ugd2khCmxsIG5vdCByZXBseSB0byB5b3UgaWYgeW91IGRvIG5vdCBw cm92aWRlIGFsbCB0aGUgZGV0YWlscy4KICAtIENvbXBhbnkgbmFtZToKICAtIENvbXBhbnkgaG9t ZXBhZ2U6CiAgLSBZb3VyIG5hbWU6CiAgLSBZb3VyIHBvc2l0aW9uIGluIHRoZSBjb21wYW55Ogog IC0gVGhlIG51bWJlciBvZiBJUCBhZGRyZXNzZXMgeW91IGFyZSBzY2FubmluZyB3aXRoIEdyZWVu Ym9uZSAoY2EuKToKICAtIFRoZSBudW1iZXIgb2Ygc2Nhbm5lciBpbnN0YW5jZXMgeW91IGFyZSB1 c2luZyB0byBzY2FuOgogIC0gQXJlIHlvdSB1c2luZyBhIG1hc3Rlci1zZW5zb3IgY29uZmlndXJh dGlvbjogeWVzL25vCkZlZWwgZnJlZSB0byBhZGQgYW55IGFkZGl0aW9uYWwgaW5mb3JtYXRpb24g eW91IHJlZ2FyZCBoZWxwZnVsIHRvIHVuZGVyc3RhbmQgeW91IQpyIHNldHVwLgpPdXIgdGVhbSB3 aWxsIHJlY29tbWVuZCB0byB5b3UgYSBzdWl0YWJsZSBjb21tZXJjaWFsIG9wdGlvbi4gV2UgYXJl IGhhcHB5IHRvIGRpcyEKY3VzcyBsYXJnZXIgc2V0dXBzIGluIGRpcmVjdCBjb21tdW5pY2F0aW9u LgpZb3UgY2FuIGluZm9ybSB5b3Vyc2VsZiBhYm91dCBvdXIgc3RhbmRhcmQgcHJvZHVjdHMgaGVy ZToKaHR0cHM6Ly93d3cuZ3JlZW5ib25lLm5ldC9lbi9wcm9kdWN0cy1zb2x1dGlvbnMvCkZSRUUg Q09NTVVOSVRZIFNPTFVUSU9OOiBDb250aW51ZSBzY2FubmluZyB3aXRoIGNvbW11bml0eSBmZWVk ClRoZSBHcmVlbmJvbmUgQ29tbXVuaXR5IEZlZWQgaXMgc3RpbGwgYXZhaWxhYmxlIGFuZCB1cGRh dGVkIGRhaWx5LiBZb3UgbWF5IGhhdmUgIQpqdXN0IG1pc3NlZCB0aGUgdGVjaG5pY2FsIG5vdGVz IGFuZCBhbm5vdW5jZW1lbnQgaGVyZToKaHR0cHM6Ly9jb21tdW5pdHkuZ3JlZW5ib25lLm5ldC90 L2NvbW11bml0eS1mZWVkLXVybC1jb25zb2xpZGF0aW9uLzUzMzgKClZ1bG5lcmFiaWxpdHkgRGV0 ZWN0aW9uIFJlc3VsdDoKQVRURU5USU9OOgpZb3VyIHZ1bG5lcmFiaWxpdHkgdGVzdHMgYXJlIG91 dCBvZiBtYWludGVuYW5jZSBhbmQgbm90IHVwZGF0ZWQgc2luY2UgU2VwdGVtYmVyICEKMXN0IDIw MjAuIFlvdXIgc2V0dXAgb2YgR3JlZW5ib25lIFNvdXJjZSBFZGl0aW9uIHdpbGwgbm90IHJlcG9y dCBhYm91dCBhbnkgbmV3IHQhCmhyZWF0cyBpbiB5b3VyIHNjYW5uZWQgZW52aXJvbm1lbnQgc2lu Y2UgdGhpcyBkYXRlIQpSRUFTT046CllvdXIgR3JlZW5ib25lIHNldHVwIGlzIGNvbm5lY3RlZCB0 byBhIGRpc2NvbnRpbnVlZCBkb3dubG9hZCBzZXJ2ZXIgb2YgdGhlIEdyZWVuIQpib25lIENvbW11 bml0eSBGZWVkLiBUaGUgR3JlZW5ib25lIENvbW11bml0eSBGZWVkIGlzIHN0aWxsIGF2YWlsYWJs ZSB2aWEgYSBuZXcgZCEKb3dubG9hZCBzZXJ2ZXIuIFRoZSBkaXNjb250aW51YXRpb24gYW5ub3Vu Y2VtZW50IHdhcyBwb3N0ZWQgb24gTWF5IDEzdGggYXQgdGhlIEchCnJlZW5ib25lIENvbW11bml0 eSBQb3J0YWwuClNPTFVUSU9OOgpZb3UgY2FuIGNvbnNpZGVyIHRvIHVwZ3JhZGUgeW91ciBzZXR1 cCB0byBhIEdyZWVuYm9uZSBlbnRlcnByaXNlIHByb2R1Y3Qgd2hpY2ggYSEKbHNvIHByb3ZpZGVz IHlvdSB0aGUgZnVsbCBzY2FuIGNvdmVyYWdlIHZpYSBHcmVlbmJvbmUgU2VjdXJpdHkgRmVlZCAo c2VlIFBST0ZFU1MhCklPTkFMIFNPTFVUSU9OKS4gQWx0ZXJuYXRpdmVseSB5b3UgY2FuIGNvbnRp bnVlIHdpdGggdGhlIEdyZWVuYm9uZSBDb21tdW5pdHkgRmVlIQpkIChzZWUgRlJFRSBDT01NVU5J VFkgU09MVVRJT04pLgpQUk9GRVNTSU9OQUwgU09MVVRJT04gKFVwZ3JhZGluZyB0byBmdWxsIGNv dmVyYWdlIHNjYW5uaW5nKQpXZSBhcmUgaGFwcHkgdGhhdCBvdXIgdGVjaG5vbG9neSBhbHJlYWR5 IHRvZGF5IGhlbHBzIHlvdSB0byByZWR1Y2UgdGhlIGF0dGFjayBzdSEKcmZhY2Ugb2YgeW91ciBj b3Jwb3JhdGUgSVQgaW5mcmFzdHJ1Y3R1cmUuIE91ciBlbnRlcnByaXNlIHByb2R1Y3RzIGNsb3Nl IGJsaW5kIHMhCnBvdHMgb2YgdGhlIGNvbW11bml0eSBmZWVkIGFuZCBnaXZlIGFjY2VzcyB0byBH cmVlbmJvbmUgc2VydmljZSBkZXNrLgpQbGVhc2UgY29udGFjdAp1cGdyYWRlQGdyZWVuYm9uZS5u ZXQKYW5kIHByb3ZpZGUgdGhlIGZvbGxvd2luZyBkZXRhaWxzICh1c2UgY29weSZwYXN0ZSkuIFBs ZWFzZSB1bmRlcnN0YW5kIHRoYXQgd2Ugd2khCmxsIG5vdCByZXBseSB0byB5b3UgaWYgeW91IGRv IG5vdCBwcm92aWRlIGFsbCB0aGUgZGV0YWlscy4KICAtIENvbXBhbnkgbmFtZToKICAtIENvbXBh bnkgaG9tZXBhZ2U6CiAgLSBZb3VyIG5hbWU6CiAgLSBZb3VyIHBvc2l0aW9uIGluIHRoZSBjb21w YW55OgogIC0gVGhlIG51bWJlciBvZiBJUCBhZGRyZXNzZXMgeW91IGFyZSBzY2FubmluZyB3aXRo IEdyZWVuYm9uZSAoY2EuKToKICAtIFRoZSBudW1iZXIgb2Ygc2Nhbm5lciBpbnN0YW5jZXMgeW91 IGFyZSB1c2luZyB0byBzY2FuOgogIC0gQXJlIHlvdSB1c2luZyBhIG1hc3Rlci1zZW5zb3IgY29u ZmlndXJhdGlvbjogeWVzL25vCkZlZWwgZnJlZSB0byBhZGQgYW55IGFkZGl0aW9uYWwgaW5mb3Jt YXRpb24geW91IHJlZ2FyZCBoZWxwZnVsIHRvIHVuZGVyc3RhbmQgeW91IQpyIHNldHVwLgpPdXIg dGVhbSB3aWxsIHJlY29tbWVuZCB0byB5b3UgYSBzdWl0YWJsZSBjb21tZXJjaWFsIG9wdGlvbi4g V2UgYXJlIGhhcHB5IHRvIGRpcyEKY3VzcyBsYXJnZXIgc2V0dXBzIGluIGRpcmVjdCBjb21tdW5p Y2F0aW9uLgpZb3UgY2FuIGluZm9ybSB5b3Vyc2VsZiBhYm91dCBvdXIgc3RhbmRhcmQgcHJvZHVj dHMgaGVyZToKaHR0cHM6Ly93d3cuZ3JlZW5ib25lLm5ldC9lbi9wcm9kdWN0cy1zb2x1dGlvbnMv CkZSRUUgQ09NTVVOSVRZIFNPTFVUSU9OOiBDb250aW51ZSBzY2FubmluZyB3aXRoIGNvbW11bml0 eSBmZWVkClRoZSBHcmVlbmJvbmUgQ29tbXVuaXR5IEZlZWQgaXMgc3RpbGwgYXZhaWxhYmxlIGFu ZCB1cGRhdGVkIGRhaWx5LiBZb3UgbWF5IGhhdmUgIQpqdXN0IG1pc3NlZCB0aGUgdGVjaG5pY2Fs IG5vdGVzIGFuZCBhbm5vdW5jZW1lbnQgaGVyZToKaHR0cHM6Ly9jb21tdW5pdHkuZ3JlZW5ib25l Lm5ldC90L2NvbW11bml0eS1mZWVkLXVybC1jb25zb2xpZGF0aW9uLzUzMzgKClZ1bG5lcmFiaWxp dHkgRGV0ZWN0aW9uIE1ldGhvZDoKRGV0YWlsczoKSW1wb3J0YW50IEFubm91bmNlbWVudAooT0lE OiAxLjMuNi4xLjQuMS4yNTYyMy4xLjAuOTk5OTk4KQpWZXJzaW9uIHVzZWQ6IDIwMjAtMDctMTRU MTE6MzE6NDgrMDAwMAoKUmVmZXJlbmNlczoKT3RoZXI6CiAgICBodHRwczovL2NvbW11bml0eS5n cmVlbmJvbmUubmV0L3QvY29tbXVuaXR5LWZlZWQtdXJsLWNvbnNvbGlkYXRpb24vNTMzOAoKCkhv c3QgMTcyLjIwLjEwLjEKKioqKioqKioqKioqKioqKgoKU2Nhbm5pbmcgb2YgdGhpcyBob3N0IHN0 YXJ0ZWQgYXQ6IApOdW1iZXIgb2YgcmVzdWx0czogMgoKUG9ydCBTdW1tYXJ5IGZvciBIb3N0IDE3 Mi4yMC4xMC4xCi0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLQoKU2VydmljZSAoUG9y dCkgICAgICAgICAgVGhyZWF0IExldmVsCmdlbmVyYWwvdGNwICAgICAgICAgICAgIEhpZ2gKZ2Vu ZXJhbC90Y3AgICAgICAgICAgICAgSGlnaApnZW5lcmFsL3RjcCAgICAgICAgICAgICBIaWdoCmdl bmVyYWwvdGNwICAgICAgICAgICAgIEhpZ2gKZ2VuZXJhbC90Y3AgICAgICAgICAgICAgSGlnaApn ZW5lcmFsL3RjcCAgICAgICAgICAgICBIaWdoCgpTZWN1cml0eSBJc3N1ZXMgZm9yIEhvc3QgMTcy LjIwLjEwLjEKLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tCgpJc3N1ZQotLS0t LQpOVlQ6ICAgIFJlcG9ydCBvdXRkYXRlZCAvIGVuZC1vZi1saWZlIFNjYW4gRW5naW5lIC8gRW52 aXJvbm1lbnQgKGxvY2FsKQpPSUQ6ICAgIDEuMy42LjEuNC4xLjI1NjIzLjEuMC4xMDg1NjAKVGhy ZWF0OiBIaWdoIChDVlNTOiAxMC4wKQpQb3J0OiAgIGdlbmVyYWwvdGNwCgpTdW1tYXJ5OgpUaGlz IHNjcmlwdCBjaGVja3MgYW5kIHJlcG9ydHMgYW4gb3V0ZGF0ZWQgb3IgZW5kLW9mLWxpZmUgc2Nh biBlbmdpbmUKICBmb3IgdGhlIGZvbGxvd2luZyBlbnZpcm9ubWVudHM6CiAgLSBHcmVlbmJvbmUg U291cmNlIEVkaXRpb24gKEdTRSkKICAtIEdyZWVuYm9uZSBDb21tdW5pdHkgRWRpdGlvbiAoR0NF KQogIHVzZWQgZm9yIHRoaXMgc2Nhbi4KICBOT1RFOiBXaGlsZSB0aGlzIGlzIG5vdCwgaW4gYW5k IG9mIGl0c2VsZiwgYSBzZWN1cml0eSB2dWxuZXJhYmlsaXR5LCBhIHNldmVyaXQhCnkgaXMgcmVw b3J0ZWQgdG8gbWFrZSB5b3UgYXdhcmUKICBvZiBhIHBvc3NpYmxlIGRlY3JlYXNlZCBzY2FuIGNv dmVyYWdlIG9yIG1pc3NpbmcgZGV0ZWN0aW9uIG9mIHZ1bG5lcmFiaWxpdGllcyAhCm9uIHRoZSB0 YXJnZXQgZHVlIHRvIGUuZy46CiAgLSBtaXNzaW5nIGZ1bmN0aW9uYWxpdGllcwogIC0gbWlzc2lu ZyBidWdmaXhlcwogIC0gaW5jb21wYXRpYmlsaXRpZXMgd2l0aGluIHRoZSBmZWVkLgoKVnVsbmVy YWJpbGl0eSBEZXRlY3Rpb24gUmVzdWx0OgpJbnN0YWxsZWQgR1ZNIExpYnJhcmllcyAoZ3ZtLWxp YnMpIHZlcnNpb246ICAgICAgICA5LjAuMQpMYXRlc3QgYXZhaWxhYmxlIEdWTSBMaWJyYXJpZXMg KGd2bS1saWJzKSB2ZXJzaW9uOiAxMC4wLjIKUmVmZXJlbmNlIFVSTChzKSBmb3IgdGhlIGxhdGVz dCBhdmFpbGFibGUgdmVyc2lvbjogaHR0cHM6Ly9jb21tdW5pdHkuZ3JlZW5ib25lLm4hCmV0L3Qv Z3ZtLTExLXN0YWJsZS1pbml0aWFsLXJlbGVhc2UtMjAxOS0xMC0xNC8zNjc0IC8gaHR0cHM6Ly9j b21tdW5pdHkuZ3JlZW5ib25lIQoubmV0L3QvZ3ZtLTEwLW9sZC1zdGFibGUtaW5pdGlhbC1yZWxl YXNlLTIwMTktMDQtMDUvMjA4CgpTb2x1dGlvbjoKU29sdXRpb24gdHlwZTogVmVuZG9yRml4ClVw ZGF0ZSB0byB0aGUgbGF0ZXN0IGF2YWlsYWJsZSBzdGFibGUgcmVsZWFzZSBmb3IgeW91ciBzY2Fu IGVudmlyb25tZW50LiBQbGVhc2UgIQpjaGVjayB0aGUKICByZWZlcmVuY2VzIGZvciBtb3JlIGlu Zm9ybWF0aW9uLiBJZiB5b3UncmUgdXNpbmcgcGFja2FnZXMgcHJvdmlkZWQgYnkgeW91ciBMaW4h CnV4IGRpc3RyaWJ1dGlvbiBwbGVhc2UgY29udGFjdCB0aGUgbWFpbnRhaW5lcgogIG9mIHRoZSB1 c2VkIGRpc3RyaWJ1dGlvbiAvIHJlcG9zaXRvcnkgYW5kIHJlcXVlc3QgdXBkYXRlZCBwYWNrYWdl cy4KICBJZiB5b3Ugd2FudCB0byBhY2NlcHQgdGhlIHJpc2sgb2YgYSBwb3NzaWJsZSBkZWNyZWFz ZWQgc2NhbiBjb3ZlcmFnZSBvciBtaXNzaW4hCmcgZGV0ZWN0aW9uIG9mIHZ1bG5lcmFiaWxpdGll cyBvbiB0aGUgdGFyZ2V0IHlvdQogIGNhbiBzZXQgYSBnbG9iYWwgb3ZlcnJpZGUgZm9yIHRoaXMg c2NyaXB0IGFzIGRlc2NyaWJlZCBpbiB0aGUgbGlua2VkIG1hbnVhbHMuCgpWdWxuZXJhYmlsaXR5 IERldGVjdGlvbiBNZXRob2Q6CkRldGFpbHM6ClJlcG9ydCBvdXRkYXRlZCAvIGVuZC1vZi1saWZl IFNjYW4gRW5naW5lIC8gRW52aXJvbm1lbnQgKGxvY2FsKQooT0lEOiAxLjMuNi4xLjQuMS4yNTYy My4xLjAuMTA4NTYwKQpWZXJzaW9uIHVzZWQ6IDIwMjAtMDYtMTBUMTM6MjQ6MjArMDAwMAoKUmVm ZXJlbmNlczoKT3RoZXI6CiAgICBodHRwczovL3d3dy5ncmVlbmJvbmUubmV0L2VuL2luc3RhbGxf dXNlX2djZS8KICAgIGh0dHBzOi8vY29tbXVuaXR5LmdyZWVuYm9uZS5uZXQvdC9ndm0tOS1lbmQt b2YtbGlmZS1pbml0aWFsLXJlbGVhc2UtMjAxNy0wMy0wNy8yMTEKICAgIGh0dHBzOi8vY29tbXVu aXR5LmdyZWVuYm9uZS5uZXQvdC9ndm0tMTAtb2xkLXN0YWJsZS1pbml0aWFsLXJlbGVhc2UtMjAx OS0wNC0wNS8yMDgKICAgIGh0dHBzOi8vY29tbXVuaXR5LmdyZWVuYm9uZS5uZXQvdC9ndm0tMTEt c3RhYmxlLWluaXRpYWwtcmVsZWFzZS0yMDE5LTEwLTE0LzM2NzQKICAgIGh0dHBzOi8vZG9jcy5n cmVlbmJvbmUubmV0L0dTTS1NYW51YWwvZ29zLTQvZW4vcmVwb3J0cy5odG1sI2NyZWF0aW5nLWFu LW92ZXJyaWRlCiAgICBodHRwczovL2RvY3MuZ3JlZW5ib25lLm5ldC9HU00tTWFudWFsL2dvcy01 L2VuL3JlcG9ydHMuaHRtbCNjcmVhdGluZy1hbi1vdmVycmlkZQogICAgaHR0cHM6Ly9kb2NzLmdy ZWVuYm9uZS5uZXQvR1NNLU1hbnVhbC9nb3MtNi9lbi9yZXBvcnRzLmh0bWwjY3JlYXRpbmctYW4t b3ZlcnJpZGUKCgpJc3N1ZQotLS0tLQpOVlQ6ICAgIEltcG9ydGFudCBBbm5vdW5jZW1lbnQKT0lE OiAgICAxLjMuNi4xLjQuMS4yNTYyMy4xLjAuOTk5OTk4ClRocmVhdDogSGlnaCAoQ1ZTUzogMTAu MCkKUG9ydDogICBnZW5lcmFsL3RjcAoKU3VtbWFyeToKQVRURU5USU9OOgpZb3VyIHZ1bG5lcmFi aWxpdHkgdGVzdHMgYXJlIG91dCBvZiBtYWludGVuYW5jZSBhbmQgbm90IHVwZGF0ZWQgc2luY2Ug U2VwdGVtYmVyICEKMXN0IDIwMjAuIFlvdXIgc2V0dXAgb2YgR3JlZW5ib25lIFNvdXJjZSBFZGl0 aW9uIHdpbGwgbm90IHJlcG9ydCBhYm91dCBhbnkgbmV3IHQhCmhyZWF0cyBpbiB5b3VyIHNjYW5u ZWQgZW52aXJvbm1lbnQgc2luY2UgdGhpcyBkYXRlIQpSRUFTT046CllvdXIgR3JlZW5ib25lIHNl dHVwIGlzIGNvbm5lY3RlZCB0byBhIGRpc2NvbnRpbnVlZCBkb3dubG9hZCBzZXJ2ZXIgb2YgdGhl IEdyZWVuIQpib25lIENvbW11bml0eSBGZWVkLiBUaGUgR3JlZW5ib25lIENvbW11bml0eSBGZWVk IGlzIHN0aWxsIGF2YWlsYWJsZSB2aWEgYSBuZXcgZCEKb3dubG9hZCBzZXJ2ZXIuIFRoZSBkaXNj b250aW51YXRpb24gYW5ub3VuY2VtZW50IHdhcyBwb3N0ZWQgb24gTWF5IDEzdGggYXQgdGhlIEch CnJlZW5ib25lIENvbW11bml0eSBQb3J0YWwuClNPTFVUSU9OOgpZb3UgY2FuIGNvbnNpZGVyIHRv IHVwZ3JhZGUgeW91ciBzZXR1cCB0byBhIEdyZWVuYm9uZSBlbnRlcnByaXNlIHByb2R1Y3Qgd2hp Y2ggYSEKbHNvIHByb3ZpZGVzIHlvdSB0aGUgZnVsbCBzY2FuIGNvdmVyYWdlIHZpYSBHcmVlbmJv bmUgU2VjdXJpdHkgRmVlZCAoc2VlIFBST0ZFU1MhCklPTkFMIFNPTFVUSU9OKS4gQWx0ZXJuYXRp dmVseSB5b3UgY2FuIGNvbnRpbnVlIHdpdGggdGhlIEdyZWVuYm9uZSBDb21tdW5pdHkgRmVlIQpk IChzZWUgRlJFRSBDT01NVU5JVFkgU09MVVRJT04pLgpQUk9GRVNTSU9OQUwgU09MVVRJT04gKFVw Z3JhZGluZyB0byBmdWxsIGNvdmVyYWdlIHNjYW5uaW5nKQpXZSBhcmUgaGFwcHkgdGhhdCBvdXIg dGVjaG5vbG9neSBhbHJlYWR5IHRvZGF5IGhlbHBzIHlvdSB0byByZWR1Y2UgdGhlIGF0dGFjayBz dSEKcmZhY2Ugb2YgeW91ciBjb3Jwb3JhdGUgSVQgaW5mcmFzdHJ1Y3R1cmUuIE91ciBlbnRlcnBy aXNlIHByb2R1Y3RzIGNsb3NlIGJsaW5kIHMhCnBvdHMgb2YgdGhlIGNvbW11bml0eSBmZWVkIGFu ZCBnaXZlIGFjY2VzcyB0byBHcmVlbmJvbmUgc2VydmljZSBkZXNrLgpQbGVhc2UgY29udGFjdAp1 cGdyYWRlQGdyZWVuYm9uZS5uZXQKYW5kIHByb3ZpZGUgdGhlIGZvbGxvd2luZyBkZXRhaWxzICh1 c2UgY29weSZwYXN0ZSkuIFBsZWFzZSB1bmRlcnN0YW5kIHRoYXQgd2Ugd2khCmxsIG5vdCByZXBs eSB0byB5b3UgaWYgeW91IGRvIG5vdCBwcm92aWRlIGFsbCB0aGUgZGV0YWlscy4KICAtIENvbXBh bnkgbmFtZToKICAtIENvbXBhbnkgaG9tZXBhZ2U6CiAgLSBZb3VyIG5hbWU6CiAgLSBZb3VyIHBv c2l0aW9uIGluIHRoZSBjb21wYW55OgogIC0gVGhlIG51bWJlciBvZiBJUCBhZGRyZXNzZXMgeW91 IGFyZSBzY2FubmluZyB3aXRoIEdyZWVuYm9uZSAoY2EuKToKICAtIFRoZSBudW1iZXIgb2Ygc2Nh bm5lciBpbnN0YW5jZXMgeW91IGFyZSB1c2luZyB0byBzY2FuOgogIC0gQXJlIHlvdSB1c2luZyBh IG1hc3Rlci1zZW5zb3IgY29uZmlndXJhdGlvbjogeWVzL25vCkZlZWwgZnJlZSB0byBhZGQgYW55 IGFkZGl0aW9uYWwgaW5mb3JtYXRpb24geW91IHJlZ2FyZCBoZWxwZnVsIHRvIHVuZGVyc3RhbmQg eW91IQpyIHNldHVwLgpPdXIgdGVhbSB3aWxsIHJlY29tbWVuZCB0byB5b3UgYSBzdWl0YWJsZSBj b21tZXJjaWFsIG9wdGlvbi4gV2UgYXJlIGhhcHB5IHRvIGRpcyEKY3VzcyBsYXJnZXIgc2V0dXBz IGluIGRpcmVjdCBjb21tdW5pY2F0aW9uLgpZb3UgY2FuIGluZm9ybSB5b3Vyc2VsZiBhYm91dCBv dXIgc3RhbmRhcmQgcHJvZHVjdHMgaGVyZToKaHR0cHM6Ly93d3cuZ3JlZW5ib25lLm5ldC9lbi9w cm9kdWN0cy1zb2x1dGlvbnMvCkZSRUUgQ09NTVVOSVRZIFNPTFVUSU9OOiBDb250aW51ZSBzY2Fu bmluZyB3aXRoIGNvbW11bml0eSBmZWVkClRoZSBHcmVlbmJvbmUgQ29tbXVuaXR5IEZlZWQgaXMg c3RpbGwgYXZhaWxhYmxlIGFuZCB1cGRhdGVkIGRhaWx5LiBZb3UgbWF5IGhhdmUgIQpqdXN0IG1p c3NlZCB0aGUgdGVjaG5pY2FsIG5vdGVzIGFuZCBhbm5vdW5jZW1lbnQgaGVyZToKaHR0cHM6Ly9j b21tdW5pdHkuZ3JlZW5ib25lLm5ldC90L2NvbW11bml0eS1mZWVkLXVybC1jb25zb2xpZGF0aW9u LzUzMzgKClZ1bG5lcmFiaWxpdHkgRGV0ZWN0aW9uIFJlc3VsdDoKQVRURU5USU9OOgpZb3VyIHZ1 bG5lcmFiaWxpdHkgdGVzdHMgYXJlIG91dCBvZiBtYWludGVuYW5jZSBhbmQgbm90IHVwZGF0ZWQg c2luY2UgU2VwdGVtYmVyICEKMXN0IDIwMjAuIFlvdXIgc2V0dXAgb2YgR3JlZW5ib25lIFNvdXJj ZSBFZGl0aW9uIHdpbGwgbm90IHJlcG9ydCBhYm91dCBhbnkgbmV3IHQhCmhyZWF0cyBpbiB5b3Vy IHNjYW5uZWQgZW52aXJvbm1lbnQgc2luY2UgdGhpcyBkYXRlIQpSRUFTT046CllvdXIgR3JlZW5i b25lIHNldHVwIGlzIGNvbm5lY3RlZCB0byBhIGRpc2NvbnRpbnVlZCBkb3dubG9hZCBzZXJ2ZXIg b2YgdGhlIEdyZWVuIQpib25lIENvbW11bml0eSBGZWVkLiBUaGUgR3JlZW5ib25lIENvbW11bml0 eSBGZWVkIGlzIHN0aWxsIGF2YWlsYWJsZSB2aWEgYSBuZXcgZCEKb3dubG9hZCBzZXJ2ZXIuIFRo ZSBkaXNjb250aW51YXRpb24gYW5ub3VuY2VtZW50IHdhcyBwb3N0ZWQgb24gTWF5IDEzdGggYXQg dGhlIEchCnJlZW5ib25lIENvbW11bml0eSBQb3J0YWwuClNPTFVUSU9OOgpZb3UgY2FuIGNvbnNp ZGVyIHRvIHVwZ3JhZGUgeW91ciBzZXR1cCB0byBhIEdyZWVuYm9uZSBlbnRlcnByaXNlIHByb2R1 Y3Qgd2hpY2ggYSEKbHNvIHByb3ZpZGVzIHlvdSB0aGUgZnVsbCBzY2FuIGNvdmVyYWdlIHZpYSBH cmVlbmJvbmUgU2VjdXJpdHkgRmVlZCAoc2VlIFBST0ZFU1MhCklPTkFMIFNPTFVUSU9OKS4gQWx0 ZXJuYXRpdmVseSB5b3UgY2FuIGNvbnRpbnVlIHdpdGggdGhlIEdyZWVuYm9uZSBDb21tdW5pdHkg RmVlIQpkIChzZWUgRlJFRSBDT01NVU5JVFkgU09MVVRJT04pLgpQUk9GRVNTSU9OQUwgU09MVVRJ T04gKFVwZ3JhZGluZyB0byBmdWxsIGNvdmVyYWdlIHNjYW5uaW5nKQpXZSBhcmUgaGFwcHkgdGhh dCBvdXIgdGVjaG5vbG9neSBhbHJlYWR5IHRvZGF5IGhlbHBzIHlvdSB0byByZWR1Y2UgdGhlIGF0 dGFjayBzdSEKcmZhY2Ugb2YgeW91ciBjb3Jwb3JhdGUgSVQgaW5mcmFzdHJ1Y3R1cmUuIE91ciBl bnRlcnByaXNlIHByb2R1Y3RzIGNsb3NlIGJsaW5kIHMhCnBvdHMgb2YgdGhlIGNvbW11bml0eSBm ZWVkIGFuZCBnaXZlIGFjY2VzcyB0byBHcmVlbmJvbmUgc2VydmljZSBkZXNrLgpQbGVhc2UgY29u dGFjdAp1cGdyYWRlQGdyZWVuYm9uZS5uZXQKYW5kIHByb3ZpZGUgdGhlIGZvbGxvd2luZyBkZXRh aWxzICh1c2UgY29weSZwYXN0ZSkuIFBsZWFzZSB1bmRlcnN0YW5kIHRoYXQgd2Ugd2khCmxsIG5v dCByZXBseSB0byB5b3UgaWYgeW91IGRvIG5vdCBwcm92aWRlIGFsbCB0aGUgZGV0YWlscy4KICAt IENvbXBhbnkgbmFtZToKICAtIENvbXBhbnkgaG9tZXBhZ2U6CiAgLSBZb3VyIG5hbWU6CiAgLSBZ b3VyIHBvc2l0aW9uIGluIHRoZSBjb21wYW55OgogIC0gVGhlIG51bWJlciBvZiBJUCBhZGRyZXNz ZXMgeW91IGFyZSBzY2FubmluZyB3aXRoIEdyZWVuYm9uZSAoY2EuKToKICAtIFRoZSBudW1iZXIg b2Ygc2Nhbm5lciBpbnN0YW5jZXMgeW91IGFyZSB1c2luZyB0byBzY2FuOgogIC0gQXJlIHlvdSB1 c2luZyBhIG1hc3Rlci1zZW5zb3IgY29uZmlndXJhdGlvbjogeWVzL25vCkZlZWwgZnJlZSB0byBh ZGQgYW55IGFkZGl0aW9uYWwgaW5mb3JtYXRpb24geW91IHJlZ2FyZCBoZWxwZnVsIHRvIHVuZGVy c3RhbmQgeW91IQpyIHNldHVwLgpPdXIgdGVhbSB3aWxsIHJlY29tbWVuZCB0byB5b3UgYSBzdWl0 YWJsZSBjb21tZXJjaWFsIG9wdGlvbi4gV2UgYXJlIGhhcHB5IHRvIGRpcyEKY3VzcyBsYXJnZXIg c2V0dXBzIGluIGRpcmVjdCBjb21tdW5pY2F0aW9uLgpZb3UgY2FuIGluZm9ybSB5b3Vyc2VsZiBh Ym91dCBvdXIgc3RhbmRhcmQgcHJvZHVjdHMgaGVyZToKaHR0cHM6Ly93d3cuZ3JlZW5ib25lLm5l dC9lbi9wcm9kdWN0cy1zb2x1dGlvbnMvCkZSRUUgQ09NTVVOSVRZIFNPTFVUSU9OOiBDb250aW51 ZSBzY2FubmluZyB3aXRoIGNvbW11bml0eSBmZWVkClRoZSBHcmVlbmJvbmUgQ29tbXVuaXR5IEZl ZWQgaXMgc3RpbGwgYXZhaWxhYmxlIGFuZCB1cGRhdGVkIGRhaWx5LiBZb3UgbWF5IGhhdmUgIQpq dXN0IG1pc3NlZCB0aGUgdGVjaG5pY2FsIG5vdGVzIGFuZCBhbm5vdW5jZW1lbnQgaGVyZToKaHR0 cHM6Ly9jb21tdW5pdHkuZ3JlZW5ib25lLm5ldC90L2NvbW11bml0eS1mZWVkLXVybC1jb25zb2xp ZGF0aW9uLzUzMzgKClZ1bG5lcmFiaWxpdHkgRGV0ZWN0aW9uIE1ldGhvZDoKRGV0YWlsczoKSW1w b3J0YW50IEFubm91bmNlbWVudAooT0lEOiAxLjMuNi4xLjQuMS4yNTYyMy4xLjAuOTk5OTk4KQpW ZXJzaW9uIHVzZWQ6IDIwMjAtMDctMTRUMTE6MzE6NDgrMDAwMAoKUmVmZXJlbmNlczoKT3RoZXI6 CiAgICBodHRwczovL2NvbW11bml0eS5ncmVlbmJvbmUubmV0L3QvY29tbXVuaXR5LWZlZWQtdXJs LWNvbnNvbGlkYXRpb24vNTMzOAoKCg== --00000000000056de3905b00cdb48-- From owner-freebsd-pkg@freebsd.org Thu Sep 24 16:41:53 2020 Return-Path: Delivered-To: freebsd-pkg@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id B386A4218FF for ; Thu, 24 Sep 2020 16:41:53 +0000 (UTC) (envelope-from brooks@spindle.one-eyed-alien.net) Received: from spindle.one-eyed-alien.net (spindle.one-eyed-alien.net [199.48.129.229]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4By1685z6Lz3bMk for ; Thu, 24 Sep 2020 16:41:52 +0000 (UTC) (envelope-from brooks@spindle.one-eyed-alien.net) Received: by spindle.one-eyed-alien.net (Postfix, from userid 3001) id 7B5A13C0199; Thu, 24 Sep 2020 16:41:46 +0000 (UTC) Date: Thu, 24 Sep 2020 16:41:46 +0000 From: Brooks Davis To: "Yigithan Bilge (Student)" Cc: freebsd-pkg@freebsd.org Subject: Re: FreeBSD OpenVAS Configuration Message-ID: <20200924164146.GA64154@spindle.one-eyed-alien.net> References: MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="DocE+STaALJfprDB" Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.9.4 (2018-02-28) X-Rspamd-Queue-Id: 4By1685z6Lz3bMk X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=none (mx1.freebsd.org: domain of brooks@spindle.one-eyed-alien.net has no SPF policy when checking 199.48.129.229) smtp.mailfrom=brooks@spindle.one-eyed-alien.net X-Spamd-Result: default: False [-3.27 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.001]; FREEFALL_USER(0.00)[brooks]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; NEURAL_HAM_LONG(-1.02)[-1.015]; MIME_GOOD(-0.20)[multipart/signed,text/plain]; DMARC_NA(0.00)[freebsd.org]; AUTH_NA(1.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[]; NEURAL_HAM_SHORT(-0.36)[-0.357]; RCPT_COUNT_TWO(0.00)[2]; SIGNED_PGP(-2.00)[]; FORGED_SENDER(0.30)[brooks@freebsd.org,brooks@spindle.one-eyed-alien.net]; RCVD_COUNT_ZERO(0.00)[0]; R_SPF_NA(0.00)[no SPF record]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; ASN(0.00)[asn:36236, ipnet:199.48.128.0/22, country:US]; FROM_NEQ_ENVFROM(0.00)[brooks@freebsd.org,brooks@spindle.one-eyed-alien.net]; MAILMAN_DEST(0.00)[freebsd-pkg] X-BeenThere: freebsd-pkg@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Binary package management and package tools discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 24 Sep 2020 16:41:53 -0000 --DocE+STaALJfprDB Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable It appears that OpenVAS is complaining about itself in a confusing and unhelpful way. According to the following page, GVM is new branding for OpenVAS. https://wiki.gentoo.org/wiki/Greenbone_Vulnerability_Management -- Brooks On Thu, Sep 24, 2020 at 01:42:41PM +0300, Yigithan Bilge (Student) wrote: > Hey, >=20 > I currently work on a project to scan a network and find vulnerabilities > which has to be on FreeBSD. So, as a first step, I installed packages of > openvas9 and scanned the network by using the web interface. There is also > a server on ubuntu to see what openvas will find. >=20 > On the report, there is a vulnerability called ???Report outdated / > end-of-life Scan Engine / Environment (local)??? which makes me think the > system isn???t working quite well since the server has apache2 and open p= ort > 80 HTTP but couldn???t tell any of these as a vulnerability. >=20 > There is also a part on the report as: >=20 > Vulnerability Detection Result: > Installed GVM Libraries (gvm-libs) version: 9.0.1 > Latest available GVM Libraries (gvm-libs) version: 10.0.2 >=20 > I couldn???t update this gvm library, and I couldn???t even find this lib= rary > to update in the list of packages. All conversations and videos are on Ka= li > or etc. I have got in touch with the greenbone community and got thia > reply *"Greenbone > is not in charge for your version of our software. Therefore you should > contact the provider of your packages (most likely your distribution) and > create a request for updated packages."* >=20 > I also add the report, I hope someone can help me to solve the errors I > mentioned in the upper text. Sorry if I wrote something unnecessary or > irrelevant with this page, I am a student and quite new in this field. >=20 > Thank you > I Summary > =3D=3D=3D=3D=3D=3D=3D=3D=3D >=20 > This document reports on the results of an automatic security scan. > The report first summarises the results found. > Then, for each host, the report describes every issue found. > Please consider the advice given in each description, in order to rectify > the issue. >=20 > All dates are displayed using the timezone "Coordinated Universal Time", > which is abbreviated "UTC". >=20 > Vendor security updates are not trusted. >=20 > Overrides are on. When a result has an override, this report uses the > threat of the override. >=20 > Notes are included in the report.Information on overrides is included in = the report. >=20 > This report might not show details of all issues that were found. > It only lists hosts that produced issues. > Issues with the threat level "Log" are not shown. > Issues with the threat level "Debug" are not shown. > Issues with the threat level "False Positive" are not shown. > Only results with a minimum QoD of 70 are shown. >=20 > This report contains all 12 results selected by the > filtering described above. Before filtering there were 293 results. >=20 > Scan started:=20 > Scan ended: =20 > Task: Server Scanning - Apache2 >=20 > Host Summary > ************ >=20 > Host High Medium Low Log False Positive > 172.20.10.2 2 0 0 0 0 > 172.20.10.4 2 0 0 0 0 > 172.20.10.12 2 0 0 0 0 > 172.20.10.11 2 0 0 0 0 > 172.20.10.8 2 0 0 0 0 > 172.20.10.1 2 0 0 0 0 > Total: 6 12 0 0 0 0 >=20 >=20 > II Results per Host > =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D >=20 > Host 172.20.10.2 > **************** >=20 > Scanning of this host started at:=20 > Number of results: 2 >=20 > Port Summary for Host 172.20.10.2 > --------------------------------- >=20 > Service (Port) Threat Level > general/tcp High > general/tcp High > general/tcp High > general/tcp High > general/tcp High > general/tcp High >=20 > Security Issues for Host 172.20.10.2 > ------------------------------------ >=20 > Issue > ----- > NVT: Report outdated / end-of-life Scan Engine / Environment (local) > OID: 1.3.6.1.4.1.25623.1.0.108560 > Threat: High (CVSS: 10.0) > Port: general/tcp >=20 > Summary: > This script checks and reports an outdated or end-of-life scan engine > for the following environments: > - Greenbone Source Edition (GSE) > - Greenbone Community Edition (GCE) > used for this scan. > NOTE: While this is not, in and of itself, a security vulnerability, a = severit! > y is reported to make you aware > of a possible decreased scan coverage or missing detection of vulnerabi= lities ! > on the target due to e.g.: > - missing functionalities > - missing bugfixes > - incompatibilities within the feed. >=20 > Vulnerability Detection Result: > Installed GVM Libraries (gvm-libs) version: 9.0.1 > Latest available GVM Libraries (gvm-libs) version: 10.0.2 > Reference URL(s) for the latest available version: https://community.gree= nbone.n! > et/t/gvm-11-stable-initial-release-2019-10-14/3674 / https://community.gr= eenbone! > .net/t/gvm-10-old-stable-initial-release-2019-04-05/208 >=20 > Solution: > Solution type: VendorFix > Update to the latest available stable release for your scan environment. = Please ! > check the > references for more information. If you're using packages provided by y= our Lin! > ux distribution please contact the maintainer > of the used distribution / repository and request updated packages. > If you want to accept the risk of a possible decreased scan coverage or= missin! > g detection of vulnerabilities on the target you > can set a global override for this script as described in the linked ma= nuals. >=20 > Vulnerability Detection Method: > Details: > Report outdated / end-of-life Scan Engine / Environment (local) > (OID: 1.3.6.1.4.1.25623.1.0.108560) > Version used: 2020-06-10T13:24:20+0000 >=20 > References: > Other: > https://www.greenbone.net/en/install_use_gce/ > https://community.greenbone.net/t/gvm-9-end-of-life-initial-release-2= 017-03-07/211 > https://community.greenbone.net/t/gvm-10-old-stable-initial-release-2= 019-04-05/208 > https://community.greenbone.net/t/gvm-11-stable-initial-release-2019-= 10-14/3674 > https://docs.greenbone.net/GSM-Manual/gos-4/en/reports.html#creating-= an-override > https://docs.greenbone.net/GSM-Manual/gos-5/en/reports.html#creating-= an-override > https://docs.greenbone.net/GSM-Manual/gos-6/en/reports.html#creating-= an-override >=20 >=20 > Issue > ----- > NVT: Important Announcement > OID: 1.3.6.1.4.1.25623.1.0.999998 > Threat: High (CVSS: 10.0) > Port: general/tcp >=20 > Summary: > ATTENTION: > Your vulnerability tests are out of maintenance and not updated since Sep= tember ! > 1st 2020. Your setup of Greenbone Source Edition will not report about an= y new t! > hreats in your scanned environment since this date! > REASON: > Your Greenbone setup is connected to a discontinued download server of th= e Green! > bone Community Feed. The Greenbone Community Feed is still available via = a new d! > ownload server. The discontinuation announcement was posted on May 13th a= t the G! > reenbone Community Portal. > SOLUTION: > You can consider to upgrade your setup to a Greenbone enterprise product = which a! > lso provides you the full scan coverage via Greenbone Security Feed (see = PROFESS! > IONAL SOLUTION). Alternatively you can continue with the Greenbone Commun= ity Fee! > d (see FREE COMMUNITY SOLUTION). > PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) > We are happy that our technology already today helps you to reduce the at= tack su! > rface of your corporate IT infrastructure. Our enterprise products close = blind s! > pots of the community feed and give access to Greenbone service desk. > Please contact > upgrade@greenbone.net > and provide the following details (use copy&paste). Please understand tha= t we wi! > ll not reply to you if you do not provide all the details. > - Company name: > - Company homepage: > - Your name: > - Your position in the company: > - The number of IP addresses you are scanning with Greenbone (ca.): > - The number of scanner instances you are using to scan: > - Are you using a master-sensor configuration: yes/no > Feel free to add any additional information you regard helpful to underst= and you! > r setup. > Our team will recommend to you a suitable commercial option. We are happy= to dis! > cuss larger setups in direct communication. > You can inform yourself about our standard products here: > https://www.greenbone.net/en/products-solutions/ > FREE COMMUNITY SOLUTION: Continue scanning with community feed > The Greenbone Community Feed is still available and updated daily. You ma= y have ! > just missed the technical notes and announcement here: > https://community.greenbone.net/t/community-feed-url-consolidation/5338 >=20 > Vulnerability Detection Result: > ATTENTION: > Your vulnerability tests are out of maintenance and not updated since Sep= tember ! > 1st 2020. Your setup of Greenbone Source Edition will not report about an= y new t! > hreats in your scanned environment since this date! > REASON: > Your Greenbone setup is connected to a discontinued download server of th= e Green! > bone Community Feed. The Greenbone Community Feed is still available via = a new d! > ownload server. The discontinuation announcement was posted on May 13th a= t the G! > reenbone Community Portal. > SOLUTION: > You can consider to upgrade your setup to a Greenbone enterprise product = which a! > lso provides you the full scan coverage via Greenbone Security Feed (see = PROFESS! > IONAL SOLUTION). Alternatively you can continue with the Greenbone Commun= ity Fee! > d (see FREE COMMUNITY SOLUTION). > PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) > We are happy that our technology already today helps you to reduce the at= tack su! > rface of your corporate IT infrastructure. Our enterprise products close = blind s! > pots of the community feed and give access to Greenbone service desk. > Please contact > upgrade@greenbone.net > and provide the following details (use copy&paste). Please understand tha= t we wi! > ll not reply to you if you do not provide all the details. > - Company name: > - Company homepage: > - Your name: > - Your position in the company: > - The number of IP addresses you are scanning with Greenbone (ca.): > - The number of scanner instances you are using to scan: > - Are you using a master-sensor configuration: yes/no > Feel free to add any additional information you regard helpful to underst= and you! > r setup. > Our team will recommend to you a suitable commercial option. We are happy= to dis! > cuss larger setups in direct communication. > You can inform yourself about our standard products here: > https://www.greenbone.net/en/products-solutions/ > FREE COMMUNITY SOLUTION: Continue scanning with community feed > The Greenbone Community Feed is still available and updated daily. You ma= y have ! > just missed the technical notes and announcement here: > https://community.greenbone.net/t/community-feed-url-consolidation/5338 >=20 > Vulnerability Detection Method: > Details: > Important Announcement > (OID: 1.3.6.1.4.1.25623.1.0.999998) > Version used: 2020-07-14T11:31:48+0000 >=20 > References: > Other: > https://community.greenbone.net/t/community-feed-url-consolidation/53= 38 >=20 >=20 > Host 172.20.10.4 > **************** >=20 > Scanning of this host started at:=20 > Number of results: 2 >=20 > Port Summary for Host 172.20.10.4 > --------------------------------- >=20 > Service (Port) Threat Level > general/tcp High > general/tcp High > general/tcp High > general/tcp High > general/tcp High > general/tcp High >=20 > Security Issues for Host 172.20.10.4 > ------------------------------------ >=20 > Issue > ----- > NVT: Report outdated / end-of-life Scan Engine / Environment (local) > OID: 1.3.6.1.4.1.25623.1.0.108560 > Threat: High (CVSS: 10.0) > Port: general/tcp >=20 > Summary: > This script checks and reports an outdated or end-of-life scan engine > for the following environments: > - Greenbone Source Edition (GSE) > - Greenbone Community Edition (GCE) > used for this scan. > NOTE: While this is not, in and of itself, a security vulnerability, a = severit! > y is reported to make you aware > of a possible decreased scan coverage or missing detection of vulnerabi= lities ! > on the target due to e.g.: > - missing functionalities > - missing bugfixes > - incompatibilities within the feed. >=20 > Vulnerability Detection Result: > Installed GVM Libraries (gvm-libs) version: 9.0.1 > Latest available GVM Libraries (gvm-libs) version: 10.0.2 > Reference URL(s) for the latest available version: https://community.gree= nbone.n! > et/t/gvm-11-stable-initial-release-2019-10-14/3674 / https://community.gr= eenbone! > .net/t/gvm-10-old-stable-initial-release-2019-04-05/208 >=20 > Solution: > Solution type: VendorFix > Update to the latest available stable release for your scan environment. = Please ! > check the > references for more information. If you're using packages provided by y= our Lin! > ux distribution please contact the maintainer > of the used distribution / repository and request updated packages. > If you want to accept the risk of a possible decreased scan coverage or= missin! > g detection of vulnerabilities on the target you > can set a global override for this script as described in the linked ma= nuals. >=20 > Vulnerability Detection Method: > Details: > Report outdated / end-of-life Scan Engine / Environment (local) > (OID: 1.3.6.1.4.1.25623.1.0.108560) > Version used: 2020-06-10T13:24:20+0000 >=20 > References: > Other: > https://www.greenbone.net/en/install_use_gce/ > https://community.greenbone.net/t/gvm-9-end-of-life-initial-release-2= 017-03-07/211 > https://community.greenbone.net/t/gvm-10-old-stable-initial-release-2= 019-04-05/208 > https://community.greenbone.net/t/gvm-11-stable-initial-release-2019-= 10-14/3674 > https://docs.greenbone.net/GSM-Manual/gos-4/en/reports.html#creating-= an-override > https://docs.greenbone.net/GSM-Manual/gos-5/en/reports.html#creating-= an-override > https://docs.greenbone.net/GSM-Manual/gos-6/en/reports.html#creating-= an-override >=20 >=20 > Issue > ----- > NVT: Important Announcement > OID: 1.3.6.1.4.1.25623.1.0.999998 > Threat: High (CVSS: 10.0) > Port: general/tcp >=20 > Summary: > ATTENTION: > Your vulnerability tests are out of maintenance and not updated since Sep= tember ! > 1st 2020. Your setup of Greenbone Source Edition will not report about an= y new t! > hreats in your scanned environment since this date! > REASON: > Your Greenbone setup is connected to a discontinued download server of th= e Green! > bone Community Feed. The Greenbone Community Feed is still available via = a new d! > ownload server. The discontinuation announcement was posted on May 13th a= t the G! > reenbone Community Portal. > SOLUTION: > You can consider to upgrade your setup to a Greenbone enterprise product = which a! > lso provides you the full scan coverage via Greenbone Security Feed (see = PROFESS! > IONAL SOLUTION). Alternatively you can continue with the Greenbone Commun= ity Fee! > d (see FREE COMMUNITY SOLUTION). > PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) > We are happy that our technology already today helps you to reduce the at= tack su! > rface of your corporate IT infrastructure. Our enterprise products close = blind s! > pots of the community feed and give access to Greenbone service desk. > Please contact > upgrade@greenbone.net > and provide the following details (use copy&paste). Please understand tha= t we wi! > ll not reply to you if you do not provide all the details. > - Company name: > - Company homepage: > - Your name: > - Your position in the company: > - The number of IP addresses you are scanning with Greenbone (ca.): > - The number of scanner instances you are using to scan: > - Are you using a master-sensor configuration: yes/no > Feel free to add any additional information you regard helpful to underst= and you! > r setup. > Our team will recommend to you a suitable commercial option. We are happy= to dis! > cuss larger setups in direct communication. > You can inform yourself about our standard products here: > https://www.greenbone.net/en/products-solutions/ > FREE COMMUNITY SOLUTION: Continue scanning with community feed > The Greenbone Community Feed is still available and updated daily. You ma= y have ! > just missed the technical notes and announcement here: > https://community.greenbone.net/t/community-feed-url-consolidation/5338 >=20 > Vulnerability Detection Result: > ATTENTION: > Your vulnerability tests are out of maintenance and not updated since Sep= tember ! > 1st 2020. Your setup of Greenbone Source Edition will not report about an= y new t! > hreats in your scanned environment since this date! > REASON: > Your Greenbone setup is connected to a discontinued download server of th= e Green! > bone Community Feed. The Greenbone Community Feed is still available via = a new d! > ownload server. The discontinuation announcement was posted on May 13th a= t the G! > reenbone Community Portal. > SOLUTION: > You can consider to upgrade your setup to a Greenbone enterprise product = which a! > lso provides you the full scan coverage via Greenbone Security Feed (see = PROFESS! > IONAL SOLUTION). Alternatively you can continue with the Greenbone Commun= ity Fee! > d (see FREE COMMUNITY SOLUTION). > PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) > We are happy that our technology already today helps you to reduce the at= tack su! > rface of your corporate IT infrastructure. Our enterprise products close = blind s! > pots of the community feed and give access to Greenbone service desk. > Please contact > upgrade@greenbone.net > and provide the following details (use copy&paste). Please understand tha= t we wi! > ll not reply to you if you do not provide all the details. > - Company name: > - Company homepage: > - Your name: > - Your position in the company: > - The number of IP addresses you are scanning with Greenbone (ca.): > - The number of scanner instances you are using to scan: > - Are you using a master-sensor configuration: yes/no > Feel free to add any additional information you regard helpful to underst= and you! > r setup. > Our team will recommend to you a suitable commercial option. We are happy= to dis! > cuss larger setups in direct communication. > You can inform yourself about our standard products here: > https://www.greenbone.net/en/products-solutions/ > FREE COMMUNITY SOLUTION: Continue scanning with community feed > The Greenbone Community Feed is still available and updated daily. You ma= y have ! > just missed the technical notes and announcement here: > https://community.greenbone.net/t/community-feed-url-consolidation/5338 >=20 > Vulnerability Detection Method: > Details: > Important Announcement > (OID: 1.3.6.1.4.1.25623.1.0.999998) > Version used: 2020-07-14T11:31:48+0000 >=20 > References: > Other: > https://community.greenbone.net/t/community-feed-url-consolidation/53= 38 >=20 >=20 > Host 172.20.10.12 > ***************** >=20 > Scanning of this host started at:=20 > Number of results: 2 >=20 > Port Summary for Host 172.20.10.12 > ---------------------------------- >=20 > Service (Port) Threat Level > general/tcp High > general/tcp High > general/tcp High > general/tcp High > general/tcp High > general/tcp High >=20 > Security Issues for Host 172.20.10.12 > ------------------------------------- >=20 > Issue > ----- > NVT: Report outdated / end-of-life Scan Engine / Environment (local) > OID: 1.3.6.1.4.1.25623.1.0.108560 > Threat: High (CVSS: 10.0) > Port: general/tcp >=20 > Summary: > This script checks and reports an outdated or end-of-life scan engine > for the following environments: > - Greenbone Source Edition (GSE) > - Greenbone Community Edition (GCE) > used for this scan. > NOTE: While this is not, in and of itself, a security vulnerability, a = severit! > y is reported to make you aware > of a possible decreased scan coverage or missing detection of vulnerabi= lities ! > on the target due to e.g.: > - missing functionalities > - missing bugfixes > - incompatibilities within the feed. >=20 > Vulnerability Detection Result: > Installed GVM Libraries (gvm-libs) version: 9.0.1 > Latest available GVM Libraries (gvm-libs) version: 10.0.2 > Reference URL(s) for the latest available version: https://community.gree= nbone.n! > et/t/gvm-11-stable-initial-release-2019-10-14/3674 / https://community.gr= eenbone! > .net/t/gvm-10-old-stable-initial-release-2019-04-05/208 >=20 > Solution: > Solution type: VendorFix > Update to the latest available stable release for your scan environment. = Please ! > check the > references for more information. If you're using packages provided by y= our Lin! > ux distribution please contact the maintainer > of the used distribution / repository and request updated packages. > If you want to accept the risk of a possible decreased scan coverage or= missin! > g detection of vulnerabilities on the target you > can set a global override for this script as described in the linked ma= nuals. >=20 > Vulnerability Detection Method: > Details: > Report outdated / end-of-life Scan Engine / Environment (local) > (OID: 1.3.6.1.4.1.25623.1.0.108560) > Version used: 2020-06-10T13:24:20+0000 >=20 > References: > Other: > https://www.greenbone.net/en/install_use_gce/ > https://community.greenbone.net/t/gvm-9-end-of-life-initial-release-2= 017-03-07/211 > https://community.greenbone.net/t/gvm-10-old-stable-initial-release-2= 019-04-05/208 > https://community.greenbone.net/t/gvm-11-stable-initial-release-2019-= 10-14/3674 > https://docs.greenbone.net/GSM-Manual/gos-4/en/reports.html#creating-= an-override > https://docs.greenbone.net/GSM-Manual/gos-5/en/reports.html#creating-= an-override > https://docs.greenbone.net/GSM-Manual/gos-6/en/reports.html#creating-= an-override >=20 >=20 > Issue > ----- > NVT: Important Announcement > OID: 1.3.6.1.4.1.25623.1.0.999998 > Threat: High (CVSS: 10.0) > Port: general/tcp >=20 > Summary: > ATTENTION: > Your vulnerability tests are out of maintenance and not updated since Sep= tember ! > 1st 2020. Your setup of Greenbone Source Edition will not report about an= y new t! > hreats in your scanned environment since this date! > REASON: > Your Greenbone setup is connected to a discontinued download server of th= e Green! > bone Community Feed. The Greenbone Community Feed is still available via = a new d! > ownload server. The discontinuation announcement was posted on May 13th a= t the G! > reenbone Community Portal. > SOLUTION: > You can consider to upgrade your setup to a Greenbone enterprise product = which a! > lso provides you the full scan coverage via Greenbone Security Feed (see = PROFESS! > IONAL SOLUTION). Alternatively you can continue with the Greenbone Commun= ity Fee! > d (see FREE COMMUNITY SOLUTION). > PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) > We are happy that our technology already today helps you to reduce the at= tack su! > rface of your corporate IT infrastructure. Our enterprise products close = blind s! > pots of the community feed and give access to Greenbone service desk. > Please contact > upgrade@greenbone.net > and provide the following details (use copy&paste). Please understand tha= t we wi! > ll not reply to you if you do not provide all the details. > - Company name: > - Company homepage: > - Your name: > - Your position in the company: > - The number of IP addresses you are scanning with Greenbone (ca.): > - The number of scanner instances you are using to scan: > - Are you using a master-sensor configuration: yes/no > Feel free to add any additional information you regard helpful to underst= and you! > r setup. > Our team will recommend to you a suitable commercial option. We are happy= to dis! > cuss larger setups in direct communication. > You can inform yourself about our standard products here: > https://www.greenbone.net/en/products-solutions/ > FREE COMMUNITY SOLUTION: Continue scanning with community feed > The Greenbone Community Feed is still available and updated daily. You ma= y have ! > just missed the technical notes and announcement here: > https://community.greenbone.net/t/community-feed-url-consolidation/5338 >=20 > Vulnerability Detection Result: > ATTENTION: > Your vulnerability tests are out of maintenance and not updated since Sep= tember ! > 1st 2020. Your setup of Greenbone Source Edition will not report about an= y new t! > hreats in your scanned environment since this date! > REASON: > Your Greenbone setup is connected to a discontinued download server of th= e Green! > bone Community Feed. The Greenbone Community Feed is still available via = a new d! > ownload server. The discontinuation announcement was posted on May 13th a= t the G! > reenbone Community Portal. > SOLUTION: > You can consider to upgrade your setup to a Greenbone enterprise product = which a! > lso provides you the full scan coverage via Greenbone Security Feed (see = PROFESS! > IONAL SOLUTION). Alternatively you can continue with the Greenbone Commun= ity Fee! > d (see FREE COMMUNITY SOLUTION). > PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) > We are happy that our technology already today helps you to reduce the at= tack su! > rface of your corporate IT infrastructure. Our enterprise products close = blind s! > pots of the community feed and give access to Greenbone service desk. > Please contact > upgrade@greenbone.net > and provide the following details (use copy&paste). Please understand tha= t we wi! > ll not reply to you if you do not provide all the details. > - Company name: > - Company homepage: > - Your name: > - Your position in the company: > - The number of IP addresses you are scanning with Greenbone (ca.): > - The number of scanner instances you are using to scan: > - Are you using a master-sensor configuration: yes/no > Feel free to add any additional information you regard helpful to underst= and you! > r setup. > Our team will recommend to you a suitable commercial option. We are happy= to dis! > cuss larger setups in direct communication. > You can inform yourself about our standard products here: > https://www.greenbone.net/en/products-solutions/ > FREE COMMUNITY SOLUTION: Continue scanning with community feed > The Greenbone Community Feed is still available and updated daily. You ma= y have ! > just missed the technical notes and announcement here: > https://community.greenbone.net/t/community-feed-url-consolidation/5338 >=20 > Vulnerability Detection Method: > Details: > Important Announcement > (OID: 1.3.6.1.4.1.25623.1.0.999998) > Version used: 2020-07-14T11:31:48+0000 >=20 > References: > Other: > https://community.greenbone.net/t/community-feed-url-consolidation/53= 38 >=20 >=20 > Host 172.20.10.11 > ***************** >=20 > Scanning of this host started at:=20 > Number of results: 2 >=20 > Port Summary for Host 172.20.10.11 > ---------------------------------- >=20 > Service (Port) Threat Level > general/tcp High > general/tcp High > general/tcp High > general/tcp High > general/tcp High > general/tcp High >=20 > Security Issues for Host 172.20.10.11 > ------------------------------------- >=20 > Issue > ----- > NVT: Report outdated / end-of-life Scan Engine / Environment (local) > OID: 1.3.6.1.4.1.25623.1.0.108560 > Threat: High (CVSS: 10.0) > Port: general/tcp >=20 > Summary: > This script checks and reports an outdated or end-of-life scan engine > for the following environments: > - Greenbone Source Edition (GSE) > - Greenbone Community Edition (GCE) > used for this scan. > NOTE: While this is not, in and of itself, a security vulnerability, a = severit! > y is reported to make you aware > of a possible decreased scan coverage or missing detection of vulnerabi= lities ! > on the target due to e.g.: > - missing functionalities > - missing bugfixes > - incompatibilities within the feed. >=20 > Vulnerability Detection Result: > Installed GVM Libraries (gvm-libs) version: 9.0.1 > Latest available GVM Libraries (gvm-libs) version: 10.0.2 > Reference URL(s) for the latest available version: https://community.gree= nbone.n! > et/t/gvm-11-stable-initial-release-2019-10-14/3674 / https://community.gr= eenbone! > .net/t/gvm-10-old-stable-initial-release-2019-04-05/208 >=20 > Solution: > Solution type: VendorFix > Update to the latest available stable release for your scan environment. = Please ! > check the > references for more information. If you're using packages provided by y= our Lin! > ux distribution please contact the maintainer > of the used distribution / repository and request updated packages. > If you want to accept the risk of a possible decreased scan coverage or= missin! > g detection of vulnerabilities on the target you > can set a global override for this script as described in the linked ma= nuals. >=20 > Vulnerability Detection Method: > Details: > Report outdated / end-of-life Scan Engine / Environment (local) > (OID: 1.3.6.1.4.1.25623.1.0.108560) > Version used: 2020-06-10T13:24:20+0000 >=20 > References: > Other: > https://www.greenbone.net/en/install_use_gce/ > https://community.greenbone.net/t/gvm-9-end-of-life-initial-release-2= 017-03-07/211 > https://community.greenbone.net/t/gvm-10-old-stable-initial-release-2= 019-04-05/208 > https://community.greenbone.net/t/gvm-11-stable-initial-release-2019-= 10-14/3674 > https://docs.greenbone.net/GSM-Manual/gos-4/en/reports.html#creating-= an-override > https://docs.greenbone.net/GSM-Manual/gos-5/en/reports.html#creating-= an-override > https://docs.greenbone.net/GSM-Manual/gos-6/en/reports.html#creating-= an-override >=20 >=20 > Issue > ----- > NVT: Important Announcement > OID: 1.3.6.1.4.1.25623.1.0.999998 > Threat: High (CVSS: 10.0) > Port: general/tcp >=20 > Summary: > ATTENTION: > Your vulnerability tests are out of maintenance and not updated since Sep= tember ! > 1st 2020. Your setup of Greenbone Source Edition will not report about an= y new t! > hreats in your scanned environment since this date! > REASON: > Your Greenbone setup is connected to a discontinued download server of th= e Green! > bone Community Feed. The Greenbone Community Feed is still available via = a new d! > ownload server. The discontinuation announcement was posted on May 13th a= t the G! > reenbone Community Portal. > SOLUTION: > You can consider to upgrade your setup to a Greenbone enterprise product = which a! > lso provides you the full scan coverage via Greenbone Security Feed (see = PROFESS! > IONAL SOLUTION). Alternatively you can continue with the Greenbone Commun= ity Fee! > d (see FREE COMMUNITY SOLUTION). > PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) > We are happy that our technology already today helps you to reduce the at= tack su! > rface of your corporate IT infrastructure. Our enterprise products close = blind s! > pots of the community feed and give access to Greenbone service desk. > Please contact > upgrade@greenbone.net > and provide the following details (use copy&paste). Please understand tha= t we wi! > ll not reply to you if you do not provide all the details. > - Company name: > - Company homepage: > - Your name: > - Your position in the company: > - The number of IP addresses you are scanning with Greenbone (ca.): > - The number of scanner instances you are using to scan: > - Are you using a master-sensor configuration: yes/no > Feel free to add any additional information you regard helpful to underst= and you! > r setup. > Our team will recommend to you a suitable commercial option. We are happy= to dis! > cuss larger setups in direct communication. > You can inform yourself about our standard products here: > https://www.greenbone.net/en/products-solutions/ > FREE COMMUNITY SOLUTION: Continue scanning with community feed > The Greenbone Community Feed is still available and updated daily. You ma= y have ! > just missed the technical notes and announcement here: > https://community.greenbone.net/t/community-feed-url-consolidation/5338 >=20 > Vulnerability Detection Result: > ATTENTION: > Your vulnerability tests are out of maintenance and not updated since Sep= tember ! > 1st 2020. Your setup of Greenbone Source Edition will not report about an= y new t! > hreats in your scanned environment since this date! > REASON: > Your Greenbone setup is connected to a discontinued download server of th= e Green! > bone Community Feed. The Greenbone Community Feed is still available via = a new d! > ownload server. The discontinuation announcement was posted on May 13th a= t the G! > reenbone Community Portal. > SOLUTION: > You can consider to upgrade your setup to a Greenbone enterprise product = which a! > lso provides you the full scan coverage via Greenbone Security Feed (see = PROFESS! > IONAL SOLUTION). Alternatively you can continue with the Greenbone Commun= ity Fee! > d (see FREE COMMUNITY SOLUTION). > PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) > We are happy that our technology already today helps you to reduce the at= tack su! > rface of your corporate IT infrastructure. Our enterprise products close = blind s! > pots of the community feed and give access to Greenbone service desk. > Please contact > upgrade@greenbone.net > and provide the following details (use copy&paste). Please understand tha= t we wi! > ll not reply to you if you do not provide all the details. > - Company name: > - Company homepage: > - Your name: > - Your position in the company: > - The number of IP addresses you are scanning with Greenbone (ca.): > - The number of scanner instances you are using to scan: > - Are you using a master-sensor configuration: yes/no > Feel free to add any additional information you regard helpful to underst= and you! > r setup. > Our team will recommend to you a suitable commercial option. We are happy= to dis! > cuss larger setups in direct communication. > You can inform yourself about our standard products here: > https://www.greenbone.net/en/products-solutions/ > FREE COMMUNITY SOLUTION: Continue scanning with community feed > The Greenbone Community Feed is still available and updated daily. You ma= y have ! > just missed the technical notes and announcement here: > https://community.greenbone.net/t/community-feed-url-consolidation/5338 >=20 > Vulnerability Detection Method: > Details: > Important Announcement > (OID: 1.3.6.1.4.1.25623.1.0.999998) > Version used: 2020-07-14T11:31:48+0000 >=20 > References: > Other: > https://community.greenbone.net/t/community-feed-url-consolidation/53= 38 >=20 >=20 > Host 172.20.10.8 > **************** >=20 > Scanning of this host started at:=20 > Number of results: 2 >=20 > Port Summary for Host 172.20.10.8 > --------------------------------- >=20 > Service (Port) Threat Level > general/tcp High > general/tcp High > general/tcp High > general/tcp High > general/tcp High > general/tcp High >=20 > Security Issues for Host 172.20.10.8 > ------------------------------------ >=20 > Issue > ----- > NVT: Report outdated / end-of-life Scan Engine / Environment (local) > OID: 1.3.6.1.4.1.25623.1.0.108560 > Threat: High (CVSS: 10.0) > Port: general/tcp >=20 > Summary: > This script checks and reports an outdated or end-of-life scan engine > for the following environments: > - Greenbone Source Edition (GSE) > - Greenbone Community Edition (GCE) > used for this scan. > NOTE: While this is not, in and of itself, a security vulnerability, a = severit! > y is reported to make you aware > of a possible decreased scan coverage or missing detection of vulnerabi= lities ! > on the target due to e.g.: > - missing functionalities > - missing bugfixes > - incompatibilities within the feed. >=20 > Vulnerability Detection Result: > Installed GVM Libraries (gvm-libs) version: 9.0.1 > Latest available GVM Libraries (gvm-libs) version: 10.0.2 > Reference URL(s) for the latest available version: https://community.gree= nbone.n! > et/t/gvm-11-stable-initial-release-2019-10-14/3674 / https://community.gr= eenbone! > .net/t/gvm-10-old-stable-initial-release-2019-04-05/208 >=20 > Solution: > Solution type: VendorFix > Update to the latest available stable release for your scan environment. = Please ! > check the > references for more information. If you're using packages provided by y= our Lin! > ux distribution please contact the maintainer > of the used distribution / repository and request updated packages. > If you want to accept the risk of a possible decreased scan coverage or= missin! > g detection of vulnerabilities on the target you > can set a global override for this script as described in the linked ma= nuals. >=20 > Vulnerability Detection Method: > Details: > Report outdated / end-of-life Scan Engine / Environment (local) > (OID: 1.3.6.1.4.1.25623.1.0.108560) > Version used: 2020-06-10T13:24:20+0000 >=20 > References: > Other: > https://www.greenbone.net/en/install_use_gce/ > https://community.greenbone.net/t/gvm-9-end-of-life-initial-release-2= 017-03-07/211 > https://community.greenbone.net/t/gvm-10-old-stable-initial-release-2= 019-04-05/208 > https://community.greenbone.net/t/gvm-11-stable-initial-release-2019-= 10-14/3674 > https://docs.greenbone.net/GSM-Manual/gos-4/en/reports.html#creating-= an-override > https://docs.greenbone.net/GSM-Manual/gos-5/en/reports.html#creating-= an-override > https://docs.greenbone.net/GSM-Manual/gos-6/en/reports.html#creating-= an-override >=20 >=20 > Issue > ----- > NVT: Important Announcement > OID: 1.3.6.1.4.1.25623.1.0.999998 > Threat: High (CVSS: 10.0) > Port: general/tcp >=20 > Summary: > ATTENTION: > Your vulnerability tests are out of maintenance and not updated since Sep= tember ! > 1st 2020. Your setup of Greenbone Source Edition will not report about an= y new t! > hreats in your scanned environment since this date! > REASON: > Your Greenbone setup is connected to a discontinued download server of th= e Green! > bone Community Feed. The Greenbone Community Feed is still available via = a new d! > ownload server. The discontinuation announcement was posted on May 13th a= t the G! > reenbone Community Portal. > SOLUTION: > You can consider to upgrade your setup to a Greenbone enterprise product = which a! > lso provides you the full scan coverage via Greenbone Security Feed (see = PROFESS! > IONAL SOLUTION). Alternatively you can continue with the Greenbone Commun= ity Fee! > d (see FREE COMMUNITY SOLUTION). > PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) > We are happy that our technology already today helps you to reduce the at= tack su! > rface of your corporate IT infrastructure. Our enterprise products close = blind s! > pots of the community feed and give access to Greenbone service desk. > Please contact > upgrade@greenbone.net > and provide the following details (use copy&paste). Please understand tha= t we wi! > ll not reply to you if you do not provide all the details. > - Company name: > - Company homepage: > - Your name: > - Your position in the company: > - The number of IP addresses you are scanning with Greenbone (ca.): > - The number of scanner instances you are using to scan: > - Are you using a master-sensor configuration: yes/no > Feel free to add any additional information you regard helpful to underst= and you! > r setup. > Our team will recommend to you a suitable commercial option. We are happy= to dis! > cuss larger setups in direct communication. > You can inform yourself about our standard products here: > https://www.greenbone.net/en/products-solutions/ > FREE COMMUNITY SOLUTION: Continue scanning with community feed > The Greenbone Community Feed is still available and updated daily. You ma= y have ! > just missed the technical notes and announcement here: > https://community.greenbone.net/t/community-feed-url-consolidation/5338 >=20 > Vulnerability Detection Result: > ATTENTION: > Your vulnerability tests are out of maintenance and not updated since Sep= tember ! > 1st 2020. Your setup of Greenbone Source Edition will not report about an= y new t! > hreats in your scanned environment since this date! > REASON: > Your Greenbone setup is connected to a discontinued download server of th= e Green! > bone Community Feed. The Greenbone Community Feed is still available via = a new d! > ownload server. The discontinuation announcement was posted on May 13th a= t the G! > reenbone Community Portal. > SOLUTION: > You can consider to upgrade your setup to a Greenbone enterprise product = which a! > lso provides you the full scan coverage via Greenbone Security Feed (see = PROFESS! > IONAL SOLUTION). Alternatively you can continue with the Greenbone Commun= ity Fee! > d (see FREE COMMUNITY SOLUTION). > PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) > We are happy that our technology already today helps you to reduce the at= tack su! > rface of your corporate IT infrastructure. Our enterprise products close = blind s! > pots of the community feed and give access to Greenbone service desk. > Please contact > upgrade@greenbone.net > and provide the following details (use copy&paste). Please understand tha= t we wi! > ll not reply to you if you do not provide all the details. > - Company name: > - Company homepage: > - Your name: > - Your position in the company: > - The number of IP addresses you are scanning with Greenbone (ca.): > - The number of scanner instances you are using to scan: > - Are you using a master-sensor configuration: yes/no > Feel free to add any additional information you regard helpful to underst= and you! > r setup. > Our team will recommend to you a suitable commercial option. We are happy= to dis! > cuss larger setups in direct communication. > You can inform yourself about our standard products here: > https://www.greenbone.net/en/products-solutions/ > FREE COMMUNITY SOLUTION: Continue scanning with community feed > The Greenbone Community Feed is still available and updated daily. You ma= y have ! > just missed the technical notes and announcement here: > https://community.greenbone.net/t/community-feed-url-consolidation/5338 >=20 > Vulnerability Detection Method: > Details: > Important Announcement > (OID: 1.3.6.1.4.1.25623.1.0.999998) > Version used: 2020-07-14T11:31:48+0000 >=20 > References: > Other: > https://community.greenbone.net/t/community-feed-url-consolidation/53= 38 >=20 >=20 > Host 172.20.10.1 > **************** >=20 > Scanning of this host started at:=20 > Number of results: 2 >=20 > Port Summary for Host 172.20.10.1 > --------------------------------- >=20 > Service (Port) Threat Level > general/tcp High > general/tcp High > general/tcp High > general/tcp High > general/tcp High > general/tcp High >=20 > Security Issues for Host 172.20.10.1 > ------------------------------------ >=20 > Issue > ----- > NVT: Report outdated / end-of-life Scan Engine / Environment (local) > OID: 1.3.6.1.4.1.25623.1.0.108560 > Threat: High (CVSS: 10.0) > Port: general/tcp >=20 > Summary: > This script checks and reports an outdated or end-of-life scan engine > for the following environments: > - Greenbone Source Edition (GSE) > - Greenbone Community Edition (GCE) > used for this scan. > NOTE: While this is not, in and of itself, a security vulnerability, a = severit! > y is reported to make you aware > of a possible decreased scan coverage or missing detection of vulnerabi= lities ! > on the target due to e.g.: > - missing functionalities > - missing bugfixes > - incompatibilities within the feed. >=20 > Vulnerability Detection Result: > Installed GVM Libraries (gvm-libs) version: 9.0.1 > Latest available GVM Libraries (gvm-libs) version: 10.0.2 > Reference URL(s) for the latest available version: https://community.gree= nbone.n! > et/t/gvm-11-stable-initial-release-2019-10-14/3674 / https://community.gr= eenbone! > .net/t/gvm-10-old-stable-initial-release-2019-04-05/208 >=20 > Solution: > Solution type: VendorFix > Update to the latest available stable release for your scan environment. = Please ! > check the > references for more information. If you're using packages provided by y= our Lin! > ux distribution please contact the maintainer > of the used distribution / repository and request updated packages. > If you want to accept the risk of a possible decreased scan coverage or= missin! > g detection of vulnerabilities on the target you > can set a global override for this script as described in the linked ma= nuals. >=20 > Vulnerability Detection Method: > Details: > Report outdated / end-of-life Scan Engine / Environment (local) > (OID: 1.3.6.1.4.1.25623.1.0.108560) > Version used: 2020-06-10T13:24:20+0000 >=20 > References: > Other: > https://www.greenbone.net/en/install_use_gce/ > https://community.greenbone.net/t/gvm-9-end-of-life-initial-release-2= 017-03-07/211 > https://community.greenbone.net/t/gvm-10-old-stable-initial-release-2= 019-04-05/208 > https://community.greenbone.net/t/gvm-11-stable-initial-release-2019-= 10-14/3674 > https://docs.greenbone.net/GSM-Manual/gos-4/en/reports.html#creating-= an-override > https://docs.greenbone.net/GSM-Manual/gos-5/en/reports.html#creating-= an-override > https://docs.greenbone.net/GSM-Manual/gos-6/en/reports.html#creating-= an-override >=20 >=20 > Issue > ----- > NVT: Important Announcement > OID: 1.3.6.1.4.1.25623.1.0.999998 > Threat: High (CVSS: 10.0) > Port: general/tcp >=20 > Summary: > ATTENTION: > Your vulnerability tests are out of maintenance and not updated since Sep= tember ! > 1st 2020. Your setup of Greenbone Source Edition will not report about an= y new t! > hreats in your scanned environment since this date! > REASON: > Your Greenbone setup is connected to a discontinued download server of th= e Green! > bone Community Feed. The Greenbone Community Feed is still available via = a new d! > ownload server. The discontinuation announcement was posted on May 13th a= t the G! > reenbone Community Portal. > SOLUTION: > You can consider to upgrade your setup to a Greenbone enterprise product = which a! > lso provides you the full scan coverage via Greenbone Security Feed (see = PROFESS! > IONAL SOLUTION). Alternatively you can continue with the Greenbone Commun= ity Fee! > d (see FREE COMMUNITY SOLUTION). > PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) > We are happy that our technology already today helps you to reduce the at= tack su! > rface of your corporate IT infrastructure. Our enterprise products close = blind s! > pots of the community feed and give access to Greenbone service desk. > Please contact > upgrade@greenbone.net > and provide the following details (use copy&paste). Please understand tha= t we wi! > ll not reply to you if you do not provide all the details. > - Company name: > - Company homepage: > - Your name: > - Your position in the company: > - The number of IP addresses you are scanning with Greenbone (ca.): > - The number of scanner instances you are using to scan: > - Are you using a master-sensor configuration: yes/no > Feel free to add any additional information you regard helpful to underst= and you! > r setup. > Our team will recommend to you a suitable commercial option. We are happy= to dis! > cuss larger setups in direct communication. > You can inform yourself about our standard products here: > https://www.greenbone.net/en/products-solutions/ > FREE COMMUNITY SOLUTION: Continue scanning with community feed > The Greenbone Community Feed is still available and updated daily. You ma= y have ! > just missed the technical notes and announcement here: > https://community.greenbone.net/t/community-feed-url-consolidation/5338 >=20 > Vulnerability Detection Result: > ATTENTION: > Your vulnerability tests are out of maintenance and not updated since Sep= tember ! > 1st 2020. Your setup of Greenbone Source Edition will not report about an= y new t! > hreats in your scanned environment since this date! > REASON: > Your Greenbone setup is connected to a discontinued download server of th= e Green! > bone Community Feed. The Greenbone Community Feed is still available via = a new d! > ownload server. The discontinuation announcement was posted on May 13th a= t the G! > reenbone Community Portal. > SOLUTION: > You can consider to upgrade your setup to a Greenbone enterprise product = which a! > lso provides you the full scan coverage via Greenbone Security Feed (see = PROFESS! > IONAL SOLUTION). Alternatively you can continue with the Greenbone Commun= ity Fee! > d (see FREE COMMUNITY SOLUTION). > PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) > We are happy that our technology already today helps you to reduce the at= tack su! > rface of your corporate IT infrastructure. Our enterprise products close = blind s! > pots of the community feed and give access to Greenbone service desk. > Please contact > upgrade@greenbone.net > and provide the following details (use copy&paste). Please understand tha= t we wi! > ll not reply to you if you do not provide all the details. > - Company name: > - Company homepage: > - Your name: > - Your position in the company: > - The number of IP addresses you are scanning with Greenbone (ca.): > - The number of scanner instances you are using to scan: > - Are you using a master-sensor configuration: yes/no > Feel free to add any additional information you regard helpful to underst= and you! > r setup. > Our team will recommend to you a suitable commercial option. We are happy= to dis! > cuss larger setups in direct communication. > You can inform yourself about our standard products here: > https://www.greenbone.net/en/products-solutions/ > FREE COMMUNITY SOLUTION: Continue scanning with community feed > The Greenbone Community Feed is still available and updated daily. You ma= y have ! > just missed the technical notes and announcement here: > https://community.greenbone.net/t/community-feed-url-consolidation/5338 >=20 > Vulnerability Detection Method: > Details: > Important Announcement > (OID: 1.3.6.1.4.1.25623.1.0.999998) > Version used: 2020-07-14T11:31:48+0000 >=20 > References: > Other: > https://community.greenbone.net/t/community-feed-url-consolidation/53= 38 >=20 >=20 > _______________________________________________ > freebsd-pkg@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-pkg > To unsubscribe, send any mail to "freebsd-pkg-unsubscribe@freebsd.org" --DocE+STaALJfprDB Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQEbBAEBAgAGBQJfbMxJAAoJEKzQXbSebgfA5ZkH9ArLPOPEvCPjiVdcDHGBDXu4 PrNbORcuHkLV1HjGBxQMO+5BiNU8Kqnw9mWXYgLtTRK8aHrRKnQPeetCc/TjnZJD Z85ouCsUE+KCm8I65GVokUH3bue69encP+8q/QhP3+0+lLwovNGYMH8EnOpbOBrK mMrbrlSBXUhLfl5LwgKvx/cCOQ1tGeRukPYRTzoyG+zUOXtrBl6qSjE9/TNTm2cs 7P6W6j79Nl2TUOOXVTQYkpcFZbDp8NS5sw156RPJluDs+V9YLLdI0iJD7d8IuH+P eq/GmU9EI6Dyxw79eP/EZ37Vv948Mxe4YtLQgz8u2VgjHQRRskQdFzc7vUYd2w== =r/II -----END PGP SIGNATURE----- --DocE+STaALJfprDB-- From owner-freebsd-pkg@freebsd.org Fri Sep 25 10:54:48 2020 Return-Path: Delivered-To: freebsd-pkg@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 5612C3F27E3 for ; Fri, 25 Sep 2020 10:54:48 +0000 (UTC) (envelope-from yigithanbilge@sabanciuniv.edu) Received: from mail-wr1-x433.google.com (mail-wr1-x433.google.com [IPv6:2a00:1450:4864:20::433]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4ByTMC2Jlzz3VTr for ; Fri, 25 Sep 2020 10:54:46 +0000 (UTC) (envelope-from yigithanbilge@sabanciuniv.edu) Received: by mail-wr1-x433.google.com with SMTP id z1so3112755wrt.3 for ; Fri, 25 Sep 2020 03:54:46 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sabanciuniv-edu.20150623.gappssmtp.com; s=20150623; h=content-transfer-encoding:mime-version:subject:from:in-reply-to:cc :date:message-id:references:to; bh=q6TWUloMXp9EZ1hmw6ThSN48Y9CWAZU1xENzVf4qS7w=; b=vq43UJ7WJuMiezldD5vijaOuKpIv6HzMxFv+D0tuh3am8nHi1bTFpmH79WlijM8w5O TPcJlKADse+SV1lK0IkHoicBXk5nKFvhIuPzTEhVj3XzDLzb/DmtdBzGhOOUX6IVa2Ia rU0UE06NTYYpskXa/uKmGKRePNs4pY7Oq+E1eotqP/9bl2qLKZojqa0GR290ws8hJ4cN cZmwKsHL8B/jyoLwdzGmUAo+5sl4ZCff74RKPILrCC97nXyjHXGNZjs1Ja5CXhHS0jS6 jYwCaR3+pZTUGgzjgsPlFYkYzQ07piPCOPz6wcuxkriaXztF6dEO5Wo1buBDWUa+BwoV xfyg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:content-transfer-encoding:mime-version:subject :from:in-reply-to:cc:date:message-id:references:to; bh=q6TWUloMXp9EZ1hmw6ThSN48Y9CWAZU1xENzVf4qS7w=; b=n5LLzjQNPk81wLk9hcD7U30Ua8NoLNxzSnl/RLjSvimGQyqn/4OpVm+9uTgf2yAqBo XVofbkEGSNztJ+9fvnrvpDxSTz07P+DrG3eKkaFsAJ3J26xv7mFgb4SXdZQVH7kctdNc kKrmxGE81+l0mpnqnXdaNUDSUssf3J2M7e1RZf9OXxHwVJYWpJWf5EZ+iPeq+9Tbjw2n djFX9gR09XgzpeHxceg14Kp2lpz8S2peZcjvG6Yeyn/KMWLkV8X8x+E2UfsJBioxzLFV lKtpkQpbx5IPkoQydkYglqr3ruOwgrvYs50DgqmpjKvFy0sPAeC6PgEX3GBSD9r671KW sPtg== X-Gm-Message-State: AOAM531II5vRXVCsLFmQE87kjVQXicrcRhr4Ug6sVy5ecKO8SlFfrkCv xqf9PZ14z1QTs7ueYf5X/aQKiIx7h0PDWA== X-Google-Smtp-Source: ABdhPJwSv4aPWBDZrB7h1yga9pHKVWUf8NZflxPq7k2mBVbII3P208fXc7rQuXQtc1HgUwYHWiJddQ== X-Received: by 2002:adf:f290:: with SMTP id k16mr4111075wro.124.1601031282769; Fri, 25 Sep 2020 03:54:42 -0700 (PDT) Received: from [10.142.86.7] ([5.24.32.118]) by smtp.gmail.com with ESMTPSA id y1sm2387893wma.36.2020.09.25.03.54.41 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Fri, 25 Sep 2020 03:54:42 -0700 (PDT) Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Mime-Version: 1.0 (1.0) Subject: Re: FreeBSD OpenVAS Configuration From: "Yigithan Bilge (Student)" In-Reply-To: <20200924164146.GA64154@spindle.one-eyed-alien.net> Cc: freebsd-pkg@freebsd.org Date: Fri, 25 Sep 2020 13:54:40 +0300 Message-Id: References: <20200924164146.GA64154@spindle.one-eyed-alien.net> To: Brooks Davis X-Mailer: iPhone Mail (17H35) X-Rspamd-Queue-Id: 4ByTMC2Jlzz3VTr X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=sabanciuniv-edu.20150623.gappssmtp.com header.s=20150623 header.b=vq43UJ7W; dmarc=none; spf=pass (mx1.freebsd.org: domain of yigithanbilge@sabanciuniv.edu designates 2a00:1450:4864:20::433 as permitted sender) smtp.mailfrom=yigithanbilge@sabanciuniv.edu X-Spamd-Result: default: False [-2.45 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; ARC_NA(0.00)[]; R_DKIM_ALLOW(-0.20)[sabanciuniv-edu.20150623.gappssmtp.com:s=20150623]; MID_RHS_MATCH_FROM(0.00)[]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; MV_CASE(0.50)[]; R_SPF_ALLOW(-0.20)[+ip6:2a00:1450:4000::/36]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-pkg@freebsd.org]; DMARC_NA(0.00)[sabanciuniv.edu]; NEURAL_HAM_LONG(-1.02)[-1.025]; RCVD_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_SOME(0.00)[]; DKIM_TRACE(0.00)[sabanciuniv-edu.20150623.gappssmtp.com:+]; RCPT_COUNT_TWO(0.00)[2]; RCVD_IN_DNSWL_NONE(0.00)[2a00:1450:4864:20::433:from]; NEURAL_HAM_SHORT(-0.43)[-0.426]; NEURAL_HAM_MEDIUM(-1.00)[-0.995]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:15169, ipnet:2a00:1450::/32, country:US]; RCVD_TLS_ALL(0.00)[]; MAILMAN_DEST(0.00)[freebsd-pkg]; RECEIVED_SPAMHAUS_PBL(0.00)[5.24.32.118:received] X-BeenThere: freebsd-pkg@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Binary package management and package tools discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 25 Sep 2020 10:54:48 -0000 Thank you, but in the site you shared there are new packages named gvm-libs a= nd old packages named openvas. I can=E2=80=99t find and download new package= s, there is no reply for =E2=80=9Cpkg search gvm-libs=E2=80=9D command in th= e freebsd. How can I get these new updated packages? Do you have any idea? Thanks, ygthn > Brooks Davis =C5=9Funlar=C4=B1 yazd=C4=B1 (24 Eyl 202= 0 19:41): >=20 > =EF=BB=BFIt appears that OpenVAS is complaining about itself in a confusin= g and > unhelpful way. According to the following page, GVM is new branding for > OpenVAS. >=20 > https://wiki.gentoo.org/wiki/Greenbone_Vulnerability_Management >=20 > -- Brooks >=20 >>> On Thu, Sep 24, 2020 at 01:42:41PM +0300, Yigithan Bilge (Student) wrote= : >> Hey, >> I currently work on a project to scan a network and find vulnerabilities >> which has to be on FreeBSD. So, as a first step, I installed packages of >> openvas9 and scanned the network by using the web interface. There is als= o >> a server on ubuntu to see what openvas will find. >> On the report, there is a vulnerability called ???Report outdated / >> end-of-life Scan Engine / Environment (local)??? which makes me think the= >> system isn???t working quite well since the server has apache2 and open p= ort >> 80 HTTP but couldn???t tell any of these as a vulnerability. >> There is also a part on the report as: >> Vulnerability Detection Result: >> Installed GVM Libraries (gvm-libs) version: 9.0.1 >> Latest available GVM Libraries (gvm-libs) version: 10.0.2 >> I couldn???t update this gvm library, and I couldn???t even find this lib= rary >> to update in the list of packages. All conversations and videos are on Ka= li >> or etc. I have got in touch with the greenbone community and got thia >> reply *"Greenbone >> is not in charge for your version of our software. Therefore you should >> contact the provider of your packages (most likely your distribution) and= >> create a request for updated packages."* >> I also add the report, I hope someone can help me to solve the errors I >> mentioned in the upper text. Sorry if I wrote something unnecessary or >> irrelevant with this page, I am a student and quite new in this field. >> Thank you >=20 >> I Summary >> =3D=3D=3D=3D=3D=3D=3D=3D=3D >> This document reports on the results of an automatic security scan. >> The report first summarises the results found. >> Then, for each host, the report describes every issue found. >> Please consider the advice given in each description, in order to rectify= >> the issue. >> All dates are displayed using the timezone "Coordinated Universal Time", >> which is abbreviated "UTC". >> Vendor security updates are not trusted. >> Overrides are on. When a result has an override, this report uses the >> threat of the override. >> Notes are included in the report.Information on overrides is included in t= he report. >> This report might not show details of all issues that were found. >> It only lists hosts that produced issues. >> Issues with the threat level "Log" are not shown. >> Issues with the threat level "Debug" are not shown. >> Issues with the threat level "False Positive" are not shown. >> Only results with a minimum QoD of 70 are shown. >> This report contains all 12 results selected by the >> filtering described above. Before filtering there were 293 results. >> Scan started: >> Scan ended: =20 >> Task: Server Scanning - Apache2 >> Host Summary >> ************ >> Host High Medium Low Log False Positive >> 172.20.10.2 2 0 0 0 0 >> 172.20.10.4 2 0 0 0 0 >> 172.20.10.12 2 0 0 0 0 >> 172.20.10.11 2 0 0 0 0 >> 172.20.10.8 2 0 0 0 0 >> 172.20.10.1 2 0 0 0 0 >> Total: 6 12 0 0 0 0 >> II Results per Host >> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D >> Host 172.20.10.2 >> **************** >> Scanning of this host started at: >> Number of results: 2 >> Port Summary for Host 172.20.10.2 >> --------------------------------- >> Service (Port) Threat Level >> general/tcp High >> general/tcp High >> general/tcp High >> general/tcp High >> general/tcp High >> general/tcp High >> Security Issues for Host 172.20.10.2 >> ------------------------------------ >> Issue >> ----- >> NVT: Report outdated / end-of-life Scan Engine / Environment (local) >> OID: 1.3.6.1.4.1.25623.1.0.108560 >> Threat: High (CVSS: 10.0) >> Port: general/tcp >> Summary: >> This script checks and reports an outdated or end-of-life scan engine >> for the following environments: >> - Greenbone Source Edition (GSE) >> - Greenbone Community Edition (GCE) >> used for this scan. >> NOTE: While this is not, in and of itself, a security vulnerability, a se= verit! >> y is reported to make you aware >> of a possible decreased scan coverage or missing detection of vulnerabili= ties ! >> on the target due to e.g.: >> - missing functionalities >> - missing bugfixes >> - incompatibilities within the feed. >> Vulnerability Detection Result: >> Installed GVM Libraries (gvm-libs) version: 9.0.1 >> Latest available GVM Libraries (gvm-libs) version: 10.0.2 >> Reference URL(s) for the latest available version: https://community.gree= nbone.n! >> et/t/gvm-11-stable-initial-release-2019-10-14/3674 / https://community.gr= eenbone! >> .net/t/gvm-10-old-stable-initial-release-2019-04-05/208 >> Solution: >> Solution type: VendorFix >> Update to the latest available stable release for your scan environment. P= lease ! >> check the >> references for more information. If you're using packages provided by you= r Lin! >> ux distribution please contact the maintainer >> of the used distribution / repository and request updated packages. >> If you want to accept the risk of a possible decreased scan coverage or m= issin! >> g detection of vulnerabilities on the target you >> can set a global override for this script as described in the linked manu= als. >> Vulnerability Detection Method: >> Details: >> Report outdated / end-of-life Scan Engine / Environment (local) >> (OID: 1.3.6.1.4.1.25623.1.0.108560) >> Version used: 2020-06-10T13:24:20+0000 >> References: >> Other: >> https://www.greenbone.net/en/install_use_gce/ >> https://community.greenbone.net/t/gvm-9-end-of-life-initial-release-201= 7-03-07/211 >> https://community.greenbone.net/t/gvm-10-old-stable-initial-release-201= 9-04-05/208 >> https://community.greenbone.net/t/gvm-11-stable-initial-release-2019-10= -14/3674 >> https://docs.greenbone.net/GSM-Manual/gos-4/en/reports.html#creating-an= -override >> https://docs.greenbone.net/GSM-Manual/gos-5/en/reports.html#creating-an= -override >> https://docs.greenbone.net/GSM-Manual/gos-6/en/reports.html#creating-an= -override >> Issue >> ----- >> NVT: Important Announcement >> OID: 1.3.6.1.4.1.25623.1.0.999998 >> Threat: High (CVSS: 10.0) >> Port: general/tcp >> Summary: >> ATTENTION: >> Your vulnerability tests are out of maintenance and not updated since Sep= tember ! >> 1st 2020. Your setup of Greenbone Source Edition will not report about an= y new t! >> hreats in your scanned environment since this date! >> REASON: >> Your Greenbone setup is connected to a discontinued download server of th= e Green! >> bone Community Feed. The Greenbone Community Feed is still available via a= new d! >> ownload server. The discontinuation announcement was posted on May 13th a= t the G! >> reenbone Community Portal. >> SOLUTION: >> You can consider to upgrade your setup to a Greenbone enterprise product w= hich a! >> lso provides you the full scan coverage via Greenbone Security Feed (see P= ROFESS! >> IONAL SOLUTION). Alternatively you can continue with the Greenbone Commun= ity Fee! >> d (see FREE COMMUNITY SOLUTION). >> PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) >> We are happy that our technology already today helps you to reduce the at= tack su! >> rface of your corporate IT infrastructure. Our enterprise products close b= lind s! >> pots of the community feed and give access to Greenbone service desk. >> Please contact >> upgrade@greenbone.net >> and provide the following details (use copy&paste). Please understand tha= t we wi! >> ll not reply to you if you do not provide all the details. >> - Company name: >> - Company homepage: >> - Your name: >> - Your position in the company: >> - The number of IP addresses you are scanning with Greenbone (ca.): >> - The number of scanner instances you are using to scan: >> - Are you using a master-sensor configuration: yes/no >> Feel free to add any additional information you regard helpful to underst= and you! >> r setup. >> Our team will recommend to you a suitable commercial option. We are happy= to dis! >> cuss larger setups in direct communication. >> You can inform yourself about our standard products here: >> https://www.greenbone.net/en/products-solutions/ >> FREE COMMUNITY SOLUTION: Continue scanning with community feed >> The Greenbone Community Feed is still available and updated daily. You ma= y have ! >> just missed the technical notes and announcement here: >> https://community.greenbone.net/t/community-feed-url-consolidation/5338 >> Vulnerability Detection Result: >> ATTENTION: >> Your vulnerability tests are out of maintenance and not updated since Sep= tember ! >> 1st 2020. Your setup of Greenbone Source Edition will not report about an= y new t! >> hreats in your scanned environment since this date! >> REASON: >> Your Greenbone setup is connected to a discontinued download server of th= e Green! >> bone Community Feed. The Greenbone Community Feed is still available via a= new d! >> ownload server. The discontinuation announcement was posted on May 13th a= t the G! >> reenbone Community Portal. >> SOLUTION: >> You can consider to upgrade your setup to a Greenbone enterprise product w= hich a! >> lso provides you the full scan coverage via Greenbone Security Feed (see P= ROFESS! >> IONAL SOLUTION). Alternatively you can continue with the Greenbone Commun= ity Fee! >> d (see FREE COMMUNITY SOLUTION). >> PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) >> We are happy that our technology already today helps you to reduce the at= tack su! >> rface of your corporate IT infrastructure. Our enterprise products close b= lind s! >> pots of the community feed and give access to Greenbone service desk. >> Please contact >> upgrade@greenbone.net >> and provide the following details (use copy&paste). Please understand tha= t we wi! >> ll not reply to you if you do not provide all the details. >> - Company name: >> - Company homepage: >> - Your name: >> - Your position in the company: >> - The number of IP addresses you are scanning with Greenbone (ca.): >> - The number of scanner instances you are using to scan: >> - Are you using a master-sensor configuration: yes/no >> Feel free to add any additional information you regard helpful to underst= and you! >> r setup. >> Our team will recommend to you a suitable commercial option. We are happy= to dis! >> cuss larger setups in direct communication. >> You can inform yourself about our standard products here: >> https://www.greenbone.net/en/products-solutions/ >> FREE COMMUNITY SOLUTION: Continue scanning with community feed >> The Greenbone Community Feed is still available and updated daily. You ma= y have ! >> just missed the technical notes and announcement here: >> https://community.greenbone.net/t/community-feed-url-consolidation/5338 >> Vulnerability Detection Method: >> Details: >> Important Announcement >> (OID: 1.3.6.1.4.1.25623.1.0.999998) >> Version used: 2020-07-14T11:31:48+0000 >> References: >> Other: >> https://community.greenbone.net/t/community-feed-url-consolidation/5338= >> Host 172.20.10.4 >> **************** >> Scanning of this host started at: >> Number of results: 2 >> Port Summary for Host 172.20.10.4 >> --------------------------------- >> Service (Port) Threat Level >> general/tcp High >> general/tcp High >> general/tcp High >> general/tcp High >> general/tcp High >> general/tcp High >> Security Issues for Host 172.20.10.4 >> ------------------------------------ >> Issue >> ----- >> NVT: Report outdated / end-of-life Scan Engine / Environment (local) >> OID: 1.3.6.1.4.1.25623.1.0.108560 >> Threat: High (CVSS: 10.0) >> Port: general/tcp >> Summary: >> This script checks and reports an outdated or end-of-life scan engine >> for the following environments: >> - Greenbone Source Edition (GSE) >> - Greenbone Community Edition (GCE) >> used for this scan. >> NOTE: While this is not, in and of itself, a security vulnerability, a se= verit! >> y is reported to make you aware >> of a possible decreased scan coverage or missing detection of vulnerabili= ties ! >> on the target due to e.g.: >> - missing functionalities >> - missing bugfixes >> - incompatibilities within the feed. >> Vulnerability Detection Result: >> Installed GVM Libraries (gvm-libs) version: 9.0.1 >> Latest available GVM Libraries (gvm-libs) version: 10.0.2 >> Reference URL(s) for the latest available version: https://community.gree= nbone.n! >> et/t/gvm-11-stable-initial-release-2019-10-14/3674 / https://community.gr= eenbone! >> .net/t/gvm-10-old-stable-initial-release-2019-04-05/208 >> Solution: >> Solution type: VendorFix >> Update to the latest available stable release for your scan environment. P= lease ! >> check the >> references for more information. If you're using packages provided by you= r Lin! >> ux distribution please contact the maintainer >> of the used distribution / repository and request updated packages. >> If you want to accept the risk of a possible decreased scan coverage or m= issin! >> g detection of vulnerabilities on the target you >> can set a global override for this script as described in the linked manu= als. >> Vulnerability Detection Method: >> Details: >> Report outdated / end-of-life Scan Engine / Environment (local) >> (OID: 1.3.6.1.4.1.25623.1.0.108560) >> Version used: 2020-06-10T13:24:20+0000 >> References: >> Other: >> https://www.greenbone.net/en/install_use_gce/ >> https://community.greenbone.net/t/gvm-9-end-of-life-initial-release-201= 7-03-07/211 >> https://community.greenbone.net/t/gvm-10-old-stable-initial-release-201= 9-04-05/208 >> https://community.greenbone.net/t/gvm-11-stable-initial-release-2019-10= -14/3674 >> https://docs.greenbone.net/GSM-Manual/gos-4/en/reports.html#creating-an= -override >> https://docs.greenbone.net/GSM-Manual/gos-5/en/reports.html#creating-an= -override >> https://docs.greenbone.net/GSM-Manual/gos-6/en/reports.html#creating-an= -override >> Issue >> ----- >> NVT: Important Announcement >> OID: 1.3.6.1.4.1.25623.1.0.999998 >> Threat: High (CVSS: 10.0) >> Port: general/tcp >> Summary: >> ATTENTION: >> Your vulnerability tests are out of maintenance and not updated since Sep= tember ! >> 1st 2020. Your setup of Greenbone Source Edition will not report about an= y new t! >> hreats in your scanned environment since this date! >> REASON: >> Your Greenbone setup is connected to a discontinued download server of th= e Green! >> bone Community Feed. The Greenbone Community Feed is still available via a= new d! >> ownload server. The discontinuation announcement was posted on May 13th a= t the G! >> reenbone Community Portal. >> SOLUTION: >> You can consider to upgrade your setup to a Greenbone enterprise product w= hich a! >> lso provides you the full scan coverage via Greenbone Security Feed (see P= ROFESS! >> IONAL SOLUTION). Alternatively you can continue with the Greenbone Commun= ity Fee! >> d (see FREE COMMUNITY SOLUTION). >> PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) >> We are happy that our technology already today helps you to reduce the at= tack su! >> rface of your corporate IT infrastructure. Our enterprise products close b= lind s! >> pots of the community feed and give access to Greenbone service desk. >> Please contact >> upgrade@greenbone.net >> and provide the following details (use copy&paste). Please understand tha= t we wi! >> ll not reply to you if you do not provide all the details. >> - Company name: >> - Company homepage: >> - Your name: >> - Your position in the company: >> - The number of IP addresses you are scanning with Greenbone (ca.): >> - The number of scanner instances you are using to scan: >> - Are you using a master-sensor configuration: yes/no >> Feel free to add any additional information you regard helpful to underst= and you! >> r setup. >> Our team will recommend to you a suitable commercial option. We are happy= to dis! >> cuss larger setups in direct communication. >> You can inform yourself about our standard products here: >> https://www.greenbone.net/en/products-solutions/ >> FREE COMMUNITY SOLUTION: Continue scanning with community feed >> The Greenbone Community Feed is still available and updated daily. You ma= y have ! >> just missed the technical notes and announcement here: >> https://community.greenbone.net/t/community-feed-url-consolidation/5338 >> Vulnerability Detection Result: >> ATTENTION: >> Your vulnerability tests are out of maintenance and not updated since Sep= tember ! >> 1st 2020. Your setup of Greenbone Source Edition will not report about an= y new t! >> hreats in your scanned environment since this date! >> REASON: >> Your Greenbone setup is connected to a discontinued download server of th= e Green! >> bone Community Feed. The Greenbone Community Feed is still available via a= new d! >> ownload server. The discontinuation announcement was posted on May 13th a= t the G! >> reenbone Community Portal. >> SOLUTION: >> You can consider to upgrade your setup to a Greenbone enterprise product w= hich a! >> lso provides you the full scan coverage via Greenbone Security Feed (see P= ROFESS! >> IONAL SOLUTION). Alternatively you can continue with the Greenbone Commun= ity Fee! >> d (see FREE COMMUNITY SOLUTION). >> PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) >> We are happy that our technology already today helps you to reduce the at= tack su! >> rface of your corporate IT infrastructure. Our enterprise products close b= lind s! >> pots of the community feed and give access to Greenbone service desk. >> Please contact >> upgrade@greenbone.net >> and provide the following details (use copy&paste). Please understand tha= t we wi! >> ll not reply to you if you do not provide all the details. >> - Company name: >> - Company homepage: >> - Your name: >> - Your position in the company: >> - The number of IP addresses you are scanning with Greenbone (ca.): >> - The number of scanner instances you are using to scan: >> - Are you using a master-sensor configuration: yes/no >> Feel free to add any additional information you regard helpful to underst= and you! >> r setup. >> Our team will recommend to you a suitable commercial option. We are happy= to dis! >> cuss larger setups in direct communication. >> You can inform yourself about our standard products here: >> https://www.greenbone.net/en/products-solutions/ >> FREE COMMUNITY SOLUTION: Continue scanning with community feed >> The Greenbone Community Feed is still available and updated daily. You ma= y have ! >> just missed the technical notes and announcement here: >> https://community.greenbone.net/t/community-feed-url-consolidation/5338 >> Vulnerability Detection Method: >> Details: >> Important Announcement >> (OID: 1.3.6.1.4.1.25623.1.0.999998) >> Version used: 2020-07-14T11:31:48+0000 >> References: >> Other: >> https://community.greenbone.net/t/community-feed-url-consolidation/5338= >> Host 172.20.10.12 >> ***************** >> Scanning of this host started at: >> Number of results: 2 >> Port Summary for Host 172.20.10.12 >> ---------------------------------- >> Service (Port) Threat Level >> general/tcp High >> general/tcp High >> general/tcp High >> general/tcp High >> general/tcp High >> general/tcp High >> Security Issues for Host 172.20.10.12 >> ------------------------------------- >> Issue >> ----- >> NVT: Report outdated / end-of-life Scan Engine / Environment (local) >> OID: 1.3.6.1.4.1.25623.1.0.108560 >> Threat: High (CVSS: 10.0) >> Port: general/tcp >> Summary: >> This script checks and reports an outdated or end-of-life scan engine >> for the following environments: >> - Greenbone Source Edition (GSE) >> - Greenbone Community Edition (GCE) >> used for this scan. >> NOTE: While this is not, in and of itself, a security vulnerability, a se= verit! >> y is reported to make you aware >> of a possible decreased scan coverage or missing detection of vulnerabili= ties ! >> on the target due to e.g.: >> - missing functionalities >> - missing bugfixes >> - incompatibilities within the feed. >> Vulnerability Detection Result: >> Installed GVM Libraries (gvm-libs) version: 9.0.1 >> Latest available GVM Libraries (gvm-libs) version: 10.0.2 >> Reference URL(s) for the latest available version: https://community.gree= nbone.n! >> et/t/gvm-11-stable-initial-release-2019-10-14/3674 / https://community.gr= eenbone! >> .net/t/gvm-10-old-stable-initial-release-2019-04-05/208 >> Solution: >> Solution type: VendorFix >> Update to the latest available stable release for your scan environment. P= lease ! >> check the >> references for more information. If you're using packages provided by you= r Lin! >> ux distribution please contact the maintainer >> of the used distribution / repository and request updated packages. >> If you want to accept the risk of a possible decreased scan coverage or m= issin! >> g detection of vulnerabilities on the target you >> can set a global override for this script as described in the linked manu= als. >> Vulnerability Detection Method: >> Details: >> Report outdated / end-of-life Scan Engine / Environment (local) >> (OID: 1.3.6.1.4.1.25623.1.0.108560) >> Version used: 2020-06-10T13:24:20+0000 >> References: >> Other: >> https://www.greenbone.net/en/install_use_gce/ >> https://community.greenbone.net/t/gvm-9-end-of-life-initial-release-201= 7-03-07/211 >> https://community.greenbone.net/t/gvm-10-old-stable-initial-release-201= 9-04-05/208 >> https://community.greenbone.net/t/gvm-11-stable-initial-release-2019-10= -14/3674 >> https://docs.greenbone.net/GSM-Manual/gos-4/en/reports.html#creating-an= -override >> https://docs.greenbone.net/GSM-Manual/gos-5/en/reports.html#creating-an= -override >> https://docs.greenbone.net/GSM-Manual/gos-6/en/reports.html#creating-an= -override >> Issue >> ----- >> NVT: Important Announcement >> OID: 1.3.6.1.4.1.25623.1.0.999998 >> Threat: High (CVSS: 10.0) >> Port: general/tcp >> Summary: >> ATTENTION: >> Your vulnerability tests are out of maintenance and not updated since Sep= tember ! >> 1st 2020. Your setup of Greenbone Source Edition will not report about an= y new t! >> hreats in your scanned environment since this date! >> REASON: >> Your Greenbone setup is connected to a discontinued download server of th= e Green! >> bone Community Feed. The Greenbone Community Feed is still available via a= new d! >> ownload server. The discontinuation announcement was posted on May 13th a= t the G! >> reenbone Community Portal. >> SOLUTION: >> You can consider to upgrade your setup to a Greenbone enterprise product w= hich a! >> lso provides you the full scan coverage via Greenbone Security Feed (see P= ROFESS! >> IONAL SOLUTION). Alternatively you can continue with the Greenbone Commun= ity Fee! >> d (see FREE COMMUNITY SOLUTION). >> PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) >> We are happy that our technology already today helps you to reduce the at= tack su! >> rface of your corporate IT infrastructure. Our enterprise products close b= lind s! >> pots of the community feed and give access to Greenbone service desk. >> Please contact >> upgrade@greenbone.net >> and provide the following details (use copy&paste). Please understand tha= t we wi! >> ll not reply to you if you do not provide all the details. >> - Company name: >> - Company homepage: >> - Your name: >> - Your position in the company: >> - The number of IP addresses you are scanning with Greenbone (ca.): >> - The number of scanner instances you are using to scan: >> - Are you using a master-sensor configuration: yes/no >> Feel free to add any additional information you regard helpful to underst= and you! >> r setup. >> Our team will recommend to you a suitable commercial option. We are happy= to dis! >> cuss larger setups in direct communication. >> You can inform yourself about our standard products here: >> https://www.greenbone.net/en/products-solutions/ >> FREE COMMUNITY SOLUTION: Continue scanning with community feed >> The Greenbone Community Feed is still available and updated daily. You ma= y have ! >> just missed the technical notes and announcement here: >> https://community.greenbone.net/t/community-feed-url-consolidation/5338 >> Vulnerability Detection Result: >> ATTENTION: >> Your vulnerability tests are out of maintenance and not updated since Sep= tember ! >> 1st 2020. Your setup of Greenbone Source Edition will not report about an= y new t! >> hreats in your scanned environment since this date! >> REASON: >> Your Greenbone setup is connected to a discontinued download server of th= e Green! >> bone Community Feed. The Greenbone Community Feed is still available via a= new d! >> ownload server. The discontinuation announcement was posted on May 13th a= t the G! >> reenbone Community Portal. >> SOLUTION: >> You can consider to upgrade your setup to a Greenbone enterprise product w= hich a! >> lso provides you the full scan coverage via Greenbone Security Feed (see P= ROFESS! >> IONAL SOLUTION). Alternatively you can continue with the Greenbone Commun= ity Fee! >> d (see FREE COMMUNITY SOLUTION). >> PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) >> We are happy that our technology already today helps you to reduce the at= tack su! >> rface of your corporate IT infrastructure. Our enterprise products close b= lind s! >> pots of the community feed and give access to Greenbone service desk. >> Please contact >> upgrade@greenbone.net >> and provide the following details (use copy&paste). Please understand tha= t we wi! >> ll not reply to you if you do not provide all the details. >> - Company name: >> - Company homepage: >> - Your name: >> - Your position in the company: >> - The number of IP addresses you are scanning with Greenbone (ca.): >> - The number of scanner instances you are using to scan: >> - Are you using a master-sensor configuration: yes/no >> Feel free to add any additional information you regard helpful to underst= and you! >> r setup. >> Our team will recommend to you a suitable commercial option. We are happy= to dis! >> cuss larger setups in direct communication. >> You can inform yourself about our standard products here: >> https://www.greenbone.net/en/products-solutions/ >> FREE COMMUNITY SOLUTION: Continue scanning with community feed >> The Greenbone Community Feed is still available and updated daily. You ma= y have ! >> just missed the technical notes and announcement here: >> https://community.greenbone.net/t/community-feed-url-consolidation/5338 >> Vulnerability Detection Method: >> Details: >> Important Announcement >> (OID: 1.3.6.1.4.1.25623.1.0.999998) >> Version used: 2020-07-14T11:31:48+0000 >> References: >> Other: >> https://community.greenbone.net/t/community-feed-url-consolidation/5338= >> Host 172.20.10.11 >> ***************** >> Scanning of this host started at: >> Number of results: 2 >> Port Summary for Host 172.20.10.11 >> ---------------------------------- >> Service (Port) Threat Level >> general/tcp High >> general/tcp High >> general/tcp High >> general/tcp High >> general/tcp High >> general/tcp High >> Security Issues for Host 172.20.10.11 >> ------------------------------------- >> Issue >> ----- >> NVT: Report outdated / end-of-life Scan Engine / Environment (local) >> OID: 1.3.6.1.4.1.25623.1.0.108560 >> Threat: High (CVSS: 10.0) >> Port: general/tcp >> Summary: >> This script checks and reports an outdated or end-of-life scan engine >> for the following environments: >> - Greenbone Source Edition (GSE) >> - Greenbone Community Edition (GCE) >> used for this scan. >> NOTE: While this is not, in and of itself, a security vulnerability, a se= verit! >> y is reported to make you aware >> of a possible decreased scan coverage or missing detection of vulnerabili= ties ! >> on the target due to e.g.: >> - missing functionalities >> - missing bugfixes >> - incompatibilities within the feed. >> Vulnerability Detection Result: >> Installed GVM Libraries (gvm-libs) version: 9.0.1 >> Latest available GVM Libraries (gvm-libs) version: 10.0.2 >> Reference URL(s) for the latest available version: https://community.gree= nbone.n! >> et/t/gvm-11-stable-initial-release-2019-10-14/3674 / https://community.gr= eenbone! >> .net/t/gvm-10-old-stable-initial-release-2019-04-05/208 >> Solution: >> Solution type: VendorFix >> Update to the latest available stable release for your scan environment. P= lease ! >> check the >> references for more information. If you're using packages provided by you= r Lin! >> ux distribution please contact the maintainer >> of the used distribution / repository and request updated packages. >> If you want to accept the risk of a possible decreased scan coverage or m= issin! >> g detection of vulnerabilities on the target you >> can set a global override for this script as described in the linked manu= als. >> Vulnerability Detection Method: >> Details: >> Report outdated / end-of-life Scan Engine / Environment (local) >> (OID: 1.3.6.1.4.1.25623.1.0.108560) >> Version used: 2020-06-10T13:24:20+0000 >> References: >> Other: >> https://www.greenbone.net/en/install_use_gce/ >> https://community.greenbone.net/t/gvm-9-end-of-life-initial-release-201= 7-03-07/211 >> https://community.greenbone.net/t/gvm-10-old-stable-initial-release-201= 9-04-05/208 >> https://community.greenbone.net/t/gvm-11-stable-initial-release-2019-10= -14/3674 >> https://docs.greenbone.net/GSM-Manual/gos-4/en/reports.html#creating-an= -override >> https://docs.greenbone.net/GSM-Manual/gos-5/en/reports.html#creating-an= -override >> https://docs.greenbone.net/GSM-Manual/gos-6/en/reports.html#creating-an= -override >> Issue >> ----- >> NVT: Important Announcement >> OID: 1.3.6.1.4.1.25623.1.0.999998 >> Threat: High (CVSS: 10.0) >> Port: general/tcp >> Summary: >> ATTENTION: >> Your vulnerability tests are out of maintenance and not updated since Sep= tember ! >> 1st 2020. Your setup of Greenbone Source Edition will not report about an= y new t! >> hreats in your scanned environment since this date! >> REASON: >> Your Greenbone setup is connected to a discontinued download server of th= e Green! >> bone Community Feed. The Greenbone Community Feed is still available via a= new d! >> ownload server. The discontinuation announcement was posted on May 13th a= t the G! >> reenbone Community Portal. >> SOLUTION: >> You can consider to upgrade your setup to a Greenbone enterprise product w= hich a! >> lso provides you the full scan coverage via Greenbone Security Feed (see P= ROFESS! >> IONAL SOLUTION). Alternatively you can continue with the Greenbone Commun= ity Fee! >> d (see FREE COMMUNITY SOLUTION). >> PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) >> We are happy that our technology already today helps you to reduce the at= tack su! >> rface of your corporate IT infrastructure. Our enterprise products close b= lind s! >> pots of the community feed and give access to Greenbone service desk. >> Please contact >> upgrade@greenbone.net >> and provide the following details (use copy&paste). Please understand tha= t we wi! >> ll not reply to you if you do not provide all the details. >> - Company name: >> - Company homepage: >> - Your name: >> - Your position in the company: >> - The number of IP addresses you are scanning with Greenbone (ca.): >> - The number of scanner instances you are using to scan: >> - Are you using a master-sensor configuration: yes/no >> Feel free to add any additional information you regard helpful to underst= and you! >> r setup. >> Our team will recommend to you a suitable commercial option. We are happy= to dis! >> cuss larger setups in direct communication. >> You can inform yourself about our standard products here: >> https://www.greenbone.net/en/products-solutions/ >> FREE COMMUNITY SOLUTION: Continue scanning with community feed >> The Greenbone Community Feed is still available and updated daily. You ma= y have ! >> just missed the technical notes and announcement here: >> https://community.greenbone.net/t/community-feed-url-consolidation/5338 >> Vulnerability Detection Result: >> ATTENTION: >> Your vulnerability tests are out of maintenance and not updated since Sep= tember ! >> 1st 2020. Your setup of Greenbone Source Edition will not report about an= y new t! >> hreats in your scanned environment since this date! >> REASON: >> Your Greenbone setup is connected to a discontinued download server of th= e Green! >> bone Community Feed. The Greenbone Community Feed is still available via a= new d! >> ownload server. The discontinuation announcement was posted on May 13th a= t the G! >> reenbone Community Portal. >> SOLUTION: >> You can consider to upgrade your setup to a Greenbone enterprise product w= hich a! >> lso provides you the full scan coverage via Greenbone Security Feed (see P= ROFESS! >> IONAL SOLUTION). Alternatively you can continue with the Greenbone Commun= ity Fee! >> d (see FREE COMMUNITY SOLUTION). >> PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) >> We are happy that our technology already today helps you to reduce the at= tack su! >> rface of your corporate IT infrastructure. Our enterprise products close b= lind s! >> pots of the community feed and give access to Greenbone service desk. >> Please contact >> upgrade@greenbone.net >> and provide the following details (use copy&paste). Please understand tha= t we wi! >> ll not reply to you if you do not provide all the details. >> - Company name: >> - Company homepage: >> - Your name: >> - Your position in the company: >> - The number of IP addresses you are scanning with Greenbone (ca.): >> - The number of scanner instances you are using to scan: >> - Are you using a master-sensor configuration: yes/no >> Feel free to add any additional information you regard helpful to underst= and you! >> r setup. >> Our team will recommend to you a suitable commercial option. We are happy= to dis! >> cuss larger setups in direct communication. >> You can inform yourself about our standard products here: >> https://www.greenbone.net/en/products-solutions/ >> FREE COMMUNITY SOLUTION: Continue scanning with community feed >> The Greenbone Community Feed is still available and updated daily. You ma= y have ! >> just missed the technical notes and announcement here: >> https://community.greenbone.net/t/community-feed-url-consolidation/5338 >> Vulnerability Detection Method: >> Details: >> Important Announcement >> (OID: 1.3.6.1.4.1.25623.1.0.999998) >> Version used: 2020-07-14T11:31:48+0000 >> References: >> Other: >> https://community.greenbone.net/t/community-feed-url-consolidation/5338= >> Host 172.20.10.8 >> **************** >> Scanning of this host started at: >> Number of results: 2 >> Port Summary for Host 172.20.10.8 >> --------------------------------- >> Service (Port) Threat Level >> general/tcp High >> general/tcp High >> general/tcp High >> general/tcp High >> general/tcp High >> general/tcp High >> Security Issues for Host 172.20.10.8 >> ------------------------------------ >> Issue >> ----- >> NVT: Report outdated / end-of-life Scan Engine / Environment (local) >> OID: 1.3.6.1.4.1.25623.1.0.108560 >> Threat: High (CVSS: 10.0) >> Port: general/tcp >> Summary: >> This script checks and reports an outdated or end-of-life scan engine >> for the following environments: >> - Greenbone Source Edition (GSE) >> - Greenbone Community Edition (GCE) >> used for this scan. >> NOTE: While this is not, in and of itself, a security vulnerability, a se= verit! >> y is reported to make you aware >> of a possible decreased scan coverage or missing detection of vulnerabili= ties ! >> on the target due to e.g.: >> - missing functionalities >> - missing bugfixes >> - incompatibilities within the feed. >> Vulnerability Detection Result: >> Installed GVM Libraries (gvm-libs) version: 9.0.1 >> Latest available GVM Libraries (gvm-libs) version: 10.0.2 >> Reference URL(s) for the latest available version: https://community.gree= nbone.n! >> et/t/gvm-11-stable-initial-release-2019-10-14/3674 / https://community.gr= eenbone! >> .net/t/gvm-10-old-stable-initial-release-2019-04-05/208 >> Solution: >> Solution type: VendorFix >> Update to the latest available stable release for your scan environment. P= lease ! >> check the >> references for more information. If you're using packages provided by you= r Lin! >> ux distribution please contact the maintainer >> of the used distribution / repository and request updated packages. >> If you want to accept the risk of a possible decreased scan coverage or m= issin! >> g detection of vulnerabilities on the target you >> can set a global override for this script as described in the linked manu= als. >> Vulnerability Detection Method: >> Details: >> Report outdated / end-of-life Scan Engine / Environment (local) >> (OID: 1.3.6.1.4.1.25623.1.0.108560) >> Version used: 2020-06-10T13:24:20+0000 >> References: >> Other: >> https://www.greenbone.net/en/install_use_gce/ >> https://community.greenbone.net/t/gvm-9-end-of-life-initial-release-201= 7-03-07/211 >> https://community.greenbone.net/t/gvm-10-old-stable-initial-release-201= 9-04-05/208 >> https://community.greenbone.net/t/gvm-11-stable-initial-release-2019-10= -14/3674 >> https://docs.greenbone.net/GSM-Manual/gos-4/en/reports.html#creating-an= -override >> https://docs.greenbone.net/GSM-Manual/gos-5/en/reports.html#creating-an= -override >> https://docs.greenbone.net/GSM-Manual/gos-6/en/reports.html#creating-an= -override >> Issue >> ----- >> NVT: Important Announcement >> OID: 1.3.6.1.4.1.25623.1.0.999998 >> Threat: High (CVSS: 10.0) >> Port: general/tcp >> Summary: >> ATTENTION: >> Your vulnerability tests are out of maintenance and not updated since Sep= tember ! >> 1st 2020. Your setup of Greenbone Source Edition will not report about an= y new t! >> hreats in your scanned environment since this date! >> REASON: >> Your Greenbone setup is connected to a discontinued download server of th= e Green! >> bone Community Feed. The Greenbone Community Feed is still available via a= new d! >> ownload server. The discontinuation announcement was posted on May 13th a= t the G! >> reenbone Community Portal. >> SOLUTION: >> You can consider to upgrade your setup to a Greenbone enterprise product w= hich a! >> lso provides you the full scan coverage via Greenbone Security Feed (see P= ROFESS! >> IONAL SOLUTION). Alternatively you can continue with the Greenbone Commun= ity Fee! >> d (see FREE COMMUNITY SOLUTION). >> PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) >> We are happy that our technology already today helps you to reduce the at= tack su! >> rface of your corporate IT infrastructure. Our enterprise products close b= lind s! >> pots of the community feed and give access to Greenbone service desk. >> Please contact >> upgrade@greenbone.net >> and provide the following details (use copy&paste). Please understand tha= t we wi! >> ll not reply to you if you do not provide all the details. >> - Company name: >> - Company homepage: >> - Your name: >> - Your position in the company: >> - The number of IP addresses you are scanning with Greenbone (ca.): >> - The number of scanner instances you are using to scan: >> - Are you using a master-sensor configuration: yes/no >> Feel free to add any additional information you regard helpful to underst= and you! >> r setup. >> Our team will recommend to you a suitable commercial option. We are happy= to dis! >> cuss larger setups in direct communication. >> You can inform yourself about our standard products here: >> https://www.greenbone.net/en/products-solutions/ >> FREE COMMUNITY SOLUTION: Continue scanning with community feed >> The Greenbone Community Feed is still available and updated daily. You ma= y have ! >> just missed the technical notes and announcement here: >> https://community.greenbone.net/t/community-feed-url-consolidation/5338 >> Vulnerability Detection Result: >> ATTENTION: >> Your vulnerability tests are out of maintenance and not updated since Sep= tember ! >> 1st 2020. Your setup of Greenbone Source Edition will not report about an= y new t! >> hreats in your scanned environment since this date! >> REASON: >> Your Greenbone setup is connected to a discontinued download server of th= e Green! >> bone Community Feed. The Greenbone Community Feed is still available via a= new d! >> ownload server. The discontinuation announcement was posted on May 13th a= t the G! >> reenbone Community Portal. >> SOLUTION: >> You can consider to upgrade your setup to a Greenbone enterprise product w= hich a! >> lso provides you the full scan coverage via Greenbone Security Feed (see P= ROFESS! >> IONAL SOLUTION). Alternatively you can continue with the Greenbone Commun= ity Fee! >> d (see FREE COMMUNITY SOLUTION). >> PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) >> We are happy that our technology already today helps you to reduce the at= tack su! >> rface of your corporate IT infrastructure. Our enterprise products close b= lind s! >> pots of the community feed and give access to Greenbone service desk. >> Please contact >> upgrade@greenbone.net >> and provide the following details (use copy&paste). Please understand tha= t we wi! >> ll not reply to you if you do not provide all the details. >> - Company name: >> - Company homepage: >> - Your name: >> - Your position in the company: >> - The number of IP addresses you are scanning with Greenbone (ca.): >> - The number of scanner instances you are using to scan: >> - Are you using a master-sensor configuration: yes/no >> Feel free to add any additional information you regard helpful to underst= and you! >> r setup. >> Our team will recommend to you a suitable commercial option. We are happy= to dis! >> cuss larger setups in direct communication. >> You can inform yourself about our standard products here: >> https://www.greenbone.net/en/products-solutions/ >> FREE COMMUNITY SOLUTION: Continue scanning with community feed >> The Greenbone Community Feed is still available and updated daily. You ma= y have ! >> just missed the technical notes and announcement here: >> https://community.greenbone.net/t/community-feed-url-consolidation/5338 >> Vulnerability Detection Method: >> Details: >> Important Announcement >> (OID: 1.3.6.1.4.1.25623.1.0.999998) >> Version used: 2020-07-14T11:31:48+0000 >> References: >> Other: >> https://community.greenbone.net/t/community-feed-url-consolidation/5338= >> Host 172.20.10.1 >> **************** >> Scanning of this host started at: >> Number of results: 2 >> Port Summary for Host 172.20.10.1 >> --------------------------------- >> Service (Port) Threat Level >> general/tcp High >> general/tcp High >> general/tcp High >> general/tcp High >> general/tcp High >> general/tcp High >> Security Issues for Host 172.20.10.1 >> ------------------------------------ >> Issue >> ----- >> NVT: Report outdated / end-of-life Scan Engine / Environment (local) >> OID: 1.3.6.1.4.1.25623.1.0.108560 >> Threat: High (CVSS: 10.0) >> Port: general/tcp >> Summary: >> This script checks and reports an outdated or end-of-life scan engine >> for the following environments: >> - Greenbone Source Edition (GSE) >> - Greenbone Community Edition (GCE) >> used for this scan. >> NOTE: While this is not, in and of itself, a security vulnerability, a se= verit! >> y is reported to make you aware >> of a possible decreased scan coverage or missing detection of vulnerabili= ties ! >> on the target due to e.g.: >> - missing functionalities >> - missing bugfixes >> - incompatibilities within the feed. >> Vulnerability Detection Result: >> Installed GVM Libraries (gvm-libs) version: 9.0.1 >> Latest available GVM Libraries (gvm-libs) version: 10.0.2 >> Reference URL(s) for the latest available version: https://community.gree= nbone.n! >> et/t/gvm-11-stable-initial-release-2019-10-14/3674 / https://community.gr= eenbone! >> .net/t/gvm-10-old-stable-initial-release-2019-04-05/208 >> Solution: >> Solution type: VendorFix >> Update to the latest available stable release for your scan environment. P= lease ! >> check the >> references for more information. If you're using packages provided by you= r Lin! >> ux distribution please contact the maintainer >> of the used distribution / repository and request updated packages. >> If you want to accept the risk of a possible decreased scan coverage or m= issin! >> g detection of vulnerabilities on the target you >> can set a global override for this script as described in the linked manu= als. >> Vulnerability Detection Method: >> Details: >> Report outdated / end-of-life Scan Engine / Environment (local) >> (OID: 1.3.6.1.4.1.25623.1.0.108560) >> Version used: 2020-06-10T13:24:20+0000 >> References: >> Other: >> https://www.greenbone.net/en/install_use_gce/ >> https://community.greenbone.net/t/gvm-9-end-of-life-initial-release-201= 7-03-07/211 >> https://community.greenbone.net/t/gvm-10-old-stable-initial-release-201= 9-04-05/208 >> https://community.greenbone.net/t/gvm-11-stable-initial-release-2019-10= -14/3674 >> https://docs.greenbone.net/GSM-Manual/gos-4/en/reports.html#creating-an= -override >> https://docs.greenbone.net/GSM-Manual/gos-5/en/reports.html#creating-an= -override >> https://docs.greenbone.net/GSM-Manual/gos-6/en/reports.html#creating-an= -override >> Issue >> ----- >> NVT: Important Announcement >> OID: 1.3.6.1.4.1.25623.1.0.999998 >> Threat: High (CVSS: 10.0) >> Port: general/tcp >> Summary: >> ATTENTION: >> Your vulnerability tests are out of maintenance and not updated since Sep= tember ! >> 1st 2020. Your setup of Greenbone Source Edition will not report about an= y new t! >> hreats in your scanned environment since this date! >> REASON: >> Your Greenbone setup is connected to a discontinued download server of th= e Green! >> bone Community Feed. The Greenbone Community Feed is still available via a= new d! >> ownload server. The discontinuation announcement was posted on May 13th a= t the G! >> reenbone Community Portal. >> SOLUTION: >> You can consider to upgrade your setup to a Greenbone enterprise product w= hich a! >> lso provides you the full scan coverage via Greenbone Security Feed (see P= ROFESS! >> IONAL SOLUTION). Alternatively you can continue with the Greenbone Commun= ity Fee! >> d (see FREE COMMUNITY SOLUTION). >> PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) >> We are happy that our technology already today helps you to reduce the at= tack su! >> rface of your corporate IT infrastructure. Our enterprise products close b= lind s! >> pots of the community feed and give access to Greenbone service desk. >> Please contact >> upgrade@greenbone.net >> and provide the following details (use copy&paste). Please understand tha= t we wi! >> ll not reply to you if you do not provide all the details. >> - Company name: >> - Company homepage: >> - Your name: >> - Your position in the company: >> - The number of IP addresses you are scanning with Greenbone (ca.): >> - The number of scanner instances you are using to scan: >> - Are you using a master-sensor configuration: yes/no >> Feel free to add any additional information you regard helpful to underst= and you! >> r setup. >> Our team will recommend to you a suitable commercial option. We are happy= to dis! >> cuss larger setups in direct communication. >> You can inform yourself about our standard products here: >> https://www.greenbone.net/en/products-solutions/ >> FREE COMMUNITY SOLUTION: Continue scanning with community feed >> The Greenbone Community Feed is still available and updated daily. You ma= y have ! >> just missed the technical notes and announcement here: >> https://community.greenbone.net/t/community-feed-url-consolidation/5338 >> Vulnerability Detection Result: >> ATTENTION: >> Your vulnerability tests are out of maintenance and not updated since Sep= tember ! >> 1st 2020. Your setup of Greenbone Source Edition will not report about an= y new t! >> hreats in your scanned environment since this date! >> REASON: >> Your Greenbone setup is connected to a discontinued download server of th= e Green! >> bone Community Feed. The Greenbone Community Feed is still available via a= new d! >> ownload server. The discontinuation announcement was posted on May 13th a= t the G! >> reenbone Community Portal. >> SOLUTION: >> You can consider to upgrade your setup to a Greenbone enterprise product w= hich a! >> lso provides you the full scan coverage via Greenbone Security Feed (see P= ROFESS! >> IONAL SOLUTION). Alternatively you can continue with the Greenbone Commun= ity Fee! >> d (see FREE COMMUNITY SOLUTION). >> PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) >> We are happy that our technology already today helps you to reduce the at= tack su! >> rface of your corporate IT infrastructure. Our enterprise products close b= lind s! >> pots of the community feed and give access to Greenbone service desk. >> Please contact >> upgrade@greenbone.net >> and provide the following details (use copy&paste). Please understand tha= t we wi! >> ll not reply to you if you do not provide all the details. >> - Company name: >> - Company homepage: >> - Your name: >> - Your position in the company: >> - The number of IP addresses you are scanning with Greenbone (ca.): >> - The number of scanner instances you are using to scan: >> - Are you using a master-sensor configuration: yes/no >> Feel free to add any additional information you regard helpful to underst= and you! >> r setup. >> Our team will recommend to you a suitable commercial option. We are happy= to dis! >> cuss larger setups in direct communication. >> You can inform yourself about our standard products here: >> https://www.greenbone.net/en/products-solutions/ >> FREE COMMUNITY SOLUTION: Continue scanning with community feed >> The Greenbone Community Feed is still available and updated daily. You ma= y have ! >> just missed the technical notes and announcement here: >> https://community.greenbone.net/t/community-feed-url-consolidation/5338 >> Vulnerability Detection Method: >> Details: >> Important Announcement >> (OID: 1.3.6.1.4.1.25623.1.0.999998) >> Version used: 2020-07-14T11:31:48+0000 >> References: >> Other: >> https://community.greenbone.net/t/community-feed-url-consolidation/5338= >=20 >> _______________________________________________ >> freebsd-pkg@freebsd.org mailing list >> https://lists.freebsd.org/mailman/listinfo/freebsd-pkg >> To unsubscribe, send any mail to "freebsd-pkg-unsubscribe@freebsd.org" From owner-freebsd-pkg@freebsd.org Fri Sep 25 16:01:46 2020 Return-Path: Delivered-To: freebsd-pkg@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 4944A3FBEEB for ; Fri, 25 Sep 2020 16:01:46 +0000 (UTC) (envelope-from brooks@spindle.one-eyed-alien.net) Received: from spindle.one-eyed-alien.net (spindle.one-eyed-alien.net [199.48.129.229]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4Byc9P1MXnz48W9; Fri, 25 Sep 2020 16:01:44 +0000 (UTC) (envelope-from brooks@spindle.one-eyed-alien.net) Received: by spindle.one-eyed-alien.net (Postfix, from userid 3001) id DF3753C0199; Fri, 25 Sep 2020 16:01:43 +0000 (UTC) Date: Fri, 25 Sep 2020 16:01:43 +0000 From: Brooks Davis To: "Yigithan Bilge (Student)" Cc: Brooks Davis , freebsd-pkg@freebsd.org, acm@freebsd.org Subject: Re: FreeBSD OpenVAS Configuration Message-ID: <20200925160143.GA84172@spindle.one-eyed-alien.net> References: <20200924164146.GA64154@spindle.one-eyed-alien.net> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="NzB8fVQJ5HfG6fxh" Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.9.4 (2018-02-28) X-Rspamd-Queue-Id: 4Byc9P1MXnz48W9 X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=none (mx1.freebsd.org: domain of brooks@spindle.one-eyed-alien.net has no SPF policy when checking 199.48.129.229) smtp.mailfrom=brooks@spindle.one-eyed-alien.net X-Spamd-Result: default: False [-3.15 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.01)[-1.010]; FREEFALL_USER(0.00)[brooks]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[4]; TO_DN_SOME(0.00)[]; NEURAL_HAM_LONG(-1.02)[-1.015]; MIME_GOOD(-0.20)[multipart/signed,text/plain]; DMARC_NA(0.00)[freebsd.org]; AUTH_NA(1.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[]; NEURAL_HAM_SHORT(-0.22)[-0.224]; SIGNED_PGP(-2.00)[]; FORGED_SENDER(0.30)[brooks@freebsd.org,brooks@spindle.one-eyed-alien.net]; RCVD_COUNT_ZERO(0.00)[0]; R_SPF_NA(0.00)[no SPF record]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; ASN(0.00)[asn:36236, ipnet:199.48.128.0/22, country:US]; FROM_NEQ_ENVFROM(0.00)[brooks@freebsd.org,brooks@spindle.one-eyed-alien.net]; MAILMAN_DEST(0.00)[freebsd-pkg] X-BeenThere: freebsd-pkg@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Binary package management and package tools discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 25 Sep 2020 16:01:46 -0000 --NzB8fVQJ5HfG6fxh Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable No one has created a GVM port yet. The openvas ports should probably be deleted as you've demonstrated they aren't particularly useful. -- Brooks On Fri, Sep 25, 2020 at 01:54:40PM +0300, Yigithan Bilge (Student) wrote: > Thank you, but in the site you shared there are new packages named gvm-li= bs and old packages named openvas. I can???t find and download new packages= , there is no reply for ???pkg search gvm-libs??? command in the freebsd. H= ow can I get these new updated packages? Do you have any idea? > Thanks, > ygthn >=20 > > Brooks Davis ??unlar?? yazd?? (24 Eyl 2020 19:41): > >=20 > > ???It appears that OpenVAS is complaining about itself in a confusing a= nd > > unhelpful way. According to the following page, GVM is new branding for > > OpenVAS. > >=20 > > https://wiki.gentoo.org/wiki/Greenbone_Vulnerability_Management > >=20 > > -- Brooks > >=20 > >>> On Thu, Sep 24, 2020 at 01:42:41PM +0300, Yigithan Bilge (Student) wr= ote: > >> Hey, > >> I currently work on a project to scan a network and find vulnerabiliti= es > >> which has to be on FreeBSD. So, as a first step, I installed packages = of > >> openvas9 and scanned the network by using the web interface. There is = also > >> a server on ubuntu to see what openvas will find. > >> On the report, there is a vulnerability called ???Report outdated / > >> end-of-life Scan Engine / Environment (local)??? which makes me think = the > >> system isn???t working quite well since the server has apache2 and ope= n port > >> 80 HTTP but couldn???t tell any of these as a vulnerability. > >> There is also a part on the report as: > >> Vulnerability Detection Result: > >> Installed GVM Libraries (gvm-libs) version: 9.0.1 > >> Latest available GVM Libraries (gvm-libs) version: 10.0.2 > >> I couldn???t update this gvm library, and I couldn???t even find this = library > >> to update in the list of packages. All conversations and videos are on= Kali > >> or etc. I have got in touch with the greenbone community and got thia > >> reply *"Greenbone > >> is not in charge for your version of our software. Therefore you should > >> contact the provider of your packages (most likely your distribution) = and > >> create a request for updated packages."* > >> I also add the report, I hope someone can help me to solve the errors I > >> mentioned in the upper text. Sorry if I wrote something unnecessary or > >> irrelevant with this page, I am a student and quite new in this field. > >> Thank you > >=20 > >> I Summary > >> =3D=3D=3D=3D=3D=3D=3D=3D=3D > >> This document reports on the results of an automatic security scan. > >> The report first summarises the results found. > >> Then, for each host, the report describes every issue found. > >> Please consider the advice given in each description, in order to rect= ify > >> the issue. > >> All dates are displayed using the timezone "Coordinated Universal Time= ", > >> which is abbreviated "UTC". > >> Vendor security updates are not trusted. > >> Overrides are on. When a result has an override, this report uses the > >> threat of the override. > >> Notes are included in the report.Information on overrides is included = in the report. > >> This report might not show details of all issues that were found. > >> It only lists hosts that produced issues. > >> Issues with the threat level "Log" are not shown. > >> Issues with the threat level "Debug" are not shown. > >> Issues with the threat level "False Positive" are not shown. > >> Only results with a minimum QoD of 70 are shown. > >> This report contains all 12 results selected by the > >> filtering described above. Before filtering there were 293 results. > >> Scan started: > >> Scan ended: =20 > >> Task: Server Scanning - Apache2 > >> Host Summary > >> ************ > >> Host High Medium Low Log False Positive > >> 172.20.10.2 2 0 0 0 0 > >> 172.20.10.4 2 0 0 0 0 > >> 172.20.10.12 2 0 0 0 0 > >> 172.20.10.11 2 0 0 0 0 > >> 172.20.10.8 2 0 0 0 0 > >> 172.20.10.1 2 0 0 0 0 > >> Total: 6 12 0 0 0 0 > >> II Results per Host > >> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D > >> Host 172.20.10.2 > >> **************** > >> Scanning of this host started at: > >> Number of results: 2 > >> Port Summary for Host 172.20.10.2 > >> --------------------------------- > >> Service (Port) Threat Level > >> general/tcp High > >> general/tcp High > >> general/tcp High > >> general/tcp High > >> general/tcp High > >> general/tcp High > >> Security Issues for Host 172.20.10.2 > >> ------------------------------------ > >> Issue > >> ----- > >> NVT: Report outdated / end-of-life Scan Engine / Environment (local) > >> OID: 1.3.6.1.4.1.25623.1.0.108560 > >> Threat: High (CVSS: 10.0) > >> Port: general/tcp > >> Summary: > >> This script checks and reports an outdated or end-of-life scan engine > >> for the following environments: > >> - Greenbone Source Edition (GSE) > >> - Greenbone Community Edition (GCE) > >> used for this scan. > >> NOTE: While this is not, in and of itself, a security vulnerability, a= severit! > >> y is reported to make you aware > >> of a possible decreased scan coverage or missing detection of vulnerab= ilities ! > >> on the target due to e.g.: > >> - missing functionalities > >> - missing bugfixes > >> - incompatibilities within the feed. > >> Vulnerability Detection Result: > >> Installed GVM Libraries (gvm-libs) version: 9.0.1 > >> Latest available GVM Libraries (gvm-libs) version: 10.0.2 > >> Reference URL(s) for the latest available version: https://community.g= reenbone.n! > >> et/t/gvm-11-stable-initial-release-2019-10-14/3674 / https://community= =2Egreenbone! > >> .net/t/gvm-10-old-stable-initial-release-2019-04-05/208 > >> Solution: > >> Solution type: VendorFix > >> Update to the latest available stable release for your scan environmen= t. Please ! > >> check the > >> references for more information. If you're using packages provided by = your Lin! > >> ux distribution please contact the maintainer > >> of the used distribution / repository and request updated packages. > >> If you want to accept the risk of a possible decreased scan coverage o= r missin! > >> g detection of vulnerabilities on the target you > >> can set a global override for this script as described in the linked m= anuals. > >> Vulnerability Detection Method: > >> Details: > >> Report outdated / end-of-life Scan Engine / Environment (local) > >> (OID: 1.3.6.1.4.1.25623.1.0.108560) > >> Version used: 2020-06-10T13:24:20+0000 > >> References: > >> Other: > >> https://www.greenbone.net/en/install_use_gce/ > >> https://community.greenbone.net/t/gvm-9-end-of-life-initial-release-= 2017-03-07/211 > >> https://community.greenbone.net/t/gvm-10-old-stable-initial-release-= 2019-04-05/208 > >> https://community.greenbone.net/t/gvm-11-stable-initial-release-2019= -10-14/3674 > >> https://docs.greenbone.net/GSM-Manual/gos-4/en/reports.html#creating= -an-override > >> https://docs.greenbone.net/GSM-Manual/gos-5/en/reports.html#creating= -an-override > >> https://docs.greenbone.net/GSM-Manual/gos-6/en/reports.html#creating= -an-override > >> Issue > >> ----- > >> NVT: Important Announcement > >> OID: 1.3.6.1.4.1.25623.1.0.999998 > >> Threat: High (CVSS: 10.0) > >> Port: general/tcp > >> Summary: > >> ATTENTION: > >> Your vulnerability tests are out of maintenance and not updated since = September ! > >> 1st 2020. Your setup of Greenbone Source Edition will not report about= any new t! > >> hreats in your scanned environment since this date! > >> REASON: > >> Your Greenbone setup is connected to a discontinued download server of= the Green! > >> bone Community Feed. The Greenbone Community Feed is still available v= ia a new d! > >> ownload server. The discontinuation announcement was posted on May 13t= h at the G! > >> reenbone Community Portal. > >> SOLUTION: > >> You can consider to upgrade your setup to a Greenbone enterprise produ= ct which a! > >> lso provides you the full scan coverage via Greenbone Security Feed (s= ee PROFESS! > >> IONAL SOLUTION). Alternatively you can continue with the Greenbone Com= munity Fee! > >> d (see FREE COMMUNITY SOLUTION). > >> PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) > >> We are happy that our technology already today helps you to reduce the= attack su! > >> rface of your corporate IT infrastructure. Our enterprise products clo= se blind s! > >> pots of the community feed and give access to Greenbone service desk. > >> Please contact > >> upgrade@greenbone.net > >> and provide the following details (use copy&paste). Please understand = that we wi! > >> ll not reply to you if you do not provide all the details. > >> - Company name: > >> - Company homepage: > >> - Your name: > >> - Your position in the company: > >> - The number of IP addresses you are scanning with Greenbone (ca.): > >> - The number of scanner instances you are using to scan: > >> - Are you using a master-sensor configuration: yes/no > >> Feel free to add any additional information you regard helpful to unde= rstand you! > >> r setup. > >> Our team will recommend to you a suitable commercial option. We are ha= ppy to dis! > >> cuss larger setups in direct communication. > >> You can inform yourself about our standard products here: > >> https://www.greenbone.net/en/products-solutions/ > >> FREE COMMUNITY SOLUTION: Continue scanning with community feed > >> The Greenbone Community Feed is still available and updated daily. You= may have ! > >> just missed the technical notes and announcement here: > >> https://community.greenbone.net/t/community-feed-url-consolidation/5338 > >> Vulnerability Detection Result: > >> ATTENTION: > >> Your vulnerability tests are out of maintenance and not updated since = September ! > >> 1st 2020. Your setup of Greenbone Source Edition will not report about= any new t! > >> hreats in your scanned environment since this date! > >> REASON: > >> Your Greenbone setup is connected to a discontinued download server of= the Green! > >> bone Community Feed. The Greenbone Community Feed is still available v= ia a new d! > >> ownload server. The discontinuation announcement was posted on May 13t= h at the G! > >> reenbone Community Portal. > >> SOLUTION: > >> You can consider to upgrade your setup to a Greenbone enterprise produ= ct which a! > >> lso provides you the full scan coverage via Greenbone Security Feed (s= ee PROFESS! > >> IONAL SOLUTION). Alternatively you can continue with the Greenbone Com= munity Fee! > >> d (see FREE COMMUNITY SOLUTION). > >> PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) > >> We are happy that our technology already today helps you to reduce the= attack su! > >> rface of your corporate IT infrastructure. Our enterprise products clo= se blind s! > >> pots of the community feed and give access to Greenbone service desk. > >> Please contact > >> upgrade@greenbone.net > >> and provide the following details (use copy&paste). Please understand = that we wi! > >> ll not reply to you if you do not provide all the details. > >> - Company name: > >> - Company homepage: > >> - Your name: > >> - Your position in the company: > >> - The number of IP addresses you are scanning with Greenbone (ca.): > >> - The number of scanner instances you are using to scan: > >> - Are you using a master-sensor configuration: yes/no > >> Feel free to add any additional information you regard helpful to unde= rstand you! > >> r setup. > >> Our team will recommend to you a suitable commercial option. We are ha= ppy to dis! > >> cuss larger setups in direct communication. > >> You can inform yourself about our standard products here: > >> https://www.greenbone.net/en/products-solutions/ > >> FREE COMMUNITY SOLUTION: Continue scanning with community feed > >> The Greenbone Community Feed is still available and updated daily. You= may have ! > >> just missed the technical notes and announcement here: > >> https://community.greenbone.net/t/community-feed-url-consolidation/5338 > >> Vulnerability Detection Method: > >> Details: > >> Important Announcement > >> (OID: 1.3.6.1.4.1.25623.1.0.999998) > >> Version used: 2020-07-14T11:31:48+0000 > >> References: > >> Other: > >> https://community.greenbone.net/t/community-feed-url-consolidation/5= 338 > >> Host 172.20.10.4 > >> **************** > >> Scanning of this host started at: > >> Number of results: 2 > >> Port Summary for Host 172.20.10.4 > >> --------------------------------- > >> Service (Port) Threat Level > >> general/tcp High > >> general/tcp High > >> general/tcp High > >> general/tcp High > >> general/tcp High > >> general/tcp High > >> Security Issues for Host 172.20.10.4 > >> ------------------------------------ > >> Issue > >> ----- > >> NVT: Report outdated / end-of-life Scan Engine / Environment (local) > >> OID: 1.3.6.1.4.1.25623.1.0.108560 > >> Threat: High (CVSS: 10.0) > >> Port: general/tcp > >> Summary: > >> This script checks and reports an outdated or end-of-life scan engine > >> for the following environments: > >> - Greenbone Source Edition (GSE) > >> - Greenbone Community Edition (GCE) > >> used for this scan. > >> NOTE: While this is not, in and of itself, a security vulnerability, a= severit! > >> y is reported to make you aware > >> of a possible decreased scan coverage or missing detection of vulnerab= ilities ! > >> on the target due to e.g.: > >> - missing functionalities > >> - missing bugfixes > >> - incompatibilities within the feed. > >> Vulnerability Detection Result: > >> Installed GVM Libraries (gvm-libs) version: 9.0.1 > >> Latest available GVM Libraries (gvm-libs) version: 10.0.2 > >> Reference URL(s) for the latest available version: https://community.g= reenbone.n! > >> et/t/gvm-11-stable-initial-release-2019-10-14/3674 / https://community= =2Egreenbone! > >> .net/t/gvm-10-old-stable-initial-release-2019-04-05/208 > >> Solution: > >> Solution type: VendorFix > >> Update to the latest available stable release for your scan environmen= t. Please ! > >> check the > >> references for more information. If you're using packages provided by = your Lin! > >> ux distribution please contact the maintainer > >> of the used distribution / repository and request updated packages. > >> If you want to accept the risk of a possible decreased scan coverage o= r missin! > >> g detection of vulnerabilities on the target you > >> can set a global override for this script as described in the linked m= anuals. > >> Vulnerability Detection Method: > >> Details: > >> Report outdated / end-of-life Scan Engine / Environment (local) > >> (OID: 1.3.6.1.4.1.25623.1.0.108560) > >> Version used: 2020-06-10T13:24:20+0000 > >> References: > >> Other: > >> https://www.greenbone.net/en/install_use_gce/ > >> https://community.greenbone.net/t/gvm-9-end-of-life-initial-release-= 2017-03-07/211 > >> https://community.greenbone.net/t/gvm-10-old-stable-initial-release-= 2019-04-05/208 > >> https://community.greenbone.net/t/gvm-11-stable-initial-release-2019= -10-14/3674 > >> https://docs.greenbone.net/GSM-Manual/gos-4/en/reports.html#creating= -an-override > >> https://docs.greenbone.net/GSM-Manual/gos-5/en/reports.html#creating= -an-override > >> https://docs.greenbone.net/GSM-Manual/gos-6/en/reports.html#creating= -an-override > >> Issue > >> ----- > >> NVT: Important Announcement > >> OID: 1.3.6.1.4.1.25623.1.0.999998 > >> Threat: High (CVSS: 10.0) > >> Port: general/tcp > >> Summary: > >> ATTENTION: > >> Your vulnerability tests are out of maintenance and not updated since = September ! > >> 1st 2020. Your setup of Greenbone Source Edition will not report about= any new t! > >> hreats in your scanned environment since this date! > >> REASON: > >> Your Greenbone setup is connected to a discontinued download server of= the Green! > >> bone Community Feed. The Greenbone Community Feed is still available v= ia a new d! > >> ownload server. The discontinuation announcement was posted on May 13t= h at the G! > >> reenbone Community Portal. > >> SOLUTION: > >> You can consider to upgrade your setup to a Greenbone enterprise produ= ct which a! > >> lso provides you the full scan coverage via Greenbone Security Feed (s= ee PROFESS! > >> IONAL SOLUTION). Alternatively you can continue with the Greenbone Com= munity Fee! > >> d (see FREE COMMUNITY SOLUTION). > >> PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) > >> We are happy that our technology already today helps you to reduce the= attack su! > >> rface of your corporate IT infrastructure. Our enterprise products clo= se blind s! > >> pots of the community feed and give access to Greenbone service desk. > >> Please contact > >> upgrade@greenbone.net > >> and provide the following details (use copy&paste). Please understand = that we wi! > >> ll not reply to you if you do not provide all the details. > >> - Company name: > >> - Company homepage: > >> - Your name: > >> - Your position in the company: > >> - The number of IP addresses you are scanning with Greenbone (ca.): > >> - The number of scanner instances you are using to scan: > >> - Are you using a master-sensor configuration: yes/no > >> Feel free to add any additional information you regard helpful to unde= rstand you! > >> r setup. > >> Our team will recommend to you a suitable commercial option. We are ha= ppy to dis! > >> cuss larger setups in direct communication. > >> You can inform yourself about our standard products here: > >> https://www.greenbone.net/en/products-solutions/ > >> FREE COMMUNITY SOLUTION: Continue scanning with community feed > >> The Greenbone Community Feed is still available and updated daily. You= may have ! > >> just missed the technical notes and announcement here: > >> https://community.greenbone.net/t/community-feed-url-consolidation/5338 > >> Vulnerability Detection Result: > >> ATTENTION: > >> Your vulnerability tests are out of maintenance and not updated since = September ! > >> 1st 2020. Your setup of Greenbone Source Edition will not report about= any new t! > >> hreats in your scanned environment since this date! > >> REASON: > >> Your Greenbone setup is connected to a discontinued download server of= the Green! > >> bone Community Feed. The Greenbone Community Feed is still available v= ia a new d! > >> ownload server. The discontinuation announcement was posted on May 13t= h at the G! > >> reenbone Community Portal. > >> SOLUTION: > >> You can consider to upgrade your setup to a Greenbone enterprise produ= ct which a! > >> lso provides you the full scan coverage via Greenbone Security Feed (s= ee PROFESS! > >> IONAL SOLUTION). Alternatively you can continue with the Greenbone Com= munity Fee! > >> d (see FREE COMMUNITY SOLUTION). > >> PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) > >> We are happy that our technology already today helps you to reduce the= attack su! > >> rface of your corporate IT infrastructure. Our enterprise products clo= se blind s! > >> pots of the community feed and give access to Greenbone service desk. > >> Please contact > >> upgrade@greenbone.net > >> and provide the following details (use copy&paste). Please understand = that we wi! > >> ll not reply to you if you do not provide all the details. > >> - Company name: > >> - Company homepage: > >> - Your name: > >> - Your position in the company: > >> - The number of IP addresses you are scanning with Greenbone (ca.): > >> - The number of scanner instances you are using to scan: > >> - Are you using a master-sensor configuration: yes/no > >> Feel free to add any additional information you regard helpful to unde= rstand you! > >> r setup. > >> Our team will recommend to you a suitable commercial option. We are ha= ppy to dis! > >> cuss larger setups in direct communication. > >> You can inform yourself about our standard products here: > >> https://www.greenbone.net/en/products-solutions/ > >> FREE COMMUNITY SOLUTION: Continue scanning with community feed > >> The Greenbone Community Feed is still available and updated daily. You= may have ! > >> just missed the technical notes and announcement here: > >> https://community.greenbone.net/t/community-feed-url-consolidation/5338 > >> Vulnerability Detection Method: > >> Details: > >> Important Announcement > >> (OID: 1.3.6.1.4.1.25623.1.0.999998) > >> Version used: 2020-07-14T11:31:48+0000 > >> References: > >> Other: > >> https://community.greenbone.net/t/community-feed-url-consolidation/5= 338 > >> Host 172.20.10.12 > >> ***************** > >> Scanning of this host started at: > >> Number of results: 2 > >> Port Summary for Host 172.20.10.12 > >> ---------------------------------- > >> Service (Port) Threat Level > >> general/tcp High > >> general/tcp High > >> general/tcp High > >> general/tcp High > >> general/tcp High > >> general/tcp High > >> Security Issues for Host 172.20.10.12 > >> ------------------------------------- > >> Issue > >> ----- > >> NVT: Report outdated / end-of-life Scan Engine / Environment (local) > >> OID: 1.3.6.1.4.1.25623.1.0.108560 > >> Threat: High (CVSS: 10.0) > >> Port: general/tcp > >> Summary: > >> This script checks and reports an outdated or end-of-life scan engine > >> for the following environments: > >> - Greenbone Source Edition (GSE) > >> - Greenbone Community Edition (GCE) > >> used for this scan. > >> NOTE: While this is not, in and of itself, a security vulnerability, a= severit! > >> y is reported to make you aware > >> of a possible decreased scan coverage or missing detection of vulnerab= ilities ! > >> on the target due to e.g.: > >> - missing functionalities > >> - missing bugfixes > >> - incompatibilities within the feed. > >> Vulnerability Detection Result: > >> Installed GVM Libraries (gvm-libs) version: 9.0.1 > >> Latest available GVM Libraries (gvm-libs) version: 10.0.2 > >> Reference URL(s) for the latest available version: https://community.g= reenbone.n! > >> et/t/gvm-11-stable-initial-release-2019-10-14/3674 / https://community= =2Egreenbone! > >> .net/t/gvm-10-old-stable-initial-release-2019-04-05/208 > >> Solution: > >> Solution type: VendorFix > >> Update to the latest available stable release for your scan environmen= t. Please ! > >> check the > >> references for more information. If you're using packages provided by = your Lin! > >> ux distribution please contact the maintainer > >> of the used distribution / repository and request updated packages. > >> If you want to accept the risk of a possible decreased scan coverage o= r missin! > >> g detection of vulnerabilities on the target you > >> can set a global override for this script as described in the linked m= anuals. > >> Vulnerability Detection Method: > >> Details: > >> Report outdated / end-of-life Scan Engine / Environment (local) > >> (OID: 1.3.6.1.4.1.25623.1.0.108560) > >> Version used: 2020-06-10T13:24:20+0000 > >> References: > >> Other: > >> https://www.greenbone.net/en/install_use_gce/ > >> https://community.greenbone.net/t/gvm-9-end-of-life-initial-release-= 2017-03-07/211 > >> https://community.greenbone.net/t/gvm-10-old-stable-initial-release-= 2019-04-05/208 > >> https://community.greenbone.net/t/gvm-11-stable-initial-release-2019= -10-14/3674 > >> https://docs.greenbone.net/GSM-Manual/gos-4/en/reports.html#creating= -an-override > >> https://docs.greenbone.net/GSM-Manual/gos-5/en/reports.html#creating= -an-override > >> https://docs.greenbone.net/GSM-Manual/gos-6/en/reports.html#creating= -an-override > >> Issue > >> ----- > >> NVT: Important Announcement > >> OID: 1.3.6.1.4.1.25623.1.0.999998 > >> Threat: High (CVSS: 10.0) > >> Port: general/tcp > >> Summary: > >> ATTENTION: > >> Your vulnerability tests are out of maintenance and not updated since = September ! > >> 1st 2020. Your setup of Greenbone Source Edition will not report about= any new t! > >> hreats in your scanned environment since this date! > >> REASON: > >> Your Greenbone setup is connected to a discontinued download server of= the Green! > >> bone Community Feed. The Greenbone Community Feed is still available v= ia a new d! > >> ownload server. The discontinuation announcement was posted on May 13t= h at the G! > >> reenbone Community Portal. > >> SOLUTION: > >> You can consider to upgrade your setup to a Greenbone enterprise produ= ct which a! > >> lso provides you the full scan coverage via Greenbone Security Feed (s= ee PROFESS! > >> IONAL SOLUTION). Alternatively you can continue with the Greenbone Com= munity Fee! > >> d (see FREE COMMUNITY SOLUTION). > >> PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) > >> We are happy that our technology already today helps you to reduce the= attack su! > >> rface of your corporate IT infrastructure. Our enterprise products clo= se blind s! > >> pots of the community feed and give access to Greenbone service desk. > >> Please contact > >> upgrade@greenbone.net > >> and provide the following details (use copy&paste). Please understand = that we wi! > >> ll not reply to you if you do not provide all the details. > >> - Company name: > >> - Company homepage: > >> - Your name: > >> - Your position in the company: > >> - The number of IP addresses you are scanning with Greenbone (ca.): > >> - The number of scanner instances you are using to scan: > >> - Are you using a master-sensor configuration: yes/no > >> Feel free to add any additional information you regard helpful to unde= rstand you! > >> r setup. > >> Our team will recommend to you a suitable commercial option. We are ha= ppy to dis! > >> cuss larger setups in direct communication. > >> You can inform yourself about our standard products here: > >> https://www.greenbone.net/en/products-solutions/ > >> FREE COMMUNITY SOLUTION: Continue scanning with community feed > >> The Greenbone Community Feed is still available and updated daily. You= may have ! > >> just missed the technical notes and announcement here: > >> https://community.greenbone.net/t/community-feed-url-consolidation/5338 > >> Vulnerability Detection Result: > >> ATTENTION: > >> Your vulnerability tests are out of maintenance and not updated since = September ! > >> 1st 2020. Your setup of Greenbone Source Edition will not report about= any new t! > >> hreats in your scanned environment since this date! > >> REASON: > >> Your Greenbone setup is connected to a discontinued download server of= the Green! > >> bone Community Feed. The Greenbone Community Feed is still available v= ia a new d! > >> ownload server. The discontinuation announcement was posted on May 13t= h at the G! > >> reenbone Community Portal. > >> SOLUTION: > >> You can consider to upgrade your setup to a Greenbone enterprise produ= ct which a! > >> lso provides you the full scan coverage via Greenbone Security Feed (s= ee PROFESS! > >> IONAL SOLUTION). Alternatively you can continue with the Greenbone Com= munity Fee! > >> d (see FREE COMMUNITY SOLUTION). > >> PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) > >> We are happy that our technology already today helps you to reduce the= attack su! > >> rface of your corporate IT infrastructure. Our enterprise products clo= se blind s! > >> pots of the community feed and give access to Greenbone service desk. > >> Please contact > >> upgrade@greenbone.net > >> and provide the following details (use copy&paste). Please understand = that we wi! > >> ll not reply to you if you do not provide all the details. > >> - Company name: > >> - Company homepage: > >> - Your name: > >> - Your position in the company: > >> - The number of IP addresses you are scanning with Greenbone (ca.): > >> - The number of scanner instances you are using to scan: > >> - Are you using a master-sensor configuration: yes/no > >> Feel free to add any additional information you regard helpful to unde= rstand you! > >> r setup. > >> Our team will recommend to you a suitable commercial option. We are ha= ppy to dis! > >> cuss larger setups in direct communication. > >> You can inform yourself about our standard products here: > >> https://www.greenbone.net/en/products-solutions/ > >> FREE COMMUNITY SOLUTION: Continue scanning with community feed > >> The Greenbone Community Feed is still available and updated daily. You= may have ! > >> just missed the technical notes and announcement here: > >> https://community.greenbone.net/t/community-feed-url-consolidation/5338 > >> Vulnerability Detection Method: > >> Details: > >> Important Announcement > >> (OID: 1.3.6.1.4.1.25623.1.0.999998) > >> Version used: 2020-07-14T11:31:48+0000 > >> References: > >> Other: > >> https://community.greenbone.net/t/community-feed-url-consolidation/5= 338 > >> Host 172.20.10.11 > >> ***************** > >> Scanning of this host started at: > >> Number of results: 2 > >> Port Summary for Host 172.20.10.11 > >> ---------------------------------- > >> Service (Port) Threat Level > >> general/tcp High > >> general/tcp High > >> general/tcp High > >> general/tcp High > >> general/tcp High > >> general/tcp High > >> Security Issues for Host 172.20.10.11 > >> ------------------------------------- > >> Issue > >> ----- > >> NVT: Report outdated / end-of-life Scan Engine / Environment (local) > >> OID: 1.3.6.1.4.1.25623.1.0.108560 > >> Threat: High (CVSS: 10.0) > >> Port: general/tcp > >> Summary: > >> This script checks and reports an outdated or end-of-life scan engine > >> for the following environments: > >> - Greenbone Source Edition (GSE) > >> - Greenbone Community Edition (GCE) > >> used for this scan. > >> NOTE: While this is not, in and of itself, a security vulnerability, a= severit! > >> y is reported to make you aware > >> of a possible decreased scan coverage or missing detection of vulnerab= ilities ! > >> on the target due to e.g.: > >> - missing functionalities > >> - missing bugfixes > >> - incompatibilities within the feed. > >> Vulnerability Detection Result: > >> Installed GVM Libraries (gvm-libs) version: 9.0.1 > >> Latest available GVM Libraries (gvm-libs) version: 10.0.2 > >> Reference URL(s) for the latest available version: https://community.g= reenbone.n! > >> et/t/gvm-11-stable-initial-release-2019-10-14/3674 / https://community= =2Egreenbone! > >> .net/t/gvm-10-old-stable-initial-release-2019-04-05/208 > >> Solution: > >> Solution type: VendorFix > >> Update to the latest available stable release for your scan environmen= t. Please ! > >> check the > >> references for more information. If you're using packages provided by = your Lin! > >> ux distribution please contact the maintainer > >> of the used distribution / repository and request updated packages. > >> If you want to accept the risk of a possible decreased scan coverage o= r missin! > >> g detection of vulnerabilities on the target you > >> can set a global override for this script as described in the linked m= anuals. > >> Vulnerability Detection Method: > >> Details: > >> Report outdated / end-of-life Scan Engine / Environment (local) > >> (OID: 1.3.6.1.4.1.25623.1.0.108560) > >> Version used: 2020-06-10T13:24:20+0000 > >> References: > >> Other: > >> https://www.greenbone.net/en/install_use_gce/ > >> https://community.greenbone.net/t/gvm-9-end-of-life-initial-release-= 2017-03-07/211 > >> https://community.greenbone.net/t/gvm-10-old-stable-initial-release-= 2019-04-05/208 > >> https://community.greenbone.net/t/gvm-11-stable-initial-release-2019= -10-14/3674 > >> https://docs.greenbone.net/GSM-Manual/gos-4/en/reports.html#creating= -an-override > >> https://docs.greenbone.net/GSM-Manual/gos-5/en/reports.html#creating= -an-override > >> https://docs.greenbone.net/GSM-Manual/gos-6/en/reports.html#creating= -an-override > >> Issue > >> ----- > >> NVT: Important Announcement > >> OID: 1.3.6.1.4.1.25623.1.0.999998 > >> Threat: High (CVSS: 10.0) > >> Port: general/tcp > >> Summary: > >> ATTENTION: > >> Your vulnerability tests are out of maintenance and not updated since = September ! > >> 1st 2020. Your setup of Greenbone Source Edition will not report about= any new t! > >> hreats in your scanned environment since this date! > >> REASON: > >> Your Greenbone setup is connected to a discontinued download server of= the Green! > >> bone Community Feed. The Greenbone Community Feed is still available v= ia a new d! > >> ownload server. The discontinuation announcement was posted on May 13t= h at the G! > >> reenbone Community Portal. > >> SOLUTION: > >> You can consider to upgrade your setup to a Greenbone enterprise produ= ct which a! > >> lso provides you the full scan coverage via Greenbone Security Feed (s= ee PROFESS! > >> IONAL SOLUTION). Alternatively you can continue with the Greenbone Com= munity Fee! > >> d (see FREE COMMUNITY SOLUTION). > >> PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) > >> We are happy that our technology already today helps you to reduce the= attack su! > >> rface of your corporate IT infrastructure. Our enterprise products clo= se blind s! > >> pots of the community feed and give access to Greenbone service desk. > >> Please contact > >> upgrade@greenbone.net > >> and provide the following details (use copy&paste). Please understand = that we wi! > >> ll not reply to you if you do not provide all the details. > >> - Company name: > >> - Company homepage: > >> - Your name: > >> - Your position in the company: > >> - The number of IP addresses you are scanning with Greenbone (ca.): > >> - The number of scanner instances you are using to scan: > >> - Are you using a master-sensor configuration: yes/no > >> Feel free to add any additional information you regard helpful to unde= rstand you! > >> r setup. > >> Our team will recommend to you a suitable commercial option. We are ha= ppy to dis! > >> cuss larger setups in direct communication. > >> You can inform yourself about our standard products here: > >> https://www.greenbone.net/en/products-solutions/ > >> FREE COMMUNITY SOLUTION: Continue scanning with community feed > >> The Greenbone Community Feed is still available and updated daily. You= may have ! > >> just missed the technical notes and announcement here: > >> https://community.greenbone.net/t/community-feed-url-consolidation/5338 > >> Vulnerability Detection Result: > >> ATTENTION: > >> Your vulnerability tests are out of maintenance and not updated since = September ! > >> 1st 2020. Your setup of Greenbone Source Edition will not report about= any new t! > >> hreats in your scanned environment since this date! > >> REASON: > >> Your Greenbone setup is connected to a discontinued download server of= the Green! > >> bone Community Feed. The Greenbone Community Feed is still available v= ia a new d! > >> ownload server. The discontinuation announcement was posted on May 13t= h at the G! > >> reenbone Community Portal. > >> SOLUTION: > >> You can consider to upgrade your setup to a Greenbone enterprise produ= ct which a! > >> lso provides you the full scan coverage via Greenbone Security Feed (s= ee PROFESS! > >> IONAL SOLUTION). Alternatively you can continue with the Greenbone Com= munity Fee! > >> d (see FREE COMMUNITY SOLUTION). > >> PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) > >> We are happy that our technology already today helps you to reduce the= attack su! > >> rface of your corporate IT infrastructure. Our enterprise products clo= se blind s! > >> pots of the community feed and give access to Greenbone service desk. > >> Please contact > >> upgrade@greenbone.net > >> and provide the following details (use copy&paste). Please understand = that we wi! > >> ll not reply to you if you do not provide all the details. > >> - Company name: > >> - Company homepage: > >> - Your name: > >> - Your position in the company: > >> - The number of IP addresses you are scanning with Greenbone (ca.): > >> - The number of scanner instances you are using to scan: > >> - Are you using a master-sensor configuration: yes/no > >> Feel free to add any additional information you regard helpful to unde= rstand you! > >> r setup. > >> Our team will recommend to you a suitable commercial option. We are ha= ppy to dis! > >> cuss larger setups in direct communication. > >> You can inform yourself about our standard products here: > >> https://www.greenbone.net/en/products-solutions/ > >> FREE COMMUNITY SOLUTION: Continue scanning with community feed > >> The Greenbone Community Feed is still available and updated daily. You= may have ! > >> just missed the technical notes and announcement here: > >> https://community.greenbone.net/t/community-feed-url-consolidation/5338 > >> Vulnerability Detection Method: > >> Details: > >> Important Announcement > >> (OID: 1.3.6.1.4.1.25623.1.0.999998) > >> Version used: 2020-07-14T11:31:48+0000 > >> References: > >> Other: > >> https://community.greenbone.net/t/community-feed-url-consolidation/5= 338 > >> Host 172.20.10.8 > >> **************** > >> Scanning of this host started at: > >> Number of results: 2 > >> Port Summary for Host 172.20.10.8 > >> --------------------------------- > >> Service (Port) Threat Level > >> general/tcp High > >> general/tcp High > >> general/tcp High > >> general/tcp High > >> general/tcp High > >> general/tcp High > >> Security Issues for Host 172.20.10.8 > >> ------------------------------------ > >> Issue > >> ----- > >> NVT: Report outdated / end-of-life Scan Engine / Environment (local) > >> OID: 1.3.6.1.4.1.25623.1.0.108560 > >> Threat: High (CVSS: 10.0) > >> Port: general/tcp > >> Summary: > >> This script checks and reports an outdated or end-of-life scan engine > >> for the following environments: > >> - Greenbone Source Edition (GSE) > >> - Greenbone Community Edition (GCE) > >> used for this scan. > >> NOTE: While this is not, in and of itself, a security vulnerability, a= severit! > >> y is reported to make you aware > >> of a possible decreased scan coverage or missing detection of vulnerab= ilities ! > >> on the target due to e.g.: > >> - missing functionalities > >> - missing bugfixes > >> - incompatibilities within the feed. > >> Vulnerability Detection Result: > >> Installed GVM Libraries (gvm-libs) version: 9.0.1 > >> Latest available GVM Libraries (gvm-libs) version: 10.0.2 > >> Reference URL(s) for the latest available version: https://community.g= reenbone.n! > >> et/t/gvm-11-stable-initial-release-2019-10-14/3674 / https://community= =2Egreenbone! > >> .net/t/gvm-10-old-stable-initial-release-2019-04-05/208 > >> Solution: > >> Solution type: VendorFix > >> Update to the latest available stable release for your scan environmen= t. Please ! > >> check the > >> references for more information. If you're using packages provided by = your Lin! > >> ux distribution please contact the maintainer > >> of the used distribution / repository and request updated packages. > >> If you want to accept the risk of a possible decreased scan coverage o= r missin! > >> g detection of vulnerabilities on the target you > >> can set a global override for this script as described in the linked m= anuals. > >> Vulnerability Detection Method: > >> Details: > >> Report outdated / end-of-life Scan Engine / Environment (local) > >> (OID: 1.3.6.1.4.1.25623.1.0.108560) > >> Version used: 2020-06-10T13:24:20+0000 > >> References: > >> Other: > >> https://www.greenbone.net/en/install_use_gce/ > >> https://community.greenbone.net/t/gvm-9-end-of-life-initial-release-= 2017-03-07/211 > >> https://community.greenbone.net/t/gvm-10-old-stable-initial-release-= 2019-04-05/208 > >> https://community.greenbone.net/t/gvm-11-stable-initial-release-2019= -10-14/3674 > >> https://docs.greenbone.net/GSM-Manual/gos-4/en/reports.html#creating= -an-override > >> https://docs.greenbone.net/GSM-Manual/gos-5/en/reports.html#creating= -an-override > >> https://docs.greenbone.net/GSM-Manual/gos-6/en/reports.html#creating= -an-override > >> Issue > >> ----- > >> NVT: Important Announcement > >> OID: 1.3.6.1.4.1.25623.1.0.999998 > >> Threat: High (CVSS: 10.0) > >> Port: general/tcp > >> Summary: > >> ATTENTION: > >> Your vulnerability tests are out of maintenance and not updated since = September ! > >> 1st 2020. Your setup of Greenbone Source Edition will not report about= any new t! > >> hreats in your scanned environment since this date! > >> REASON: > >> Your Greenbone setup is connected to a discontinued download server of= the Green! > >> bone Community Feed. The Greenbone Community Feed is still available v= ia a new d! > >> ownload server. The discontinuation announcement was posted on May 13t= h at the G! > >> reenbone Community Portal. > >> SOLUTION: > >> You can consider to upgrade your setup to a Greenbone enterprise produ= ct which a! > >> lso provides you the full scan coverage via Greenbone Security Feed (s= ee PROFESS! > >> IONAL SOLUTION). Alternatively you can continue with the Greenbone Com= munity Fee! > >> d (see FREE COMMUNITY SOLUTION). > >> PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) > >> We are happy that our technology already today helps you to reduce the= attack su! > >> rface of your corporate IT infrastructure. Our enterprise products clo= se blind s! > >> pots of the community feed and give access to Greenbone service desk. > >> Please contact > >> upgrade@greenbone.net > >> and provide the following details (use copy&paste). Please understand = that we wi! > >> ll not reply to you if you do not provide all the details. > >> - Company name: > >> - Company homepage: > >> - Your name: > >> - Your position in the company: > >> - The number of IP addresses you are scanning with Greenbone (ca.): > >> - The number of scanner instances you are using to scan: > >> - Are you using a master-sensor configuration: yes/no > >> Feel free to add any additional information you regard helpful to unde= rstand you! > >> r setup. > >> Our team will recommend to you a suitable commercial option. We are ha= ppy to dis! > >> cuss larger setups in direct communication. > >> You can inform yourself about our standard products here: > >> https://www.greenbone.net/en/products-solutions/ > >> FREE COMMUNITY SOLUTION: Continue scanning with community feed > >> The Greenbone Community Feed is still available and updated daily. You= may have ! > >> just missed the technical notes and announcement here: > >> https://community.greenbone.net/t/community-feed-url-consolidation/5338 > >> Vulnerability Detection Result: > >> ATTENTION: > >> Your vulnerability tests are out of maintenance and not updated since = September ! > >> 1st 2020. Your setup of Greenbone Source Edition will not report about= any new t! > >> hreats in your scanned environment since this date! > >> REASON: > >> Your Greenbone setup is connected to a discontinued download server of= the Green! > >> bone Community Feed. The Greenbone Community Feed is still available v= ia a new d! > >> ownload server. The discontinuation announcement was posted on May 13t= h at the G! > >> reenbone Community Portal. > >> SOLUTION: > >> You can consider to upgrade your setup to a Greenbone enterprise produ= ct which a! > >> lso provides you the full scan coverage via Greenbone Security Feed (s= ee PROFESS! > >> IONAL SOLUTION). Alternatively you can continue with the Greenbone Com= munity Fee! > >> d (see FREE COMMUNITY SOLUTION). > >> PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) > >> We are happy that our technology already today helps you to reduce the= attack su! > >> rface of your corporate IT infrastructure. Our enterprise products clo= se blind s! > >> pots of the community feed and give access to Greenbone service desk. > >> Please contact > >> upgrade@greenbone.net > >> and provide the following details (use copy&paste). Please understand = that we wi! > >> ll not reply to you if you do not provide all the details. > >> - Company name: > >> - Company homepage: > >> - Your name: > >> - Your position in the company: > >> - The number of IP addresses you are scanning with Greenbone (ca.): > >> - The number of scanner instances you are using to scan: > >> - Are you using a master-sensor configuration: yes/no > >> Feel free to add any additional information you regard helpful to unde= rstand you! > >> r setup. > >> Our team will recommend to you a suitable commercial option. We are ha= ppy to dis! > >> cuss larger setups in direct communication. > >> You can inform yourself about our standard products here: > >> https://www.greenbone.net/en/products-solutions/ > >> FREE COMMUNITY SOLUTION: Continue scanning with community feed > >> The Greenbone Community Feed is still available and updated daily. You= may have ! > >> just missed the technical notes and announcement here: > >> https://community.greenbone.net/t/community-feed-url-consolidation/5338 > >> Vulnerability Detection Method: > >> Details: > >> Important Announcement > >> (OID: 1.3.6.1.4.1.25623.1.0.999998) > >> Version used: 2020-07-14T11:31:48+0000 > >> References: > >> Other: > >> https://community.greenbone.net/t/community-feed-url-consolidation/5= 338 > >> Host 172.20.10.1 > >> **************** > >> Scanning of this host started at: > >> Number of results: 2 > >> Port Summary for Host 172.20.10.1 > >> --------------------------------- > >> Service (Port) Threat Level > >> general/tcp High > >> general/tcp High > >> general/tcp High > >> general/tcp High > >> general/tcp High > >> general/tcp High > >> Security Issues for Host 172.20.10.1 > >> ------------------------------------ > >> Issue > >> ----- > >> NVT: Report outdated / end-of-life Scan Engine / Environment (local) > >> OID: 1.3.6.1.4.1.25623.1.0.108560 > >> Threat: High (CVSS: 10.0) > >> Port: general/tcp > >> Summary: > >> This script checks and reports an outdated or end-of-life scan engine > >> for the following environments: > >> - Greenbone Source Edition (GSE) > >> - Greenbone Community Edition (GCE) > >> used for this scan. > >> NOTE: While this is not, in and of itself, a security vulnerability, a= severit! > >> y is reported to make you aware > >> of a possible decreased scan coverage or missing detection of vulnerab= ilities ! > >> on the target due to e.g.: > >> - missing functionalities > >> - missing bugfixes > >> - incompatibilities within the feed. > >> Vulnerability Detection Result: > >> Installed GVM Libraries (gvm-libs) version: 9.0.1 > >> Latest available GVM Libraries (gvm-libs) version: 10.0.2 > >> Reference URL(s) for the latest available version: https://community.g= reenbone.n! > >> et/t/gvm-11-stable-initial-release-2019-10-14/3674 / https://community= =2Egreenbone! > >> .net/t/gvm-10-old-stable-initial-release-2019-04-05/208 > >> Solution: > >> Solution type: VendorFix > >> Update to the latest available stable release for your scan environmen= t. Please ! > >> check the > >> references for more information. If you're using packages provided by = your Lin! > >> ux distribution please contact the maintainer > >> of the used distribution / repository and request updated packages. > >> If you want to accept the risk of a possible decreased scan coverage o= r missin! > >> g detection of vulnerabilities on the target you > >> can set a global override for this script as described in the linked m= anuals. > >> Vulnerability Detection Method: > >> Details: > >> Report outdated / end-of-life Scan Engine / Environment (local) > >> (OID: 1.3.6.1.4.1.25623.1.0.108560) > >> Version used: 2020-06-10T13:24:20+0000 > >> References: > >> Other: > >> https://www.greenbone.net/en/install_use_gce/ > >> https://community.greenbone.net/t/gvm-9-end-of-life-initial-release-= 2017-03-07/211 > >> https://community.greenbone.net/t/gvm-10-old-stable-initial-release-= 2019-04-05/208 > >> https://community.greenbone.net/t/gvm-11-stable-initial-release-2019= -10-14/3674 > >> https://docs.greenbone.net/GSM-Manual/gos-4/en/reports.html#creating= -an-override > >> https://docs.greenbone.net/GSM-Manual/gos-5/en/reports.html#creating= -an-override > >> https://docs.greenbone.net/GSM-Manual/gos-6/en/reports.html#creating= -an-override > >> Issue > >> ----- > >> NVT: Important Announcement > >> OID: 1.3.6.1.4.1.25623.1.0.999998 > >> Threat: High (CVSS: 10.0) > >> Port: general/tcp > >> Summary: > >> ATTENTION: > >> Your vulnerability tests are out of maintenance and not updated since = September ! > >> 1st 2020. Your setup of Greenbone Source Edition will not report about= any new t! > >> hreats in your scanned environment since this date! > >> REASON: > >> Your Greenbone setup is connected to a discontinued download server of= the Green! > >> bone Community Feed. The Greenbone Community Feed is still available v= ia a new d! > >> ownload server. The discontinuation announcement was posted on May 13t= h at the G! > >> reenbone Community Portal. > >> SOLUTION: > >> You can consider to upgrade your setup to a Greenbone enterprise produ= ct which a! > >> lso provides you the full scan coverage via Greenbone Security Feed (s= ee PROFESS! > >> IONAL SOLUTION). Alternatively you can continue with the Greenbone Com= munity Fee! > >> d (see FREE COMMUNITY SOLUTION). > >> PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) > >> We are happy that our technology already today helps you to reduce the= attack su! > >> rface of your corporate IT infrastructure. Our enterprise products clo= se blind s! > >> pots of the community feed and give access to Greenbone service desk. > >> Please contact > >> upgrade@greenbone.net > >> and provide the following details (use copy&paste). Please understand = that we wi! > >> ll not reply to you if you do not provide all the details. > >> - Company name: > >> - Company homepage: > >> - Your name: > >> - Your position in the company: > >> - The number of IP addresses you are scanning with Greenbone (ca.): > >> - The number of scanner instances you are using to scan: > >> - Are you using a master-sensor configuration: yes/no > >> Feel free to add any additional information you regard helpful to unde= rstand you! > >> r setup. > >> Our team will recommend to you a suitable commercial option. We are ha= ppy to dis! > >> cuss larger setups in direct communication. > >> You can inform yourself about our standard products here: > >> https://www.greenbone.net/en/products-solutions/ > >> FREE COMMUNITY SOLUTION: Continue scanning with community feed > >> The Greenbone Community Feed is still available and updated daily. You= may have ! > >> just missed the technical notes and announcement here: > >> https://community.greenbone.net/t/community-feed-url-consolidation/5338 > >> Vulnerability Detection Result: > >> ATTENTION: > >> Your vulnerability tests are out of maintenance and not updated since = September ! > >> 1st 2020. Your setup of Greenbone Source Edition will not report about= any new t! > >> hreats in your scanned environment since this date! > >> REASON: > >> Your Greenbone setup is connected to a discontinued download server of= the Green! > >> bone Community Feed. The Greenbone Community Feed is still available v= ia a new d! > >> ownload server. The discontinuation announcement was posted on May 13t= h at the G! > >> reenbone Community Portal. > >> SOLUTION: > >> You can consider to upgrade your setup to a Greenbone enterprise produ= ct which a! > >> lso provides you the full scan coverage via Greenbone Security Feed (s= ee PROFESS! > >> IONAL SOLUTION). Alternatively you can continue with the Greenbone Com= munity Fee! > >> d (see FREE COMMUNITY SOLUTION). > >> PROFESSIONAL SOLUTION (Upgrading to full coverage scanning) > >> We are happy that our technology already today helps you to reduce the= attack su! > >> rface of your corporate IT infrastructure. Our enterprise products clo= se blind s! > >> pots of the community feed and give access to Greenbone service desk. > >> Please contact > >> upgrade@greenbone.net > >> and provide the following details (use copy&paste). Please understand = that we wi! > >> ll not reply to you if you do not provide all the details. > >> - Company name: > >> - Company homepage: > >> - Your name: > >> - Your position in the company: > >> - The number of IP addresses you are scanning with Greenbone (ca.): > >> - The number of scanner instances you are using to scan: > >> - Are you using a master-sensor configuration: yes/no > >> Feel free to add any additional information you regard helpful to unde= rstand you! > >> r setup. > >> Our team will recommend to you a suitable commercial option. We are ha= ppy to dis! > >> cuss larger setups in direct communication. > >> You can inform yourself about our standard products here: > >> https://www.greenbone.net/en/products-solutions/ > >> FREE COMMUNITY SOLUTION: Continue scanning with community feed > >> The Greenbone Community Feed is still available and updated daily. You= may have ! > >> just missed the technical notes and announcement here: > >> https://community.greenbone.net/t/community-feed-url-consolidation/5338 > >> Vulnerability Detection Method: > >> Details: > >> Important Announcement > >> (OID: 1.3.6.1.4.1.25623.1.0.999998) > >> Version used: 2020-07-14T11:31:48+0000 > >> References: > >> Other: > >> https://community.greenbone.net/t/community-feed-url-consolidation/5= 338 > >=20 > >> _______________________________________________ > >> freebsd-pkg@freebsd.org mailing list > >> https://lists.freebsd.org/mailman/listinfo/freebsd-pkg > >> To unsubscribe, send any mail to "freebsd-pkg-unsubscribe@freebsd.org" >=20 --NzB8fVQJ5HfG6fxh Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQEcBAEBAgAGBQJfbhRnAAoJEKzQXbSebgfAHB0IAKImuKioz+WgPC4cDQvcyQZA wDbJ8CXzjnZsNspk/ZUjlNErplzjJhv4Q3YmC/SBgPQe9SNC8k48KOTdc5n1fVMV NCzfTVxxEX+YjIgEFLRV+B0gclrjdg/lIlGeJZJ1gES21jDV/hiqvCbiUwHW5bHU 5vF6hqwvvWISPG4XPUq7ycnyuvWYtyevWmqndnEVc/6Bz34Qsfcqz4Le10EV+R4Q HnSo1E5Sh48axNpBO/tJ5XfcM3cgyrEjQ0cg1AeUWJ8dXok+Ci2W6WHF/A9o/0jX t6+cApwzL3NEfRqL2RuwEG3FtOYVF0OGiR/vdQwIKBCXzz8OgO+2RRxpYl4fOcU= =IjwQ -----END PGP SIGNATURE----- --NzB8fVQJ5HfG6fxh-- From owner-freebsd-pkg@freebsd.org Sat Sep 26 14:11:32 2020 Return-Path: Delivered-To: freebsd-pkg@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 1B2E33FFB23 for ; Sat, 26 Sep 2020 14:11:32 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (mailman.nyi.freebsd.org [IPv6:2610:1c1:1:606c::50:13]) by mx1.freebsd.org (Postfix) with ESMTP id 4Bz9gl72pwz4dXf for ; Sat, 26 Sep 2020 14:11:31 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id F1BF73FFA1D; Sat, 26 Sep 2020 14:11:31 +0000 (UTC) Delivered-To: pkg@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id F18823FFB21 for ; Sat, 26 Sep 2020 14:11:31 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Bz9gl68spz4dRJ for ; Sat, 26 Sep 2020 14:11:31 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id B773E2531B for ; Sat, 26 Sep 2020 14:11:31 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 08QEBV2S000820 for ; Sat, 26 Sep 2020 14:11:31 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 08QEBVeV000819 for pkg@FreeBSD.org; Sat, 26 Sep 2020 14:11:31 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="UTF-8" From: bugzilla-noreply@freebsd.org To: pkg@FreeBSD.org Subject: maintainer-feedback requested: [Bug 249917] ports-mgmt/pkg: pkg 1.15.6 : pkg clean also removes newly installed packages Date: Sat, 26 Sep 2020 14:11:31 +0000 X-Bugzilla-Type: request X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: pkg@FreeBSD.org X-Bugzilla-Flags: maintainer-feedback? Message-ID: In-Reply-To: References: X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-pkg@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Binary package management and package tools discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 26 Sep 2020 14:11:32 -0000 Bugzilla Automation has asked freebsd-pkg (Nobody) for maintainer-feedback: Bug 249917: ports-mgmt/pkg: pkg 1.15.6 : pkg clean also removes newly insta= lled packages https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D249917 --- Description --- This is possibly a pilot error on my part. I always run a string of pkg(8) commands when upgrading my systems. Up until the 1.15 series of ports-mgmt/= pkg, pkg clean did only remove outdated packages, but only when a certain limit = was reached. It would not always remove all outdated packages in one go. Now, it seems it almost wants to blow away the entire local package cache. This is = on amd64, stable/12, r365314. # pkg update -f && pkg upgrade && pkg clean Updating builder01 repository catalogue... Fetching meta.conf: 100% 163 B 0.2kB/s 00:01 Fetching packagesite.txz: 100% 189 KiB 193.4kB/s 00:01 Processing entries: 100% builder01 repository update completed. 677 packages processed. All repositories are up to date. Updating builder01 repository catalogue... builder01 repository is up to date. All repositories are up to date. New version of pkg detected; it needs to be installed first. The following 1 package(s) will be affected (of 0 checked): Installed packages to be UPGRADED: pkg: 1.15.4 -> 1.15.6 Number of packages to be upgraded: 1 8 MiB to be downloaded. Proceed with this action? [y/N]: y [1/1] Fetching pkg-1.15.6.txz: 100% 8 MiB 8.0MB/s 00:01 Checking integrity... done (0 conflicting) [1/1] Upgrading pkg from 1.15.4 to 1.15.6... [1/1] Extracting pkg-1.15.6: 100% Updating builder01 repository catalogue... builder01 repository is up to date. All repositories are up to date. Checking for upgrades (7 candidates): 100% Processing candidates (7 candidates): 100% The following 7 package(s) will be affected (of 0 checked): Installed packages to be UPGRADED: bind-tools: 9.16.6 -> 9.16.7 ca_root_nss: 3.56 -> 3.57 cairo: 1.16.0,3 -> 1.16.0_1,3 emacs-nox: 27.1,3 -> 27.1_1,3 glib: 2.56.3_9,1 -> 2.66.0_1,1 libxml2: 2.9.10 -> 2.9.10_1 nss: 3.56 -> 3.57 Number of packages to be upgraded: 7 49 MiB to be downloaded. Proceed with this action? [y/N]: y [1/7] Fetching nss-3.57.txz: 100% 2 MiB 2.0MB/s 00:01 [2/7] Fetching libxml2-2.9.10_1.txz: 100% 826 KiB 845.6kB/s 00:01 [3/7] Fetching glib-2.66.0_1,1.txz: 100% 2 MiB 2.2MB/s 00:01 [4/7] Fetching emacs-nox-27.1_1,3.txz: 100% 39 MiB 40.4MB/s 00:01 [5/7] Fetching cairo-1.16.0_1,3.txz: 100% 1 MiB 1.1MB/s 00:01 [6/7] Fetching ca_root_nss-3.57.txz: 100% 285 KiB 291.5kB/s 00:01 [7/7] Fetching bind-tools-9.16.7.txz: 100% 4 MiB 4.3MB/s 00:01 Checking integrity... done (0 conflicting) [1/7] Upgrading libxml2 from 2.9.10 to 2.9.10_1... [1/7] Extracting libxml2-2.9.10_1: 100% [2/7] Upgrading glib from 2.56.3_9,1 to 2.66.0_1,1... [2/7] Extracting glib-2.66.0_1,1: 100% No schema files found: doing nothing. [3/7] Upgrading nss from 3.56 to 3.57... [3/7] Extracting nss-3.57: 100% [4/7] Upgrading emacs-nox from 27.1,3 to 27.1_1,3... [4/7] Extracting emacs-nox-27.1_1,3: 100% [5/7] Upgrading cairo from 1.16.0,3 to 1.16.0_1,3... [5/7] Extracting cairo-1.16.0_1,3: 100% [6/7] Upgrading ca_root_nss from 3.56 to 3.57... [6/7] Extracting ca_root_nss-3.57: 100% [7/7] Upgrading bind-tools from 9.16.6 to 9.16.7... [7/7] Extracting bind-tools-9.16.7: 100% The following package files will be deleted: /var/cache/pkg/php72-pgsql-7.2.33.txz /var/cache/pkg/libxml2-2.9.10.txz /var/cache/pkg/php72-openssl-7.2.33-31cef81672.txz /var/cache/pkg/libxml2-2.9.10_1~41d1fe6151.txz <=3D=3D Hey, you just installed this one! Why do you want to to remove it? /var/cache/pkg/php72-7.2.33-e2ff17d93a.txz /var/cache/pkg/emacs-nox-27.1_1,3~5e52c7e66b.txz <=3D=3D Hey, you just installed this one! Why do you want to to remove it? /var/cache/pkg/emacs-nox-27.1,3-1a60b72082.txz /var/cache/pkg/pkg-1.15.4-d83943d7a4.txz /var/cache/pkg/glib-2.66.0_1,1.txz <=3D=3D Hey, you just installed this one! Why do you want to to remove it? /var/cache/pkg/libxml2-2.9.10-9f8039cde2.txz /var/cache/pkg/cairo-1.16.0_1,3.txz <=3D=3D Hey, you just installed this one! Why do you want to to remove it? /var/cache/pkg/ca_root_nss-3.57~ec3bc4201c.txz <=3D=3D Hey, you just installed this one! Why do you want to to remove it? /var/cache/pkg/php72-pgsql-7.2.33-83d5696f58.txz /var/cache/pkg/apache24-2.4.46.txz /var/cache/pkg/php72-zlib-7.2.33-f23c8a821f.txz /var/cache/pkg/php72-json-7.2.33-68450bd8db.txz /var/cache/pkg/bind-tools-9.16.7~c1f49e7dd1.txz <=3D=3D Hey, you just installed this one! Why do you want to remove it? /var/cache/pkg/ca_root_nss-3.57.txz /var/cache/pkg/php72-xml-7.2.33-4162a6bcc7.txz /var/cache/pkg/ca_root_nss-3.56-7667a45152.txz /var/cache/pkg/bind-tools-9.16.7.txz <=3D=3D Hey, you just installed this one! Why do you want to remove it? /var/cache/pkg/pkg-1.15.6.txz <=3D=3D Hey, you just installed this one! Why do you want to remove it? /var/cache/pkg/amanda-client-3.3.9_4,1.txz /var/cache/pkg/emacs-nox-27.1_1,3.txz <=3D=3D Hey, you just installed this one! Why do you want to remove it? /var/cache/pkg/nss-3.57.txz <=3D=3D Hey, you just installed this one! Why do you want to remove it? /var/cache/pkg/emacs-nox-27.1,3.txz /var/cache/pkg/nss-3.57~8f087328c7.txz <=3D=3D Hey, you just installed this one! Why do you want to remove it? /var/cache/pkg/php72-session-7.2.33-a11b0363fb.txz /var/cache/pkg/php72-hash-7.2.33-adc1712add.txz /var/cache/pkg/amanda-client-3.3.9_4,1-36d9da8a4c.txz /var/cache/pkg/php72-json-7.2.33.txz /var/cache/pkg/mc-nox11-4.8.24-f22aeb3572.txz /var/cache/pkg/mc-nox11-4.8.24.txz /var/cache/pkg/postgresql11-contrib-11.9.txz /var/cache/pkg/postgresql11-contrib-11.9-ae1c78215d.txz /var/cache/pkg/libxml2-2.9.10_1.txz <=3D=3D Hey, you just installed this one! Why do you want to remove it? /var/cache/pkg/php72-openssl-7.2.33.txz /var/cache/pkg/ca_root_nss-3.56.txz /var/cache/pkg/php72-zlib-7.2.33.txz /var/cache/pkg/glib-2.66.0_1,1~47f326b2dc.txz <=3D=3D Hey, you just installed this one! Why do you want to remove it? /var/cache/pkg/apache24-2.4.46-a2e3ac4fa4.txz /var/cache/pkg/php72-hash-7.2.33.txz /var/cache/pkg/pkg-1.15.6~dee248db4a.txz /var/cache/pkg/php72-mbstring-7.2.33.txz /var/cache/pkg/php72-xml-7.2.33.txz /var/cache/pkg/php72-mbstring-7.2.33-bfb8823175.txz /var/cache/pkg/php72-session-7.2.33.txz /var/cache/pkg/php72-7.2.33.txz /var/cache/pkg/cairo-1.16.0_1,3~0deca7e1e2.txz <=3D=3D Hey, you just installed this one! Why do you want to remove it? The cleanup will free 116 MiB Proceed with cleaning the cache? [y/N]: y Deleting files: 100% All done From owner-freebsd-pkg@freebsd.org Sat Sep 26 14:11:32 2020 Return-Path: Delivered-To: freebsd-pkg@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 900293FF7ED for ; Sat, 26 Sep 2020 14:11:32 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 4Bz9gm39b9z4dDK for ; Sat, 26 Sep 2020 14:11:32 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id 6CE183FF370; Sat, 26 Sep 2020 14:11:32 +0000 (UTC) Delivered-To: pkg@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 6CA903FF7EC for ; Sat, 26 Sep 2020 14:11:32 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Bz9gm14nJz4dXg for ; Sat, 26 Sep 2020 14:11:32 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 0881925412 for ; Sat, 26 Sep 2020 14:11:32 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 08QEBVYI000828 for ; Sat, 26 Sep 2020 14:11:31 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 08QEBVjr000827 for pkg@FreeBSD.org; Sat, 26 Sep 2020 14:11:31 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: pkg@FreeBSD.org Subject: [Bug 249917] ports-mgmt/pkg: pkg 1.15.6 : pkg clean also removes newly installed packages Date: Sat, 26 Sep 2020 14:11:31 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: Trond.Endrestol@ximalas.info X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: pkg@FreeBSD.org X-Bugzilla-Flags: maintainer-feedback? X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter flagtypes.name Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-pkg@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Binary package management and package tools discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 26 Sep 2020 14:11:32 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D249917 Bug ID: 249917 Summary: ports-mgmt/pkg: pkg 1.15.6 : pkg clean also removes newly installed packages Product: Ports & Packages Version: Latest Hardware: Any OS: Any Status: New Severity: Affects Only Me Priority: --- Component: Individual Port(s) Assignee: pkg@FreeBSD.org Reporter: Trond.Endrestol@ximalas.info Assignee: pkg@FreeBSD.org Flags: maintainer-feedback?(pkg@FreeBSD.org) This is possibly a pilot error on my part. I always run a string of pkg(8) commands when upgrading my systems. Up until the 1.15 series of ports-mgmt/= pkg, pkg clean did only remove outdated packages, but only when a certain limit = was reached. It would not always remove all outdated packages in one go. Now, it seems it almost wants to blow away the entire local package cache. This is = on amd64, stable/12, r365314. # pkg update -f && pkg upgrade && pkg clean Updating builder01 repository catalogue... Fetching meta.conf: 100% 163 B 0.2kB/s 00:01 Fetching packagesite.txz: 100% 189 KiB 193.4kB/s 00:01 Processing entries: 100% builder01 repository update completed. 677 packages processed. All repositories are up to date. Updating builder01 repository catalogue... builder01 repository is up to date. All repositories are up to date. New version of pkg detected; it needs to be installed first. The following 1 package(s) will be affected (of 0 checked): Installed packages to be UPGRADED: pkg: 1.15.4 -> 1.15.6 Number of packages to be upgraded: 1 8 MiB to be downloaded. Proceed with this action? [y/N]: y [1/1] Fetching pkg-1.15.6.txz: 100% 8 MiB 8.0MB/s 00:01 Checking integrity... done (0 conflicting) [1/1] Upgrading pkg from 1.15.4 to 1.15.6... [1/1] Extracting pkg-1.15.6: 100% Updating builder01 repository catalogue... builder01 repository is up to date. All repositories are up to date. Checking for upgrades (7 candidates): 100% Processing candidates (7 candidates): 100% The following 7 package(s) will be affected (of 0 checked): Installed packages to be UPGRADED: bind-tools: 9.16.6 -> 9.16.7 ca_root_nss: 3.56 -> 3.57 cairo: 1.16.0,3 -> 1.16.0_1,3 emacs-nox: 27.1,3 -> 27.1_1,3 glib: 2.56.3_9,1 -> 2.66.0_1,1 libxml2: 2.9.10 -> 2.9.10_1 nss: 3.56 -> 3.57 Number of packages to be upgraded: 7 49 MiB to be downloaded. Proceed with this action? [y/N]: y [1/7] Fetching nss-3.57.txz: 100% 2 MiB 2.0MB/s 00:01 [2/7] Fetching libxml2-2.9.10_1.txz: 100% 826 KiB 845.6kB/s 00:01 [3/7] Fetching glib-2.66.0_1,1.txz: 100% 2 MiB 2.2MB/s 00:01 [4/7] Fetching emacs-nox-27.1_1,3.txz: 100% 39 MiB 40.4MB/s 00:01 [5/7] Fetching cairo-1.16.0_1,3.txz: 100% 1 MiB 1.1MB/s 00:01 [6/7] Fetching ca_root_nss-3.57.txz: 100% 285 KiB 291.5kB/s 00:01 [7/7] Fetching bind-tools-9.16.7.txz: 100% 4 MiB 4.3MB/s 00:01 Checking integrity... done (0 conflicting) [1/7] Upgrading libxml2 from 2.9.10 to 2.9.10_1... [1/7] Extracting libxml2-2.9.10_1: 100% [2/7] Upgrading glib from 2.56.3_9,1 to 2.66.0_1,1... [2/7] Extracting glib-2.66.0_1,1: 100% No schema files found: doing nothing. [3/7] Upgrading nss from 3.56 to 3.57... [3/7] Extracting nss-3.57: 100% [4/7] Upgrading emacs-nox from 27.1,3 to 27.1_1,3... [4/7] Extracting emacs-nox-27.1_1,3: 100% [5/7] Upgrading cairo from 1.16.0,3 to 1.16.0_1,3... [5/7] Extracting cairo-1.16.0_1,3: 100% [6/7] Upgrading ca_root_nss from 3.56 to 3.57... [6/7] Extracting ca_root_nss-3.57: 100% [7/7] Upgrading bind-tools from 9.16.6 to 9.16.7... [7/7] Extracting bind-tools-9.16.7: 100% The following package files will be deleted: /var/cache/pkg/php72-pgsql-7.2.33.txz /var/cache/pkg/libxml2-2.9.10.txz /var/cache/pkg/php72-openssl-7.2.33-31cef81672.txz /var/cache/pkg/libxml2-2.9.10_1~41d1fe6151.txz <=3D=3D Hey, you just installed this one! Why do you want to to remove it? /var/cache/pkg/php72-7.2.33-e2ff17d93a.txz /var/cache/pkg/emacs-nox-27.1_1,3~5e52c7e66b.txz <=3D=3D Hey, you j= ust installed this one! Why do you want to to remove it? /var/cache/pkg/emacs-nox-27.1,3-1a60b72082.txz /var/cache/pkg/pkg-1.15.4-d83943d7a4.txz /var/cache/pkg/glib-2.66.0_1,1.txz <=3D=3D Hey, you just installed = this one! Why do you want to to remove it? /var/cache/pkg/libxml2-2.9.10-9f8039cde2.txz /var/cache/pkg/cairo-1.16.0_1,3.txz <=3D=3D Hey, you just installed= this one! Why do you want to to remove it? /var/cache/pkg/ca_root_nss-3.57~ec3bc4201c.txz <=3D=3D Hey, you just installed this one! Why do you want to to remove it? /var/cache/pkg/php72-pgsql-7.2.33-83d5696f58.txz /var/cache/pkg/apache24-2.4.46.txz /var/cache/pkg/php72-zlib-7.2.33-f23c8a821f.txz /var/cache/pkg/php72-json-7.2.33-68450bd8db.txz /var/cache/pkg/bind-tools-9.16.7~c1f49e7dd1.txz <=3D=3D Hey, you ju= st installed this one! Why do you want to remove it? /var/cache/pkg/ca_root_nss-3.57.txz /var/cache/pkg/php72-xml-7.2.33-4162a6bcc7.txz /var/cache/pkg/ca_root_nss-3.56-7667a45152.txz /var/cache/pkg/bind-tools-9.16.7.txz <=3D=3D Hey, you just installe= d this one! Why do you want to remove it? /var/cache/pkg/pkg-1.15.6.txz <=3D=3D Hey, you just installed this = one! Why do you want to remove it? /var/cache/pkg/amanda-client-3.3.9_4,1.txz /var/cache/pkg/emacs-nox-27.1_1,3.txz <=3D=3D Hey, you just install= ed this one! Why do you want to remove it? /var/cache/pkg/nss-3.57.txz <=3D=3D Hey, you just installed this on= e! Why do you want to remove it? /var/cache/pkg/emacs-nox-27.1,3.txz /var/cache/pkg/nss-3.57~8f087328c7.txz <=3D=3D Hey, you just instal= led this one! Why do you want to remove it? /var/cache/pkg/php72-session-7.2.33-a11b0363fb.txz /var/cache/pkg/php72-hash-7.2.33-adc1712add.txz /var/cache/pkg/amanda-client-3.3.9_4,1-36d9da8a4c.txz /var/cache/pkg/php72-json-7.2.33.txz /var/cache/pkg/mc-nox11-4.8.24-f22aeb3572.txz /var/cache/pkg/mc-nox11-4.8.24.txz /var/cache/pkg/postgresql11-contrib-11.9.txz /var/cache/pkg/postgresql11-contrib-11.9-ae1c78215d.txz /var/cache/pkg/libxml2-2.9.10_1.txz <=3D=3D Hey, you just installed= this one! Why do you want to remove it? /var/cache/pkg/php72-openssl-7.2.33.txz /var/cache/pkg/ca_root_nss-3.56.txz /var/cache/pkg/php72-zlib-7.2.33.txz /var/cache/pkg/glib-2.66.0_1,1~47f326b2dc.txz <=3D=3D Hey, you just installed this one! Why do you want to remove it? /var/cache/pkg/apache24-2.4.46-a2e3ac4fa4.txz /var/cache/pkg/php72-hash-7.2.33.txz /var/cache/pkg/pkg-1.15.6~dee248db4a.txz /var/cache/pkg/php72-mbstring-7.2.33.txz /var/cache/pkg/php72-xml-7.2.33.txz /var/cache/pkg/php72-mbstring-7.2.33-bfb8823175.txz /var/cache/pkg/php72-session-7.2.33.txz /var/cache/pkg/php72-7.2.33.txz /var/cache/pkg/cairo-1.16.0_1,3~0deca7e1e2.txz <=3D=3D Hey, you just installed this one! Why do you want to remove it? The cleanup will free 116 MiB Proceed with cleaning the cache? [y/N]: y Deleting files: 100% All done --=20 You are receiving this mail because: You are the assignee for the bug.=