Gsad GLib-CRITICAL Warning

Hello, I’m using Greenbone on Kali distribution, works without any problem, but using the script “gvm-check-setup” I see this warning:

Step 6: Checking Greenbone Security Assistant (GSA) …

(gsad:175030): GLib-CRITICAL **: 09:16:47.854: g_file_get_contents: assertion ‘filename != NULL’ failed
OK: Greenbone Security Assistant is present in version Deamon 24.16.0~git.
Step 7: Checking if GVM services are up and running …
OK: gvmd service is active.
OK: gsad service is active.

Is this just a warning that can be ignored or is there a way to fix this? Thaks for any help/information

@kapa

Eero

yes, the system is Kali fully update.

Here is the output:

gvm-check-setup

gvm-check-setup 25.04.0
This script is provided and maintained by Debian and Kali.
Test completeness and readiness of GVM-25.04.0
Step 1: Checking OpenVAS (Scanner)…
OK: OpenVAS Scanner is present in version 23.41.6.
OK: Notus Scanner is present in version 22.7.2.
OK: Server CA Certificate is present as /var/lib/gvm/CA/servercert.pem.
Checking permissions of /var/lib/openvas/gnupg/*
OK: _gvm owns all files in /var/lib/openvas/gnupg
OK: redis-server is present.
OK: scanner (db_address setting) is configured properly using the redis-server socket: /var/run/redis-openvas/redis-server.sock
OK: the mqtt_server_uri is defined in /etc/openvas/openvas.conf
OK: _gvm owns all files in /var/lib/openvas/plugins
OK: NVT collection in /var/lib/openvas/plugins contains 95083 NVTs.
OK: The notus directory /var/lib/notus/products contains 512 NVTs.
Checking that the obsolete redis database has been removed
OK: No old Redis DB
OK: ospd-openvas service is active.
OK: ospd-OpenVAS is present in version 22.10.0.
Step 2: Checking GVMD Manager …
OK: GVM Manager (gvmd) is present in version 26.19.0.
Step 3: Checking Certificates …
OK: GVM client certificate is valid and present as /var/lib/gvm/CA/clientcert.pem.
OK: Your GVM certificate infrastructure passed validation.
Step 4: Checking data …
OK: SCAP data found in /var/lib/gvm/scap-data.
OK: CERT data found in /var/lib/gvm/cert-data.
Step 5: Checking Postgresql DB and user …
OK: Postgresql version and default port are OK.
gvmd | _gvm | UTF8 | libc | en_US.UTF-8 | en_US.UTF-8 | | |
16390|pg-gvm|10|2200|f|22.6||
OK: At least one user exists.
Step 6: Checking Greenbone Security Assistant (GSA) …

(gsad:325382): GLib-CRITICAL **: 09:26:58.735: g_file_get_contents: assertion ‘filename != NULL’ failed
OK: Greenbone Security Assistant is present in version Deamon 24.16.0~git.
Step 7: Checking if GVM services are up and running …
OK: gvmd service is active.
OK: gsad service is active.
Step 8: Checking few other requirements…
OK: nmap is present.
OK: ssh-keygen found, LSC credential generation for GNU/Linux targets is likely to work.
OK: nsis found, LSC credential package generation for Microsoft Windows targets is likely to work.
OK: xsltproc found.
WARNING: Your password policy is empty.
SUGGEST: Edit the /etc/gvm/pwpolicy.conf file to set a password policy.
Step 9: Checking greenbone-security-assistant…
OK: greenbone-security-assistant is installed

It seems like your GVM-25.04.0 installation is OK.

that is not bash -x output..

Eero

sorry, you’re right.

this is the output:

  • LOG=/tmp/gvm-check-setup.log
  • CHECKVERSION=25.04.0
  • echo ‘gvm-check-setup 25.04.0’
    gvm-check-setup 25.04.0
  • echo ’ This script is provided and maintained by Debian and Kali.’
    This script is provided and maintained by Debian and Kali.
  • echo ’ Test completeness and readiness of GVM-25.04.0’
    Test completeness and readiness of GVM-25.04.0
  • [[ 0 -ne 0 ]]
  • cd /
  • echo ‘gvm-check-setup 25.04.0’
    ++ date -R
  • echo ’ Date: ’ Thu, 09 Apr 2026 09:47:52 +0200
  • echo ‘’
  • echo 'Step 1: Checking OpenVAS (Scanner)… ’
    Step 1: Checking OpenVAS (Scanner)…
  • echo ‘Checking presence of OpenVAS Scanner …’
  • openvas --version
  • ‘[’ 0 -ne 0 ‘]’
  • echo ‘’
  • echo ‘Checking OpenVAS Scanner version …’
    ++ openvas --version
    ++ head -1
    ++ sed -e ‘s/OpenVAS //’
  • VERSION=23.41.6
  • log_and_print ‘OK: OpenVAS Scanner is present in version 23.41.6.’
  • echo ’ ’ OK: OpenVAS Scanner is present in version 23.41.6.
    OK: OpenVAS Scanner is present in version 23.41.6.
  • echo ’ ’ OK: OpenVAS Scanner is present in version 23.41.6.
  • echo ‘Checking Notus Scanner version …’
    ++ notus-scanner --version
    ++ head -1
    ++ sed -e ‘s/notus-scanner //’
  • VERSION=22.7.2
  • log_and_print ‘OK: Notus Scanner is present in version 22.7.2.’
  • echo ’ ’ OK: Notus Scanner is present in version 22.7.2.
    OK: Notus Scanner is present in version 22.7.2.
  • echo ’ ’ OK: Notus Scanner is present in version 22.7.2.
  • echo ‘Checking Server Cert file …’
  • CAFILE=/var/lib/gvm/CA/servercert.pem
  • ‘[’ ‘!’ -e /var/lib/gvm/CA/servercert.pem ‘]’
  • echo ‘’
  • log_and_print ‘OK: Server CA Certificate is present as /var/lib/gvm/CA/servercert.pem.’
  • echo ’ ’ OK: Server CA Certificate is present as /var/lib/gvm/CA/servercert.pem.
    OK: Server CA Certificate is present as /var/lib/gvm/CA/servercert.pem.
  • echo ’ ’ OK: Server CA Certificate is present as /var/lib/gvm/CA/servercert.pem.
  • echo 'Checking permissions of /var/lib/openvas/gnupg/
    Checking permissions of /var/lib/openvas/gnupg/
  • ‘[’ -e /var/lib/openvas/gnupg ‘]’
    ++ find /var/lib/openvas/gnupg ‘!’ -user _gvm
  • wrong_files=
  • ‘[’ ‘’ ‘!=’ ‘’ ‘]’
  • log_and_print ‘OK: _gvm owns all files in /var/lib/openvas/gnupg’
  • echo ’ ’ OK: _gvm owns all files in /var/lib/openvas/gnupg
    OK: _gvm owns all files in /var/lib/openvas/gnupg
  • echo ’ ’ OK: _gvm owns all files in /var/lib/openvas/gnupg
  • echo ‘Checking presence of redis …’
    ++ redis-server --version
  • BINARY=‘Redis server v=8.0.5 sha=00000000:0 malloc=jemalloc-5.3.0 bits=64 build=9729964261b8fc0f’
  • ‘[’ 0 -ne 0 ‘]’
  • log_and_print ‘OK: redis-server is present.’
  • echo ’ ’ OK: redis-server is present.
    OK: redis-server is present.
  • echo ’ ’ OK: redis-server is present.
  • HAVE_REDIS=1
  • echo ‘’
  • ‘[’ 1 -eq 1 ‘]’
  • echo ‘Checking if redis-server is configured properly …’
    ++ grep db_address /etc/openvas/openvas.conf
    ++ sed -e ‘s/^db_address = //’
  • REDISSOCKET=/var/run/redis-openvas/redis-server.sock
  • ‘[’ -z /var/run/redis-openvas/redis-server.sock ‘]’
  • log_and_print ‘OK: scanner (db_address setting) is configured properly using the redis-server socket: /var/run/redis-openvas
    /redis-server.sock’
  • echo ’ ’ OK: scanner ‘(db_address’ ‘setting)’ is configured properly using the redis-server socket: /var/run/redis-ope
    nvas/redis-server.sock
    OK: scanner (db_address setting) is configured properly using the redis-server socket: /var/run/redis-openvas/redis-se
    rver.sock
  • echo ’ ’ OK: scanner ‘(db_address’ ‘setting)’ is configured properly using the redis-server socket: /var/run/redis-ope
    nvas/redis-server.sock
  • echo ‘’
  • echo ‘Checking openvas configuration for MQTT …’
    ++ grep mqtt_server_uri /etc/openvas/openvas.conf
  • MQTTCONFIG=‘mqtt_server_uri = localhost:1883’
  • ‘[’ -z ‘mqtt_server_uri = localhost:1883’ ‘]’
  • log_and_print ‘OK: the mqtt_server_uri is defined in /etc/openvas/openvas.conf’
  • echo ’ ’ OK: the mqtt_server_uri is defined in /etc/openvas/openvas.conf
    OK: the mqtt_server_uri is defined in /etc/openvas/openvas.conf
  • echo ’ ’ OK: the mqtt_server_uri is defined in /etc/openvas/openvas.conf
  • echo ‘Checking NVT collection …’
  • PLUGINSFOLDER=/var/lib/openvas/plugins
  • NOTUSFOLDER=/var/lib/notus/products
  • ‘[’ ‘!’ -d /var/lib/openvas/plugins ‘]’
  • ‘[’ ‘!’ -d /var/lib/notus/products ‘]’
  • ‘[’ -e /var/lib/openvas/plugins ‘]’
    ++ find /var/lib/openvas/plugins ‘!’ -user _gvm
  • wrong_files=
  • ‘[’ ‘’ ‘!=’ ‘’ ‘]’
  • log_and_print ‘OK: _gvm owns all files in /var/lib/openvas/plugins’
  • echo ’ ’ OK: _gvm owns all files in /var/lib/openvas/plugins
    OK: _gvm owns all files in /var/lib/openvas/plugins
  • echo ’ ’ OK: _gvm owns all files in /var/lib/openvas/plugins
    ++ find /var/lib/openvas/plugins -name ‘*nasl’
    ++ wc -l
  • NVTCOUNT=95083
  • ‘[’ 95083 -lt 10 ‘]’
  • echo ‘’
  • log_and_print ‘OK: NVT collection in /var/lib/openvas/plugins contains 95083 NVTs.’
  • echo ’ ’ OK: NVT collection in /var/lib/openvas/plugins contains 95083 NVTs.
    OK: NVT collection in /var/lib/openvas/plugins contains 95083 NVTs.
  • echo ’ ’ OK: NVT collection in /var/lib/openvas/plugins contains 95083 NVTs.
    ++ find /var/lib/notus/products -name ‘*notus’
    ++ wc -l
  • NOTUSCOUNT=512
  • ‘[’ 512 -lt 10 ‘]’
  • echo ‘’
  • log_and_print ‘OK: The notus directory /var/lib/notus/products contains 512 NVTs.’
  • echo ’ ’ OK: The notus directory /var/lib/notus/products contains 512 NVTs.
    OK: The notus directory /var/lib/notus/products contains 512 NVTs.
  • echo ’ ’ OK: The notus directory /var/lib/notus/products contains 512 NVTs.
  • echo ‘Checking that the obsolete redis database has been removed’
    Checking that the obsolete redis database has been removed
  • runuser -u _gvm – redis-cli -s /var/run/redis-openvas/redis-server.sock --scan
  • grep -q OpenVAS
  • log_and_print ‘OK: No old Redis DB’
  • echo ’ ’ OK: No old Redis DB
    OK: No old Redis DB
  • echo ’ ’ OK: No old Redis DB
  • echo ‘’
  • echo ‘Checking presence of OSPD-OPENVAS …’
  • systemctl is-active -q ospd-openvas
  • log_and_print ‘OK: ospd-openvas service is active.’
  • echo ’ ’ OK: ospd-openvas service is active.
    OK: ospd-openvas service is active.
  • echo ’ ’ OK: ospd-openvas service is active.
  • runuser -u _gvm – ospd-openvas --version
  • ‘[’ 0 -ne 0 ‘]’
  • echo ‘’
    ++ runuser -u _gvm – ospd-openvas --version
    ++ head -1
    ++ sed -e ‘s/OSP Server for openvas: //’
  • VERSION=22.10.0
  • log_and_print ‘OK: ospd-OpenVAS is present in version 22.10.0.’
  • echo ’ ’ OK: ospd-OpenVAS is present in version 22.10.0.
    OK: ospd-OpenVAS is present in version 22.10.0.
  • echo ’ ’ OK: ospd-OpenVAS is present in version 22.10.0.
  • echo 'Step 2: Checking GVMD Manager … ’
    Step 2: Checking GVMD Manager …
  • echo ‘Checking presence of GVMD …’
  • gvmd --version
  • ‘[’ 0 -ne 0 ‘]’
  • echo ‘’
    ++ gvmd --version
    ++ head -1
    ++ sed -e ‘s/Greenbone Vulnerability Manager //’
  • VERSION=26.19.0
  • log_and_print ‘OK: GVM Manager (gvmd) is present in version 26.19.0.’
  • echo ’ ’ OK: GVM Manager ‘(gvmd)’ is present in version 26.19.0.
    OK: GVM Manager (gvmd) is present in version 26.19.0.
  • echo ’ ’ OK: GVM Manager ‘(gvmd)’ is present in version 26.19.0.
  • echo 'Step 3: Checking Certificates … ’
    Step 3: Checking Certificates …
  • echo ‘Checking GVM Manager client certificate …’
    ++ dirname /var/lib/gvm/CA/servercert.pem
  • CERTDIR=/var/lib/gvm/CA
  • CLIENTCERTFILE=/var/lib/gvm/CA/clientcert.pem
  • ‘[’ ‘!’ -e /var/lib/gvm/CA/clientcert.pem ‘]’
  • openssl verify -CAfile /var/lib/gvm/CA/cacert.pem /var/lib/gvm/CA/clientcert.pem
  • grep -q ‘^error’
  • echo ‘’
  • log_and_print ‘OK: GVM client certificate is valid and present as /var/lib/gvm/CA/clientcert.pem.’
  • echo ’ ’ OK: GVM client certificate is valid and present as /var/lib/gvm/CA/clientcert.pem.
    OK: GVM client certificate is valid and present as /var/lib/gvm/CA/clientcert.pem.
  • echo ’ ’ OK: GVM client certificate is valid and present as /var/lib/gvm/CA/clientcert.pem.
  • echo ‘Verifying certificate infrastructure …’
  • gvm-manage-certs -V
  • ‘[’ 0 -ne 0 ‘]’
  • echo ‘’
  • log_and_print ‘OK: Your GVM certificate infrastructure passed validation.’
  • echo ’ ’ OK: Your GVM certificate infrastructure passed validation.
    OK: Your GVM certificate infrastructure passed validation.
  • echo ’ ’ OK: Your GVM certificate infrastructure passed validation.
  • echo 'Step 4: Checking data … ’
    Step 4: Checking data …
  • echo ‘Checking SCAP data …’
  • STATEDIR=/var/lib/gvm
    ++ find /var/lib/gvm/scap-data -name ‘nvdcve*gz’
    ++ wc -l
  • SCAPCOUNT=28
  • ‘[’ 28 -lt 10 ‘]’
  • echo ‘’
  • log_and_print ‘OK: SCAP data found in /var/lib/gvm/scap-data.’
  • echo ’ ’ OK: SCAP data found in /var/lib/gvm/scap-data.
    OK: SCAP data found in /var/lib/gvm/scap-data.
  • echo ’ ’ OK: SCAP data found in /var/lib/gvm/scap-data.
  • echo ‘Checking CERT data …’
    ++ find /var/lib/gvm/cert-data -name ‘*xml’
    ++ wc -l
  • CERTCOUNT=34
  • ‘[’ 34 -lt 10 ‘]’
  • log_and_print ‘OK: CERT data found in /var/lib/gvm/cert-data.’
  • echo ’ ’ OK: CERT data found in /var/lib/gvm/cert-data.
    OK: CERT data found in /var/lib/gvm/cert-data.
  • echo ’ ’ OK: CERT data found in /var/lib/gvm/cert-data.
  • echo 'Step 5: Checking Postgresql DB and user … ’
    Step 5: Checking Postgresql DB and user …
  • echo ‘Checking postgresql …’
  • systemctl is-active -q postgresql
    ++ pg_lsclusters --no-header
    ++ awk ‘$3 == “5432” { print $1 }’
  • postgres_version=18
    ++ cat /usr/share/gvmd/postgresql-version
  • gvmd_postgres_version=18.3
  • gvmd_postgres_version=18
  • ‘[’ 18 = ‘’ ‘]’
  • ‘[’ 18 -ne 18 ‘]’
  • log_and_print ‘OK: Postgresql version and default port are OK.’
  • echo ’ ’ OK: Postgresql version and default port are OK.
    OK: Postgresql version and default port are OK.
  • echo ’ ’ OK: Postgresql version and default port are OK.
  • echo ‘’
  • echo ‘Checking if database exists …’
  • runuser -u postgres – psql -l
  • grep gvmd
  • grep _gvm
    gvmd | _gvm | UTF8 | libc | en_US.UTF-8 | en_US.UTF-8 | | |
  • echo ‘Checking the PostgreSQL extension pg-gvm’
  • runuser -u _gvm – psql --quiet --tuples-only --no-align -c ‘SELECT * FROM pg_extension’ gvmd
  • grep pg-gvm
    16390|pg-gvm|10|2200|f|22.6||
  • echo ‘Checking Database version …’
  • runuser -u _gvm – gvmd --get-users
  • grep ‘Database is wrong version’
  • echo ‘Checking if users exist …’
    ++ runuser -u _gvm – gvmd --get-users
  • gvmd_users=$‘admin\nnozzoli\ndinfo’
  • ‘[’ -z $‘admin\nnozzoli\ndinfo’ ‘]’
  • log_and_print ‘OK: At least one user exists.’
  • echo ’ ’ OK: At least one user exists.
    OK: At least one user exists.
  • echo ’ ’ OK: At least one user exists.
  • echo ‘’
  • echo 'Step 6: Checking Greenbone Security Assistant (GSA) … ’
    Step 6: Checking Greenbone Security Assistant (GSA) …
  • echo ‘Checking presence of Greenbone Security Assistant …’
  • gsad --version
  • ‘[’ 0 -ne 0 ‘]’
  • echo ‘’
    ++ gsad --version
    ++ head -1
    ++ sed -e ‘s/Greenbone Security Assistant //’

(gsad:327518): GLib-CRITICAL **: 09:47:55.717: g_file_get_contents: assertion ‘filename != NULL’ failed

  • VERSION=‘Deamon 24.16.0~git’

  • log_and_print ‘OK: Greenbone Security Assistant is present in version Deamon 24.16.0~git.’

  • echo ’ ’ OK: Greenbone Security Assistant is present in version Deamon 24.16.0~git.
    OK: Greenbone Security Assistant is present in version Deamon 24.16.0~git.

  • echo ’ ’ OK: Greenbone Security Assistant is present in version Deamon 24.16.0~git.

  • echo 'Step 7: Checking if GVM services are up and running … ’
    Step 7: Checking if GVM services are up and running …

  • echo ‘Checking services …’

  • systemctl is-active -q gvmd

  • log_and_print ‘OK: gvmd service is active.’

  • echo ’ ’ OK: gvmd service is active.
    OK: gvmd service is active.

  • echo ’ ’ OK: gvmd service is active.

  • systemctl is-active -q gsad

  • log_and_print ‘OK: gsad service is active.’

  • echo ’ ’ OK: gsad service is active.
    OK: gsad service is active.

  • echo ’ ’ OK: gsad service is active.

  • echo ‘Step 8: Checking few other requirements…’
    Step 8: Checking few other requirements…

  • echo ‘Checking presence of nmap …’
    ++ type nmap

  • NMAP=‘nmap is /usr/bin/nmap’

  • ‘[’ 0 -ne 0 ‘]’

  • log_and_print ‘OK: nmap is present.’

  • echo ’ ’ OK: nmap is present.
    OK: nmap is present.

  • echo ’ ’ OK: nmap is present.

  • echo ‘’

  • echo ‘Checking presence of ssh-keygen …’
    ++ type ssh-keygen

  • SSHKEYGEN=‘ssh-keygen is /usr/bin/ssh-keygen’

  • ‘[’ 0 -ne 0 ‘]’

  • log_and_print ‘OK: ssh-keygen found, LSC credential generation for GNU/Linux targets is likely to work.’

  • echo ’ ’ OK: ssh-keygen found, LSC credential generation for GNU/Linux targets is likely to work.
    OK: ssh-keygen found, LSC credential generation for GNU/Linux targets is likely to work.

  • echo ’ ’ OK: ssh-keygen found, LSC credential generation for GNU/Linux targets is likely to work.

  • HAVE_SSHKEYGEN=1

  • echo ‘’

  • echo ‘Checking presence of nsis …’
    ++ type makensis

  • NSIS=‘makensis is /usr/bin/makensis’

  • ‘[’ 0 -ne 0 ‘]’

  • log_and_print ‘OK: nsis found, LSC credential package generation for Microsoft Windows targets is likely to work.’

  • echo ’ ’ OK: nsis found, LSC credential package generation for Microsoft Windows targets is likely to work.
    OK: nsis found, LSC credential package generation for Microsoft Windows targets is likely to work.

  • echo ’ ’ OK: nsis found, LSC credential package generation for Microsoft Windows targets is likely to work.

  • HAVE_NSIS=1

  • echo ‘Checking for SELinux …’
    ++ getenforce

  • selinux=

  • ‘[’ 127 -eq 0 ‘]’

  • echo ‘Checking xsltproc presence …’
    ++ type xsltproc

  • XSLTPROC=‘xsltproc is /usr/bin/xsltproc’

  • ‘[’ 0 -ne 0 ‘]’

  • log_and_print ‘OK: xsltproc found.’

  • echo ’ ’ OK: xsltproc found.
    OK: xsltproc found.

  • echo ’ ’ OK: xsltproc found.

  • echo ‘’

  • echo ‘Checking status of password policy …’

  • CONFDIR=/etc/gvm

  • grep -v ‘[1]’ /etc/gvm/pwpolicy.conf

  • grep -v ‘^$’

  • ‘[’ 1 -ne 0 ‘]’

  • log_and_print ‘WARNING: Your password policy is empty.’

  • echo ’ ’ WARNING: Your password policy is empty.
    WARNING: Your password policy is empty.

  • echo ’ ’ WARNING: Your password policy is empty.

  • log_and_print ‘SUGGEST: Edit the /etc/gvm/pwpolicy.conf file to set a password policy.’

  • XSLTPROC=‘xsltproc is /usr/bin/xsltproc’

  • ‘[’ 0 -ne 0 ‘]’

  • log_and_print ‘OK: xsltproc found.’

  • echo ’ ’ OK: xsltproc found.
    OK: xsltproc found.

  • echo ’ ’ OK: xsltproc found.

  • echo ‘’

  • echo ‘Checking status of password policy …’

  • CONFDIR=/etc/gvm

  • grep -v ‘[2]’ /etc/gvm/pwpolicy.conf

  • grep -v ‘^$’

  • ‘[’ 1 -ne 0 ‘]’

  • log_and_print ‘WARNING: Your password policy is empty.’

  • echo ’ ’ WARNING: Your password policy is empty.
    WARNING: Your password policy is empty.

  • echo ’ ’ WARNING: Your password policy is empty.

  • log_and_print ‘SUGGEST: Edit the /etc/gvm/pwpolicy.conf file to set a password policy.’

  • echo ’ ’ SUGGEST: Edit the /etc/gvm/pwpolicy.conf file to set a password policy.
    SUGGEST: Edit the /etc/gvm/pwpolicy.conf file to set a password policy.

  • echo ’ ’ SUGGEST: Edit the /etc/gvm/pwpolicy.conf file to set a password policy.

  • echo ‘’

  • echo ‘Step 9: Checking greenbone-security-assistant…’
    Step 9: Checking greenbone-security-assistant…

  • dpkg-query -W ‘-f${db:Status-Status}’ greenbone-security-assistant

  • grep -q ‘^installed’

  • log_and_print ‘OK: greenbone-security-assistant is installed’

  • echo ’ ’ OK: greenbone-security-assistant is installed
    OK: greenbone-security-assistant is installed

  • echo ’ ’ OK: greenbone-security-assistant is installed

  • echo ‘’

  • echo ‘’

  • echo ‘It seems like your GVM-25.04.0 installation is OK.’
    It seems like your GVM-25.04.0 installation is OK.

  • echo ‘’


  1. # ↩︎

  2. # ↩︎

This is know bug. yes. looks ugly, but.

└─# /usr/sbin/gsad --version

Greenbone Security Assistant Deamon 24.16.0~git

(gsad:33447): GLib-CRITICAL **: 08:37:59.094: g_file_get_contents: assertion ‘filename != NULL’ failed


Eero

ok, thanx for reply & information :slight_smile:

Looks outdated to me, maybe ask the Kali package maintainer to update to a more recent version: