Optimal timeout setting for OpenVAS

Hi,

please have a look at the description of the scanner_plugins_timeout setting:

scanner_plugins_timeout : This is the maximum lifetime (in seconds) for all NVTs from the Port scanners family. If a NVT runs longer the plugin is terminated.

This setting doesn’t have any affect on performance / scan speed and will only cause the Port scanner (Default: Nmap (NASL wrapper) (OID: 1.3.6.1.4.1.25623.1.0.14259)) to be terminated without returning any results of open ports as soon as this timeout is reached.

You only see no significant difference within your result because you’re using this scan config:

This scan config has the following two settings set to no:

  • unscanned_closed : This parameter defines if TCP ports that were not scanned should be treated like closed ports.
  • unscanned_closed_udp : This parameter defines if UDP ports that were not scanned should be treated as closed ports.

This basically means that your current scan configuration is (as soon as the Port scanner got terminated) only checking the default ports defined within the existing vulnerability tests (some HTTP ones would e.g. only check for port 80/tcp).

Instead of trying to modify the scanner_plugins_timeout you could re-think the following:

Please read into UDP port scanning on resources like the following:

Basically scanning all 65k UDP ports could takes hours or even a day depending on the network and/or target.

Unfortunately no specific recommendation can be given as those are highly depending on your network and target environment. Personally i’m using the following setting to have a middle ground between scan speed and scan coverage:

Scan-Config: Full and Fast + unscanned_closed_udp set to no
Port-List: All TCP without any UDP ports

2 Likes