Provided by: gsad_21.4.4-1_amd64 bug


       gsad - Greenbone Security Assistant of the Greenbone Vulnerability Management


       gsad OPTIONS


       Together,  OpenVAS  Scanner  (openvassd(8))  and  Greenbone  Vulnerability  Manager daemon
       (gvmd(8)) provide the core functionality of the Greenbone Vulnerability Management  (GVM),
       with  OpenVAS Scanner handling the actual scan process and Greenbone Vulnerability Manager
       daemon adding various management functionalities to handle and organise scan results.

       The Greenbone Security Assistant Daemon (gsad) is a web application that connects  to  the
       Greenbone  Vulnerability  Manager  to  provide  for  a  full-featured  user  interface for
       vulnerability management.


       -f, --foreground
              Run in foreground.

              Serve HTTP only, without SSL.

              Listen on ADDRESS.

              Manager address.

       -p, --port=PORT
              Listen on port number PORT.

       -m, --mport=PORT
              Use manager port number PORT.

       -r, --rport=PORT
              Redirect HTTP from port number PORT.

              Don't redirect HTTP to HTTPS.

       -k, --ssl-private-key=FILE
              Use FILE as the private key for HTTPS

       -c, --ssl-certificate=FILE
              Use FILE as the certificate for HTTPS

              Do chroot and drop privileges.

              GnuTLS priorities string.

              Diffie-Hellman parameters file for PFS support. Functional only with  Libmicrohttpd
              0.9.35 and higher.

              Listen for HTTP requests on the provided unix socket file.

              Path to Manager unix socket.

       -v, --verbose
              Print progress messages.

       -V, --version
              Print version.

              X-Frame-Options HTTP header. Defaults to "SAMEORIGIN".

              Content-Security-Policy  HTTP  header.  Defaults  to  "default-src  'self' 'unsafe-
              inline'; img-src 'self' blob:; frame-ancestors 'self'"

              Enable HTTP Strict-Tranport-Security header.

              max-age in seconds for HTTP Strict-Tranport-Security header.  Defaults to 31536000.

              Drop privileges to <user>.

              Use string as version in interface.

              Use a secure cookie (implied when using HTTPS).

              Minutes of user idle time before session expires. Defaults to 15 minutes.

              Check if client connection  was  closed  every  <number>  seconds.  0  to  disable.
              Defaults to 1.

              Enable TLS debugging at level.

              Do not use X-Real-IP to determine the client address.

              Sets the maximum number of connections per ip. Use 0 for unlimited.

              Set Cross-Origin Resource Sharing (CORS) allow origin http header.

       -?, --help
              Show help.



       Start gsad with the default port configuration and listen on port 443 for HTTPS requests.


       openvas(8), gvmd(8), ospd-openvas(8)


       The   canonical   places  where  you  will  find  more  information  about  the  Greenbone
       Vulnerability Manager are:

              Community Portal ⟨⟩
              Development Platform ⟨⟩
              Greenbone Website ⟨⟩


       The Greenbone Security Assistant is released under the GNU GPL, version  2,  or,  at  your
       option, any later version.