Nmap Development mailing list archives

Nmap 5.61TEST4, some errors & problems...


From: Fredrik Pettai <pettai () nordu net>
Date: Sun, 15 Jan 2012 01:32:22 +0100

Hi,
I updated the pkgsrc-wip package for NetBSD and then I tried some scans I noticed some errors & problems:

-bash-4.2$ nmap -A <myhost>

Starting Nmap 5.61TEST4 ( http://nmap.org ) at 2012-01-14 23:49 CET
Warning: Servicescan failed to fill cpe_a (subjectlen: 207, devicetypelen: 32). Too long? Match string was line 491: d//
Nmap scan report for ...

[...]

bash-4.2# nmap -A -O myhost

Starting Nmap 5.61TEST4 ( http://nmap.org ) at 2012-01-15 00:48 CET
int route_dst_generic(const sockaddr_storage*, route_nfo*, const char*, const sockaddr_storage*): Failed to obtain 
system routes: sys_route* getsysroutes_dnet(int*, char*, size_t): sysroutes_dnet_find_interfaces() failed

-bash-4.2$ nmap --iflist 

Starting Nmap 5.61TEST4 ( http://nmap.org ) at 2012-01-15 00:49 CET
INTERFACES: NONE FOUND(!)
ROUTES: NONE FOUND(!)


Some info from my NetBSD host:

-bash-4.2$ nmap -V

Nmap version 5.61TEST4 ( http://nmap.org )
Platform: x86_64--netbsd
Compiled with: nmap-liblua-5.1.3 openssl-0.9.9-dev libpcre-8.13 libpcap-1.1.1 nmap-libdnet-1.12 ipv6
Compiled without:

-bash-4.2$ ifconfig -a
bge0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500
        capabilities=3f00<IP4CSUM_Rx,IP4CSUM_Tx,TCP4CSUM_Rx,TCP4CSUM_Tx,UDP4CSUM_Rx,UDP4CSUM_Tx>
        enabled=0
        address: 00:11:85:c2:f0:c5
        media: Ethernet autoselect (1000baseT full-duplex)
        status: active
        inet 192.168.0.10 netmask 0xffffff00 broadcast 193.168.0.255
        inet alias 192.168.0.20 netmask 0xffffffff broadcast 192.168.0.255
        inet6 fe80::211:85ff:fec2:f0c5%bge0 prefixlen 64 scopeid 0x1
        inet6 2001:6b0:4::10 prefixlen 64
        inet6 2001:6b0:4::20 prefixlen 128
lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 33648
        inet 127.0.0.1 netmask 0xff000000
        inet6 ::1 prefixlen 128
        inet6 fe80::1%lo0 prefixlen 64 scopeid 0x3

-bash-4.2$ netstat -rn -finet
Routing tables

Internet:
Destination        Gateway            Flags    Refs      Use    Mtu  Interface
default            192.168.0.1         UGS         5  4937451      -  bge0
127/8              127.0.0.1          UGRS        0        0  33648  lo0
127.0.0.1          127.0.0.1          UH          3   555411  33648  lo0
192.168.0.1         00:14:f6:cf:d7:af  UHLc        1        0      -  bge0
192.168.0.10        00:11:85:c2:f0:c5  UHLc        0       25      -  lo0
192.168.0.20        00:11:85:c2:f0:c5  UHLc        0     2028      -  lo0 =>
192.168.0.20/32     link#1             UC          1        0      -  bge0

-bash-4.2$ netstat -rn -finet6
Routing tables

Internet6:
Destination                        Gateway                        Flags    Refs      Use    Mtu  Interface
::/104                             ::1                            UGRS        0    21177      -  lo0 =>
::/96                              ::1                            UGRS        0        0      -  lo0 =>
default                            2001:6b0:4::1                  UGS         2   338939      -  bge0
::1                                ::1                            UH         15  1189924  33648  lo0
::127.0.0.0/104                    ::1                            UGRS        0        0      -  lo0
::224.0.0.0/100                    ::1                            UGRS        0        0      -  lo0
::255.0.0.0/104                    ::1                            UGRS        0        0      -  lo0
::ffff:0.0.0.0/96                  ::1                            UGRS        0        0      -  lo0
2001:6b0:4::/64                    link#1             UC          3        0      -  bge0
2001:6b0:4::1                      00:14:f6:cf:d7:af  UHLc        1    24492      -  bge0
2001:6b0:4::10                     00:11:85:c2:f0:c5  UHL         1        0      -  lo0
2001:6b0:4::20                     00:11:85:c2:f0:c5  UHL         0      340      -  lo0
2001:db8::/32                      ::1                            UGRS        0        0      -  lo0
2002::/24                          ::1                            UGRS        0        0      -  lo0
2002:7f00::/24                     ::1                            UGRS        0        0      -  lo0
2002:e000::/20                     ::1                            UGRS        0        0      -  lo0
2002:ff00::/24                     ::1                            UGRS        0        0      -  lo0
fe80::/10                          ::1                            UGRS        0        0      -  lo0
fe80::%bge0/64                     link#1             UC          1        0      -  bge0
fe80::211:85ff:fec2:f0c5%bge0      00:11:85:c2:f0:c5  UHL         0        0      -  lo0
fe80::214:f6ff:fecf:d7af%bge0      00:14:f6:cf:d7:af  UHLc        0     5628      -  bge0
fe80::%lo0/64                      fe80::1%lo0                    U           0        0      -  lo0
fe80::1%lo0                        link#3             UHL         0        0      -  lo0
ff01:1::/32                        link#1             UC          0        0      -  bge0
ff01:3::/32                        ::1                            UC          0        0      -  lo0
ff02::%bge0/32                     link#1             UC          0        0      -  bge0
ff02::%lo0/32                      ::1                            UC          0        0      -  lo0


Is there any more useful info I can supply?

Re,
/P 

Btw. a saw a small IPv6 related issue during this as well...

-bash-4.2$ nmap -A6 <myhost>

Starting Nmap 5.61TEST4 ( http://nmap.org ) at 2012-01-15 00:42 CET

[...]

PORT   STATE SERVICE VERSION
21/tcp open  ftp     Pure-FTPd
| ftp-anon: Anonymous FTP login allowed (FTP code 230)
|_Can't get directory listing: Can't parse PASV response: "You cannot use PASV on IPv6 connections. Use EPSV instead."


_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: