Nmap Development mailing list archives
Re: Nmap Issue : "kernel: RPC: fragment too large:"
From: "Dario Ciccarone \(dciccaro\) via dev" <dev () nmap org>
Date: Tue, 16 Mar 2021 20:16:05 +0000
https://serverfault.com/questions/652188/nfs-share-problems-rpc-fragment-too-large-xxxxx - second answer on a Google search for "kernel: RPC: fragment too large:" With the most absolute respect, and from a professional to another: it would certainly help *immensely* if you could provide information such as: * Nmap version and command-line options used * Operating system, patch level on the host being used to run nmap * OS details on the host being scanned (which you should have – you own it) It is very hard otherwise for anyone here to not only even guess what the problem might be, but trying to reproduce – and fix, if it was an issue on nmap. As it seems, it is a benign error on the host, due possibly for the nmap options being used. But if your provide more information, maybe even a pcap *on the host being scanned* for the traffic received from the scanning host, and that time-sync’ed to the log, then maybe the specific packet/combination of packets can be identified – and as I said before, either deemed “normal” or “abnormal – will fix” From: dev <dev-bounces () nmap org> on behalf of "PENISSON, TIMOTHÉ" <TPENISSO () bouyguestelecom fr> Date: Tuesday, March 16, 2021 at 4:04 PM To: "dev () nmap org" <dev () nmap org> Subject: Nmap Issue : "kernel: RPC: fragment too large:" Hello, I use Nmap to scan machines and in the logs of some of them, we see this kind of messages appearing in the logs: "kernel: RPC: fragment too large:". This message appears globally on all servers scanned by Nmap with an NFS mount. Is this behavior known by the Nmap community? Is it linked to a specific conf or script? Is there a workaround to avoid this? Thanks for your help, Sincerely, [Bloc marque] Timothé PENISSON MOE Outils de sécurité Pôle Sécurité Opérationnelle SI métiers Direction infrastructure, production et sécurité bouyguestelecom.fr [cid:image002.png@01D71A7F.AA605E10] ________________________________ L'intégrité de ce message n'étant pas assurée sur internet, la société expéditrice ne peut être tenue responsable de son contenu ni de ses pièces jointes. Toute utilisation ou diffusion non autorisée est interdite. Si vous n'êtes pas destinataire de ce message, merci de le détruire et d'avertir l'expéditeur. The integrity of this message cannot be guaranteed on the Internet. The company that sent this message cannot therefore be held liable for its content nor attachments. Any unauthorized use or dissemination is prohibited. If you are not the intended recipient of this message, then please delete it and notify the sender.
_______________________________________________ Sent through the dev mailing list https://nmap.org/mailman/listinfo/dev Archived at http://seclists.org/nmap-dev/
Current thread:
- Nmap Issue : "kernel: RPC: fragment too large:" PENISSON , TIMOTHÉ (Mar 16)
- Re: Nmap Issue : "kernel: RPC: fragment too large:" Dario Ciccarone (dciccaro) via dev (Mar 16)