Nmap Development mailing list archives
Nmap 6 bug: get_srcaddr
From: Martin Clausen <MCL () danskebank dk>
Date: Wed, 23 May 2012 10:35:57 +0200
Hi So I just upgraded to Nmap 6. While testing I ran into this little problem: C:\Temp\server-lans>nmap -T3 -sn 10.80.0.0/16 -dd -vv Starting Nmap 6.00 ( http://nmap.org ) at 2012-05-23 10:30 Romance Daylight Time Winpcap present, dynamic linked to: WinPcap version 4.1.2 (packet.dll version 4.1.0.2001), based on libpcap version 1.0 branch 1_0_rel0b (20091008) NPF service is already running. Fetchfile found C:\Program Files\Nmap/nmap.xsl The max # of sockets we are using is: 0 --------------- Timing report --------------- hostgroups: min 1, max 100000 rtt-timeouts: init 1000, min 100, max 10000 max-scan-delay: TCP 1000, UDP 1000, SCTP 1000 parallelism: min 0, max 0 max-retries: 10, host-timeout: 0 min-rate: 0, max-rate: 0 --------------------------------------------- get_srcaddr: can't connect socket: The requested address is not valid in its context. nexthost: failed to determine route to 10.80.0.0 QUITTING! However, there is connectivity to 10.80.0.0/16, e.g.: C:\Temp\server-lans>ping 10.80.0.21 Pinging 10.80.0.21 with 32 bytes of data: Reply from 10.80.0.21: bytes=32 time=23ms TTL=124 Ping statistics for 10.80.0.21: Packets: Sent = 1, Received = 1, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 23ms, Maximum = 23ms, Average = 23ms Control-C ^C C:\Temp\server-lans>nmap 10.80.0.21 Starting Nmap 6.00 ( http://nmap.org ) at 2012-05-23 10:30 Romance Daylight Time Nmap scan report for xxx.yyy.net (10.80.0.21) Host is up (0.035s latency). Not shown: 989 closed ports PORT STATE SERVICE 21/tcp open ftp 80/tcp open http 135/tcp open msrpc 139/tcp open netbios-ssn 445/tcp open microsoft-ds 1025/tcp open NFS-or-IIS 2301/tcp open compaqdiag 2381/tcp open compaq-https 3389/tcp open ms-wbt-server 9594/tcp open msgsys 49400/tcp open compaqdiag Nmap done: 1 IP address (1 host up) scanned in 1.19 seconds Best, Martin <BR><FONT SIZE=1 FACE="Arial">_______________<BR> Danske Bank A/S CVR-nr. 61126228 – København<BR> _______________<BR> Denne mail kan indeholde fortrolig information. Har du modtaget mailen ved en fejl, beder vi dig derfor informere afsender om fejlen – og efterfølgende slette mailen i dit system uden at videresende eller kopiere den. Selv om mailen og vedhæftede bilag efter vores overbevisning er fri for virus og andre fejl, som kan påvirke computeren eller it-systemet, hvor den modtages og læses, åbnes den på modtagerens eget ansvar. Vi påtager os ikke noget ansvar for tab og skade, som er opstået i forbindelse med at modtage og bruge mailen. <BR> _______________<BR> Please note that this message may contain confidential information. If you have received this message by mistake, please inform the sender of the mistake, then delete the message from your system without making, distributing or retaining any copies of it. Although we believe that the message and any attachments are free from viruses and other errors that might affect the computer or IT system where it is received and read, the recipient opens the message at his or her own risk. We assume no responsibility for any loss or damage arising from the receipt or use of this message.<BR> </FONT> _______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://seclists.org/nmap-dev/
Current thread:
- Nmap 6 bug: get_srcaddr Martin Clausen (May 26)
- Re: Nmap 6 bug: get_srcaddr Mario Vigliar (May 27)
- Re: Nmap 6 bug: get_srcaddr David Fifield (May 29)
- Re: Nmap 6 bug: get_srcaddr Mike Rodriguez (Jun 02)
- Re: Nmap 6 bug: get_srcaddr David Fifield (Jun 07)
- Re: Nmap 6 bug: get_srcaddr Mike Rodriguez (Jun 02)