Nmap Development mailing list archives

Re: tls-ticketbleed script fails scanning all ports


From: Daniel Miller <bonsaiviking () gmail com>
Date: Wed, 28 Jun 2017 18:54:13 -0500

Frank,

tls-ticketbleed requires root privileges in order to run. The portrule
of the script checks for this and safely quits if you don't have
sufficient privileges, but using "+" bypasses the portrule. In this
case, it falls to pcap_open to fail, because without root privileges,
host.interface is empty (only root can route over specific
interfaces).

Dan

On Wed, Jun 28, 2017 at 4:22 AM, Frank Büttner
<frank.buettner () mdc-berlin de> wrote:
Hello,
using the tls-ticketbleed in the all port mode of nmap the script fails.

running nmap  --script tls-ticketbleed -Pn -p 443 host
will run fine.
But call nmap  -d --script +tls-ticketbleed -Pn -p 443 host
will result in:
NSE: Starting tls-ticketbleed against host (address).
NSE: tls-ticketbleed against host (address) threw an error!
/usr/bin/../share/nmap/scripts/tls-ticketbleed.nse:118: bad argument #1
to 'pcap_open' (string expected, got nil)
stack traceback:
        [C]: in method 'pcap_open'
        /usr/bin/../share/nmap/scripts/tls-ticketbleed.nse:118: in upvalue
'is_vuln'
        /usr/bin/../share/nmap/scripts/tls-ticketbleed.nse:350: in function
</usr/bin/../share/nmap/scripts/tls-ticketbleed.nse:321>
        (...tail calls...)

OS: CentOS 7.3
Nmap: 7.50

Thanks for any help.
Frank
_______________________________________________
Sent through the dev mailing list
https://nmap.org/mailman/listinfo/dev
Archived at http://seclists.org/nmap-dev/
_______________________________________________
Sent through the dev mailing list
https://nmap.org/mailman/listinfo/dev
Archived at http://seclists.org/nmap-dev/

Current thread: