mailing list archives
Re: [nmap-svn] r8541 - nmap
From: Kris Katterjohn <katterjohn () gmail com>
Date: Mon, 30 Jun 2008 20:17:37 -0500
-----BEGIN PGP SIGNED MESSAGE-----
Brandon Enright wrote:
I actually tested this quite a bit but never got a chance to post my
results. I scanned ~50k hosts on campus on all 64k ports. I also
scanned all our IPs on a about a dozen ports. I also randomly scanned
200M Internet hosts on a handful of ports before Time Warner threatened
to turn me off.
Wow, thanks for doing so much testing!
* Nmap never crash
* The only errors I triggered were packets with unknown/bad IP options
* I couldn't get any really bad packets back
It seems that most routers won't forward really screwed up IP packets
and since the local router constructs the data-link header most
problems can only show up on the local segment.
I figure someone could setup a local host that deliberately screws up
outgoing frames but overall, I think the patch looks good enough we
don't need to do that kind of testing.
All of this is good news, especially knowing that these checks are probably
just extra precautions. I was also unable to get bad packets back from the
big scans I ran, but I didn't want to rule anything out because I wasn't able
to do anywhere near the amount of testing you could.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
-----END PGP SIGNATURE-----
Sent through the nmap-dev mailing list
Archived at http://SecLists.Org