Home page logo
/

nmap-dev logo Nmap Development mailing list archives

Re: [PATCH] NSE ipv4 checks
From: Henri Doreau <henri.doreau () greenbone net>
Date: Mon, 28 Mar 2011 22:55:33 +0200

2011/3/28 Henri Doreau <henri.doreau () greenbone net>:
2011/3/27 Djalal Harouni <tixxdz () opendz org>:

Speaking about NSE IPv6, there are some scripts which assume that they
are running in the IPv4 mode even if the '-6' option was specified. This
is buggy code.

Scripts that are using protocols which are available _only_ in one mode
IPv4 or IPv6, can call the nmap.address_family() function, check the
returned string 'inet' or 'inet6' and fail silently with a debug
message.

Hello,

Please find attached a patch that add such a check for several IPv4
only scripts. I have only checked and fixed scripts that perform "raw"
packets manipulation.

The patch also contains error messages standardization, replacing
nmap.log_write() with hardcoded script name by the more common
stdnse.print_debug() using the SCRIPT_NAME variable (as noticed in
[1]).
The same scripts and functions are concerned by both modifications.

Regards.


[1] http://seclists.org/nmap-dev/2010/q4/551

With the attachment this time... :-)

Sorry.

-- 
Henri Doreau |  Greenbone Networks GmbH  |  http://www.greenbone.net
Neuer Graben 17, 49074 Osnabrueck, Germany | AG Osnabrueck, HR B 202460
Executive Directors: Lukas Grunwald, Dr. Jan-Oliver Wagner

Attachment: scripts_checkv4.patch
Description:

_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]