On Sat, Apr 02, 2011 at 10:55:20PM -0700, Brolin Empey wrote:
As a workaround you can try using the --unprivileged option to use plain
TCP connect scan.
[brolin () brolin-V13]   ~/
$ time nmap -A -PN --unprivileged 5.182.172.xxx
TCP/IP fingerprinting (for OS scan) requires root privileges.
Sorry about that. Try again with --unprivileged, using -sV -sC in place