Home page logo
/

nmap-dev logo Nmap Development mailing list archives

Nmap 6 bug: get_srcaddr
From: Martin Clausen <MCL () danskebank dk>
Date: Wed, 23 May 2012 10:35:57 +0200

Hi

So I just upgraded to Nmap 6. While testing I ran into this little 
problem:

C:\Temp\server-lans>nmap -T3 -sn 10.80.0.0/16 -dd -vv

Starting Nmap 6.00 ( http://nmap.org ) at 2012-05-23 10:30 Romance 
Daylight Time
Winpcap present, dynamic linked to: WinPcap version 4.1.2 (packet.dll 
version 4.1.0.2001), based on libpcap version 1.0 branch 1_0_rel0b 
(20091008)
NPF service is already running.
Fetchfile found C:\Program Files\Nmap/nmap.xsl
The max # of sockets we are using is: 0
--------------- Timing report ---------------
  hostgroups: min 1, max 100000
  rtt-timeouts: init 1000, min 100, max 10000
  max-scan-delay: TCP 1000, UDP 1000, SCTP 1000
  parallelism: min 0, max 0
  max-retries: 10, host-timeout: 0
  min-rate: 0, max-rate: 0
---------------------------------------------
get_srcaddr: can't connect socket: The requested address is not valid in 
its context.
nexthost: failed to determine route to 10.80.0.0
QUITTING!

However, there is connectivity to 10.80.0.0/16, e.g.:

C:\Temp\server-lans>ping 10.80.0.21

Pinging 10.80.0.21 with 32 bytes of data:

Reply from 10.80.0.21: bytes=32 time=23ms TTL=124

Ping statistics for 10.80.0.21:
    Packets: Sent = 1, Received = 1, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
    Minimum = 23ms, Maximum = 23ms, Average = 23ms
Control-C
^C

C:\Temp\server-lans>nmap 10.80.0.21

Starting Nmap 6.00 ( http://nmap.org ) at 2012-05-23 10:30 Romance 
Daylight Time
Nmap scan report for xxx.yyy.net (10.80.0.21)
Host is up (0.035s latency).
Not shown: 989 closed ports
PORT      STATE SERVICE
21/tcp    open  ftp
80/tcp    open  http
135/tcp   open  msrpc
139/tcp   open  netbios-ssn
445/tcp   open  microsoft-ds
1025/tcp  open  NFS-or-IIS
2301/tcp  open  compaqdiag
2381/tcp  open  compaq-https
3389/tcp  open  ms-wbt-server
9594/tcp  open  msgsys
49400/tcp open  compaqdiag

Nmap done: 1 IP address (1 host up) scanned in 1.19 seconds

Best,
Martin


<BR><FONT SIZE=1 FACE="Arial">_______________<BR>
Danske Bank A/S CVR-nr. 61126228 – København<BR>
_______________<BR>
Denne mail kan indeholde fortrolig information. Har du modtaget 
mailen ved en fejl, beder vi dig derfor informere afsender om 
fejlen  – og efterfølgende slette mailen i dit system uden at 
videresende eller kopiere den. Selv om mailen og vedhæftede 
bilag efter vores overbevisning er fri for virus og andre fejl, som 
kan påvirke computeren eller it-systemet, hvor den modtages og 
læses, åbnes den på modtagerens eget ansvar. Vi påtager os 
ikke noget ansvar for tab og skade, som er opstået i forbindelse 
med at modtage og bruge mailen. <BR>
_______________<BR>
Please note that this message may contain confidential 
information. If you have received this message by mistake, 
please inform the sender of the mistake, then delete the 
message from your system without making, distributing or 
retaining any copies of it. Although we believe that the message 
and any attachments are free from viruses and other errors that 
might affect the computer or IT system where it is received and 
read, the recipient opens the message at his or her own risk. We 
assume no responsibility for any loss or damage arising from the 
receipt or use of this message.<BR>

</FONT>
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]