Nmap Development mailing list archives

Re: nmap errors on *BSDs (noted on NetBSD and MacOSX, so far) (traceroute)


From: Kris Katterjohn <katterjohn () gmail com>
Date: Tue, 23 Mar 2010 12:40:17 -0500

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 03/23/2010 12:30 PM, David Fifield wrote:
On Tue, Mar 23, 2010 at 06:19:34PM +0100, Fredrik Pettai wrote:
Starting Nmap 5.21 ( http://nmap.org ) at 2010-03-23 18:05 CET
Warning: Traceroute does not support idle or connect scan, disabling...
PORTS: Using top 1000 ports found open (TCP:1000, UDP:0, SCTP:0)

The answer here is the line "Warning: Traceroute does not support idle
or connect scan, disabling...". Traceroute needs to be run as root. This
has surprised me more than once too. Maybe we should treat this as a
fatal error, just like when someone asks for -O as a non-root user?


I can't currently think of any objections to this.  Other things bail when
root or IPv6 support is needed but unavailable, so this had might as well too
(especially if something post port scan like OS detection does it as you
mentioned).

David Fifield

Cheers,
Kris Katterjohn

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
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=H3eA
-----END PGP SIGNATURE-----
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: