Nmap Development mailing list archives

tls-nextprotoneg.nse and duckduckgo.com:443


From: Jacek Wielemborek <d33tah () gmail com>
Date: Sat, 15 Nov 2014 02:22:01 +0100

Hi,

I just tested tls-nextprotoneg.nse on duckduckgo.com and noticed that
their server replies with "handshake failed". Is it a bug in the hello
packet or does duckduckgo.com specifically blacklist packets generated
by this script?

Below is the -d9 log - I modified the script's debug "Server response
was not server_hello." message. By the way, isn't the "Raw packets sent"
message a bit confusing since --script="tls-nextprotoneg" generated much
more than 44 bytes of IP data? Perhaps something along the lines of
"(not including packets generated by connect())" would be appropriate there.

Cheers,
Jacek

$ nmap 176.34.131.233 -p 443 --script="tls-nextprotoneg" -d9 -Pn -n 2>&1


Starting Nmap 6.45 ( http://nmap.org ) at 2014-11-15 02:18 CET
Fetchfile found /usr/bin/../share/nmap/nmap-services
Fetchfile found /usr/bin/../share/nmap/nmap.xsl
The max # of sockets we are using is: 0
--------------- Timing report ---------------
  hostgroups: min 1, max 100000
  rtt-timeouts: init 1000, min 100, max 10000
  max-scan-delay: TCP 1000, UDP 1000, SCTP 1000
  parallelism: min 0, max 0
  max-retries: 10, host-timeout: 0
  min-rate: 0, max-rate: 0
---------------------------------------------
NSE: Using Lua 5.2.
Fetchfile found /usr/bin/../share/nmap/nse_main.lua
Fetchfile found /usr/bin/../share/nmap/nselib/stdnse.lua
Fetchfile found /usr/bin/../share/nmap/nselib/strict.lua
Fetchfile found /usr/bin/../share/nmap/scripts/script.db
NSE: Script Arguments seen from CLI:
NSE: {
}
Fetchfile found /usr/bin/../share/nmap/scripts/tls-nextprotoneg.nse
NSE: Script tls-nextprotoneg.nse was selected by name.
Fetchfile found /usr/bin/../share/nmap/nselib/shortport.lua
Fetchfile found /usr/bin/../share/nmap/nselib/tls.lua
NSE: Loaded 1 scripts for scanning.
NSE: Loaded '/usr/bin/../share/nmap/scripts/tls-nextprotoneg.nse'.
NSE: Script Pre-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Fetchfile found /usr/bin/../share/nmap/nmap-payloads
Initiating SYN Stealth Scan at 02:18
Scanning 176.34.131.233 [1 port]
Packet capture filter (device wlp3s0): dst host 192.168.1.102 and (icmp
or icmp6 or ((tcp or udp or sctp) and (src host 176.34.131.233)))
SENT (0.1134s) TCP [192.168.1.102:55250 > 176.34.131.233:443 S
seq=3043839007 ack=0 off=6 res=0 win=1024 csum=0xC2F1 urp=0 <mss 1460>]
IP [ver=4 ihl=5 tos=0x00 iplen=44 id=36924 foff=0 ttl=48 proto=6
csum=0x0476]
**TIMING STATS** (0.1135s): IP, probes
active/freshportsleft/retry_stack/outstanding/retranwait/onbench,
cwnd/ssthresh/delay, timeout/srtt/rttvar/
   Groupstats (1/1 incomplete): 1/*/*/*/*/* 10.00/75/* 1000000/-1/-1
   176.34.131.233: 1/0/0/1/0/0 10.00/75/0 1000000/-1/-1
Current sending rates: 57.14 packets / s, 2514.00 bytes / s.
Overall sending rates: 57.14 packets / s, 2514.00 bytes / s.
RCVD (0.1651s) TCP [176.34.131.233:443 > 192.168.1.102:55250 SA
seq=3805700402 ack=3043839008 off=6 res=0 win=17922 csum=0x3CD5 urp=0
<mss 1460>] IP [ver=4 ihl=5 tos=0xc8 iplen=44 id=0 flg=D foff=0 ttl=47
proto=6 csum=0x54ea]
Found 176.34.131.233 in incomplete hosts list.
Discovered open port 443/tcp on 176.34.131.233
Timeout vals: srtt: -1 rttvar: -1 to: 1000000 delta 51860 ==> srtt:
51860 rttvar: 51860 to: 259300
Timeout vals: srtt: -1 rttvar: -1 to: 1000000 delta 51860 ==> srtt:
51860 rttvar: 51860 to: 259300
Changing ping technique for 176.34.131.233 to tcp to port 443; flags: S
Moving 176.34.131.233 to completed hosts list with 0 outstanding probes.
Changing global ping host to 176.34.131.233.
Completed SYN Stealth Scan at 02:18, 0.07s elapsed (1 total ports)
Overall sending rates: 14.43 packets / s, 634.80 bytes / s.
pcap stats: 1 packets received by filter, 0 dropped by kernel.
NSE: Script scanning 176.34.131.233.
NSE: Starting runlevel 1 (of 1) scan.
NSE: Starting 'tls-nextprotoneg' (thread: 0x7faf93489b20) against
176.34.131.233:443.
Initiating NSE at 02:18
NSOCK INFO [0.0630s] nsi_new2(): nsi_new (IOD #1)
NSOCK DEBUG [0.1780s] msevent_new(): msevent_new (IOD #1) (EID #8)
NSOCK INFO [0.1780s] nsock_connect_tcp(): TCP connection requested to
176.34.131.233:443 (IOD #1) EID 8
NSOCK DEBUG [0.1780s] nsp_add_event(): NSE #8: Adding event (timeout in
5000ms)
NSOCK DEBUG [0.1790s] nsock_loop(): nsock_loop() started (timeout=50ms).
1 events pending
NSOCK DEBUG FULL [0.1790s] epoll_loop(): wait for events
NSOCK DEBUG FULL [0.2280s] process_iod_events(): Processing events on
IOD 1 (ev=2)
NSOCK DEBUG FULL [0.2280s] process_event(): Processing event 8 (timeout
in 4951ms, done=0)
NSOCK DEBUG FULL [0.2280s] process_event(): NSE #8: Sending event
NSOCK INFO [0.2280s] nsock_trace_handler_callback(): Callback: CONNECT
SUCCESS for EID 8 [176.34.131.233:443]
NSE: TCP 192.168.1.102:60684 > 176.34.131.233:443 | CONNECT
NSOCK DEBUG [0.2280s] msevent_delete(): msevent_delete (IOD #1) (EID #8)
NSE: TCP 192.168.1.102:60684 > 176.34.131.233:443 | 00000000: 16 03 01
00 37 01 00 00 33 03 01 54 66 a9 cc 4e     7   3  Tf  N
00000010: 53 50 45 51 55 56 58 41 46 41 58 51 4a 56 4a 46 SPEQUVXAFAXQJVJF
00000020: 51 55 43 53 45 58 56 4f 57 4b 42 00 00 06 c0 11 QUCSEXVOWKB
00000030: 00 39 00 04 01 00 00 04 33 74 00 00              9      3t

NSOCK DEBUG [0.2280s] msevent_new(): msevent_new (IOD #1) (EID #19)
NSOCK DEBUG [0.2280s] nsock_write(): Write request for 60 bytes to IOD
#1 EID 19 [176.34.131.233:443]:
....7...3..Tf..NSPEQUVXAFAXQJVJFQUCSEXVOWKB......9......3t..
NSOCK DEBUG [0.2280s] nsp_add_event(): NSE #19: Adding event (timeout in
5000ms)
NSOCK DEBUG [0.2280s] nsock_loop(): nsock_loop() started (timeout=50ms).
1 events pending
NSOCK DEBUG FULL [0.2280s] epoll_loop(): wait for events
NSOCK DEBUG FULL [0.2280s] process_iod_events(): Processing events on
IOD 1 (ev=2)
NSOCK DEBUG FULL [0.2280s] process_event(): Processing event 19 (timeout
in 5000ms, done=0)
NSOCK DEBUG FULL [0.2280s] process_event(): NSE #19: Sending event
NSOCK INFO [0.2280s] nsock_trace_handler_callback(): Callback: WRITE
SUCCESS for EID 19 [176.34.131.233:443]
NSE: TCP 192.168.1.102:60684 > 176.34.131.233:443 | SEND
NSOCK DEBUG [0.2280s] msevent_delete(): msevent_delete (IOD #1) (EID #19)
NSOCK DEBUG [0.2280s] msevent_new(): msevent_new (IOD #1) (EID #26)
NSOCK INFO [0.2280s] nsock_readbytes(): Read request for 5 bytes from
IOD #1 [176.34.131.233:443] EID 26
NSOCK DEBUG [0.2280s] nsp_add_event(): NSE #26: Adding event (timeout in
5000ms)
NSOCK DEBUG [0.2280s] nsock_loop(): nsock_loop() started (timeout=50ms).
1 events pending
NSOCK DEBUG FULL [0.2280s] epoll_loop(): wait for events
NSOCK DEBUG [0.2780s] nsock_loop(): nsock_loop() started (timeout=50ms).
1 events pending
NSOCK DEBUG FULL [0.2780s] epoll_loop(): wait for events
NSOCK DEBUG FULL [0.2840s] process_iod_events(): Processing events on
IOD 1 (ev=1)
NSOCK DEBUG FULL [0.2840s] process_event(): Processing event 26 (timeout
in 4944ms, done=0)
NSOCK DEBUG FULL [0.2840s] process_event(): NSE #26: Sending event
NSOCK INFO [0.2840s] nsock_trace_handler_callback(): Callback: READ
SUCCESS for EID 26 [176.34.131.233:443] (7 bytes): ......(
NSE: TCP 192.168.1.102:60684 < 176.34.131.233:443 | 00000000: 15 03 01
00 02 02 28                                  (

NSOCK DEBUG [0.2840s] msevent_delete(): msevent_delete (IOD #1) (EID #26)
NSE: tls-nextprotoneg: Server response was not server_hello.
record.type='alert', record.body[1].type='nil'
NSE: Finished 'tls-nextprotoneg' (thread: 0x7faf93489b20) against
176.34.131.233:443.
NSE: TCP 192.168.1.102:60684 > 176.34.131.233:443 | CLOSE
NSOCK INFO [0.2840s] nsi_delete(): nsi_delete (IOD #1)
NSOCK DEBUG [0.2850s] nsock_loop(): nsock_loop() started (timeout=50ms).
0 events pending
Completed NSE at 02:18, 0.11s elapsed
Nmap scan report for 176.34.131.233
Host is up, received user-set (0.052s latency).
Scanned at 2014-11-15 02:18:04 CET for 0s
PORT    STATE SERVICE REASON
443/tcp open  https   syn-ack
Final times for host: srtt: 51860 rttvar: 51860  to: 259300

NSE: Script Post-scanning.
NSE: Starting runlevel 1 (of 1) scan.
Read from /usr/bin/../share/nmap: nmap-payloads nmap-services.
Nmap done: 1 IP address (1 host up) scanned in 0.29 seconds
           Raw packets sent: 1 (44B) | Rcvd: 1 (44B)

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Sent through the dev mailing list
http://nmap.org/mailman/listinfo/dev
Archived at http://seclists.org/nmap-dev/

Current thread: