Date: Thu, 06 Aug 2015 17:53:39 +0000 From: bugzilla-noreply@freebsd.org To: freebsd-ports-bugs@FreeBSD.org Subject: [Bug 202139] security/nmap: make it actually work on 10.0 and up Message-ID: <bug-202139-13@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=202139 Bug ID: 202139 Summary: security/nmap: make it actually work on 10.0 and up Product: Ports & Packages Version: Latest Hardware: Any OS: Any Status: New Severity: Affects Many People Priority: --- Component: Individual Port(s) Assignee: ohauer@FreeBSD.org Reporter: trasz@FreeBSD.org Assignee: ohauer@FreeBSD.org Flags: maintainer-feedback?(ohauer@FreeBSD.org) Created attachment 159626 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=159626&action=edit Diff to put into files/. The attached patch (drop intoto files/) makes Nmap SYN scanning (and perhaps others, other than Connect scan, which already worked) work on FreeBSD 10.0 and up. Without it, attempt to scan ("nmap -Av -sS localhost") would result in: sendto in send_ip_packet_sd: sendto(5, packet, 44, 0, 127.0.0.1, 16) => Invalid argument Offending packet: TCP 127.0.0.1:62353 > 127.0.0.1:995 S ttl=40 id=64012 iplen=11264 seq=1481935911 win=1024 -- You are receiving this mail because: You are the assignee for the bug.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-202139-13>