DaemonForums  

Go Back   DaemonForums > FreeBSD > FreeBSD Security

FreeBSD Security Securing FreeBSD.

 
 
Thread Tools Display Modes
Prev Previous Post   Next Post Next
  #1   (View Single Post)  
Old 29th January 2009
hamba hamba is offline
Fdisk Soldier
 
Join Date: Apr 2008
Posts: 71
Thanked 5 Times in 4 Posts
Default nmap scans

Hi

I'm getting the following messages from nmap when pf is enabled. Once I disable pf they don't happen
Code:
sendto in send_ip_packet: sendto(7, packet, 44, 0, ip2, 16) => Operation not permitted
Offending packet: TCP ip1:49569 > ip2:16236 S ttl=54 id=43546 iplen=11264  seq=3073165861 win=3072 <mss 1460>
sendto in send_ip_packet: sendto(7, packet, 44, 0, ip2, 16) => Operation not permitted
Offending packet: TCP ip1:49569 > ip2:16235 S ttl=48 id=49636 iplen=11264  seq=3073165861 win=1024 <mss 1460>
sendto in send_ip_packet: sendto(7, packet, 44, 0, ip2, 16) => Operation not permitted
Offending packet: TCP ip1:49569 > ip2:16234 S ttl=57 id=13781 iplen=11264  seq=3073165861 win=2048 <mss 1460>
sendto in send_ip_packet: sendto(7, packet, 44, 0, ip2, 16) => Operation not permitted
Offending packet: TCP ip1:49569 > ip2:16233 S ttl=40 id=32511 iplen=11264  seq=3073165861 win=1024 <mss 1460>
sendto in send_ip_packet: sendto(7, packet, 44, 0, ip2, 16) => Operation not permitted
Offending packet: TCP ip1:49569 > ip2:16232 S ttl=51 id=33388 iplen=11264  seq=3073165861 win=4096 <mss 1460>
sendto in send_ip_packet: sendto(7, packet, 44, 0, ip2, 16) => Operation not permitted
Offending packet: TCP ip1:49569 > ip2:16231 S ttl=55 id=41392 iplen=11264  seq=3073165861 win=4096 <mss 1460>
sendto in send_ip_packet: sendto(7, packet, 44, 0, ip2, 16) => Operation not permitted
Offending packet: TCP ip1:49571 > ip2:16167 S ttl=47 id=35811 iplen=11264  seq=3073296935 win=4096 <mss 1460>
sendto in send_ip_packet: sendto(7, packet, 44, 0, ip2, 16) => Operation not permitted
Offending packet: TCP ip1:49571 > ip2:16166 S ttl=53 id=49936 iplen=11264  seq=3073296935 win=2048 <mss 1460>
sendto in send_ip_packet: sendto(7, packet, 44, 0, ip2, 16) => Operation not permitted
Offending packet: TCP ip1:49571 > ip2:16165 S ttl=51 id=3493 iplen=11264  seq=3073296935 win=4096 <mss 1460>
Omitting future Sendto error messages now that 10 have been shown.  Use -d2 if you really want to see them.
Increasing send delay for ip2 from 0 to 5 due to max_successful_tryno increase to 5
I am allowing everything to go out as you can see from the following rules.
Code:
# pass out all
pass out quick on $ext_if proto tcp all
pass out quick on $ext_if proto udp all
pass out quick on $ext_if proto icmp all
Does any one know how to get this fixed?

Thanks
hamba
Reply With Quote
 

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump

Similar Threads
Thread Thread Starter Forum Replies Last Post
testing pf block all rules with Nmap. bsdnewbie999 OpenBSD General 1 25th March 2009 11:55 AM
How to apply patche for NMAP sniper007 FreeBSD Ports and Packages 3 27th January 2009 04:25 PM
nmap and ftp proxy problem hamba FreeBSD Security 2 22nd January 2009 01:33 PM


All times are GMT. The time now is 09:53 AM.


Powered by vBulletin® Version 3.8.4
Copyright ©2000 - 2014, Jelsoft Enterprises Ltd.
Content copyright © 2007-2010, the authors
Daemon image copyright ©1988, Marshall Kirk McKusick