|
|||
nmap scans
Hi
I'm getting the following messages from nmap when pf is enabled. Once I disable pf they don't happen Code:
sendto in send_ip_packet: sendto(7, packet, 44, 0, ip2, 16) => Operation not permitted Offending packet: TCP ip1:49569 > ip2:16236 S ttl=54 id=43546 iplen=11264 seq=3073165861 win=3072 <mss 1460> sendto in send_ip_packet: sendto(7, packet, 44, 0, ip2, 16) => Operation not permitted Offending packet: TCP ip1:49569 > ip2:16235 S ttl=48 id=49636 iplen=11264 seq=3073165861 win=1024 <mss 1460> sendto in send_ip_packet: sendto(7, packet, 44, 0, ip2, 16) => Operation not permitted Offending packet: TCP ip1:49569 > ip2:16234 S ttl=57 id=13781 iplen=11264 seq=3073165861 win=2048 <mss 1460> sendto in send_ip_packet: sendto(7, packet, 44, 0, ip2, 16) => Operation not permitted Offending packet: TCP ip1:49569 > ip2:16233 S ttl=40 id=32511 iplen=11264 seq=3073165861 win=1024 <mss 1460> sendto in send_ip_packet: sendto(7, packet, 44, 0, ip2, 16) => Operation not permitted Offending packet: TCP ip1:49569 > ip2:16232 S ttl=51 id=33388 iplen=11264 seq=3073165861 win=4096 <mss 1460> sendto in send_ip_packet: sendto(7, packet, 44, 0, ip2, 16) => Operation not permitted Offending packet: TCP ip1:49569 > ip2:16231 S ttl=55 id=41392 iplen=11264 seq=3073165861 win=4096 <mss 1460> sendto in send_ip_packet: sendto(7, packet, 44, 0, ip2, 16) => Operation not permitted Offending packet: TCP ip1:49571 > ip2:16167 S ttl=47 id=35811 iplen=11264 seq=3073296935 win=4096 <mss 1460> sendto in send_ip_packet: sendto(7, packet, 44, 0, ip2, 16) => Operation not permitted Offending packet: TCP ip1:49571 > ip2:16166 S ttl=53 id=49936 iplen=11264 seq=3073296935 win=2048 <mss 1460> sendto in send_ip_packet: sendto(7, packet, 44, 0, ip2, 16) => Operation not permitted Offending packet: TCP ip1:49571 > ip2:16165 S ttl=51 id=3493 iplen=11264 seq=3073296935 win=4096 <mss 1460> Omitting future Sendto error messages now that 10 have been shown. Use -d2 if you really want to see them. Increasing send delay for ip2 from 0 to 5 due to max_successful_tryno increase to 5 Code:
# pass out all pass out quick on $ext_if proto tcp all pass out quick on $ext_if proto udp all pass out quick on $ext_if proto icmp all Thanks hamba |
Thread Tools | |
Display Modes | |
|
|
Similar Threads | ||||
Thread | Thread Starter | Forum | Replies | Last Post |
testing pf block all rules with Nmap. | bsdnewbie999 | OpenBSD General | 1 | 25th March 2009 11:55 AM |
How to apply patche for NMAP | sniper007 | FreeBSD Ports and Packages | 3 | 27th January 2009 04:25 PM |
nmap and ftp proxy problem | hamba | FreeBSD Security | 2 | 22nd January 2009 01:33 PM |