Bug#535441: nmap fails on large range scan

Lukas Schwaighofer lukas at schwaighofer.name
Mon Sep 11 18:18:49 UTC 2017


Control: tags -1 + moreinfo

Hi Miguel,

sorry for reviving the old bug report
    https://bugs.debian.org/535441
you filed a few years ago, I'm doing a bit of housekeeping.

Do you still have the same setup and does the problem still persist?
If that's the case, I will need your help in determining the cause of
the problem.  Can you capture the traffic of your nmap scan using
tcpdump. The command should be something like (as root):

    tcpdump -npi YOUR_INTERFACE_NAME -w nmap-scan.pcap \
        'tcp and (port 515 or port 631 or port 9100)'

You need to start this tcpdump command before you start the nmap scan
and terminate it (using CTRL+C) after nmap has finished.  Afterwards
please compress the output using `xz nmap-scan.pcap` and send me the
resulting nmap-scan.pcap.xz file.

This file will contain all network traffic from and to your machine
that involves one of the listed port and the TCP protocol.  So it may
also contain something that is not related to the scan (which could be
sensitive information).  Thus I would recommend only sending the file
to me directly and not to the bug report so this file does not get
published.

Regards
Lukas



More information about the Pkg-security-team mailing list