On Fri, 16 Sep 2005 07:56:25 +0200, Sebastian .Rother wrote: >Hello everybody, > >I just wanna know if the nmap-Issue with the -O option will be fixed on >OpenBSD (some day..). > >Just a little scan against hackin9. > ># nmap -P0 -sV -p22,80,443 -T1 -vvv -O www.hakin9.org >Initiating SYN Stealth Scan against host-ip84-243.crowley.pl >(62.111.243.84) [3 ports] at 07:45 >SYN Stealth Scan Timing: About 50.00% done; ETC: 07:46 (0:00:30 remaining) >Discovered open port 22/tcp on 62.111.243.84 >Discovered open port 80/tcp on 62.111.243.84 >The SYN Stealth Scan took 45.74s to scan 3 total ports. >Initiating service scan against 2 services on host-ip84-243.crowley.pl >(62.111.243.84) at 07:45 >The service scan took 7.25s to scan 2 services on 1 host. >For OSScan assuming port 22 is open, 443 is closed, and neither are >firewalled >sendto in send_ip_packet: sendto(3, packet, 60, 0, 62.111.243.84, 16) => >No route to host >Sleeping 15 seconds then retrying >[and some more Timeouts....*wait wait*...] > >The same scan just without the -O option. > ># nmap -P0 -sV -p22,80,443 -T1 -vvv www.hakin9.org > >Starting nmap 3.81 ( http://www.insecure.org/nmap/ ) at 2005-09-16 07:49 >CEST >Initiating SYN Stealth Scan against host-ip84-243.crowley.pl >(62.111.243.84) [3 ports] at 07:49 >Discovered open port 80/tcp on 62.111.243.84 >SYN Stealth Scan Timing: About 50.00% done; ETC: 07:50 (0:00:30 remaining) >Discovered open port 22/tcp on 62.111.243.84 >The SYN Stealth Scan took 45.23s to scan 3 total ports. >Initiating service scan against 2 services on host-ip84-243.crowley.pl >(62.111.243.84) at 07:50 >The service scan took 5.76s to scan 2 services on 1 host. >Host host-ip84-243.crowley.pl (62.111.243.84) appears to be up ... good. >Interesting ports on host-ip84-243.crowley.pl (62.111.243.84): >PORT STATE SERVICE VERSION >22/tcp open ssh OpenSSH 3.9p1 (protocol 1.99) >80/tcp open http Apache httpd 2.0.52 ((Aurox Linux)) >443/tcp closed https > >Nmap finished: 1 IP address (1 host up) scanned in 51.399 seconds > Raw packets sent: 3 (120B) | Rcvd: 6 (260B) > >I notice this behavior just on OpenBSD and PF dosn't affected my scan. >And as you can see it works absolutly fine without the -O option. >I don't think it's a nmap-related problem but I wasn't able to figure >out what's the problem on OpenBSD exactly. :-/ >I would be happy if somebody (maybe with more experience) could explain >me how and why the -O option leads to "No Route To Host". > >Kind regards, >Sebastian > >p.s. >I used a normal x86 (Duron) with OpenBSD 3.8 (Stable). > >
And here is my result: ====== # nmap -P0 -sV -p22,80,443 -T1 -vvv -O www.hakin9.org Starting nmap 3.81 ( http://www.insecure.org/nmap/ ) at 2005-09-16 17:29 EST Initiating SYN Stealth Scan against host-ip84-243.crowley.pl (62.111.243.84) [3 ports] at 17:29 Discovered open port 80/tcp on 62.111.243.84 SYN Stealth Scan Timing: About 50.00% done; ETC: 17:30 (0:00:30 remaining) Discovered open port 22/tcp on 62.111.243.84 The SYN Stealth Scan took 45.37s to scan 3 total ports. Initiating service scan against 2 services on host-ip84-243.crowley.pl (62.111.243.84) at 17:29 The service scan took 6.40s to scan 2 services on 1 host. For OSScan assuming port 22 is open, 443 is closed, and neither are firewalled Insufficient responses for TCP sequencing (5), OS detection may be less accurate Host host-ip84-243.crowley.pl (62.111.243.84) appears to be up ... good. Interesting ports on host-ip84-243.crowley.pl (62.111.243.84): PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 3.9p1 (protocol 1.99) 80/tcp open http Apache httpd 2.0.52 ((Aurox Linux)) 443/tcp closed https Device type: general purpose Running: Linux 2.4.X OS details: Linux 2.4.19 - 2 Fingerprint: T1(Resp=Y%DF=Y%W=16A0%ACK=S++%Flags=AS%Ops=MNNTNW) T2(Resp=N) T3(Resp=N) T4(Resp=N) T5(Resp=Y%DF=Y%W=0%ACK=S++%Flags=AR%Ops=) T6(Resp=N) T7(Resp=N) PU(Resp=Y%DF=N%TOS=0%IPLEN=164%RIPTL=148%RID=E%RIPCK=E%UCK=F%ULEN=134%DA T=E) Uptime 10.357 days (since Tue Sep 6 09:05:08 2005) TCP Sequence Prediction: Class=unknown class Difficulty=0 (Trivial joke) TCP ISN Seq. Numbers: 7E74D804 7F2BA65A 80EEB6C8 82A844B9 8556A140 IPID Sequence Generation: All zeros Nmap finished: 1 IP address (1 host up) scanned in 626.421 seconds Raw packets sent: 21 (1200B) | Rcvd: 12 (952B) [loki:root] # ====================== Using 3.8beta. I don't know where you got 3.8-stable, AFAIK there is no such animal yet. Whatever you have something other than OpenBSD itself is broken. Unless you broke it? >From the land "down under": Australia. Do we look <umop apisdn> from up over? Do NOT CC me - I am subscribed to the list. Replies to the sender address will fail except from the list-server.

