Your firewall is blocking the output for the scan
iptables OUTPUT -P ACCEPT
Will fix that.

-----Original Message-----
From: Mark Neidorff [mailto:[EMAIL PROTECTED] 
Sent: Sunday, June 08, 2003 10:02 AM
To: [EMAIL PROTECTED]
Subject: Re: Quick BugBear Detection


Here's what mine reports:

nmap -sT -p 1080 192.168.1.0/24

Starting nmap V. 2.54BETA31 ( www.insecure.org/nmap/ )
sendto in send_ip_raw: sendto(4, packet, 28, 0, 192.168.1.0, 16) => 
Operation not permitted

and this message keeps repeating (once for send_ip_raw and once for
send_tcp_raw) all the way up the 192.168.1.* address range.  How do I
interpret this?

Thanks,

Mark

On Fri, 6 Jun 2003, Gordon Messmer wrote:

> Jason Staudenmayer wrote:
> > Why would it also see that port open on a Linux box?
> > I ran netstat -an |grep 1080 but didn't see anything watching that port.
> 
> Was it reported "open" or "filtered"?  The latter will happen if you 
> have a firewall set to DROP packets on that port.
> 
> 
> 
> 


-- 
redhat-list mailing list
unsubscribe mailto:[EMAIL PROTECTED]
https://www.redhat.com/mailman/listinfo/redhat-list


-- 
redhat-list mailing list
unsubscribe mailto:[EMAIL PROTECTED]
https://www.redhat.com/mailman/listinfo/redhat-list

Reply via email to