Your firewall is blocking the output for the scan iptables OUTPUT -P ACCEPT Will fix that.
-----Original Message----- From: Mark Neidorff [mailto:[EMAIL PROTECTED] Sent: Sunday, June 08, 2003 10:02 AM To: [EMAIL PROTECTED] Subject: Re: Quick BugBear Detection Here's what mine reports: nmap -sT -p 1080 192.168.1.0/24 Starting nmap V. 2.54BETA31 ( www.insecure.org/nmap/ ) sendto in send_ip_raw: sendto(4, packet, 28, 0, 192.168.1.0, 16) => Operation not permitted and this message keeps repeating (once for send_ip_raw and once for send_tcp_raw) all the way up the 192.168.1.* address range. How do I interpret this? Thanks, Mark On Fri, 6 Jun 2003, Gordon Messmer wrote: > Jason Staudenmayer wrote: > > Why would it also see that port open on a Linux box? > > I ran netstat -an |grep 1080 but didn't see anything watching that port. > > Was it reported "open" or "filtered"? The latter will happen if you > have a firewall set to DROP packets on that port. > > > > -- redhat-list mailing list unsubscribe mailto:[EMAIL PROTECTED] https://www.redhat.com/mailman/listinfo/redhat-list -- redhat-list mailing list unsubscribe mailto:[EMAIL PROTECTED] https://www.redhat.com/mailman/listinfo/redhat-list