Nmap Development mailing list archives
Re: decoy scan: no decoy packages
From: mgrd <subscriptions () gerdau freeshell org>
Date: Mon, 03 Jan 2005 21:58:38 +0100
Unknown wrote:
On Tue, 2004-12-14 at 01:15 +0100, mgrd wrote:Nils Magnus wrote:Craig Humphrey wrote:[..]Is there anything between your scanning host and the target host? E.g. routers, firewalls, etc, which might filter out invalid/spoofed traffic.Both hosts are directly connected to the internet, using a dsl and a analog modem resp., no routers etc.On both machines the firewall was down (`iptables -F').Could you give some more detailed information about that set-up? Have both systems (target and source) official IP addresses? Are both part of the same DSL provider? A lot DSP and cable modem providers do a lot of nasty filtering of traffic they don't rate as appropriate from a leaf node such as a DSL client.Hmm, hard to say except: - both systems have public/official IP addresses - using different providers (target: dsl ; source: analog-dialup) I think I'll run the same on a local network on the same segment.Have you hardened the TCP/IP stack by any chance against spoofed packets? That could cause an issue.
Again, sorry for the very long delay (disconnected from the Internet) No, the stack isn't harded against spoofed packets. ---------------------------------------------------------------------For help using this (nmap-dev) mailing list, send a blank email to nmap-dev-help () insecure org . List archive: http://seclists.org
Current thread:
- Re: decoy scan: no decoy packages mgrd (Jan 03)
- <Possible follow-ups>
- Re: decoy scan: no decoy packages mgrd (Jan 03)
- Re: decoy scan: no decoy packages Martin Mačok (Jan 03)
- Re: decoy scan: no decoy packages mgrd (Jan 04)