Nmap Development mailing list archives

RE: Bug in IP Parsing


From: "Brandon Enright" <bmenrigh () ucsd edu>
Date: Thu, 20 Oct 2005 12:14:29 -0700

  Juan Perez wrote:

There seems to be a bug in the IP parsing mechanism.

Example:

input file: test

test is only two lines:

10.10.0.0/24
10.10.0.80/24

The bug is that the second line is an invalid combination and
therefore should be rejected.Instead, nmap ignores the last
octet(80) and proceeds to parse it as 10.10.0.0/24 .


This is not a bug.  The /24 specifies that only the first 24 bits of
10.10.0.80 are significant.  A simple AND with the bitmask results in
10.10.0.0.

See RFCs 1517, 1518, 1519, and 1520 for more information.


Regards,

Brandon


--
Brandon Enright
UCSD ACS/Network Operations
bmenrigh () ucsd edu



_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev


Current thread: