Nmap Development mailing list archives

Re: IPv6 Support on Windows


From: Kris Katterjohn <katterjohn () gmail com>
Date: Mon, 19 May 2008 20:28:26 -0500

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

jah wrote:
Hi all.

I've got IPv6 installed on two directly connected XP machines (this
didn't need a download, it is already present and just requires
installing).  My router does not support IPv6, but I guess for directly
connected hosts, the magic happens at layer 2.

I can ping each machine from the other and capture ICMPv6 (Echo request
and reply and Neighbor solicitation and advertisement) traffic with
wireshark.  In order to do this, I have to append the link-local
interface number (so-called Zone ID) [1] to the address like so:

ping fe80::20f:b5ff:fe47:7879*%6*

if I don't append %6 I get "Destination *net* unreachable" from ping.

If I run nmap like so:
nmap -6 -n -PN -sT -d9 -p80 fe80::20f:b5ff:fe47:7879%6

I get a Reason "host-unreach" - as I do if I don't append the %6 to the
nmap command.

I stepped my way through the code and confirmed that I get 10065
WSAEHOSTUNREACH "No route to host".  And I found that the %6 is lost
during Target::GenerateIPString() in Target.cc and this seems to be down
to the code in inet_ntop.c - bit vague, I know.

So, have I missed something or is this something that needs doing to
nbase?  Has anyone else managed to use IPv6 on directly connected targets?


Hey Jah,

Thanks again for spotting this.  The problem is broader than Windows so
I started a separate thread[1] with a patch.  I wanted to make a note
here in case anyone is just following this thread (so if you have any
comments, please reply to [1]).

Regards,

jah


Thanks,
Kris Katterjohn

[1] http://seclists.org/nmap-dev/2008/q2/0362.html

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
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=9OHy
-----END PGP SIGNATURE-----

_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://SecLists.Org


Current thread: