Subject: Re: Nmap Protocol Scanning DoS against OpenBSD IPSEC
To: <>
From: None <itojun@iijlab.net>
List: tech-net
Date: 09/28/2000 22:52:05
------- =_aaaaaaaaaa0
Content-Type: text/plain; charset="us-ascii"
Content-ID: <3696.970149112.1@coconut.itojun.org>
Content-Transfer-Encoding: 7bit
>> Can someone confirm that we are not vulnerable?
> i'll try to run the test, and make whatever fix necessary (if there is).
no problem with almost-generic NetBSD1.5F.
itojun
------- =_aaaaaaaaaa0
Content-Type: text/plain; charset="us-ascii"
Content-ID: <3696.970149112.2@coconut.itojun.org>
Content-Transfer-Encoding: 7bit
# uname -a
NetBSD starfruit.itojun.org 1.5F NetBSD 1.5F (STARFRUIT) #170: Thu Sep 28 21:47:40 JST 2000 itojun@starfruit.itojun.org:/usr/home/itojun/NetBSD/src/sys/arch/i386/compile/STARFRUIT i386
# ./nmap -sO 127.0.0.1
Starting nmap V. 2.54BETA5 ( www.insecure.org/nmap/ )
Interesting protocols on localhost (127.0.0.1):
(The 242 protocols scanned but not shown below are in state: closed)
Protocol State Name
1 open icmp
2 open igmp
4 open ip
6 open tcp
17 open udp
29 open iso-tp4
41 open ipv6
47 open gre
50 open esp
51 open ah
55 open mobile
108 open ipcomp
Nmap run completed -- 1 IP address (1 host up) scanned in 7 seconds
------- =_aaaaaaaaaa0--