Hilko Bengen <ben...@debian.org> writes off-list:

> I have attached the .diff.gz. Are you able to build binary .deb packages
> or should I provide a .deb?

I've built and tested it. It works.

Note: the errors below from sendto are normal. They're caused by a
firewall rule on my router.

root@cascade:/home/dfranke# ifconfig mon.wlan0
mon.wlan0 Link encap:UNSPEC  HWaddr 
F8-D1-11-19-DD-F6-B0-6E-00-00-00-00-00-00-00-00  
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:7226684 errors:0 dropped:0 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000 
          RX bytes:1048411222 (999.8 MiB)  TX bytes:0 (0.0 B)

root@cascade:/home/dfranke# apt-get purge nmap
Reading package lists... Done
Building dependency tree       
Reading state information... Done
The following packages will be REMOVED:
  nmap*
0 upgraded, 0 newly installed, 1 to remove and 0 not upgraded.
After this operation, 17.4 MB disk space will be freed.
Do you want to continue [Y/n]? 
(Reading database ... 93326 files and directories currently installed.)
Removing nmap ...
Processing triggers for man-db ...
root@cascade:/home/dfranke# dpkg --install nmap_6.00-0.3_amd64.deb
Selecting previously unselected package nmap.
(Reading database ... 92696 files and directories currently installed.)
Unpacking nmap (from nmap_6.00-0.3_amd64.deb) ...
Setting up nmap (6.00-0.3) ...
Processing triggers for man-db ...
root@cascade:/home/dfranke# nmap --version

Nmap version 6.00 ( http://nmap.org )
Platform: x86_64-unknown-linux-gnu
Compiled with: liblua-5.1.5 openssl-1.0.1c libpcre-8.30 libpcap-1.3.0 
nmap-libdnet-1.12 ipv6
Compiled without:
root@cascade:/home/dfranke# nmap scanme.nmap.org

Starting Nmap 6.00 ( http://nmap.org ) at 2012-12-29 18:01 EST
sendto in send_ip_packet_sd: sendto(4, packet, 44, 0, 74.207.244.221, 16) => 
Operation not permitted
Offending packet: TCP 98.110.150.34:42418 > 74.207.244.221:25 S ttl=46 id=39742 
iplen=44  seq=3342432888 win=1024 <mss 1460>
sendto in send_ip_packet_sd: sendto(4, packet, 44, 0, 74.207.244.221, 16) => 
Operation not permitted
Offending packet: TCP 98.110.150.34:42419 > 74.207.244.221:25 S ttl=37 id=980 
iplen=44  seq=3342367353 win=1024 <mss 1460>
sendto in send_ip_packet_sd: sendto(4, packet, 44, 0, 74.207.244.221, 16) => 
Operation not permitted
Offending packet: TCP 98.110.150.34:42420 > 74.207.244.221:25 S ttl=55 id=26664 
iplen=44  seq=3342563962 win=1024 <mss 1460>
Nmap scan report for scanme.nmap.org (74.207.244.221)
Host is up (0.090s latency).
Not shown: 996 closed ports
PORT     STATE    SERVICE
22/tcp   open     ssh
25/tcp   filtered smtp
80/tcp   open     http
9929/tcp open     nping-echo

Nmap done: 1 IP address (1 host up) scanned in 4.36 seconds


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to