Hilko Bengen <ben...@debian.org> writes off-list: > I have attached the .diff.gz. Are you able to build binary .deb packages > or should I provide a .deb?
I've built and tested it. It works. Note: the errors below from sendto are normal. They're caused by a firewall rule on my router. root@cascade:/home/dfranke# ifconfig mon.wlan0 mon.wlan0 Link encap:UNSPEC HWaddr F8-D1-11-19-DD-F6-B0-6E-00-00-00-00-00-00-00-00 UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:7226684 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:1048411222 (999.8 MiB) TX bytes:0 (0.0 B) root@cascade:/home/dfranke# apt-get purge nmap Reading package lists... Done Building dependency tree Reading state information... Done The following packages will be REMOVED: nmap* 0 upgraded, 0 newly installed, 1 to remove and 0 not upgraded. After this operation, 17.4 MB disk space will be freed. Do you want to continue [Y/n]? (Reading database ... 93326 files and directories currently installed.) Removing nmap ... Processing triggers for man-db ... root@cascade:/home/dfranke# dpkg --install nmap_6.00-0.3_amd64.deb Selecting previously unselected package nmap. (Reading database ... 92696 files and directories currently installed.) Unpacking nmap (from nmap_6.00-0.3_amd64.deb) ... Setting up nmap (6.00-0.3) ... Processing triggers for man-db ... root@cascade:/home/dfranke# nmap --version Nmap version 6.00 ( http://nmap.org ) Platform: x86_64-unknown-linux-gnu Compiled with: liblua-5.1.5 openssl-1.0.1c libpcre-8.30 libpcap-1.3.0 nmap-libdnet-1.12 ipv6 Compiled without: root@cascade:/home/dfranke# nmap scanme.nmap.org Starting Nmap 6.00 ( http://nmap.org ) at 2012-12-29 18:01 EST sendto in send_ip_packet_sd: sendto(4, packet, 44, 0, 74.207.244.221, 16) => Operation not permitted Offending packet: TCP 98.110.150.34:42418 > 74.207.244.221:25 S ttl=46 id=39742 iplen=44 seq=3342432888 win=1024 <mss 1460> sendto in send_ip_packet_sd: sendto(4, packet, 44, 0, 74.207.244.221, 16) => Operation not permitted Offending packet: TCP 98.110.150.34:42419 > 74.207.244.221:25 S ttl=37 id=980 iplen=44 seq=3342367353 win=1024 <mss 1460> sendto in send_ip_packet_sd: sendto(4, packet, 44, 0, 74.207.244.221, 16) => Operation not permitted Offending packet: TCP 98.110.150.34:42420 > 74.207.244.221:25 S ttl=55 id=26664 iplen=44 seq=3342563962 win=1024 <mss 1460> Nmap scan report for scanme.nmap.org (74.207.244.221) Host is up (0.090s latency). Not shown: 996 closed ports PORT STATE SERVICE 22/tcp open ssh 25/tcp filtered smtp 80/tcp open http 9929/tcp open nping-echo Nmap done: 1 IP address (1 host up) scanned in 4.36 seconds -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org