My two F23 boxes are only at 4.4.9 and 4.7.9. No problems with your script and nmap on them.
I'll see if I have time to do an update tonight and test with the newest kernel.
-- Wyatt Zacharias
On Thu, Dec 1, 2016 at 2:53 AM, Trevor Cordes trevor@tecnopolis.ca wrote:
No solution yet, but I was able to reproduce the bug with nmap, yay!!!
#nmap -PE 192.168.101.0/24 Starting Nmap 7.12 ( https://nmap.org ) at 2016-12-01 02:50 CST sendto in send_ip_packet_sd: sendto(5, packet, 44, 0, 192.168.101.102,16) => Operation not permitted Offending packet: TCP 192.168.101.1:57520 > 192.168.101.102:21 S ttl=51 id=5430 iplen=44 seq=879361804 win=1024 <mss 1460>
Looks like -sP does more than just ping and it's not fast enough to trigger the bug. -PE is what I need to reproduce the conditions of my script. _______________________________________________ Roundtable mailing list Roundtable@muug.ca https://muug.ca/mailman/listinfo/roundtable