Now for the scanning of the x86-64 Porteus 5.0 system, done by the (slightly older) nmap run from the i586-P4.0 system:
___________________________________
IP of the x86-64 Port 5.0 is ???.???.???.177 - so, the nmap on i586 will scan the IP of "???.???.???.177"
First I edited the target IP to xxx.xxx.xxx.177 - and then I switched that to *.177 - so when you see*.177 that means the edited target IP of xxx.xxx.xxx.177
I have no idea where this "100.xxx.xxx.12" is from. Is it some IP that my internet provider uses as some kind of internal subnet?
That IP then I shortened to 100.*.12
Code: Select all
root@porteus:/# nmap -v xxx.xxx.xxx.177
Starting Nmap 7.12 ( https://nmap.org ) at 2022-08-30 14:56 CEST
Initiating Ping Scan at 14:56
Scanning xxx.xxx.xxx.177 [4 ports]
sendto in send_ip_packet_sd: sendto(4, packet, 28, 0, xxx.xxx.xxx.177, 16) => Operation not permitted
Offending packet: ICMP [100.xxx.xxx.12 > *.177 Echo request (type=8/code=0) id=5558 seq=0] IP [ttl=39 id=47644 iplen=28 ]
sendto in send_ip_packet_sd: sendto(4, packet, 40, 0, *.177, 16) => Operation not permitted
Offending packet: ICMP [100.*.12 > *.177 Timestamp request (type=13/code=0) id=23007 seq=0 orig=0 recv=0 trans=0] IP [ttl=56 id=63942 iplen=40 ]
sendto in send_ip_packet_sd: sendto(4, packet, 40, 0, *.177, 16) => Operation not permitted
Offending packet: ICMP [100.*.12 > *.177 Timestamp request (type=13/code=0) id=31392 seq=0 orig=0 recv=0 trans=0] IP [ttl=41 id=24793 iplen=40 ]
sendto in send_ip_packet_sd: sendto(4, packet, 28, 0, *.177, 16) => Operation not permitted
Offending packet: ICMP [100.*.12 > *.177 Echo request (type=8/code=0) id=26403 seq=0] IP [ttl=48 id=53298 iplen=28 ]
Completed Ping Scan at 14:56, 3.02s elapsed (1 total hosts)
Nmap scan report for *.177 [host down]
Read data files from: /usr/bin/../share/nmap
Note: Host seems down. If it is really up, but blocking our ping probes, try -Pn
Nmap done: 1 IP address (0 hosts up) scanned in 3.59 seconds
Raw packets sent: 4 (168B) | Rcvd: 0 (0B)
Now, again for the nmap -Pn -v scan:
Code: Select all
root@porteus:/# nmap -Pn -v xxx.xxx.xxx.177
Starting Nmap 7.12 ( https://nmap.org ) at 2022-08-30 14:57 CEST
Initiating Parallel DNS resolution of 1 host. at 14:57
Completed Parallel DNS resolution of 1 host. at 14:57, 0.03s elapsed
Initiating SYN Stealth Scan at 14:57
Scanning ?????????????.kabel-deutschland.de (*.177) [1000 ports]
sendto in send_ip_packet_sd: sendto(4, packet, 44, 0, *.177, 16) => Operation not permitted
Offending packet: TCP 100.*.12:47724 > *.177:8080 S ttl=57 id=21036 iplen=44 seq=3266507848 win=1024 <mss 1460>
sendto in send_ip_packet_sd: sendto(4, packet, 44, 0, *.177, 16) => Operation not permitted
Offending packet: TCP 100.*.12:47724 > 178.*.177:1025 S ttl=39 id=31684 iplen=44 seq=3266507848 win=1024 <mss 1460>
sendto in send_ip_packet_sd: sendto(4, packet, 44, 0, *.177, 16) => Operation not permitted
Offending packet: TCP 100.*.12:47724 > *.177:113 S ttl=38 id=58278 iplen=44 seq=3266507848 win=1024 <mss 1460>
sendto in send_ip_packet_sd: sendto(4, packet, 44, 0, *.177, 16) => Operation not permitted
Offending packet: TCP 100.*.12:47724 > *.177:139 S ttl=53for id=38382 iplen=44 seq=3266507848 win=1024 <mss 1460>
sendto in send_ip_packet_sd: sendto(4, packet, 44, 0, *.177, 16) => Operation not permitted
Offending packet: TCP 100.*.12:47724 > *.177:135 S ttl=50 id=47906 iplen=44 seq=3266507848 win=1024 <mss 1460>
sendto in send_ip_packet_sd: sendto(4, packet, 44, 0, *.177, 16) => Operation not permitted
Offending packet: TCP 100.*.12:47724 > *.177:5900 S ttl=39 id=12812 iplen=44 seq=3266507848 win=1024 <mss 1460>
sendto in send_ip_packet_sd: sendto(4, packet, 44, 0, 178.24.251.177, 16) => Operation not permitted
Offending packet: TCP 100.*.12:47724 > *.177:1720 S ttl=50 id=43636 iplen=44 seq=3266507848 win=1024 <mss 1460>
sendto in send_ip_packet_sd: sendto(4, packet, 44, 0, *.177, 16) => Operation not permitted
Offending packet: TCP 100.*.12:47724 > *.177:995 S ttl=58 id=12321 iplen=44 seq=3266507848 win=1024 <mss 1460>
sendto in send_ip_packet_sd: sendto(4, packet, 44, 0, *.177, 16) => Operation not permitted
Offending packet: TCP 100.*.12:47725 > *.177:995 S ttl=39 id=35846 iplen=44 seq=3266573385 win=1024 <mss 1460>
sendto in send_ip_packet_sd: sendto(4, packet, 44, 0, *.177, 16) => Operation not permitted
Offending packet: TCP 100.*.12:47725 > *.177:1720 S ttl=54 id=62435 iplen=44 seq=3266573385 win=1024 <mss 1460>
Omitting future Sendto error messages now that 10 have been shown. Use -d2 if you really want to see them.
SYN Stealth Scan Timing: About 17.50% done; ETC: 15:00 (for0:02:26 remaining)
SYN Stealth Scan Timing: About 36.15% done; ETC: 15:00 (0:01:50 remaining)
SYN Stealth Scan Timing: About 55.15% done; ETC: 15:00 (0:01:16 remaining)
SYN Stealth Scan Timing: About 74.15% done; ETC: 15:00 (0:00:44 remaining)
Completed SYN Stealth Scan at 15:00, 173.97s elapsed (1000 total ports)
Nmap scan report for ipb218fbb1.dynamic.kabel-deutschland.de (*.177)
Host is up (5.9s latency).
All 1000 scanned ports on ??????????.kabel-deutschland.de (*.177) are filtered
Read data files from: /usr/bin/../share/nmap
Nmap done: 1 IP address (1 host up) scanned in 174.20 seconds
Raw packets sent: 12 (528B) | Rcvd: 12 (672B)
As you can see, there is more visible from my x86-64 Port5.0 system than is visible from my i586-P4.0 one.
Reason might be I had to open two more ports because interlink (my email program, see the posts in x86-64 modules sub-forum) need 587 for SMTP and 993 for SSL IMAP.
This is the output of my firewall info from the x86-64 machine:
Code: Select all
root@porteus:/# /etc/rc.d/rc.FireWall status
Chain INPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot ???.???.???.177opt in out source destination
753 60728 ACCEPT all -- lo any anywhere anywhere
0 0 ACCEPT udp -- any any anywhere anywhere udp dpt:domain
1335 154K ACCEPT udp -- any any anywhere anywhere udp spt:domain
910K 1085M ACCEPT all -- any any anywhere anywhere ctstate RELATED,ESTABLISHED
0 0 ACCEPT tcp -- any any anywhere anywhere tcp spt:ftp-data state ESTABLISHED
0 0 ACCEPT tcp -- any any anywhere anywhere tcp spt:ftp state ESTABLISHED
0 0 ACCEPT tcp -- any any anywhere anywhere tcp spt:ssh state ESTABLISHED
0 0 ACCEPT tcp -- any any anywhere anywhere tcp spt???.???.???.177:smtp state ESTABLISHED
0 0 ACCEPT tcp -- any any anywhere anywhere tcp spt:http state ESTABLISHED
0 0 ACCEPT tcp -- any any anywhere anywhere tcp spt:pop3 state ESTABLISHED
0 0 ACCEPT tcp -- any any anywhere anywhere tcp spt:imap state ESTABLISHED
0 0 ACCEPT tcp -- any any anywhere anywhere tcp spt:https state ESTABLISHED
0 0 ACCEPT tcp -- any any anywhere anywhere tcp spt:submission state ESTABLISHED
0 0 ACCEPT tcp -- any any anywhere anywhere tcp spt:imaps state ESTABLISHED
3 234 LOG_DROP all -- any any anywhere anywhere
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 LOG_DROP all -- any any anywhere anywhere
Chain OUTPUT (policy ACCEPT 5325 packets, 227K bytes)
pkts bytes target prot opt in out source destination
753 60728 ACCEPT all -- any lo anywhere anywhere
1589 105K ACCEPT udp -- any any anywhere anywhere udp dpt:domain
0 0 ACCEPT udp -- any any anywhere anywhere udp spt:domain
1 44 ACCEPT tcp -- any any anywhere anywhere tcp dpt:ftp-data state NEW,ESTABLISHED
66 2904 ACCEPT tcp -- any any anywhere anywhere tcp dpt:ftp state NEW,ESTABLISHED
66 2904 ACCEPT tcp -- any any anywhere anywhere tcp dpt:ssh state NEW,ESTABLISHED
66 2904 ACCEPT tcp -- any any anywhere anywhere tcp dpt:smtp state NEW,ESTABLISHED
4699 278K ACCEPT tcp -- any any anywhere anywhere tcp dpt:http state NEW,ESTABLISHED
66 2904 ACCEPT tcp -- any any anywhere anywhere tcp dpt:pop3 state NEW,ESTABLISHED
66 2904 ACCEPT tcp -- any any anywhere anywhere tcp dpt:imap state NEW,ESTABLISHED
488K 28M ACCEPT tcp -- any any anywhere anywhere tcp dpt:https state NEW,ESTABLISHED
192 20995 ACCEPT tcp -- any any anywhere anywhere tcp dpt:submission state NEW,ESTABLISHED
9736 618K ACCEPT tcp -- any any anywhere anywhere tcp dpt:imaps state NEW,ESTABLISHED
Chain LOG_DROP (2 references)
pkts bytes target prot opt in out source destination
3 234 DROP all -- any any anywhere anywhere