To fix the problem of none of my port scans working from my internal network I recently statically compiled nmap (port scanner) and put it on my firewall box. However when running it with the -S option to spoof the ip it just threw a bunch of these errors in my face:
sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.0.2, 16) => Operation not permitted
sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.0.2, 16) => Operation not permitted
sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.0.2, 16) => Operation not permitted
Is this because the kernel was compiled with no packet socket? How can I get around this to be able to scan with spoofing since I can't do it from any boxes on my internal network and I obviously can't do it on the firewall if i'm getting these errors?
Is it possible to recompile the astaro kernel yet?
On another topic when is a patch for the vulnerable version of squid astaro is running going to come out on an up2date?
Thanks for the help in advance,
John Scimone
This thread was automatically locked due to age.