Description of problem: "Unfortunately, some sites such as microsoft.com block echo request packets. man nmap:" Ok, not that bad, but try this: "This allows the scanning of networks that donât allow ICMP echo requests (or responses) through their firewall. microsoft.com is an example of such a network, and thus you should always use -P0 or -PS80 when portscanning microsoft.com. " Idiots. Actual results: Software provided as part of Red Hat is telling customers to portscan Microsoft. Sillier folk do this and get kicked off their ISP, or other such results. Expected results: The man page doesn't have any of this crap.
you are right!
Needs fixing, but dropping the security tag
This request was evaluated by Red Hat Product Management for inclusion, but this component is not scheduled to be updated in the current Red Hat Enterprise Linux release. If you would like this request to be reviewed for the next minor release, ask your support representative to set the next rhel-x.y flag to "?".
I'm sorry for not addressing the issue in RHEL-4. As cyrus-imapd is not scheduled for update in RHEL-4.9, I'm closing that bugzilla WONTFIX. If you are still experiencing the issue with RHEL-5, feel free to reopen it against RHEL-5.