Description of problem: When nmap is run against localhost, it reports that it cannot determine the fingerprint of an RHEL5 system. Version-Release number of selected component (if applicable): nmap-4.11-1.1 How reproducible: On an RHEL5 system, as root, run nmap -O localhost Actual results: Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2007-07-20 07:37 GMT Interesting ports on localhost.localdomain (127.0.0.1): Not shown: 1679 closed ports PORT STATE SERVICE 25/tcp open smtp No exact OS matches for host (If you know what OS is running on it, see http://www.insecure.org/cgi-bin/nmap-submit.cgi). TCP/IP fingerprint: SInfo(V=4.11%P=i686-redhat-linux-gnu%D=7/20%Tm=46A06641%O=25%C=1) TSeq(Class=RI%gcd=1%SI=18C75C%IPID=Z%TS=1000HZ) TSeq(Class=RI%gcd=1%SI=18C6ED%IPID=Z%TS=1000HZ) T1(Resp=Y%DF=Y%W=8000%ACK=S++%Flags=AS%Ops=MNNTNW) T2(Resp=N) T3(Resp=Y%DF=Y%W=8000%ACK=S++%Flags=AS%Ops=MNNTNW) T4(Resp=Y%DF=Y%W=0%ACK=O%Flags=R%Ops=) T5(Resp=Y%DF=Y%W=0%ACK=S++%Flags=AR%Ops=) T6(Resp=Y%DF=Y%W=0%ACK=O%Flags=R%Ops=) T7(Resp=Y%DF=Y%W=0%ACK=S++%Flags=AR%Ops=) PU(Resp=Y%DF=N%TOS=C0%IPLEN=164%RIPTL=148%RID=E%RIPCK=E%UCK=E%ULEN=134%DAT=E) Uptime 6.683 days (since Fri Jul 13 15:13:54 2007) Nmap finished: 1 IP address (1 host up) scanned in 9.573 seconds Expected results: Something along the lines of "you are running RHEL5". Additional info: I could have submitted the fingerprinting information myself, but you'd need to sync with a new package so I decided to tell you so it could be arranged centrally by RedHat.
This request was evaluated by Red Hat Product Management for inclusion, but this component is not scheduled to be updated in the current Red Hat Enterprise Linux release. This request will be reviewed for a future Red Hat Enterprise Linux release.
status update: I've submitted the fingerprinting information long time ago, but new nmap version gives only general information: Running: Linux 2.6.X OS details: Linux 2.6.9 - 2.6.26
This request was evaluated by Red Hat Product Management for inclusion, but this component is not scheduled to be updated in the current Red Hat Enterprise Linux release. If you would like this request to be reviewed for the next minor release, ask your support representative to set the next rhel-x.y flag to "?".
nmap is not able to recognize RHEL5, because scan results are not unique enough, but it'll be able to tell you that machine uses Linux OS with kernel 2.6.x
This request was evaluated by Red Hat Product Management for inclusion in the current release of Red Hat Enterprise Linux. Because the affected component is not scheduled to be updated in the current release, Red Hat is unfortunately unable to address this request at this time. Red Hat invites you to ask your support representative to propose this request, if appropriate and relevant, in the next release of Red Hat Enterprise Linux.
this will be fixed (improved, see comment #4) with fix for 512042 *** This bug has been marked as a duplicate of bug 512042 ***