mirror of
https://github.com/nmap/nmap.git
synced 2026-01-02 21:09:00 +00:00
rpc.Comm.Connect was trying to bind to 424 reserved ports, which is overkill. Since nsock doesn't do an actual bind(2) call until socket:connect for TCP, that meant up to 424 connect calls, each of which is currently leaking a socket. This commit contains 3 fixes: 1. Add nmap.new_socket calls for non-privileged code path that were moved inside the privileged loop to originally address the leak. 2. Check for TIMEOUT on each of the TCP connect calls and abandon the Connect, avoiding many timeouts. 3. Try 10 random reserved ports (from 1 to 1024) instead of 400+. Should be good odds of finding one unused, even when lots of threads are trying (though empirical results would be helpful). Also, this should reduce load since thread n won't need to fail n-1 bind attempts.
110 KiB
110 KiB