-
Notifications
You must be signed in to change notification settings - Fork 822
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Syn-Ack packets intermittently not received inside wsl distro #12185
Comments
Logs are required for review from WSL teamIf this a feature request, please reply with '/feature'. If this is a question, reply with '/question'. How to collect WSL logsDownload and execute collect-wsl-logs.ps1 in an administrative powershell prompt:
The script will output the path of the log file once done. If this is a networking issue, please use collect-networking-logs.ps1, following the instructions here Once completed please upload the output files to this Github issue. Click here for more info on logging View similar issuesPlease view the issues below to see if they solve your problem, and if the issue describes your problem please consider closing this one and thumbs upping the other issue to help us prioritize it! Open similar issues:
Closed similar issues:
|
Diagnostic information
|
WSL logs |
Diagnostic information
|
Windows Version
Microsoft Windows [Version 10.0.26100.2033]
WSL Version
2.3.24.0
Are you using WSL 1 or WSL 2?
Kernel Version
5.15.153.1
Distro Version
Kali Linux Release: 2024.3
Other Software
Repro Steps
I'm facing a weird behavior while scanning for open ports on both local network or remote hosts.
Test have been made with both Nmap and Masscan (latest versions)
TCP connect scan correctly works showing the open ports while Syn Scan(s) doesn't give consistent results.
Debugging the issue looks like that the WSL distro doesn't receive (randomly) the reply (syn-ack) packets.
Step to reproduce the behavior:
On the (kali) linux wsl2 vm:
Update the system
Install required software
Run the scan
sudo nmap -v -Pn -n -v -dd -p443 -e eth4 --packet-trace 192.168.1.1
or
sudo masscan -v -p443 192.168.1.1
Expected Behavior
Nmap or masscan consistently showing port 443 (in this test) open (syn-ack packet received)
TCPDUMP
Actual Behavior
Trying to scan the target multiple times the result is inconsistent/random, most of the times (~8/10) syn-ack packet aren't received inside the linux vm. Only in rare cases the syn-ack packet reach the vm and so port are listed as "open" instead of filtered.
SYN Stealth Scan (Syn packet scan)
TCPDUMP
TCP Connect Scan
Diagnostic Logs
The text was updated successfully, but these errors were encountered: