summaryrefslogtreecommitdiff
path: root/net/nmap
diff options
context:
space:
mode:
authorsalo <salo@pkgsrc.org>2004-07-07 20:54:34 +0000
committersalo <salo@pkgsrc.org>2004-07-07 20:54:34 +0000
commita3a439a12271b56da16f9048576322032199f714 (patch)
treeb2b28c23eed3582baf52dbff2fb8c803d941e243 /net/nmap
parentb279a4d92bc455d4892349ee80bdb3c92e94a672 (diff)
downloadpkgsrc-a3a439a12271b56da16f9048576322032199f714.tar.gz
Updated to version 3.55.
Changes: ======== - Added MAC address printing. If Nmap receives packet from a target machine which is on an Ethernet segment directly connected to the scanning machine, Nmap will print out the target MAC address. Nmap also now contains a database (derived from the official IEEE version) which it uses to determine the vendor name of the target ethernet interface. The Windows version of Nmap does not yet have this capability. If any Windows developer types are interesting in adding it, you just need to implement IPisDirectlyConnected() in tcpip.cc and then please send me the patch. Here are examples from normal and XML output (angle brackets replaced with [] for HTML changelog compatability): MAC Address: 08:00:20:8F:6B:2F (SUN Microsystems) [address addr="00:A0:CC:63:85:4B" vendor="Lite-on Communications" addrtype="mac" /] - Updated the XML DTD to support the newly printed MAC addresses. Thanks to Thorsten Holz (thorsten.holz(a)mmweg.rwth-aachen.de) for sending this patch. - Added a bunch of new and fixed service fingerprints for version detection. These are from Martin Macok (martin.macok(a)underground.cz). - Normalized many of the OS names in nmap-os-fingerprints (fixed capitalization, typos, etc.). Thanks to Royce Williams (royce(a)alaska.net) and Ping Huang (pshuang(a)alum.mit.edu) for sending patches. - Modified the mswine32/nmap_performance.reg Windows registry file to use an older and more compatable version. It also now includes the value "StrictTimeWaitSeqCheck"=dword:00000001 , as suggested by Jim Harrison (jmharr(a)microsoft.com). Without that latter value, the TcpTimedWaitDelay value apparently isn't checked. Windows users should apply the new registry changes by clicking on the .reg file. Or do it manually as described in README-WIN32. This file is also now available in the data directory at http://www.insecure.org/nmap/data/nmap_performance.reg - Applied patch from Gisle Vanem (giva(a)bgnett.no) which allows the Windows version of Nmap to work with WinPCAP 3.1BETA (and probably future releases). The Winpcap folks apparently changed the encoding of adaptor names in this release. - Fixed a ping scanning bug that would cause this error message: "nmap: targets.cc:196: int hostupdate (Target **, Target *, int, int, int, timeout_info *, timeval *, timeval *, pingtune *, tcpqueryinfo *, pingstyle): Assertion `pt->down_this_block > 0' failed." Thanks to Beirne Konarski (beirne(a)neo.rr.com) for reporting the problem. - If a user attempts -PO (the letter O), print an error suggesting that they probably mean -P0 (Zero) to disable ping scanning. - Applied a couple patches (with minor changes) from Oliver Eikemeier (eikemeier(a)fillmore-labs.com) which fix an edge case relating to decoy scanning IP ranges that must be sent through different interfaces, and improves the Nmap response to certain error codes returned by the FreeBSD firewall system. The patches are from http://cvsweb.freebsd.org/ports/security/nmap/files/ . - Many people have reported this error: "checking for type of 6th argument to recvfrom()... configure: error: Cannot find type for 6th argument to recvfrom()". In most cases, the cause was a missing or broken C++ compiler. That should now be detected earlier with a clearer message. - Fixed the FTP bounce scan to better detect filered ports on the target network. - Fixed some minor bugs related to the new MAC address printing feature. - Fixed a problem with UDP-scanning port 0, which was reported by Sebastian Wolfgarten (sebastian(a)wolfgarten.com). - Applied patch from Ruediger Rissmann (RRI(a)zurich.ibm.com), which helps Nmap understand an EACCESS error, which can happen at least during IPv6 scans from certain platforms to some firewalled targets. - Renamed ACK ping scan option from -PT to -PA in the documentation. Nmap has accepted both names for years and will continue to do so. - Removed the notice that Nmap is reading target specifications from a file or stdin when you specify the -iL option. It was sometimes printed to stdout even when you wanted to redirect XML or grepable output there, because it was printed during options processing before output files were handled. This change was suggested by Anders Thulin (ath(a)algonet.se). - Added --source_port as a longer, but hopefully easier to remember, alias for -g. In other words, it tries to use the constant source port number you specify for probes. This can help against poorly configured firewalls that trust source port 20, 53, and the like. - Removed undocumented (and useless) -N option. - Fixed a version detection crash reported in excellent detail by Jedi/Sector One (j(a)pureftpd.org). - Applied patch from Matt Selsky (selsky(a)columbia.edu) which helps Nmap build with OpenSSL. - Modified the configure/build system to fix library ordering problems that prevented Nmap from building on certain platforms. Thanks to Greg A. Woods (woods(a)weird.com) and Saravanan (saravanan_kovai(a)HotPop.com) for the suggestions. - Applied a patch to Makefile.in from Scott Mansfield (thephantom(a)mac.com) which enables the use of a DESTDIR variable to install the whole Nmap directory structure under a different root directory. The configure --prefix option would do the same thing in this case, but DESTDIR is apparently a standard that package maintainers like Scott are used to. An example usage is "make DESTDIR=/tmp/packageroot". - Removed unnecessary banner printing in the non-root connect() ping scan. Thanks to Tom Rune Flo (tom(a)x86.no) for the suggestion and a patch. - Updated the headers at the top of each source file (mostly to advance the copyright year to 2004 and note that Nmap is a registered trademark).
Diffstat (limited to 'net/nmap')
-rw-r--r--net/nmap/Makefile5
-rw-r--r--net/nmap/PLIST3
-rw-r--r--net/nmap/distinfo6
3 files changed, 7 insertions, 7 deletions
diff --git a/net/nmap/Makefile b/net/nmap/Makefile
index d4766538777..6f92f662bc0 100644
--- a/net/nmap/Makefile
+++ b/net/nmap/Makefile
@@ -1,8 +1,7 @@
-# $NetBSD: Makefile,v 1.34 2004/03/26 02:27:48 wiz Exp $
+# $NetBSD: Makefile,v 1.35 2004/07/07 20:54:34 salo Exp $
#
-DISTNAME= nmap-3.50
-PKGREVISION= 1
+DISTNAME= nmap-3.55
CATEGORIES= net security
MASTER_SITES= http://www.insecure.org/nmap/dist/
EXTRACT_SUFX= .tar.bz2
diff --git a/net/nmap/PLIST b/net/nmap/PLIST
index e954aa49c94..d26c0fbc6cc 100644
--- a/net/nmap/PLIST
+++ b/net/nmap/PLIST
@@ -1,6 +1,7 @@
-@comment $NetBSD: PLIST,v 1.3 2003/09/20 14:15:27 salo Exp $
+@comment $NetBSD: PLIST,v 1.4 2004/07/07 20:54:34 salo Exp $
bin/nmap
man/man1/nmap.1
+share/nmap/nmap-mac-prefixes
share/nmap/nmap-os-fingerprints
share/nmap/nmap-protocols
share/nmap/nmap-rpc
diff --git a/net/nmap/distinfo b/net/nmap/distinfo
index 8d0cdf32f77..18dd83f3fd0 100644
--- a/net/nmap/distinfo
+++ b/net/nmap/distinfo
@@ -1,7 +1,7 @@
-$NetBSD: distinfo,v 1.16 2004/01/22 11:20:04 salo Exp $
+$NetBSD: distinfo,v 1.17 2004/07/07 20:54:35 salo Exp $
-SHA1 (nmap-3.50.tar.bz2) = a8b2aed3375f8aad73cf8880c915590153d5e830
-Size (nmap-3.50.tar.bz2) = 1255501 bytes
+SHA1 (nmap-3.55.tar.bz2) = a0208a0c491ffdfda5beddd32255bec81c16eecd
+Size (nmap-3.55.tar.bz2) = 1330164 bytes
SHA1 (patch-aa) = 0ab8ca4b1123ab22720eb594973eb7e9ca07903b
SHA1 (patch-ab) = 31cee0df5dd8d071f421fc8b9d467b34a6275472
SHA1 (patch-ad) = cf858f405358db39fd28f04055e96746b3411261