summaryrefslogtreecommitdiff
path: root/net/nmap
AgeCommit message (Collapse)AuthorFilesLines
2011-11-22Bugfix release/patchpettai6-301/+16
o Added checks that the argument to freeaddrinfo is not NULL, avoiding a segmentation fault on Android and possibly other platforms.
2011-11-19Fixes PR pkg/45438pettai2-1/+275
2011-11-01Recursive bump for graphics/freetype2 buildlink addition.sbd1-2/+2
2011-07-08Fix configuring with Clang.adam3-3/+28
2011-06-05Fixes PR pkg/44996pettai3-3/+21
2011-04-22recursive bump from gettext-lib shlib bump.obache1-1/+2
2011-02-25Let's assume for now that everything that worked with python-2.6 alsowiz1-3/+3
works with python-2.7.
2011-02-16Nmap 5.51 [2011-02-11]pettai2-6/+6
o [Ndiff] Added support for prerule and postrule scripts. o [NSE] Fixed a bug which caused some NSE scripts to fail due to the absence of the NSE SCRIPT_NAME environment variable when loaded. o [Zenmap] Selecting one of the scan targets in the left pane is supposed to jump to that host in the Nmap Output in the right pane (but it wasn't). o Fixed an obscure bug in Windows interface matching. If the MAC address of an interface couldn't be retrieved, it might have been used instead of the correct interface. o [NSE] Fixed portrules in dns-zone-transfer and ftp-proftpd-backdoor that used shortport functions incorrectly and always returned true. o [Ndiff] Fixed ndiff.dtd to include two elements that can be diffed: status and address. o [Ndiff] Fixed the ordering of hostscript-related elements in XML output. o [NSE] Fixed a bug in the nrpe-enum script that would make it run for every port (when it was selected--it isn't by default). o [NSE] When an NSE script sets a negative socket timeout, it now causes a controlled Lua stack trace instead of a fatal error. o [Zenmap] Worked around an error that caused the py2app bootstrap executable to be non-universal even when the rest of the application was universal. This prevented the binary .dmg from working on PowerPC. o [Ndiff] Fixed an output line that wasn't being redirected to a file when all other output was.
2011-02-0164-bit Mac OS X needs nmap's internal libpcap: remove patch-aaadam3-19/+3
2011-01-31*** empty log message ***pettai1-3/+1
2011-01-31Nmap 5.50 [2011-01-28]pettai8-110/+102
Some of the highlights are: o [Zenmap] Added a new script selection interface, allowing you to choose scripts and arguments from a list. o [Nping] Added echo mode, learn more about echo mode at http://nmap.org/book/nping-man-echo-mode.html. o [NSE] Added an amazing 46 scripts, bringing the total to 177! You can learn more about any of them at http://nmap.org/nsedoc/ o [NSE] Added 12 new protocol libraries. o [NSE] Added a new brute library that provides a basic framework and logic for brute force password auditing scripts. o [Zenmap] Greatly improved performance for large scans by benchmarking intensively and then recoding dozens of slow parts. o Performed a major OS detection integration run. The database has grown more than 14% to 2,982 fingerprints and many of the existing fingerprints were improved. David posted highlights of his integration work at http://seclists.org/nmap-dev/2010/q4/651 o Performed a huge version detection integration run. The number of signatures has grown by more than 11% to 7,355. David posted highlights at http://seclists.org/nmap-dev/2010/q4/761 o [NSE] Nmap has two new NSE script scanning phases. See http://nmap.org/book/nse-usage.html#nse-script-types o Dramatically improved nmap.xsl (used for converting Nmap XML output to HTML). o Integrated cracked passwords from the Gawker.com compromise (http://seclists.org/nmap-dev/2010/q4/674) into Nmap's top-5000 password database. o Merged port names in the nmap-services file with allocated names from the IANA (http://www.iana.org/assignments/port-numbers). o [Zenmap] Made the topology node radiuses grow logarithmically instead of linearly, so that hosts with thousands of open ports don't overwhelm the diagram. o Improved IPv6 host output in that we now remember and report the forward DNS name (given by the user) and any non-scanned addresses (usually because of round robin DNS). o [Zenmap] Upgraded to the newer gtk.Tooltip API to avoid deprecation messages about gtk.Tooltip. o [NSE] Enhance ssl-cert to also report the type and bit size of SSL certificate public keys. o [Nping] Nping now limits concurrent open file descriptors properly based on the resources available on the host. o Ncat now logs Nsock debug output to stderr instead of stdout for consistency with its other debug messages. o Changed the name of libdnet's sctp_chunkhdr to avoid a conflict with a struct of the same name in <netinet/sctp.h>. o [NSE] Host tables now have a host.traceroute member available when --traceroute is used. o Nmap now prints the MTU for interfaces in --iflist output. o [Ncat,NSE] Server Name Indication (SNI) is now supported by Ncat and Nmap NSE, allowing them to connect to servers which run multiple SSL websites on one IP address. o [Nsock] Added a new function, nsi_set_hostname, to set the intended hostname of the target. o [NSE] Made sslv2.nse give special output when SSLv2 is supported, but no SSLv2 ciphers are offered. o Fixed the fragmentation options (-f in Nmap, --mtu in Nmap & Nping), which were improperly sending whole packets in version 5.35DC1. o [NSE] When receiving raw packets from Pcap, the packet capture time is now available to scripts as an additional return value from pcap_receive(). o Updated IANA IP address space assignment list for random IP (-iR) generation. o [Ncat] Ncat now uses case-insensitive string comparison when checking authentication schemes and parameters. o [NSE] There is now a limit of 1,000 concurrent running scripts, instituted to keep memory under control when there are many open ports. Plus many bugfixes and improvements. For full changelog, see http://nmap.org/changelog.html
2011-01-30use _BSD_SOURCE rather than __USE_BSD. Noted by joerg@markd3-7/+7
2011-01-30define __USE_BSD to get u_char etal to successfully detect libpcap on linuxmarkd3-8/+31
2011-01-13png shlib name changed for png>=1.5.0, so bump PKGREVISIONs.wiz1-2/+2
2010-11-30Add an patch for OpenSSL without MD2 support.obache2-1/+44
PR#43975.
2010-11-15PKGREVISION bumps for changes to gtk2, librsvg, libbonobo and libgnomeabs1-2/+2
2010-09-14More PKGREVISION bumps for pixman update.wiz1-1/+2
2010-07-22Nmap 5.35DC1 [2010-07-16]pettai5-64/+79
Some of the highlights are: o [NSE] Added more scripts, bringing the total to 131! o Performed a major OS detection integration run. o Performed a large version detection integration run. o [Zenmap] Added the ability to print Nmap output to a printer. o [Nmap, Ncat, Nping] The default unit for time specifications is now seconds, not milliseconds, and times may have a decimal point. o Ports are now considered open during a SYN scan if a SYN packet (without the ACK flag) is received in response. o [Ncat] In listen mode, the --exec and --sh-exec options now accept a single connection and then exit, just like in normal listen mode. o UDP payloads are now stored in an external data file, nmap-payloads, instead of being hard-coded in the executable. o Added a new library, libnetutil, which contains about 2,700 lines of networking related code which is now shared between Nmap and Nping o Improved service detection match lines. o Improved our brute force password guessing list by mixing in some data sent in by Solar Designer of John the Ripper fame. o [Zenmap] IP addresses are now sorted by octet rather than their string representation. o [Ncat] When receiving a connection/datagram in listen mode, Ncat now prints the connecting source port along with the IP address. o Added EPROTO to the list of known error codes in service scan. o Updated IANA IP address space assignment list for random IP (-iR) generation. o Zenmap's "slow comprehensive scan profile" has been modified to use the best 7-probe host discovery combination we were able to find in extensive empirical testing o Zenmap now lets you save scan results in normal Nmap text output format or (as before) as XML. o [NSE] Raw packet sending at the IP layer is now supported, in addition to the existing Ethernet sending functionality. o Nmap now honors routing table entries that override interface addresses and netmasks. o [Ncat] The HTTP proxy server now accepts client connections over SSL, and added support for HTTP digest authentication of proxies, as both client and server. o Improved the MIT Kerberos version detection signatures. Plus many bugfixes and improvements. For full changelog, see http://nmap.org/changelog.html
2010-03-27Fixed brokenness of patch-adpettai2-4/+4
Ok'ed during freeze by wiz@
2010-03-21Nmap 5.21 [2010-01-27] (-> Nmap 5.00)pettai7-50/+118
Some of highlights are: o Dramatically improved the version detection database, integrating 2,596 submissions that users contributed since February 3, 2009! o Added 7 new NSE scripts for a grand total of 79! o Performed a memory consumption audit and made changes to dramatically reduce Nmap's footprint. o A major service detection submission integration. o Added some new service detection probes o Added 14 new NSE scripts for a grand total of 72! You can learn about them all at http://nmap.org/nsedoc/. Here are the new ones: o Nmap's --traceroute has been rewritten for better performance. o Integrated 1,349 fingerprints (and 81 corrections). o [NSE] Default socket parallelism has been doubled from 10 to 20. o [NSE] Now supports worker threads o Zenmap now includes ports in the services view whenever Nmap found them "interesting," whatever their state. o [Ncat, Ndiff] The exit codes of these programs now reflect whether they succeeded. o Optimize MAC address prefix lookup by using an std::map o Canonicalized the list of OS detection device types to a smaller set. o Zenmap's UI performance has improved significantly. o [NSE] socket garbage collection was rewritten for better performance. Many many bugfixes! For full changelog, see http://nmap.org/changelog.html Ok'ed during freeze by wiz@
2010-03-21Revert inadvertent version bump in previous.schmonz1-2/+3
2010-03-20Don't have time to MAINTAIN these anymore, so back to pkgsrc-users@adrianp1-4/+3
2010-01-17Recursive PKGREVISION bump for jpeg update to 8.wiz1-2/+2
2009-08-26bump revision because of graphics/jpeg updatesno1-1/+2
2009-07-20No more @dirrm (thanks wiz!)adrianp2-29/+2
2009-07-20Add missing PLIST from v5 bumpadrianp1-0/+3
2009-07-20Update to 5.00adrianp8-134/+158
Fix for PR#41506 Fix missing @dirrm entries from PLIST* Before we go into the detailed changes, here are the top 5 improvements in Nmap 5: 1. The new Ncat tool aims to be your Swiss Army Knife for data transfer, redirection, and debugging. We released a whole users' guide detailing security testing and network administration tasks made easy with Ncat. 2. The addition of the Ndiff scan comparison tool completes Nmap's growth into a whole suite of applications which work together to serve network administrators and security practitioners. Ndiff makes it easy to automatically scan your network daily and report on any changes (systems coming up or going down or changes to the software services they are running). The other two tools now packaged with Nmap itself are Ncat and the much improved Zenmap GUI and results viewer. 3. Nmap performance has improved dramatically. We spent last summer scanning much of the Internet and merging that data with internal enterprise scan logs to determine the most commonly open ports. This allows Nmap to scan fewer ports by default while finding more open ports. We also added a fixed-rate scan engine so you can bypass Nmap's congestion control algorithms and scan at exactly the rate (packets per second) you specify. 4. We released Nmap Network Scanning, the official Nmap guide to network discovery and security scanning. From explaining port scanning basics for novices to detailing low-level packet crafting methods used by advanced hackers, this book suits all levels of security and networking professionals. A 42-page reference guide documents every Nmap feature and option, while the rest of the book demonstrates how to apply those features to quickly solve real-world tasks. More than half the book is available in the free online edition. 5. The Nmap Scripting Engine (NSE) is one of Nmap's most powerful and flexible features. It allows users to write (and share) simple scripts to automate a wide variety of networking tasks. Those scripts are then executed in parallel with the speed and efficiency you expect from Nmap. All existing scripts have been improved, and 32 new ones added. New scripts include a whole bunch of MSRPC/NetBIOS attacks, queries, and vulnerability probes; open proxy detection; whois and AS number lookup queries; brute force attack scripts against the SNMP and POP3 protocols; and many more. All NSE scripts and modules are described in the new NSE documentation portal. Details are here: http://nmap.org/changelog.html
2009-06-14Remove @dirrm entries from PLISTsjoerg2-21/+1
2009-04-01Bump PKGREVISION for new patch-ad.apb1-2/+2
Correct handling of the length of data returned by SIOCGIFCONF. The actual length of each item is never less than sizeof(struct ifreq), but may be more than that. If the platform's struct sockaddr has an sa_len field, and if the length in sa_len is larger then the space available in ifr_ifru, then the data extends beyond the end of the ifr_ifru field by the difference in sizes.
2009-04-01Correct handling of the length of data returned by SIOCGIFCONF. Theapb2-1/+63
actual length of each item is never less than sizeof(struct ifreq), but may be more than that. If the platform's struct sockaddr has an sa_len field, and if the length in sa_len is larger then the space available in ifr_ifru, then the data extends beyond the end of the ifr_ifru field by the difference in sizes.
2009-01-15Support inet6 option. From PR 37152.shattered2-4/+10
OK by salo@.
2009-01-10PLIST fixes for zenmap build pointed out by Bernd Ernestiadrianp2-129/+191
PKGREVISION++
2009-01-04Update to 4.76adrianp5-26/+33
Fixed the --script-updatedb command Fixed several byte-order bugs in Traceroute Service fingerprints in XML output are no longer be truncated Added a UDP SNMPv3 probe to version detection Zenmap no longer leaves any temporary files lying around. *Lots* of Zenmap fixes See CHANGELOG for all the details
2008-06-20Add DESTDIR support.joerg1-1/+2
2008-06-09Add an option to build zenmap (not enabled by default)adrianp3-2/+270
2008-06-08Update to 4.65adrianp6-57/+121
Take MAINTAINER (agreed with salo@) o Updated to include the latest MAC Address prefixes from the IEEE in nmap-mac-prefixes [Fyodor] o NSE engine was cleaned up significantly. o Nmap now understands the RFC 4007 percent syntax for IPv6 Zone IDs. o Updated IANA assignment IP list for random IP (-iR) generation. [Kris] o NmapFE is now gone. (zenmap is the replacement) o Added the NSE library (NSELib) which is a library of useful functions (which can be implemented in LUA or as loadable C/C++ modules) for use by NSE scripts. o Integrated the Nmap Scripting Engine (NSE) into mainline Nmap.
2008-01-18Per the process outlined in revbump(1), perform a recursive revbumptnn1-1/+2
on packages that are affected by the switch from the openssl 0.9.7 branch to the 0.9.8 branch. ok jlam@
2007-01-09Fixed building with SunPro on Solaris.rillig2-1/+17
2006-12-17Update to version 4.20salo5-33/+26
Changes: 4.20 o Integrated the latest OS fingerprint submissions. The 2nd generation DB size has grown to 231 fingerprints. Please keep them coming! New fingerprints include Mac OS X Server 10.5 pre-release, NetBSD 4.99.4, Windows NT, and much more. o Fixed a segmentation fault in the new OS detection system which was reported by Craig Humphrey and Sebastian Garcia. o Fixed a TCP sequence prediction difficulty indicator bug. The index is supposed to go from 0 ("trivial joke") to about 260 (OpenBSD). But some systems generated ISNs so insecurely that Nmap went berserk and reported a negative difficulty index. This generally only affects some printers, crappy cable modems, and Microsoft Windows (old versions). Thanks to Sebastian Garcia for helping me track down the problem. 4.20RC2 o Integrated all of your OS detection submissions since RC1. The DB has increased 13% to 214 fingerprints. Please keep them coming! New fingerprints include versions of z/OS, OpenBSD, Linux, AIX, FreeBSD, Cisco CatOS, IPSO firewall, and a slew of printers and misc. devices. We also got our first Windows 95 fingerprint, submitted anonymously of course :). o Fixed (I hope) the "getinterfaces: intf_loop() failed" error which was seen on Windows Vista. The problem was apparently in intf-win32.c of libdnet (need to define MIB_IF_TYPE_MAX to MAX_IF_TYPE rather than 32). Thanks to Dan Griffin (dan(a)jwsecure.com) for tracking this down! o Applied a couple minor bug fixes for IP options support and packet tracing. Thanks to Michal Luczaj (regenrecht(a)o2.pl) for reporting them. o Incorporated SLNP (Simple Library Network Protocol) version detection support. Thanks to Tibor Csogor (tibi(a)tiborius.net) for the patch. 4.20RC1 o Fixed (I hope) a bug related to Pcap capture on Mac OS X. Thanks to Christophe Thil for reporting the problem and to Kurt Grutzmacher and Diman Todorov for helping to track it down. o Integrated all of your OS detection submissions since ALPHA11. The DB has increased 27% to 189 signatures. Notable additions include the Apple Airport Express, Windows Vista RC1, OpenBSD 4.0, a Sony TiVo device, and tons of broadband routers, printers, switches, and Linux kernels. Keep those submissions coming! o Upgraded the included LibPCRE from version 6.4 to 6.7. Thanks to Jochen Voss (voss(a)seehuhn.de) for the suggestion (he found some bugs in 6.4) 4.20ALPHA11 o Integrated all of your OS detection submissions, bringing the database up to 149 fingerprints. This is an increase of 28% from ALPHA10. Notable additions include FreeBSD 6.1, a bunch of HP LaserJet printers, and HP-UX 11.11. We also got a bunch of more obscure submissions like Minix 3.1.2a and "Ember InSight Adapter for programming EM2XX-family embedded devices". Who doesn't have a few of those laying around? I'm hoping that all the obscure submissions mean that more of the mainstream systems are being detected out of the box! Please keep those submissions (obscure or otherwise) coming! 4.20ALPHA10 o Integrated tons of new OS fingerprints. The DB now contains 116 fingerprints, which is up 63% since the previous version. Please keep the submissions coming! 4.20ALPHA9 o Integrated the newly submitted OS fingerprints. The DB now contains 71 fingerprints, up 27% from 56 in ALPHA8. Please keep them coming! We still only have 4.2% as many fingerprints as the gen1 database. o Added the --open option, which causes Nmap to show only open ports. Ports in the states "open|closed" and "unfiltered" might be open, so those are shown unless the host has an overwhelming number of them. o Nmap gen2 OS detection used to always do 2 retries if it fails to find a match. Now it normally does just 1 retry, but does 4 retries if conditions are good enough to warrant fingerprint submission. This should speed things up on average. A new --max-os-tries option lets you specify a higher lower maximum number of tries. o Added --unprivileged option, which is the opposite of --privileged. It tells Nmap to treat the user as lacking network raw socket and sniffing privileges. This is useful for testing, debugging, or when the raw network functionality of your operating system is somehow broken. o Fixed a confusing error message which occured when you specified a ping scan or list scan, but also specified -p (which is only used for port scans). Thanks to Thomas Buchanan for the patch. o Applied some small cleanup patches from Kris Katterjohn 4.20ALPHA8 o Integrated the newly submitted OS fingerprints. The DB now contains 56, up 33% from 42 in ALPHA7. Please keep them coming! We still only have 3.33% as many signatures as the gen1 database. o Nmap 2nd generation OS detection now has a more sophisticated mechanism for guessing a target OS when there is no exact match in the database (see http://insecure.org/nmap/osdetect/osdetect-guess.html ) o Rewrote mswin32/nmap.rc to remove cruft and hopefully reduce some MFC-related compilation problems we've seen. Thanks to KX (kxmail(a)gmail.com) for doing this. o NmapFE now uses a spin button for verbosity and debugging options so that you can specify whatever verbosity (-v) or debugging (-d) level you desire. The --randomize-hosts option was also added to NmapFE. Thanks to Kris Katterjohn for the patches. o A dozen or so small patches to Nmap and NmapFE by Kris Katterjohn. o Removed libpcap/Win32 and libpcap/msdos as Nmap doesn't use them. This reduces the Nmap tar.bz2 by about 50K. Thanks to Kris Katterjohn for the suggestion. 4.20ALPHA7 o Did a bunch of Nmap 2nd generation fingerprint integration work. Thanks to everyone who sent some in, though we still need a lot more. Also thanks to Zhao for a bunch of help with the integration tools. 4.20ALPHA6 had 12 fingerprints, this new version has 42. The old DB (still included) has 1,684. o Updated nmap-mac-prefixes to reflect the latest OUI DB from the IEEE (http://standards.ieee.org/regauth/oui/oui.txt) as of September 6, 2006. Also added the unregistered PearPC virtual NIC prefix, as suggested by Robert Millan (rmh(a)aybabtu.com). o Applied some small internal cleanup patches by Kris Katterjohn. 4.20ALPHA6 o Fixed a bug in 2nd generation OS detection which would (usually) prevent fingerprints from being printed when systems don't respond to the 1st ICMP echo probe (the one with bogus code value of 9). Thanks to Brandon Enright for reporting and helping me debug the problem. o Fixed some problematic Nmap version detection signatures which could cause warning messages. Thanks to Brandon Enright for the initial patch. 4.20ALPHA5 o Worked with Zhao to improve the new OS detection system with better algorithms, probe changes, and bug fixes. We're now ready to start growing the new database! If Nmap gives you fingerprints, please submit them at the given URL. The DB is still extremely small. The new system is extensively documented at http://insecure.org/nmap/osdetect/ . o Nmap now supports IP options with the new --ip-options flag. You can specify any options in hex, or use "R" (record route), "T" (record timestamp), "U") (record route & timestamp), "S [route]" (strict source route), or "L [route]" (loose source route). Specify --packet-trace to display IP options of responses. For further information and examples, see http://insecure.org/nmap/man/ and http://seclists.org/nmap-dev/2006/q3/0052.html . Thanks to Marek Majkowski for writing and sending the patch. o Integrated all 2nd quarter service detection fingerprint submissions. Please keep them coming! We now have 3,671 signatures representing 415 protocols. Thanks to version detection czar Doug Hoyte for doing this. o Nmap now uses the (relatively) new libpcap pcap_get_selectable_fd API on systems which support it. This means that we no longer need to hack the included Pcap to better support Linux. So Nmap will now link with an existing system libpcap by default on that platform if one is detected. Thanks to Doug Hoyte for the patch. o Updated the included libpcap from 0.9.3 to 0.9.4. The changes I made are in libpcap/NMAP_MODIFICATIONS . By default, Nmap will now use the included libpcap unless version 0.9.4 or greater is already installed on the system. o Applied some nsock bugfixes from Diman Todorov. These don't affect the current version of Nmap, but are important for his Nmap Scripting Engine, which I hope to integrate into mainline Nmap in September. o Fixed a bug which would occasionally cause Nmap to crash with the message "log_vwrite: write buffer not large enough". I thought I conquered it in a previous release -- thanks to Doug Hoyte for finding a corner case which proved me wrong. o Fixed a bug in the rDNS system which prevented us from querying certain authoritative DNS servers which have recursion explicitly disabled. Thanks to Doug Hoyte for the patch. o --packet-trace now reports TCP options (thanks to Zhao Lei for the patch). Thanks to the --ip-options addition also found in this release, IP options are printed too. o Cleaned up Nmap DNS reporting to be a little more useful and concise. Thanks to Doug Hoyte for the patch. o Applied a bunch of small internal cleanup patches by Kris Katterjohn (kjak(a)ispwest.com). o Fixed the 'distclean' make target to be more comprehensive. Thanks to Thomas Buchanan (Thomas.Buchanan(a)thecompassgrp.net) for the patch. Nmap 4.20ALPHA4 o Nmap now provides progress statistics in the XML output in verbose mode. Here are some examples of the format (etc is "estimated time until completion) and times are in UNIX time_t (seconds since 1970) format. Angle braces have been replaced by square braces: [taskbegin task="SYN Stealth Scan" time="1151384685" /] [taskprogress task="SYN Stealth Scan" time="1151384715" percent="13.85" remaining="187" etc="1151384902" /] [taskend task="SYN Stealth Scan" time="1151384776" /] [taskbegin task="Service scan" time="1151384776" /] [taskend task="Service scan" time="1151384788" /] Thanks to Adam Vartanian (flooey(a)gmail.com) for the patch. o Updated the Windows installer to give an option checkbox for performing the Nmap performance registry changes. The default is to do so. Thanks to Adam Vartanian (flooey(a)gmail.com) for the patch. o Applied several code cleanup patches from Marek Majkowski. o Added --release-memory option, which causes Nmap to release all accessible memory buffers before quitting (rather than let the OS do it). This is only useful for debugging memory leaks. o Fixed a bug related to bogus completion time estimates when you request an estimate (through runtime interaction) right when Nmap is starting.a subsystem (such as a port scan or version detection). Thanks to Diman Todorov for reporting the problem and Doug Hoyte for writing a fix. o Nmap no longer gets random numbers from OpenSSL when it is available because that turned out to be slower than Nmap's other methods (e.g. /dev/urandom on Linux, /dev/arandom on OpenBSD, etc.). Thanks to Marek Majkowski for reporting the problem. o Updated the Windows binary distributions (self-installer and .zip) to include the new 2nd generation OS detection DB (nmap-os-db). Thanks to Sina Bahram for reporting the problem. o Fixed the --max-retries option, which wasn't being honored. Thanks to Jon Passki (jon.passki(a)hursk.com) for the patch. Nmap 4.20ALPHA3 o Added back Win32 support thanks to a patch by kx o Fixed the English translation of TCP sequence difficulty reported by Brandon Enright, and also removed fingerprint printing for 1st generation fingerprints (I don't really want to deal with those anymore). Thanks to Zhao Lei for writing this patch. o Fix a problem which caused OS detection to be done in some cases even if the user didn't request it. Thanks to Diman Todorov for the fix. Nmap 4.20ALPHA2 o Included nmap-os-db (the new OS detection DB) within the release. Oops! Thanks to Brandon Enright (bmenrigh(a)ucsd.edu) for catching this problem with 4.20ALPHA1. o Added a fix for the crash in the new OS detection which would come with the message "Probe doesn't exist! Probe type: 1. Probe subid: 1" Nmap 4.20ALPHA1 o Integrated initial 2nd generation OS detection patch! The system is documented at http://insecure.org/nmap/osdetect/ . Thanks to Zhao Lei for helping with the coding and design. o portlist.cc was refactored to remove some code duplication. Thanks to Diman Todorov for the patch.
2006-10-11Fixed "test ==".rillig2-1/+15
2006-10-04Update MASTER_SITES and/or HOMEPAGE, from Sergey Svishchev.wiz1-3/+3
2006-07-07LIBTOOL_OVERRIDE generally doesn't need to be specified anymore... justjlam1-3/+1
set OVERRIDE_DIRDEPTH to find any libtool scripts deeper in the WRKSRC tree unless they're named something other than "libtool". SHLIBTOOL_OVERRIDE generally doesn't need to be specified either -- just define it to the empty list and shlibtool-override will look for libtool scripts.
2006-07-02Compilers other than GCC are not expected to know the -MM option torillig1-1/+9
calculate dependencies, so disable it for them.
2006-07-02devel/pcre calls itself "pcre" in the buildlink3.mk file, not "libpcre".rillig1-2/+2
2006-06-25Update to version 4.11salo6-112/+15
- bite the bullet and use GNU make, it's increasingly annoying to try avoiding it Changes: - Added a dozens of more detailed SSH version detection signatures, thanks to a SSH huge survey and integration effort by Doug Hoyte. The results of his large-scale SSH scan are posted at http://seclists.org/nmap-dev/2006/Apr-Jun/0393.html . - Fixed the Nmap Makefile (actually Makefile.in) to correctly handle include file dependencies. So if a .h file is changed, all of the .cc files which depend on it will be recompiled. Thanks to Diman Todorov (diman(a)xover.mud.at) for the patch. - Fixed a compilation problem on solaris and possibly other platforms. The error message looked like "No rule to make target `inet_aton.o', needed by `libnbase.a'". Thanks to Matt Selsky (selsky(a)columbia.edu) for the patch. Fixes PR pkg/33806 from Gilles Dauphin. - Applied a patch which helps with HP-UX compilation by linking in the nm library (-lnm). Thanks to Zakharov Mikhail (zmey20000(a)yahoo.com) for the patch. - Added version detection probes for detecting the Nessus daemon. Thanks to Adam Vartanian (flooey(a)gmail.com) for sending the patch.
2006-06-15Update to version 4.10salo3-10/+10
Changes: 4.10: ===== - Updated nmap-mac-prefixes to reflect the latest OUI DB from the IEEE (http://standards.ieee.org/regauth/oui/oui.txt) as of May 31, 2006. Also added a couple unregistered OUI's (for QEMU and Bochs) suggested by Robert Millan (rmh(a)aybabtu.com). - Fixed a bug which could cause false öpen" ports when doing a UDP scan of localhost. This usually only happened when you scan tens of thousands of ports (e.g. -p- option). - Fixed a bug in service detection which could lead to a crash when "--version-intensity 0" was used with a UDP scan. Thanks to Makoto Shiotsuki (shio(a)st.rim.or.jp) for reporting the problem and Doug Hoyte for producing a patch. - Made some AIX and HP-UX portability fixes to Libdnet and NmapFE. These were sent in by Peter O'Gorman (nmap-dev(a)mlists.thewrittenword.com). - When you do a UDP«CP scan, the TCP ports are now shown first (in numerical order), followed by the UDP ports (also in order). This contrasts with the old format which showed all ports together in numerical order, regardless of protocol. This was at first a "bug", but then I started thinking this behavior may be better. If you have a preference for one format or the other, please post your reasons to nmap-dev. - Changed mass_dns system to print a warning if it can't find any available DNS servers, but not quit like it used to. Thanks to Doug Hoyte for the patch. 4.04BETA1: ========== - Integrated all of your submissions (about a thousand) from the first quarter of this year! Please keep 'em coming! The DB has increased from 3,153 signatures representing 381 protocols in 4.03 to 3,441 signatures representing 401 protocols. No other tool comes close! Many of the already existing match lines were improved too. Thanks to Version Detection Czar Doug Hoyte for doing this. - Nmap now allows multiple ingored port states. If a 65K-port scan had, 64K filtered ports, 1K closed ports, and a few dozen open ports, Nmap used to list the dozen open ones among a thousand lines of closed ports. Now Nmap will give reports like "Not shown: 64330 filtered ports, 1000 closed ports" or "All 2051 scanned ports on 192.168.0.69 are closed (1051) or filtered (1000)", and omit all of those ports from the table. Open ports are never ignored. XML output can now have multiple <extraports> directive (one for each ignored state). The number of ports in a single state before it is consolidated defaults to 26 or more, though that number increases as you add -v or -d options. With -d3 or higher, no ports will be consolidated. The XML output should probably be augmented to give the extraports directive 'ip', 'tcp', and 'udp' attributes which specify the corresponding port numbers in the given state in the same listing format as the nmaprun.scaninfo.services attribute, but that part hasn't yet been implemented. If you absoultely need the exact port numbers for each state in the XML, use -d3 for now. - Nmap now ignores certain ICMP error message rate limiting (rather than slowing down to accomidate it) in cases such as SYN scan where an ICMP message and no response mean the same thing (port filtered). This is currently only done at timing level Aggressive (-T4) or higher, though we may make it the default if we don't hear problems with it. In addition, the --defeat-rst-ratelimit option has been added, which causes Nmap not to slow down to accomidate RST rate limits when encountered. For a SYN scan, this may cause closed ports to be labeled 'filtered' becuase Nmap refused to slow down enough to correspond to the rate limiting. Learn more about this new option at http://www.insecure.org/nmap/man/ . Thanks to Martin Macok (martin.macok(a)underground.cz) for writing the patch that these changes were based on. - Moved my Nmap development environment to Visual C++ 2005 Express edition. In typical "MS Upgrade Treadmill" fashion, Visual Studio 2003 users will no longer be able to compile Nmap using the new solution files. The compilation, installation, and execution instructions at http://www.insecure.org/nmap/install/inst-windows.html have been upgraded. - Automated my Windows build system so that I just have to type a single make command in the mswin32 directory. Thanks to Scott Worley (smw(a)pobox.com>, Shane & Jenny Walters (yfisaqt(a)waltersinamerica.com), and Alex Prinsier (aphexer(a)mailhaven.com) for reading my appeal in the 4.03 CHANGELOG and assisting. - Changed the PortList class to use much more efficient data structures and algorithms which take advantage of Nmap-specific behavior patterns. Thanks to Marek Majkowski (majek(a)forest.one.pl) for the patch. - Fixed a bug which prevented certain TCPÙDP scan commands, such as "nmap -sSU -p1-65535 localhost" from scanning both TCP and UDP. Instead they gave the error message "WARNING: UDP scan was requested, but no udp ports were specified. Skipping this scan type". Thanks to Doug Hoyte for the patch. - Nmap has traditionally required you to specify -T* timing options before any more granular options like --max-rtt-timeout, otherwise the general timing option would overwrite the value from your more specific request. This has now been fixed so that the more specific options always have precendence. Thanks to Doug Hoyte for this patch. - Fixed a couple possible memory leaks reported by Ted Kremenek (kremenek(a)cs.stanford.edu) from the Stanford University sofware static analysis lab ("Checker" project). - Nmap now prints a warning when you specify a target name which resolves to multiple IP addresses. Nmap proceeds to scan only the first of those addresses (as it always has done). Thanks to Doug Hoyte for the patch. The warning looks like this: Warning: Hostname google.com resolves to 3 IPs. Using 66.102.7.99. - Disallow --host-timeout values of less than 1500ms, print a warning for values less than 15s. - Changed all instances of inet_aton() into calls to inet_pton() instead. This allowed us to remove inet_aton.c from nbase. Thanks to KX (kxmail(a)gmail.com) for the patch. - When debugging (-d) is specified, Nmap now prints a report on the timing variables in use. Thanks to Doug Hoyte for the patch. The report loos like this: ---------- Timing report ---------- hostgroups: min 1, max 100000 rtt-timeouts: init 250, min 50, max 300 scan-delay: TCP 5, UDP 1000 parallelism: min 0, max 0 max-retries: 2, host-timeout 900000 ----------------------------------- - Modified the WinPcap installer file to explicitly uninstall an existing WinPcap (if you select that you wish to replace it) rather than just overwriting the old version. Thanks to Doug Hoyte for making this change. - Added some P2P application ports to the nmap-services file. Thanks to Martin Macok for the patch. - The write buffer length increased in 4.03 was increased even further when the debugging or verbosity levels are more than 2 (e.g. -d3). Thanks to Brandon Enright (bmenrigh(a)ucsd.edu) for the patch. The goal is to prevent you from ever seeing the fatal error: "log_vwrite: write buffer not large enough -- need to increase" - Added a note to the Nmap configure dragon that people sick of him can submit their own ASCII art to nmap-dev@insecure.org . If you are wondering WTF I am talking about, it is probably because only most elite Nmap users -- the ones who compile from source on UNIX -- get to see the 'l33t ASCII Art.
2006-04-25Update to version 4.03salo3-18/+18
Changes: - Updated the LibPCRE build system to add the -fno-thread-jumps option to gcc when compiling on the new Intel-based Apple Mac OS X systems. Hopefully this resolves the version detection crashes that several people have reported on such systems. Thanks to Kurt Grutzmacher (grutz(a)jingojango.net) for sending the configure.ac patch. - Increased a write buffer length to avoid Nmap from quitting with the message "log_vwrite: write buffer not large enough -- need to increase". Thanks to Dave (dmarcher(a)pobox.com) for reporting the issue. - Made some portability fixes to keep Nmap compiling with the newest Visual Studio 2005. Thanks to KX (kxmail(a)gmail.com) for suggesting them. - Service fingerprints are now provided in the XML output whenever they would appear in the interactive output (i.e. when a service respons with data but is unrecognized). They are shown in a new 'servicefp' attribute to the 'service' tag. Thanks to Brandon Enright (bmenrigh(a)ucsd.edu) for sending the patch. - Improved the Windows build system -- mswin32/Makefile now takes care of packaging Nmap and creating the installers once Visual Studio (GUI) is done building the Release version of mswin32/nmap.sln. If someone knows how to do this (build) step on the command line (using the Makefile), please let me know. Or if you know how to at least make 'Release' (rather than Debug) the default configuration, that would be valuable. - WinPcap 3.1 binaries are now shipped in the Nmap tarball, along with a customized (for Nmap) installer written by Doug Hoyte. That new WinPcap installer is now used in the Nmap self-installer. - Fixed (I hope) a problem where aggresive --min-parallelization option values could cause Nmap to quit with the message "box(300, 100, 15) called (min,max,num)". Thanks to Richard van den Berg (richard.vandenberg(a)ins.com) for reporting the problem. - Fixed a rare crash bug thanks to a report and patch from Ganga Bhavani (GBhavani(a)everdreamcorp.com)
2006-02-12Updated to version 4.01:salo7-69/+28
Changes: - Fixed a bug that would cause bogus reverse-DNS resolution on big-endian machines. Thanks to Doug Hoyte, Seth Miller, Tony Doan, and Andrew Lutomirsky for helping to debug and patch the problem. - Fixed an important memory leak in the raw ethernet sending system. Thanks to Ganga Bhavani (GBhavani(a)everdreamcorp.com) for identifying the bug and sending a patch. - Fixed --system-dns option so that --system_dns works too. Error messages were changed to reflect the former (preferred) name. Thanks to Sean Swift (sean.swift(a)bradford.gov.uk) and Peter VanEeckhoutte (Peter.VanEeckhoutte(a)saraleefoodseurope.com) for reporting the problem. - Fixed a crash which would report this message: "NmapOutputTable.cc:143: void NmapOutputTable::addItem(unsigned int, unsigned int, bool, const char*, int): Assertion `row < numRows' failed." Thanks to Jake Schneider (Jake.Schneider(a)dynetics.com) for reporting and helping to debug the problem. - Whenever Nmap sends packets with the SYN bit set (except for OS detection), it now includes the maximum segment size (MSS) tcp option with a value of 1460. This makes it stand out less as almost all hosts set at least this option. Thanks to Juergen Schmidt (ju(a)heisec.de) for the suggestion. - Applied a patch for a Windows interface reading bug in the aDNS subsystem from Doug Hoyte. - Minor changes to recognize DragonFly BSD in configure scripts. Thanks to Joerg Sonnenberger (joerg(a)britannica.bec.de) for sending the patch. - Fixed a minor bug in an error message starting with "eth_send of ARP packet returned". Thanks to J.W. Hoogervorst (J.W.Hoogervorst(a)uva.nl) for finding this.
2006-02-01Add DragonFly support. Also recognize DragonFly and NetBSD as OS name.joerg6-15/+70
2006-01-31Update to version 4.00salo3-17/+17
Changes: 4.00: ===== - Added the '?' command to the runtime interaction system. It prints a list of accepted commands. Thanks to Andrew Lutomirski (luto(a)myrealbox.com) for the patch. 3.9999: ======= - Generated a new libpcre/configure to cope with changes in LibPCRE 6.4 - Updated nmap-mac-prefixes to reflect the latest OUI DB from the IEEE (http://standards.ieee.org/regauth/oui/oui.txt) - Updated nmap-protocols with the latest IEEE internet protocols assignments (http://www.iana.org/assignments/protocol-numbers). - Updated the Nmap version number and related fields that MS Visual Studio places in the binary. This was done by editing mswin32/nmap.rc. 3.999: ====== - Added runtime interaction support to Windows, thanks to patches from Andrew Lutomirski (luto(a)myrealbox.com) and Gisle Vanem (giva(a)bgnett.no). - Changed a couple lines of tcpip.cc (put certain IP header fields in host byte order rather than NBO) to (hopefully) support Mac OS X on Intel. Thanks to Kurt Grutzmacher (grutz(a)jingojango.net) for the patch. - Upgraded the included LibPCRE from version 6.3 to 6.4. There was a report of version detection crashes on the new Intel-based MACs with 6.3. - Fixed an issue in which the installer would malfunction in rare issues when installing to a directory with spaces in it. Thanks to Thierry Zoller (Thierry(a)Zoller.lu) for the report. 3.99: ===== - Integrated all remaining 2005 service submissions. The DB now has surpassed 3,000 signatures for the first time. There now are 3,153 signatures for 381 service protocols. Those protocols span the gamut from abc, acap, afp, and afs to zebedee, zebra, and zenimaging. It even covers obscure protocols such as http, ftp, smtp, and ssh :). Thanks to Version Detection Czar Doug Hoyte for his excellent work on this. - Created a Windows executable installer using the open source NSIS (Nullsoft Scriptable Install System). It handles Pcap installation, registry performance changes, and adding Nmap to your cmd.exe executable path. The installer source files are in mswin32/nsis/ . Thanks to Google SoC student Bo Jiang (jiangbo(a)brandeis.edu) for creating the initial version. - Fixed a backward compatibility bug in which Nmap didn't recognize the --min_rtt_timeout option (it only recognized the newly hyphenated --min-rtt-timeout). Thanks to Joshua D. Abraham (jabra(a)ccs.neu.edu) for the bug report. - Fixed compilation to again work with gcc-derivatives such as MingW. Thanks to Gisle Vanem (giva(a)bgnett.no) for sending the patches 3.98BETA1: ========== - Added run time interaction as documented at http://www.insecure.org/nmap/man/man-runtime-interaction.html . While Nmap is running, you can now press 'v' to increase verbosity, 'd' to increase the debugging level, 'p' to enable packet tracing, or the capital versions (V,D,P) to do the opposite. Any other key (such as enter) will print out a status message giving the estimated time until scan completion. This only works on UNIX for now. Do we have any volunteers to add Windows support? You would need to change a handful of UNIX-specific termio calls with the Windows equivalents. This feature was created by Paul Tarjan (ptarjan(a)stanford.edu) as part of the Google Summer of Code. - Reverse DNS resolution is now done in parallel rather than one at a time. All scans of large networks (particularly list, ping and just-a-few-ports scans) should benefit substantially from this change. If you encounter any problems, please let us know. The new --system_dns option was added so you can use the (slow) system resolver if you prefer that for some reason. You can specify a comma separated list of DNS server IP addresses for Nmap to use with the new --dns_servers option. Otherwise, Nmap looks in /etc/resolve.conf (UNIX) or the system registry (Windows) to obtain the nameservers already configured for your system. This excellent patch was written by Doug Hoyte (doug(a)hcsw.org). - Added the --badsum option, which causes Nmap to use invalid TCP or UDP checksums for packets sent to target hosts. Since virtually all host IP stacks properly drop these packets, any responses received are likely coming from a firewall or IDS that didn't bother to verify the checksum. For more details on this technique, see http://www.phrack.org/phrack/60/p60-0x0c.txt . The author of that paper, Ed3f (ed3f(a)antifork.org), is also the author of this patch (which I changed it a bit). - The 26 Nmap commands that previously included an underscore (--max_rtt_timeout, --send_eth, --host_timeout, etc.) have been renamed to use a hyphen in the preferred format (i.e. --max-rtt-timeout). Underscores are still supported for backward compatibility. - More excellent NmapFE patches from Priit Laes (amd(a)store20.com) were applied to remove all deprecated GTK API calls. This also eliminates the annoying Gtk-Critical and Gtk-WARNING runtime messages. - Changed the way the __attribute__ compiler extension is detected so that it works with the latest Fedora Core 4 updates (and perhaps other systems). Thanks to Duilio Protti (dprotti(a)fceia.unr.edu.ar) for writing the patch. The compilation error message this fixes was usually something like: "nmap.o(.rodata+0x17c): undefined reference to `__gthrw_pthread_cancel(unsigned long)" - Added some exception handling code to mswin32/winfix.cc to prevent Nmap from crashing mysteriously when you have WinPcap 3.0 or earlier (instead of the required 3.1). It now prints an error message instead asking you to upgrade, then reduces functionality to connect()-only mode. I couldn't get it working with the C++ standard try/catch() blocks, but as soon as I used the nonstandard MS conventions (__try/__except(), everything worked fine. Shrug. - Stripped the firewall API out of the libdnet included with Nmap because Nmap doesn't use it anyway. This saves space and reduces the likelihood of compilation errors and warnings. - Modified the previously useless --noninteractive option so that it deactivates runtime interaction. 3.96BETA1: ========== - Added --max_retries option for capping the maximum number of retransmissions the port scan engine will do. The value may be as low as 0 (no retransmits). A low value can increase speed, though at the risk of losing accuracy. The -T4 option now allows up to 6 retries, and -T5 allows 2. Thanks to Martin Macok (martin.macok(a)underground.cz) for writing the initial patch, which I changed quite a bit. I also updated the docs to reflect this neat new option. - Many of the Nmap low-level timing options take a value in milliseconds. You can now append an 's', 'm', or 'h' to the value to give it in seconds, minutes, or hours instead. So you can specify a 45 minute host timeout with --host_timeout 45m rather than specifying --host_timeout 2700000 and hoping you did the math right and have the correct number of zeros. This also now works for the --min_rtt_timeout, --max_rtt_timeout, --initial_rtt_timeout, --scan_delay, and --max_scan_delay options. - Improved the NmapFE port to GTK2 so it better-conforms to the new API and you don't get as many annoying messages in your terminal window. GTK2 is prettier and more functional too. Thanks to Priit Laes (amd(a)store20.com) for writing these excellent patches. - Fixed a problem which led to the error message "Failed to determine dst MAC address for target" when you try to run Nmap using a dialup/PPP adapter on Windows rather than a real ethernet card. Due to Microsoft breaking raw sockets, Nmap no longer supports dialup adapters, but it should now give you a clearer error message than the "dst MAC address" nonsense. - Debian GNU/kFreeBSD is now supported thanks to a patch to libdnet's configure.in by Petr Salinger (Petr.Salinger(a)t-systems.cz). - Tried to update to the latest autoconf only to find that there hasn't been a new version in more than two years :(. I was able to find new config.sub and config.guess files at http://cvs.savannah.gnu.org/viewcvs/config/config/ , so I updated to those. - Fixed a problem with the -e option when run on Windows (or UNIX with --send_eth) when run on an ethernet network against an external (routed) host. You would get the message "NmapArpCache() can only take IPv4 addresses. Sorry". Thanks to KX (kxmail(a)gmail.com) for helping to track down the problem. - Made some changes to allow source port zero scans (-g0). Nmap used to refuse to do this, but now it just gives a warning that it may not work on all systems. It seems to work fine on my Linux box. Thanks to Bill Dale (bill_dale(a)bellsouth.net) for suggesting this feature. - Made a change to libdnet so that Windows interfaces are listed as down if they are disconnected, unplugged, or otherwise unavailable. - Ceased including foreign translations in the Nmap tarball as they take up too much space. HTML versions can be found at http://www.insecure.org/nmap/docs.html , while XML and NROFF versions are available from http://www.insecure.org/nmap/data/man-xlate/ . - Changed INSTALL and README-WIN32 files to mostly just reference the new Nmap Install Guide at http://www.insecure.org/nmap/install/ . - Included docs/nmap-man.xml in the tarball distribution, which is the DocBook XML source for the Nmap man page. Patches to Nmap that are user-visible should include patches to the man page XML source rather than to the generated Nroff. - Fixed Nmap so it doesn't crash when you ask it to resume a previous scan, but pass in a bogus file rather than actual Nmap output. Thanks to Piotr Sobolewski (piotr_sobolewski(a)o2.pl) for the fix.