Nmap Announce mailing list archives
Nmap 2.54BETA4 released
From: Fyodor <fyodor () insecure org>
Date: Mon, 4 Sep 2000 22:33:42 -0700 (PDT)
Hello everyone, I am pleased to announce the release of Nmap 2.54BETA4. Here are some of the most important changes: -- Upgraded to the very latest Libpcap version ( the 9/3/00 CVS snapshot ). This version is from the tcpdump.org group rather than the Lawrence Livermore crew. The most important advantage is Linux Socket Filter support (so you won't have that annoying syslog message about Nmap using the obsolete SOCK_PACKET interface). -- I tried to install Nmap on yet another machine without lex/yacc or flex/bison. That was the last straw! I am now shipping the generated C files, which eliminates the lex/yacc requirement. -- Applied patch by Jay Freeman (saurik) <saurik () saurik com> to make Nmap C++-clean (this was lot of tedious work! Thanks!). Note that Nmap still uses a normal C compiler by default, but Nmap derivatives may appreciate C++ compatability. Note that this only applies to "Nmap proper", not libpcap. -- Added a HACKING file for people who want to help with Nmap development. It describes preferred patch formats, development resources, and offers a number of useful changes that would likely be accepted into the main tree. -- Fixed a configure.in error found by Vacuum (vacuum () technotronic com) which could cause compilation errors. -- Fingerprint file adjustments for better Win* detection -- Ensure libpcap is not configured and/or installed if you already have a "new enough" version (0.4a6+) installed. -- Included Italian translation of Nmap man page from Giorgio Zoppi <deneb () supereva it> . -- Fixed a SYN scan problem that could cause a major slowdown on some busy networks. -- Fixed a crash problem in NmapFE reported by sverre ( sverre () gmx net ) -- Added an "SInfo" line to most printed fingerprints. It looks similar to this: SInfo(V=2.54BETA4%P=i686-pc-linux-gnu%D=9/4%Time=9681031%O=7%C=1) and contains information useful when fingerprints are reported (Nmap version/platform, scan date, and open/closed ports used) -- Fixed RPCGrind (-sR) scan. It has been almost completely broken since 2.54BETA2 (which has been out for two weeks) and nobody reported it! I noticed the problem myself during testing of something else. I am disappointed that nobody bothered to even let me know that this was broken. Does anyone even use RPC Scan? -- Various other small fixes/improvements For those of you running Linux/x86 w/a recent version of rpm (www.rpm.org), you can install/upgrade to the newest version of nmap/nmapfe with these commands: rpm -vhU (nmap url) where (nmap url) is one (or both) of these: http://www.insecure.org/nmap/dist/nmap-2.54BETA4-1.i386.rpm http://www.insecure.org/nmap/dist/nmap-frontend-0.2.54BETA4-1.i386.rpm source tarballs and source RPMs are available at: http://www.insecure.org/nmap/#download Let me know if you find any problems. Cheers, Fyodor -------------------------------------------------- For help using this (nmap-hackers) mailing list, send a blank email to nmap-hackers-help () insecure org . List run by ezmlm-idx (www.ezmlm.org).
Current thread:
- Nmap 2.54BETA4 released Fyodor (Sep 04)