Nmap Announce mailing list archives

Nmap 2.54BETA29 released


From: Fyodor <fyodor () insecure org>
Date: Fri, 10 Aug 2001 02:50:34 -0700

-----BEGIN PGP SIGNED MESSAGE-----


Hello everyone,

I am happy to announce that Nmap 2.54BETA29 is now available.  This is
a relatively important release, as it contains something for everyone:
bug fixes, OS fingerprints, and a cool new feature or two!

In the "new feature" department, I have integrated William McVey's
multi-portlist patch.  This allows you to specify different port
numbers when scanning both TCP & UDP.  For example, if you want to UDP
scan for 53,111 and 137 while TCP scanning for
21-25,80,139,515,6000,8080 you could do: 
nmap -sSU -p U:53,111,137,T:21-25,80,139,515,6000,8080 target.com .
Prior to this patch, you had to either use different Nmap executions
or scan both UDP & TCP of each port.  See the man page for more usage
info.

I also added a bunch of fingerprints, including Windows XP release
candidates #1 & #2, OpenBSD 2.9, various home gateways/cable modem,
MacOS X 10.0.4, Linux 2.4.7, Guantlet Firewall 4.0a, a few Cisco
routers, and, most importantly, the Alcatel Advanced Reflexes IP Phone
:).  Many other fingerprints were updated as well.  Thanks to everyone
who submitted fingerprints!

As of this release, Nmap is officially in "deep freeze" mode.  I might
release the next "stable" version this weekend.  We have been in
betas for more than a year.  So please test this sucker thoroughly and
let me know if you find any problems!

Here are some other important changes in this release:

o Found and fixed some relatively major memory leaks based on reports
  sent in by H D Moore (hdm () secureaustin com), mugz
  (mugz () x-mafia org), and Steven Van Acker (deepstar () ulyssis org)

o Applied patch from Chad Loder (chad_loder () rapid7 com) which improves
  random target host selection (-iR) by excluding more undesirable
  addresses.

o Fixed portscan timing bug found by H D Moore (hdm () secureaustin com).
  This bug can occur when you specify a --max_rtt_timeout but not
  --initial_rtt_timeout and then scan certain firewalled hosts.

o Fixed port number printing bug found by "Stephen Leavitt"
  <stephen_j_leavitt () hotmail com>

o The Nmap source tarball now extracts with more lenient permissions
  (sometimes world-readable or world-executable, but never
  world-writable).  If you don't want this, set your umask to 077
  (which is what I do).  Suggested by Line Printer (lps () rahul net)

For those of you running Linux/x86 w/a recent version of rpm
(www.rpm.org), you can install/upgrade to the newest version of
nmap/nmapfe with these commands:

rpm -vhU (nmap url)
where (nmap url) is one (or both) of these:

http://download.insecure.org/nmap/dist/nmap-2.54BETA29-1.i386.rpm
http://download.insecure.org/nmap/dist/nmap-frontend-0.2.54BETA29-1.i386.rpm

source tarballs and source RPMs are always available at:
http://www.insecure.org/nmap/nmap_download.html

For the more paranoid (smart) members of the list, here are the md5
hashes:

3ad3238d7333a6a1dd0169d81b338a56 nmap-2.54BETA29-1.i386.rpm
690224ed82cfc4da4733ec0304bd4939 nmap-2.54BETA29-1.src.rpm
1673c0473592348163e665e673653caa nmap-2.54BETA29.tgz
9d835f87e922c1e348e04b20fe49d4b3 nmap-frontend-0.2.54BETA29-1.i386.rpm

These release notes should be signed with my PGP key, which is available at
http://www.insecure.org/fyodor_gpgkey.txt .  
The key fingerprint is: 97 2F 93 AB 9C B0 09 80 D9 51 40 6B B9 BC E1 7E

Please let me know if you find any problems.

Cheers,
Fyodor


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iQCVAwUBO3Ot6s4dPqJTWH2VAQET1gP/dTFnA7484KT5VeZWTRFQYaBbs1Iq/Fgj
9wI/mCNx5jjbVc33t7BEKk0tGyC1g4DPQkCz3LaR0QpMu4IN+7ciiaS981EB9cYY
cHrbQs7LbJ/K5zde1JQD90D9JeQbaKg0qB1zzwAA113mn1J2Coem3z3G5PSCPn3e
ruz1p6wjAk4=
=YEdW
-----END PGP SIGNATURE-----




--------------------------------------------------
For help using this (nmap-hackers) mailing list, send a blank email to 
nmap-hackers-help () insecure org . List run by ezmlm-idx (www.ezmlm.org).


Current thread: