Nmap Announce mailing list archives

Nmap 2.54BETA31 released!


From: Fyodor <fyodor () insecure org>
Date: Wed, 20 Mar 2002 00:14:39 -0800

-----BEGIN PGP SIGNED MESSAGE-----


Hello everyone,

I am happy to announce that Nmap 2.54BETA31 is now available.  It
contains a number of important fixes and updates which I have been
sitting on for far too long :).  I also snuck in some new features.
Here are the CHANGELOG entries

o Added ICMP Timestamp and Netmask ping types (-PP and -PM).  These
  (especially timestamp) can be useful against some hosts that do not
  respond to normal ping (-PI) packets.

o Documented the --data_length option and made it work with all the
  ICMP ping types (echo request, netmask, and timestamp).

o Added check for strings.h before including it in portlist.c .  This
  fixes a compilation problem on some versions of Windows.  Problem
  first noted by "Michael Vorin" <mvorin () hotmail com>

o Applied patch from Andy Lutomirski (Luto () myrealbox com) which fixes
  a crash on some Windows platforms when timeouts occur.

o Fixed "grepable output" (-oG) so that it prints IPID sequence class
  rather than printing the TCP ISN sequence index twice.  Problem
  noted by Russell Fulton (r.fulton () auckland ac nz)

o Added mysterious, undocumented --scanflags option.

o Applied patch from Andy Lutomirski (Luto () myrealbox com) which fixes
  some important Windows bugs.  Apparently this can cause a dramatic
  speedup in some circumstances.  The patch had other misc. changes
  too.

o Fix bug noted by Chris V (iselldrugstokidsonline () yahoo com) in which
  Nmap could segmentation fault with the (bogus) command: './nmap -sO
  -p 1-65535 hostname' (protocol only can go up to 255).  That being
  said, Nmap should never segfault just because of bogus options.

o Fixed problem noted by Maximiliano (emax25 () arnet com ar) where Nmap
  would get stuck in a (nearly) infinite loop when you try to "resume"
  a random host (-iR) scan.

o Included a number of fingerprint updates, but I still have many more
  web submissions to go through.  Also made some nmap-services
  portlist updates.

o Included a bunch of fixes (mostly to prevent compiler warnings) from
  William McVey (wam () cisco com)

For those of you running Linux/x86 w/a recent version of rpm
(www.rpm.org), you can install/upgrade to the newest version of
nmap/nmapfe with these commands:

rpm -vhU (nmap url)
where (nmap url) is one (or both) of these:

http://download.insecure.org/nmap/dist/nmap-2.54BETA30-1.i386.rpm
http://download.insecure.org/nmap/dist/nmap-frontend-0.2.54BETA30-1.i386.rpm

For the rest of you, source tarballs and source RPMs are always
available at: http://www.insecure.org/nmap/nmap_download.html

For the more paranoid (smart) members of the list, here are the md5
hashes:

f0d363b32bab910ea195502322a43cca nmap-2.54BETA31.tgz
e46cccf35721870cce969494187829ad nmap-2.54BETA31-1.i386.rpm
801d8df405c473ad02df2bdf380abae9 nmap-2.54BETA31-1.src.rpm
ae8cd0f857073d6c6177921ab5316aec nmap-frontend-0.2.54BETA31-1.i386.rpm


These release notes should be signed with my PGP key, which is available at
http://www.insecure.org/fyodor_gpgkey.txt .  
The key fingerprint is: 97 2F 93 AB 9C B0 09 80 D9 51 40 6B B9 BC E1 7E

Please let me know if you find any problems.

Cheers,
Fyodor


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iQCVAwUBPJhDws4dPqJTWH2VAQGZuwQAkwLzoCxeWW5wCq0EgRoiCq6fGetbXhxK
BpAFejM1RClU9PIMRSxb8Fi0RZRUptYWldt0v8OMgzg3aR60m4/xXmM64roCj6my
UAGOJyGOb753CaMElAAZhFMhTNkAki/Viggetz2Mk5Pf4/qtosZ5C7dVc9yzEyWM
Jrm2SFLi8Lg=
=5ok3
-----END PGP SIGNATURE-----

--------------------------------------------------
For help using this (nmap-hackers) mailing list, send a blank email to 
nmap-hackers-help () insecure org . List run by ezmlm-idx (www.ezmlm.org).


Current thread: