Nmap Announce mailing list archives

Nmap 2.54BETA36 released


From: Fyodor <fyodor () insecure org>
Date: Wed, 10 Jul 2002 02:23:42 -0700

-----BEGIN PGP SIGNED MESSAGE-----

Hello everyone,

I am pleased to announce that Nmap version 2.54BETA37 is now
available.  This release offers dozens of changes, mostly related to
stability and portability.  You guys might like some of them.  For
example, SYN scan is now the default in most situation.  No more
hassle of typing " -sS" on nearly every scan.  I also updated most of
the data files (services, rpc numbers, a few new OS fingerprints,
etc).

I hope to release an actual NONBETA (gasp!) release very shortly.  The
only changes from BETA37 will be strict bugfixes and a bunch of OS
fingerprint updates I have queued up.  Thus it would be very useful if
you guys could upgrade to BETA37 and let me know if you catch any of
the following:

o Bugs, including crashes, compilation problems, broken features,
  inaccurate documentation, etc.
o Unidentified Operating systems -- if you are sure what the target OS
  is and Nmap gives you a URL, please submit it.
o Incorrectly identified OS -- please send me mail with the
  information requested at
  http://lists.insecure.org/nmap-hackers/2002/Apr-Jun/0008.html .

Anyway, here are the most important changes since BETA36 (from CHANGELOG):

o Made SYN scan the default for privileged (root) users.  This offers
  far better performance for Windows users due to their broken
  connect() call, and is usually even preferred on UNIX because it is
  more stealthy and less likely to crash applications listening on the
  target host.

o Fixed a problem noted by Ping Huang (pshuang () alum mit edu) relating
  to -PI scans of a machine's own non-localhost interfaces (eg
  scanning your ethernet address).

o Applied patch from Patrice Goetghebeur (pgoetghebeur () mac com) which
  fixes PPP/SLIP support on Mac OS X.

o Applied dozens of nmap-services portnumber mapping updates
  researched and sent by palante () subterrain net

o Updated nmap-rpc to the latest version from Eilon Gishri
  (eilon () aristo tau ac il)

o Fixed --resume option to better detect all of the previously scanned
  hosts in an -oN file (bug report from Adam.Scott () predictive com )

o Adjusted random IP generator (for -iR) to account for newly
  allocated ip space from
  http://www.iana.org/assignments/ipv4-address-space as noted by Chad
  Loder (cloder () acm org)

o Updated config.sub and config.guess to the versions in
  automake-1.6.2 .

o Applied patch from Markus A. Nonym (g17m0 () lycos com) which checks
  for a recent version of GTK+ in ./configure before even trying to
  build NmapFE (avoids the previous ugly compiler errors).

o Applied patch from benkj () gmx it which fixes misbehavior when Nmap
  would receive EOF (including ^D) in interactive mode.

o Fixed format string bugs (not the security-related kind) found by
  Takehiro YONEKURA (yonekura () obliguard com) and Kuk-hyeon Lee 
  (errai () inzen com)

o Applied patch from Greg Steuck (greg-nmap-dev () nest cx) which fixes
  an alignment problem in charpool.c that could cause bus errors on
  64-bit platforms.

o Applied portability fix patch from Matt Christian (mattc () visi com)

For those of you running Linux/x86 w/a recent version of rpm
(www.rpm.org), you can install/upgrade to the newest version of
nmap/nmapfe by executing these commands as root:

rpm -vhU (nmap url)
where (nmap url) is one (or both) of these:

http://download.insecure.org/nmap/dist/nmap-2.54BETA37-1.i386.rpm
http://download.insecure.org/nmap/dist/nmap-frontend-2.54BETA37-1.i386.rpm

For the rest of you, source tarballs and source RPMs are always
available at: http://www.insecure.org/nmap/nmap_download.html

For the more paranoid (smart) members of the list, here are the md5
hashes:

90a88abaee95ad07157d2514e9454254  nmap-2.54BETA37-1.i386.rpm
18f93d4bef50f2204697e8866b222198  nmap-2.54BETA37-1.src.rpm
a42c89d42facfc52266cdda3a7f1b9e2  nmap-2.54BETA37.tgz
424c813f1e1309431e429fbb333479b3  nmap-2.54BETA37-win32.zip
9c5f620d3e2b88e901d7cf432f57180b  nmap-frontend-2.54BETA37-1.i386.rpm

These release notes should be signed with my PGP key, which is available at
http://www.insecure.org/fyodor_gpgkey.txt .
The key fingerprint is: 97 2F 93 AB 9C B0 09 80 D9 51 40 6B B9 BC E1 7E

Cheers,
Fyodor

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iQCVAwUBPSv8y84dPqJTWH2VAQGN6AP9Feg76MvdewkwZs08EXa6aquqJIE2LLDQ
t0NffENK/FU11VcULHRT1MwUw62p8b0WSFu7hHjnwx5fGxEwIM2kAJLYQciQ8j7N
9kUY/FObOK1kUAycwNuMrVhpfNzNsxSthFru5EvAL4Py6lKJqffubQUHT4BxiYn4
nfm7lQvPUM4=
=VbHD
-----END PGP SIGNATURE-----

--------------------------------------------------
For help using this (nmap-hackers) mailing list, send a blank email to 
nmap-hackers-help () insecure org . List run by ezmlm-idx (www.ezmlm.org).


Current thread: