Nmap Announce mailing list archives
Nmap 2.54BETA36 released
From: Fyodor <fyodor () insecure org>
Date: Wed, 10 Jul 2002 02:23:42 -0700
-----BEGIN PGP SIGNED MESSAGE----- Hello everyone, I am pleased to announce that Nmap version 2.54BETA37 is now available. This release offers dozens of changes, mostly related to stability and portability. You guys might like some of them. For example, SYN scan is now the default in most situation. No more hassle of typing " -sS" on nearly every scan. I also updated most of the data files (services, rpc numbers, a few new OS fingerprints, etc). I hope to release an actual NONBETA (gasp!) release very shortly. The only changes from BETA37 will be strict bugfixes and a bunch of OS fingerprint updates I have queued up. Thus it would be very useful if you guys could upgrade to BETA37 and let me know if you catch any of the following: o Bugs, including crashes, compilation problems, broken features, inaccurate documentation, etc. o Unidentified Operating systems -- if you are sure what the target OS is and Nmap gives you a URL, please submit it. o Incorrectly identified OS -- please send me mail with the information requested at http://lists.insecure.org/nmap-hackers/2002/Apr-Jun/0008.html . Anyway, here are the most important changes since BETA36 (from CHANGELOG): o Made SYN scan the default for privileged (root) users. This offers far better performance for Windows users due to their broken connect() call, and is usually even preferred on UNIX because it is more stealthy and less likely to crash applications listening on the target host. o Fixed a problem noted by Ping Huang (pshuang () alum mit edu) relating to -PI scans of a machine's own non-localhost interfaces (eg scanning your ethernet address). o Applied patch from Patrice Goetghebeur (pgoetghebeur () mac com) which fixes PPP/SLIP support on Mac OS X. o Applied dozens of nmap-services portnumber mapping updates researched and sent by palante () subterrain net o Updated nmap-rpc to the latest version from Eilon Gishri (eilon () aristo tau ac il) o Fixed --resume option to better detect all of the previously scanned hosts in an -oN file (bug report from Adam.Scott () predictive com ) o Adjusted random IP generator (for -iR) to account for newly allocated ip space from http://www.iana.org/assignments/ipv4-address-space as noted by Chad Loder (cloder () acm org) o Updated config.sub and config.guess to the versions in automake-1.6.2 . o Applied patch from Markus A. Nonym (g17m0 () lycos com) which checks for a recent version of GTK+ in ./configure before even trying to build NmapFE (avoids the previous ugly compiler errors). o Applied patch from benkj () gmx it which fixes misbehavior when Nmap would receive EOF (including ^D) in interactive mode. o Fixed format string bugs (not the security-related kind) found by Takehiro YONEKURA (yonekura () obliguard com) and Kuk-hyeon Lee (errai () inzen com) o Applied patch from Greg Steuck (greg-nmap-dev () nest cx) which fixes an alignment problem in charpool.c that could cause bus errors on 64-bit platforms. o Applied portability fix patch from Matt Christian (mattc () visi com) For those of you running Linux/x86 w/a recent version of rpm (www.rpm.org), you can install/upgrade to the newest version of nmap/nmapfe by executing these commands as root: rpm -vhU (nmap url) where (nmap url) is one (or both) of these: http://download.insecure.org/nmap/dist/nmap-2.54BETA37-1.i386.rpm http://download.insecure.org/nmap/dist/nmap-frontend-2.54BETA37-1.i386.rpm For the rest of you, source tarballs and source RPMs are always available at: http://www.insecure.org/nmap/nmap_download.html For the more paranoid (smart) members of the list, here are the md5 hashes: 90a88abaee95ad07157d2514e9454254 nmap-2.54BETA37-1.i386.rpm 18f93d4bef50f2204697e8866b222198 nmap-2.54BETA37-1.src.rpm a42c89d42facfc52266cdda3a7f1b9e2 nmap-2.54BETA37.tgz 424c813f1e1309431e429fbb333479b3 nmap-2.54BETA37-win32.zip 9c5f620d3e2b88e901d7cf432f57180b nmap-frontend-2.54BETA37-1.i386.rpm These release notes should be signed with my PGP key, which is available at http://www.insecure.org/fyodor_gpgkey.txt . The key fingerprint is: 97 2F 93 AB 9C B0 09 80 D9 51 40 6B B9 BC E1 7E Cheers, Fyodor -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.4 (GNU/Linux) Comment: For info see http://www.gnupg.org iQCVAwUBPSv8y84dPqJTWH2VAQGN6AP9Feg76MvdewkwZs08EXa6aquqJIE2LLDQ t0NffENK/FU11VcULHRT1MwUw62p8b0WSFu7hHjnwx5fGxEwIM2kAJLYQciQ8j7N 9kUY/FObOK1kUAycwNuMrVhpfNzNsxSthFru5EvAL4Py6lKJqffubQUHT4BxiYn4 nfm7lQvPUM4= =VbHD -----END PGP SIGNATURE----- -------------------------------------------------- For help using this (nmap-hackers) mailing list, send a blank email to nmap-hackers-help () insecure org . List run by ezmlm-idx (www.ezmlm.org).
Current thread:
- Nmap 2.54BETA36 released Fyodor (Jun 13)
- <Possible follow-ups>
- Nmap 2.54BETA36 released Fyodor (Jul 10)