Nmap Announce mailing list archives

Nmap 3.10ALPHA4 Released


From: Fyodor <fyodor () insecure org>
Date: Mon, 11 Nov 2002 11:30:38 -0800

-----BEGIN PGP SIGNED MESSAGE-----

Hello everyone,

I am pleased to announce that Nmap version 3.10ALPHA4 is now
available!  This version offers several bug/portability fixes as well
as new German and French translations of the man pages.  Since some
mail clients weren't able to read my PGP/MIME-signed ALPHA3
announcement, it offered a few neat new features, such as
- --min_parallelism which can speed up certain scans against heavily
firewalled hosts by an order of magnitude.  Do be careful with this
one -- push it too far and your results become unreliable.  I also
added --packet_trace, which shows every packet sent and received by
Nmap in a tcpdump-like format.  This is mostly for debugging, but
could also be a valuable learning tool and a way to verify that Nmap
is doing what you expect it to.  The Idle scan technique (-sI) has
been improved significantly.

Here are the full new CHANGELOG entries:

Nmap 3.10ALPHA4

o Applied patch by Max Schubert (nmap () webwizarddesign com) which adds
  an add-port XML tag whenever a new port is found open when Nmap is
  running in verbose mode.  The new tag looks like:
  <addport state="open" portid="22" protocol="tcp"/>
  I also updated docs/nmap.dtd to recognize this new tag.

o Added German translation of Nmap manpage by Marc Ruef
  (marc.ruef () computec ch).  It is also available at
  http://www.insecure.org/nmap/data/nmap_manpage-de.html

o Includes a brand new French translation of the manpage by Sebastien
  Blanchet.  You could probably guess that it is available at
  http://www.insecure.org/nmap/data/nmap_manpage-fr.html

o Applied some patches from Chad Loder (cloder () loder us) which update
  the random IP allocation pool and improve OpenBSD support.  Some
  were from the OBSD Nmap patchlist.

o Fixed a compile problem on machines without PF_INET6.  Thanks to
  Josef 'Jupp' Schugt (deusxmachina () webmail co za) for noting this.

Nmap 3.10ALPHA3

o Added --min_parallelism option, which makes scans more aggressive
  and MUCH faster in certain situations -- especially against
  firewalled hosts.  It is basically the opposite of --max_parallelism
  (-M).  Note that reliability can be lost if you push it too far.

o Added --packet_trace option, which tells Nmap to display all of the
  packets it sends and receives in a format similar to tcpdump.  I
  mostly added this for debugging purposes, but ppl wishing to learn
  how Nmap works or for experts wanting to ensure Nmap is doing
  exactly what they epect.  If you want this feature supported under
  Windows, please send me a patch :).

o Fixed a segmentation fault in Idlescan (-sI).

o Made Idlescan timing more conservative when -P0 is specified to
  improve accuracy.

o Fixed an infinite-loop condition that could occur during certain
  dropped-packet scenarios in an Idle scan.

o Nmap now reports execution times to millisecond precision (rather
  than rouding to the nearest second).

o Fixed an infinite loop caused by invalid port arguments.  Problem
  noted by fejed (fejed () uddf net).

For those of you running Linux/x86 w/a recent version of rpm
(www.rpm.org), you can install/upgrade to the newest version of
nmap/nmapfe by executing these commands as root:

rpm -vhU (nmap url)
where (nmap url) is one (or both) of these:

http://download.insecure.org/nmap/dist/nmap-3.10ALPHA4-1.i386.rpm
http://download.insecure.org/nmap/dist/nmap-frontend-3.10ALPHA4-1.i386.rpm

For the rest of you, source tarballs and source RPMs are always
available at: http://www.insecure.org/nmap/nmap_download.html

For the more paranoid (smart) members of the list, here are the md5
hashes:

e4f94cbbc49aa0cd9f4011c1e99a2f1d  nmap-3.10ALPHA4-1.i386.rpm
ef57664ff477b5fa8e37fa0ff135f6e1  nmap-3.10ALPHA4-1.src.rpm
40689c79b53dc964f1cf31293dadf14b  nmap-3.10ALPHA4.tgz
58683bf79f3874edcd789fb2efc8a314  nmap-frontend-3.10ALPHA4-1.i386.rpm

These release notes should be signed with my PGP key, which is available at
http://www.insecure.org/fyodor_gpgkey.txt .
The key fingerprint is: 97 2F 93 AB 9C B0 09 80 D9 51 40 6B B9 BC E1 7E

Cheers,
Fyodor

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iQCVAwUBPdADkM4dPqJTWH2VAQGrVQP/ZfCjVj8Pg/zB3YbC57AvhIoU66ev6vkx
A2yLBCDaV6eR0lJKRqRjiuVVjxEExAjNJtGU6cLYHWOG//XG423lEhifZ74XKJuN
hu8mNLmpJQK159UNbEPSdjSA8ztNCDeNBe8ZKuTEkUdE7hBPrT6rKFZbMgrGrf6Q
XhbexzhBuJo=
=xc6O
-----END PGP SIGNATURE-----

--------------------------------------------------
For help using this (nmap-hackers) mailing list, send a blank email to 
nmap-hackers-help () insecure org . List run by ezmlm-idx (www.ezmlm.org).


Current thread: