Nmap Announce mailing list archives
Nmap 3.15BETA2 Released!
From: Fyodor <fyodor () insecure org>
Date: Wed, 26 Feb 2003 13:24:56 -0800
-----BEGIN PGP SIGNED MESSAGE----- Hello everyone, I am pleased to announce that Nmap version 3.15BETA2 is now available. The very modest numbering difference from 3.15BETA1 belies the fact the substantial changes -- including several fun new features. We're talking "port zero" scans, arbitrary TTL settings, Windows binaries, nonroot/ipv6 connect() multiport pinging, and more! This may be the last gzip release, as I am considering moving to .tar.bz2 (I've been wanting to do this for many years, actually). Most free operating systems now include bzip2, and recent versions of tar handle it with the 'j' flag. It compresses the Nmap tarball to an impressive 20% smaller than gzip: - -rw------- 1 fyodor fyodor 1078771 Feb 26 13:05 nmap-3.15BETA2.tar.gz - -rw------- 1 fyodor fyodor 869990 Feb 26 13:04 nmap-3.15BETA2.tar.bz2 If this switch would cause you problems, please let me know. If you want to try out the .bz2 of this release, grab it from http://download.insecure.org/nmap/dist/nmap-3.15BETA2.tar.bz2 . Here are the main changes in this release: o I added support for a brand new "port" that many of you may have never scanned before! UDP & TCP "port 0" (and IP protocol 0) are now permitted if you specify 0 explicitly. An argument like "-p -40" would still scan ports 1-40. Unlike ports, protocol 0 IS now scanned by default. This now works for ping probes too (e.g., -PS, -PA). o Applied patch by Martin Kluge (martin () elxsi info) which adds --ttl option, which sets the outgoing IPv4 TTL field in packets sent via all raw scan types (including ping scans and OS detection). The patch "should work" on Windows, but hasn't been tested. A TTL of 0 is supported, and even tends to work on a LAN: 14:17:19.474293 192.168.0.42.60214 > 192.168.0.40.135: S 3265375623:3265375623(0) win 1024 [ttl 0] (id 35919, len 40) 14:17:19.474456 192.168.0.40.135 > 192.168.0.42.60214: S 2805154856:2805154856(0) ack 3265375624 win 64240 <mss 1460> (DF) (ttl 128, id 49889, len 44) o Applied patch by Gabriel L. Somlo ( somlo () acns colostate edu ) which extends the multi-ping-port functionality to nonroot and IPv6 connect() users. o I added a new --datadir command line option which allows you to specify the highest priority directory for Nmap data files nmap-services, nmap-os-fingerprints, and nmap-rpc. Any files which aren't in the given dir, will be searched for in the $NMAPDIR environmental variable, ~/nmap/, a compiled in data directory (e.g. /usr/share/nmap), and finally the current directory. o Fixed Windows (VC++ 6) compilation, thanks to patches from Kevin Davis (computerguy () cfl rr com) and Andy Lutomirski (luto () stanford edu) o Included new Latvian man page translation by "miscelerious options" (misc () inbox lv) o Fixed Solaris compilation when Sun make is used rather than GNU make. Thanks to Tom Duffy (tduffy () sun com) for assistance. o Applied patch from Stephen Bishop (sbishop () idsec co uk) which prevends certain false-positive responses when Nmap raw TCP ping scans are being run in parallel. o To emphasize the highly professional nature of Nmap, I changed all instances of "fucked up" in error message text into "b0rked". o Fixed a problem with nmap-frontend RPMs that would cause a bogus /bin/xnmap link to be created (it should only create /usr/bin/xnmap). Thanks to Juho Schultz (juho.schultz () astro helsinki fi) for reporting the problem. o I made the maximum number of allowed routes and interfaces allowed on the scanning machine dynamic rather than hardcoded #defines of 1024 and 128. You never know -- some wacko probably has that many :). For those of you running Linux/x86 w/a recent version of rpm (www.rpm.org), you can install/upgrade to the newest version of nmap/nmapfe by executing these commands as root: rpm -vhU (nmap url) where (nmap url) is one (or both) of these: http://download.insecure.org/nmap/dist/nmap-3.15BETA2-1.i386.rpm http://download.insecure.org/nmap/dist/nmap-frontend-3.15BETA2-1.i386.rpm For the rest of you, source tarballs and source RPMs are always available at: http://www.insecure.org/nmap/nmap_download.html For the more paranoid (smart) members of the list, here are the md5 hashes: 5d7fd545116e458788d3e46b3a0cd728 nmap-3.15BETA2-1.i386.rpm 9b9f5aac4eab8ed3014010111f016fb9 nmap-3.15BETA2-1.src.rpm fead4241c4ff7d02cd00c7d52f04b169 nmap-3.15BETA2.tar.bz2 e75d24c8048b580a4ebd3a30630751ce nmap-3.15BETA2.tgz ea7ce1bee644bc8312b44cab7bbc12bf nmap-3.15BETA2-win32.zip 19d4ed040194ebea8c4b4692d90c9c99 nmap-frontend-3.15BETA2-1.i386.rpm These release notes should be signed with my PGP key, which is available at http://www.insecure.org/fyodor_gpgkey.txt . The key fingerprint is: 97 2F 93 AB 9C B0 09 80 D9 51 40 6B B9 BC E1 7E Cheers, Fyodor -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.4 (GNU/Linux) Comment: For info see http://www.gnupg.org iQCVAwUBPl0wG84dPqJTWH2VAQEWgQP6AysdCGneCxi1nxtH+HHyDbfHHo2baJsZ 0h3dztOwYHietQC8mVM1fVciWnrMNq1t0BkVvErAWZvYk5l2iFdqfAU8lP5LAUjN xbU61Xtgxa73KG9xW9dUBmMNZcXDWxyVv327VxtwJBXZity8gEJnX6NbK6k8TBWn zyc2lVPuSdA= =y/ry -----END PGP SIGNATURE----- -------------------------------------------------- For help using this (nmap-hackers) mailing list, send a blank email to nmap-hackers-help () insecure org . List run by ezmlm-idx (www.ezmlm.org).
Current thread:
- Nmap 3.15BETA2 Released! Fyodor (Feb 26)