Nmap Announce mailing list archives
Nmap 2.54BETA31 released!
From: Fyodor <fyodor () insecure org>
Date: Wed, 20 Mar 2002 00:14:39 -0800
-----BEGIN PGP SIGNED MESSAGE----- Hello everyone, I am happy to announce that Nmap 2.54BETA31 is now available. It contains a number of important fixes and updates which I have been sitting on for far too long :). I also snuck in some new features. Here are the CHANGELOG entries o Added ICMP Timestamp and Netmask ping types (-PP and -PM). These (especially timestamp) can be useful against some hosts that do not respond to normal ping (-PI) packets. o Documented the --data_length option and made it work with all the ICMP ping types (echo request, netmask, and timestamp). o Added check for strings.h before including it in portlist.c . This fixes a compilation problem on some versions of Windows. Problem first noted by "Michael Vorin" <mvorin () hotmail com> o Applied patch from Andy Lutomirski (Luto () myrealbox com) which fixes a crash on some Windows platforms when timeouts occur. o Fixed "grepable output" (-oG) so that it prints IPID sequence class rather than printing the TCP ISN sequence index twice. Problem noted by Russell Fulton (r.fulton () auckland ac nz) o Added mysterious, undocumented --scanflags option. o Applied patch from Andy Lutomirski (Luto () myrealbox com) which fixes some important Windows bugs. Apparently this can cause a dramatic speedup in some circumstances. The patch had other misc. changes too. o Fix bug noted by Chris V (iselldrugstokidsonline () yahoo com) in which Nmap could segmentation fault with the (bogus) command: './nmap -sO -p 1-65535 hostname' (protocol only can go up to 255). That being said, Nmap should never segfault just because of bogus options. o Fixed problem noted by Maximiliano (emax25 () arnet com ar) where Nmap would get stuck in a (nearly) infinite loop when you try to "resume" a random host (-iR) scan. o Included a number of fingerprint updates, but I still have many more web submissions to go through. Also made some nmap-services portlist updates. o Included a bunch of fixes (mostly to prevent compiler warnings) from William McVey (wam () cisco com) For those of you running Linux/x86 w/a recent version of rpm (www.rpm.org), you can install/upgrade to the newest version of nmap/nmapfe with these commands: rpm -vhU (nmap url) where (nmap url) is one (or both) of these: http://download.insecure.org/nmap/dist/nmap-2.54BETA30-1.i386.rpm http://download.insecure.org/nmap/dist/nmap-frontend-0.2.54BETA30-1.i386.rpm For the rest of you, source tarballs and source RPMs are always available at: http://www.insecure.org/nmap/nmap_download.html For the more paranoid (smart) members of the list, here are the md5 hashes: f0d363b32bab910ea195502322a43cca nmap-2.54BETA31.tgz e46cccf35721870cce969494187829ad nmap-2.54BETA31-1.i386.rpm 801d8df405c473ad02df2bdf380abae9 nmap-2.54BETA31-1.src.rpm ae8cd0f857073d6c6177921ab5316aec nmap-frontend-0.2.54BETA31-1.i386.rpm These release notes should be signed with my PGP key, which is available at http://www.insecure.org/fyodor_gpgkey.txt . The key fingerprint is: 97 2F 93 AB 9C B0 09 80 D9 51 40 6B B9 BC E1 7E Please let me know if you find any problems. Cheers, Fyodor -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.4 (GNU/Linux) Comment: For info see http://www.gnupg.org iQCVAwUBPJhDws4dPqJTWH2VAQGZuwQAkwLzoCxeWW5wCq0EgRoiCq6fGetbXhxK BpAFejM1RClU9PIMRSxb8Fi0RZRUptYWldt0v8OMgzg3aR60m4/xXmM64roCj6my UAGOJyGOb753CaMElAAZhFMhTNkAki/Viggetz2Mk5Pf4/qtosZ5C7dVc9yzEyWM Jrm2SFLi8Lg= =5ok3 -----END PGP SIGNATURE----- -------------------------------------------------- For help using this (nmap-hackers) mailing list, send a blank email to nmap-hackers-help () insecure org . List run by ezmlm-idx (www.ezmlm.org).
Current thread:
- Nmap 2.54BETA31 released! Fyodor (Mar 20)
- Re: Nmap 2.54BETA31 released! Fyodor (Mar 20)