Nmap Development mailing list archives
Re: SMB parallelization
From: Ron <ron () skullsecurity net>
Date: Sun, 3 Oct 2010 17:57:54 -0500
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On Wed, 29 Sep 2010 20:48:12 -0700 David Fifield <david () bamsoftware com> wrote:
I think I understand the technque you are using. I would be concerned that it could fail just by chance with large numbers of connections, but your testing with Brandon shows that it's not much of a worry. Feel free to commit it. David Fifield
Thanks, it's committed. One of the original ideas was to use no more than 10 connections (with a semaphore or something), but that seems like it would have a better chance of failing. By detecting errors and waiting, I think we're handling this in a pretty clean way. Ron -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iEYEARECAAYFAkypCnIACgkQ2t2zxlt4g/SN8ACePYrjYSPpdKJ3qKEy3EkHRXTE arwAoJeD3+efTISG8xQybXJelMZLG9+B =vs0K -----END PGP SIGNATURE----- _______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://seclists.org/nmap-dev/
Current thread:
- Re: SMB parallelization Ron (Oct 03)