Nmap Development mailing list archives
Re: [RFC][NSE] Modify shortport.ssl and shortport.http to avoid tcpwrapped services
From: Daniel Miller <bonsaiviking () gmail com>
Date: Fri, 14 Sep 2012 21:15:51 -0500
On Fri, Sep 14, 2012 at 4:40 PM, David Fifield <david () bamsoftware com> wrote:
"if Version detection labels a service http": it already does that. "http" is in LIKELY_HTTP_SERVICES. I think the check return port.version.name == "http" is redundant.
Of course, I should have caught that. Thanks for pointing it out. I think the new function would then be: http = function(host, port) return (port.version.name ~= "tcpwrapped" and port_or_service(LIKELY_HTTP_PORTS, LIKELY_HTTP_SERVICES)(host, port)) end Dan _______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://seclists.org/nmap-dev/
Current thread:
- [RFC][NSE] Modify shortport.ssl and shortport.http to avoid tcpwrapped services Daniel Miller (Sep 14)
- Re: [RFC][NSE] Modify shortport.ssl and shortport.http to avoid tcpwrapped services David Fifield (Sep 14)
- Re: [RFC][NSE] Modify shortport.ssl and shortport.http to avoid tcpwrapped services Daniel Miller (Sep 14)
- Re: [RFC][NSE] Modify shortport.ssl and shortport.http to avoid tcpwrapped services Daniel Miller (Sep 17)
- Re: [RFC][NSE] Modify shortport.ssl and shortport.http to avoid tcpwrapped services David Fifield (Sep 14)