Nmap Announce mailing list archives

Nmap 2.05 released!


From: Fyodor <fyodor () dhp com>
Date: Mon, 8 Feb 1999 00:13:46 -0500 (EST)


OK guys, I finally found time to compile those (hundreds of) new
fingerprints you have been sending in!  And while I was at it, I added
some new stuff and fixed a few things.  Here are the most important
changes from 2.03:

-- Tons of new fingerprints.  The raw number of prints has grown by
   more than 25%.  In particular, Charles M. Hannum <root () ihack net>
   fixed several problems with the NetBSD kernel that made it easy to
   fingerprint and he also sent me a huge new batch of fingerprints for
   various NetBSD releases down to 1.2.  Other people sent NetBSD
   fingerprints down to 1.0.  I finally got some early Linux fingerprints
   in as well (down to kernel 1.09).

-- Nmap now comes with its own nmap-services which I created by
   merging the /etc/services from a bunch of systems and then adding
   Netbus, Back Orifice, etc.  No more failing to scan SSH with -F
   because your lame /etc/service doesn't include it.  My RedHat
   /etc/services contains 110 entries, the new nmap-services contains
   1958.

-- Increased the maximum number of OS guesses nmap will make; told
   nmap never to give you two matches where the OS names are
   byte-to-byte equivalent.  Changed nmap to differentiate between "no
   OS matches found" and "too many OS matches to list".

-- Random number generation now takes advantage of the /dev/urandom or
   /dev/random that most free operating systems offer (otherwise it
   resorts to the less secure srand()/rand()).

-- Fixed an information leak in the packet TTL values (found by 
   HD Moore <hdmoore () usa net>)

-- Fixed the problem noted by Savva Uspensky about offsets used for
   various operating systems' PPP/SLIP headers.  Due to lack of
   responses regarding other operating systems, I have made
   assumptions about what works for BSDI, NetBSD, and SOLARIS.  If
   this version no longer works over your modem, please let me know
   (and tell me whether you are using SLIP or PPP and what OS you are
   running).

-- Machine parseable logs are now more machine parseable (I now use a
   tab to seperate test result fields rather than the more ambiguous
   spaces.  This may break a few things people have written which rely
   on the old format.  Sorry.  They should be easy to fix.

-- Added my nmap-fingerprintinting-article.txt to the distribution in
   the docs directory.

-- Fixed problem where nmap -sS <my_ethernet_or_ppp_ip_address> would
   not correctly scan localhost (due to the kernel rerouting the
   traffic through localhost).  Nmap should now detect and work around
   this behavior.

-- Added a CHANGELOG file to the distribution.

-- Applied patch sent to my by Bill Fenner <fenner () parc xerox com>
   which fixes various SunOS 4.1.X compatibility problems.

-- Changed the makefile 'all' target to use install rather than 
   mkdir -p (the latter doesn't work on some systems)

-- Documentation updated and clarified slightly.

Like usual, I have .tgz, .rpm, and .src.rpm versions up at
http://www.insecure.org/nmap/  .  Start hammering away at this and let me
know if you find problems!  Since there is a lot of new code, I recommend
upgrading to the whole new release rather than just copying the
fingerprint file.

Cheers,
Fyodor


--
Fyodor                            'finger pgp () www insecure org | pgp -fka'
Frustrated by firewalls?          Try nmap: http://www.insecure.org/nmap/
"Hacking is not about answers. Hacking is about the path you take to find
 the answers." --ReDragon



Current thread: