Nmap Announce mailing list archives
Nmap 2.05 released!
From: Fyodor <fyodor () dhp com>
Date: Mon, 8 Feb 1999 00:13:46 -0500 (EST)
OK guys, I finally found time to compile those (hundreds of) new fingerprints you have been sending in! And while I was at it, I added some new stuff and fixed a few things. Here are the most important changes from 2.03: -- Tons of new fingerprints. The raw number of prints has grown by more than 25%. In particular, Charles M. Hannum <root () ihack net> fixed several problems with the NetBSD kernel that made it easy to fingerprint and he also sent me a huge new batch of fingerprints for various NetBSD releases down to 1.2. Other people sent NetBSD fingerprints down to 1.0. I finally got some early Linux fingerprints in as well (down to kernel 1.09). -- Nmap now comes with its own nmap-services which I created by merging the /etc/services from a bunch of systems and then adding Netbus, Back Orifice, etc. No more failing to scan SSH with -F because your lame /etc/service doesn't include it. My RedHat /etc/services contains 110 entries, the new nmap-services contains 1958. -- Increased the maximum number of OS guesses nmap will make; told nmap never to give you two matches where the OS names are byte-to-byte equivalent. Changed nmap to differentiate between "no OS matches found" and "too many OS matches to list". -- Random number generation now takes advantage of the /dev/urandom or /dev/random that most free operating systems offer (otherwise it resorts to the less secure srand()/rand()). -- Fixed an information leak in the packet TTL values (found by HD Moore <hdmoore () usa net>) -- Fixed the problem noted by Savva Uspensky about offsets used for various operating systems' PPP/SLIP headers. Due to lack of responses regarding other operating systems, I have made assumptions about what works for BSDI, NetBSD, and SOLARIS. If this version no longer works over your modem, please let me know (and tell me whether you are using SLIP or PPP and what OS you are running). -- Machine parseable logs are now more machine parseable (I now use a tab to seperate test result fields rather than the more ambiguous spaces. This may break a few things people have written which rely on the old format. Sorry. They should be easy to fix. -- Added my nmap-fingerprintinting-article.txt to the distribution in the docs directory. -- Fixed problem where nmap -sS <my_ethernet_or_ppp_ip_address> would not correctly scan localhost (due to the kernel rerouting the traffic through localhost). Nmap should now detect and work around this behavior. -- Added a CHANGELOG file to the distribution. -- Applied patch sent to my by Bill Fenner <fenner () parc xerox com> which fixes various SunOS 4.1.X compatibility problems. -- Changed the makefile 'all' target to use install rather than mkdir -p (the latter doesn't work on some systems) -- Documentation updated and clarified slightly. Like usual, I have .tgz, .rpm, and .src.rpm versions up at http://www.insecure.org/nmap/ . Start hammering away at this and let me know if you find problems! Since there is a lot of new code, I recommend upgrading to the whole new release rather than just copying the fingerprint file. Cheers, Fyodor -- Fyodor 'finger pgp () www insecure org | pgp -fka' Frustrated by firewalls? Try nmap: http://www.insecure.org/nmap/ "Hacking is not about answers. Hacking is about the path you take to find the answers." --ReDragon
Current thread:
- Nmap 2.05 released! Fyodor (Feb 07)