Nmap Announce mailing list archives
Nmap 2.54BETA29 released
From: Fyodor <fyodor () insecure org>
Date: Fri, 10 Aug 2001 02:50:34 -0700
-----BEGIN PGP SIGNED MESSAGE----- Hello everyone, I am happy to announce that Nmap 2.54BETA29 is now available. This is a relatively important release, as it contains something for everyone: bug fixes, OS fingerprints, and a cool new feature or two! In the "new feature" department, I have integrated William McVey's multi-portlist patch. This allows you to specify different port numbers when scanning both TCP & UDP. For example, if you want to UDP scan for 53,111 and 137 while TCP scanning for 21-25,80,139,515,6000,8080 you could do: nmap -sSU -p U:53,111,137,T:21-25,80,139,515,6000,8080 target.com . Prior to this patch, you had to either use different Nmap executions or scan both UDP & TCP of each port. See the man page for more usage info. I also added a bunch of fingerprints, including Windows XP release candidates #1 & #2, OpenBSD 2.9, various home gateways/cable modem, MacOS X 10.0.4, Linux 2.4.7, Guantlet Firewall 4.0a, a few Cisco routers, and, most importantly, the Alcatel Advanced Reflexes IP Phone :). Many other fingerprints were updated as well. Thanks to everyone who submitted fingerprints! As of this release, Nmap is officially in "deep freeze" mode. I might release the next "stable" version this weekend. We have been in betas for more than a year. So please test this sucker thoroughly and let me know if you find any problems! Here are some other important changes in this release: o Found and fixed some relatively major memory leaks based on reports sent in by H D Moore (hdm () secureaustin com), mugz (mugz () x-mafia org), and Steven Van Acker (deepstar () ulyssis org) o Applied patch from Chad Loder (chad_loder () rapid7 com) which improves random target host selection (-iR) by excluding more undesirable addresses. o Fixed portscan timing bug found by H D Moore (hdm () secureaustin com). This bug can occur when you specify a --max_rtt_timeout but not --initial_rtt_timeout and then scan certain firewalled hosts. o Fixed port number printing bug found by "Stephen Leavitt" <stephen_j_leavitt () hotmail com> o The Nmap source tarball now extracts with more lenient permissions (sometimes world-readable or world-executable, but never world-writable). If you don't want this, set your umask to 077 (which is what I do). Suggested by Line Printer (lps () rahul net) For those of you running Linux/x86 w/a recent version of rpm (www.rpm.org), you can install/upgrade to the newest version of nmap/nmapfe with these commands: rpm -vhU (nmap url) where (nmap url) is one (or both) of these: http://download.insecure.org/nmap/dist/nmap-2.54BETA29-1.i386.rpm http://download.insecure.org/nmap/dist/nmap-frontend-0.2.54BETA29-1.i386.rpm source tarballs and source RPMs are always available at: http://www.insecure.org/nmap/nmap_download.html For the more paranoid (smart) members of the list, here are the md5 hashes: 3ad3238d7333a6a1dd0169d81b338a56 nmap-2.54BETA29-1.i386.rpm 690224ed82cfc4da4733ec0304bd4939 nmap-2.54BETA29-1.src.rpm 1673c0473592348163e665e673653caa nmap-2.54BETA29.tgz 9d835f87e922c1e348e04b20fe49d4b3 nmap-frontend-0.2.54BETA29-1.i386.rpm These release notes should be signed with my PGP key, which is available at http://www.insecure.org/fyodor_gpgkey.txt . The key fingerprint is: 97 2F 93 AB 9C B0 09 80 D9 51 40 6B B9 BC E1 7E Please let me know if you find any problems. Cheers, Fyodor -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.4 (GNU/Linux) Comment: For info see http://www.gnupg.org iQCVAwUBO3Ot6s4dPqJTWH2VAQET1gP/dTFnA7484KT5VeZWTRFQYaBbs1Iq/Fgj 9wI/mCNx5jjbVc33t7BEKk0tGyC1g4DPQkCz3LaR0QpMu4IN+7ciiaS981EB9cYY cHrbQs7LbJ/K5zde1JQD90D9JeQbaKg0qB1zzwAA113mn1J2Coem3z3G5PSCPn3e ruz1p6wjAk4= =YEdW -----END PGP SIGNATURE----- -------------------------------------------------- For help using this (nmap-hackers) mailing list, send a blank email to nmap-hackers-help () insecure org . List run by ezmlm-idx (www.ezmlm.org).
Current thread:
- Nmap 2.54BETA29 released Fyodor (Aug 10)