Nmap Announce mailing list archives

Nmap 2.54BETA33 released!


From: Fyodor <fyodor () insecure org>
Date: Fri, 26 Apr 2002 15:45:07 -0700

-----BEGIN PGP SIGNED MESSAGE-----

Hello everyone,

I am pleased to announce that Nmap version 2.54BETA33 is now
available.  This version contains a huge OS fingerprint update --
thanks to the many hundreds of people who submitted fingerprints!  In
addition, I think we are finally close to an actual _stable_ (nonbeta)
release.  So testing this release is particularly crucial.  Let me
know if you find any bugs!

I am also very interested in adjusting the fingerprint names to more
precisely reflect the devices they actually match.  So please let me
know if Nmap misidentifies a box that you *know* is a different OS.
For example, if you scan an AIX 4.3.3.1 box and Nmap says "AIX
4.3.3.0", let me know at fyodor () insecure org .  Please try to send
your report in this format:

IP address: [ skip this if internal or you don't want me scanning it]
Nmap Version: [ Only send reports if you are using 2.54BETA33 or
                newer]
Box is: [Complete description of OS and version ]
Nmap said: [Please provide the full Nmap output for that host,
            scrubbing the IP addreses is OK.  ]

Please only send these reports if you are sure about what the box is
running.  And be specific -- reports like "It is Windows" or "Linux"
don't help much.  "Linux 2.4.18 (X86)" or "Windows XP Pro Corporate"
is much better.

Here are the BETA33 CHANGELOG entries:

o Tons of OS fingerprint updates.  More than 100 fingerprints added or
  changed, including OpenBSD 3, FreeBSD 4.5, Solaris 9 pre-release,
  Commodor 64 (with the TFE Ethernet Card and uIP stack), Compaq iPAQ,
  Cisco IOS 12.2(8), AIX 5.1, IRIX 6.5.15, various
  Redback/Racal/Juniper/BigIP/HP/Siemens/Brocade/Quantum devices,
  numerous printers/switches, KRONOS network clock, WTI Network Power
  Switch, Windows XP, and many more.  Thanks to everyone who
  contributed!

o Applied fix for an important RPC scanning bug sent in by Pasi Eronen
  (pasi.eronen () nixu com)

o Applied fix for nasty OS fingerprinting bug found by William
  Robertson (wkr () cs ucsb edu)

o Do not show uptime when obviously spoofed (eg OpenBSD 3.0)

o Slightly changed (I hope improved) the whitespace in Nmap output so
  that messages relating to the same host are kept together (and
  different hosts different separated by newlines).

o Moved main() function into a new file, cleverly named main.c.


For those of you running Linux/x86 w/a recent version of rpm
(www.rpm.org), you can install/upgrade to the newest version of
nmap/nmapfe by executing these commands as root:

rpm -vhU (nmap url)
where (nmap url) is one (or both) of these:

http://download.insecure.org/nmap/dist/nmap-2.54BETA33-1.i386.rpm
http://download.insecure.org/nmap/dist/nmap-frontend-0.2.54BETA33-1.i386.rpm

For the rest of you, source tarballs and source RPMs are always
available at: http://www.insecure.org/nmap/nmap_download.html

For the more paranoid (smart) members of the list, here are the md5
hashes:

f96f26cc7bae42814cb2e346869293d1 nmap-2.54BETA33-1.i386.rpm
0ad1b16c725d0a9cd43e49ac626e5339 nmap-2.54BETA33-1.src.rpm
4d82a7feb1ef5865900a8843935a7f63 nmap-2.54BETA33.tgz
3dc9f70b21666e4a1b6dd4b622277051 nmap-frontend-0.2.54BETA33-1.i386.rpm

These release notes should be signed with my PGP key, which is available at
http://www.insecure.org/fyodor_gpgkey.txt .
The key fingerprint is: 97 2F 93 AB 9C B0 09 80 D9 51 40 6B B9 BC E1 7E

Cheers,
Fyodor

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iQCVAwUBPMnV8s4dPqJTWH2VAQFY6wP7BrL7dUY8I2+PDkkGv6ZDspdl5/YA5jRR
cIF38G8vpO7UJcmlrC51a2RzNesDnSmkyn7sZAnr9XdJBaA8gYHnDVi9UfLw+s7E
4lhRq5vhmLVwRB/lvuz03c2ao1XkJAX/aeOz7Bj5ihMigReZOqbooAI7xhcJTmn0
+vA43L/qkcw=
=LjnM
-----END PGP SIGNATURE-----

--------------------------------------------------
For help using this (nmap-hackers) mailing list, send a blank email to 
nmap-hackers-help () insecure org . List run by ezmlm-idx (www.ezmlm.org).


Current thread: