Nmap Announce mailing list archives

Season's Greetings: Nmap 3.10ALPHA9


From: Fyodor <fyodor () insecure org>
Date: Wed, 25 Dec 2002 02:17:45 -0800

-----BEGIN PGP SIGNED MESSAGE-----

Dearest $Nmap_User,

May love and peace fill your heart and home during this holiday season
and throughout the new year.  It was very difficult to come up with an
appropriate gift to express our warm regards for you, but we finally
decided on a shiny new version of Nmap.  I hope you like it!

Nmap 3.10ALPHA9 is now available.  This version contains new host
enumeration code to make your Christmas scanning less tedious!  First
of all, I applied a patch (with modest changes) by Gabriel L. Somlo
(somlo () acns colostate edu), which allows multiple TCP probe ports
rather than just one.  Then I made some changes so that ping types are
no longer exclusive -- you can now do combinations such as
"-PS22,53,80 -PT113 -PN -PE" in order to increase your odds of passing
through strict filters.  The "ping scan" algorithms have also been
restructured to be more robust for both the default case and when
using these special features.

Please give this version a try and let me know if you run into any
problems.

Here are the full new CHANGELOG entries:

o Reworked the "ping scan" algorithm (used for any scan except -P0 or
  -sL) to be more robust in the face of low-bandwidth and congested
  connections.  This also improves reliability in the multi-port and
  multi-type ping cases described below.

o "Ping types" are no longer exclusive -- you can now do combinations
  such as "-PS22,53,80 -PT113 -PN -PE" in order to increase your odds
  of passing through strict filters.  The "PB" flag is now deprecated
  since you can achieve the same result via "PE" and "PT" options.

o Applied patch (with modest changes) by Gabriel L. Somlo
  (somlo () acns colostate edu), which allows multiple TCP probe ports in
  raw (root) mode.  See the previous item for an example.

o Fixed a libpcap compilation issue noted by Josef 'Jupp' Schugt
  (deusxmachina () webmail co za) which relates to the definition (or
  lack thereof) of ARPHRD_HDLC (used for Cisco HDLC frames).

o Tweaked the version number (-V) output slightly.

For those of you running Linux/x86 w/a recent version of rpm
(www.rpm.org), you can install/upgrade to the newest version of
nmap/nmapfe by executing these commands as root:

rpm -vhU (nmap url)
where (nmap url) is one (or both) of these:

http://download.insecure.org/nmap/dist/nmap-3.10ALPHA9-1.i386.rpm
http://download.insecure.org/nmap/dist/nmap-frontend-3.10ALPHA9-1.i386.rpm

For the rest of you, source tarballs and source RPMs are always
available at: http://www.insecure.org/nmap/nmap_download.html

For the more paranoid (smart) members of the list, here are the md5
hashes:

698f9a10e3e78ff7342abe8171f3fc99  nmap-3.10ALPHA9-1.i386.rpm
dca955948603df26f961686a48f912dc  nmap-3.10ALPHA9-1.src.rpm
c36f6246e39a636a572f34bd386237b2  nmap-3.10ALPHA9.tgz
c45fe3a44a3029a01cc5283b85b8b257  nmap-frontend-3.10ALPHA9-1.i386.rpm

These release notes should be signed with my PGP key, which is available at
http://www.insecure.org/fyodor_gpgkey.txt .
The key fingerprint is: 97 2F 93 AB 9C B0 09 80 D9 51 40 6B B9 BC E1 7E

Cheers,
Fyodor

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iQCVAwUBPgmFaM4dPqJTWH2VAQFaiwP7BOBz+C3itbsxVvkIX4PVstCba+dV/u2J
lbW3UiexMp83HntAhwmKnEIQHCxQX/1eiLny4cDcTDjHEGVqN5L+LR6rYl6zfGuo
YUO0MHxGaR9OaYRbJL1NwkDqdO7VeO9qajOJq9u5Z68DB6inqWQC8OBWzOqKwZUu
gWzN3GVzxcQ=
=CXv6
-----END PGP SIGNATURE-----

--------------------------------------------------
For help using this (nmap-hackers) mailing list, send a blank email to 
nmap-hackers-help () insecure org . List run by ezmlm-idx (www.ezmlm.org).


Current thread: