Nmap Announce mailing list archives
Nmap 3.25 Released!
From: Fyodor <fyodor () insecure org>
Date: Sat, 19 Apr 2003 22:34:15 -0700
-----BEGIN PGP SIGNED MESSAGE----- Hello everyone, I am pleased to announce the Nmap version 3.25 is now available! This new several features, including UDP-based "ping" scanning. It also offers minor performance advantages over previous versions and contains many important bugfixes! I have received numerous (daily) problem reports related to compiling Nmap 3.20 under Mac OS X. That group is either very big or very vocal. Unfortunately, the Sourceforge "compile farm" OS X boxes I was using are down for the indeterminate future. So if anyone can give me a temporary account, let me know and I'll send you my SSH key. Or, if you can fix the compilation problems yourself and send me a patch, that would be even better :). Here are the most important changes in 3.25: o I added UDP-based "ping" scanning. The -PU option can take an optional portlist like the TCP "ping" options (-PS, -PA), but it sends a UDP packet to the targets and expects hosts that are up to reply with a port unreachable (or possibly a UDP response if the port is open). This one is likely to work best against closed ports, since many open ports don't respond to empty requests. o Fixed (I hope) problem where Nmap would abort, complaining that "Assertion `pt->down_this_block > 0' failed". Thanks to ray () 24hoursecurity org and mugz () x-mafia com for reporting and helping me debug this problem. o Fixed a GCC dependency reported by Ayamura Kikuchi (ayamura () keio net) o Fixed an "assertion failure" which would cause Nmap to exit when you specify a --max_rtt_timeout below 3000. Thanks to Tammy Rathbun (rathbun2 () llnl gov) and Jan Roger Wilkens (jrw () proseq net) for reporting this. o Packet receive times are now obtained from libpcap rather than simply using the time the packets are passed to Nmap. This should improve performance slightly. I was not able to get this to work properly on Windows (either pcap or raw) -- join the nmap-dev list if you have ideas. o Fixed bug that caused Nmap to ignore certain RST responses when you do both -PS and -PA. o Modified ping scan to work better when many instances of Nmap are executed concurrently. o I'm now linking directly to the gzip compressed version of Nmap on the homepage as well as the .bz2. o Fixed a portability problem that caused BSD Make to bail out. o Fixed a divide by zero error caused when nonroot users (on UNIX) explicitly request ICMP pings (which require root privileges). Now it prints a warning and uses the normal nonroot TCP connect() ping. Jaroslav Sladek (jup () matfyz cz) found the bug and provided the patch. o Made Nmap more tolerant of corrupt nmap-services and nmap-protocols files thanks to report & patch sent by Phix (phix () hush com) o Added some more port numbers sent in by Seth Master (smaster () stanford edu). He has been a frequent nmap-services contributor in the last couple months. o Added --packet_trace support to Windows o Removed superfluous "addport" line in the XML output (patch from Max Schubert (nmap () webwizarddesign com)). o Merged wintcpip.cc into tcpip.cc to avoid the headache of maintaining many nearly-identical functions. o Fixed an assertion failure crash related to combining port 0 scans and OS scan. Thanks to A.Jones () mvv de for reporting this. o Fixed some compilation problems on systems without IPv6 support -- patch sent by Jochen Erwied (Jochen.Erwied () mbs-software info) o Applied patch from Jochen Erwied (Jochen.Erwied () mbs-software info) which fixes the format strings used for printing certain timestamps. o Upgraded to autoconf 2.57, including the latest config.guess/config.sub o Renamed configure.ac files to configure.in as recommended by the latest autoconf documentation. o Changed the wording of NmapFE Gnome entries to better-comply with Gnome's Human Interface Guidelines (HIG). Suggested by Axel Krauth (krauth () fmi uni-passau de) For those of you running Linux/x86 w/a recent version of rpm (www.rpm.org), you can install/upgrade to the newest version of nmap/nmapfe by executing these commands as root: rpm -vhU (nmap url) where (nmap url) is one (or both) of these: http://download.insecure.org/nmap/dist/nmap-3.25-1.i386.rpm http://download.insecure.org/nmap/dist/nmap-frontend-3.25-1.i386.rpm For the rest of you, source tarballs and source RPMs are always available at: http://www.insecure.org/nmap/nmap_download.html For the more paranoid (smart) members of the list, here are the md5 hashes: d0b2b9a1f087281d2ae05450e246ba64 nmap-3.25-1.i386.rpm b23d50b6713cf85f4e4baf4374bbdb0e nmap-3.25-1.src.rpm 667106a03d49716954328e60e0f6c007 nmap-3.25.tar.bz2 73b2c2207ebd774b2a04ac50c781f9db nmap-3.25.tgz c7e2184db1f420f9a8ecdd4a3ef12b46 nmap-3.25-win32.zip 10d43274cd0602f1ab3476dd6ca32d3c nmap-frontend-3.25-1.i386.rpm These release notes should be signed with my PGP key, which is available at http://www.insecure.org/fyodor_gpgkey.txt . The key fingerprint is: 97 2F 93 AB 9C B0 09 80 D9 51 40 6B B9 BC E1 7E Cheers, Fyodor -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.4 (GNU/Linux) Comment: For info see http://www.gnupg.org iQCVAwUBPqIw2M4dPqJTWH2VAQEUhQP8Dsit3MdtexyLTnvCL4KRM/x/Hb+gEmcg iWGawDdCwCgrPW6V5zPIquiK27engD4vGhctwiflLPIS1SGQ9zqVnC6q+gfJZC7Q h1u+o+DpCijsXH0hRb4IfgSUwjYvfeztBbPr1fzmGsw3UCFKRcpNU+hw/lbR6Xdo ay8T5/rydmc= =V69b -----END PGP SIGNATURE----- -------------------------------------------------- For help using this (nmap-hackers) mailing list, send a blank email to nmap-hackers-help () insecure org . List run by ezmlm-idx (www.ezmlm.org).
Current thread:
- Nmap 3.25 Released! Fyodor (Apr 19)