Nmap Development mailing list archives

Re: Proposed SSL version detection probe changes


From: Brandon Enright <bmenrigh () ucsd edu>
Date: Tue, 17 Feb 2009 22:06:52 +0000

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Tue, 17 Feb 2009 22:02:19 +0000
Brandon Enright <bmenrigh () ucsd edu> wrote:


I was surveying 443, 465, 636, 990, 993 and 995.  If I get a moment to
breath today I'll do a survey of those ports across campus and report
the number of non-v2 services.

Brandon


Sorry I rushed that email.  I should have also said that with version
scanning, we want to support lots of protocols/services that aren't just
HTTPS.  If we can make a semi-simple change that maintains backwards
compatibility with the current system and fingerprints and isn't too
much of a hack we should probably think about doing it.

As with a lot of things on my "wish list", it would be best if I just
wrote a patch.  Code speaks a lot louder than words.  Until
"international hack UCSD month(s)" is/are over I just won't have time to
get to a lot of my Nmap TODO list.

Brandon

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.9 (GNU/Linux)

iEYEARECAAYFAkmbNPwACgkQqaGPzAsl94IFVgCgwEEX317g3ZJQPok0xN8F+dhR
xocAoIjCRcr1YyKBkpYw00psL1bfTBkn
=DiHn
-----END PGP SIGNATURE-----

_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://SecLists.Org


Current thread: