changelog

来自「Ubuntu packages of security software。 相」· 代码 · 共 1,379 行 · 第 1/5 页

TXT
1,379
字号
Nmap 4.02ALPHA1o Added the --log-errors option, which causes most warnings and error  messages that are printed to interactive-mode output (stdout/stderr)  to also be printed to the normal-format output file (if you  specified one).  This will not work for most errors related to bad  command-line arguments, as Nmap may not have initialized its output  files yet.  In addition, some Nmap error/warning messages use a  different system that does not yet support this option.o Rewrote much of the Nmap results output functions to be more  efficient and support --log-errors.o Fixed a flaw in the scan engine which could (in rare cases)  lead to a deadlock situation that prevents a scan from completing.  Thanks to Ganga Bhavani (GBhavani(a)everdreamcorp.com) for reporting  and helping to debug the problem.o If the pcap_open_live() call (initiates sniffing) fails, Nmap now  tries up to two more times after waiting a little while. This is  attempt to work around a rare bug on Windows in which the  pcap_open_live() fails for unknown reasons.o Fixed a flaw in the runtime interaction in which Nmap would include  hosts currently being scanned in the number of hosts "completed"  statistic.o Fixed a crash in OS scan which could occur on Windows when a DHCP  lease issue causes the system to lose its IP address.  Nmap still  quits, but at least it gives a proper error message now.  Thanks to  Ganga Bhavani (GBhavani(a)everdreamcorp.com) for the patch.o Applied more than half a dozen small code cleanup patches from  Kris Katterjohn (kjak(a)ispwest.com).o Modified the configure script to accept CXX when specified as an  absolute path rather than just the executable name.  Thanks to  Daniel Roethlisberger (daniel(a)roe.ch) for this patch.Nmap 4.01o Fixed a bug that would cause bogus reverse-DNS resolution on  big-endian machines.  Thanks to Doug Hoyte, Seth Miller, Tony Doan,  and Andrew Lutomirsky for helping to debug and patch the problem.o Fixed an important memory leak in the raw ethernet sending system.  Thanks to Ganga Bhavani (GBhavani(a)everdreamcorp.com) for  identifying the bug and sending a patch.o Fixed --system-dns option so that --system_dns works too.  Error  messages were changed to reflect the former (preferred) name.  Thanks to Sean Swift (sean.swift(a)bradford.gov.uk) and Peter  VanEeckhoutte (Peter.VanEeckhoutte(a)saraleefoodseurope.com) for  reporting the problem.o Fixed a crash which would report this message:  "NmapOutputTable.cc:143: void NmapOutputTable::addItem(unsigned int,  unsigned int, bool, const char*, int): Assertion `row < numRows'  failed."  Thanks to Jake Schneider (Jake.Schneider(a)dynetics.com) for  reporting and helping to debug the problem.o Whenever Nmap sends packets with the SYN bit set (except for OS  detection), it now includes the maximum segment size (MSS) tcp  option with a value of 1460.  This makes it stand out less as almost  all hosts set at least this option.  Thanks to Juergen Schmidt  (ju(a)heisec.de) for the suggestion.o Applied a patch for a Windows interface reading bug in the aDNS  subsystem from Doug Hoyte.o Minor changes to recognize DragonFly BSD in configure  scripts. Thanks to Joerg Sonnenberger (joerg(a)britannica.bec.de)  for sending the patch.o Fixed a minor bug in an error message starting with "eth_send of ARP  packet returned".  Thanks to J.W. Hoogervorst  (J.W.Hoogervorst(a)uva.nl) for finding this.Nmap 4.00o Added the '?' command to the runtime interaction system.  It prints a  list of accepted commands.  Thanks to Andrew Lutomirski  (luto(a)myrealbox.com) for the patch.o See the announcement at  http://www.insecure.org/stf/Nmap-4.00-Release.html for high-level  changes since 3.50.Nmap 3.9999o Generated a new libpcre/configure to cope with changes in LibPCRE  6.4o Updated nmap-mac-prefixes to reflect the latest OUI DB from the IEEE  (http://standards.ieee.org/regauth/oui/oui.txt)o Updated nmap-protocols with the latest IEEE internet protocols  assignments (http://www.iana.org/assignments/protocol-numbers).o Updated the Nmap version number and related fields that MS Visual  Studio places in the binary.  This was done by editing  mswin32/nmap.rc.Nmap 3.999o Added runtime interaction support to Windows, thanks to patches from  Andrew Lutomirski (luto(a)myrealbox.com) and Gisle Vanem (giva(a)bgnett.no).o Changed a couple lines of tcpip.cc (put certain IP header fields in  host byte order rather than NBO) to (hopefully) support Mac OS X on  Intel.  Thanks to Kurt Grutzmacher (grutz(a)jingojango.net) for the  patch.o Upgraded the included LibPCRE from version 6.3 to 6.4.  There was a  report of version detection crashes on the new Intel-based MACs with  6.3.o Fixed an issue in which the installer would malfunction in rare  issues when installing to a directory with spaces in it.  Thanks to  Thierry Zoller (Thierry(a)Zoller.lu) for the report.Nmap 3.99o Integrated all remaining 2005 service submissions.  The DB now has  surpassed 3,000 signatures for the first time.  There now are 3,153  signatures for 381 service protocols.  Those protocols span the  gamut from abc, acap, afp, and afs to zebedee, zebra, and  zenimaging.  It even covers obscure protocols such as http, ftp,  smtp, and ssh :).  Thanks to Version Detection Czar Doug Hoyte for  his excellent work on this.o Created a Windows executable installer using the open source NSIS  (Nullsoft Scriptable Install System).  It handles Pcap installation,  registry performance changes, and adding Nmap to your cmd.exe  executable path.  The installer source files are in mswin32/nsis/ .  Thanks to Google SoC student Bo Jiang (jiangbo(a)brandeis.edu) for  creating the initial version.o Fixed a backward compatibility bug in which Nmap didn't recognize  the --min_rtt_timeout option (it only recognized the newly  hyphenated --min-rtt-timeout).  Thanks to Joshua D. Abraham  (jabra(a)ccs.neu.edu) for the bug report.o Fixed compilation to again work with gcc-derivatives such as  MingW. Thanks to Gisle Vanem (giva(a)bgnett.no) for sending the  patchesNmap 3.98BETA1o Added run time interaction as documented at  http://www.insecure.org/nmap/man/man-runtime-interaction.html .  While Nmap is running, you can now press 'v' to increase verbosity,  'd' to increase the debugging level, 'p' to enable packet tracing,  or the capital versions (V,D,P) to do the opposite.  Any other key  (such as enter) will print out a status message giving the estimated  time until scan completion.  This only works on UNIX for now.  Do we  have any volunteers to add Windows support?  You would need to  change a handful of UNIX-specific termio calls with the Windows  equivalents.  This feature was created by Paul Tarjan  (ptarjan(a)stanford.edu) as part of the Google Summer of Code.o Reverse DNS resolution is now done in parallel rather than one at a  time.  All scans of large networks (particularly list, ping and  just-a-few-ports scans) should benefit substantially from this  change.  If you encounter any problems, please let us know.  The new  --system_dns option was added so you can use the (slow) system  resolver if you prefer that for some reason.  You can specify a  comma separated list of DNS server IP addresses for Nmap to use with  the new --dns_servers option.  Otherwise, Nmap looks in  /etc/resolve.conf (UNIX) or the system registry (Windows) to obtain  the nameservers already configured for your system.  This excellent  patch was written by Doug Hoyte (doug(a)hcsw.org).o Added the --badsum option, which causes Nmap to use invalid TCP or  UDP checksums for packets sent to target hosts. Since virtually all  host IP stacks properly drop these packets, any responses received  are likely coming from a firewall or IDS that didn't bother to  verify the checksum. For more details on this technique, see  http://www.phrack.org/phrack/60/p60-0x0c.txt .  The author of that  paper, Ed3f (ed3f(a)antifork.org), is also the author of this patch  (which I changed it a bit).o The 26 Nmap commands that previously included an underscore  (--max_rtt_timeout, --send_eth, --host_timeout, etc.) have been  renamed to use a hyphen in the preferred format  (i.e. --max-rtt-timeout).  Underscores are still supported for  backward compatibility.o More excellent NmapFE patches from Priit Laes (amd(a)store20.com)  were applied to remove all deprecated GTK API calls.  This also  eliminates the annoying Gtk-Critical and Gtk-WARNING runtime messages.o Changed the way the __attribute__ compiler extension is detected so  that it works with the latest Fedora Core 4 updates (and perhaps other  systems).  Thanks to Duilio Protti (dprotti(a)fceia.unr.edu.ar) for  writing the patch.  The compilation error message this fixes was  usually something like: "nmap.o(.rodata+0x17c): undefined reference  to `__gthrw_pthread_cancel(unsigned long)"o Added some exception handling code to mswin32/winfix.cc to prevent  Nmap from crashing mysteriously when you have WinPcap 3.0 or earlier  (instead of the required 3.1).  It now prints an error message instead  asking you to upgrade, then reduces functionality to connect()-only  mode.  I couldn't get it working with the C++ standard try/catch()  blocks, but as soon as I used the nonstandard MS conventions  (__try/__except(), everything worked fine. Shrug.o Stripped the firewall API out of the libdnet included with Nmap  because Nmap doesn't use it anyway.  This saves space and reduces the  likelihood of compilation errors and warnings.o Modified the previously useless --noninteractive option so that it  deactivates runtime interaction.Nmap 3.96BETA1o Added --max_retries option for capping the maximum number of  retransmissions the port scan engine will do. The value may be as low  as 0 (no retransmits).  A low value can increase speed, though at the  risk of losing accuracy.  The -T4 option now allows up to 6 retries,  and -T5 allows 2.  Thanks to Martin Macok  (martin.macok(a)underground.cz) for writing the initial patch, which I  changed quite a bit.  I also updated the docs to reflect this neat  new option.o Many of the Nmap low-level timing options take a value in  milliseconds.  You can now append an 's', 'm', or 'h' to the value  to give it in seconds, minutes, or hours instead.  So you can specify a  45 minute host timeout with --host_timeout 45m rather than specifying  --host_timeout 2700000 and hoping you did the math right and have the   correct number of zeros.  This also now works for the  --min_rtt_timeout, --max_rtt_timeout, --initial_rtt_timeout,  --scan_delay, and --max_scan_delay options.o Improved the NmapFE port to GTK2 so it better-conforms to the new  API and you don't get as many annoying messages in your terminal  window.  GTK2 is prettier and more functional too.  Thanks to Priit  Laes (amd(a)store20.com) for writing these  excellent patches.o Fixed a problem which led to the error message "Failed to determine  dst MAC address for target" when you try to run Nmap using a  dialup/PPP adapter on Windows rather than a real ethernet card.  Due  to Microsoft breaking raw sockets, Nmap no longer supports dialup  adapters, but it should now give you a clearer error message than  the "dst MAC address" nonsense.o Debian GNU/kFreeBSD is now supported thanks to a patch to libdnet's  configure.in by Petr Salinger (Petr.Salinger(a)t-systems.cz).o Tried to update to the latest autoconf only to find that there  hasn't been a new version in more than two years :(.  I was able to  find new config.sub and config.guess files at  http://cvs.savannah.gnu.org/viewcvs/config/config/ , so I updated to  those.o Fixed a problem with the -e option when run on Windows (or UNIX with  --send_eth) when run on an ethernet network against an external  (routed) host.  You would get the message "NmapArpCache() can only  take IPv4 addresses.  Sorry".  Thanks to KX (kxmail(a)gmail.com) for  helping to track down the problem.o Made some changes to allow source port zero scans (-g0).  Nmap used  to refuse to do this, but now it just gives a warning that it may not  work on all systems.  It seems to work fine on my Linux box.  Thanks  to Bill Dale (bill_dale(a)bellsouth.net) for suggesting this feature.o Made a change to libdnet so that Windows interfaces are listed as  down if they are disconnected, unplugged, or otherwise unavailable.o Ceased including foreign translations in the Nmap tarball as they  take up too much space.  HTML versions can be found at  http://www.insecure.org/nmap/docs.html , while XML and NROFF versions  are available from http://www.insecure.org/nmap/data/man-xlate/ .o Changed INSTALL and README-WIN32 files to mostly just reference the

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?