diff --git a/nmap-3.81-noms.patch b/nmap-3.81-noms.patch new file mode 100644 index 0000000..f12903f --- /dev/null +++ b/nmap-3.81-noms.patch @@ -0,0 +1,65 @@ +diff -ur nmap-3.81/docs/nmap.1 nmap-3.81.noms/docs/nmap.1 +--- nmap-3.81/docs/nmap.1 2005-02-07 08:26:08.000000000 +0100 ++++ nmap-3.81.noms/docs/nmap.1 2005-08-03 14:03:50.000000000 +0200 +@@ -131,7 +131,7 @@ + on a network are up. Nmap can do this by sending ICMP echo + request packets to every IP address on the networks you + specify. Hosts that respond are up. Unfortunately, some +-sites such as microsoft.com block echo request packets. ++sites block echo request packets. + Thus nmap can also send a TCP ack packet to (by default) + port 80. If we get an RST back, that machine is up. A + third technique involves sending a SYN packet and waiting +@@ -352,12 +352,7 @@ + Do not try to ping hosts at all before scanning them. This + allows the scanning of networks that don't allow ICMP echo + requests (or responses) through their firewall. +-microsoft.com is an example of such a network, and thus you +-should always use +-.B \-P0 +-or +-.B \-PS80 +-when portscanning microsoft.com. Note that "ping" in this context may ++Note that "ping" in this context may + involve more than the traditional ICMP echo request packet. Nmap + supports many such probes, including arbitrary combinations of TCP, + UDP, and ICMP probes. By default, Nmap sends an ICMP echo request and +diff -ur nmap-3.81/docs/nmap_doc.html nmap-3.81.noms/docs/nmap_doc.html +--- nmap-3.81/docs/nmap_doc.html 2001-03-27 05:07:57.000000000 +0200 ++++ nmap-3.81.noms/docs/nmap_doc.html 2005-08-03 14:02:18.000000000 +0200 +@@ -361,7 +361,7 @@ + things up. You can change the parrallel ping lookahead with '-L' and + the ping timeout with '-T'. You can turn pinging off completely with + the '-D' command line option. This is useful for scanning networks +-like microsoft.com where ICMP echo requests can't get through. Nmap ++where ICMP echo requests can't get through. Nmap + is also capable of bailing on hosts that seem down based on strange + port scanning errors. It is also meant to be tolerant of people who + accidentally scan network addresses, broadcast addresses, etc.

+diff -ur nmap-3.81/docs/nmap_manpage.html nmap-3.81.noms/docs/nmap_manpage.html +--- nmap-3.81/docs/nmap_manpage.html 2005-02-07 09:54:33.000000000 +0100 ++++ nmap-3.81.noms/docs/nmap_manpage.html 2005-08-03 14:02:49.000000000 +0200 +@@ -130,8 +130,8 @@ + -sP Ping scanning: Sometimes you only want to know which hosts on a + network are up. Nmap can do this by sending ICMP echo request + packets to every IP address on the networks you specify. Hosts +- that respond are up. Unfortunately, some sites such as +- microsoft.com block echo request packets. Thus nmap can also ++ that respond are up. Unfortunately, some sites ++ block echo request packets. Thus nmap can also + send a TCP ack packet to (by default) port 80. If we get an RST + back, that machine is up. A third technique involves sending a + SYN packet and waiting for a RST or a SYN/ACK. For non-root +diff -ur nmap-3.81/docs/nmap.usage.txt nmap-3.81.noms/docs/nmap.usage.txt +--- nmap-3.81/docs/nmap.usage.txt 2005-02-07 09:54:32.000000000 +0100 ++++ nmap-3.81.noms/docs/nmap.usage.txt 2005-08-03 14:01:38.000000000 +0200 +@@ -12,7 +12,7 @@ + -p ports to scan. Example range: 1-1024,1080,6666,31337 + -F Only scans ports listed in nmap-services + -v Verbose. Its use is recommended. Use twice for greater effect. +- -P0 Don't ping hosts (needed to scan www.microsoft.com and others) ++ -P0 Don't ping hosts + * -Ddecoy_host1,decoy2[,...] Hide scan using many decoys + -6 scans via IPv6 rather than IPv4 + -T General timing policy + diff --git a/nmap.spec b/nmap.spec index 413ab21..fc65fb0 100644 --- a/nmap.spec +++ b/nmap.spec @@ -3,7 +3,7 @@ Summary: Network exploration tool and security scanner Name: nmap Version: 3.81 -Release: 3 +Release: 4 License: GPL Group: Applications/System Source0: http://download.insecure.org/nmap/dist/%{name}-%{version}.tar.bz2 @@ -13,6 +13,7 @@ Source3: nmapfe-48.png Patch0: inet_aton.patch Patch1: makefile.patch Patch2: nmap-3.78-gtk2.patch +Patch3: nmap-3.81-noms.patch URL: http://www.insecure.org/nmap/ BuildRoot: %{_tmppath}/%{name}-root Epoch: 2 @@ -40,6 +41,7 @@ be installed before installing nmap-frontend. %if ! %{withgtk1} %patch2 -p1 -b .gtk2 %endif +%patch3 -p1 -b .noms %build %configure --with-libpcap=/usr @@ -87,6 +89,9 @@ rm -rf $RPM_BUILD_ROOT %{_mandir}/man1/xnmap.1.gz %changelog +* Wed Aug 03 2005 Harald Hoyer - 2:3.81-4 +- removed references how to scan microsoft.com (bz #164962) + * Thu Apr 21 2005 Harald Hoyer - 2:3.81-3 - removed gtk+ requirement