From eb87a6dfe195067743fdbf6cd2b6c5859c885d03 Mon Sep 17 00:00:00 2001 From: Harald Hoyer Date: Mon, 19 Dec 2005 10:52:00 +0000 Subject: [PATCH] version 3.95 --- .cvsignore | 2 +- nmap-3.81-noms.patch | 87 +++++++++++--------------------------------- nmap.spec | 18 ++++----- sources | 2 +- 4 files changed, 31 insertions(+), 78 deletions(-) diff --git a/.cvsignore b/.cvsignore index 8641e2b..9c856a0 100644 --- a/.cvsignore +++ b/.cvsignore @@ -1 +1 @@ -nmap-3.93.tar.bz2 +nmap-3.95.tgz diff --git a/nmap-3.81-noms.patch b/nmap-3.81-noms.patch index f12903f..1dada68 100644 --- a/nmap-3.81-noms.patch +++ b/nmap-3.81-noms.patch @@ -1,65 +1,22 @@ -diff -ur nmap-3.81/docs/nmap.1 nmap-3.81.noms/docs/nmap.1 ---- nmap-3.81/docs/nmap.1 2005-02-07 08:26:08.000000000 +0100 -+++ nmap-3.81.noms/docs/nmap.1 2005-08-03 14:03:50.000000000 +0200 -@@ -131,7 +131,7 @@ - on a network are up. Nmap can do this by sending ICMP echo - request packets to every IP address on the networks you - specify. Hosts that respond are up. Unfortunately, some --sites such as microsoft.com block echo request packets. -+sites block echo request packets. - Thus nmap can also send a TCP ack packet to (by default) - port 80. If we get an RST back, that machine is up. A - third technique involves sending a SYN packet and waiting -@@ -352,12 +352,7 @@ - Do not try to ping hosts at all before scanning them. This - allows the scanning of networks that don't allow ICMP echo - requests (or responses) through their firewall. --microsoft.com is an example of such a network, and thus you --should always use --.B \-P0 --or --.B \-PS80 --when portscanning microsoft.com. Note that "ping" in this context may -+Note that "ping" in this context may - involve more than the traditional ICMP echo request packet. Nmap - supports many such probes, including arbitrary combinations of TCP, - UDP, and ICMP probes. By default, Nmap sends an ICMP echo request and -diff -ur nmap-3.81/docs/nmap_doc.html nmap-3.81.noms/docs/nmap_doc.html ---- nmap-3.81/docs/nmap_doc.html 2001-03-27 05:07:57.000000000 +0200 -+++ nmap-3.81.noms/docs/nmap_doc.html 2005-08-03 14:02:18.000000000 +0200 -@@ -361,7 +361,7 @@ - things up. You can change the parrallel ping lookahead with '-L' and - the ping timeout with '-T'. You can turn pinging off completely with - the '-D' command line option. This is useful for scanning networks --like microsoft.com where ICMP echo requests can't get through. Nmap -+where ICMP echo requests can't get through. Nmap - is also capable of bailing on hosts that seem down based on strange - port scanning errors. It is also meant to be tolerant of people who - accidentally scan network addresses, broadcast addresses, etc.

-diff -ur nmap-3.81/docs/nmap_manpage.html nmap-3.81.noms/docs/nmap_manpage.html ---- nmap-3.81/docs/nmap_manpage.html 2005-02-07 09:54:33.000000000 +0100 -+++ nmap-3.81.noms/docs/nmap_manpage.html 2005-08-03 14:02:49.000000000 +0200 -@@ -130,8 +130,8 @@ - -sP Ping scanning: Sometimes you only want to know which hosts on a - network are up. Nmap can do this by sending ICMP echo request - packets to every IP address on the networks you specify. Hosts -- that respond are up. Unfortunately, some sites such as -- microsoft.com block echo request packets. Thus nmap can also -+ that respond are up. Unfortunately, some sites -+ block echo request packets. Thus nmap can also - send a TCP ack packet to (by default) port 80. If we get an RST - back, that machine is up. A third technique involves sending a - SYN packet and waiting for a RST or a SYN/ACK. For non-root -diff -ur nmap-3.81/docs/nmap.usage.txt nmap-3.81.noms/docs/nmap.usage.txt ---- nmap-3.81/docs/nmap.usage.txt 2005-02-07 09:54:32.000000000 +0100 -+++ nmap-3.81.noms/docs/nmap.usage.txt 2005-08-03 14:01:38.000000000 +0200 -@@ -12,7 +12,7 @@ - -p ports to scan. Example range: 1-1024,1080,6666,31337 - -F Only scans ports listed in nmap-services - -v Verbose. Its use is recommended. Use twice for greater effect. -- -P0 Don't ping hosts (needed to scan www.microsoft.com and others) -+ -P0 Don't ping hosts - * -Ddecoy_host1,decoy2[,...] Hide scan using many decoys - -6 scans via IPv6 rather than IPv4 - -T General timing policy - +--- nmap-3.95/docs/nmap.usage.txt.noms 2005-12-08 09:20:22.000000000 +0100 ++++ nmap-3.95/docs/nmap.usage.txt 2005-12-19 11:44:03.000000000 +0100 +@@ -2,7 +2,7 @@ + Usage: nmap [Scan Type(s)] [Options] {target specification} + TARGET SPECIFICATION: + Can pass hostnames, IP addresses, networks, etc. +- Ex: scanme.nmap.org, microsoft.com/24, 192.168.0.1; 10.0.0-255.1-254 ++ Ex: scanme.nmap.org, 192.168.0.1; 10.0.0-255.1-254 + -iL : Input from list of hosts/networks + -iR : Choose random targets + --exclude : Exclude hosts/networks +--- nmap-3.95/docs/nmap.1.noms 2005-12-08 09:20:29.000000000 +0100 ++++ nmap-3.95/docs/nmap.1 2005-12-19 11:43:01.000000000 +0100 +@@ -94,7 +94,7 @@ + Usage: nmap [Scan Type(s)] [Options] {target specification} + TARGET SPECIFICATION: + Can pass hostnames, IP addresses, networks, etc. +- Ex: scanme.nmap.org, microsoft.com/24, 192.168.0.1; 10.0.0\-255.1\-254 ++ Ex: scanme.nmap.org, 192.168.0.1; 10.0.0\-255.1\-254 + \-iL : Input from list of hosts/networks + \-iR : Choose random targets + \-\-exclude : Exclude hosts/networks diff --git a/nmap.spec b/nmap.spec index 2efa175..0623011 100644 --- a/nmap.spec +++ b/nmap.spec @@ -1,18 +1,15 @@ -%{!?withgtk1:%define withgtk1 0} - Summary: Network exploration tool and security scanner Name: nmap -Version: 3.93 -Release: 3.1 +Version: 3.95 +Release: 1 License: GPL Group: Applications/System -Source0: http://download.insecure.org/nmap/dist/%{name}-%{version}.tar.bz2 +Source0: http://download.insecure.org/nmap/dist/%{name}-%{version}.tgz Source1: nmapfe.desktop Source2: nmapfe-32.png Source3: nmapfe-48.png Patch0: inet_aton.patch Patch1: makefile.patch -Patch2: nmap-3.78-gtk2.patch Patch3: nmap-3.81-noms.patch Patch4: nmap-3.93-attr.patch URL: http://www.insecure.org/nmap/ @@ -39,9 +36,6 @@ be installed before installing nmap-frontend. %prep %setup -q -%if ! %{withgtk1} -%patch2 -p1 -b .gtk2 -%endif %patch3 -p1 -b .noms %patch4 -p1 -b .attr @@ -75,8 +69,7 @@ rm -rf $RPM_BUILD_ROOT %defattr(-,root,root) %doc COPYING* %doc docs/README docs/nmap-fingerprinting-article.txt -%doc docs/nmap.deprecated.txt docs/nmap.usage.txt docs/nmap_doc.html -%doc docs/nmap_manpage.html +%doc docs/nmap.deprecated.txt docs/nmap.usage.txt %{_bindir}/nmap %{_datadir}/nmap %{_mandir}/man1/nmap.1.gz @@ -91,6 +84,9 @@ rm -rf $RPM_BUILD_ROOT %{_mandir}/man1/xnmap.1.gz %changelog +* Mon Dec 19 2005 Harald Hoyer - 2:3.95-1 +- version 3.95 + * Fri Dec 09 2005 Jesse Keating - rebuilt diff --git a/sources b/sources index 1d47a96..4398ba3 100644 --- a/sources +++ b/sources @@ -1 +1 @@ -92e69a2e8db0eb59b5d71b8b363892f2 nmap-3.93.tar.bz2 +8aab9467378cb71ed767a863ecde58c4 nmap-3.95.tgz