mailing list archives
Nmap 3.15BETA2 Released!
From: Fyodor <fyodor () insecure org>
Date: Wed, 26 Feb 2003 13:24:56 -0800
-----BEGIN PGP SIGNED MESSAGE-----
I am pleased to announce that Nmap version 3.15BETA2 is now
available. The very modest numbering difference from 3.15BETA1 belies
the fact the substantial changes -- including several fun new
features. We're talking "port zero" scans, arbitrary TTL settings,
Windows binaries, nonroot/ipv6 connect() multiport pinging, and more!
This may be the last gzip release, as I am considering moving to
.tar.bz2 (I've been wanting to do this for many years, actually).
Most free operating systems now include bzip2, and recent versions of
tar handle it with the 'j' flag. It compresses the Nmap tarball to
an impressive 20% smaller than gzip:
- -rw------- 1 fyodor fyodor 1078771 Feb 26 13:05 nmap-3.15BETA2.tar.gz
- -rw------- 1 fyodor fyodor 869990 Feb 26 13:04 nmap-3.15BETA2.tar.bz2
If this switch would cause you problems, please let me know. If you
want to try out the .bz2 of this release, grab it from
Here are the main changes in this release:
o I added support for a brand new "port" that many of you may have
never scanned before! UDP & TCP "port 0" (and IP protocol 0) are now
permitted if you specify 0 explicitly. An argument like "-p -40"
would still scan ports 1-40. Unlike ports, protocol 0 IS now scanned
by default. This now works for ping probes too (e.g., -PS, -PA).
o Applied patch by Martin Kluge (martin () elxsi info) which adds --ttl
option, which sets the outgoing IPv4 TTL field in packets sent via
all raw scan types (including ping scans and OS detection). The
patch "should work" on Windows, but hasn't been tested. A TTL of 0
is supported, and even tends to work on a LAN:
14:17:19.474293 192.168.0.42.60214 > 192.168.0.40.135: S 3265375623:3265375623(0) win 1024 [ttl 0] (id 35919, len 40)
14:17:19.474456 192.168.0.40.135 > 192.168.0.42.60214: S 2805154856:2805154856(0) ack 3265375624 win 64240 <mss 1460>
(DF) (ttl 128, id 49889, len 44)
o Applied patch by Gabriel L. Somlo ( somlo () acns colostate edu ) which
extends the multi-ping-port functionality to nonroot and IPv6
o I added a new --datadir command line option which allows you to
specify the highest priority directory for Nmap data files
nmap-services, nmap-os-fingerprints, and nmap-rpc. Any files which
aren't in the given dir, will be searched for in the $NMAPDIR
environmental variable, ~/nmap/, a compiled in data directory
(e.g. /usr/share/nmap), and finally the current directory.
o Fixed Windows (VC++ 6) compilation, thanks to patches from Kevin
Davis (computerguy () cfl rr com) and Andy Lutomirski
(luto () stanford edu)
o Included new Latvian man page translation by
"miscelerious options" (misc () inbox lv)
o Fixed Solaris compilation when Sun make is used rather than GNU
make. Thanks to Tom Duffy (tduffy () sun com) for assistance.
o Applied patch from Stephen Bishop (sbishop () idsec co uk) which
prevends certain false-positive responses when Nmap raw TCP ping scans
are being run in parallel.
o To emphasize the highly professional nature of Nmap, I changed all
instances of "fucked up" in error message text into "b0rked".
o Fixed a problem with nmap-frontend RPMs that would cause a bogus
/bin/xnmap link to be created (it should only create
/usr/bin/xnmap). Thanks to Juho Schultz
(juho.schultz () astro helsinki fi) for reporting the problem.
o I made the maximum number of allowed routes and interfaces allowed
on the scanning machine dynamic rather than hardcoded #defines of 1024
and 128. You never know -- some wacko probably has that many :).
For those of you running Linux/x86 w/a recent version of rpm
(www.rpm.org), you can install/upgrade to the newest version of
nmap/nmapfe by executing these commands as root:
rpm -vhU (nmap url)
where (nmap url) is one (or both) of these:
For the rest of you, source tarballs and source RPMs are always
available at: http://www.insecure.org/nmap/nmap_download.html
For the more paranoid (smart) members of the list, here are the md5
These release notes should be signed with my PGP key, which is
available at http://www.insecure.org/fyodor_gpgkey.txt .
The key fingerprint is: 97 2F 93 AB 9C B0 09 80 D9 51 40 6B B9 BC E1 7E
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see http://www.gnupg.org
-----END PGP SIGNATURE-----
For help using this (nmap-hackers) mailing list, send a blank email to
nmap-hackers-help () insecure org . List run by ezmlm-idx (www.ezmlm.org).
- Nmap 3.15BETA2 Released! Fyodor (Feb 26)