Home page logo

nmap-dev logo Nmap Development mailing list archives

Re: Exp Branch for OpenSSL on Windows
From: Brandon Enright <bmenrigh () ucsd edu>
Date: Tue, 20 May 2008 06:12:44 +0000

Hash: SHA1

On Mon, 19 May 2008 20:15:45 -0500 or thereabouts Kris Katterjohn
<katterjohn () gmail com> wrote:

I rebuilt nmap with openssl, but it didn't have any appreciable
effect and I note that in the minute that it took to successfully
complete version detection, one of my dual cores was at full-pelt
for around 45 seconds.  I'll look into this more deeply, but I
wonder if anyone else noticed similar?

I haven't noticed anything like this happening, but I'll try against
some more hosts.  Have you been able to look into it any more?

For whatever it's worth, I've been scanning millions of hosts the last
few days with -sV on SSL ports like 443, 993, 995, etc.  My scans are
not being limited by my bandwidth but my CPU.

SSL is a very CPU intensive task, especially at the initial RSA parts.
I don't think there is a bug here, I think people just don't realize
how expensive quality public-key crypto is.


Version: GnuPG v2.0.9 (GNU/Linux)


Sent through the nmap-dev mailing list
Archived at http://SecLists.Org

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]