
Nmap Development mailing list archives
Re: [RFC][NSE] Modify shortport.ssl and shortport.http to avoid tcpwrapped services
From: David Fifield <david () bamsoftware com>
Date: Fri, 14 Sep 2012 14:40:12 -0700
On Fri, Sep 14, 2012 at 04:28:55PM -0500, Daniel Miller wrote:
Checking into the shortport.ssl function, I thought that it could be extended to check for tcpwrapped services (while still matching ssl-tunnelled services that get detected as tcpwrapped).
It looks fine to me. Here,
I also added the functionality to shortport.http, and made it match if Version detection labels a service http. Here's the patch:
+http = function (host, port) + return port.version.name == "http" or + ( port.version.name ~= "tcpwrapped" and + port_or_service(LIKELY_HTTP_PORTS, LIKELY_HTTP_SERVICES)(host, port)) +end
"if Version detection labels a service http": it already does that. "http" is in LIKELY_HTTP_SERVICES. I think the check return port.version.name == "http" is redundant. David Fifield _______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://seclists.org/nmap-dev/
Current thread:
- [RFC][NSE] Modify shortport.ssl and shortport.http to avoid tcpwrapped services Daniel Miller (Sep 14)
- Re: [RFC][NSE] Modify shortport.ssl and shortport.http to avoid tcpwrapped services David Fifield (Sep 14)
- Re: [RFC][NSE] Modify shortport.ssl and shortport.http to avoid tcpwrapped services Daniel Miller (Sep 14)
- Re: [RFC][NSE] Modify shortport.ssl and shortport.http to avoid tcpwrapped services Daniel Miller (Sep 17)
- Re: [RFC][NSE] Modify shortport.ssl and shortport.http to avoid tcpwrapped services David Fifield (Sep 14)