[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

rpms/nmap/devel nmap-3.81-noms.patch,NONE,1.1 nmap.spec,1.18,1.19



Author: harald

Update of /cvs/dist/rpms/nmap/devel
In directory cvs.devel.redhat.com:/tmp/cvs-serv23820

Modified Files:
	nmap.spec 
Added Files:
	nmap-3.81-noms.patch 
Log Message:
removed references how to scan microsoft.com (bz #164962)

nmap-3.81-noms.patch:
 nmap.1            |    9 ++-------
 nmap.usage.txt    |    2 +-
 nmap_doc.html     |    2 +-
 nmap_manpage.html |    4 ++--
 4 files changed, 6 insertions(+), 11 deletions(-)

--- NEW FILE nmap-3.81-noms.patch ---
diff -ur nmap-3.81/docs/nmap.1 nmap-3.81.noms/docs/nmap.1
--- nmap-3.81/docs/nmap.1	2005-02-07 08:26:08.000000000 +0100
+++ nmap-3.81.noms/docs/nmap.1	2005-08-03 14:03:50.000000000 +0200
@@ -131,7 +131,7 @@
 on a network are up.  Nmap can do this by sending ICMP echo
 request packets to every IP address on the networks you
 specify.  Hosts that respond are up.  Unfortunately, some
-sites such as microsoft.com block echo request packets.
+sites block echo request packets.
 Thus nmap can also send a TCP ack packet to (by default)
 port 80.  If we get an RST back, that machine is up.  A
 third technique involves sending a SYN packet and waiting
@@ -352,12 +352,7 @@
 Do not try to ping hosts at all before scanning them.  This
 allows the scanning of networks that don't allow ICMP echo
 requests (or responses) through their firewall.
-microsoft.com is an example of such a network, and thus you
-should always use
-.B \-P0
-or
-.B \-PS80
-when portscanning microsoft.com.  Note that "ping" in this context may
+Note that "ping" in this context may
 involve more than the traditional ICMP echo request packet.  Nmap
 supports many such probes, including arbitrary combinations of TCP,
 UDP, and ICMP probes.  By default, Nmap sends an ICMP echo request and
diff -ur nmap-3.81/docs/nmap_doc.html nmap-3.81.noms/docs/nmap_doc.html
--- nmap-3.81/docs/nmap_doc.html	2001-03-27 05:07:57.000000000 +0200
+++ nmap-3.81.noms/docs/nmap_doc.html	2005-08-03 14:02:18.000000000 +0200
@@ -361,7 +361,7 @@
 things up.  You can change the parrallel ping lookahead with '-L' and
 the ping timeout with '-T'.  You can turn pinging off completely with
 the '-D' command line option.  This is useful for scanning networks
-like microsoft.com where ICMP echo requests can't get through.  Nmap
+where ICMP echo requests can't get through.  Nmap
 is also capable of bailing on hosts that seem down based on strange
 port scanning errors.  It is also meant to be tolerant of people who
 accidentally scan network addresses, broadcast addresses, etc.<BR><BR>
diff -ur nmap-3.81/docs/nmap_manpage.html nmap-3.81.noms/docs/nmap_manpage.html
--- nmap-3.81/docs/nmap_manpage.html	2005-02-07 09:54:33.000000000 +0100
+++ nmap-3.81.noms/docs/nmap_manpage.html	2005-08-03 14:02:49.000000000 +0200
@@ -130,8 +130,8 @@
        <B>-sP</B>    Ping scanning: Sometimes you only want to know which hosts on  a
               network  are  up.  Nmap can do this by sending ICMP echo request
               packets to every IP address on the networks you specify.   Hosts
-              that   respond  are  up.   Unfortunately,  some  sites  such  as
-              microsoft.com block echo request packets.  Thus  nmap  can  also
+              that   respond  are  up.   Unfortunately,  some  sites  
+              block echo request packets.  Thus  nmap  can  also
               send a TCP ack packet to (by default) port 80.  If we get an RST
               back, that machine is up.  A third technique involves sending  a
               SYN  packet  and  waiting  for a RST or a SYN/ACK.  For non-root
diff -ur nmap-3.81/docs/nmap.usage.txt nmap-3.81.noms/docs/nmap.usage.txt
--- nmap-3.81/docs/nmap.usage.txt	2005-02-07 09:54:32.000000000 +0100
+++ nmap-3.81.noms/docs/nmap.usage.txt	2005-08-03 14:01:38.000000000 +0200
@@ -12,7 +12,7 @@
   -p <range> ports to scan.  Example range: 1-1024,1080,6666,31337
   -F Only scans ports listed in nmap-services
   -v Verbose. Its use is recommended.  Use twice for greater effect.
-  -P0 Don't ping hosts (needed to scan www.microsoft.com and others)
+  -P0 Don't ping hosts 
 * -Ddecoy_host1,decoy2[,...] Hide scan using many decoys
   -6 scans via IPv6 rather than IPv4
   -T <Paranoid|Sneaky|Polite|Normal|Aggressive|Insane> General timing policy



Index: nmap.spec
===================================================================
RCS file: /cvs/dist/rpms/nmap/devel/nmap.spec,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -r1.18 -r1.19
--- nmap.spec	21 Apr 2005 14:25:02 -0000	1.18
+++ nmap.spec	3 Aug 2005 12:21:10 -0000	1.19
@@ -3,7 +3,7 @@
 Summary: Network exploration tool and security scanner
 Name: nmap
 Version: 3.81
-Release: 3
+Release: 4
 License: GPL
 Group: Applications/System
 Source0: http://download.insecure.org/nmap/dist/%{name}-%{version}.tar.bz2
@@ -13,6 +13,7 @@
 Patch0: inet_aton.patch
 Patch1: makefile.patch
 Patch2: nmap-3.78-gtk2.patch
+Patch3: nmap-3.81-noms.patch
 URL: http://www.insecure.org/nmap/
 BuildRoot: %{_tmppath}/%{name}-root
 Epoch: 2
@@ -40,6 +41,7 @@
 %if ! %{withgtk1}
 %patch2 -p1 -b .gtk2
 %endif
+%patch3 -p1 -b .noms
 
 %build
 %configure  --with-libpcap=/usr
@@ -87,6 +89,9 @@
 %{_mandir}/man1/xnmap.1.gz
 
 %changelog
+* Wed Aug 03 2005 Harald Hoyer <harald redhat com> - 2:3.81-4
+- removed references how to scan microsoft.com (bz #164962)
+
 * Thu Apr 21 2005 Harald Hoyer <harald redhat com> - 2:3.81-3
 - removed gtk+ requirement
 


[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]