Commit graph

34 commits

Author SHA1 Message Date
Oliver Eikemeier
7881db98b7 - update to version 3.50
Approved by:	marcus (mentor)
2004-01-19 22:31:35 +00:00
Alexander Leidinger
e433db1745 From the submitter:
---snip---
        The security/nmap port (currently at 3.48, but previous versions also
        had this problem) triggers a bug in GCC 3.3.1 on FreeBSD/sparc64 which
        causes the compilation of the port to fail.
        The GCC bug itself is know and AFAIK Thomas Moestl (tmm@freebsd.org)
        tried to get a fix for it in upstream GCC. However, I didn't see an
        entry in the release notes of GCC 3.3.2 that would suggest that it has
        been fixed there.
        Another port that has a workaround for this particular GCC bug is e.g.
        x11/XFree86-4-libraries (files/patch-XRes.c).
---snip---

PR:		58698
Submitted by:	Marius Strobl <marius@alchemy.franken.de>
Approved by:	maintainer
2003-10-30 14:09:29 +00:00
Edwin Groothuis
a3174f4845 add patches from Marius Strobls
PR:		ports/57646
Submitted by:	Marius Strobls
Approved by:	liver Eikemeier <eikemeier@fillmore-labs.com>
2003-10-08 01:38:55 +00:00
Edwin Groothuis
e11145a0fa [MAINTAINER] port security/nmap: update to version 3.48
- improved version detection
	- integrates most FreeBSD fixes, thanks to
	  Marius Strobl <marius@alchemy.franken.de>
	- install localized man pages

PR:		ports/57646
Submitted by:	Oliver Eikemeier <eikemeier@fillmore-labs.com>
2003-10-07 22:31:18 +00:00
Erwin Lansing
201bc6c998 add patches forgotten in previous commit
Submitted by:	maintainer
Pointy hat to:	leeym
2003-09-26 12:05:12 +00:00
Yen-Ming Lee
431f47f2e7 update to nmap/nmapfe version 3.46
PR:		57196
Submitted by:	Oliver Eikemeier <eikemeier@fillmore-labs.com>
2003-09-25 16:19:25 +00:00
Foxfair Hu
a1d105f807 Submitted by: Marius Strobl <marius@alchemy.franken.de>
Revive a missed patch. This is not a function improvement or program update
for the port itself, so no need to bump PORTREVISION.
2003-07-01 07:27:43 +00:00
Foxfair Hu
d8a8887c96 PR: 53933
Submitted by:	maintainer
Reviewed by:
Approved by:
Obtained from:
MFC after:
1. Upgrade Nmap to 3.30, which released at Jun 29, 2003. Major enchancement is
   OS fingerprints update. The fingerprint DB now contains almost 1000
   fingerprints.

   See ChangeLog at this link:

	http://lists.insecure.org/lists/nmap-hackers/2003/Apr-Jun/0016.html

2. Renamed the patch files to be more descriptive.
2003-07-01 03:38:04 +00:00
Yen-Ming Lee
adcc389f0b nmap 3.27 -> 3.28
PR:		53351
Submitted by:	Dominic Marks <dom@cus.org.uk>
2003-06-16 04:43:50 +00:00
Adam Weinberger
73393db6f9 Update to 3.27.
Submitted by:	Marius Strobl <marius@alchemy.franken.de>
Reviewed by:	Dominic Marks <dom@cus.org.uk> (maintainer)
2003-04-29 22:04:56 +00:00
Edwin Groothuis
4b4ecf4cad Maintainer Update: security/nmap
The nmap port is not building correctly where libgnugetopt is
	installed. This patch fixes the problem, please add it to the
	files directory.

PR:		ports/50894
Submitted by:	marius@alchemy.franken.de
Approved by:	Dominic Marks <dom@cus.org.uk>
2003-04-13 10:30:10 +00:00
Munechika SUMIKAWA
e74fa876ac Upgrade to 3.20
PR:		ports/49987
Submitted by:	Dominic Marks <dom@cus.org.uk>
		marius@alchemy.franken.de
2003-04-11 10:00:50 +00:00
Crist J. Clark
4f3bf60ae3 Do not try to install any parts of nmapfe from the nmap port. There is
a separate port for nmapfe. Even though the attempt in the nmap port
mostly fails since no nmapfe executable would have been built, files
not appearing in the pkg-plist were being added to the system.

PR:		ports/35207
Approved by:	obrien
2002-02-23 06:04:44 +00:00
David E. O'Brien
14c5bb3b12 More changes needed to allow a slave port. 2001-05-28 01:01:19 +00:00
David E. O'Brien
2bf7be3276 While the previous patch worked, this is a fresh one generated from
this version's sources.
2001-04-07 18:38:08 +00:00
David E. O'Brien
758c19ecc0 Remove patch NOT approved by me (maintainer), that is in my way while
doing an upgrade.  This patch does not fix a bug, takes away the original
author's right to free speach, and we have no technical reason to patch.
2001-03-17 01:06:24 +00:00
David E. O'Brien
fa78580a86 Update to version 2.52.
[fixes minor typos in 2.51]
2000-05-05 01:51:06 +00:00
David E. O'Brien
c6da23405e Update to 2.51.
2.51 fixes a target parsing bug which could in some cases cause Nmap to
crash with the error "Assertion `t->nleft > 1' failed".
2000-04-30 09:46:47 +00:00
David E. O'Brien
3d169fb97f Update to 2.30 Beta #18.
* Fixed a very important bug that occurred when SYN scanning localhost.
* Fixed "-vv" to mean "-v -v" as it did in previous versions.
2000-04-06 22:16:15 +00:00
David E. O'Brien
ebaa0d86ff Update to version 2.3 beta 17.
* Added ACK scanning.  This scan technique is great for testing firewall
  rulesets.  It can NOT find open ports, but it can distinguish between
  filtered/unfilterd by sending an ACK packet to each port and waiting for
  a RST to come back.  Filtered ports will not send back a RST (or will
  send ICMP unreachables).  This scan type is activated with -sA .

* Documented the Window scan (-sW)

* "Protocol" field in output eliminated.  It is now printed right
   next to the number (/etc/services style).  Like "22/tcp".

* Added --resume option to continue a large network scan where you left off.
  It also allows you to start and stop for policy reasons
2000-03-27 01:23:45 +00:00
Jeremy Lea
e531baf8c1 PLIST related fixes. 2000-02-27 08:56:20 +00:00
Daniel Baker
1c0ddbd0e6 New patch to eliminate editorial in reference file.
Submitted by:	David McNett <nugget@slacker.com>
2000-02-17 23:28:32 +00:00
David E. O'Brien
afad78b9d4 Update to version 2.3 Beta 14 2000-01-28 10:02:12 +00:00
David E. O'Brien
fb6cec5d1a Upgrade to version 2.3BETA12.
Submitted by:	taguchi@tohoku.iij.ad.jp
2000-01-04 08:00:20 +00:00
Peter Wemm
a53421230c $Id$ -> $FreeBSD$ 1999-08-31 01:53:22 +00:00
David E. O'Brien
1cb3956451 Hard code the path to nmap w/in nmapfe. Thus it will work in the face of a
limited path.

Bug reported by:	Andre Albsmeier <andre.albsmeier@mchp.siemens.de>
1999-07-23 18:21:54 +00:00
David E. O'Brien
7efe79f49b Upgrade to nmap-2.2-BETA4. The beta includes a very nice GUI (xnmap) that
simplifies the running of nmap for the point and shoot crowd.
1999-07-22 18:33:45 +00:00
David E. O'Brien
b85afc0b24 upgrade to 2.05 1999-02-08 11:58:17 +00:00
David E. O'Brien
21f744f34b Somehow this delete didn't propagate. 1998-12-17 02:45:00 +00:00
David E. O'Brien
7091c3a40e Upgrade to 2.00. 1998-12-15 11:18:32 +00:00
Satoshi Asami
2abd784be1 Fix the bug when the user specs the source address as the tun0/ppp0
link.

Submitted by:	jmb
1998-11-29 23:02:39 +00:00
David E. O'Brien
b0a37b7555 * Nuke included libpcap so I don't make the mistake ache fixed again.
* Prefer -u diffs over -c
1998-08-20 22:06:00 +00:00
Andrey A. Chernov
6389f112ab Old version use bpf.h from internal libpcap and link with
system libpcap in the same time. Fix to use <net/bpf.h> instead

New manpages scheme
1998-08-18 14:31:37 +00:00
David E. O'Brien
f896e54ddc nmap is a utility for port scanning large networks
Sometimes you need speed, other times you may need stealth. In some cases,
bypassing firewalls may be required. Not to mention the fact that you may
want to scan different protocols (UDP, TCP, ICMP, etc.).
You just can't do all this with one scanning mode.  Thus nmap
incorporats virtually every scanning technique known of.

See the nmap homepage at http://www.insecure.org/nmap/index.html
1998-08-04 17:59:51 +00:00