head 1.9; access; symbols pkgsrc-2026Q1:1.8.0.8 pkgsrc-2026Q1-base:1.8 pkgsrc-2025Q4:1.8.0.6 pkgsrc-2025Q4-base:1.8 pkgsrc-2025Q3:1.8.0.4 pkgsrc-2025Q3-base:1.8 pkgsrc-2025Q2:1.8.0.2 pkgsrc-2025Q2-base:1.8 pkgsrc-2025Q1:1.7.0.8 pkgsrc-2025Q1-base:1.7 pkgsrc-2024Q4:1.7.0.6 pkgsrc-2024Q4-base:1.7 pkgsrc-2024Q3:1.7.0.4 pkgsrc-2024Q3-base:1.7 pkgsrc-2024Q2:1.7.0.2 pkgsrc-2024Q2-base:1.7 pkgsrc-2024Q1:1.6.0.8 pkgsrc-2024Q1-base:1.6 pkgsrc-2023Q4:1.6.0.6 pkgsrc-2023Q4-base:1.6 pkgsrc-2023Q3:1.6.0.4 pkgsrc-2023Q3-base:1.6 pkgsrc-2023Q2:1.6.0.2 pkgsrc-2023Q2-base:1.6 pkgsrc-2023Q1:1.5.0.10 pkgsrc-2023Q1-base:1.5 pkgsrc-2022Q4:1.5.0.8 pkgsrc-2022Q4-base:1.5 pkgsrc-2022Q3:1.5.0.6 pkgsrc-2022Q3-base:1.5 pkgsrc-2022Q2:1.5.0.4 pkgsrc-2022Q2-base:1.5 pkgsrc-2022Q1:1.5.0.2 pkgsrc-2022Q1-base:1.5 pkgsrc-2021Q4:1.3.0.6 pkgsrc-2021Q4-base:1.3 pkgsrc-2021Q3:1.3.0.4 pkgsrc-2021Q3-base:1.3 pkgsrc-2021Q2:1.3.0.2 pkgsrc-2021Q2-base:1.3 pkgsrc-2021Q1:1.2.0.14 pkgsrc-2021Q1-base:1.2 pkgsrc-2020Q4:1.2.0.12 pkgsrc-2020Q4-base:1.2 pkgsrc-2020Q3:1.2.0.10 pkgsrc-2020Q3-base:1.2 pkgsrc-2020Q2:1.2.0.8 pkgsrc-2020Q2-base:1.2 pkgsrc-2020Q1:1.2.0.4 pkgsrc-2020Q1-base:1.2 pkgsrc-2019Q4:1.2.0.6 pkgsrc-2019Q4-base:1.2 pkgsrc-2019Q3:1.2.0.2 pkgsrc-2019Q3-base:1.2 pkgsrc-2019Q2:1.1.0.10 pkgsrc-2019Q2-base:1.1 pkgsrc-2019Q1:1.1.0.8 pkgsrc-2019Q1-base:1.1 pkgsrc-2018Q4:1.1.0.6 pkgsrc-2018Q4-base:1.1 pkgsrc-2018Q3:1.1.0.4 pkgsrc-2018Q3-base:1.1 pkgsrc-2018Q2:1.1.0.2 pkgsrc-2018Q2-base:1.1; locks; strict; comment @# @; 1.9 date 2026.04.01.13.00.05; author adam; state Exp; branches; next 1.8; commitid RJNsPXcwVjVjXfAG; 1.8 date 2025.04.15.12.02.01; author abs; state Exp; branches; next 1.7; commitid QZlI4uXMKRw4V8RF; 1.7 date 2024.04.25.07.15.03; author adam; state Exp; branches; next 1.6; commitid I86OqPyvpzbQJu7F; 1.6 date 2023.06.06.10.45.10; author adam; state Exp; branches; next 1.5; commitid 9Ajle7FrJGJxjSrE; 1.5 date 2022.01.14.17.52.02; author wiz; state Exp; branches; next 1.4; commitid qL8I7eLzKRTx0DoD; 1.4 date 2022.01.10.08.09.06; author wiz; state Exp; branches; next 1.3; commitid ySqWGXd37e2HU3oD; 1.3 date 2021.04.16.06.55.33; author adam; state Exp; branches; next 1.2; commitid zA8RJP8Sra759uPC; 1.2 date 2019.08.28.13.55.44; author adam; state Exp; branches; next 1.1; commitid znQPj28BteKuENAB; 1.1 date 2018.04.14.13.04.33; author adam; state Exp; branches; next ; commitid 5KDRvOt4i7RFtpyA; desc @@ 1.9 log @ndiff nmap zenma: updated to 7.99 Nmap 7.99 [2026-03-26] o Integrated many of the most-frequently-submitted IPv4 and IPv6 OS fingerprints, as well as dozens of updated service fingerprints. o Upgraded included libraries: OpenSSL 3.0.19, libpcap 1.10.6, libpcre2 10.47, liblinear 2.50, zlib 1.3.2 o [Windows] Upgraded the included version of Npcap from 1.83 to 1.87, resolving several crashes and stability-related issues. See https://npcap.com/changelog o [Zenmap][GH-3182] Zenmap is now distributed as a universal wheel (zenmap-7.99-py3-none-any.whl) instead of an RPM package so that it can be installed on any system with Python 3. [Daniel Miller] o [Ncat][Windows] Limited the number of handles inherited by subprocesses launched with -e, preventing interference between clients when -e and --keep-open are used. Reported by Nimish Verma. o [Ncat] Several fixes for regressions or longstanding failure cases in ncat-test.pl [Daniel Miller]: + [Windows] Fixed handling of socket EOF with --exec + Fixed the -i (idle timeout) option for listen mode, which was broken when adding the -q option in Ncat 7.96 + Fixed HTTP proxy server when SSL is used. + DTLS (SSL over UDP) shutdown connection on stdin EOF. o [Windows][GH-2711] Nmap now supports scanning over various VPN virtual adapters like OpenVPN TAP adapters. [Daniel Miller] o [GH-3280] Fix a performance regression in reverse-DNS in Nmap 7.98. The fix for -3130 had caused Nmap to send requests too slowly. [Daniel Miller] o [macOS][GH-3289] Fixed a configure-time failure in libdnet that resulted in incorrect MAC addresses being reported. [Daniel Miller] o [Zenmap][GH-3189] Fix a crash in Zenmap topology and hosts viewer: "TypeError: format requires a mapping" [Daniel Miller] o [GH-2955] Fix a routing issue with -e and -S related to -2206 causing error "setup_target: failed to determine route" [Daniel Miller] o [GH-3214] Improve compatibility of build process on various platforms and add multiplatform autobuilds in Github workflow. [Jordan Ritter] o [NSE][GH-2183][GH-3239] Script hostmap-crtsh now reports only true subdomains of a given target hostname by default. In the past, it was reporting any DNS name that included the target hostname as a substring (but not necessarily as a suffix). The old behavior can be enabled by setting script argument hostmap-crtsh.lax. [Sweekar-cmd, nnposter] o [NSE] Function url.parse_query was not interpreting plus signs as spaces. [nnposter] o [NSE] Function url.parse was not properly parsing URLs with query strings but empty paths. [nnposter] o [NSE][GH-3287] Functions tableaux.tcopy and tableaux.shallow_tcopy were not behaving the same when the input table had a custom __pairs metamethod. Both functions now perform a raw copy, ignoring the metamethod. [nnposter] o [NSE] Function tableaux.shallow_tcopy did not work correctly for tables with Boolean keys. [nnposter] o [NSE] IPP print queue job details were not getting populated, having a hard dependency on Apple-specific attributes. [nnposter] o [NSE][GH-3245] Functions connect and close have been removed from the IPP library, as they served no purpose. [nnposter] o [NSE] ipOps.expand_ip was crashing upon malformed IPv6 addresses. [nnposter] o [NSE][GH-3262] FTP banner parsing is now more closely aligned with RFC 959, section 4.2. [nnposter] o [NSE][GH-3253] Function stdnse.make_buffer now accepts an extra parameter that allows preloading the newly created buffer with data. [nnposter] o [NSE][GH-3191][GH-3218] Script http-internal-ip-disclosure has been enhanced, including added support for IPv6 and HTTPS and more accurate processing of target responses. [nnposter] o [NSE][GH-3194] RPC-based scripts were sporadically failing due to privileged port conflicts. [nnposter] o [NSE][GH-3196] Script rlogin-brute was sporadically failing due to using an off-by-one range for privileged ports and not handling potential port conflicts. [nnposter] @ text @@@comment $NetBSD: PLIST,v 1.8 2025/04/15 12:02:01 abs Exp $ bin/zenmap ${PYSITELIB}/${WHEEL_INFODIR}/METADATA ${PYSITELIB}/${WHEEL_INFODIR}/RECORD ${PYSITELIB}/${WHEEL_INFODIR}/WHEEL ${PYSITELIB}/${WHEEL_INFODIR}/entry_points.txt ${PYSITELIB}/${WHEEL_INFODIR}/licenses/COPYING_HIGWIDGETS ${PYSITELIB}/${WHEEL_INFODIR}/licenses/LICENSE ${PYSITELIB}/${WHEEL_INFODIR}/top_level.txt ${PYSITELIB}/radialnet/__init__.py ${PYSITELIB}/radialnet/__init__.pyc ${PYSITELIB}/radialnet/__init__.pyo ${PYSITELIB}/radialnet/bestwidgets/__init__.py ${PYSITELIB}/radialnet/bestwidgets/__init__.pyc ${PYSITELIB}/radialnet/bestwidgets/__init__.pyo ${PYSITELIB}/radialnet/bestwidgets/boxes.py ${PYSITELIB}/radialnet/bestwidgets/boxes.pyc ${PYSITELIB}/radialnet/bestwidgets/boxes.pyo ${PYSITELIB}/radialnet/bestwidgets/buttons.py ${PYSITELIB}/radialnet/bestwidgets/buttons.pyc ${PYSITELIB}/radialnet/bestwidgets/buttons.pyo ${PYSITELIB}/radialnet/bestwidgets/comboboxes.py ${PYSITELIB}/radialnet/bestwidgets/comboboxes.pyc ${PYSITELIB}/radialnet/bestwidgets/comboboxes.pyo ${PYSITELIB}/radialnet/bestwidgets/expanders.py ${PYSITELIB}/radialnet/bestwidgets/expanders.pyc ${PYSITELIB}/radialnet/bestwidgets/expanders.pyo ${PYSITELIB}/radialnet/bestwidgets/frames.py ${PYSITELIB}/radialnet/bestwidgets/frames.pyc ${PYSITELIB}/radialnet/bestwidgets/frames.pyo ${PYSITELIB}/radialnet/bestwidgets/labels.py ${PYSITELIB}/radialnet/bestwidgets/labels.pyc ${PYSITELIB}/radialnet/bestwidgets/labels.pyo ${PYSITELIB}/radialnet/bestwidgets/textview.py ${PYSITELIB}/radialnet/bestwidgets/textview.pyc ${PYSITELIB}/radialnet/bestwidgets/textview.pyo ${PYSITELIB}/radialnet/bestwidgets/windows.py ${PYSITELIB}/radialnet/bestwidgets/windows.pyc ${PYSITELIB}/radialnet/bestwidgets/windows.pyo ${PYSITELIB}/radialnet/core/ArgvHandle.py ${PYSITELIB}/radialnet/core/ArgvHandle.pyc ${PYSITELIB}/radialnet/core/ArgvHandle.pyo ${PYSITELIB}/radialnet/core/Coordinate.py ${PYSITELIB}/radialnet/core/Coordinate.pyc ${PYSITELIB}/radialnet/core/Coordinate.pyo ${PYSITELIB}/radialnet/core/Graph.py ${PYSITELIB}/radialnet/core/Graph.pyc ${PYSITELIB}/radialnet/core/Graph.pyo ${PYSITELIB}/radialnet/core/Info.py ${PYSITELIB}/radialnet/core/Info.pyc ${PYSITELIB}/radialnet/core/Info.pyo ${PYSITELIB}/radialnet/core/Interpolation.py ${PYSITELIB}/radialnet/core/Interpolation.pyc ${PYSITELIB}/radialnet/core/Interpolation.pyo ${PYSITELIB}/radialnet/core/XMLHandler.py ${PYSITELIB}/radialnet/core/XMLHandler.pyc ${PYSITELIB}/radialnet/core/XMLHandler.pyo ${PYSITELIB}/radialnet/core/__init__.py ${PYSITELIB}/radialnet/core/__init__.pyc ${PYSITELIB}/radialnet/core/__init__.pyo ${PYSITELIB}/radialnet/gui/Application.py ${PYSITELIB}/radialnet/gui/Application.pyc ${PYSITELIB}/radialnet/gui/Application.pyo ${PYSITELIB}/radialnet/gui/ControlWidget.py ${PYSITELIB}/radialnet/gui/ControlWidget.pyc ${PYSITELIB}/radialnet/gui/ControlWidget.pyo ${PYSITELIB}/radialnet/gui/Dialogs.py ${PYSITELIB}/radialnet/gui/Dialogs.pyc ${PYSITELIB}/radialnet/gui/Dialogs.pyo ${PYSITELIB}/radialnet/gui/HostsViewer.py ${PYSITELIB}/radialnet/gui/HostsViewer.pyc ${PYSITELIB}/radialnet/gui/HostsViewer.pyo ${PYSITELIB}/radialnet/gui/Image.py ${PYSITELIB}/radialnet/gui/Image.pyc ${PYSITELIB}/radialnet/gui/Image.pyo ${PYSITELIB}/radialnet/gui/LegendWindow.py ${PYSITELIB}/radialnet/gui/LegendWindow.pyc ${PYSITELIB}/radialnet/gui/LegendWindow.pyo ${PYSITELIB}/radialnet/gui/NodeNotebook.py ${PYSITELIB}/radialnet/gui/NodeNotebook.pyc ${PYSITELIB}/radialnet/gui/NodeNotebook.pyo ${PYSITELIB}/radialnet/gui/NodeWindow.py ${PYSITELIB}/radialnet/gui/NodeWindow.pyc ${PYSITELIB}/radialnet/gui/NodeWindow.pyo ${PYSITELIB}/radialnet/gui/RadialNet.py ${PYSITELIB}/radialnet/gui/RadialNet.pyc ${PYSITELIB}/radialnet/gui/RadialNet.pyo ${PYSITELIB}/radialnet/gui/SaveDialog.py ${PYSITELIB}/radialnet/gui/SaveDialog.pyc ${PYSITELIB}/radialnet/gui/SaveDialog.pyo ${PYSITELIB}/radialnet/gui/Toolbar.py ${PYSITELIB}/radialnet/gui/Toolbar.pyc ${PYSITELIB}/radialnet/gui/Toolbar.pyo ${PYSITELIB}/radialnet/gui/__init__.py ${PYSITELIB}/radialnet/gui/__init__.pyc ${PYSITELIB}/radialnet/gui/__init__.pyo ${PYSITELIB}/radialnet/util/__init__.py ${PYSITELIB}/radialnet/util/__init__.pyc ${PYSITELIB}/radialnet/util/__init__.pyo ${PYSITELIB}/radialnet/util/drawing.py ${PYSITELIB}/radialnet/util/drawing.pyc ${PYSITELIB}/radialnet/util/drawing.pyo ${PYSITELIB}/radialnet/util/geometry.py ${PYSITELIB}/radialnet/util/geometry.pyc ${PYSITELIB}/radialnet/util/geometry.pyo ${PYSITELIB}/radialnet/util/integration.py ${PYSITELIB}/radialnet/util/integration.pyc ${PYSITELIB}/radialnet/util/integration.pyo ${PYSITELIB}/radialnet/util/misc.py ${PYSITELIB}/radialnet/util/misc.pyc ${PYSITELIB}/radialnet/util/misc.pyo ${PYSITELIB}/zenmapCore/BasePaths.py ${PYSITELIB}/zenmapCore/BasePaths.pyc ${PYSITELIB}/zenmapCore/BasePaths.pyo ${PYSITELIB}/zenmapCore/DelayedObject.py ${PYSITELIB}/zenmapCore/DelayedObject.pyc ${PYSITELIB}/zenmapCore/DelayedObject.pyo ${PYSITELIB}/zenmapCore/Diff.py ${PYSITELIB}/zenmapCore/Diff.pyc ${PYSITELIB}/zenmapCore/Diff.pyo ${PYSITELIB}/zenmapCore/I18N.py ${PYSITELIB}/zenmapCore/I18N.pyc ${PYSITELIB}/zenmapCore/I18N.pyo ${PYSITELIB}/zenmapCore/NSEDocParser.py ${PYSITELIB}/zenmapCore/NSEDocParser.pyc ${PYSITELIB}/zenmapCore/NSEDocParser.pyo ${PYSITELIB}/zenmapCore/Name.py ${PYSITELIB}/zenmapCore/Name.pyc ${PYSITELIB}/zenmapCore/Name.pyo ${PYSITELIB}/zenmapCore/NetworkInventory.py ${PYSITELIB}/zenmapCore/NetworkInventory.pyc ${PYSITELIB}/zenmapCore/NetworkInventory.pyo ${PYSITELIB}/zenmapCore/NmapCommand.py ${PYSITELIB}/zenmapCore/NmapCommand.pyc ${PYSITELIB}/zenmapCore/NmapCommand.pyo ${PYSITELIB}/zenmapCore/NmapOptions.py ${PYSITELIB}/zenmapCore/NmapOptions.pyc ${PYSITELIB}/zenmapCore/NmapOptions.pyo ${PYSITELIB}/zenmapCore/NmapParser.py ${PYSITELIB}/zenmapCore/NmapParser.pyc ${PYSITELIB}/zenmapCore/NmapParser.pyo ${PYSITELIB}/zenmapCore/Paths.py ${PYSITELIB}/zenmapCore/Paths.pyc ${PYSITELIB}/zenmapCore/Paths.pyo ${PYSITELIB}/zenmapCore/RecentScans.py ${PYSITELIB}/zenmapCore/RecentScans.pyc ${PYSITELIB}/zenmapCore/RecentScans.pyo ${PYSITELIB}/zenmapCore/ScriptArgsParser.py ${PYSITELIB}/zenmapCore/ScriptArgsParser.pyc ${PYSITELIB}/zenmapCore/ScriptArgsParser.pyo ${PYSITELIB}/zenmapCore/ScriptMetadata.py ${PYSITELIB}/zenmapCore/ScriptMetadata.pyc ${PYSITELIB}/zenmapCore/ScriptMetadata.pyo ${PYSITELIB}/zenmapCore/SearchResult.py ${PYSITELIB}/zenmapCore/SearchResult.pyc ${PYSITELIB}/zenmapCore/SearchResult.pyo ${PYSITELIB}/zenmapCore/StringPool.py ${PYSITELIB}/zenmapCore/StringPool.pyc ${PYSITELIB}/zenmapCore/StringPool.pyo ${PYSITELIB}/zenmapCore/TargetList.py ${PYSITELIB}/zenmapCore/TargetList.pyc ${PYSITELIB}/zenmapCore/TargetList.pyo ${PYSITELIB}/zenmapCore/UmitConf.py ${PYSITELIB}/zenmapCore/UmitConf.pyc ${PYSITELIB}/zenmapCore/UmitConf.pyo ${PYSITELIB}/zenmapCore/UmitConfigParser.py ${PYSITELIB}/zenmapCore/UmitConfigParser.pyc ${PYSITELIB}/zenmapCore/UmitConfigParser.pyo ${PYSITELIB}/zenmapCore/UmitDB.py ${PYSITELIB}/zenmapCore/UmitDB.pyc ${PYSITELIB}/zenmapCore/UmitDB.pyo ${PYSITELIB}/zenmapCore/UmitLogging.py ${PYSITELIB}/zenmapCore/UmitLogging.pyc ${PYSITELIB}/zenmapCore/UmitLogging.pyo ${PYSITELIB}/zenmapCore/UmitOptionParser.py ${PYSITELIB}/zenmapCore/UmitOptionParser.pyc ${PYSITELIB}/zenmapCore/UmitOptionParser.pyo ${PYSITELIB}/zenmapCore/Version.py ${PYSITELIB}/zenmapCore/Version.pyc ${PYSITELIB}/zenmapCore/Version.pyo ${PYSITELIB}/zenmapCore/__init__.py ${PYSITELIB}/zenmapCore/__init__.pyc ${PYSITELIB}/zenmapCore/__init__.pyo ${PYSITELIB}/zenmapCore/data/config/scan_profile.usp ${PYSITELIB}/zenmapCore/data/config/zenmap.conf ${PYSITELIB}/zenmapCore/data/config/zenmap_version ${PYSITELIB}/zenmapCore/data/docs/help.html ${PYSITELIB}/zenmapCore/data/locale/xgettext-profile_editor.py ${PYSITELIB}/zenmapCore/data/locale/xgettext-profile_editor.pyc ${PYSITELIB}/zenmapCore/data/locale/xgettext-profile_editor.pyo ${PYSITELIB}/zenmapCore/data/misc/profile_editor.xml ${PYSITELIB}/zenmapCore/data/pixmaps/default_32.png ${PYSITELIB}/zenmapCore/data/pixmaps/default_75.png ${PYSITELIB}/zenmapCore/data/pixmaps/freebsd_32.png ${PYSITELIB}/zenmapCore/data/pixmaps/freebsd_75.png ${PYSITELIB}/zenmapCore/data/pixmaps/irix_32.png ${PYSITELIB}/zenmapCore/data/pixmaps/irix_75.png ${PYSITELIB}/zenmapCore/data/pixmaps/linux_32.png ${PYSITELIB}/zenmapCore/data/pixmaps/linux_75.png ${PYSITELIB}/zenmapCore/data/pixmaps/macosx_32.png ${PYSITELIB}/zenmapCore/data/pixmaps/macosx_75.png ${PYSITELIB}/zenmapCore/data/pixmaps/openbsd_32.png ${PYSITELIB}/zenmapCore/data/pixmaps/openbsd_75.png ${PYSITELIB}/zenmapCore/data/pixmaps/radialnet/border.png ${PYSITELIB}/zenmapCore/data/pixmaps/radialnet/firewall.png ${PYSITELIB}/zenmapCore/data/pixmaps/radialnet/logo.png ${PYSITELIB}/zenmapCore/data/pixmaps/radialnet/padlock.png ${PYSITELIB}/zenmapCore/data/pixmaps/radialnet/router.png ${PYSITELIB}/zenmapCore/data/pixmaps/radialnet/switch.png ${PYSITELIB}/zenmapCore/data/pixmaps/radialnet/wireless.png ${PYSITELIB}/zenmapCore/data/pixmaps/redhat_32.png ${PYSITELIB}/zenmapCore/data/pixmaps/redhat_75.png ${PYSITELIB}/zenmapCore/data/pixmaps/solaris_32.png ${PYSITELIB}/zenmapCore/data/pixmaps/solaris_75.png ${PYSITELIB}/zenmapCore/data/pixmaps/throbber.gif ${PYSITELIB}/zenmapCore/data/pixmaps/throbber.png ${PYSITELIB}/zenmapCore/data/pixmaps/ubuntu_32.png ${PYSITELIB}/zenmapCore/data/pixmaps/ubuntu_75.png ${PYSITELIB}/zenmapCore/data/pixmaps/unknown_32.png ${PYSITELIB}/zenmapCore/data/pixmaps/unknown_75.png ${PYSITELIB}/zenmapCore/data/pixmaps/vl_1_32.png ${PYSITELIB}/zenmapCore/data/pixmaps/vl_1_75.png ${PYSITELIB}/zenmapCore/data/pixmaps/vl_2_32.png ${PYSITELIB}/zenmapCore/data/pixmaps/vl_2_75.png ${PYSITELIB}/zenmapCore/data/pixmaps/vl_3_32.png ${PYSITELIB}/zenmapCore/data/pixmaps/vl_3_75.png ${PYSITELIB}/zenmapCore/data/pixmaps/vl_4_32.png ${PYSITELIB}/zenmapCore/data/pixmaps/vl_4_75.png ${PYSITELIB}/zenmapCore/data/pixmaps/vl_5_32.png ${PYSITELIB}/zenmapCore/data/pixmaps/vl_5_75.png ${PYSITELIB}/zenmapCore/data/pixmaps/win_32.png ${PYSITELIB}/zenmapCore/data/pixmaps/win_75.png ${PYSITELIB}/zenmapCore/data/pixmaps/zenmap.png ${PYSITELIB}/zenmapGUI/About.py ${PYSITELIB}/zenmapGUI/About.pyc ${PYSITELIB}/zenmapGUI/About.pyo ${PYSITELIB}/zenmapGUI/App.py ${PYSITELIB}/zenmapGUI/App.pyc ${PYSITELIB}/zenmapGUI/App.pyo ${PYSITELIB}/zenmapGUI/BugReport.py ${PYSITELIB}/zenmapGUI/BugReport.pyc ${PYSITELIB}/zenmapGUI/BugReport.pyo ${PYSITELIB}/zenmapGUI/CrashReport.py ${PYSITELIB}/zenmapGUI/CrashReport.pyc ${PYSITELIB}/zenmapGUI/CrashReport.pyo ${PYSITELIB}/zenmapGUI/DiffCompare.py ${PYSITELIB}/zenmapGUI/DiffCompare.pyc ${PYSITELIB}/zenmapGUI/DiffCompare.pyo ${PYSITELIB}/zenmapGUI/FileChoosers.py ${PYSITELIB}/zenmapGUI/FileChoosers.pyc ${PYSITELIB}/zenmapGUI/FileChoosers.pyo ${PYSITELIB}/zenmapGUI/FilterBar.py ${PYSITELIB}/zenmapGUI/FilterBar.pyc ${PYSITELIB}/zenmapGUI/FilterBar.pyo ${PYSITELIB}/zenmapGUI/Icons.py ${PYSITELIB}/zenmapGUI/Icons.pyc ${PYSITELIB}/zenmapGUI/Icons.pyo ${PYSITELIB}/zenmapGUI/MainWindow.py ${PYSITELIB}/zenmapGUI/MainWindow.pyc ${PYSITELIB}/zenmapGUI/MainWindow.pyo ${PYSITELIB}/zenmapGUI/NmapOutputProperties.py ${PYSITELIB}/zenmapGUI/NmapOutputProperties.pyc ${PYSITELIB}/zenmapGUI/NmapOutputProperties.pyo ${PYSITELIB}/zenmapGUI/NmapOutputViewer.py ${PYSITELIB}/zenmapGUI/NmapOutputViewer.pyc ${PYSITELIB}/zenmapGUI/NmapOutputViewer.pyo ${PYSITELIB}/zenmapGUI/OptionBuilder.py ${PYSITELIB}/zenmapGUI/OptionBuilder.pyc ${PYSITELIB}/zenmapGUI/OptionBuilder.pyo ${PYSITELIB}/zenmapGUI/Print.py ${PYSITELIB}/zenmapGUI/Print.pyc ${PYSITELIB}/zenmapGUI/Print.pyo ${PYSITELIB}/zenmapGUI/ProfileCombo.py ${PYSITELIB}/zenmapGUI/ProfileCombo.pyc ${PYSITELIB}/zenmapGUI/ProfileCombo.pyo ${PYSITELIB}/zenmapGUI/ProfileEditor.py ${PYSITELIB}/zenmapGUI/ProfileEditor.pyc ${PYSITELIB}/zenmapGUI/ProfileEditor.pyo ${PYSITELIB}/zenmapGUI/ProfileHelp.py ${PYSITELIB}/zenmapGUI/ProfileHelp.pyc ${PYSITELIB}/zenmapGUI/ProfileHelp.pyo ${PYSITELIB}/zenmapGUI/ScanHostDetailsPage.py ${PYSITELIB}/zenmapGUI/ScanHostDetailsPage.pyc ${PYSITELIB}/zenmapGUI/ScanHostDetailsPage.pyo ${PYSITELIB}/zenmapGUI/ScanHostsView.py ${PYSITELIB}/zenmapGUI/ScanHostsView.pyc ${PYSITELIB}/zenmapGUI/ScanHostsView.pyo ${PYSITELIB}/zenmapGUI/ScanInterface.py ${PYSITELIB}/zenmapGUI/ScanInterface.pyc ${PYSITELIB}/zenmapGUI/ScanInterface.pyo ${PYSITELIB}/zenmapGUI/ScanNmapOutputPage.py ${PYSITELIB}/zenmapGUI/ScanNmapOutputPage.pyc ${PYSITELIB}/zenmapGUI/ScanNmapOutputPage.pyo ${PYSITELIB}/zenmapGUI/ScanOpenPortsPage.py ${PYSITELIB}/zenmapGUI/ScanOpenPortsPage.pyc ${PYSITELIB}/zenmapGUI/ScanOpenPortsPage.pyo ${PYSITELIB}/zenmapGUI/ScanRunDetailsPage.py ${PYSITELIB}/zenmapGUI/ScanRunDetailsPage.pyc ${PYSITELIB}/zenmapGUI/ScanRunDetailsPage.pyo ${PYSITELIB}/zenmapGUI/ScanScanListPage.py ${PYSITELIB}/zenmapGUI/ScanScanListPage.pyc ${PYSITELIB}/zenmapGUI/ScanScanListPage.pyo ${PYSITELIB}/zenmapGUI/ScanToolbar.py ${PYSITELIB}/zenmapGUI/ScanToolbar.pyc ${PYSITELIB}/zenmapGUI/ScanToolbar.pyo ${PYSITELIB}/zenmapGUI/ScansListStore.py ${PYSITELIB}/zenmapGUI/ScansListStore.pyc ${PYSITELIB}/zenmapGUI/ScansListStore.pyo ${PYSITELIB}/zenmapGUI/ScriptInterface.py ${PYSITELIB}/zenmapGUI/ScriptInterface.pyc ${PYSITELIB}/zenmapGUI/ScriptInterface.pyo ${PYSITELIB}/zenmapGUI/SearchGUI.py ${PYSITELIB}/zenmapGUI/SearchGUI.pyc ${PYSITELIB}/zenmapGUI/SearchGUI.pyo ${PYSITELIB}/zenmapGUI/SearchWindow.py ${PYSITELIB}/zenmapGUI/SearchWindow.pyc ${PYSITELIB}/zenmapGUI/SearchWindow.pyo ${PYSITELIB}/zenmapGUI/TargetCombo.py ${PYSITELIB}/zenmapGUI/TargetCombo.pyc ${PYSITELIB}/zenmapGUI/TargetCombo.pyo ${PYSITELIB}/zenmapGUI/TopologyPage.py ${PYSITELIB}/zenmapGUI/TopologyPage.pyc ${PYSITELIB}/zenmapGUI/TopologyPage.pyo ${PYSITELIB}/zenmapGUI/__init__.py ${PYSITELIB}/zenmapGUI/__init__.pyc ${PYSITELIB}/zenmapGUI/__init__.pyo ${PYSITELIB}/zenmapGUI/higwidgets/__init__.py ${PYSITELIB}/zenmapGUI/higwidgets/__init__.pyc ${PYSITELIB}/zenmapGUI/higwidgets/__init__.pyo ${PYSITELIB}/zenmapGUI/higwidgets/gtkutils.py ${PYSITELIB}/zenmapGUI/higwidgets/gtkutils.pyc ${PYSITELIB}/zenmapGUI/higwidgets/gtkutils.pyo ${PYSITELIB}/zenmapGUI/higwidgets/higboxes.py ${PYSITELIB}/zenmapGUI/higwidgets/higboxes.pyc ${PYSITELIB}/zenmapGUI/higwidgets/higboxes.pyo ${PYSITELIB}/zenmapGUI/higwidgets/higbuttons.py ${PYSITELIB}/zenmapGUI/higwidgets/higbuttons.pyc ${PYSITELIB}/zenmapGUI/higwidgets/higbuttons.pyo ${PYSITELIB}/zenmapGUI/higwidgets/higdialogs.py ${PYSITELIB}/zenmapGUI/higwidgets/higdialogs.pyc ${PYSITELIB}/zenmapGUI/higwidgets/higdialogs.pyo ${PYSITELIB}/zenmapGUI/higwidgets/higentries.py ${PYSITELIB}/zenmapGUI/higwidgets/higentries.pyc ${PYSITELIB}/zenmapGUI/higwidgets/higentries.pyo ${PYSITELIB}/zenmapGUI/higwidgets/higexpanders.py ${PYSITELIB}/zenmapGUI/higwidgets/higexpanders.pyc ${PYSITELIB}/zenmapGUI/higwidgets/higexpanders.pyo ${PYSITELIB}/zenmapGUI/higwidgets/higframe.py ${PYSITELIB}/zenmapGUI/higwidgets/higframe.pyc ${PYSITELIB}/zenmapGUI/higwidgets/higframe.pyo ${PYSITELIB}/zenmapGUI/higwidgets/higlabels.py ${PYSITELIB}/zenmapGUI/higwidgets/higlabels.pyc ${PYSITELIB}/zenmapGUI/higwidgets/higlabels.pyo ${PYSITELIB}/zenmapGUI/higwidgets/higlogindialogs.py ${PYSITELIB}/zenmapGUI/higwidgets/higlogindialogs.pyc ${PYSITELIB}/zenmapGUI/higwidgets/higlogindialogs.pyo ${PYSITELIB}/zenmapGUI/higwidgets/hignotebooks.py ${PYSITELIB}/zenmapGUI/higwidgets/hignotebooks.pyc ${PYSITELIB}/zenmapGUI/higwidgets/hignotebooks.pyo ${PYSITELIB}/zenmapGUI/higwidgets/higprogressbars.py ${PYSITELIB}/zenmapGUI/higwidgets/higprogressbars.pyc ${PYSITELIB}/zenmapGUI/higwidgets/higprogressbars.pyo ${PYSITELIB}/zenmapGUI/higwidgets/higscrollers.py ${PYSITELIB}/zenmapGUI/higwidgets/higscrollers.pyc ${PYSITELIB}/zenmapGUI/higwidgets/higscrollers.pyo ${PYSITELIB}/zenmapGUI/higwidgets/higspinner.py ${PYSITELIB}/zenmapGUI/higwidgets/higspinner.pyc ${PYSITELIB}/zenmapGUI/higwidgets/higspinner.pyo ${PYSITELIB}/zenmapGUI/higwidgets/higtables.py ${PYSITELIB}/zenmapGUI/higwidgets/higtables.pyc ${PYSITELIB}/zenmapGUI/higwidgets/higtables.pyo ${PYSITELIB}/zenmapGUI/higwidgets/higtextviewers.py ${PYSITELIB}/zenmapGUI/higwidgets/higtextviewers.pyc ${PYSITELIB}/zenmapGUI/higwidgets/higtextviewers.pyo ${PYSITELIB}/zenmapGUI/higwidgets/higwindows.py ${PYSITELIB}/zenmapGUI/higwidgets/higwindows.pyc ${PYSITELIB}/zenmapGUI/higwidgets/higwindows.pyo share/locale/de/LC_MESSAGES/zenmap.mo share/locale/es/LC_MESSAGES/zenmap.mo share/locale/fr/LC_MESSAGES/zenmap.mo share/locale/hi/LC_MESSAGES/zenmap.mo share/locale/hr/LC_MESSAGES/zenmap.mo share/locale/it/LC_MESSAGES/zenmap.mo share/locale/ja/LC_MESSAGES/zenmap.mo share/locale/pl/LC_MESSAGES/zenmap.mo share/locale/pt_BR/LC_MESSAGES/zenmap.mo share/locale/ru/LC_MESSAGES/zenmap.mo share/locale/zh/LC_MESSAGES/zenmap.mo @ 1.8 log @Fix PLIST for python licence location change @ text @d1 1 a1 1 @@comment $NetBSD: PLIST,v 1.7 2024/04/25 07:15:03 adam Exp $ d378 11 @ 1.7 log @ndiff nmap zenmap: updated to 7.95 Nmap 7.95 [2024-04-19] o [Windows] Upgraded Npcap (our Windows raw packet capturing and transmission driver) from version 1.75 to the latest version 1.79. It includes many performance improvements, bug fixes and feature enhancements described at https://npcap.com/changelog. o Integrated over 4000 IPv4 OS fingerprints submitted since June 2020. Added 336 fingerprints, bringing the new total to 6036. Additions include iOS 15 & 16, macOS Ventura & Monterey, Linux 6.1, OpenBSD 7.1, and lwIP 2.2 o Integrated over 2500 service/version detection fingerprints submitted since June 2020. The signature count went up 1.4% to 12089, including 9 new softmatches. We now detect 1246 protocols, including new additions of grpc, mysqlx, essnet, remotemouse, and tuya. o [NSE] Four new scripts from the DINA community (https://github.com/DINA-community) for querying industrial control systems: + hartip-info reads device information from devices using the Highway Addressable Remote Transducer protocol + iec61850-mms queries devices using Manufacturing Message Specification requests. [Dennis Rösch, Max Helbig] + multicast-profinet-discovery Sends a multicast PROFINET DCP Identify All message and prints the responses. [Stefan Eiwanger, DINA-community] + profinet-cm-lookup queries the DCERPC endpoint mapper exposed via the PNIO-CM service. o Upgraded included libraries: Lua 5.4.6, libpcre2 10.43, zlib 1.3.1, libssh2 1.11.0, liblinear 2.47 o Upgraded OpenSSL binaries (for the Windows builds and for RPMs) to version 3.0.13. CVEs resolved in this update include only 2 moderate-severity issues which we do not believe affect Nmap: CVE-2023-5363 and CVE-2023-2650 o [Zenmap][Ndiff] Zenmap and Ndiff now use setuptools, not distutils for packaging. o [Ncat] Fixed Ncat UDP server mode to not quit after EOF on stdin. Reported as Debian bug: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1039613 o Fixed an issue where TCP Connect scan (-sT) on Windows would fail to open any sockets, leading to scans that never finish. [Daniel Miller] o [NSE] ssh-auth-methods will now print the pre-authentication banner text when available. Requires libssh2 1.11.0 or later. [Daniel Miller] o [Zenmap] Fix a crash in Zenmap when changing a host comment. o [NSE] Fix TLS 1.2 signature algorithms for EdDSA. [Daniel Roethlisberger] o [Zenmap] RPM spec files now correctly require the python3 package, not python>=3 o Improvements to OS detection fingerprint matching, including a syntax change for nmap-os-db that allows ranges within the TCP Options string. This leads to more concise and maintainable fingerprints. [Daniel Miller] o Improved the OS detection engine by using a new source port for each retry. Scans from systems such as Windows that do not send RST for unsolicited SYN|ACK responses were previously unable to get a response in subsequent tries. [Daniel Miller] o Several profile-guided optimizations of the port scan engine. [Daniel Miller] o Fix an out-of-bounds read which led to out-of-memory errors when duplicate addresses were used with --exclude o Fixed a memory leak in Nsock: compiled pcap filters were not freed. o Fixed a crash when using service name wildcards with -p, as in -p "http*" o [NSE] Fixed DNS TXT record parsing which caused asn-query to fail in Nmap 7.80 and later. [David Fifield, Mike Pattrick] o [NSE] Fixed packet size testing in KNX scripts [f0rw4rd] @ text @d1 1 a1 1 @@comment $NetBSD: PLIST,v 1.6 2023/06/06 10:45:10 adam Exp $ a2 2 ${PYSITELIB}/${WHEEL_INFODIR}/COPYING_HIGWIDGETS ${PYSITELIB}/${WHEEL_INFODIR}/LICENSE d7 2 @ 1.6 log @nmap ndiff zenmap: updated to 7.94 Nmap 7.94 [2023-05-19] o Zenmap and Ndiff now use Python 3! Thanks to the many contributors who made this effort possible: + [Zenmap] Updated Zenmap to Python 3 and PyGObject. [Jakub Kulík] + [Ndiff] Updated Ndiff to Python 3. [Brian Quigley] + Additional Python 3 update fixes by Sam James, Daniel Miller. Special thanks to those who opened Python 3-related issues and pull requests: Eli Schwartz, Romain Leonard, Varunram Ganesh, Pavel Zhukov, Carey Balboa, Hasan Aliyev, and others. o [Windows] Upgraded Npcap (our Windows raw packet capturing and transmission driver) from version 1.71 to the latest version 1.75. It includes dozens of performance improvements, bug fixes and feature enhancements described at https://npcap.com/changelog. o Nmap now prints vendor names based on MAC address for MA-S (24-bit), MA-M (28-bit), and MA-L (36-bit) registrations instead of the fixed 3-byte MAC prefix used previously for lookups. o Added partial silent-install support to the Nmap Windows installer. It previously didn't offer silent mode (/S) because the free/demo version of Npcap Windoes packet capturing driver that it needs and ships with doesn't include a silent installer. Now with the /S option, Nmap checks whether Npcap is already installed (either the free version or OEM) and will silently install itself if so. This is similar to how the Wireshark installer works and is particularly helpful for organizations that want to fully automate their Nmap (and Npcap) deployments. See https://nmap.org/nmap-silent-install for more details. o Lots of profile-guided memory and processing improvements for Nmap, including OS fingerprint matching, probe matching and retransmission lookups for large hostgroups, and service name lookups. Overhauled Nmap's string interning and several other startup-related procedures to speed up start times, especially for scans using OS detection. [Daniel Miller] o Integrated many of the most-submitted IPv4 OS fingerprints for recent versions of Windows, iOS, macOS, Linux, and BSD. Added 22 fingerprints, bringing the new total to 5700! o [NSE] Added the tftp-version script which requests a nonexistent file from a TFTP server and matches the error message to a database of known software. [Mak Kolybabi] o [Ncat] Ncat can now accept "connections" from multiple UDP hosts in listen mode with the --keep-open option. This also enables --broker and --chat via UDP. [Daniel Miller] o Upgraded OpenSSL binaries (for the Windows builds and for RPM's) to version 3.0.8. This resolves some CVE's (CVE-2022-3602; CVE-2022-3786) which don't impact Nmap proper since it doesn't do certificate validation, but could possibly impact Ncat when the --ssl-verify option is used. o Upgrade included libraries: zlib 1.2.13, Lua 5.4.4, libpcap 1.10.4 o Removed the bogus OpenSSL message from the Windows Nmap executable which looked like "NSOCK ERROR ssl_init_helper(): OpenSSL legacy provider failed to load." We actually already have the legacy provider built-in to our OpenSSL builds, and that's why loading the external one fails. o UDP port scan (-sU) and version scan (-sV) now both use the same data source, nmap-service-probes, for data payloads. Previously, the nmap-payloads file was used for port scan. Port scan responses will be used to kick-start the version matching process. [Daniel Miller] o Nmap's service scan (-sV) can now probe the UDP service behind a DTLS tunnel, the same as it already does for TCP services with SSL/TLS encryption. The DTLSSessionReq probe has had its rarity lowered to 2 to allow it to be sent sooner in the scan. [Daniel Miller] o [Ncat] Ncat in listen mode with --udp --ssl will use DTLS to secure incoming connections. [Daniel Miller] o Handle Internationalized Domain Names (IDN) like Яндекс.рф on platforms where getaddrinfo supports the AI_IDN flag. [Daniel Miller] o [Ncat] Addressed an issue from the Debian bug tracker (https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=969314) regarding data received immediately after a SOCKS CONNECT response. Ncat can now be correctly used in the ProxyCommand option of OpenSSH. o Improved DNS domain name parsing to avoid recursion and enforce name length limits, avoiding a theoretical stack overflow issue with certain crafted DNS server responses, reported by Philippe Antoine. o [NSE] Fix mpint packing in ssh2 library, which was causing OpenSSH errors like "ssh_dispatch_run_fatal: bignum is negative" [Sami Loone] o Updates to the Japanese manpage translation by Taichi Kotake. o [Ncat] Dramatically speed up Ncat transfers on Windows by avoiding a 125ms wait for every read from STDIN. [scriptjunkie] o [Windows] Periodically reset the system idle timer to keep the system from going to sleep while scans are in process. This only affects port scans and OS detection scans, since NSE and version scan do not rely on timing data to adjust speed. o Updated the Nmap Public Source License (NPSL) to Version 0.95. This just clarifies that the derivative works definition and all other license clauses only apply to parties who choose to accept the license in return for the special rights granted (such as Nmap redistribution rights). If a party can do everything they need to using copyright provisions outside of this license such as fair use, we support that and aren't trying to claim any control over their work. Versions of Nmap released under previous versions of the NPSL may also be used under the NPSL 0.95 terms. o Avoid storing many small strings from IPv4 OS detection results in the global string_pool. These were effectively leaked after a host is done being scanned, since string_pool allocations are not freed until Nmap quits. @ text @d1 1 a1 1 @@comment $NetBSD: PLIST,v 1.5 2022/01/14 17:52:02 wiz Exp $ d3 7 a9 4 ${PYSITELIB}/${EGG_INFODIR}/PKG-INFO ${PYSITELIB}/${EGG_INFODIR}/SOURCES.txt ${PYSITELIB}/${EGG_INFODIR}/dependency_links.txt ${PYSITELIB}/${EGG_INFODIR}/top_level.txt d184 50 a377 47 share/zenmap/config/scan_profile.usp share/zenmap/config/zenmap.conf share/zenmap/config/zenmap_version share/zenmap/docs/help.html share/zenmap/misc/profile_editor.xml share/zenmap/pixmaps/default_32.png share/zenmap/pixmaps/default_75.png share/zenmap/pixmaps/freebsd_32.png share/zenmap/pixmaps/freebsd_75.png share/zenmap/pixmaps/irix_32.png share/zenmap/pixmaps/irix_75.png share/zenmap/pixmaps/linux_32.png share/zenmap/pixmaps/linux_75.png share/zenmap/pixmaps/macosx_32.png share/zenmap/pixmaps/macosx_75.png share/zenmap/pixmaps/openbsd_32.png share/zenmap/pixmaps/openbsd_75.png share/zenmap/pixmaps/radialnet/border.png share/zenmap/pixmaps/radialnet/firewall.png share/zenmap/pixmaps/radialnet/logo.png share/zenmap/pixmaps/radialnet/padlock.png share/zenmap/pixmaps/radialnet/router.png share/zenmap/pixmaps/radialnet/switch.png share/zenmap/pixmaps/radialnet/wireless.png share/zenmap/pixmaps/redhat_32.png share/zenmap/pixmaps/redhat_75.png share/zenmap/pixmaps/solaris_32.png share/zenmap/pixmaps/solaris_75.png share/zenmap/pixmaps/throbber.gif share/zenmap/pixmaps/throbber.png share/zenmap/pixmaps/ubuntu_32.png share/zenmap/pixmaps/ubuntu_75.png share/zenmap/pixmaps/unknown_32.png share/zenmap/pixmaps/unknown_75.png share/zenmap/pixmaps/vl_1_32.png share/zenmap/pixmaps/vl_1_75.png share/zenmap/pixmaps/vl_2_32.png share/zenmap/pixmaps/vl_2_75.png share/zenmap/pixmaps/vl_3_32.png share/zenmap/pixmaps/vl_3_75.png share/zenmap/pixmaps/vl_4_32.png share/zenmap/pixmaps/vl_4_75.png share/zenmap/pixmaps/vl_5_32.png share/zenmap/pixmaps/vl_5_75.png share/zenmap/pixmaps/win_32.png share/zenmap/pixmaps/win_75.png share/zenmap/pixmaps/zenmap.png @ 1.5 log @*: python2 egg files are back, add them to the PLISTs @ text @d1 1 a1 1 @@comment $NetBSD$ d3 4 a108 1 ${PYSITELIB}/${EGG_INFODIR} a328 11 share/zenmap/locale/de/LC_MESSAGES/zenmap.mo share/zenmap/locale/es/LC_MESSAGES/zenmap.mo share/zenmap/locale/fr/LC_MESSAGES/zenmap.mo share/zenmap/locale/hi/LC_MESSAGES/zenmap.mo share/zenmap/locale/hr/LC_MESSAGES/zenmap.mo share/zenmap/locale/it/LC_MESSAGES/zenmap.mo share/zenmap/locale/ja/LC_MESSAGES/zenmap.mo share/zenmap/locale/pl/LC_MESSAGES/zenmap.mo share/zenmap/locale/pt_BR/LC_MESSAGES/zenmap.mo share/zenmap/locale/ru/LC_MESSAGES/zenmap.mo share/zenmap/locale/zh/LC_MESSAGES/zenmap.mo @ 1.4 log @zenmap: convert to egg.mk @ text @d1 1 a1 1 @@comment $NetBSD: PLIST,v 1.3 2021/04/16 06:55:33 adam Exp $ d105 1 @ 1.3 log @nmap ndiff zenmap: updated to 7.91 Nmap 7.91 [2020-10-09] o [Zenmap] Fix a crash in the profile editor due to a missing import. o [Nsock][Windows] Demote the IOCP Nsock engine because of some known issues that will take longer to resolve. The previous default "poll" engine will be used instead. o [Nsock][Windows] Fix a crash in service scan due to a previously-unknown error being returned from the IOCP Nsock engine. [Daniel Miller] o [NSE] Fix several places where Lua's os.time was being used to represent dates prior to January 1, 1970, which fails on Windows. Notably, NSE refused to run in UTC+X timezones with the error "time result cannot be represented in this installation" [Clément Notin, nnposter, Daniel Miller] o [NSE] MySQL library was not properly parsing server responses, resulting in script crashes. [nnposter] o Silence the irrelevant warning, "Your ports include 'T:' but you haven't specified any TCP scan type" when running nmap -sUV Nmap 7.90 [2020-10-02] o [Windows] Upgraded Npcap, our Windows packet capturing (and sending) library to the milestone 1.00 release! It's the culmination of 7 years of development with 170 public pre-releases. This includes dozens of performance improvements, bug fixes, and feature enhancements described at https://npcap.org/changelog. o Integrated over 800 service/version detection fingerprints submitted since August 2017. The signature count went up 1.8% to 11,878, including 17 new softmatches. We now detect 1237 protocols from airmedia-audio, banner-ivu, and control-m to insteon-plm, pi-hole-stats, and ums-webviewer. A significant number of submissions remain to be integrated in the next release. o Integrated over 330 of the most-frequently-submitted IPv4 OS fingerprints since August 2017. Added 26 fingerprints, bringing the new total to 5,678. Additions include iOS 12 & 13, macOS Catalina & Mojave, Linux 5.4, FreeBSD 13, and more. o Integrated all 67 of your IPv6 OS fingerprint submissions from August 2017 to September 2020. Added new groups for FreeBSD 12, Linux 5.4, and Windows 10, and consolidated several weak groups to improve classification accuracy. o [NSE] Added 3 NSE scripts, from 2 authors, bringing the total up to 601! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: + dicom-brute attempts to brute force the called Application Entity Title of DICOM servers. [Paulino Calderon] + dicom-ping discovers DICOM servers and determines if any Application Entity Title is allowed to connect. [Paulino Calderon] + uptime-agent-info collects system information from an Idera Uptime Infrastructure Monitor agent. [Daniel Miller] o Addressed over 250 code quality issues identified by LGTM.com, improving our code quality score from "C" to "A+" o Released Npcap OEM Edition. For more than 20 years, the Nmap Project has been funded by selling licenses for companies to distribute Nmap with their products, along with commercial support. Hundreds of commercial products now use Nmap for network discovery tasks like port scanning, host discovery, OS detection, service/version detection, and of course the Nmap Scripting Engine (NSE). Until now they have just used standard Nmap, but this new OEM Edition is customized for use within other Windows software. Nmap OEM contains the OEM version of our Npcap driver, which allows for silent installation. It also removes the Zenmap GUI, which cuts the installer size by more than half. And it reports itself as Nmap OEM so customers know it's a properly licensed Nmap. See https://nmap.org/oem for more details. We will be reaching out to all existing licensees with Nmap OEM access credentials, but any licensees who wants it quicker should see https://nmap.org/oem. o Upgraded the Nmap license form a sort of hacked-up version of GPLv2 to a cleaner and better organized version (still based on GPLv2) now called the Nmap Public Source License to avoid confusion. See https://nmap.org/npsl/ for more details and annotated license text. This NPSL project was started in 2006 (community discussion here: https://seclists.org/nmap-dev/2006/q4/126) and then it lost momentum for 7 years until it was restarted in 2013 (https://seclists.org/nmap-dev/2013/q1/399) and then we got distracted by development again. We still have some ideas for improving the NPSL, but it's already much better than the current license, so we're applying NPSL Version 0.92 to the code now and can make improvements later if needed. This does not change the license of previous Nmap releases. o Removed nmap-update. This program was intended to provide a way to update data files and NSE scripts, but the infrastructure was never fielded. It depended on Subversion version control and would have required maintaining separate versions of NSE scripts for compatibility. o Removed the silent-install command-line option (/S) from the Windows installer. It causes several problems and there were no objections when we proposed removing it in 2016 (https://seclists.org/nmap-dev/2016/q4/168). It will remain in Nmap OEM since its main use was for customers who redistribute Nmap with other software. If anyone else has a strong need for an Nmap silent installer, please contact sales@@nmap.com and we'll see what we can do. o 23 new UDP payloads and dozens more default ports for existing payloads developed for Rapid7's InsightVM scan engine. These speed up and ensure detection of open UDP services. [Paul Miseiko, Rapid7] o Added a UDP payload for STUN (Session Traversal Utilities for NAT). [David Fifield] o [NSE] Fixed an off-by-one bug in the stun.lua library that prevented parsing a server response. [David Fifield] o Restrict Nmap's search path for scripts and data files. NMAPDATADIR, defined on Unix and Linux as ${prefix}/share/nmap, will not be searched on Windows, where it was previously defined as C:\Nmap . Additionally, the --script option will not interpret names as directory names unless they are followed by a '/'. [Daniel Miller] o Fix an assertion failure when unsolicited ARP response is received: nmap: Target.cc:503: void Target::stopTimeOutClock(const timeval*): Assertion `htn.toclock_running == true' failed. o [NSE] New outlib library consolidates functions related to NSE output, both string formatting conventions and structured output. [Daniel Miller] o [NSE] New dicom library implements the DICOM protocol used for storing and transfering medical images. [Paulino Calderon] o Fix a regression in ARP host discovery left over from the move from massping to ultra_scan in Nmap 4.22SOC8 (2007) that sometimes resulted in missing ARP responses from targets near the end of a scan. Accuracy and speed are both improved. [Daniel Miller] o Restrict Nmap's search path for scripts and data files. NMAPDATADIR, defined on Unix and Linux as ${prefix}/share/nmap, will not be searched on Windows, where it was previously defined as C:\Nmap . Additionally, the --script option will not interpret names as directory names unless they are followed by a '/'. [Daniel Miller] o Fix the "iocp" Nsock engine for Windows to be able to correctly handle PCAP read events. This engine is now the default for Windows, which should greatly improve performance over the previous default, the "poll" engine. [Daniel Miller] o Reduced CPU usage of OS scan by 50% by avoiding string copy operations and removing undocumented fingerprint syntax unused in nmap-os-db ('&' and '+' in expressions). [Daniel Miller] o Allow multiple UDP payloads to be specified for a port in nmap-payloads. If the first payload does not get a response, the remaining payloads are tried round-robin. [Paul Miseiko, Rapid7] o New option --discovery-ignore-rst tells Nmap to ignore TCP RST responses when determining if a target is up. Useful when firewalls are spoofing RST packets. [Tom Sellers, Rapid7] o [Ncat] It is now possible to override the value of TLS SNI via --ssl-servername [Hank Leininger, nnposter] o Fixed parsing of TCP options which would hang (infinite loop) if an option had an explicit length of 0. Affects Nmap 7.80 only. [Daniel Miller, Imed Mnif] o [NSE] Script ssh2-enum-algos would fail if the server initiated the key exchange before completing the protocol version exchange [Scott Ellis, nnposter] o [NSE] Fetching of SSH2 keys might fail because of key exchange confusion [nnposter] o [NSE] Performance of script afp-ls has been dramatically improved [nnposter] o [NSE] Parsing of AFP FPGetFileDirParms and FPEnumerateExt2FPEnumerateExt2 responses was not working correctly [nnposter] o [NSE] Eliminated false positives in script http-shellshock caused by simple reflection of HTTP request data [Anders Kaseorg] o [NSE] SNMP scripts are now enabled on non-standard ports where SNMP has been detected [usd-markus, nnposter] o [NSE] MQTT library was using incorrect position when parsing received responses [tatulea] o [NSE] IPMI library was using incorrect position when parsing received responses [Star Salzman] o [NSE] Scripts ipmi-brute and deluge-rpc-brute were not capturing successfully brute-forced credentials [Star Salzman] o Allow resuming IPv6 scans with --resume. The address parsing was assuming IPv4 addresses, leading to "Unable to parse ip" error. In a related fix, MAC addresses will not be parsed as IP addresses when resuming from XML. [Daniel Miller] o Fix reverse-DNS handling of PTR records that are not lowercase. Nmap was failing to identify reverse-DNS names when the DNS server delivered them like ".IN-ADDR.ARPA". [Lucas Nussbaum, Richard Schütz, Daniel Miller] o [NSE] IKE library was not properly populating the protocol number in aggressive mode requests. [luc-x41] o Added service fingerprinting for MySQL 8.x, Microsoft SQL Server 2019, MariaDB, and Crate.io CrateDB. Updated PostreSQL coverage and added specific detection of recent versions running in Docker. [Tom Sellers] o New XML output "hosthint" tag emitted during host discovery when a target is found to be up. This gives earlier notification than waiting for the hostgroup to finish all scan phases. [Paul Miseiko] o New UDP payloads for GPRS Tunneling Protocol (GTP) on ports 2123, 2152, and 3386. [Guillaume Teissier] o [NSE] SSH scripts now run on several ports likely to be SSH based on empirical data from Shodan.io, as well as the netconf-ssh service. [Lim Shi Min Jonathan, Daniel Miller] o [Zenmap] Stop creating a debugging output file 'tmp.txt' on the desktop in macOS. [Roland Linder] o [Nping] Address build failure under libc++ due to "using namespace std;" in several headers, resulting in conflicting definitions of bind(). Reported by StormBytePP and Rosen Penev. [Daniel Miller] o [Ncat] Fix a fatal error when connecting to a Linux VM socket with verbose output enabled. [Stefano Garzarella] o [Ncat] Proxy credentials can be alternatively passed onto Ncat by setting environment variable NCAT_PROXY_AUTH, which reduces the risk of the credentials getting captured in process logs. [nnposter] o [NSE] Fixed a crash on Windows when processing a GZIP-encoded HTTP body. [Daniel Miller] o Upgrade libpcap to 1.9.1, which addresses several CVE vulnerabilities. o Upgrade libssh2 to 1.9.0, fixing compilation with OpenSSL 1.1.0 API. o Processing of IP address CIDR blocks was not working correctly on ppc64, ppc64le, and s390x architectures. [rfrohl, nnposter] o [Windows] Add support for the new loopback behavior in Npcap 0.9983 and later. This enables Nmap to scan localhost on Windows without needing the Npcap Loopback Adapter to be installed, which was a source of problems for some users. [Daniel Miller] o [NSE] MS SQL library has improved version resolution, from service pack level to individual cumulative updates [nnposter] o [NSE] With increased verbosity, script http-default-accounts now reports matched target fingerprints even if no default credentials were found [nnposter] o [NSE] IPP request object conversion to string was not working correctly [nnposter] o [NSE] IPP response parser was not correctly processing end-of-attributes-tag [nnposter] o [NSE] Script cups-info was failing due to erroneous double-decoding of the IPP printer status [nnposter] o [NSE] Oracle TNS parser was incorrectly unmarshalling DALC byte arrays [nnposter] o [NSE] The password hashing function for Oracle 10g was not working correctly for non-alphanumeric characters [nnposter] o [NSE] Virtual host probing list, vhosts-full.lst, was missing numerous entries present in vhosts-default.lst [nnposter] o [NSE] Script http-grep was not correctly calculating Luhn checksum [Colleen Li, nnposter] o [NSE] Scripts dhcp-discover and broadcast-dhcp-discover now support new argument "mac" to force a specific client MAC address [nnposter] o [NSE] Code improvements in RPC Dump, benefitting NFS-related scripts [nnposter] o [NSE] RPC code was using incorrect port range, which was causing some calls, such as NFS mountd, to fail intermittently [nnposter] o [NSE] XML output from script ssl-cert now includes RSA key modulus and exponent [nnposter] o [NSE] Nmap no longer crashes when SMB scripts, such as smb-ls, call smb.find_files [nnposter] o [NSE] The MongoDB library was causing errors when assembling protocol payloads. [nnposter] o [NSE] The RTSP library was not correctly generating request strings. [nnposter] o [NSE] VNC handshakes were failing with insert position out of bounds error. [nnposter] o [NSE] Function marshall_dom_sid2 in library msrpctypes was not correctly populating ID Authority. [nnposter] o [NSE] Unmarshalling functions in library msrpctypes were attempting arithmetic on a nil argument. [Ivan Ivanov, nnposter] o [NSE] Functions lsa_lookupnames2 and lsa_lookupsids2 in library msrpc were incorrectly referencing function strjoin when called with debug level 2 or higher. [Ivan Ivanov] o [NSE] Added HTTP default account fingerprints for Tomcat Host Manager and Dell iDRAC9. [Clément Notin] o [NSE] A MS-SMB spec non-compliance in Samba was causing protocol negotiation to fail with data string too short error. [Clément Notin, nnposter] o [NSE] A bug in SMB library was causing scripts to fail with bad format argument error. [Ivan Ivanov] o [NSE] The HTTP library no longer crashes when code requests digest authentication but the server does not provide the necessary authentication header. [nnposter] o [NSE] Fixed a bug in http-wordpress-users.nse that could cause extraneous output to be captured as part of a username. [Duarte Silva] @ text @d1 1 a1 1 @@comment $NetBSD: PLIST,v 1.2 2019/08/28 13:55:44 adam Exp $ a2 1 ${PYSITELIB}/${EGG_FILE} @ 1.2 log @nmap: updated to 7.80 7.80: Here is the full list of significant changes: o [Windows] The Npcap Windows packet capturing library (https://npcap.org/) is faster and more stable than ever. Nmap 7.80 updates the bundled Npcap from version 0.99-r2 to 0.9982, including all of these changes from the last 15 Npcap releases: https://nmap.org/npcap/changelog o [NSE] Added 11 NSE scripts, from 8 authors, bringing the total up to 598! They are all listed at https://nmap.org/nsedoc/, and the summaries are below: + broadcast-hid-discoveryd discovers HID devices on a LAN by sending a discoveryd network broadcast probe. + broadcast-jenkins-discover discovers Jenkins servers on a LAN by sending a discovery broadcast probe. + http-hp-ilo-info extracts information from HP Integrated Lights-Out (iLO) servers. + http-sap-netweaver-leak detects SAP Netweaver Portal with the Knowledge Management Unit enabled with anonymous access. + https-redirect detects HTTP servers that redirect to the same port, but with HTTPS. Some nginx servers do this, which made ssl-* scripts not run properly. + lu-enum enumerates Logical Units (LU) of TN3270E servers. + rdp-ntlm-info extracts Windows domain information from RDP services. + smb-vuln-webexec checks whether the WebExService is installed and allows code execution. + smb-webexec-exploit exploits the WebExService to run arbitrary commands with SYSTEM privileges. + ubiquiti-discovery extracts information from the Ubiquiti Discovery service and assists version detection. + vulners queries the Vulners CVE database API using CPE information from Nmap's service and application version detection. o Use pcap_create instead of pcap_live_open in Nmap, and set immediate mode on the pcap descriptor. This solves packet loss problems on Linux and may improve performance on other platforms. o [NSE] Collected utility functions for string processing into a new library, stringaux.lua. o [NSE] New rand.lua library uses the best sources of random available on the system to generate random strings. o [NSE] New library, oops.lua, makes reporting errors easy, with plenty of debugging detail when needed, and no clutter when not. o [NSE] Collected utility functions for manipulating and searching tables into a new library, tableaux.lua. o [NSE] New knx.lua library holds common functions and definitions for communicating with KNX/Konnex devices. o [NSE] The HTTP library now provides transparent support for gzip- encoded response body. (See https://github.com/nmap/nmap/pull/1571 for an overview.) o [Nsock][Ncat] Add AF_VSOCK (Linux VM sockets) functionality to Nsock and Ncat. VM sockets are used for communication between virtual machines and the hypervisor. o [Security][Windows] Address CVE-2019-1552 in OpenSSL by building with the prefix "C:\Program Files (x86)\Nmap\OpenSSL". This should prevent unauthorized users from modifying OpenSSL defaults by writing configuration to this directory. o [Security] Reduced LibPCRE resource limits so that version detection can't use as much of the stack. Previously Nmap could crash when run on low-memory systems against target services which are intentionally or accidentally difficult to match. Someone assigned CVE-2018-15173 for this issue. o Deprecate and disable the -PR (ARP ping) host discovery option. ARP ping is already used whenever possible, and the -PR option would not force it to be used in any other case. o [NSE] bin.lua is officially deprecated. Lua 5.3, added 2 years ago in Nmap 7.25BETA2, has native support for binary data packing via string.pack and string.unpack. All existing scripts and libraries have been updated. o [NSE] Completely removed the bit.lua NSE library. All of its functions are replaced by native Lua bitwise operations, except for `arshift` (arithmetic shift) which has been moved to the bits.lua library. [Daniel Miller] o [NSE] The HTTP library is now enforcing a size limit on the received response body. The default limit can be adjusted with a script argument, which applies to all scripts, and can be overridden case-by-case with an HTTP request option. (See https://github.com/nmap/nmap/pull/1571 for details.) o [NSE] CR characters are no longer treated as illegal in script XML output. o Allow resuming nmap scan with lengthy command line [Clément Notin] o [NSE] Add TLS support to rdp-enum-encryption. Enables determining protocol version against servers that require TLS and lays ground work for some NLA/CredSSP information collection. o [NSE] Address two protocol parsing issues in rdp-enum-encryption and the RDP nse library which broke scanning of Windows XP. Clarify protocol types o [NSE] Script http-fileupload-exploiter failed to locate its resource file unless executed from a specific working directory. o [NSE] Avoid clobbering the "severity" and "ignore_404" values of fingerprints in http-enum. None of the standard fingerprints uses these fields. o [NSE] Fix a crash caused by a double-free of libssh2 session data when running SSH NSE scripts against non-SSH services. o [NSE] Updates the execution rule of the mongodb scripts to be able to run on alternate ports. o [Ncat] Allow Ncat to connect to servers on port 0, provided that the socket implementation allows this. o Update the included libpcap to 1.9.0. o [NSE] Fix a logic error that resulted in scripts not honoring the smbdomain script-arg when the target provided a domain in the NTLM challenge. o [Nsock] Avoid a crash (Protocol not supported) caused by trying to reconnect with SSLv2 when an error occurs during DTLS connect. [Daniel Miller] o [NSE] Removed OSVDB references from scripts and replaced them with BID references where possible. o [NSE] Updates TN3270.lua and adds argument to disable TN3270E o RMI parser could crash when encountering invalid input [Clément Notin] o Avoid reporting negative latencies due to matching an ARP or ND response to a probe sent after it was recieved. o [Ncat] To avoid confusion and to support non-default proxy ports, option --proxy now requires a literal IPv6 address to be specified using square-bracket notation, such as --proxy o [Ncat] New ncat option provides control over whether proxy destinations are resolved by the remote proxy server or locally, by Ncat itself. See option --proxy-dns. o [NSE] Updated script ftp-syst to prevent potential endless looping. o New service probes and match lines for v1 and v2 of the Ubiquiti Discovery protocol. Devices often leave the related service open and it exposes significant amounts of information as well as the risk of being used as part of a DDoS. New nmap-payload entry for v1 of the protocol. o [NSE] Removed hostmap-ip2hosts.nse as the API has been broken for a while and the service was completely shutdown on Feb 17th, 2019. [Paulino Calderon] o [NSE] Adds TN3270E support and additional improvements to tn3270.lua and updates tn3270-screen.nse to display the new setting. o [NSE] Updates product codes and adds a check for response length in enip-info.nse. The script now uses string.unpack. o [Ncat] Temporary RSA keys are now 2048-bit to resolve a compatibility issue with OpenSSL library configured with security level 2, as seen on current Debian or Kali. o [NSE] Fix a crash (double-free) when using SSH scripts against non-SSH services. o [Zenmap] Fix a crash when Nmap executable cannot be found and the system PATH contains non-UTF-8 bytes, such as on Windows. o [Zenmap] Fix a crash in results search when using the dir: operator: AttributeError: 'SearchDB' object has no attribute 'match_dir' [Daniel Miller] o [Ncat] Fixed an issue with Ncat -e on Windows that caused early termination of connections. o [NSE] Fix a false-positive in http-phpmyadmin-dir-traversal when the server responds with 200 status to a POST request to any URI. o [NSE] New vulnerability state in vulns.lua, UNKNOWN, is used to indicate that testing could not rule out vulnerability. o When searching for Lua header files, actually use them where they are found instead of forcing /usr/include. [Fabrice Fontaine, Daniel Miller] o [NSE] Script traceroute-geolocation no longer crashes when www.GeoPlugin.net returns null coordinates o Limit verbose -v and debugging -d levels to a maximum of 10. Nmap does not use higher levels internally. o [NSE] tls.lua when creating a client_hello message will now only use a SSLv3 record layer if the protocol version is SSLv3. Some TLS implementations will not handshake with a client offering less than TLSv1.0. Scripts will have to manually fall back to SSLv3 to talk to SSLv3-only servers. o [NSE] Fix a few false-positive conditions in ssl-ccs-injection. TLS implementations that responded with fatal alerts other than "unexpected message" had been falsely marked as vulnerable. o Emergency fix to Nmap's birthday announcement so Nmap wishes itself a "Happy 21st Birthday" rather than "Happy 21th" in verbose mode (-v) on September 1, 2018. o Start host timeout clocks when the first probe is sent to a host, not when the hostgroup is started. Sometimes a host doesn't get probes until late in the hostgroup, increasing the chance it will time out. o [NSE] Support for edns-client-subnet (ECS) in dns.lua has been improved by: - - Properly trimming ECS address, as mandated by RFC 7871 - Fixing a bug that prevented using the same ECS option table more than once o [Ncat] Fixed communication with commands launched with -e or -c on Windows, especially when --ssl is used. o [NSE] Script http-default-accounts can now select more than one fingerprint category. It now also possible to select fingerprints by name to support very specific scanning. o [NSE] Script http-default-accounts was not able to run against more than one target host/port. o [NSE] New script-arg `http.host` allows users to force a particular value for the Host header in all HTTP requests. o [NSE] Use smtp.domain script arg or target's domain name instead of "example.com" in EHLO command used for STARTTLS. o [NSE] Fix brute.lua's BruteSocket wrapper, which was crashing Nmap with an assertion failure due to socket mixup [Daniel Miller]: nmap: nse_nsock.cc:672: int receive_buf(lua_State*, int, lua_KContext): Assertion `lua_gettop(L) == 7' failed. o [NSE] Handle an error condition in smb-vuln-ms17-010 caused by IPS closing the connection. o [Ncat] Fixed literal IPv6 URL format for connecting through HTTP proxies. o [NSE] Updates vendors from ODVA list for enip-info. [NothinRandom] o [NSE] Add two common error strings that improve MySQL detection by the script http-sql-injection. o [NSE] Fix bug in http-vuln-cve2006-3392 that prevented the script to generate the vulnerability report correctly. o [NSE] Fix bug related to screen rendering in NSE library tn3270. This patch also improves the brute force script tso-brute. o [NSE] Fix SIP, SASL, and HTTP Digest authentication when the algorithm contains lowercase characters. o Nmap could be fooled into ignoring TCP response packets if they used an unknown TCP Option, which would misalign the validation, causing it to fail. o [NSE]The HTTP response parser now tolerates status lines without a reason phrase, which improves compatibility with some HTTP servers. o [NSE]] Parser for HTTP Set-Cookie header is now more compliant with RFC 6265: - empty attributes are tolerated - double quotes in cookie and/or attribute values are treated literally - attributes with empty values and value-less attributes are parsed equally - attributes named "name" or "value" are ignored o [NSE] Fix parsing http-grep.match script-arg. [Hans van den Bogert] o [Zenmap] Avoid a crash when recent_scans.txt cannot be written to. o Fixed --resume when the path to Nmap contains spaces. o New service probe and match lines for adb, the Android Debug Bridge, which allows remote code execution and is left enabled by default on many devices. @ text @d1 1 a1 1 @@comment $NetBSD: PLIST,v 1.1 2018/04/14 13:04:33 adam Exp $ a321 3 ${PYSITELIB}/zenmapGUI/higwidgets/utils.py ${PYSITELIB}/zenmapGUI/higwidgets/utils.pyc ${PYSITELIB}/zenmapGUI/higwidgets/utils.pyo @ 1.1 log @nmap: ndiff and zenmap are now separate packages (incl. build fixes for zenmap) @ text @d1 1 a1 1 @@comment $NetBSD$ d3 1 a105 1 ${PYSITELIB}/zenmap-7.70-py2.7.egg-info @