Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 21 Jan 2008 14:00:08 GMT
From:      Daniel Roethlisberger <daniel@roe.ch>
To:        freebsd-ports-bugs@FreeBSD.org
Subject:   Re: ports/119844: security/nmap 4.53 has been released (we missed 4.21, 4.22, 4.23, 4.50, 4.51, 4.52 already)
Message-ID:  <200801211400.m0LE08Ot064523@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help
The following reply was made to PR ports/119844; it has been noted by GNATS.

From: Daniel Roethlisberger <daniel@roe.ch>
To: Dan Lukes <dan@obluda.cz>
Cc: bug-followup@FreeBSD.org
Subject: Re: ports/119844: security/nmap 4.53 has been released (we missed 4.21,4.22,4.23,4.50,4.51,4.52 already)
Date: Mon, 21 Jan 2008 14:52:38 +0100

 Dan Lukes <dan@obluda.cz> 2008-01-21:
 > I'm not interested in new features (even the zenmap didn't interest
 > me). But too ancient os-fingerprint database and MAC OUI database
 > prevent professional use of nmap against current computers.
 
 I rarely see any brand-new devices when pen-testing :-)
 
 On a more serious note though, if you care about bleeding-edge
 fingerprint and MAC OUI databases, you might want to consider to
 maintain a security/nmap-devel port.
 
 Thanks for your porting notes, I will take your changes into account
 when updating the port to 4.53.  I think some of it is already handled
 by my update, but not all of it.
 
 Thanks!
 
 -- 
 Daniel Roethlisberger <daniel@roe.ch>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200801211400.m0LE08Ot064523>