Date: Mon, 21 Jan 2008 14:00:08 GMT From: Daniel Roethlisberger <daniel@roe.ch> To: freebsd-ports-bugs@FreeBSD.org Subject: Re: ports/119844: security/nmap 4.53 has been released (we missed 4.21, 4.22, 4.23, 4.50, 4.51, 4.52 already) Message-ID: <200801211400.m0LE08Ot064523@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
The following reply was made to PR ports/119844; it has been noted by GNATS. From: Daniel Roethlisberger <daniel@roe.ch> To: Dan Lukes <dan@obluda.cz> Cc: bug-followup@FreeBSD.org Subject: Re: ports/119844: security/nmap 4.53 has been released (we missed 4.21,4.22,4.23,4.50,4.51,4.52 already) Date: Mon, 21 Jan 2008 14:52:38 +0100 Dan Lukes <dan@obluda.cz> 2008-01-21: > I'm not interested in new features (even the zenmap didn't interest > me). But too ancient os-fingerprint database and MAC OUI database > prevent professional use of nmap against current computers. I rarely see any brand-new devices when pen-testing :-) On a more serious note though, if you care about bleeding-edge fingerprint and MAC OUI databases, you might want to consider to maintain a security/nmap-devel port. Thanks for your porting notes, I will take your changes into account when updating the port to 4.53. I think some of it is already handled by my update, but not all of it. Thanks! -- Daniel Roethlisberger <daniel@roe.ch>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200801211400.m0LE08Ot064523>