Date: Wed, 1 Apr 2009 14:06:26 +0200 (CEST) From: Wouter Oosterveld <wouter@fizzyflux.nl> To: FreeBSD-gnats-submit@FreeBSD.org Cc: wouter@trimm.nl Subject: ports/133268: [ports][security/nmap] New recommended version Message-ID: <200904011206.n31C6QcB040944@canoe.trimm.net> Resent-Message-ID: <200904011230.n31CU41N033131@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 133268 >Category: ports >Synopsis: [ports][security/nmap] New recommended version >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: change-request >Submitter-Id: current-users >Arrival-Date: Wed Apr 01 12:30:04 UTC 2009 >Closed-Date: >Last-Modified: >Originator: Wouter Oosterveld >Release: FreeBSD 6.3-RELEASE amd64 >Organization: None >Environment: System: FreeBSD canoe.trimm.net 6.3-RELEASE FreeBSD 6.3-RELEASE #1: Wed Jan 30 17:20:21 CET 2008 root@canoe.trimm.net:/usr/obj/usr/src/sys/CANOE amd64 >Description: Update port security/nmap to recommended version. Fyodor notes: "Note that I've removed 4.76 from the D/L page as I think 4.85BETA5 is the way to go in general." - http:///seclists.org/nmap-dev/2009/q1/0870.html >How-To-Repeat: >Fix: --- nmap_4.85BETA5.shar begins here --- # This is a shell archive. Save it in a file, remove anything before # this line, and then unpack it by entering "sh file". Note, it may # create directories; files and directories will be owned by you and # have default permissions. # # This archive contains: # # security/nmap # security/nmap/files # security/nmap/files/patch-configure # security/nmap/files/patch-libdnet-stripped__src__eth-bsd.c # security/nmap/files/patch-Makefile.in # security/nmap/files/patch-nmap.cc # security/nmap/files/patch-tcpip.cc # security/nmap/Makefile # security/nmap/distinfo # security/nmap/pkg-descr # security/nmap/pkg-plist # echo c - security/nmap mkdir -p security/nmap > /dev/null 2>&1 echo c - security/nmap/files mkdir -p security/nmap/files > /dev/null 2>&1 echo x - security/nmap/files/patch-configure sed 's/^X//' >security/nmap/files/patch-configure << '058ca0a46c0da230a1b866d2b434b0a8' X--- configure.orig 2008-06-15 09:05:12.000000000 +0200 X+++ configure 2008-08-03 12:41:04.000000000 +0200 X@@ -1930,7 +1930,7 @@ X ac_compiler_gnu=$ac_cv_c_compiler_gnu X if test -n "$ac_tool_prefix"; then X # Extract the first word of "${ac_tool_prefix}gcc", so it can be a program name with args. X-set dummy ${ac_tool_prefix}gcc; ac_word=$2 X+set dummy ${ac_tool_prefix}$CXX; ac_word=$2 X { echo "$as_me:$LINENO: checking for $ac_word" >&5 X echo $ECHO_N "checking for $ac_word... $ECHO_C" >&6; } X if test "${ac_cv_prog_CC+set}" = set; then X@@ -7337,8 +7337,8 @@ X no_lua="yes" X ;; X *) X- CPPFLAGS="-I$with_liblua/include $CPPFLAGS" X- LDFLAGS="-L$with_liblua/lib $LDFLAGS" X+ CPPFLAGS="-I${LUA_INCDIR} $CPPFLAGS" X+ LDFLAGS="-L${LUA_LIBDIR} $LDFLAGS" X ;; X esac X 058ca0a46c0da230a1b866d2b434b0a8 echo x - security/nmap/files/patch-libdnet-stripped__src__eth-bsd.c sed 's/^X//' >security/nmap/files/patch-libdnet-stripped__src__eth-bsd.c << '2401c9f95661a6ca9920a5aeb7215d7a' X# X# $FreeBSD: ports/security/nmap/files/patch-libdnet-stripped__src__eth-bsd.c,v 1.1 2006/06/06 01:30:16 mnag Exp $ X# X# - nmap fails to attach to bpf when more than 128 bpfs are busy. X# PR: 98080 X# X--- libdnet-stripped/src/eth-bsd.c.orig X+++ libdnet-stripped/src/eth-bsd.c X@@ -45,7 +45,7 @@ X int i; X X if ((e = calloc(1, sizeof(*e))) != NULL) { X- for (i = 0; i < 128; i++) { X+ for (i = 0; i < 1024; i++) { X snprintf(file, sizeof(file), "/dev/bpf%d", i); X e->fd = open(file, O_WRONLY); X if (e->fd != -1 || errno != EBUSY) 2401c9f95661a6ca9920a5aeb7215d7a echo x - security/nmap/files/patch-Makefile.in sed 's/^X//' >security/nmap/files/patch-Makefile.in << 'f6b68a49cdb30293802378da357880f6' X--- Makefile.in.orig 2008-01-24 02:36:01.000000000 +0100 X+++ Makefile.in 2008-04-13 16:48:40.000000000 +0200 X@@ -11,7 +11,7 @@ X srcdir = @srcdir@ X nmaplibexecdir = @libexecdir@/nmap X nmapdatadir = @datadir@/nmap X-deskdir = $(prefix)/share/applications X+deskdir = $(LOCALBASE)/share/applications X NMAPDEVDIR=~/nmap-dev X X export NBASEDIR=@NBASEDIR@ f6b68a49cdb30293802378da357880f6 echo x - security/nmap/files/patch-nmap.cc sed 's/^X//' >security/nmap/files/patch-nmap.cc << '7ab24d917799ec984de6ab79b4b721a0' X--- nmap.cc.orig Sat Dec 22 07:32:03 2007 X+++ nmap.cc Thu Jan 10 20:41:30 2008 X@@ -99,6 +99,7 @@ X X /* $Id: nmap.cc 6633 2007-12-22 06:32:03Z fyodor $ */ X X+#include <getopt.h> X #include "nmap.h" X #include "osscan.h" X #include "osscan2.h" 7ab24d917799ec984de6ab79b4b721a0 echo x - security/nmap/files/patch-tcpip.cc sed 's/^X//' >security/nmap/files/patch-tcpip.cc << 'c9442e3c7598e9a9d9d389f54cbf1ffe' X--- tcpip.cc.orig Fri Dec 8 04:01:19 2006 X+++ tcpip.cc Wed Jan 3 17:15:05 2007 X@@ -133,6 +133,8 @@ X #endif /* NETINET_IF_ETHER_H */ X #endif /* HAVE_NETINET_IF_ETHER_H */ X X+#include <sys/param.h> X+ X extern NmapOps o; X X #ifdef WIN32 X@@ -1959,7 +1961,7 @@ X X // Returns whether the system supports pcap_get_selectable_fd() properly X bool pcap_selectable_fd_valid() { X-#if defined(WIN32) || defined(MACOSX) X+#if defined(WIN32) || defined(MACOSX) || (defined(FREEBSD) && (__FreeBSD_version < 500000)) X return false; X #endif X return true; X@@ -1972,7 +1974,7 @@ X results. If you just want to test whether the function is supported, X use pcap_selectable_fd_valid() instead. */ X int my_pcap_get_selectable_fd(pcap_t *p) { X-#if defined(WIN32) || defined(MACOSX) X+#if defined(WIN32) || defined(MACOSX) || (defined(FREEBSD) && (__FreeBSD_version < 500000)) X return -1; X #else X assert(pcap_selectable_fd_valid()); c9442e3c7598e9a9d9d389f54cbf1ffe echo x - security/nmap/Makefile sed 's/^X//' >security/nmap/Makefile << '843e79ee054783564c8ca51f6fe38f0b' X# Ports collection makefile for: nmap X# Date created: Tue Aug 04, 1998 X# Whom: David O'Brien (obrien@NUXI.com) X# X# $FreeBSD: ports/security/nmap/Makefile,v 1.113 2008/09/24 14:47:04 miwi Exp $ X# X XPORTNAME= nmap XDISTVERSION= 4.85BETA6 XCATEGORIES= security ipv6 XMASTER_SITES= http://nmap.org/dist/ \ X http://www.mirrors.wiretapped.net/security/network-mapping/nmap/ \ X http://www.mirrorservice.org/sites/ftp.wiretapped.net/pub/security/network-mapping/nmap/ \ X http://mirror.sg.depaul.edu/pub/security/nmap/ X XMAINTAINER= daniel@roe.ch XCOMMENT= Port scanning utility for large networks X XLIB_DEPENDS= pcre.0:${PORTSDIR}/devel/pcre \ X dnet.1:${PORTSDIR}/net/libdnet X XUSE_LUA= 5.1 XLUA_COMPS= lua XUSE_BZIP2= yes XUSE_GMAKE= yes XGNU_CONFIGURE= yes XCONFIGURE_ARGS= --without-localdirs \ X --without-zenmap \ X --with-libpcre=${LOCALBASE} \ X --with-libdnet=${LOCALBASE} \ X --with-liblua=${LOCALBASE} XCONFIGURE_ENV= LUA_INCDIR="${LUA_INCDIR}" LUA_LIBDIR="${LUA_LIBDIR}" X XMAN1= nmap.1 X X.ifndef WITHOUT_SSL XUSE_OPENSSL= yes XCONFIGURE_ARGS+= --with-openssl=${OPENSSLBASE} XCONFIGURE_ENV+= CFLAGS="${CFLAGS} -I${OPENSSLINC}" X.else XCONFIGURE_ARGS+= --without-openssl X.endif X Xpost-configure: X @${REINPLACE_CMD} -e "s|^DESTDIR *=|& ${DESTDIR}|" ${WRKSRC}/Makefile X Xpost-install: X.ifndef NOPORTDOCS X @${MKDIR} ${DOCSDIR} X @for doc in CHANGELOG HACKING docs/nmap.dtd; do \ X ${INSTALL_DATA} ${WRKSRC}/$${doc} ${DOCSDIR}; \ X done X.endif X X.include <bsd.port.mk> 843e79ee054783564c8ca51f6fe38f0b echo x - security/nmap/distinfo sed 's/^X//' >security/nmap/distinfo << '1e077c1061e08ca18c0f70252ffb9777' XMD5 (nmap-4.85BETA6.tar.bz2) = 330aa3080845150d1df3f598a821e310 XSHA256 (nmap-4.85BETA6.tar.bz2) = 22a54b5d4ff4a358fc959ac023b7af5119b0c849abd143a362ade04862b2a9e4 XSIZE (nmap-4.85BETA6.tar.bz2) = 6454053 1e077c1061e08ca18c0f70252ffb9777 echo x - security/nmap/pkg-descr sed 's/^X//' >security/nmap/pkg-descr << '47f50fbf14ccd67eabf56e33763f5cf5' XNmap is a utility for network exploration or security auditing. It Xsupports ping scanning (determine which hosts are up), many port Xscanning techniques, version detection (determine service protocols Xand application versions listening behind ports), and TCP/IP Xfingerprinting (remote host OS or device identification). Nmap also Xoffers flexible target and port specification, decoy/stealth scanning, XsunRPC scanning, and much more. X XWWW: http://nmap.org/ X XSee the web page and the Phrack Magazine article (Volume 7, Issue 51 XSeptember 01, 1997, article 11 of 17) http://nmap.org/p51-11.html 47f50fbf14ccd67eabf56e33763f5cf5 echo x - security/nmap/pkg-plist sed 's/^X//' >security/nmap/pkg-plist << '4819acb3613e688ada293942a317c5de' Xbin/nmap Xbin/ncat Xbin/ndiff X%%DATADIR%%/scripts/script.db X%%DATADIR%%/scripts/rpcinfo.nse X%%DATADIR%%/scripts/nbstat.nse X%%DATADIR%%/scripts/finger.nse X%%DATADIR%%/scripts/whois.nse X%%DATADIR%%/scripts/upnp-info.nse X%%DATADIR%%/scripts/telnet-brute.nse X%%DATADIR%%/scripts/sslv2.nse X%%DATADIR%%/scripts/sshv1.nse X%%DATADIR%%/scripts/ssh-hostkey.nse X%%DATADIR%%/scripts/sql-injection.nse X%%DATADIR%%/scripts/snmp-sysdescr.nse X%%DATADIR%%/scripts/snmp-brute.nse X%%DATADIR%%/scripts/sniffer-detect.nse X%%DATADIR%%/scripts/smtp-strangeport.nse X%%DATADIR%%/scripts/smtp-open-relay.nse X%%DATADIR%%/scripts/smtp-commands.nse X%%DATADIR%%/scripts/smb-system-info.nse X%%DATADIR%%/scripts/smb-server-stats.nse X%%DATADIR%%/scripts/smb-security-mode.nse X%%DATADIR%%/scripts/smb-pwdump.nse X%%DATADIR%%/scripts/smb-os-discovery.nse X%%DATADIR%%/scripts/smb-enum-users.nse X%%DATADIR%%/scripts/smb-enum-shares.nse X%%DATADIR%%/scripts/smb-enum-sessions.nse X%%DATADIR%%/scripts/smb-enum-processes.nse X%%DATADIR%%/scripts/smb-enum-domains.nse X%%DATADIR%%/scripts/smb-check-vulns.nse X%%DATADIR%%/scripts/smb-brute.nse X%%DATADIR%%/scripts/skypev2-version.nse X%%DATADIR%%/scripts/robots.txt.nse X%%DATADIR%%/scripts/realvnc-auth-bypass.nse X%%DATADIR%%/scripts/pptp-version.nse X%%DATADIR%%/scripts/pop3-capabilities.nse X%%DATADIR%%/scripts/pop3-brute.nse X%%DATADIR%%/scripts/mysql-info.nse X%%DATADIR%%/scripts/ms-sql-info.nse X%%DATADIR%%/scripts/irc-info.nse X%%DATADIR%%/scripts/iax2-version.nse X%%DATADIR%%/scripts/http-trace.nse X%%DATADIR%%/scripts/http-passwd.nse X%%DATADIR%%/scripts/http-open-proxy.nse X%%DATADIR%%/scripts/http-auth.nse X%%DATADIR%%/scripts/html-title.nse X%%DATADIR%%/scripts/ftp-brute.nse X%%DATADIR%%/scripts/ftp-bounce.nse X%%DATADIR%%/scripts/ftp-anon.nse X%%DATADIR%%/scripts/dns-zone-transfer.nse X%%DATADIR%%/scripts/dns-recursion.nse X%%DATADIR%%/scripts/dns-random-txid.nse X%%DATADIR%%/scripts/dns-random-srcport.nse X%%DATADIR%%/scripts/daytime.nse X%%DATADIR%%/scripts/banner.nse X%%DATADIR%%/scripts/auth-spoof.nse X%%DATADIR%%/scripts/auth-owners.nse X%%DATADIR%%/scripts/asn-query.nse X@dirrm %%DATADIR%%/scripts X%%DATADIR%%/nselib/http.lua X%%DATADIR%%/nselib/ipOps.lua X%%DATADIR%%/nselib/strbuf.lua X%%DATADIR%%/nselib/stdnse.lua X%%DATADIR%%/nselib/shortport.lua X%%DATADIR%%/nselib/packet.lua X%%DATADIR%%/nselib/match.lua X%%DATADIR%%/nselib/listop.lua X%%DATADIR%%/nselib/url.lua X%%DATADIR%%/nselib/tab.lua X%%DATADIR%%/nselib/datafiles.lua X%%DATADIR%%/nselib/comm.lua X%%DATADIR%%/nselib/base64.lua X%%DATADIR%%/nselib/unpwdb.lua X%%DATADIR%%/nselib/snmp.lua X%%DATADIR%%/nselib/pop3.lua X%%DATADIR%%/nselib/dns.lua X%%DATADIR%%/nselib/ssh2.lua X%%DATADIR%%/nselib/ssh1.lua X%%DATADIR%%/nselib/smbauth.lua X%%DATADIR%%/nselib/smb.lua X%%DATADIR%%/nselib/nsedebug.lua X%%DATADIR%%/nselib/netbios.lua X%%DATADIR%%/nselib/msrpctypes.lua X%%DATADIR%%/nselib/msrpcperformance.lua X%%DATADIR%%/nselib/msrpc.lua X@dirrm %%DATADIR%%/nselib X%%DATADIR%%/nmap-mac-prefixes X%%DATADIR%%/nmap-os-db X%%DATADIR%%/nmap-protocols X%%DATADIR%%/nmap-rpc X%%DATADIR%%/nmap-service-probes X%%DATADIR%%/nmap-services X%%DATADIR%%/nmap.dtd X%%DATADIR%%/nmap.xsl X@dirrm %%DATADIR%% X%%PORTDOCS%%%%DOCSDIR%%/CHANGELOG X%%PORTDOCS%%%%DOCSDIR%%/HACKING X%%PORTDOCS%%%%DOCSDIR%%/nmap.dtd X%%PORTDOCS%%@dirrm %%DOCSDIR%% 4819acb3613e688ada293942a317c5de exit --- nmap_4.85BETA5.shar ends here --- >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200904011206.n31C6QcB040944>