pkgsrc-Changes archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

CVS commit: pkgsrc/net



Module Name:    pkgsrc
Committed By:   adam
Date:           Tue Jun  6 10:45:10 UTC 2023

Modified Files:
        pkgsrc/net/ndiff: Makefile distinfo
        pkgsrc/net/nmap: Makefile.common PLIST distinfo
        pkgsrc/net/zenmap: Makefile PLIST distinfo
Removed Files:
        pkgsrc/net/zenmap/patches: patch-zenmapCore_Paths.py

Log Message:
nmap ndiff zenmap: updated to 7.94

Nmap 7.94 [2023-05-19]

o Zenmap and Ndiff now use Python 3! Thanks to the many contributors who made
  this effort possible:
  + [Zenmap] Updated Zenmap to Python 3 and PyGObject. [Jakub Kulík]

  + [Ndiff] Updated Ndiff to Python 3. [Brian Quigley]

  + Additional Python 3 update fixes by Sam James, Daniel Miller. Special thanks
    to those who opened Python 3-related issues and pull requests: Eli
    Schwartz, Romain Leonard, Varunram Ganesh, Pavel Zhukov, Carey Balboa,
    Hasan Aliyev, and others.

o [Windows] Upgraded Npcap (our Windows raw packet capturing and
  transmission driver) from version 1.71 to the latest version 1.75. It
  includes dozens of performance improvements, bug fixes and feature
  enhancements described at https://npcap.com/changelog.

o Nmap now prints vendor names based on MAC address for MA-S (24-bit), MA-M
  (28-bit), and MA-L (36-bit) registrations instead of the fixed 3-byte MAC
  prefix used previously for lookups.

o Added partial silent-install support to the Nmap Windows
  installer. It previously didn't offer silent mode (/S) because the
  free/demo version of Npcap Windoes packet capturing driver that it
  needs and ships with doesn't include a silent installer. Now with
  the /S option, Nmap checks whether Npcap is already installed
  (either the free version or OEM) and will silently install itself if
  so. This is similar to how the Wireshark installer works and is
  particularly helpful for organizations that want to fully automate
  their Nmap (and Npcap) deployments. See
  https://nmap.org/nmap-silent-install for more details.

o Lots of profile-guided memory and processing improvements for Nmap, including
  OS fingerprint matching, probe matching and retransmission lookups for large
  hostgroups, and service name lookups. Overhauled Nmap's string interning and
  several other startup-related procedures to speed up start times, especially
  for scans using OS detection. [Daniel Miller]

o Integrated many of the most-submitted IPv4 OS fingerprints for recent
  versions of Windows, iOS, macOS, Linux, and BSD. Added 22 fingerprints,
  bringing the new total to 5700!

o [NSE] Added the tftp-version script which requests a
  nonexistent file from a TFTP server and matches the error message
  to a database of known software. [Mak Kolybabi]

o [Ncat] Ncat can now accept "connections" from multiple UDP hosts in
  listen mode with the --keep-open option. This also enables --broker and
  --chat via UDP. [Daniel Miller]

o Upgraded OpenSSL binaries (for the Windows builds and for
  RPM's) to version 3.0.8. This resolves some CVE's (CVE-2022-3602;
  CVE-2022-3786) which don't impact Nmap proper since it doesn't do
  certificate validation, but could possibly impact Ncat when the
  --ssl-verify option is used.

o Upgrade included libraries: zlib 1.2.13, Lua 5.4.4, libpcap 1.10.4

o Removed the bogus OpenSSL message from the Windows Nmap
  executable which looked like "NSOCK ERROR ssl_init_helper(): OpenSSL
  legacy provider failed to load." We actually already have the legacy
  provider built-in to our OpenSSL builds, and that's why loading the
  external one fails.

o UDP port scan (-sU) and version scan (-sV) now both use the same
  data source, nmap-service-probes, for data payloads. Previously, the
  nmap-payloads file was used for port scan. Port scan responses will be used
  to kick-start the version matching process. [Daniel Miller]

o Nmap's service scan (-sV) can now probe the UDP service behind a DTLS tunnel,
  the same as it already does for TCP services with SSL/TLS encryption. The
  DTLSSessionReq probe has had its rarity lowered to 2 to allow it to be sent
  sooner in the scan. [Daniel Miller]

o [Ncat] Ncat in listen mode with --udp --ssl will use DTLS to secure incoming
  connections. [Daniel Miller]

o Handle Internationalized Domain Names (IDN) like Яндекс.рф on
  platforms where getaddrinfo supports the AI_IDN flag. [Daniel Miller]

o [Ncat] Addressed an issue from the Debian bug tracker
  (https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=969314) regarding data
  received immediately after a SOCKS CONNECT response. Ncat can now be
  correctly used in the ProxyCommand option of OpenSSH.

o Improved DNS domain name parsing to avoid recursion and enforce name length
  limits, avoiding a theoretical stack overflow issue with certain crafted DNS
  server responses, reported by Philippe Antoine.

o [NSE] Fix mpint packing in ssh2 library, which was causing OpenSSH
  errors like "ssh_dispatch_run_fatal: bignum is negative" [Sami Loone]

o Updates to the Japanese manpage translation by Taichi Kotake.

o [Ncat] Dramatically speed up Ncat transfers on
  Windows by avoiding a 125ms wait for every read from
  STDIN. [scriptjunkie]

o [Windows] Periodically reset the system idle timer to keep the
  system from going to sleep while scans are in process. This only affects port
  scans and OS detection scans, since NSE and version scan do not rely on
  timing data to adjust speed.

o Updated the Nmap Public Source License (NPSL) to Version 0.95. This
  just clarifies that the derivative works definition and all other
  license clauses only apply to parties who choose to accept the
  license in return for the special rights granted (such as Nmap
  redistribution rights). If a party can do everything they need to
  using copyright provisions outside of this license such as fair use,
  we support that and aren't trying to claim any control over their
  work. Versions of Nmap released under previous versions of the NPSL
  may also be used under the NPSL 0.95 terms.

o Avoid storing many small strings from IPv4 OS detection results in the global
  string_pool. These were effectively leaked after a host is done being
  scanned, since string_pool allocations are not freed until Nmap quits.


To generate a diff of this commit:
cvs rdiff -u -r1.7 -r1.8 pkgsrc/net/ndiff/Makefile pkgsrc/net/ndiff/distinfo
cvs rdiff -u -r1.6 -r1.7 pkgsrc/net/nmap/Makefile.common
cvs rdiff -u -r1.32 -r1.33 pkgsrc/net/nmap/PLIST
cvs rdiff -u -r1.85 -r1.86 pkgsrc/net/nmap/distinfo
cvs rdiff -u -r1.10 -r1.11 pkgsrc/net/zenmap/Makefile
cvs rdiff -u -r1.5 -r1.6 pkgsrc/net/zenmap/PLIST
cvs rdiff -u -r1.7 -r1.8 pkgsrc/net/zenmap/distinfo
cvs rdiff -u -r1.1 -r0 pkgsrc/net/zenmap/patches/patch-zenmapCore_Paths.py

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: pkgsrc/net/ndiff/Makefile
diff -u pkgsrc/net/ndiff/Makefile:1.7 pkgsrc/net/ndiff/Makefile:1.8
--- pkgsrc/net/ndiff/Makefile:1.7       Tue Sep  6 18:47:27 2022
+++ pkgsrc/net/ndiff/Makefile   Tue Jun  6 10:45:10 2023
@@ -1,4 +1,4 @@
-# $NetBSD: Makefile,v 1.7 2022/09/06 18:47:27 adam Exp $
+# $NetBSD: Makefile,v 1.8 2023/06/06 10:45:10 adam Exp $
 
 .include "../../net/nmap/Makefile.common"
 
@@ -10,7 +10,7 @@ WRKSRC=               ${WRKDIR}/${DISTNAME}/ndiff
 
 EXTRACT_ELEMENTS=      ${DISTNAME}/ndiff
 
-PYTHON_VERSIONS_ACCEPTED=      27
+PYTHON_VERSIONS_INCOMPATIBLE=  27
 
 SUBST_CLASSES+=                setup
 SUBST_STAGE.setup=     pre-configure
Index: pkgsrc/net/ndiff/distinfo
diff -u pkgsrc/net/ndiff/distinfo:1.7 pkgsrc/net/ndiff/distinfo:1.8
--- pkgsrc/net/ndiff/distinfo:1.7       Tue Sep  6 18:47:27 2022
+++ pkgsrc/net/ndiff/distinfo   Tue Jun  6 10:45:10 2023
@@ -1,5 +1,5 @@
-$NetBSD: distinfo,v 1.7 2022/09/06 18:47:27 adam Exp $
+$NetBSD: distinfo,v 1.8 2023/06/06 10:45:10 adam Exp $
 
-BLAKE2s (nmap-7.93.tar.bz2) = 8c2e549318f6329d7252750ab903cbeec79c93cc001b542ed3166eaa1b2c7fbd
-SHA512 (nmap-7.93.tar.bz2) = 4ec9295e25bd7a215e718c3dbbf09bfe6339b60850f4a8d09b5ad0cbf41a0da8ece0168efc5ca91ba1ecbd83b1d31735d77dacd5f1ec1a9fd212454dd1f0f0fd
-Size (nmap-7.93.tar.bz2) = 10823114 bytes
+BLAKE2s (nmap-7.94.tar.bz2) = fb58b74eaf86ab57d253e947fc1dea5cfc6a418fba62001a767e37833399979f
+SHA512 (nmap-7.94.tar.bz2) = a55cddf9c1d9272243d01251eb3315b26f232d0596818857083222a385398618b428dc2bd8282c3e832527e135a74aeb020ca8609d83d8337342f5d8a04d7f2c
+Size (nmap-7.94.tar.bz2) = 11102195 bytes

Index: pkgsrc/net/nmap/Makefile.common
diff -u pkgsrc/net/nmap/Makefile.common:1.6 pkgsrc/net/nmap/Makefile.common:1.7
--- pkgsrc/net/nmap/Makefile.common:1.6 Tue Sep  6 18:47:27 2022
+++ pkgsrc/net/nmap/Makefile.common     Tue Jun  6 10:45:10 2023
@@ -1,9 +1,9 @@
-# $NetBSD: Makefile.common,v 1.6 2022/09/06 18:47:27 adam Exp $
+# $NetBSD: Makefile.common,v 1.7 2023/06/06 10:45:10 adam Exp $
 # used by net/ndiff/Makefile
 # used by net/nmap/Makefile
 # used by net/zenmap/Makefile
 
-DISTNAME=      nmap-7.93
+DISTNAME=      nmap-7.94
 CATEGORIES=    net security
 MASTER_SITES=  http://nmap.org/dist/
 EXTRACT_SUFX=  .tar.bz2

Index: pkgsrc/net/nmap/PLIST
diff -u pkgsrc/net/nmap/PLIST:1.32 pkgsrc/net/nmap/PLIST:1.33
--- pkgsrc/net/nmap/PLIST:1.32  Thu Aug 26 08:24:48 2021
+++ pkgsrc/net/nmap/PLIST       Tue Jun  6 10:45:10 2023
@@ -1,4 +1,4 @@
-@comment $NetBSD: PLIST,v 1.32 2021/08/26 08:24:48 adam Exp $
+@comment $NetBSD: PLIST,v 1.33 2023/06/06 10:45:10 adam Exp $
 bin/ncat
 bin/nmap
 bin/nping
@@ -22,7 +22,6 @@ man/zh/man1/nmap.1
 share/ncat/ca-bundle.crt
 share/nmap/nmap-mac-prefixes
 share/nmap/nmap-os-db
-share/nmap/nmap-payloads
 share/nmap/nmap-protocols
 share/nmap/nmap-rpc
 share/nmap/nmap-service-probes
@@ -89,6 +88,7 @@ ${PLIST.lua}share/nmap/nselib/data/rtsp-
 ${PLIST.lua}share/nmap/nselib/data/snmpcommunities.lst
 ${PLIST.lua}share/nmap/nselib/data/ssl-fingerprints
 ${PLIST.lua}share/nmap/nselib/data/targets-ipv6-wordlist
+${PLIST.lua}share/nmap/nselib/data/tftp-fingerprints.lua
 ${PLIST.lua}share/nmap/nselib/data/tftplist.txt
 ${PLIST.lua}share/nmap/nselib/data/usernames.lst
 ${PLIST.lua}share/nmap/nselib/data/vhosts-default.lst
@@ -785,6 +785,7 @@ ${PLIST.lua}share/nmap/scripts/telnet-br
 ${PLIST.lua}share/nmap/scripts/telnet-encryption.nse
 ${PLIST.lua}share/nmap/scripts/telnet-ntlm-info.nse
 ${PLIST.lua}share/nmap/scripts/tftp-enum.nse
+${PLIST.lua}share/nmap/scripts/tftp-version.nse
 ${PLIST.lua}share/nmap/scripts/tls-alpn.nse
 ${PLIST.lua}share/nmap/scripts/tls-nextprotoneg.nse
 ${PLIST.lua}share/nmap/scripts/tls-ticketbleed.nse

Index: pkgsrc/net/nmap/distinfo
diff -u pkgsrc/net/nmap/distinfo:1.85 pkgsrc/net/nmap/distinfo:1.86
--- pkgsrc/net/nmap/distinfo:1.85       Mon May 15 09:43:16 2023
+++ pkgsrc/net/nmap/distinfo    Tue Jun  6 10:45:10 2023
@@ -1,12 +1,11 @@
-$NetBSD: distinfo,v 1.85 2023/05/15 09:43:16 jperkin Exp $
+$NetBSD: distinfo,v 1.86 2023/06/06 10:45:10 adam Exp $
 
-BLAKE2s (nmap-7.93.tar.bz2) = 8c2e549318f6329d7252750ab903cbeec79c93cc001b542ed3166eaa1b2c7fbd
-SHA512 (nmap-7.93.tar.bz2) = 4ec9295e25bd7a215e718c3dbbf09bfe6339b60850f4a8d09b5ad0cbf41a0da8ece0168efc5ca91ba1ecbd83b1d31735d77dacd5f1ec1a9fd212454dd1f0f0fd
-Size (nmap-7.93.tar.bz2) = 10823114 bytes
+BLAKE2s (nmap-7.94.tar.bz2) = fb58b74eaf86ab57d253e947fc1dea5cfc6a418fba62001a767e37833399979f
+SHA512 (nmap-7.94.tar.bz2) = a55cddf9c1d9272243d01251eb3315b26f232d0596818857083222a385398618b428dc2bd8282c3e832527e135a74aeb020ca8609d83d8337342f5d8a04d7f2c
+Size (nmap-7.94.tar.bz2) = 11102195 bytes
 SHA1 (patch-configure) = 5fc39f084eadd6ea0560cd8e6f52074113566600
 SHA1 (patch-libdnet-stripped_src_arp-bsd.c) = c56c4e70eca2fa04dd8aab38ed2c3f4cac83f5e3
 SHA1 (patch-libnetutil_netutil.cc) = 7bd1059d6cbcf4f6d129730d6c6f6bc3ab54c0a0
-SHA1 (patch-ncat_http__digest.c) = 93cf0960249848c142fad99c8421d855618d11df
 SHA1 (patch-nping_EchoServer.cc) = e5b0213e3cfff8a32b5ae291c1921a86b9b17dd3
 SHA1 (patch-nping_NpingOps.cc) = 074766040fbf6dc16315b6313d6dad4ff514a91a
 SHA1 (patch-nsock_tests_run__tests.sh) = 88a7447f93dd3377e7e24e317c55528a73a17401

Index: pkgsrc/net/zenmap/Makefile
diff -u pkgsrc/net/zenmap/Makefile:1.10 pkgsrc/net/zenmap/Makefile:1.11
--- pkgsrc/net/zenmap/Makefile:1.10     Tue Sep  6 18:47:27 2022
+++ pkgsrc/net/zenmap/Makefile  Tue Jun  6 10:45:10 2023
@@ -1,4 +1,4 @@
-# $NetBSD: Makefile,v 1.10 2022/09/06 18:47:27 adam Exp $
+# $NetBSD: Makefile,v 1.11 2023/06/06 10:45:10 adam Exp $
 
 .include "../../net/nmap/Makefile.common"
 
@@ -12,13 +12,12 @@ EXTRACT_ELEMENTS=   ${DISTNAME}/zenmap
 
 EGG_NAME=      zenmap-${PKGVERSION_NOREV}
 
-# There is an ongoing effort of porting Zenmap to Python 3. See
-# https://github.com/nmap/nmap/issues/1176
-PYTHON_VERSIONS_ACCEPTED=      27
+PYTHON_VERSIONS_INCOMPATIBLE=  27
 
+DEPENDS+=      gtk3+-[0-9]*:../../x11/gtk3
 DEPENDS+=      nmap-[0-9]*:../../net/nmap
 DEPENDS+=      ${PYPKGPREFIX}-expat-[0-9]*:../../textproc/py-expat
-DEPENDS+=      ${PYPKGPREFIX}-gtk2-[0-9]*:../../x11/py-gtk2
+DEPENDS+=      ${PYPKGPREFIX}-gobject3-[0-9]*:../../devel/py-gobject3
 DEPENDS+=      ${PYPKGPREFIX}-sqlite3-[0-9]*:../../databases/py-sqlite3
 
 PYSETUPARGS+=          vanilla

Index: pkgsrc/net/zenmap/PLIST
diff -u pkgsrc/net/zenmap/PLIST:1.5 pkgsrc/net/zenmap/PLIST:1.6
--- pkgsrc/net/zenmap/PLIST:1.5 Fri Jan 14 17:52:02 2022
+++ pkgsrc/net/zenmap/PLIST     Tue Jun  6 10:45:10 2023
@@ -1,5 +1,9 @@
-@comment $NetBSD: PLIST,v 1.5 2022/01/14 17:52:02 wiz Exp $
+@comment $NetBSD: PLIST,v 1.6 2023/06/06 10:45:10 adam Exp $
 bin/zenmap
+${PYSITELIB}/${EGG_INFODIR}/PKG-INFO
+${PYSITELIB}/${EGG_INFODIR}/SOURCES.txt
+${PYSITELIB}/${EGG_INFODIR}/dependency_links.txt
+${PYSITELIB}/${EGG_INFODIR}/top_level.txt
 ${PYSITELIB}/radialnet/__init__.py
 ${PYSITELIB}/radialnet/__init__.pyc
 ${PYSITELIB}/radialnet/__init__.pyo
@@ -102,7 +106,6 @@ ${PYSITELIB}/radialnet/util/integration.
 ${PYSITELIB}/radialnet/util/misc.py
 ${PYSITELIB}/radialnet/util/misc.pyc
 ${PYSITELIB}/radialnet/util/misc.pyo
-${PYSITELIB}/${EGG_INFODIR}
 ${PYSITELIB}/zenmapCore/BasePaths.py
 ${PYSITELIB}/zenmapCore/BasePaths.pyc
 ${PYSITELIB}/zenmapCore/BasePaths.pyo
@@ -323,17 +326,6 @@ share/zenmap/config/scan_profile.usp
 share/zenmap/config/zenmap.conf
 share/zenmap/config/zenmap_version
 share/zenmap/docs/help.html
-share/zenmap/locale/de/LC_MESSAGES/zenmap.mo
-share/zenmap/locale/es/LC_MESSAGES/zenmap.mo
-share/zenmap/locale/fr/LC_MESSAGES/zenmap.mo
-share/zenmap/locale/hi/LC_MESSAGES/zenmap.mo
-share/zenmap/locale/hr/LC_MESSAGES/zenmap.mo
-share/zenmap/locale/it/LC_MESSAGES/zenmap.mo
-share/zenmap/locale/ja/LC_MESSAGES/zenmap.mo
-share/zenmap/locale/pl/LC_MESSAGES/zenmap.mo
-share/zenmap/locale/pt_BR/LC_MESSAGES/zenmap.mo
-share/zenmap/locale/ru/LC_MESSAGES/zenmap.mo
-share/zenmap/locale/zh/LC_MESSAGES/zenmap.mo
 share/zenmap/misc/profile_editor.xml
 share/zenmap/pixmaps/default_32.png
 share/zenmap/pixmaps/default_75.png

Index: pkgsrc/net/zenmap/distinfo
diff -u pkgsrc/net/zenmap/distinfo:1.7 pkgsrc/net/zenmap/distinfo:1.8
--- pkgsrc/net/zenmap/distinfo:1.7      Tue Sep  6 18:47:27 2022
+++ pkgsrc/net/zenmap/distinfo  Tue Jun  6 10:45:10 2023
@@ -1,6 +1,5 @@
-$NetBSD: distinfo,v 1.7 2022/09/06 18:47:27 adam Exp $
+$NetBSD: distinfo,v 1.8 2023/06/06 10:45:10 adam Exp $
 
-BLAKE2s (nmap-7.93.tar.bz2) = 8c2e549318f6329d7252750ab903cbeec79c93cc001b542ed3166eaa1b2c7fbd
-SHA512 (nmap-7.93.tar.bz2) = 4ec9295e25bd7a215e718c3dbbf09bfe6339b60850f4a8d09b5ad0cbf41a0da8ece0168efc5ca91ba1ecbd83b1d31735d77dacd5f1ec1a9fd212454dd1f0f0fd
-Size (nmap-7.93.tar.bz2) = 10823114 bytes
-SHA1 (patch-zenmapCore_Paths.py) = 55ccc83a8f7dd302e4b0ffc1df0837ff651ba913
+BLAKE2s (nmap-7.94.tar.bz2) = fb58b74eaf86ab57d253e947fc1dea5cfc6a418fba62001a767e37833399979f
+SHA512 (nmap-7.94.tar.bz2) = a55cddf9c1d9272243d01251eb3315b26f232d0596818857083222a385398618b428dc2bd8282c3e832527e135a74aeb020ca8609d83d8337342f5d8a04d7f2c
+Size (nmap-7.94.tar.bz2) = 11102195 bytes



Home | Main Index | Thread Index | Old Index