Bug 204702 - net/nmap: Update to 7.00
Summary: net/nmap: Update to 7.00
Status: Closed FIXED
Alias: None
Product: Ports & Packages
Classification: Unclassified
Component: Individual Port(s) (show other bugs)
Version: Latest
Hardware: Any Any
: --- Affects Some People
Assignee: Olli Hauer
URL:
Keywords: patch
Depends on:
Blocks:
 
Reported: 2015-11-20 15:14 UTC by Mahdi Mokhtari
Modified: 2015-11-27 01:43 UTC (History)
3 users (show)

See Also:


Attachments
my shar file of nmap 7.00 (36.28 KB, application/x-shar)
2015-11-20 15:14 UTC, Mahdi Mokhtari
no flags Details

Note You need to log in before you can comment on or make changes to this bug.
Description Mahdi Mokhtari freebsd_committer freebsd_triage 2015-11-20 15:14:24 UTC
Created attachment 163353 [details]
my shar file of nmap 7.00

announcement mail:


Hi folks!  After 3.5 years of work by more than 100 contributors and 3,200
code commits since Nmap 6, we're delighted to announce Nmap 7! Compared to
Nmap 6, we now have 171 new NSE scripts, mature IPv6 support for everything
from host discovery to port scanning to OS detection, better
infrastructure, significant performance improvements, and a lot more!

For the top 7 improvements in Nmap 7, see the release notes:

https://nmap.org/7

Or you can go straight to the download page to grab the source code or the
Linux, Mac, and Windows installers:

https://nmap.org/download.html

Enjoy the release!  And if you find any bugs, let us know on the dev list
as described at:

https://nmap.org/book/man-bugs.html

As an open source project, we don't have a marketing budget.  So please
help spread the word about the new release!  I encounter many folks at
security conferences who haven't heard about all the modern Nmap
capabilities and still just use it as a simple port scanner.  Folks who
don't use (or at least know about) NSE, Ncat, Nping, Zenmap, Ndiff, version
detection and IPv6 scanning are really missing out!  We're hoping to soon
add Npcap to the mix too--so stay tuned for that!

Cheers,
Fyodor

PS: This mailing list isn't going anywhere, but you can also keep up with
Nmap news at:

https://twitter.com/nmap
https://facebook.com/nmap
https://reddit.com/r/nmap
https://google.com/+nmap
_______________________________________________
Sent through the announce mailing list
https://nmap.org/mailman/listinfo/announce
Archived at http://seclists.org/nmap-hackers/
Comment 1 Mahdi Mokhtari freebsd_committer freebsd_triage 2015-11-20 15:23:27 UTC
I'll try to port ZenMap for this version too.
Comment 2 Bernard Spil freebsd_committer freebsd_triage 2015-11-20 21:07:32 UTC
Arrived in ports as a maintainer-update

http://svnweb.freebsd.org/changeset/ports/401988
Comment 3 Bernard Spil freebsd_committer freebsd_triage 2015-11-21 11:03:10 UTC
Sorry for closing so bluntly! Thanks for your effort.

Apparently the maintainer keeps nmap up to date and there was no reason to have multiple versions of nmap concurrently in the ports tree so security/nmap was updated from 6.x to 7.00.

Multiple concurrent versions of ports should only exist when the versions are maintained/updated concurrently by the upstream project (e.g. perl, python, mysql)

Again, thanks!
Comment 4 Kubilay Kocak freebsd_committer freebsd_triage 2015-11-27 01:43:35 UTC
Assign to committer (maintainer) that resolved