ports/119844: security/nmap 4.53 has been released (we missed 4.21,4.22,4.23,4.50,4.51,4.52 already)
Dan Lukes
dan at obluda.cz
Mon Jan 21 09:10:03 UTC 2008
- Previous message: ports/119844: security/nmap 4.53 has been released (we missed 4.21, 4.22, 4.23, 4.50, 4.51, 4.52 already)
- Next message: ports/119844: security/nmap 4.53 has been released (we missed 4.21, 4.22, 4.23, 4.50, 4.51, 4.52 already)
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
The following reply was made to PR ports/119844; it has been noted by GNATS.
From: Dan Lukes <dan at obluda.cz>
To: Daniel Roethlisberger <daniel at roe.ch>
Cc: bug-followup at FreeBSD.org
Subject: Re: ports/119844: security/nmap 4.53 has been released (we missed
4.21,4.22,4.23,4.50,4.51,4.52 already)
Date: Mon, 21 Jan 2008 10:03:14 +0100
Daniel Roethlisberger napsal/wrote, On 01/21/08 07:50:
> Please do NOT commit this PR. See ports/119673 with my maintainer
> update to 4.52
I searched the databaze for such PR but I miss them. I wasted a few
hours of my time and a lot of yours time also. Sorry.
> If you think your patch handles anything I missed in ports/119673, please drop me an email.
It's not easy to say as I worked with 4.53 and your patches are related
to 4.52.
In 4.53 the nmap will use internal lua despite of your configuration
requesting linking against external library.
At the first, there is a typo in configure script that prevent the
external LUA to be tried at all. At the second, when corrected, there
are another bug that cause the test will fail (#if BYTE_ORDER but
#include with BYTE_ORDER not included). At the third, even the external
LUA successfully detected, the build fail at the linking phase as LUA
require libm to be linked but no -lm present.
There may be no such bugs in 4.52 or your miss the internal lua is used
despite of your configuration.
I would like to suggest you another change - you modified the pkg-plist
statically. It mean you must reevaluate the list every update. See
post-install section in my Makefile - the list of installed script is
generated dynamically according actual list in particular version - the
same way as own nmap installation script did it. It's your decision, of
course, but dynamic generation may save your time and avoid bugs in
packing list durign future updates.
You miss the installation of zenmap.1 MAN page (if present within 4.52).
> there have been no stable releases between 4.20 and
> 4.52, so we missed not a single one. Using nmap for professional work
> on a regular basis, reliability is more important to me than bleeding
> edge new features
I'm not interested in new features (even the zenmap didn't interest
me). But too ancient os-fingerprint database and MAC OUI database
prevent professional use of nmap against current computers.
Dan
- Previous message: ports/119844: security/nmap 4.53 has been released (we missed 4.21, 4.22, 4.23, 4.50, 4.51, 4.52 already)
- Next message: ports/119844: security/nmap 4.53 has been released (we missed 4.21, 4.22, 4.23, 4.50, 4.51, 4.52 already)
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
More information about the freebsd-ports-bugs
mailing list