diff --git a/CHANGELOG b/CHANGELOG index da75e767e..8ede770e5 100644 --- a/CHANGELOG +++ b/CHANGELOG @@ -27,6 +27,10 @@ o Nmap now has a public Subversion (SVN) source code repository. See and then the updated usage instructions at http://seclists.org/nmap-dev/2006/q4/0281.html . +o Fixed a major accuracy bug in gen1 OS detection (some debugging code + was accidentally left in). Thanks to Richard van den Berg for finding + the problem. + o Changed the IP protocol scan so that it sends proper IGMP headers when scanning that protocol. This makes it much more likely that the host will respond, proving that it's "open". [Kris] diff --git a/osscan.cc b/osscan.cc index c9bc62427..ff9fd5fcc 100644 --- a/osscan.cc +++ b/osscan.cc @@ -116,8 +116,6 @@ # endif #endif -u32 fake_seqs[6] = { 0x721CF9, 0x721D5F, 0x721DC5, 0x721E2B, 0x721E91, 0x721EF7 }; - extern NmapOps o; /* Note that a sport of 0 really will (try to) use zero as the source @@ -810,8 +808,7 @@ static FingerPrint *get_fingerprint(Target *target, struct seq_info *si) { if (si->seqs[seq_response_num] == 0) { /* New response found! */ si->responses++; - // si->seqs[seq_response_num] = ntohl(tcp->th_seq); /* TCP ISN */ - si->seqs[seq_response_num] = fake_seqs[seq_response_num]; /* TCP ISN */ + si->seqs[seq_response_num] = ntohl(tcp->th_seq); /* TCP ISN */ si->ipids[seq_response_num] = ntohs(ip->ip_id); if ((gettcpopt_ts(tcp, ×tamp, NULL) == 0)) si->ts_seqclass = TS_SEQ_UNSUPPORTED;