From 43d61bf6b77f1355bb053c9307ea3d11a7069e9e Mon Sep 17 00:00:00 2001 From: fyodor Date: Tue, 13 Mar 2007 18:03:21 +0000 Subject: [PATCH] remove fake_seqs nonsense --- CHANGELOG | 4 ++++ osscan.cc | 5 +---- 2 files changed, 5 insertions(+), 4 deletions(-) diff --git a/CHANGELOG b/CHANGELOG index da75e767e..8ede770e5 100644 --- a/CHANGELOG +++ b/CHANGELOG @@ -27,6 +27,10 @@ o Nmap now has a public Subversion (SVN) source code repository. See and then the updated usage instructions at http://seclists.org/nmap-dev/2006/q4/0281.html . +o Fixed a major accuracy bug in gen1 OS detection (some debugging code + was accidentally left in). Thanks to Richard van den Berg for finding + the problem. + o Changed the IP protocol scan so that it sends proper IGMP headers when scanning that protocol. This makes it much more likely that the host will respond, proving that it's "open". [Kris] diff --git a/osscan.cc b/osscan.cc index c9bc62427..ff9fd5fcc 100644 --- a/osscan.cc +++ b/osscan.cc @@ -116,8 +116,6 @@ # endif #endif -u32 fake_seqs[6] = { 0x721CF9, 0x721D5F, 0x721DC5, 0x721E2B, 0x721E91, 0x721EF7 }; - extern NmapOps o; /* Note that a sport of 0 really will (try to) use zero as the source @@ -810,8 +808,7 @@ static FingerPrint *get_fingerprint(Target *target, struct seq_info *si) { if (si->seqs[seq_response_num] == 0) { /* New response found! */ si->responses++; - // si->seqs[seq_response_num] = ntohl(tcp->th_seq); /* TCP ISN */ - si->seqs[seq_response_num] = fake_seqs[seq_response_num]; /* TCP ISN */ + si->seqs[seq_response_num] = ntohl(tcp->th_seq); /* TCP ISN */ si->ipids[seq_response_num] = ntohs(ip->ip_id); if ((gettcpopt_ts(tcp, ×tamp, NULL) == 0)) si->ts_seqclass = TS_SEQ_UNSUPPORTED;