1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-09 22:21:29 +00:00

note some done tasks, etc.

This commit is contained in:
fyodor
2011-08-15 21:41:25 +00:00
parent 4410450cf9
commit 93cff22d4d

View File

@@ -1,5 +1,8 @@
TODO $Id: TODO 11866 2009-01-24 23:10:05Z fyodor $ -*-text-*-
o Initial IPv6 OS detection system (may not make it into stable
though, but we want to at least have it working in a branch first.)
o We should add fields to the service submitter
(http://insecure.org/cgi-bin/submit.cgi?new-service) for the
application name and version.
@@ -8,27 +11,9 @@ o Process Nmap survey and send out results [Fyodor]
o Make new SecTools.Org site with the 2010 survey results.
o Integrate new OS detection submissions (We have about 1,700
submissions since 11/30/10)
o Integrate new service fingerprint submissions (we have about 1,400
submissions since 11/30/10)
o [Ncat] Solve a crash that only happens on Windows when connecting
with --ssl-verify and -vvv, for example
ncat --ssl-verify -vvv www.amazon.com 443
The crash happens in the function verify_callback, when the function
X509_NAME_print_ex_fp is called. Just commenting those two calls
avoids the problem. By trying different combinations of debug print
statements, I once got the message
OPENSSL_Uplink(10109000,08): no OPENSSL_Applink
This refers to a Windows dynamic linking issue:
http://www.openssl.org/support/faq.html#PROG2
However I tried both including <openssl/applink.c> and changing the
linker mode to /MD, and neither changed the behavior.
Changing the flags from XN_FLAG_ONELINE to 0 seems to make the
problem go away.
o Unless we get good arguments for keeping it, we should remove Mac OS
X PowerPC support from our binaries. Apple stopped selling PowerPC
machines in 2006 and they stopped making new OS releases available
@@ -108,7 +93,6 @@ o IPv6 todo.
- Multicast host discovery.
- OS detection.
o Nmap should have a better way to handle XML script output.
o We currently just stick the current script output text into an XML tag.
o Daniel Miller is working on an implementation:
@@ -663,6 +647,24 @@ o random tip database
DONE:
o [Ncat] Solve a crash that only happens on Windows when connecting
with --ssl-verify and -vvv, for example
ncat --ssl-verify -vvv www.amazon.com 443
The crash happens in the function verify_callback, when the function
X509_NAME_print_ex_fp is called. Just commenting those two calls
avoids the problem. By trying different combinations of debug print
statements, I once got the message
OPENSSL_Uplink(10109000,08): no OPENSSL_Applink
This refers to a Windows dynamic linking issue:
http://www.openssl.org/support/faq.html#PROG2
However I tried both including <openssl/applink.c> and changing the
linker mode to /MD, and neither changed the behavior.
Changing the flags from XN_FLAG_ONELINE to 0 seems to make the
problem go away.
o Integrate new OS detection submissions (We have about 1,700
submissions since 11/30/10)
o Nmap should defer address parsing in arguments until it has read
through all the args. Otherwise you get an error if you use like -S
with an IPv6 address before you put -6 in the command line. You get