From 94e7a9cd47e3282b1578de3a98abccb436898b11 Mon Sep 17 00:00:00 2001 From: fyodor Date: Fri, 11 Jul 2008 07:33:11 +0000 Subject: [PATCH] Port scan pings happen against heavily firewalled hosts and the like when Nmap is not receiving enough responses to normal scan to properly calculate timing variables and detect packet drops. This patch increases the maximum per-target frequency of these probes to one every 1.25 seconds rather than one every five seconds --- scan_engine.cc | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/scan_engine.cc b/scan_engine.cc index 470b5f8a6..ccc31dcf3 100644 --- a/scan_engine.cc +++ b/scan_engine.cc @@ -1324,7 +1324,7 @@ static void init_perf_values(struct ultra_scan_performance_vars *perf) { perf->cc_scale_max = 50; perf->initial_ccthresh = 75; perf->ping_magnifier = 3; - perf->pingtime = 5000000; + perf->pingtime = 1250000; perf->group_drop_cwnd_divisor = 2.0; /* Change the amount that ccthresh drops based on the timing level. */ double ccthresh_divisor;