1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-10 17:59:04 +00:00

Port scan pings happen against heavily firewalled hosts and the like when Nmap is not receiving enough responses to normal scan to properly calculate timing variables and detect packet drops. This patch increases the maximum per-target frequency of these probes to one every 1.25 seconds rather than one every five seconds

This commit is contained in:
fyodor
2008-07-11 07:33:11 +00:00
parent aec77b87e8
commit 94e7a9cd47

View File

@@ -1324,7 +1324,7 @@ static void init_perf_values(struct ultra_scan_performance_vars *perf) {
perf->cc_scale_max = 50;
perf->initial_ccthresh = 75;
perf->ping_magnifier = 3;
perf->pingtime = 5000000;
perf->pingtime = 1250000;
perf->group_drop_cwnd_divisor = 2.0;
/* Change the amount that ccthresh drops based on the timing level. */
double ccthresh_divisor;