1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-06 04:31:29 +00:00
Commit Graph

104 Commits

Author SHA1 Message Date
dmiller
6db5c9cb85 Bump copyright date 2025-02-26 17:44:43 +00:00
dmiller
740aafd464 Ensure fdn is zeroed 2024-12-09 19:55:58 +00:00
dmiller
dd4a7906d6 Change Ncat default behavior to avoid TCP half-closed connections 2024-11-25 22:09:10 +00:00
dmiller
1db532209e Add -q option to Ncat 2024-11-16 17:55:50 +00:00
dmiller
98c6ec85af Don't test for SSL_set_alpn_protos, present in all supported OpenSSL versions 2024-04-02 21:32:24 +00:00
dmiller
ba26cc78f2 Replace check for DTLS_client_method with OPENSSL_NO_DTLS 2024-04-02 21:32:23 +00:00
dmiller
f999182d0f Bump date and reapply header templates 2024-02-28 18:46:45 +00:00
dmiller
e7f8cd820b Use TIMEVAL_FSEC_SUBTRACT for clarity 2024-02-26 18:29:10 +00:00
dmiller
9836d15314 Ncat: Use SSL_shutdown() not shutdown() on SSL connections 2023-07-31 17:18:30 +00:00
dmiller
6f6b2de214 Apply new license templates, bump copyright date 2023-04-14 17:11:46 +00:00
dmiller
6a9acb1f1a Make sure Unix socket path is null-terminated, per unix(7) 2022-10-14 00:58:22 +00:00
dmiller
ca691d2789 Simplify/unify target string representation 2022-10-14 00:58:21 +00:00
dmiller
2b4b822557 Use TCP receive buffer, not manual one, for socks proxy handshake.
Should address this Debian bug report:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=969314

Data read during SOCKS handshake was being written immediately to
STDOUT, which meant it was not passed to any program started with --exec
and friends.
2022-09-30 17:44:33 +00:00
dmiller
d6bea8dcde Build based on OpenSSL version, not API level. Fixes #2516 2022-09-06 22:39:34 +00:00
dmiller
140dd72415 Fix build with OpenSSL 3.0
Updated all OpenSSL code to OpenSSL 3.0 API with no deprecated functions. Some
NSE functions were changed:
* openssl.rc4_options and openssl.rc4 were removed in favor of openssl.encrypt
* openssl.bignum_pseudo_rand is now an alias for openssl.bignum_rand
* openssl.bignum_is_prime and openssl.bignum_is_safe_prime will now ignore the
  nchecks parameter, using a secure default instead.
2022-08-25 14:51:59 +00:00
dmiller
dd690b3e0b Bump copyright date and update some links [ci skip] 2022-02-18 17:38:46 +00:00
fyodor
3aec3f3a07 Update to latest copyright templates. Main change is that Insecure.Com LLC is now Nmap Software LLC 2021-11-23 16:04:37 +00:00
nnposter
972ed6bac0 Add SOCKS5 support for SOCKS5_ATYP_NAME bind address. Closes #2365 2021-10-10 01:12:57 +00:00
nnposter
024bbf84f1 Make sure that SOCKS proxied server data are processed
There was a race condition where proxied server data could arrive appended
to the final SOCKS handshake response, causing the data to get skipped.
2021-03-16 02:34:35 +00:00
nnposter
3913c63136 Use more descriptive error messages 2021-03-16 02:09:39 +00:00
dmiller
169d7e5a92 Restore call to post_connect in non-ssl case. Fixes #2149 2020-11-19 17:34:24 +00:00
dmiller
ef8213a36c Reintegrate Nmap 7.90 release branch 2020-10-05 23:00:30 +00:00
nnposter
7d6cf3ae0c Implementation of TLS SNI override in Ncat
Closes #2087, closes #1928, fixes #1927, fixes #1974
2020-08-22 15:54:14 +00:00
dmiller
0d613e3b4b Allow --ssl with --proxy for ncat. Fixes #2065 2020-06-17 22:42:49 +00:00
dmiller
866dc375e4 Correctly print VM socket address. Closes #1868 2019-12-30 00:53:23 +00:00
dmiller
862054bf5d Always delete old IOD before attempting reconnect
Trying to connect on the same IOD was leaking sockets, and may have
contributed to high CPU usage on Windows (See #1688)
2019-08-15 18:31:59 +00:00
dmiller
d639a53088 Bump copyright date in license headers 2019-05-28 21:36:04 +00:00
dmiller
21f51ff822 AF_VSOCK support. Closes #1075 2019-05-20 16:21:41 +00:00
nnposter
dbed133fc5 Ability to control hostname resolution for ncat proxy destinations
Closes #1214, fixes #1230, closes #1439
2019-02-23 22:34:13 +00:00
nnposter
88b4a4b65e Adds missing initialization 2019-01-21 03:25:54 +00:00
nnposter
735abe6c3f Cleans up error handling 2019-01-21 02:19:11 +00:00
nnposter
cb9559b342 Rectifies SOCKS5 protocol field overrun hazards 2019-01-19 23:50:18 +00:00
nnposter
4b4d67d4fb Strips off tabs and trailing spaces 2019-01-19 22:59:37 +00:00
dmiller
4824a5a074 Use Nsock error string instead of socket_strerror for timeouts; wasn't working on Windows. Fixes #1324 2018-09-17 15:29:56 +00:00
nnposter
ec38cb0096 Removes extraneous bracket from literal IPv6 URLs. Closes #1237 2018-06-12 01:12:08 +00:00
fyodor
ff62300249 Bump copyright dates to 2018 and slightly improve wording (doesn't change meaning) of Nmap license header text 2018-01-28 21:18:17 +00:00
dmiller
9f494f61ae Avoid RC4 by default. Closes #972 2017-10-09 17:03:21 +00:00
dmiller
74bbf2dcca Don't use socket close on STDOUT, use IO close instead. See #978 2017-10-01 03:28:09 +00:00
nnposter
cf1360ec0a Adds a possibly missing definition of offsetof(), introduced in r37005 2017-09-24 00:33:27 +00:00
nnposter
1bc9f186b9 Allows ncat to properly process HTTP passwords that are either empty or contain colons. Fixes #984 2017-09-23 22:53:19 +00:00
nnposter
6e83dc6406 Refactors ncat authentication for SOCKS5. Fixes #981 2017-09-23 22:41:02 +00:00
nnposter
7e876de889 Makes sure that nsock_pool is properly disposed of if the proxy connection fails. Closes #973 2017-08-18 02:24:37 +00:00
dmiller
fdfc36778b Add DTLS and ALPN support to Ncat. Closes #446 2017-07-29 05:55:30 +00:00
dmiller
0d21bd42e2 Update cipher suites to eliminate anonymous authentication methods 2017-07-29 05:55:27 +00:00
dmiller
cb17b788b3 Clarify indentation 2017-06-19 22:58:22 +00:00
dmiller
9c7ea727a7 Update license terms for 2017 2017-06-07 12:32:38 +00:00
dmiller
8649f07a7c noshutdown handling was missing for connect mode 2017-05-03 03:56:41 +00:00
dmiller
4629f6d836 Ncat supports DNS failover, including fallback to IPv4 from IPv6 2017-03-16 21:54:26 +00:00
dmiller
eb0bb2506f Let --ssl-ciphers be used with ncat client mode 2017-01-23 14:18:43 +00:00
fyodor
4bd67aa2fb Update the Nmap license/header text to reflect latest updates to docs/legal-notices.xml 2016-12-14 00:12:23 +00:00