mirror of
https://github.com/nmap/nmap.git
synced 2025-12-24 08:29:04 +00:00
f45f2f394eb2cd2cec1f4e6f021df2f59bc84d68
If we get a reply that doesn't pass the simple comparison using the current value of USI->seqmask, then ignore it. Previously we emitted the message "Bad Sequence number from host %s.\n" and allowed the reply to match any probe. This only matters when using -g because otherwise we encode that information in the source port. I think we have addressed what was mentioned in the TODO comment in r15986. Allowing promiscuous matching, as was done before, causes the same spurious closed port issue that was addressed in r29686.
Here is some documentation for Nmap, but these files are much less comprehensive than what you'll find at the actual Nmap documentation site ( http://nmap.org ).
Description
Languages
C
37.8%
Lua
28.1%
C++
16.7%
Shell
5.8%
Python
4.2%
Other
7.2%