head	1.141;
access;
symbols
	RELEASE_8_3_0:1.135
	RELEASE_9_0_0:1.132
	RELEASE_7_4_0:1.125
	RELEASE_8_2_0:1.125
	RELEASE_6_EOL:1.122
	RELEASE_8_1_0:1.119
	RELEASE_7_3_0:1.118
	RELEASE_8_0_0:1.117
	RELEASE_7_2_0:1.114
	RELEASE_7_1_0:1.112
	RELEASE_6_4_0:1.112
	RELEASE_5_EOL:1.109
	RELEASE_7_0_0:1.106
	RELEASE_6_3_0:1.106
	PRE_XORG_7:1.103
	RELEASE_4_EOL:1.103
	RELEASE_6_2_0:1.101
	RELEASE_6_1_0:1.97
	RELEASE_5_5_0:1.97
	RELEASE_6_0_0:1.90
	RELEASE_5_4_0:1.87
	RELEASE_4_11_0:1.86
	RELEASE_5_3_0:1.83
	RELEASE_4_10_0:1.78
	RELEASE_5_2_1:1.77
	RELEASE_5_2_0:1.77
	RELEASE_4_9_0:1.70
	RELEASE_5_1_0:1.66
	RELEASE_4_8_0:1.62
	RELEASE_5_0_0:1.60
	RELEASE_4_7_0:1.57
	RELEASE_4_6_2:1.55
	RELEASE_4_6_1:1.55
	RELEASE_4_6_0:1.55
	RELEASE_5_0_DP1:1.51
	RELEASE_4_5_0:1.49
	RELEASE_4_4_0:1.48
	RELEASE_4_3_0:1.40
	RELEASE_4_2_0:1.39
	RELEASE_4_1_1:1.39
	RELEASE_4_1_0:1.39
	RELEASE_3_5_0:1.39
	nmap_2_30_beta17:1.31
	nmap_2_30_beta18:1.32
	RELEASE_4_0_0:1.28
	RELEASE_3_4_0:1.24
	RELEASE_3_3_0:1.20
	nmap_2_2_beta4:1.18
	RELEASE_3_2_0:1.17
	nmap_2_12:1.16
	nmap_2_08:1.14
	nmap_2_11:1.15
	RELEASE_3_1_0:1.13
	nmap_2_07:1.12
	nmap_2_06:1.11
	nmap_2_05:1.10
	nmap_2_03:1.9
	nmap_2_02:1.8
	nmap_2_01:1.6
	nmap_2_00:1.5
	RELEASE_2_2_8:1.4
	RELEASE_3_0_0:1.4
	nmap_1_51:1.4
	nmap_1_51_import:1.1.1.1
	OBRIEN:1.1.1;
locks; strict;
comment	@# @;


1.141
date	2013.01.13.22.50.20;	author svnexp;	state Exp;
branches;
next	1.140;

1.140
date	2013.01.06.21.11.41;	author svnexp;	state Exp;
branches;
next	1.139;

1.139
date	2012.12.10.19.24.04;	author svnexp;	state Exp;
branches;
next	1.138;

1.138
date	2012.11.17.06.01.08;	author svnexp;	state Exp;
branches;
next	1.137;

1.137
date	2012.06.24.15.54.18;	author ohauer;	state Exp;
branches;
next	1.136;

1.136
date	2012.05.24.16.30.43;	author ohauer;	state Exp;
branches;
next	1.135;

1.135
date	2012.03.10.12.31.25;	author ohauer;	state Exp;
branches;
next	1.134;

1.134
date	2012.02.14.12.45.29;	author mm;	state Exp;
branches;
next	1.133;

1.133
date	2012.01.04.16.47.52;	author ohauer;	state Exp;
branches;
next	1.132;

1.132
date	2011.10.04.17.17.47;	author ohauer;	state Exp;
branches;
next	1.131;

1.131
date	2011.09.23.22.25.14;	author amdmi3;	state Exp;
branches;
next	1.130;

1.130
date	2011.09.23.20.29.18;	author ohauer;	state Exp;
branches;
next	1.129;

1.129
date	2011.07.01.13.23.23;	author ohauer;	state Exp;
branches;
next	1.128;

1.128
date	2011.06.03.21.10.32;	author ohauer;	state Exp;
branches;
next	1.127;

1.127
date	2011.04.20.23.09.04;	author ohauer;	state Exp;
branches;
next	1.126;

1.126
date	2011.02.13.19.36.36;	author ohauer;	state Exp;
branches;
next	1.125;

1.125
date	2011.01.30.17.15.07;	author ohauer;	state Exp;
branches;
next	1.124;

1.124
date	2011.01.22.16.43.18;	author ohauer;	state Exp;
branches;
next	1.123;

1.123
date	2011.01.07.20.51.25;	author ohauer;	state Exp;
branches;
next	1.122;

1.122
date	2010.09.03.21.16.38;	author ohauer;	state Exp;
branches;
next	1.121;

1.121
date	2010.08.10.13.37.06;	author ohauer;	state Exp;
branches;
next	1.120;

1.120
date	2010.08.09.13.28.49;	author arved;	state Exp;
branches;
next	1.119;

1.119
date	2010.03.06.14.35.00;	author wxs;	state Exp;
branches;
next	1.118;

1.118
date	2010.01.31.00.50.26;	author miwi;	state Exp;
branches;
next	1.117;

1.117
date	2009.07.16.22.17.10;	author miwi;	state Exp;
branches;
next	1.116;

1.116
date	2009.07.05.22.24.15;	author miwi;	state Exp;
branches;
next	1.115;

1.115
date	2009.04.21.15.36.55;	author wxs;	state Exp;
branches;
next	1.114;

1.114
date	2009.04.13.09.53.53;	author dhn;	state Exp;
branches;
next	1.113;

1.113
date	2008.09.24.14.47.04;	author miwi;	state Exp;
branches;
next	1.112;

1.112
date	2008.09.07.10.20.16;	author oliver;	state Exp;
branches;
next	1.111;

1.111
date	2008.08.21.06.18.18;	author rafan;	state Exp;
branches;
next	1.110;

1.110
date	2008.08.03.16.09.47;	author miwi;	state Exp;
branches;
next	1.109;

1.109
date	2008.05.06.13.26.10;	author miwi;	state Exp;
branches;
next	1.108;

1.108
date	2008.04.14.00.53.05;	author clsung;	state Exp;
branches;
next	1.107;

1.107
date	2008.03.14.21.30.22;	author miwi;	state Exp;
branches;
next	1.106;

1.106
date	2007.08.04.11.41.17;	author gabor;	state Exp;
branches;
next	1.105;

1.105
date	2007.06.14.14.11.29;	author jmelo;	state Exp;
branches;
next	1.104;

1.104
date	2007.05.19.20.22.45;	author flz;	state Exp;
branches;
next	1.103;

1.103
date	2006.12.23.15.29.34;	author shaun;	state Exp;
branches;
next	1.102;

1.102
date	2006.12.12.20.32.37;	author miwi;	state Exp;
branches;
next	1.101;

1.101
date	2006.07.08.05.32.00;	author clsung;	state Exp;
branches;
next	1.100;

1.100
date	2006.06.25.19.04.40;	author erwin;	state Exp;
branches;
next	1.99;

1.99
date	2006.06.06.01.30.15;	author mnag;	state Exp;
branches;
next	1.98;

1.98
date	2006.03.15.14.30.41;	author sem;	state Exp;
branches;
next	1.97;

1.97
date	2006.02.18.11.20.31;	author ehaupt;	state Exp;
branches;
next	1.96;

1.96
date	2006.02.10.23.42.16;	author krion;	state Exp;
branches;
next	1.95;

1.95
date	2006.02.02.08.13.19;	author krion;	state Exp;
branches;
next	1.94;

1.94
date	2005.12.14.08.46.55;	author barner;	state Exp;
branches;
next	1.93;

1.93
date	2005.09.16.11.05.18;	author garga;	state Exp;
branches;
next	1.92;

1.92
date	2005.09.08.23.59.46;	author lawrance;	state Exp;
branches;
next	1.91;

1.91
date	2005.09.08.13.18.14;	author krion;	state Exp;
branches;
next	1.90;

1.90
date	2005.07.18.03.49.54;	author linimon;	state Exp;
branches;
next	1.89;

1.89
date	2005.04.12.03.26.29;	author obrien;	state Exp;
branches;
next	1.88;

1.88
date	2005.04.11.08.03.51;	author obrien;	state Exp;
branches;
next	1.87;

1.87
date	2005.02.26.15.39.54;	author krion;	state Exp;
branches;
next	1.86;

1.86
date	2004.11.30.18.10.45;	author eik;	state Exp;
branches;
next	1.85;

1.85
date	2004.10.19.16.04.13;	author eik;	state Exp;
branches;
next	1.84;

1.84
date	2004.10.13.13.52.54;	author eik;	state Exp;
branches;
next	1.83;

1.83
date	2004.08.31.20.41.10;	author eik;	state Exp;
branches;
next	1.82;

1.82
date	2004.08.26.10.28.04;	author eik;	state Exp;
branches;
next	1.81;

1.81
date	2004.07.07.09.22.25;	author eik;	state Exp;
branches;
next	1.80;

1.80
date	2004.07.05.00.06.07;	author eik;	state Exp;
branches;
next	1.79;

1.79
date	2004.06.17.11.56.03;	author eik;	state Exp;
branches;
next	1.78;

1.78
date	2004.01.19.22.31.35;	author eik;	state Exp;
branches;
next	1.77;

1.77
date	2003.11.14.00.29.48;	author eik;	state Exp;
branches;
next	1.76;

1.76
date	2003.10.08.01.38.55;	author edwin;	state Exp;
branches;
next	1.75;

1.75
date	2003.10.08.01.09.38;	author edwin;	state Exp;
branches;
next	1.74;

1.74
date	2003.10.07.22.31.18;	author edwin;	state Exp;
branches;
next	1.73;

1.73
date	2003.09.25.16.19.24;	author leeym;	state Exp;
branches;
next	1.72;

1.72
date	2003.09.24.09.36.56;	author osa;	state Exp;
branches;
next	1.71;

1.71
date	2003.09.24.08.37.38;	author edwin;	state Exp;
branches;
next	1.70;

1.70
date	2003.07.01.07.27.43;	author foxfair;	state Exp;
branches;
next	1.69;

1.69
date	2003.07.01.03.38.03;	author foxfair;	state Exp;
branches;
next	1.68;

1.68
date	2003.06.24.01.06.04;	author leeym;	state Exp;
branches;
next	1.67;

1.67
date	2003.06.16.04.43.50;	author leeym;	state Exp;
branches;
next	1.66;

1.66
date	2003.04.29.22.04.56;	author adamw;	state Exp;
branches;
next	1.65;

1.65
date	2003.04.28.18.28.23;	author adamw;	state Exp;
branches;
next	1.64;

1.64
date	2003.04.22.00.06.04;	author adamw;	state Exp;
branches;
next	1.63;

1.63
date	2003.04.11.10.00.50;	author sumikawa;	state Exp;
branches;
next	1.62;

1.62
date	2003.03.07.00.16.25;	author ade;	state Exp;
branches;
next	1.61;

1.61
date	2003.02.21.13.26.48;	author knu;	state Exp;
branches;
next	1.60;

1.60
date	2002.11.02.04.33.43;	author perky;	state Exp;
branches;
next	1.59;

1.59
date	2002.10.18.18.29.33;	author obrien;	state Exp;
branches;
next	1.58;

1.58
date	2002.10.08.12.10.37;	author perky;	state Exp;
branches;
next	1.57;

1.57
date	2002.08.05.20.57.12;	author pat;	state Exp;
branches;
next	1.56;

1.56
date	2002.05.27.17.36.35;	author obrien;	state Exp;
branches;
next	1.55;

1.55
date	2002.05.21.16.26.04;	author dwcjr;	state Exp;
branches;
next	1.54;

1.54
date	2002.05.08.21.32.36;	author obrien;	state Exp;
branches;
next	1.53;

1.53
date	2002.04.29.06.33.34;	author obrien;	state Exp;
branches;
next	1.52;

1.52
date	2002.04.02.19.49.58;	author obrien;	state Exp;
branches;
next	1.51;

1.51
date	2002.03.21.01.39.49;	author obrien;	state Exp;
branches;
next	1.50;

1.50
date	2002.02.23.06.03.24;	author cjc;	state Exp;
branches;
next	1.49;

1.49
date	2001.11.07.15.41.14;	author obrien;	state Exp;
branches;
next	1.48;

1.48
date	2001.08.10.15.15.04;	author obrien;	state Exp;
branches;
next	1.47;

1.47
date	2001.07.29.04.37.24;	author obrien;	state Exp;
branches;
next	1.46;

1.46
date	2001.07.20.18.27.06;	author obrien;	state Exp;
branches;
next	1.45;

1.45
date	2001.07.09.12.22.03;	author obrien;	state Exp;
branches;
next	1.44;

1.44
date	2001.06.04.15.27.38;	author obrien;	state Exp;
branches;
next	1.43;

1.43
date	2001.06.02.19.06.37;	author obrien;	state Exp;
branches;
next	1.42;

1.42
date	2001.05.28.01.01.18;	author obrien;	state Exp;
branches;
next	1.41;

1.41
date	2001.05.28.00.18.04;	author obrien;	state Exp;
branches;
next	1.40;

1.40
date	2001.03.20.16.39.14;	author obrien;	state Exp;
branches;
next	1.39;

1.39
date	2000.06.02.03.18.40;	author will;	state Exp;
branches;
next	1.38;

1.38
date	2000.05.09.16.04.12;	author obrien;	state Exp;
branches;
next	1.37;

1.37
date	2000.05.05.01.51.03;	author obrien;	state Exp;
branches;
next	1.36;

1.36
date	2000.04.30.09.46.42;	author obrien;	state Exp;
branches;
next	1.35;

1.35
date	2000.04.21.08.18.36;	author mharo;	state Exp;
branches;
next	1.34;

1.34
date	2000.04.18.18.58.19;	author obrien;	state Exp;
branches;
next	1.33;

1.33
date	2000.04.09.18.30.04;	author cpiazza;	state Exp;
branches;
next	1.32;

1.32
date	2000.04.06.22.16.12;	author obrien;	state Exp;
branches;
next	1.31;

1.31
date	2000.03.27.01.23.38;	author obrien;	state Exp;
branches;
next	1.30;

1.30
date	2000.03.22.00.27.28;	author obrien;	state Exp;
branches;
next	1.29;

1.29
date	2000.03.20.02.37.04;	author obrien;	state Exp;
branches;
next	1.28;

1.28
date	2000.02.13.03.24.03;	author obrien;	state Exp;
branches;
next	1.27;

1.27
date	2000.01.28.10.04.59;	author obrien;	state Exp;
branches;
next	1.26;

1.26
date	2000.01.17.09.22.11;	author obrien;	state Exp;
branches;
next	1.25;

1.25
date	2000.01.04.08.00.15;	author obrien;	state Exp;
branches;
next	1.24;

1.24
date	99.12.07.22.06.54;	author obrien;	state Exp;
branches;
next	1.23;

1.23
date	99.11.21.23.09.21;	author obrien;	state Exp;
branches;
next	1.22;

1.22
date	99.09.20.04.51.19;	author obrien;	state Exp;
branches;
next	1.21;

1.21
date	99.09.18.04.50.31;	author obrien;	state Exp;
branches;
next	1.20;

1.20
date	99.09.07.10.48.48;	author obrien;	state Exp;
branches;
next	1.19;

1.19
date	99.08.31.01.51.19;	author peter;	state Exp;
branches;
next	1.18;

1.18
date	99.07.22.18.33.40;	author obrien;	state Exp;
branches;
next	1.17;

1.17
date	99.04.07.19.00.04;	author fenner;	state Exp;
branches;
next	1.16;

1.16
date	99.04.04.22.54.44;	author obrien;	state Exp;
branches;
next	1.15;

1.15
date	99.04.03.09.32.23;	author obrien;	state Exp;
branches;
next	1.14;

1.14
date	99.02.17.11.43.22;	author obrien;	state Exp;
branches;
next	1.13;

1.13
date	99.02.11.13.57.27;	author flathill;	state Exp;
branches;
next	1.12;

1.12
date	99.02.11.07.47.28;	author flathill;	state Exp;
branches;
next	1.11;

1.11
date	99.02.08.18.56.36;	author obrien;	state Exp;
branches;
next	1.10;

1.10
date	99.02.08.11.58.17;	author obrien;	state Exp;
branches;
next	1.9;

1.9
date	99.01.28.12.41.20;	author obrien;	state Exp;
branches;
next	1.8;

1.8
date	98.12.29.21.50.12;	author obrien;	state Exp;
branches;
next	1.7;

1.7
date	98.12.26.22.05.56;	author asami;	state Exp;
branches;
next	1.6;

1.6
date	98.12.17.13.26.17;	author obrien;	state Exp;
branches;
next	1.5;

1.5
date	98.12.15.11.18.30;	author obrien;	state Exp;
branches;
next	1.4;

1.4
date	98.08.20.22.06.00;	author obrien;	state Exp;
branches;
next	1.3;

1.3
date	98.08.18.14.31.31;	author ache;	state Exp;
branches;
next	1.2;

1.2
date	98.08.04.18.01.31;	author obrien;	state Exp;
branches;
next	1.1;

1.1
date	98.08.04.17.59.51;	author obrien;	state Exp;
branches
	1.1.1.1;
next	;

1.1.1.1
date	98.08.04.17.59.51;	author obrien;	state Exp;
branches;
next	;


desc
@@


1.141
log
@## SVN ## Exported commit - http://svnweb.freebsd.org/changeset/base/310346
## SVN ## CVS IS DEPRECATED: http://wiki.freebsd.org/CvsIsDeprecated
@
text
@# Created by: David O'Brien (obrien@@NUXI.com)
# $FreeBSD: head/security/nmap/Makefile 310346 2013-01-13 22:43:17Z ohauer $

PORTNAME=	nmap
DISTVERSION=	6.25
PORTREVISION=	1
CATEGORIES=	security ipv6
MASTER_SITES=	http://nmap.org/dist/ \
		LOCAL/ohauer

MAINTAINER=	ohauer@@FreeBSD.org
COMMENT=	Port scanning utility for large networks

# http://nmap.org/book/man-legal.html
LICENSE=	GPLv2

LIB_DEPENDS=	pcre:${PORTSDIR}/devel/pcre

USE_LUA=	5.1
LUA_COMPS=	lua
USE_BZIP2=	yes
USE_GMAKE=	yes
GNU_CONFIGURE=	yes
CONFIGURE_ARGS=	--without-localdirs \
		--without-zenmap \
		--without-ndiff \
		--with-libpcre=${LOCALBASE} \
		--with-liblua=${LOCALBASE} \
		--without-nmap-update
CONFIGURE_ENV=	LUA_INCDIR="${LUA_INCDIR}" LUA_LIBDIR="${LUA_LIBDIR}"

# fix for gcc from ports
.if ${CC} != "cc" && ${CC} !="clang"
GCCLIBDIR_CMDS=	${CC} -print-file-name=libstdc++.so | ${SED} -e 's/libstdc++.so//'
CONFIGURE_ARGS+=LDFLAGS="-L$$(${GCCLIBDIR_CMDS})"
NDCC=	true
.endif

MANLANG=	"" de es fr hr hu it jp pl pt_BR pt_PT ro ru sk zh
MAN1=		nmap.1
MAN1_EN=	ncat.1 nping.1

.ifndef WITHOUT_SSL
USE_OPENSSL=	yes
CONFIGURE_ARGS+=	--with-openssl=${OPENSSLBASE}
CFLAGS+=		-I${OPENSSLINC}
PLIST_SUB+=		WITHSSL=""
.else
PKGNAMESUFFIX=		-nossl
CONFIGURE_ARGS+=	--without-openssl
PLIST_SUB+=		WITHSSL="@@comment "
.endif

# XXX: Workaround if OS is build with WITHOUT_INET6
#  PR: ports/159376
#
# Note: If this option is specified in src.conf it has to
#  be defined as param -DWITHOUT_INET6 during build time
#  since the port system has no access to src.conf
.if defined(WITHOUT_INET6)
LIB_DEPENDS+=		pcap:${PORTSDIR}/net/libpcap
CONFIGURE_ARGS+=	--with-libpcap=${LOCALBASE}
.endif

PORTDOCS=	CHANGELOG HACKING
EXAMPLES=	docs/sample-script.nse
PORTEXAMPLES=	${EXAMPLES:T}

# XXX limit results if we do a grep in the sources!
post-extract:
	@@${RM} -rf ${WRKSRC}/mswin32

# reflect new mailing addreses
pre-patch:
	@@for f in $$(${GREP} -Rl "nmap-dev@@insecure.org" ${WRKSRC}); do\
		${SED} -i '' -e 's|nmap-dev@@insecure.org|dev@@nmap.org|g' $${f} ;\
	done
	@@for f in $$(${GREP} -Rl "http://cgi.insecure.org/mailman" ${WRKSRC}); do\
		${SED} -i '' -e 's|http://cgi.insecure.org/mailman/listinfo/nmap-dev|http://nmap.org/mailman/listinfo/dev|g' $${f} ;\
	done

post-patch:
# fix from r30346
	@@${REINPLACE_CMD} -e 's|~0L;|0xffffffffL;|' ${WRKSRC}/nbase/nbase_misc.c

post-configure:
	@@${REINPLACE_CMD} -e "s|^DESTDIR *=|& ${DESTDIR}|" ${WRKSRC}/Makefile

post-install:
.ifndef NOPORTDOCS
	@@${MKDIR} ${DOCSDIR}
.	for i in ${PORTDOCS}
		@@${INSTALL_DATA} ${WRKSRC}/${i} ${DOCSDIR}
.	endfor
.endif
.ifndef NOPORTEXAMPLES
	@@${MKDIR} ${EXAMPLESDIR}
.	for i in ${EXAMPLES}
		@@${INSTALL_DATA} ${WRKSRC}/${i} ${EXAMPLESDIR}
.	endfor
.endif
.if defined(NDCC)
	@@${ECHO_MSG} do not forget to adjust libnmap.conf
.endif

.include <bsd.port.mk>
@


1.140
log
@## SVN ## Exported commit - http://svnweb.freebsd.org/changeset/base/310010
## SVN ## CVS IS DEPRECATED: http://wiki.freebsd.org/CvsIsDeprecated
## SVN ##
## SVN ## ------------------------------------------------------------------------
## SVN ## r310010 | ohauer | 2013-01-06 18:42:38 +0000 (Sun, 06 Jan 2013) | 24 lines
## SVN ##
## SVN ## - update nmap to version 6.25
## SVN ## - fix build with clang and stdlib=libc++ [1]
## SVN ##
## SVN ## Nmap 6.25 [2012-11-29]
## SVN ## o [NSE]	Added CPE to smb-os-discovery output.
## SVN ##
## SVN ## o [Ncat] Fixed the printing of warning messages	for large arguments to
## SVN ##   the -i and -w	options. [Michal Hlavinka]
## SVN ##
## SVN ## o [Ncat] Shut down the write part of connected sockets in listen mode
## SVN ##   when stdin hits EOF, just as was already done	in connect mode.
## SVN ##   [Michal Hlavinka]
## SVN ##
## SVN ## o [NSE]	Added new fingerprints for http-enum: Sitecore,	Moodle,	typo3,
## SVN ##   SquirrelMail,	RoundCube. [Jesper K?\195?\188ckelhahn]
## SVN ##
## SVN ## o Added	some new checks	for failed library calls. [Bill	Parker]
## SVN ##
## SVN ## PR:		172358
## SVN ## 		174817
## SVN ##
## SVN ## Submitted by:	arrowdodger <6yearold@@gmail.com> [1]
## SVN ## 		Anders N. <wicked@@baot.se> (general update request)
## SVN ##
## SVN ## ------------------------------------------------------------------------
## SVN ##
@
text
@d2 1
a2 1
# $FreeBSD: head/security/nmap/Makefile 310010 2013-01-06 18:42:38Z ohauer $
d6 1
d61 1
a61 1
LIB_DEPENDS+=		pcap.1:${PORTSDIR}/net/libpcap
@


1.139
log
@## SVN ## Exported commit - http://svnweb.freebsd.org/changeset/base/308630
## SVN ## CVS IS DEPRECATED: http://wiki.freebsd.org/CvsIsDeprecated
## SVN ##
## SVN ## ------------------------------------------------------------------------
## SVN ## r308630 | mm | 2012-12-10 19:11:11 +0000 (Mon, 10 Dec 2012) | 4 lines
## SVN ##
## SVN ## Update PCRE to 8.32
## SVN ## Introduces the UTF-32 library pcre32
## SVN ## Bump PORTREVISION in dependent ports
## SVN ##
## SVN ## ------------------------------------------------------------------------
## SVN ##
@
text
@d1 2
a2 6
# Ports collection makefile for:  nmap
# Date created:			  Tue Aug 04, 1998
# Whom:				  David O'Brien (obrien@@NUXI.com)
#
# $FreeBSD: head/security/nmap/Makefile 308630 2012-12-10 19:11:11Z mm $
#
d5 1
a5 2
DISTVERSION=	6.01
PORTREVISION=	1
d16 1
a16 1
LIB_DEPENDS=	pcre.3:${PORTSDIR}/devel/pcre
d32 1
a32 1
.if ${CC} != "cc"
d72 13
@


1.138
log
@Switch exporter over
@
text
@d5 1
a5 1
# $FreeBSD: head/security/nmap/Makefile 300897 2012-07-14 14:29:18Z beat $
d10 1
d21 1
a21 1
LIB_DEPENDS=	pcre.1:${PORTSDIR}/devel/pcre
@


1.137
log
@- update nmap to version 6.0.1

Announcement: http://seclists.org/nmap-hackers/2012/3
Changelog:    http://nmap.org/changelog.html

Some relevant changes in 6.01:

o Fixed a bug that caused Nmap to fail to find any network interface when
  at least one of them is in the monitor mode. The fix was to define the
  ARP_HRD_IEEE80211_RADIOTAP 802.11 radiotap header identifier in the
  libdnet-stripped code. Network interfaces that are in this mode are used
  by radiotap for 802.11 frame injection and reception. The bug was
  reported by Tom Eichstaedt and Henri Doreau.
  http://seclists.org/nmap-dev/2012/q2/449
  http://seclists.org/nmap-dev/2012/q2/478
  [Djalal Harouni, Henri Doreau]

o Fixed the greppable output of hosts that time-out (when --host-timeout was
  used and the host timed-out after something was received from that host).
  This issue was reported by Matthew Morgan. [jah]
@
text
@d5 1
a5 1
# $FreeBSD$
@


1.136
log
@- update to version 6.00

Changelog:
==========
Nmap 6.00

o Most important release since Nmap 5.00 in July 2009! For a list of
  the most significant improvements and new features, see the
  announcement at: http://nmap.org/6

o In XML output, <osclass> elements are now child elements of the
  <osmatch> they belong to. Old output was thus:
    <os><osclass/><osclass/>...<osmatch/><osmatch/>...</os>
  New output is:
    <os><osmatch><osclass/><osclass/>...</osmatch>...</os>
  The option --deprecated-xml-osclass restores the old output, in case
  you use an Nmap XML parser that doesn't understand the new
  structure. The xmloutputversion has been increased to 1.04.

o Added a new <target> element to XML output that indicates when a
  target specification was ignored, perhaps because of a syntax error
  or DNS failure. It looks like this:
    <target specification="1.2.3.4.5" status="skipped" reason="invalid"/>
  [David Fifield]

o [NSE] Added the script samba-vuln-cve-2012-1182 which detects the
  SAMBA pre-auth remote root vulnerability (CVE-2012-1182).
  [Aleksandar Nikolic]

o [NSE] Added http-vuln-cve2012-1823.nse, which checks for PHP CGI
  installations with a remote code execution vulnerability. [Paulino
  Calderon]

o [NSE] Added script targets-ipv6-mld that sends a malformed ICMP6 MLD Query
  to discover IPv6 enabled hosts on the LAN. [Niteesh Kumar]

o [NSE] Added rdp-vuln-ms12-020.nse by Aleksandar Nikolic. This tests
  for two Remote Desktop vulnerabilities, including one allowing
  remote code execution, that were fixed in the MS12-020 advisory.

o [NSE] Added a stun library and the scripts stun-version and stun-info, which
  extract version information and the external NAT:ed address.
  [Patrik Karlsson]

o [NSE] Added the script duplicates which attempts to determine duplicate
  hosts by analyzing information collected by other scripts. [Patrik Karlsson]

o Fixed the routing table loop on OS X so that on-link routes appear.
  Previously, they were ignored so that things like ARP scan didn't
  work. [Patrik Karlsson, David Fifield]

o Upgraded included libpcap to version 1.2.1.

o [NSE] Added ciphers from RFC 5932 and Fortezza-based ciphers to
  ssl-enum-ciphers.nse. The patch was submitted by Darren McDonald.

o [NSE] Renamed hostmap.nse to hostmap-bfk.nse.

o Fixed a compilation problem on Solaris 9 caused by a missing
  definition of IPV6_V6ONLY. Reported by Dagobert Michelsen.

o Setting --min-parallelism by itself no longer forces the maximum
  parallelism to the same value. [Chris Woodbury, David Fifield]

o Changed XML output to show the "service" element whenever a tunnel
  is discovered for a port, even if the service behind it was unknown.
  [Matt Foster]

o [Zenmap] Fixed a crash that would happen in the profile editor when
  the script.db file doesn't exist. The bug was reported by Daniel
  Miller.

o [Zenmap] It is now possible to compare scans having the same name or
  command line parameters. [Jah, David Fifield]

o Fixed an error that could occur with ICMPv6 probes and -d4 debugging:
  "Unexpected probespec2ascii type encountered" [David Fifield]

o [NSE] Added new script http-chrono, which measures min, max and average
  response times of web servers. [Ange Gutek]

o Applied a workaround to make pcap captures work better on Solaris
  10. This involves peeking at the pcap buffer to ensure that captures
  are not being lost. A symptom of the previous behavior was that,
  when doing ARP host discovery against two targets, only one would be
  reported as up. [David Fifield]

o Fixed a bug that could cause Nsock timers to fire too early. This
  could happen for the timed probes in IPv6 OS detection, causing an
  incorrect measurement of the TCP_ISR feature. [David Fifield]

o [Zenmap] We now build on Windows with a newer version of PyGTK, so
  copy and paste should work again.

o Changed the way timeout calculations are made in the IPv6 OS engine.
  In rare cases a certain interleaving of probes and responses would
  result in an assertion failure.
@
text
@d9 1
a9 1
DISTVERSION=	6.00
@


1.135
log
@- update to version 5.61TEST5

small snippet from changelog:
 http://nmap.org/changelog.html

 o Integrated all of your IPv4 OS fingerprint submissions since June 2011 (about 1,900 of them)
   Added about 256 new fingerprints (total 3,572)
 o Integrated all of your service/version detection fingerprints submitted since November 2010
   (signature count increased to 7,423)
 o Integrated your latest IPv6 OS submissions and corrections
 o [NSE] Added 43(!) NSE scripts, bringing the total up to 340
 o [NSE] Added 14 new protocol libraries
 o [CPE] (Common Platform Enumeration) OS classification is now supported for IPv6 OS detection
 o Added a new --script-args-file option
 o [NSE] Added support for decoding EIGRP broadcasts from Cisco routers to broadcast-listener
 o [NSE] Added redirect support to the http library
 o Update to the latest MAC address prefix assignments from IEEE as of March 8, 2012

Test builds sponsored by redports.org

Feature safe: yes
@
text
@d9 1
a9 1
DISTVERSION=	5.61TEST5
@


1.134
log
@Bump pcre library dependency due to 8.30 update
@
text
@d9 1
a9 2
DISTVERSION=	5.61TEST4
PORTREVISION=	1
@


1.133
log
@- update to 5.61TEST4

For detailed Changes see http://nmap.org/changelog.html
(List is simply to long ...)

Some highlights
* [NSE] Added a new httpspider library which is used for recursively
  crawling web sites for information.  New scripts using this
  functionality include http-backup-finder, http-email-harvest,
  http-grep, http-open-redirect, and http-unsafe-output-escaping. See
  http://nmap.org/nsedoc/ or the list later in this file for details
  on these.

* [NSE] Added a vulnerability management library (vulns.lua) to store and to
  report discovered vulnerabilities.

* [NSE] Added a new script force feature.  You can force scripts to
  run against target ports (even if the "wrong" service is detected)
  by placing a plus in front of the script name passed to --script.
  See http://nmap.org/book/nse-usage.html#nse-script-selection.

* [NSE] Added 51(!) NSE scripts, bringing the total up to 297.

Build tests sponsored by redports.org
@
text
@d10 1
d21 1
a21 1
LIB_DEPENDS=	pcre.0:${PORTSDIR}/devel/pcre
@


1.132
log
@- update to version 5.61TEST2
- add workaround for system build with WITHOUT_INET6 [1]

 Thanks to Kim Scarborough for sharing the libpcap workaround

PR:		ports/159376 [1]
Submitted by:	Alexander Panyushkin [1]
@
text
@d9 1
a9 1
DISTVERSION=	5.61TEST2
d31 2
a32 1
		--with-liblua=${LOCALBASE}
@


1.131
log
@- Add LDFLAGS to CONFIGURE_ENV and MAKE_ENV (as it was done with LDFLAGS)
- Fix all ports that add {CPP,LD}FLAGS to *_ENV to modify flags instead

PR:		157936
Submitted by:	myself
Exp-runs by:	pav
Approved by:	pav
@
text
@d9 1
a9 1
DISTVERSION=	5.61TEST1
d56 11
@


1.130
log
@ - update to 5.61TEST1

Here is the (partial) CHANGELOG since 5.59BETA1:

Nmap 5.61TEST1 [2011-09-19]

o The changelog entries below for this test release are not yet
  finished or comprehensive.  We'll update them soon.

o [Ncat] Updated ca-bundle.crt (primarily to remove DigiNotar).

o Fixed compilation on OS X 10.7 Lion. Thanks to Patrik Karlsson and
  Babak Farroki for researching fixes.

o [NSE] Fixed SSL compressor names in ssl-enum-ciphers.nse, and
  removed redundant multiple listings of the NULL compressor.
  [Matt Selsky]

o [NSE] Added cipher strength ratings to ssl-enum-ciphers.nse.
  [Gabriel Lawrence]

o Added Common Platform Enumeration (CPE, http://cpe.mitre.org/)
  output for OS and service versions. These show up in normal output
  with the headings "OS CPE:" and "Service Info:":
    OS CPE: cpe:/o:linux:kernel:2.6.39
    Service Info: OS: Linux; CPE: cpe:/o:linux:kernel
  These also appear in XML output, which additionally has CPE entries
  for service versions. [David, Henri]

o [NSE] Added new default credential list for Oracle and modified the
  oracle-brute script to make use of it. [Patrik]

o [NSE] Added xmpp-info.nse as a replacement for xmpp.nse. This updated version
  brings new features and fixes. [Vasiliy Kulikov]

o Fixed RPC scan for 64-bit architectures by using fixed-size data
  types. [David]

o Relaxed the XML DTD to allow validation of files where the verbosity
  level changed during the scan. [Daniel Miller]

o Made a service confidence of 8 (used when tcpwrapped) and indeed any
  number between 0 and 10 be legal in XML output according to the DTD.
  [Daniel Miller]

o [NSE] Added three scripts that do host discovery on local IPv6
  subnets. Each of them uses a different multicast technique, meaning
  that even very large networks have host discovery done without
  needing to probe every address individually.
  + targets-multicast-ipv6-echo: Sends a multicast echo request, like
    broadcast-ping does for IPv4.
  + targets-multicast-ipv6-invalid-dst: Sends an invalid packet that
    can elicit an ICMPv6 Parameter Problem response.
  + targets-multicast-ipv6-slaac: Sends a phony router advertisement,
    which causes hosts to allocate a temporary address and then send a
    packet to discover if anyone else is using the address.
  [Weilin, David]

o [NSE] Added functions to packet.lua to make it easier to build IPv6
  packets. [Weilin]

o [NSE] Added new script http-vuln-cve2011-3192 which checks whether an instance
  of Apache is vulnerable to a DoS attack exploiting the byterange filter.
  [Duarte Silva].

o [NSE] Fixed authentication problems in the TNS library that would prevent
  authentication from working against Oracle 11.2.0.2.0 XE [Chris Woodbury]

o Removed some restrictions on probe matching that, for example,
  prevented a RST/ACK reply from being recognized in a NULL scan. This
  was found and fixed by Matthew Stickney and Joe McEachern.

o Rearranged some characters classes in service matches to avoid any
  that look like POSIX collating symbols ("[.xyz.]"). John Hutchison
  discovered this error caused by one of the match lines:
    InitMatch: illegal regexp: POSIX collating elements are not supported
  [Daniel Miller]

o [NSE] Added the address-info.nse script, which shows extra information about IP addresses.

o [NSE] Added scripts http-joomla-brute, http-wordpress-brute, http-wp-enum and
  http-awstatstotal-exec. [Paulino]

o [Zenmap] Fixed zenmap deleting ports based on newer scans which did
  not actually scan the port in question. Additionally ncat now only
  updates ports with new information if the new information is the same
  protocol. Not just the same port. [Colin Rice]

o [Ncat] Fixed ncat crashing with --ssl-verify -vvv on windows. [Colin Rice]

o [NSE] Added script http-waf-detect. This script tries to determine
  if an IDS/IPS/WAF is protecting a web server. [Paulino]

o [NSE] Added the bittorrent library and bittorrent-discovery script which
  enables us to discover peers and nodes for a particular torrent file or
  magnet link.

o [NSE] Added basic query support to the Oracle TNS library making it possible
  for scripts to query the database server using SQL. [Patrik]

o [Ncat] Added --append-output option, that when used along with -o and/or -x
  prevents clobbering(truncating) an existing file. [Shinnok]

o [NSE] Added script broadcast-listener that attempts to discover hosts by
  passively listening to the network. It does so by decoding ethernet and IP
  broadcast and multicast messages. [Patrik]

o Fixed a bug that would make Nmap segfault if it failed to open an interface
  using pcap. The bug details and patch are posted here:
  http://seclists.org/nmap-dev/2011/q3/365 [Patrik]

o Ncat SCTP mode supports connection brokering now(--sctp --broker). [Shinnok]

o Nmap now defers options parsing until it has read through all the command line
  arguments. You can now use options like -S with an IPv6 address before
  specifying -6 at the command line, which previously got you an error.
  [Shinnok]

o [NSE] Added the library xmpp.lua and the script xmpp-brute that performs
  brute force password auditing against XMPP (Jabber) servers. [Patrik]

o [NSE] Fixed a bug in the ssh2-enum-algos script that would prevent it from
  displaying any output unless run in debug mode. [Patrik]

o [NSE] Fixed the nsedebug print_hex() function so it does not print an
  empty line if there are no remaining characters, and improved its NSEDoc.
  [Chris Woodbury].

o [NSE] Added the scripts http-axis2-dir-traversal and
  http-litespeed-sourcecode-download that exploits a directory traversal and
  null byte poisoning vulnerabilities in Apache Axis2 and LiteSpeed Web Server
  respectively. [Paulino]

o [Ncat] Ncat now no longer blocks while an ssl handshake is taking place or
  waiting to complete. [Shinnok]

o [NSE] Added the script broadcast-dhcp-discover that sends a DHCP discover
  message to the broadcast address and collects and reports the network
  information received from the DHCP server. [Patrik]

o [NSE] Added the script smtp-brute that performs brute force password
  auditing against SMTP servers. [Patrik]

o [NSE] Updated SMTP library to support authentication using both plain-text
  and the SASL library. [Patrik]

o [NSE] Added the script imap-brute that performs brute force password
  auditing against IMAP servers. [Patrik]

o [NSE] Updated IMAP library to support authentication using both plain-text
  and the SASL library. [Patrik]

o [NSE] Added SASL library created by Djalal Harouni and Patrik Karlsson
  providing common code for "Simple Authentication and Security Layer" to
  services supporting it. The algorithms supported by the library are:
  PLAIN, CRAM-MD5, DIGEST-MD5 and NTLM. [Patrik Karlsson, Djalal Harouni]

o [NSE] Added scripts cvs-brute.nse, cvs-brute-repository.nse and the cvs
  library. The cvs-brute-repository script allows for guessing possible
  repository names needed in order to perform password guessing using the
  cvs-brute.nse script. [Patrik]

o [Zenmap] The Zenmap crash handler now instructs you to mail in crash
  information to nmap-dev. [Colin Rice]

o Added IPv6 Neighbor Discovery ping. This is the IPv6 analog to IPv4
  ARP scan. It is the default ping type for local IPv6 networks.
  [Weilin]

o [NSE] Added smtp-vuln-cve2011-1764 script, which checks if the Exim
  SMTP server is vulnerable to the DKIM Format String vulnerability
  (CVE-2011-1764). [Djalal]

o Added the broadcast-ping script which sends icmp packets to broadcast
  addresses on the selected network interface, or all ethernet interfaces if
  none is selected. It has the option to add the discovered hosts as targets.

o [NSE] Applied patch from Chris Woodbury that adds the following additional
  information to the output of smb-os-discovery:
  + Forest name
  + FQDN
  + NetBIOS computer name
  + NetBIOS domain name

o [Ncat] Ncat now supports IPV6 addresses by default without the -6 flag.
  Additionally ncat listens on both :: and localhost when passed
  -l, or any other listening mode unless a specific listening address is
  supplied.

o [NSE] Split script db2-discover into two scripts, adding a new
  broadcast-db2-discover script. This script attempts to discover DB2
  database servers through broadcast requests. [Patrik Karlsson]

o Fixed broken XML output in the case of timed-out hosts; the
  enclosing host element was missing. The fix was suggested by Rmi
  Mollon.

o [NSE] Added ftp-vuln-cve2010-4221 script, which checks if the ProFTPD
  server is vulnerable to the Telnet IAC stack overflow vulnerability
  (CVE-2010-4221). [Djalal]

o [NSE] Added ftp-vsftpd-backdoor, which detects a backdoor that was introduced
  into vsftpd-2.3.4 source code distributions. [Daniel Miller]

o [NSE] ldap-brute.nse - Multiple changes:
  + Added support for 2008 R2 functional level Active Directory instances
    to ldap-brute.
  + Added detection for valid credentials where the target account was
    expired or limited by time or login host constraints.
  + Added support for specifying a UPN suffix to be appended to usernames
    when brute forcing Microsoft Active Directory accounts.
  + Added support for saving discovered credentials to a CSV file.
  + Now reports valid credentials as they are discovered when the script
    is run with -vv or higher.
	[Tom Sellers]

o [NSE] ldap-search.nse - Added support for saving search results to
  CSV.  This is done by using the ldap.savesearch script argument to
  specify an output filename prefix.  [Tom Sellers]

o [NSE] Updated smb-brute to add detection for valid credentials where the
  target account was expired or limited by time or login host constraints.
  [Tom Sellers]

o [NSE] Updated account status text in brute force password discovery
  scripts in an effort to make the reporting more consistent across
  all scripts.  This will have an impact on any code that parses these
  values.  [Tom Sellers]
@
text
@d48 1
a48 1
CONFIGURE_ENV+=		CFLAGS="${CFLAGS} -I${OPENSSLINC}"
@


1.129
log
@- update to version 5.59BETA1

This version includes:
 o 40 new NSE scripts (plus improvements to many others)
 o even more IPv6 goodness than our informal World IPv6 Day release
 o 7 new NSE protocol libraries
 o hundreds of bug fixes
 o and much more see http://seclists.org/nmap-hackers/2011/3
@
text
@d9 1
a9 1
DISTVERSION=	5.59BETA1
@


1.128
log
@- add support for gcc from ports

PR:		ports/156880
Submitted by:	Zhihao Yuan <lichray _at_ gmail.com>
@
text
@d9 1
a9 2
PORTVERSION=	5.51
PORTREVISION=	2
a16 2
LIB_DEPENDS=	pcre.0:${PORTSDIR}/devel/pcre

d20 2
@


1.127
log
@ - fix crash due to a null pointer dereference

  Thanks to Christian Peron csjp@@
@
text
@d10 1
a10 1
PORTREVISION=	1
d35 7
d81 3
@


1.126
log
@ - update to version 5.51

Nmap 5.51 [2011-02-11]

o [Ndiff] Added support for prerule and postrule scripts. [David]

o [NSE] Fixed a bug which caused some NSE scripts to fail due to the
  absence of the NSE SCRIPT_NAME environment variable when loaded.
  Michael Pattrick reported the problem. [Djalal]

o [Zenmap] Selecting one of the scan targets in the left pane is
  supposed to jump to that host in the Nmap Output in the right pane
  (but it wasn't).  Brian Krebs reported this bug. [David]

o Fixed an obscure bug in Windows interface matching. If the MAC
  address of an interface couldn't be retrieved, it might have been
  used instead of the correct interface. Alexander Khodyrev reported
  the problem.  [David]

o [NSE] Fixed portrules in dns-zone-transfer and ftp-proftpd-backdoor
  that used shortport functions incorrectly and always returned
  true. [Jost Krieger]

o [Ndiff] Fixed ndiff.dtd to include two elements that can be diffed:
  status and address. [Daniel Miller]

o [Ndiff] Fixed the ordering of hostscript-related elements in XML
  output. [Daniel Miller]

o [NSE] Fixed a bug in the nrpe-enum script that would make it run for
  every port (when it was selected--it isn't by default).  Daniel
  Miller reported the bug. [Patrick]

o [NSE] When an NSE script sets a negative socket timeout, it now
  causes a controlled Lua stack trace instead of a fatal error.
  Vlatko Kosturjak reported the bug. [David]

o [Zenmap] Worked around an error that caused the py2app bootstrap
  executable to be non-universal even when the rest of the application
  was universal. This prevented the binary .dmg from working on
  PowerPC. Yxynaxen reported the problem. [David]

o [Ndiff] Fixed an output line that wasn't being redirected to a file
  when all other output was. [Daniel Miller]
@
text
@d10 1
@


1.125
log
@- update to version 5.50
- always enable bpf in libdnet-stripped to support build in Jail [1]

Announcement and Changelog are very long and covered by last updates.

Announcement: http://seclists.org/nmap-hackers/2011/0
Changelog: http://nmap.org/changelog.html

PR:		ports/154353 [1]
Submitted by:	Mars G Miro <spry _at_ anarchy.in.the.ph> [1]
Feature safe:	yes
@
text
@d9 1
a9 1
PORTVERSION=	5.50
@


1.124
log
@ - update nmap to version 5.36TEST4

   Changelog: http://nmap.org/changelog.html

Feature safe:	yes
@
text
@d9 1
a9 1
DISTVERSION=	5.36TEST4
@


1.123
log
@ - update nmap to version 5.36TEST3
 - remove dead mirror servers

 Changelog: http://nmap.org/changelog.html

 Mayjor changes are NSE script related, some highlihts:
  o [NSE] Added stuxnet-detect.nse
  o [NSE] Added the ftp-proftpd-backdoor.nse

  and many more interesting NSE scripts.
@
text
@d9 1
a9 1
DISTVERSION=	5.36TEST3
@


1.122
log
@ - update nmap to version 5.35DC1
 - remove MD2 code from nse_openssl.cc (already removed in nmap svn)
 - remove naming conflict if openssl-1.x is build with SCTP support

Approved by:	glarkin (mentor)
@
text
@d9 1
a9 1
DISTVERSION=	5.35DC1
d12 1
a12 4
		http://nmap.ucsd.edu/dist/ \
		http://www.mirrors.wiretapped.net/security/network-mapping/nmap/ \
		http://www.mirrorservice.org/sites/ftp.wiretapped.net/pub/security/network-mapping/nmap/ \
		http://mirror.sg.depaul.edu/pub/security/nmap/
d19 3
a36 2
PLIST_SUB+=	NCATDATADIR=share/ncat \
		NPINGDIR=share/nping
d44 1
d49 4
d54 1
a54 1
post-patch:
d63 9
a71 3
	@@for doc in CHANGELOG HACKING docs/nmap.dtd; do \
		${INSTALL_DATA} ${WRKSRC}/$${doc} ${DOCSDIR}; \
	done
@


1.121
log
@Take Maintainership

Approved by:	glarkin (mentor, implicit)
@
text
@d9 1
a9 2
PORTVERSION=	5.21
PORTREVISION=	1
d36 3
a38 2
MAN1_EN=	ncat.1
PLIST_SUB=	NCATDATADIR=share/ncat
d44 1
d47 1
d50 4
@


1.120
log
@Drop Maintainership

PR:		149436
Submitted by:	old maintainer
@
text
@d18 1
a18 1
MAINTAINER=	ports@@FreeBSD.org
@


1.119
log
@- Fix plist and bump PORTREVISION

PR:		ports/144401
Submitted by:	olli hauer <ohauer@@gmx.de>
Approved by:	Daniel Roethlisberger <daniel@@roe.ch> (maintainer)
Feature safe:	yes
@
text
@d18 1
a18 1
MAINTAINER=	daniel@@roe.ch
@


1.118
log
@- Update to 5.21

PR:		143331
Submitted by:	Daniel Roethlisberger <daniel@@roe.ch> (maintainer)
@
text
@d10 1
@


1.117
log
@- Update to 5.00

Submitted by:	Daniel Roethlisberger <daniel@@roe.ch> (maintainer)
@
text
@d9 1
a9 1
PORTVERSION=	5.00
d34 3
a36 1
MAN1=		nmap.1 ncat.1
@


1.116
log
@- Update to 4.90RC1

PR:		136295
Submitted by:	Daniel Roethlisberger <daniel@@roe.ch> (maintainer)
@
text
@d9 1
a9 1
DISTVERSION=	4.90RC1
d12 1
@


1.115
log
@- Add patch to work around versions of FreeBSD with broken
  getaddrinfo(3) (7.1 and earlier, and -CURRENT before the end of March
  2009).

PR:		ports/133779
Submitted by:	Daniel Roethlisberger <daniel@@roe.ch> (maintainer)
@
text
@d9 1
a9 2
DISTVERSION=	4.85BETA7
PORTREVISION=	1
d19 1
a19 2
LIB_DEPENDS=	pcre.0:${PORTSDIR}/devel/pcre \
		dnet.1:${PORTSDIR}/net/libdnet
a29 1
		--with-libdnet=${LOCALBASE} \
d34 1
@


1.114
log
@- Update to 4.85.b7

PR:		ports/133547
Submitted by:	Daniel Roethlisberger <daniel@@roe.ch> (maintainer)
Approved by:	miwi (mentor)
@
text
@d10 1
@


1.113
log
@- Update to 4.76

PR:		127379
Submitted by:	Daniel Roethlisberger <daniel@@roe.ch> (maintainer)
@
text
@d9 1
a9 1
PORTVERSION=	4.76
d29 1
d35 1
a35 1
MAN1=		nmap.1
@


1.112
log
@fix build when openssl is not in base but in $LOCALBASE

Approved by:	maintainer
@
text
@d9 1
a9 1
PORTVERSION=	4.68
@


1.111
log
@Update CONFIGURE_ARGS for how we pass CONFIGURE_TARGET to configure script.
Specifically, newer autoconf (> 2.13) has different semantic of the
configure target. In short, one should use --build=CONFIGURE_TARGET
instead of CONFIGURE_TARGET directly. Otherwise, you will get a warning
and the old semantic may be removed in later autoconf releases.

To workaround this issue, many ports hack the CONFIGURE_TARGET variable
so that it contains the ``--build='' prefix.

To solve this issue, under the fact that some ports still have
configure script generated by the old autoconf, we use runtime detection
in the do-configure target so that the proper argument can be used.

Changes to Mk/*:
 - Add runtime detection magic in bsd.port.mk
 - Remove CONFIGURE_TARGET hack in various bsd.*.mk
 - USE_GNOME=gnometarget is now an no-op

Changes to individual ports, other than removing the CONFIGURE_TARGET hack:

= pkg-plist changed (due to the ugly CONFIGURE_TARGET prefix in * executables)
  - comms/gnuradio
  - science/abinit
  - science/elmer-fem
  - science/elmer-matc
  - science/elmer-meshgen2d
  - science/elmerfront
  - science/elmerpost

= use x86_64 as ARCH
  - devel/g-wrap

= other changes
  - print/magicfilter
    GNU_CONFIGURE -> HAS_CONFIGURE since it's not generated by autoconf

Total # of ports modified:  1,027
Total # of ports affected: ~7,000 (set GNU_CONFIGURE to yes)

PR:		126524 (obsoletes 52917)
Submitted by:	rafan
Tested on:	two pointyhat 7-amd64 exp runs (by pav)
Approved by:	portmgr (pav)
@
text
@d39 1
@


1.110
log
@- Update to 4.68

PR:		126211
Submitted by:	Daniel Roethlisberger <daniel@@roe.ch> (maintainer)
@
text
@a32 1
CONFIGURE_TARGET=	--build=${MACHINE_ARCH}-portbld-freebsd${OSREL}
@


1.109
log
@- Update to 4.62

PR:		123401
Submitted by:	Daniel Roethlisberger <daniel@@roe.ch> (maintainer)
@
text
@d9 1
a9 1
PORTVERSION=	4.62
@


1.108
log
@- Update nmap to 4.60 and fix moved MASTER_SITES.
  Also fixed portlint warnings about Makefile structure.

PR:		ports/122728
Submitted by:	maintainer (Daniel Roethlisberge)
@
text
@d9 1
a9 1
PORTVERSION=	4.60
@


1.107
log
@- Update to 4.52

PR:		119673
Submitted by:	Daniel Roethlisberger <daniel@@roe.ch> (maintainer)
@
text
@d9 1
a9 1
PORTVERSION=	4.52
d11 1
a11 1
MASTER_SITES=	http://download.insecure.org/nmap/dist/ \
d19 5
a25 1

d27 6
a32 2
CONFIGURE_ARGS=	--without-localdirs

a36 11
LIB_DEPENDS=	pcre.0:${PORTSDIR}/devel/pcre \
		dnet.1:${PORTSDIR}/net/libdnet
USE_LUA=	5.1
LUA_COMPS=	lua

CONFIGURE_ARGS+=	--without-zenmap \
			--with-libpcre=${LOCALBASE} \
			--with-libdnet=${LOCALBASE} \
			--with-liblua=${LOCALBASE}
CONFIGURE_ENV=	LUA_INCDIR="${LUA_INCDIR}" LUA_LIBDIR="${LUA_LIBDIR}"

@


1.106
log
@- Remove the DESTDIR modifications from individual ports as we have a new,
  fully chrooted DESTDIR, which does not need such any more.

Sponsored by:	Google Summer of Code 2007
Approved by:	portmgr (pav)
@
text
@d8 2
a9 3
PORTNAME?=	nmap
PORTVERSION=	${DISTVERSION:L:C/([a-z])[a-z]+/\1/g:C/[^a-z0-9+]+/./g}
PORTREVISION=	1
a14 1
DISTNAME=	nmap-${DISTVERSION}	# needed for security/nmapfe
d17 1
a17 3
COMMENT?=	Port scanning utility for large networks

DISTVERSION=	4.20
a26 2
.ifndef BUILD_NMAPFE

d29 10
a38 3
LIB_DEPENDS=	pcre.0:${PORTSDIR}/devel/pcre

CONFIGURE_ARGS+=	--with-libpcre=${LOCALBASE}
a46 5
CONFIGURE_ARGS+=	--without-nmapfe

ALL_TARGET=	nmap
INSTALL_TARGET=	install-nmap

a57 23
.else

RUN_DEPENDS=	nmap:${PORTSDIR}/security/nmap

DESCR=		${PKGDIR}/pkg-descr.fe
PLIST=		${PKGDIR}/pkg-plist.fe
PLIST_SUB=	REALPREFIX=${PREFIX}

MAN1=		nmapfe.1
MLINKS=		nmapfe.1 xnmap.1

USE_GNOME=	gtk20
USE_GCC=	3.2+

CONFIGURE_ARGS+=--without-openssl

CONFIGURE_ARGS+=--with-nmapfe

ALL_TARGET=	nbase/libnbase.a nmapfe/nmapfe
INSTALL_TARGET=	install-nmapfe

.endif

@


1.105
log
@- Fix mastersite.

PR:		ports/113203
Submitted by:	Daniel Roethlisberger <daniel@@roe.ch> (maintainer)
@
text
@d56 1
a56 1
	@@${MKDIR} ${DESTDIR}${DOCSDIR}
d58 1
a58 1
		${INSTALL_DATA} ${WRKSRC}/$${doc} ${DESTDIR}${DOCSDIR}; \
@


1.104
log
@- Welcome X.org 7.2 \o/.
- Set X11BASE to ${LOCALBASE} for recent ${OSVERSION}.
- Bump PORTREVISION for ports intalling files in ${X11BASE}.
@
text
@d14 2
a15 2
		http://ftp.iasi.roedu.net/mirrors/download.insecure.org/nmap/dist/ \
		http://shadow.cc.columbia.edu/pub/software/nmap/
@


1.103
log
@- Fix build on FreeBSD 4.x.

PR:		ports/106911
Submitted by:	Daniel Roethlisberger <daniel@@roe.ch> (maintainer)
@
text
@d10 1
@


1.102
log
@- Update to 4.20

PR:		ports/106567
Submitted by:	Jose Fernandes<jose@@diasfernandes.pt>
Approved by:    maintainer
@
text
@d84 1
a84 7
.include <bsd.port.pre.mk>

.if ${OSVERSION} < 500000
BROKEN=		Does not compile on 4.x
.endif

.include <bsd.port.post.mk>
@


1.101
log
@- update to 4.11

PR:		ports/99833
Submitted by:	tjs <tjs_AT_cdpa dot nsysu dot edu dot tw>
Approved by:	maintainer (Daniel Roethlisberger)
@
text
@d20 1
a20 1
DISTVERSION=	4.11
d84 7
a90 1
.include <bsd.port.mk>
@


1.100
log
@Update to 4.10

PR:		99461
Submitted by:	Daniel Roethlisberger <daniel@@roe.ch> (maintainer)
@
text
@d20 1
a20 1
DISTVERSION=	4.10
@


1.99
log
@- Able security/nmap open more than 128 bpfs.
- Bump PORTREVISION

PR:		98080
Submitted by:	marck
Approved by:	maintainer
@
text
@a9 1
PORTREVISION=	2
d20 1
a20 1
DISTVERSION=	4.01
@


1.98
log
@- Add patch resolving an infinite loop in the scan engine
- Bump PORTREVISION

PR:		ports/94264
Submitted by:	maintainer
Requested by:   Alan Amesbury <amesbury@@umn.edu>
@
text
@d10 1
a10 1
PORTREVISION=	1
@


1.97
log
@Fix build of "slave port" (security/nmapfe) on 4.x by using GCC 3.2+

PR:		93452
Submitted by:	Daniel Roethlisberger <daniel@@roe.ch> (maintainer)
@
text
@d10 1
@


1.96
log
@Update to 4.01

PR:		ports/93153
Submitted by:	krion
Approved by:	maintainer
@
text
@d73 1
@


1.95
log
@Update to 4.00

PR:		ports/92684
Submitted by:	krion
Approved by:	maintainer
@
text
@d20 1
a20 1
DISTVERSION=	4.00
@


1.94
log
@Update nmap and nmapfe to 3.95.
Notable upstream changes:

 * new help/usage screen and man page
 * new man page currently only available in en, pt_PT and pt_BR
 * nmapfe is now a shiny GTK2 application

Submitted by:	Daniel Roethlisberger <daniel@@roe.ch> (maintainer)
PR:		ports/90371
@
text
@d20 1
a20 1
DISTVERSION=	3.95
a23 1
USE_REINPLACE=	yes
a32 1
MANLANG=	"" pt.ISO8859-1 pt_BR.ISO8859-1
a53 7
	@@for lang in pt.ISO8859-1=pt-pt pt_BR.ISO8859-1=pt-br; do \
		llang="`expr $${lang} : '\([^=]*\)'`"; \
		elang="`expr $${lang} : '.*=\([^=]*\)'`"; \
		${MKDIR} ${DESTDIR}${MAN1PREFIX}/man/$${llang}/man1; \
		${INSTALL_MAN} ${WRKSRC}/docs/man-$${elang}.1 \
			${DESTDIR}${MAN1PREFIX}/man/$${llang}/man1/nmap.1; \
	done
@


1.93
log
@- Update to 3.93

PR:		ports/86113
Submitted by:	maintainer
@
text
@d20 1
a20 1
DISTVERSION=	3.93
d34 1
a34 2
MANLANG=	"" de.ISO8859-1 es.ISO8859-1 fr.ISO8859-1 it.ISO8859-15 \
		lt.ISO8859-13 pt.ISO8859-1 ru.KOI8-R
d56 1
a56 2
	@@for lang in de.ISO8859-1=german es.ISO8859-1=spanish fr.ISO8859-1=french it.ISO8859-15=italian \
		lt.ISO8859-13=lithuanian pt.ISO8859-1=portuguese ru.KOI8-R=russian; do \
d60 1
a60 1
		${INSTALL_MAN} ${WRKSRC}/docs/nmap_$${elang}.1 \
d81 1
a81 1
USE_GNOME=	gtk12
@


1.92
log
@Give maintainership to submitter

PR:		ports/85870
Submitted by:	Daniel Roethlisberger <daniel@@roe.ch>
@
text
@d20 1
a20 1
DISTVERSION=	3.90
@


1.91
log
@Update to version 3.90
@
text
@d17 1
a17 1
MAINTAINER=	ports@@FreeBSD.org
@


1.90
log
@With portmgr hat on, reset eik's ports since he has been inactive for
several months (not responding to email).

Discussed among:	portmgr team
@
text
@d20 1
a20 1
DISTVERSION=	3.81
d23 1
@


1.89
log
@At Kris's request, back out the MACHINE_ARCH spelling correction until
after 5.4-RELEASE.
@
text
@d17 1
a17 1
MAINTAINER=	eik@@FreeBSD.org
@


1.88
log
@Assist getting more ports working on AMD64 by obeying the
Ports Collection documentation and use 'ARCH' rather than 'MACHINE_ARCH'.
@
text
@d28 1
a28 1
CONFIGURE_TARGET=	--build=${ARCH}-portbld-freebsd${OSREL}
@


1.87
log
@Update to version 3.81

PR:		ports/77425
Submitted by:	krion
Approved by:	maintainer timeout
@
text
@d28 1
a28 1
CONFIGURE_TARGET=	--build=${MACHINE_ARCH}-portbld-freebsd${OSREL}
@


1.86
log
@update to version 3.77
@
text
@d20 1
a20 1
DISTVERSION=	3.77
@


1.85
log
@- update to version 3.75
  + updated OS fingerprint database
@
text
@d20 1
a20 1
DISTVERSION=	3.75
@


1.84
log
@- update to version 3.71-PRE1
@
text
@d20 1
a20 1
DISTVERSION=	3.71-PRE1
@


1.83
log
@- update to version 3.70 (birthday edition, try the verbose mode)
@
text
@d12 3
a14 1
		http://www.mirrors.wiretapped.net/security/network-mapping/nmap/
d20 1
a20 1
DISTVERSION=	3.70
d23 1
d52 3
d60 3
a62 2
		${MKDIR} ${MAN1PREFIX}/man/$${llang}/man1; \
		${INSTALL_MAN} ${WRKSRC}/docs/nmap_$${elang}.1 ${MAN1PREFIX}/man/$${llang}/man1/nmap.1; \
d65 1
a65 1
	@@${MKDIR} ${DOCSDIR}
d67 1
a67 1
		${INSTALL_DATA} ${WRKSRC}/$${doc} ${DOCSDIR}; \
@


1.82
log
@support building nmap-3.59a5 WITH_PRERELEASE=yes
@
text
@d18 1
a18 5
.if !defined(WITH_PRERELEASE)
DISTVERSION=	3.55
.else
DISTVERSION=	3.59ALPHA5
.endif
@


1.81
log
@- update to 3.55
  /usr/local/share/doc/nmap/CHANGELOG
@
text
@d18 1
d20 3
@


1.80
log
@update to 3.51-TEST4
@
text
@d18 1
a18 1
DISTVERSION=	3.51-TEST4
@


1.79
log
@- update to 3.51-TEST3
- fix bug when ranges cross interface boundaries [1]

Notified by:	Alex Povolotsky <tarkhil@@webmail.sub.ru>, Mike Benjamin <mikeb@@mikeb.org> [1]
@
text
@d18 1
a18 1
DISTVERSION=	3.51-TEST3 
@


1.78
log
@- update to version 3.50

Approved by:	marcus (mentor)
@
text
@d9 1
a9 1
PORTVERSION=	3.50
d13 1
a13 1
DISTNAME=	nmap-${PORTVERSION}	# needed for security/nmapfe
d17 2
@


1.77
log
@switch my ports to my FreeBSD address

Approved by:	marcus (mentor)
@
text
@d9 1
a9 2
PORTVERSION=	3.48
PORTREVISION=	1
@


1.76
log
@add patches from Marius Strobls

PR:		ports/57646
Submitted by:	Marius Strobls
Approved by:	liver Eikemeier <eikemeier@@fillmore-labs.com>
@
text
@d16 1
a16 1
MAINTAINER=	eikemeier@@fillmore-labs.com
@


1.75
log
@re-add DISTNAME with a comment regarding security/nmapfe

Submitted by:	Oliver Eikemeier <eikemeier@@fillmore-labs.com>
@
text
@d10 1
@


1.74
log
@[MAINTAINER] port security/nmap: update to version 3.48

	- improved version detection
	- integrates most FreeBSD fixes, thanks to
	  Marius Strobl <marius@@alchemy.franken.de>
	- install localized man pages

PR:		ports/57646
Submitted by:	Oliver Eikemeier <eikemeier@@fillmore-labs.com>
@
text
@d13 1
@


1.73
log
@update to nmap/nmapfe version 3.46

PR:		57196
Submitted by:	Oliver Eikemeier <eikemeier@@fillmore-labs.com>
@
text
@d9 1
a9 1
PORTVERSION=	3.46
d11 2
a12 2
MASTER_SITES=	http://download.insecure.org/nmap/dist/
DISTNAME=	nmap-${PORTVERSION}
d27 2
d47 7
a53 1
	@@${STRIP_CMD} ${PREFIX}/bin/nmap
a79 3

post-install:
	@@${STRIP_CMD} ${PREFIX}/bin/nmapfe
@


1.72
log
@Make portlint(1) happy by changing strip to ${STRIP_CMD}

Submitted by:	Oleg Karachevtsev <ok@@etrust.ru>
PR:		56998
@
text
@a0 1
# ex:ts=8
d9 1
a9 1
PORTVERSION=	3.30
d12 1
a12 1
DISTNAME=	nmap-${PORTVERSION:S/.b/BETA/}
d17 2
a20 1
USE_BZIP2=	yes
d22 7
a28 1
MAN1?=		nmap.1
d30 1
a30 1
.include <bsd.port.pre.mk>
d32 5
a36 2
.if ${OSVERSION} < 300004
CFLAGS+=	-DDLT_RAW=12 # for obsoleted <net/bpf.h>
a38 2
CONFIGURE_TARGET=	-build=${ARCH}-portbld-freebsd${OSREL}
.if ${PORTNAME} == "nmap"
d40 11
a51 2
ALL_TARGET?=		nmap
INSTALL_TARGET?=	install-nmap
d53 20
a72 1
.if !target(post-install) && (${PORTNAME} == "nmap")
d74 2
a75 1
	@@${STRIP_CMD} ${PREFIX}/bin/nmap
d78 1
a78 1
.include <bsd.port.post.mk>
@


1.71
log
@Cease FreeBSD port maintainerships

	I don't have the time to give to many of the ports I maintain at
	the moment. I wasn't expecting to be so busy this summer ...

	Please set all my ports back to ports@@freebsd.org.

PR:		ports/56935
Submitted by:	Dominic Marks <dom@@wirespeed.org.uk>,Clement Laforet <sheepkiller@@cultdeadsheep.org>,Oliver Eikemeier <eikemeier@@fillmore-labs.com>
@
text
@d39 1
a39 1
	@@strip ${PREFIX}/bin/nmap
@


1.70
log
@Submitted by:	Marius Strobl <marius@@alchemy.franken.de>
Revive a missed patch. This is not a function improvement or program update
for the port itself, so no need to bump PORTREVISION.
@
text
@d15 1
a15 1
MAINTAINER=	dominic.marks@@btinternet.com
@


1.69
log
@PR:		53933
Submitted by:	maintainer
Reviewed by:
Approved by:
Obtained from:
MFC after:
1. Upgrade Nmap to 3.30, which released at Jun 29, 2003. Major enchancement is
   OS fingerprints update. The fingerprint DB now contains almost 1000
   fingerprints.

   See ChangeLog at this link:

	http://lists.insecure.org/lists/nmap-hackers/2003/Apr-Jun/0016.html

2. Renamed the patch files to be more descriptive.
@
text
@@


1.68
log
@update maintainer's email address.

PR:		53658
Submitted by:	Dominic Marks <dom@@cus.org.uk>
@
text
@d10 1
a10 1
PORTVERSION=	3.28
d19 1
@


1.67
log
@nmap 3.27 -> 3.28

PR:		53351
Submitted by:	Dominic Marks <dom@@cus.org.uk>
@
text
@d15 1
a15 1
MAINTAINER=	d.marks@@student.umist.ac.uk
@


1.66
log
@Update to 3.27.

Submitted by:	Marius Strobl <marius@@alchemy.franken.de>
Reviewed by:	Dominic Marks <dom@@cus.org.uk> (maintainer)
@
text
@d10 1
a10 1
PORTVERSION=	3.27
@


1.65
log
@Update to 3.26.

PR:		51459
Submitted by:	Miguel Mendez <flynn@@energyhq.es.eu.org>
Approved by:	d.marks@@student.umist.ac.uk (maintainer)
@
text
@d10 1
a10 1
PORTVERSION=	3.26
@


1.64
log
@Update to 3.25.

PR:		51257
Submitted by:	Dominic Marks <dom@@cus.org.uk> (maintainer)
@
text
@d10 1
a10 1
PORTVERSION=	3.25
@


1.63
log
@Upgrade to 3.20

PR:		ports/49987
Submitted by:	Dominic Marks <dom@@cus.org.uk>
		marius@@alchemy.franken.de
@
text
@d10 1
a10 1
PORTVERSION=	3.20
@


1.62
log
@Remove pkg-comment from remaining master/slave port sets.

Approved by:	portmgr (implicitly)
@
text
@d10 3
a12 4
PORTVERSION=	3.00
CATEGORIES=	security
MASTER_SITES=	http://download.insecure.org/nmap/dist/  \
		http://www.mobis.com/ajax/projects/
a13 1
EXTRACT_SUFX=	.tgz
d18 5
a24 1
GNU_CONFIGURE=	yes
d28 7
a34 1
MAN1?=		nmap.1
@


1.61
log
@De-pkg-comment.
@
text
@d18 1
a18 1
COMMENT=	Port scanning utility for large networks
@


1.60
log
@Fix typoes on MAINTAINER address.

Submitted by:	Dominic Marks <D.Marks@@student.umist.ac.uk>
@
text
@d18 1
@


1.59
log
@I don't offer any nmap files any longer.
@
text
@d17 1
a17 1
MAINTAINER=	d.marks@@students.umist.ac.uk
@


1.58
log
@Update maintainer address

PR:		43820
Submitted by:	Dominic Marks <d.marks@@students.umist.ac.uk>
@
text
@a12 1
		ftp://nuxi.ucdavis.edu/pub/misc/  \
@


1.57
log
@Update to 3.00

PR:		ports/41330
Submitted by:	maintainer
@
text
@d18 1
a18 1
MAINTAINER=	dominic_marks@@btinternet.com
@


1.56
log
@Portlint this, and remove the 1/2backed nmapfe GUI support as there is a
proper nmapfe port.  I do as one that created and maintained this port
for 4 years.
@
text
@d10 1
a10 1
PORTVERSION=	2.54.b34
d12 1
a12 1
MASTER_SITES=	http://www.insecure.org/nmap/dist/  \
@


1.55
log
@Update to the latest

PR:		38305
Submitted by:	maintainer
@
text
@d17 1
a17 1
PLIST=	pkg-plist
a27 11
pre-configure:
.if !defined (HAVE_GTK)
	@@${SED} -e "s,) nmapfe/nmapfe,),g" \
		${WRKSRC}/Makefile.in > ${WRKDIR}/Makefile.in.temp
	@@${MV} ${WRKDIR}/Makefile.in.temp ${WRKSRC}/Makefile.in
.else
	@@${SED} -e "s,gtk-config,gtk12-config,g" \
		${WRKSRC}/nmapfe/configure > ${WRKDIR}/configure.temp
	@@${MV} ${WRKDIR}/configure.temp ${WRKSRC}/nmapfe/configure
.endif

a30 4
.if defined (HAVE_GTK)
	cd ${WRKSRC} && ${MAKE} install-nmapfe
	echo "bin/nmapfe" >> ${PLIST}
.endif
@


1.54
log
@To ports@@freebsd.org.
@
text
@d10 1
a10 1
PORTVERSION=	2.54.b33
d17 2
a18 4

#PATCH_SITES=	http://www.mobis.com/ajax/projects/

MAINTAINER=	ports@@FreeBSD.org
d28 11
d42 4
@


1.53
log
@Update to version 2.54 Beta 33.
@
text
@d20 1
a20 1
MAINTAINER=	obrien@@FreeBSD.org
@


1.52
log
@Update to version 2.54 Beta 32.
@
text
@d10 1
a10 1
PORTVERSION=	2.54.b32
@


1.51
log
@Update to version 2.54 Beta 31.
@
text
@d10 1
a10 1
PORTVERSION=	2.54.b31
@


1.50
log
@Only the nmap port should try to strip nmap. The nmapfe port also
uses this make file. It should not try to strip the ${PREFIX}/bin/nmap
executable. The install of nmapfe would fail if nmap did not exist.

PR:		ports/35207
Approved by:	obrien
@
text
@d10 1
a10 1
PORTVERSION=	2.54.b30
@


1.49
log
@Update to version 2.54 Beta 30.
@
text
@d30 1
a30 1
.if !target(post-install)
@


1.48
log
@Update to version 2.54 Beta 29.

+ updated fingerprint database
+ multi-portlist -- specify different ranges for TCP & UDP
@
text
@d6 1
a6 1
# $FreeBSD: ports/security/nmap/Makefile,v 1.47 2001/07/29 04:37:24 obrien Exp $
d10 1
a10 1
PORTVERSION=	2.54.b29
@


1.47
log
@Update to version 2.54 Beta 28.
@
text
@d6 1
a6 1
# $FreeBSD: ports/security/nmap/Makefile,v 1.46 2001/07/20 18:27:06 obrien Exp $
d10 1
a10 1
PORTVERSION=	2.54.b28
@


1.46
log
@Update to version 2.54 Beta 27.
@
text
@d6 1
a6 1
# $FreeBSD: ports/security/nmap/Makefile,v 1.45 2001/07/09 12:22:03 obrien Exp $
d10 1
a10 1
PORTVERSION=	2.54.b27
@


1.45
log
@Update to version 2.54 Beta 26.

The coolest feature is a new scan type -- Idlescan!
The quick synopsis is that this is a completely blind scan (meaning no
packets are sent to the target from your real IP address).  Instead, a
unique side-channel attack exploits predictable "IP fragmentation ID"
sequence generation on the zombie host to glean information about the
open ports on the target.
@
text
@d6 1
a6 1
# $FreeBSD: ports/security/nmap/Makefile,v 1.44 2001/06/04 15:27:38 obrien Exp $
d10 1
a10 1
PORTVERSION=	2.54.b26
@


1.44
log
@Update to version 2.54 Beta 25.

-- Added a whole bunch of new OS fingerprints (and adjustments)
   ranging from big important ones (Linux 2.4.X, OpenBSD 2.9, FreeBSD
   4.3, Cisco 12.2.1, MacOS X, etc) to some that are more obscure (
   such as Apple Color LaserWriter 12/660 PS and VirtualAccess
   LinxpeedPro 120 )
-- Tweaked TCP Timestamp and IP.ID sequence classification algorithms
@
text
@d6 1
a6 1
# $FreeBSD: ports/security/nmap/Makefile,v 1.43 2001/06/02 19:06:37 obrien Exp $
d10 1
a10 1
PORTVERSION=	2.54.b25
@


1.43
log
@Upgrade to 2.54BETA24.

+ fixes a problem that kept UDP RPC scanning from working unless you were
  also doing a TCP scan.
+ updated to latest version of rpc program number list
@
text
@d6 1
a6 1
# $FreeBSD: ports/security/nmap/Makefile,v 1.42 2001/05/28 01:01:18 obrien Exp $
d10 1
a10 1
PORTVERSION=	2.54.b24
@


1.42
log
@More changes needed to allow a slave port.
@
text
@d6 1
a6 1
# $FreeBSD: ports/security/nmap/Makefile,v 1.41 2001/05/28 00:18:04 obrien Exp $
d10 1
a10 1
PORTVERSION=	2.54.b22
@


1.41
log
@Allow a slave port to work with this Makefile.  To be used by nmapfe port.
@
text
@d6 1
a6 1
# $FreeBSD: ports/security/nmap/Makefile,v 1.40 2001/03/20 16:39:14 obrien Exp $
d15 1
a15 1
DISTNAME=	${PORTNAME}-${PORTVERSION:S/.b/BETA/}
d28 1
a28 1
MAN1=		nmap.1
@


1.40
log
@Update to version 2.54 Beta 22.
@
text
@d6 1
a6 1
# $FreeBSD: ports/security/nmap/Makefile,v 1.39 2000/06/02 03:18:40 will Exp $
d9 1
a9 1
PORTNAME=	nmap
d30 1
a30 3
post-extract:
	@@${RM} -rf ${WRKSRC}/libpcap*

d33 1
@


1.39
log
@Remove redundant/inappropriate CATEGORIES.  People need to start reading
the Porter's Handbook.  :-)
@
text
@d6 1
a6 1
# $FreeBSD: ports/security/nmap/Makefile,v 1.38 2000/05/09 16:04:12 obrien Exp $
d10 1
a10 1
PORTVERSION=	2.53
d15 1
@


1.38
log
@update to 2.53.
(fix commenting bug that caused major problems for some non-gcc users)
@
text
@d6 1
a6 1
# $FreeBSD: ports/security/nmap/Makefile,v 1.37 2000/05/05 01:51:03 obrien Exp $
d11 1
a11 1
CATEGORIES=	security net
@


1.37
log
@Update to version 2.52.
[fixes minor typos in 2.51]
@
text
@d6 1
a6 1
# $FreeBSD: ports/security/nmap/Makefile,v 1.36 2000/04/30 09:46:42 obrien Exp $
d10 1
a10 1
PORTVERSION=	2.52
@


1.36
log
@Update to 2.51.
2.51 fixes a target parsing bug which could in some cases cause Nmap to
crash with the error "Assertion `t->nleft > 1' failed".
@
text
@d6 1
a6 1
# $FreeBSD: ports/security/nmap/Makefile,v 1.35 2000/04/21 08:18:36 mharo Exp $
d10 1
a10 1
PORTVERSION=	2.51
@


1.35
log
@Correct whitespace introduced during PORTNAME conversion and portlint
@
text
@d6 1
a6 1
# $FreeBSD: ports/security/nmap/Makefile,v 1.34 2000/04/18 18:58:19 obrien Exp $
d10 1
a10 1
PORTVERSION=	2.3.b20
a14 1
DISTNAME=	${PORTNAME}-2.30BETA20
a23 1
CONFIGURE_ARGS=	--libdir=${PREFIX}/share/misc
@


1.34
log
@Update to version 2.30 beta 20.
@
text
@d6 1
a6 1
# $FreeBSD: ports/security/nmap/Makefile,v 1.33 2000/04/09 18:30:04 cpiazza Exp $
d25 1
a25 1
CONFIGURE_ARGS= --libdir=${PREFIX}/share/misc
@


1.33
log
@Update with the new PORTNAME/PORTVERSION variables
@
text
@d6 1
a6 1
# $FreeBSD: ports/security/nmap/Makefile,v 1.32 2000/04/06 22:16:12 obrien Exp $
d10 1
a10 1
PORTVERSION=	2.3.b18
d15 1
a15 1
DISTNAME=	nmap-2.30BETA18
@


1.32
log
@Update to 2.30 Beta #18.

* Fixed a very important bug that occurred when SYN scanning localhost.
* Fixed "-vv" to mean "-v -v" as it did in previous versions.
@
text
@a2 1
# Version required: 0.0
d6 1
a6 1
# $FreeBSD: ports/security/nmap/Makefile,v 1.31 2000/03/27 01:23:38 obrien Exp $
d9 2
a10 2
DISTNAME=	nmap-2.30BETA18
PKGNAME=	nmap-2.3b18
d15 1
@


1.31
log
@Update to version 2.3 beta 17.

* Added ACK scanning.  This scan technique is great for testing firewall
  rulesets.  It can NOT find open ports, but it can distinguish between
  filtered/unfilterd by sending an ACK packet to each port and waiting for
  a RST to come back.  Filtered ports will not send back a RST (or will
  send ICMP unreachables).  This scan type is activated with -sA .

* Documented the Window scan (-sW)

* "Protocol" field in output eliminated.  It is now printed right
   next to the number (/etc/services style).  Like "22/tcp".

* Added --resume option to continue a large network scan where you left off.
  It also allows you to start and stop for policy reasons
@
text
@d7 1
a7 1
# $FreeBSD: ports/security/nmap/Makefile,v 1.30 2000/03/22 00:27:28 obrien Exp $
d10 2
a11 2
DISTNAME=	nmap-2.30BETA17
PKGNAME=	nmap-2.3b17
@


1.30
log
@Restore useless version required comments.
@
text
@d7 1
a7 1
# $FreeBSD: ports/security/nmap/Makefile,v 1.29 2000/03/20 02:37:04 obrien Exp $
d10 2
a11 2
DISTNAME=	nmap-2.3BETA14
PKGNAME=	nmap-2.3b14
d14 2
a15 1
		ftp://relay.nuxi.com/pub/misc/
d17 2
@


1.29
log
@Remove the "version required" line.
@
text
@d3 1
d7 1
a7 1
# $FreeBSD: ports/security/nmap/Makefile,v 1.28 2000/02/13 03:24:03 obrien Exp $
@


1.28
log
@Style nits in the ports I maintain.
@
text
@a2 1
# Version required:		  1.51
d6 1
a6 1
# $FreeBSD: ports/security/nmap/Makefile,v 1.27 2000/01/28 10:04:59 obrien Exp $
@


1.27
log
@UpDat3 t0 v3r$i0n 2.3 B3ta 14

Among bug fixes, we have the new skript kiddie output mode!  Try it out by
adding "-oS - " to your nmap command line:

amy# nmap -sS -oS - -O -v vectra

$TartInG nmap V. 2.3B3tA14 bY fy0D0r@@!n$ecure.org ( www.ins3cuR3.0Rg/nmap/)
!nt3r3$t|nG pOrtz On v3cTrA.yuma.nEt (192.168.0.5):
P0rt    $tate       PrOtOc0L  $3rv!c3
13      Op3n        tCp       Dayt|m3
22      0pEn        Tcp       $SH
23      open        tcp       tEln3t
79      op3N        tcp       f!ng3r
513     0peN        Tcp       lOgIn
514     OpEn        tcp       $h3ll

TcP S3QuEncE PReDiCtion: ClA$s=random p0$|TivE incr3m3nts
                         DIffIculty=24696 (WorthY Challeng3)

s3quEnce numb3rz: 61B825b7 61b83793 61B88114 61b8B073 61B90DB2 61BA306B
R3m0t3 operAtInG sy$t3m gue$z: OpeNBSD 2.2 - 2.3

NMAP run c0mpleteD -- 1 IP adDR3ss (1 h0sT up) $CAnNed in 1 SEC0nd
@
text
@d3 1
a3 1
# Version required:     	  1.51
d7 1
a7 1
# $FreeBSD: ports/security/nmap/Makefile,v 1.26 2000/01/17 09:22:11 obrien Exp $
d17 1
a17 1
MAINTAINER=     obrien@@FreeBSD.org
@


1.26
log
@Upgrade to version 2.3 BETA 13.
@
text
@d7 1
a7 1
# $FreeBSD: ports/security/nmap/Makefile,v 1.25 2000/01/04 08:00:15 obrien Exp $
d10 2
a11 2
DISTNAME=	nmap-2.3BETA13
PKGNAME=	nmap-2.3b13
@


1.25
log
@Upgrade to version 2.3BETA12.

Submitted by:	taguchi@@tohoku.iij.ad.jp
@
text
@d7 1
a7 1
# $FreeBSD: ports/security/nmap/Makefile,v 1.24 1999/12/07 22:06:54 obrien Exp $
d10 2
a11 2
DISTNAME=	nmap-2.3BETA12
PKGNAME=	nmap-2.3b12
@


1.24
log
@Update to 2.3 beta #9.

This speeds up OS scans.
@
text
@d7 1
a7 1
# $FreeBSD: ports/security/nmap/Makefile,v 1.23 1999/11/21 23:09:21 obrien Exp $
d10 2
a11 2
DISTNAME=	nmap-2.3BETA9
PKGNAME=	nmap-2.3b9
@


1.23
log
@Update to 2.3 Beta8.

* Added "firewall mode" timing optimizations which can decrease the
  amount of time neccessary to SYN or connect scan some heavily filtered
  hosts.
* Changed "TCP Ping" to use a random ACK value rather than 0 (an IDS
  called Snort was using this to detect Nmap TCP pings).
* better FDDI support
* changes which should lead to tremendous speedups against some firewalled
  hosts.
@
text
@d7 1
a7 1
# $FreeBSD: ports/security/nmap/Makefile,v 1.22 1999/09/20 04:51:19 obrien Exp $
d10 2
a11 2
DISTNAME=	nmap-2.3BETA8
PKGNAME=	nmap-2.3b8
@


1.22
log
@Upgrade to 2.3BETA6.

*  Added sophisticated timing controls to give the user much more control
over Nmap's speed.  This allows you to make Nmap much more aggressive to
scan hosts faster, or you can make Nmap more "polite" -- slower but less
likely to wreak havoc on your Network.  You can even enforce large delays
between sending packets to sneak under IDS thresholds and prevent
detection.  See the new "Timing Options" section of the Nmap man page for
more information on using this.

*  New "Window scan" that does fun things with ACK packets.  -sW activates
this scan type.  It is mostly effective against BSD, AIX, Digital UNIX, and
various older HP/UX, SunOS, and VAX.
@
text
@d7 1
a7 1
# $FreeBSD: ports/security/nmap/Makefile,v 1.21 1999/09/18 04:50:31 obrien Exp $
d10 2
a11 2
DISTNAME=	nmap-2.3BETA6
PKGNAME=	nmap-2.3b6
@


1.21
log
@Remove the X dependent componate.  It has become its own port.
@
text
@d7 1
a7 1
# $FreeBSD: ports/security/nmap/Makefile,v 1.20 1999/09/07 10:48:48 obrien Exp $
d10 2
a11 2
DISTNAME=	nmap-2.3BETA5
PKGNAME=	nmap-2.3b5
@


1.20
log
@Upgrade to 2.3BETA5.

This includes new RPC scanning ability & 100's of new OS fingerprints.
The machine parseable output has been cleaned up and made more regular.
@
text
@d7 1
a7 1
# $FreeBSD: ports/security/nmap/Makefile,v 1.19 1999/08/31 01:51:19 peter Exp $
a18 2
LIB_DEPENDS=	gtk12.2:${PORTSDIR}/x11-toolkits/gtk12

a20 1
USE_XLIB=	yes
a22 1
MAKE_ENV=	GTK_CONFIG="${X11BASE}/bin/gtk12-config"
@


1.19
log
@$Id$ -> $FreeBSD$
@
text
@d7 1
a7 1
# $FreeBSD$
d10 2
a11 2
DISTNAME=	nmap-2.2-BETA4
PKGNAME=	nmap-2.2b4
@


1.18
log
@Upgrade to nmap-2.2-BETA4.  The beta includes a very nice GUI (xnmap) that
simplifies the running of nmap for the point and shoot crowd.
@
text
@d7 1
a7 1
# $Id: Makefile,v 1.17 1999/04/07 19:00:04 fenner Exp $
@


1.17
log
@Don't set OSVERSION; bsd.port.pre.mk already did.

Found by:	building ports with sysctl not in my path
@
text
@d7 1
a7 1
# $Id: Makefile,v 1.16 1999/04/04 22:54:44 obrien Exp $
d10 2
a11 1
DISTNAME=	nmap-2.12
d19 2
d23 1
d26 1
@


1.16
log
@Upgrade to 2.12.
@
text
@d7 1
a7 1
# $Id: Makefile,v 1.15 1999/04/03 09:32:23 obrien Exp $
a21 1
OSVERSION!=	sysctl -n kern.osreldate
@


1.15
log
@Upgrade to 2.11.
@
text
@d7 1
a7 1
# $Id: Makefile,v 1.14 1999/02/17 11:43:22 obrien Exp $
d10 1
a10 1
DISTNAME=	nmap-2.11
@


1.14
log
@upgrade to 2.08
@
text
@d7 1
a7 1
# $Id: Makefile,v 1.13 1999/02/11 13:57:27 flathill Exp $
d10 1
a10 1
DISTNAME=	nmap-2.08
@


1.13
log
@Correct Version required: line
@
text
@d1 1
d7 1
a7 1
# $Id: Makefile,v 1.12 1999/02/11 07:47:28 flathill Exp $
d10 1
a10 1
DISTNAME=	nmap-2.07
@


1.12
log
@Update to 2.07
@
text
@a0 1
# ex:ts=8
d2 1
a2 1
# Version required:     	  2.07
d6 1
a6 1
# $Id: Makefile,v 1.11 1999/02/08 18:56:36 obrien Exp $
@


1.11
log
@upgrade to 2.06
@
text
@d3 1
a3 1
# Version required:     	  1.51
d7 1
a7 1
# $Id: Makefile,v 1.10 1999/02/08 11:58:17 obrien Exp $
d10 1
a10 1
DISTNAME=	nmap-2.06
@


1.10
log
@upgrade to 2.05
@
text
@d7 1
a7 1
# $Id: Makefile,v 1.9 1999/01/28 12:41:20 obrien Exp $
d10 1
a10 1
DISTNAME=	nmap-2.05
@


1.9
log
@upgrade to 2.03
@
text
@d7 1
a7 1
# $Id: Makefile,v 1.8 1998/12/29 21:50:12 obrien Exp $
d10 1
a10 1
DISTNAME=	nmap-2.03
d12 1
a12 1
MASTER_SITES=	http://www.insecure.org/nmap/  \
@


1.8
log
@upgrade to 2.02
@
text
@d7 1
a7 1
# $Id: Makefile,v 1.7 1998/12/26 22:05:56 asami Exp $
d10 1
a10 1
DISTNAME=	nmap-2.02
@


1.7
log
@Need to include bsd.port.pre.mk before using ${OSVERSION}.
@
text
@d7 1
a7 1
# $Id: Makefile,v 1.6 1998/12/17 13:26:17 obrien Exp $
d10 1
a10 1
DISTNAME=	nmap-2.01
@


1.6
log
@upgrade to 2.01
[many new OS fingerprints included :-) ]
@
text
@d7 1
a7 1
# $Id: Makefile,v 1.5 1998/12/15 11:18:30 obrien Exp $
d18 2
d34 1
a34 1
.include <bsd.port.mk>
@


1.5
log
@Upgrade to 2.00.
@
text
@d7 1
a7 1
# $Id: Makefile,v 1.4 1998/08/20 22:06:00 obrien Exp $
d10 1
a10 1
DISTNAME=	nmap-2.00
@


1.4
log
@* Nuke included libpcap so I don't make the mistake ache fixed again.
* Prefer -u diffs over -c
@
text
@d7 1
a7 1
# $Id: Makefile,v 1.3 1998/08/18 14:31:31 ache Exp $
d10 1
a10 1
DISTNAME=	nmap-1.51
d12 3
a14 1
MASTER_SITES=	http://www.insecure.org/nmap/
d19 5
a23 1
CFLAGS+=        -DDLT_RAW=12 # for obsoleted <net/bpf.h>
a30 1
	@@${INSTALL_MAN} ${FILESDIR}/nmap.1 ${PREFIX}/man/man1
@


1.3
log
@Old version use bpf.h from internal libpcap and link with
system libpcap in the same time. Fix to use <net/bpf.h> instead

New manpages scheme
@
text
@d7 1
a7 1
# $Id: Makefile,v 1.2 1998/08/04 18:01:31 obrien Exp $
d19 3
@


1.2
log
@Added "net" to categories
@
text
@d7 1
a7 1
# $Id: Makefile,v 1.1.1.1 1998/08/04 17:59:51 obrien Exp $
d17 1
@


1.1
log
@Initial revision
@
text
@d7 1
a7 1
# $Id: Makefile,v 1.2 1997/01/25 18:08:40 obrien Exp $
d11 1
a11 1
CATEGORIES=	security
@


1.1.1.1
log
@nmap is a utility for port scanning large networks
Sometimes you need speed, other times you may need stealth. In some cases,
bypassing firewalls may be required. Not to mention the fact that you may
want to scan different protocols (UDP, TCP, ICMP, etc.).
You just can't do all this with one scanning mode.  Thus nmap
incorporats virtually every scanning technique known of.

See the nmap homepage at http://www.insecure.org/nmap/index.html
@
text
@@
