From wouter@canoe.trimm.net  Wed Apr  1 12:27:22 2009
Return-Path: <wouter@canoe.trimm.net>
Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34])
	by hub.freebsd.org (Postfix) with ESMTP id A2DC8106564A
	for <FreeBSD-gnats-submit@freebsd.org>; Wed,  1 Apr 2009 12:27:22 +0000 (UTC)
	(envelope-from wouter@canoe.trimm.net)
Received: from canoe.trimm.net (canoe.trimm.net [87.249.125.7])
	by mx1.freebsd.org (Postfix) with ESMTP id 19CB58FC1F
	for <FreeBSD-gnats-submit@freebsd.org>; Wed,  1 Apr 2009 12:27:21 +0000 (UTC)
	(envelope-from wouter@canoe.trimm.net)
Received: from canoe.trimm.net (localhost [127.0.0.1])
	by canoe.trimm.net (8.14.2/8.14.2) with ESMTP id n31C6Q2j040945;
	Wed, 1 Apr 2009 14:06:31 +0200 (CEST)
	(envelope-from wouter@canoe.trimm.net)
Received: (from wouter@localhost)
	by canoe.trimm.net (8.14.2/8.14.2/Submit) id n31C6QcB040944;
	Wed, 1 Apr 2009 14:06:26 +0200 (CEST)
	(envelope-from wouter)
Message-Id: <200904011206.n31C6QcB040944@canoe.trimm.net>
Date: Wed, 1 Apr 2009 14:06:26 +0200 (CEST)
From: Wouter Oosterveld <wouter@fizzyflux.nl>
To: FreeBSD-gnats-submit@freebsd.org
Cc: wouter@trimm.nl
Subject: [ports][security/nmap] New recommended version	
X-Send-Pr-Version: 3.113
X-GNATS-Notify: daniel@roe.ch

>Number:         133268
>Category:       ports
>Synopsis:       security/nmap: New recommended version
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    freebsd-ports-bugs
>State:          closed
>Quarter:        
>Keywords:       
>Date-Required:  
>Class:          change-request
>Submitter-Id:   current-users
>Arrival-Date:   Wed Apr 01 12:30:04 UTC 2009
>Closed-Date:    Thu Apr 09 21:45:33 UTC 2009
>Last-Modified:  Thu Apr 09 21:45:33 UTC 2009
>Originator:     Wouter Oosterveld
>Release:        FreeBSD 6.3-RELEASE amd64
>Organization:
None	
>Environment:
System: FreeBSD canoe.trimm.net 6.3-RELEASE FreeBSD 6.3-RELEASE #1: Wed Jan 30 17:20:21 CET 2008 root@canoe.trimm.net:/usr/obj/usr/src/sys/CANOE amd64


	
>Description:
		Update port security/nmap to recommended version.

        Fyodor notes: "Note that I've removed 4.76 from the D/L page as I think 4.85BETA5 is
the way to go in general." - http:///seclists.org/nmap-dev/2009/q1/0870.html
>How-To-Repeat:
>Fix:

--- nmap_4.85BETA5.shar begins here ---
# This is a shell archive.  Save it in a file, remove anything before
# this line, and then unpack it by entering "sh file".  Note, it may
# create directories; files and directories will be owned by you and
# have default permissions.
#
# This archive contains:
#
#	security/nmap
#	security/nmap/files
#	security/nmap/files/patch-configure
#	security/nmap/files/patch-libdnet-stripped__src__eth-bsd.c
#	security/nmap/files/patch-Makefile.in
#	security/nmap/files/patch-nmap.cc
#	security/nmap/files/patch-tcpip.cc
#	security/nmap/Makefile
#	security/nmap/distinfo
#	security/nmap/pkg-descr
#	security/nmap/pkg-plist
#
echo c - security/nmap
mkdir -p security/nmap > /dev/null 2>&1
echo c - security/nmap/files
mkdir -p security/nmap/files > /dev/null 2>&1
echo x - security/nmap/files/patch-configure
sed 's/^X//' >security/nmap/files/patch-configure << '058ca0a46c0da230a1b866d2b434b0a8'
X--- configure.orig	2008-06-15 09:05:12.000000000 +0200
X+++ configure	2008-08-03 12:41:04.000000000 +0200
X@@ -1930,7 +1930,7 @@
X ac_compiler_gnu=$ac_cv_c_compiler_gnu
X if test -n "$ac_tool_prefix"; then
X   # Extract the first word of "${ac_tool_prefix}gcc", so it can be a program name with args.
X-set dummy ${ac_tool_prefix}gcc; ac_word=$2
X+set dummy ${ac_tool_prefix}$CXX; ac_word=$2
X { echo "$as_me:$LINENO: checking for $ac_word" >&5
X echo $ECHO_N "checking for $ac_word... $ECHO_C" >&6; }
X if test "${ac_cv_prog_CC+set}" = set; then
X@@ -7337,8 +7337,8 @@
X     no_lua="yes"
X   ;;
X   *)
X-    CPPFLAGS="-I$with_liblua/include $CPPFLAGS"
X-    LDFLAGS="-L$with_liblua/lib $LDFLAGS"
X+    CPPFLAGS="-I${LUA_INCDIR} $CPPFLAGS"
X+    LDFLAGS="-L${LUA_LIBDIR} $LDFLAGS"
X   ;;
X   esac
X 
058ca0a46c0da230a1b866d2b434b0a8
echo x - security/nmap/files/patch-libdnet-stripped__src__eth-bsd.c
sed 's/^X//' >security/nmap/files/patch-libdnet-stripped__src__eth-bsd.c << '2401c9f95661a6ca9920a5aeb7215d7a'
X#
X# $FreeBSD: ports/security/nmap/files/patch-libdnet-stripped__src__eth-bsd.c,v 1.1 2006/06/06 01:30:16 mnag Exp $
X#
X# - nmap fails to attach to bpf when more than 128 bpfs are busy.
X# PR: 98080
X#
X--- libdnet-stripped/src/eth-bsd.c.orig
X+++ libdnet-stripped/src/eth-bsd.c
X@@ -45,7 +45,7 @@
X 	int i;
X 
X 	if ((e = calloc(1, sizeof(*e))) != NULL) {
X-		for (i = 0; i < 128; i++) {
X+		for (i = 0; i < 1024; i++) {
X 			snprintf(file, sizeof(file), "/dev/bpf%d", i);
X 			e->fd = open(file, O_WRONLY);
X 			if (e->fd != -1 || errno != EBUSY)
2401c9f95661a6ca9920a5aeb7215d7a
echo x - security/nmap/files/patch-Makefile.in
sed 's/^X//' >security/nmap/files/patch-Makefile.in << 'f6b68a49cdb30293802378da357880f6'
X--- Makefile.in.orig	2008-01-24 02:36:01.000000000 +0100
X+++ Makefile.in	2008-04-13 16:48:40.000000000 +0200
X@@ -11,7 +11,7 @@
X srcdir = @srcdir@
X nmaplibexecdir = @libexecdir@/nmap
X nmapdatadir = @datadir@/nmap
X-deskdir = $(prefix)/share/applications
X+deskdir = $(LOCALBASE)/share/applications
X NMAPDEVDIR=~/nmap-dev
X 
X export NBASEDIR=@NBASEDIR@
f6b68a49cdb30293802378da357880f6
echo x - security/nmap/files/patch-nmap.cc
sed 's/^X//' >security/nmap/files/patch-nmap.cc << '7ab24d917799ec984de6ab79b4b721a0'
X--- nmap.cc.orig	Sat Dec 22 07:32:03 2007
X+++ nmap.cc	Thu Jan 10 20:41:30 2008
X@@ -99,6 +99,7 @@
X 
X /* $Id: nmap.cc 6633 2007-12-22 06:32:03Z fyodor $ */
X 
X+#include <getopt.h>
X #include "nmap.h"
X #include "osscan.h"
X #include "osscan2.h"
7ab24d917799ec984de6ab79b4b721a0
echo x - security/nmap/files/patch-tcpip.cc
sed 's/^X//' >security/nmap/files/patch-tcpip.cc << 'c9442e3c7598e9a9d9d389f54cbf1ffe'
X--- tcpip.cc.orig	Fri Dec  8 04:01:19 2006
X+++ tcpip.cc	Wed Jan  3 17:15:05 2007
X@@ -133,6 +133,8 @@
X #endif /* NETINET_IF_ETHER_H */
X #endif /* HAVE_NETINET_IF_ETHER_H */
X 
X+#include <sys/param.h>
X+
X extern NmapOps o;
X 
X #ifdef WIN32
X@@ -1959,7 +1961,7 @@
X 
X // Returns whether the system supports pcap_get_selectable_fd() properly
X bool pcap_selectable_fd_valid() {
X-#if defined(WIN32) || defined(MACOSX)
X+#if defined(WIN32) || defined(MACOSX) || (defined(FREEBSD) && (__FreeBSD_version < 500000))
X   return false;
X #endif
X   return true;
X@@ -1972,7 +1974,7 @@
X    results.  If you just want to test whether the function is supported,
X    use pcap_selectable_fd_valid() instead. */
X int my_pcap_get_selectable_fd(pcap_t *p) {
X-#if defined(WIN32) || defined(MACOSX)
X+#if defined(WIN32) || defined(MACOSX) || (defined(FREEBSD) && (__FreeBSD_version < 500000))
X   return -1;
X #else
X   assert(pcap_selectable_fd_valid());
c9442e3c7598e9a9d9d389f54cbf1ffe
echo x - security/nmap/Makefile
sed 's/^X//' >security/nmap/Makefile << '843e79ee054783564c8ca51f6fe38f0b'
X# Ports collection makefile for:  nmap
X# Date created:			  Tue Aug 04, 1998
X# Whom:				  David O'Brien (obrien@NUXI.com)
X#
X# $FreeBSD: ports/security/nmap/Makefile,v 1.113 2008/09/24 14:47:04 miwi Exp $
X#
X
XPORTNAME=	nmap
XDISTVERSION=	4.85BETA6
XCATEGORIES=	security ipv6
XMASTER_SITES=	http://nmap.org/dist/ \
X		http://www.mirrors.wiretapped.net/security/network-mapping/nmap/ \
X		http://www.mirrorservice.org/sites/ftp.wiretapped.net/pub/security/network-mapping/nmap/ \
X		http://mirror.sg.depaul.edu/pub/security/nmap/
X
XMAINTAINER=	daniel@roe.ch
XCOMMENT=	Port scanning utility for large networks
X
XLIB_DEPENDS=	pcre.0:${PORTSDIR}/devel/pcre \
X		dnet.1:${PORTSDIR}/net/libdnet
X
XUSE_LUA=	5.1
XLUA_COMPS=	lua
XUSE_BZIP2=	yes
XUSE_GMAKE=	yes
XGNU_CONFIGURE=	yes
XCONFIGURE_ARGS=	--without-localdirs \
X		--without-zenmap \
X		--with-libpcre=${LOCALBASE} \
X		--with-libdnet=${LOCALBASE} \
X		--with-liblua=${LOCALBASE}
XCONFIGURE_ENV=	LUA_INCDIR="${LUA_INCDIR}" LUA_LIBDIR="${LUA_LIBDIR}"
X
XMAN1=		nmap.1
X
X.ifndef WITHOUT_SSL
XUSE_OPENSSL=	yes
XCONFIGURE_ARGS+=	--with-openssl=${OPENSSLBASE}
XCONFIGURE_ENV+=		CFLAGS="${CFLAGS} -I${OPENSSLINC}"
X.else
XCONFIGURE_ARGS+=	--without-openssl
X.endif
X
Xpost-configure:
X	@${REINPLACE_CMD} -e "s|^DESTDIR *=|& ${DESTDIR}|" ${WRKSRC}/Makefile
X
Xpost-install:
X.ifndef NOPORTDOCS
X	@${MKDIR} ${DOCSDIR}
X	@for doc in CHANGELOG HACKING docs/nmap.dtd; do \
X		${INSTALL_DATA} ${WRKSRC}/$${doc} ${DOCSDIR}; \
X	done
X.endif
X
X.include <bsd.port.mk>
843e79ee054783564c8ca51f6fe38f0b
echo x - security/nmap/distinfo
sed 's/^X//' >security/nmap/distinfo << '1e077c1061e08ca18c0f70252ffb9777'
XMD5 (nmap-4.85BETA6.tar.bz2) = 330aa3080845150d1df3f598a821e310
XSHA256 (nmap-4.85BETA6.tar.bz2) = 22a54b5d4ff4a358fc959ac023b7af5119b0c849abd143a362ade04862b2a9e4
XSIZE (nmap-4.85BETA6.tar.bz2) = 6454053
1e077c1061e08ca18c0f70252ffb9777
echo x - security/nmap/pkg-descr
sed 's/^X//' >security/nmap/pkg-descr << '47f50fbf14ccd67eabf56e33763f5cf5'
XNmap is a utility for network exploration or security auditing. It
Xsupports ping scanning (determine which hosts are up), many port
Xscanning techniques, version detection (determine service protocols
Xand application versions listening behind ports), and TCP/IP
Xfingerprinting (remote host OS or device identification). Nmap also
Xoffers flexible target and port specification, decoy/stealth scanning,
XsunRPC scanning, and much more.
X
XWWW: http://nmap.org/
X
XSee the web page and the Phrack Magazine article (Volume 7, Issue 51
XSeptember 01, 1997, article 11 of 17) http://nmap.org/p51-11.html
47f50fbf14ccd67eabf56e33763f5cf5
echo x - security/nmap/pkg-plist
sed 's/^X//' >security/nmap/pkg-plist << '4819acb3613e688ada293942a317c5de'
Xbin/nmap
Xbin/ncat
Xbin/ndiff
X%%DATADIR%%/scripts/script.db
X%%DATADIR%%/scripts/rpcinfo.nse
X%%DATADIR%%/scripts/nbstat.nse
X%%DATADIR%%/scripts/finger.nse
X%%DATADIR%%/scripts/whois.nse
X%%DATADIR%%/scripts/upnp-info.nse
X%%DATADIR%%/scripts/telnet-brute.nse
X%%DATADIR%%/scripts/sslv2.nse
X%%DATADIR%%/scripts/sshv1.nse
X%%DATADIR%%/scripts/ssh-hostkey.nse
X%%DATADIR%%/scripts/sql-injection.nse
X%%DATADIR%%/scripts/snmp-sysdescr.nse
X%%DATADIR%%/scripts/snmp-brute.nse
X%%DATADIR%%/scripts/sniffer-detect.nse
X%%DATADIR%%/scripts/smtp-strangeport.nse
X%%DATADIR%%/scripts/smtp-open-relay.nse
X%%DATADIR%%/scripts/smtp-commands.nse
X%%DATADIR%%/scripts/smb-system-info.nse
X%%DATADIR%%/scripts/smb-server-stats.nse
X%%DATADIR%%/scripts/smb-security-mode.nse
X%%DATADIR%%/scripts/smb-pwdump.nse
X%%DATADIR%%/scripts/smb-os-discovery.nse
X%%DATADIR%%/scripts/smb-enum-users.nse
X%%DATADIR%%/scripts/smb-enum-shares.nse
X%%DATADIR%%/scripts/smb-enum-sessions.nse
X%%DATADIR%%/scripts/smb-enum-processes.nse
X%%DATADIR%%/scripts/smb-enum-domains.nse
X%%DATADIR%%/scripts/smb-check-vulns.nse
X%%DATADIR%%/scripts/smb-brute.nse
X%%DATADIR%%/scripts/skypev2-version.nse
X%%DATADIR%%/scripts/robots.txt.nse
X%%DATADIR%%/scripts/realvnc-auth-bypass.nse
X%%DATADIR%%/scripts/pptp-version.nse
X%%DATADIR%%/scripts/pop3-capabilities.nse
X%%DATADIR%%/scripts/pop3-brute.nse
X%%DATADIR%%/scripts/mysql-info.nse
X%%DATADIR%%/scripts/ms-sql-info.nse
X%%DATADIR%%/scripts/irc-info.nse
X%%DATADIR%%/scripts/iax2-version.nse
X%%DATADIR%%/scripts/http-trace.nse
X%%DATADIR%%/scripts/http-passwd.nse
X%%DATADIR%%/scripts/http-open-proxy.nse
X%%DATADIR%%/scripts/http-auth.nse
X%%DATADIR%%/scripts/html-title.nse
X%%DATADIR%%/scripts/ftp-brute.nse
X%%DATADIR%%/scripts/ftp-bounce.nse
X%%DATADIR%%/scripts/ftp-anon.nse
X%%DATADIR%%/scripts/dns-zone-transfer.nse
X%%DATADIR%%/scripts/dns-recursion.nse
X%%DATADIR%%/scripts/dns-random-txid.nse
X%%DATADIR%%/scripts/dns-random-srcport.nse
X%%DATADIR%%/scripts/daytime.nse
X%%DATADIR%%/scripts/banner.nse
X%%DATADIR%%/scripts/auth-spoof.nse
X%%DATADIR%%/scripts/auth-owners.nse
X%%DATADIR%%/scripts/asn-query.nse
X@dirrm %%DATADIR%%/scripts
X%%DATADIR%%/nselib/http.lua
X%%DATADIR%%/nselib/ipOps.lua
X%%DATADIR%%/nselib/strbuf.lua
X%%DATADIR%%/nselib/stdnse.lua
X%%DATADIR%%/nselib/shortport.lua
X%%DATADIR%%/nselib/packet.lua
X%%DATADIR%%/nselib/match.lua
X%%DATADIR%%/nselib/listop.lua
X%%DATADIR%%/nselib/url.lua
X%%DATADIR%%/nselib/tab.lua
X%%DATADIR%%/nselib/datafiles.lua
X%%DATADIR%%/nselib/comm.lua
X%%DATADIR%%/nselib/base64.lua
X%%DATADIR%%/nselib/unpwdb.lua
X%%DATADIR%%/nselib/snmp.lua
X%%DATADIR%%/nselib/pop3.lua
X%%DATADIR%%/nselib/dns.lua
X%%DATADIR%%/nselib/ssh2.lua
X%%DATADIR%%/nselib/ssh1.lua
X%%DATADIR%%/nselib/smbauth.lua
X%%DATADIR%%/nselib/smb.lua
X%%DATADIR%%/nselib/nsedebug.lua
X%%DATADIR%%/nselib/netbios.lua
X%%DATADIR%%/nselib/msrpctypes.lua
X%%DATADIR%%/nselib/msrpcperformance.lua
X%%DATADIR%%/nselib/msrpc.lua
X@dirrm %%DATADIR%%/nselib
X%%DATADIR%%/nmap-mac-prefixes
X%%DATADIR%%/nmap-os-db
X%%DATADIR%%/nmap-protocols
X%%DATADIR%%/nmap-rpc
X%%DATADIR%%/nmap-service-probes
X%%DATADIR%%/nmap-services
X%%DATADIR%%/nmap.dtd
X%%DATADIR%%/nmap.xsl
X@dirrm %%DATADIR%%
X%%PORTDOCS%%%%DOCSDIR%%/CHANGELOG
X%%PORTDOCS%%%%DOCSDIR%%/HACKING
X%%PORTDOCS%%%%DOCSDIR%%/nmap.dtd
X%%PORTDOCS%%@dirrm %%DOCSDIR%%
4819acb3613e688ada293942a317c5de
exit
--- nmap_4.85BETA5.shar ends here ---


>Release-Note:
>Audit-Trail:
State-Changed-From-To: open->feedback 
State-Changed-By: edwin 
State-Changed-When: Wed Apr 1 12:30:45 UTC 2009 
State-Changed-Why:  
Awaiting maintainers feedback (via the GNATS Auto Assign Tool) 

http://www.freebsd.org/cgi/query-pr.cgi?pr=133268 

From: Edwin Groothuis <edwin@FreeBSD.org>
To: daniel@roe.ch
Cc: bug-followup@FreeBSD.org
Subject: Re: ports/133268: [ports][security/nmap] New recommended version
Date: Wed, 1 Apr 2009 12:30:44 UT

 Maintainer of security/nmap,
 
 Please note that PR ports/133268 has just been submitted.
 
 If it contains a patch for an upgrade, an enhancement or a bug fix
 you agree on, reply to this email stating that you approve the patch
 and a committer will take care of it.
 
 The full text of the PR can be found at:
     http://www.freebsd.org/cgi/query-pr.cgi?pr=ports/133268
 
 -- 
 Edwin Groothuis via the GNATS Auto Assign Tool
 edwin@FreeBSD.org

From: Daniel Roethlisberger <daniel@roe.ch>
To: bug-followup@FreeBSD.org
Cc:  
Subject: Re: ports/133268: [ports][security/nmap] New recommended version
Date: Wed, 1 Apr 2009 17:35:08 +0200

 Please do not commit this shar as-is.  I'm working with the
 original submitter on this.
 
 -- 
 Daniel Roethlisberger
 http://daniel.roe.ch/

From: Wouter Oosterveld <wouter@fizzyflux.nl>
To: bug-followup@freebsd.org
Cc:  
Subject: Re: ports/133268: security/nmap New recommended version
Date: Wed, 1 Apr 2009 22:57:01 +0200

 --001636c5a2a5abd80c0466848e11
 Content-Type: text/plain; charset=ISO-8859-1
 Content-Transfer-Encoding: 7bit
 
 At request of maintainer here the changes as unified diff.
 
 I also fixed the rejected hunks in:
 
 files/patch-nbase__configure
 files/patch-output.cc
 
 -Wouter
 
 --001636c5a2a5abd80c0466848e11
 Content-Type: application/octet-stream; name="nmap-4.85BETA6.diff"
 Content-Disposition: attachment; filename="nmap-4.85BETA6.diff"
 Content-Transfer-Encoding: base64
 X-Attachment-Id: f_ft0hxhkm0
 
 ZGlmZiAtdXIgc2VjdXJpdHkvbm1hcF9vcmlnL01ha2VmaWxlIHNlY3VyaXR5L25tYXAvTWFrZWZp
 bGUKLS0tIHNlY3VyaXR5L25tYXBfb3JpZy9NYWtlZmlsZQkyMDA4LTA5LTI0IDE2OjQ3OjA0LjAw
 MDAwMDAwMCArMDIwMAorKysgc2VjdXJpdHkvbm1hcC9NYWtlZmlsZQkyMDA5LTA0LTAxIDE5OjA0
 OjQ2LjAwMDAwMDAwMCArMDIwMApAQCAtNiw3ICs2LDcgQEAKICMKIAogUE9SVE5BTUU9CW5tYXAK
 LVBPUlRWRVJTSU9OPQk0Ljc2CitESVNUVkVSU0lPTj0JNC44NUJFVEE2CiBDQVRFR09SSUVTPQlz
 ZWN1cml0eSBpcHY2CiBNQVNURVJfU0lURVM9CWh0dHA6Ly9ubWFwLm9yZy9kaXN0LyBcCiAJCWh0
 dHA6Ly93d3cubWlycm9ycy53aXJldGFwcGVkLm5ldC9zZWN1cml0eS9uZXR3b3JrLW1hcHBpbmcv
 bm1hcC8gXApkaWZmIC11ciBzZWN1cml0eS9ubWFwX29yaWcvZGlzdGluZm8gc2VjdXJpdHkvbm1h
 cC9kaXN0aW5mbwotLS0gc2VjdXJpdHkvbm1hcF9vcmlnL2Rpc3RpbmZvCTIwMDgtMDktMjQgMTY6
 NDc6MDQuMDAwMDAwMDAwICswMjAwCisrKyBzZWN1cml0eS9ubWFwL2Rpc3RpbmZvCTIwMDktMDQt
 MDEgMTk6MDQ6NDYuMDAwMDAwMDAwICswMjAwCkBAIC0xLDMgKzEsMyBAQAotTUQ1IChubWFwLTQu
 NzYudGFyLmJ6MikgPSAyNzhkZDJlODQ5Y2MzZGJiOTQ3ZGY5NjFhMWFhZmZkMAotU0hBMjU2IChu
 bWFwLTQuNzYudGFyLmJ6MikgPSA0ZTI0MzI4Y2E2ZWM5N2FmYjJhOGNhZjMxMmIxZjExMWExNWNm
 NDE3NjNhNWFjNDFlN2E2MzNmZGIyMTdkNjZkCi1TSVpFIChubWFwLTQuNzYudGFyLmJ6MikgPSA2
 MDYxMzE3CitNRDUgKG5tYXAtNC44NUJFVEE2LnRhci5iejIpID0gMzMwYWEzMDgwODQ1MTUwZDFk
 ZjNmNTk4YTgyMWUzMTAKK1NIQTI1NiAobm1hcC00Ljg1QkVUQTYudGFyLmJ6MikgPSAyMmE1NGI1
 ZDRmZjRhMzU4ZmM5NTlhYzAyM2I3YWY1MTE5YjBjODQ5YWJkMTQzYTM2MmFkZTA0ODYyYjJhOWU0
 CitTSVpFIChubWFwLTQuODVCRVRBNi50YXIuYnoyKSA9IDY0NTQwNTMKZGlmZiAtdXIgc2VjdXJp
 dHkvbm1hcF9vcmlnL2ZpbGVzL3BhdGNoLW5iYXNlX19jb25maWd1cmUgc2VjdXJpdHkvbm1hcC9m
 aWxlcy9wYXRjaC1uYmFzZV9fY29uZmlndXJlCi0tLSBzZWN1cml0eS9ubWFwX29yaWcvZmlsZXMv
 cGF0Y2gtbmJhc2VfX2NvbmZpZ3VyZQkyMDA4LTAzLTE0IDIyOjMwOjIzLjAwMDAwMDAwMCArMDEw
 MAorKysgc2VjdXJpdHkvbm1hcC9maWxlcy9wYXRjaC1uYmFzZV9fY29uZmlndXJlCTIwMDktMDQt
 MDEgMjI6NDk6MDAuMDAwMDAwMDAwICswMjAwCkBAIC0xLDExICsxLDExIEBACi0tLS0gbmJhc2Uv
 Y29uZmlndXJlLm9yaWcJVHVlIE5vdiAyNyAyMDozMjo0OSAyMDA3Ci0rKysgbmJhc2UvY29uZmln
 dXJlCUZyaSBKYW4gIDQgMTc6MTA6NDEgMjAwOAotQEAgLTMwMTUsNyArMzAxNSw3IEBACistLS0g
 bmJhc2UvY29uZmlndXJlLm9yaWcJMjAwOC0xMC0wOSAwMToxNzoxMS4wMDAwMDAwMDAgKzAyMDAK
 KysrKyBuYmFzZS9jb25maWd1cmUJMjAwOS0wNC0wMSAyMjo0NDowOS4wMDAwMDAwMDAgKzAyMDAK
 K0BAIC0zNjAwLDcgKzM2MDAsNyBAQAogIAogIAogIAotLWZvciBhY19oZWFkZXIgaW4gc3RyaW5n
 LmggZ2V0b3B0Lmggc3RyaW5ncy5oIHN5cy9wYXJhbS5oIHN5cy90aW1lLmggdW5pc3RkLmggZXJy
 bm8uaCBzeXMvdHlwZXMuaCBzeXMvc29ja2V0LmggbmV0aW5ldC9pbi5oIGFycGEvaW5ldC5oIHN5
 cy9zdGF0LmggbmV0L2lmLmggbmV0ZGIuaCBzeXMvd2FpdC5oIGZjbnRsLmggc3lzL3Jlc291cmNl
 LmgKLStmb3IgYWNfaGVhZGVyIGluIHN0cmluZy5oIHN0cmluZ3MuaCBzeXMvcGFyYW0uaCBzeXMv
 dGltZS5oIHVuaXN0ZC5oIGVycm5vLmggc3lzL3R5cGVzLmggc3lzL3NvY2tldC5oIG5ldGluZXQv
 aW4uaCBhcnBhL2luZXQuaCBzeXMvc3RhdC5oIG5ldC9pZi5oIG5ldGRiLmggc3lzL3dhaXQuaCBm
 Y250bC5oIHN5cy9yZXNvdXJjZS5oCistZm9yIGFjX2hlYWRlciBpbiBzdHJpbmcuaCBnZXRvcHQu
 aCBzdHJpbmdzLmggc3lzL3BhcmFtLmggc3lzL3RpbWUuaCB1bmlzdGQuaCBlcnJuby5oIHN5cy90
 eXBlcy5oIHN5cy9zb2NrZXQuaCBuZXRpbmV0L2luLmggYXJwYS9pbmV0Lmggc3lzL3N0YXQuaCBu
 ZXQvaWYuaCBuZXRkYi5oIHN5cy93YWl0LmggZmNudGwuaCBzeXMvcmVzb3VyY2UuaCBpbnR0eXBl
 cy5oCisrZm9yIGFjX2hlYWRlciBpbiBzdHJpbmcuaCBzdHJpbmdzLmggc3lzL3BhcmFtLmggc3lz
 L3RpbWUuaCB1bmlzdGQuaCBlcnJuby5oIHN5cy90eXBlcy5oIHN5cy9zb2NrZXQuaCBuZXRpbmV0
 L2luLmggYXJwYS9pbmV0Lmggc3lzL3N0YXQuaCBuZXQvaWYuaCBuZXRkYi5oIHN5cy93YWl0Lmgg
 ZmNudGwuaCBzeXMvcmVzb3VyY2UuaCBpbnR0eXBlcy5oCiAgZG8KICBhc19hY19IZWFkZXI9YGVj
 aG8gImFjX2N2X2hlYWRlcl8kYWNfaGVhZGVyIiB8ICRhc190cl9zaGAKLSBpZiBldmFsICJ0ZXN0
 IFwiXCR7JGFzX2FjX0hlYWRlcitzZXR9XCIgPSBzZXQiOyB0aGVuCisgaWYgeyBhc192YXI9JGFz
 X2FjX0hlYWRlcjsgZXZhbCAidGVzdCBcIlwkeyRhc192YXIrc2V0fVwiID0gc2V0IjsgfTsgdGhl
 bgpkaWZmIC11ciBzZWN1cml0eS9ubWFwX29yaWcvZmlsZXMvcGF0Y2gtb3V0cHV0LmNjIHNlY3Vy
 aXR5L25tYXAvZmlsZXMvcGF0Y2gtb3V0cHV0LmNjCi0tLSBzZWN1cml0eS9ubWFwX29yaWcvZmls
 ZXMvcGF0Y2gtb3V0cHV0LmNjCTIwMDctMDEtMDMgMTg6MTc6NDMuMDAwMDAwMDAwICswMTAwCisr
 KyBzZWN1cml0eS9ubWFwL2ZpbGVzL3BhdGNoLW91dHB1dC5jYwkyMDA5LTA0LTAxIDIyOjUzOjIy
 LjAwMDAwMDAwMCArMDIwMApAQCAtMSwxNCArMSwxNCBAQAotLS0tIG91dHB1dC5jYy5vcmlnCUZy
 aSBEZWMgIDggMDQ6MDE6MTkgMjAwNgotKysrIG91dHB1dC5jYwlXZWQgSmFuICAzIDE3OjEwOjQz
 IDIwMDcKLUBAIC0xMDksNiArMTA5LDcgQEAKLSAjaW5jbHVkZSAiTm1hcE91dHB1dFRhYmxlLmgi
 Ci0gI2luY2x1ZGUgIk1BQ0xvb2t1cC5oIgorLS0tIG91dHB1dC5jYy5vcmlnCTIwMDktMDQtMDEg
 MDA6Mjk6MDMuMDAwMDAwMDAwICswMjAwCisrKysgb3V0cHV0LmNjCTIwMDktMDQtMDEgMjI6NTI6
 MDEuMDAwMDAwMDAwICswMjAwCitAQCAtMTA4LDYgKzEwOCw3IEBACisgI2luY2x1ZGUgPG1hdGgu
 aD4KICAKKyAjaW5jbHVkZSA8c2V0PgogKyNpbmNsdWRlIDxzeXMvcGFyYW0uaD4KICAjaW5jbHVk
 ZSA8c3RyaW5nPgotIAotIC8qIFdvcmthcm91bmQgZm9yIGxhY2sgb2YgbmFtZXNwYWNlIHN0ZCBv
 biBIUC1VWCAxMS4wMCAqLwotQEAgLTc0Miw4ICs3NDMsOCBAQAorICNpbmNsdWRlIDx2ZWN0b3I+
 CisgI2luY2x1ZGUgPGxpc3Q+CitAQCAtMTAzMCw4ICsxMDMxLDggQEAKICAgIGNhc2UgTE9HX01B
 Q0hJTkU6CiAgICBjYXNlIExPR19TS0lEOgogICAgY2FzZSBMT0dfWE1MOgpkaWZmIC11ciBzZWN1
 cml0eS9ubWFwX29yaWcvcGtnLXBsaXN0IHNlY3VyaXR5L25tYXAvcGtnLXBsaXN0Ci0tLSBzZWN1
 cml0eS9ubWFwX29yaWcvcGtnLXBsaXN0CTIwMDgtMDktMjQgMTY6NDc6MDQuMDAwMDAwMDAwICsw
 MjAwCisrKyBzZWN1cml0eS9ubWFwL3BrZy1wbGlzdAkyMDA5LTA0LTAxIDE5OjA0OjQ2LjAwMDAw
 MDAwMCArMDIwMApAQCAtMSw1MyArMSw2MiBAQAogYmluL25tYXAKK2Jpbi9uY2F0CitiaW4vbmRp
 ZmYKICUlREFUQURJUiUlL3NjcmlwdHMvc2NyaXB0LmRiCi0lJURBVEFESVIlJS9zY3JpcHRzL3hh
 bXBwRGVmYXVsdFBhc3MubnNlCi0lJURBVEFESVIlJS9zY3JpcHRzL3N0cmFuZ2VTTVRQcG9ydC5u
 c2UKLSUlREFUQURJUiUlL3NjcmlwdHMvc2t5cGVfdjItdmVyc2lvbi5uc2UKLSUlREFUQURJUiUl
 L3NjcmlwdHMvc2hvd1NTSFZlcnNpb24ubnNlCi0lJURBVEFESVIlJS9zY3JpcHRzL3Nob3dTTVRQ
 VmVyc2lvbi5uc2UKLSUlREFUQURJUiUlL3NjcmlwdHMvc2hvd093bmVyLm5zZQotJSVEQVRBRElS
 JSUvc2NyaXB0cy9zaG93SFRUUFZlcnNpb24ubnNlCi0lJURBVEFESVIlJS9zY3JpcHRzL3Nob3dI
 VE1MVGl0bGUubnNlCiAlJURBVEFESVIlJS9zY3JpcHRzL3JwY2luZm8ubnNlCi0lJURBVEFESVIl
 JS9zY3JpcHRzL3JvYm90cy5uc2UKLSUlREFUQURJUiUlL3NjcmlwdHMvcmlwZVF1ZXJ5Lm5zZQot
 JSVEQVRBRElSJSUvc2NyaXB0cy9wcm9taXNjdW91cy5uc2UKLSUlREFUQURJUiUlL3NjcmlwdHMv
 bmV0Ymlvcy1zbWItb3MtZGlzY292ZXJ5Lm5zZQogJSVEQVRBRElSJSUvc2NyaXB0cy9uYnN0YXQu
 bnNlCi0lJURBVEFESVIlJS9zY3JpcHRzL2lyY1pvbWJpZVRlc3QubnNlCi0lJURBVEFESVIlJS9z
 Y3JpcHRzL2lyY1NlcnZlckluZm8ubnNlCi0lJURBVEFESVIlJS9zY3JpcHRzL2lheDJEZXRlY3Qu
 bnNlCi0lJURBVEFESVIlJS9zY3JpcHRzL2Z0cGJvdW5jZS5uc2UKICUlREFUQURJUiUlL3Njcmlw
 dHMvZmluZ2VyLm5zZQotJSVEQVRBRElSJSUvc2NyaXB0cy9lY2hvVGVzdC5uc2UKLSUlREFUQURJ
 UiUlL3NjcmlwdHMvZG5zLXRlc3Qtb3Blbi1yZWN1cnNpb24ubnNlCi0lJURBVEFESVIlJS9zY3Jp
 cHRzL2RheXRpbWVUZXN0Lm5zZQotJSVEQVRBRElSJSUvc2NyaXB0cy9jaGFyZ2VuVGVzdC5uc2UK
 LSUlREFUQURJUiUlL3NjcmlwdHMvYnJ1dGVUZWxuZXQubnNlCi0lJURBVEFESVIlJS9zY3JpcHRz
 L2Fub25GVFAubnNlCi0lJURBVEFESVIlJS9zY3JpcHRzL1NTTHYyLXN1cHBvcnQubnNlCi0lJURB
 VEFESVIlJS9zY3JpcHRzL1NTSHYxLXN1cHBvcnQubnNlCi0lJURBVEFESVIlJS9zY3JpcHRzL1NR
 TEluamVjdC5uc2UKLSUlREFUQURJUiUlL3NjcmlwdHMvU01UUGNvbW1hbmRzLm5zZQotJSVEQVRB
 RElSJSUvc2NyaXB0cy9TTVRQX29wZW5yZWxheV90ZXN0Lm5zZQotJSVEQVRBRElSJSUvc2NyaXB0
 cy9SZWFsVk5DX2F1dGhfYnlwYXNzLm5zZQotJSVEQVRBRElSJSUvc2NyaXB0cy9QUFRQdmVyc2lv
 bi5uc2UKLSUlREFUQURJUiUlL3NjcmlwdHMvTXlTUUxpbmZvLm5zZQotJSVEQVRBRElSJSUvc2Ny
 aXB0cy9NU1NRTG0ubnNlCi0lJURBVEFESVIlJS9zY3JpcHRzL0hUVFB0cmFjZS5uc2UKLSUlREFU
 QURJUiUlL3NjcmlwdHMvSFRUUHBhc3N3ZC5uc2UKLSUlREFUQURJUiUlL3NjcmlwdHMvSFRUUF9v
 cGVuX3Byb3h5Lm5zZQotJSVEQVRBRElSJSUvc2NyaXB0cy9IVFRQQXV0aC5uc2UKLSUlREFUQURJ
 UiUlL3NjcmlwdHMvVVBuUC1pbmZvLm5zZQotJSVEQVRBRElSJSUvc2NyaXB0cy96b25lVHJhbnMu
 bnNlCiAlJURBVEFESVIlJS9zY3JpcHRzL3dob2lzLm5zZQotJSVEQVRBRElSJSUvc2NyaXB0cy9w
 b3BjYXBhLm5zZQotJSVEQVRBRElSJSUvc2NyaXB0cy9kbnMtc2FmZS1yZWN1cnNpb24tdHhpZC5u
 c2UKLSUlREFUQURJUiUlL3NjcmlwdHMvZG5zLXNhZmUtcmVjdXJzaW9uLXBvcnQubnNlCi0lJURB
 VEFESVIlJS9zY3JpcHRzL2JydXRlUE9QMy5uc2UKLSUlREFUQURJUiUlL3NjcmlwdHMvU05NUHN5
 c2Rlc2NyLm5zZQotJSVEQVRBRElSJSUvc2NyaXB0cy9TTk1QY29tbXVuaXR5YnJ1dGUubnNlCi0l
 JURBVEFESVIlJS9zY3JpcHRzL0FTTi5uc2UKKyUlREFUQURJUiUlL3NjcmlwdHMvdXBucC1pbmZv
 Lm5zZQorJSVEQVRBRElSJSUvc2NyaXB0cy90ZWxuZXQtYnJ1dGUubnNlCislJURBVEFESVIlJS9z
 Y3JpcHRzL3NzbHYyLm5zZQorJSVEQVRBRElSJSUvc2NyaXB0cy9zc2h2MS5uc2UKKyUlREFUQURJ
 UiUlL3NjcmlwdHMvc3NoLWhvc3RrZXkubnNlCislJURBVEFESVIlJS9zY3JpcHRzL3NxbC1pbmpl
 Y3Rpb24ubnNlCislJURBVEFESVIlJS9zY3JpcHRzL3NubXAtc3lzZGVzY3IubnNlCislJURBVEFE
 SVIlJS9zY3JpcHRzL3NubXAtYnJ1dGUubnNlCislJURBVEFESVIlJS9zY3JpcHRzL3NuaWZmZXIt
 ZGV0ZWN0Lm5zZQorJSVEQVRBRElSJSUvc2NyaXB0cy9zbXRwLXN0cmFuZ2Vwb3J0Lm5zZQorJSVE
 QVRBRElSJSUvc2NyaXB0cy9zbXRwLW9wZW4tcmVsYXkubnNlCislJURBVEFESVIlJS9zY3JpcHRz
 L3NtdHAtY29tbWFuZHMubnNlCislJURBVEFESVIlJS9zY3JpcHRzL3NtYi1zeXN0ZW0taW5mby5u
 c2UKKyUlREFUQURJUiUlL3NjcmlwdHMvc21iLXNlcnZlci1zdGF0cy5uc2UKKyUlREFUQURJUiUl
 L3NjcmlwdHMvc21iLXNlY3VyaXR5LW1vZGUubnNlCislJURBVEFESVIlJS9zY3JpcHRzL3NtYi1w
 d2R1bXAubnNlCislJURBVEFESVIlJS9zY3JpcHRzL3NtYi1vcy1kaXNjb3ZlcnkubnNlCislJURB
 VEFESVIlJS9zY3JpcHRzL3NtYi1lbnVtLXVzZXJzLm5zZQorJSVEQVRBRElSJSUvc2NyaXB0cy9z
 bWItZW51bS1zaGFyZXMubnNlCislJURBVEFESVIlJS9zY3JpcHRzL3NtYi1lbnVtLXNlc3Npb25z
 Lm5zZQorJSVEQVRBRElSJSUvc2NyaXB0cy9zbWItZW51bS1wcm9jZXNzZXMubnNlCislJURBVEFE
 SVIlJS9zY3JpcHRzL3NtYi1lbnVtLWRvbWFpbnMubnNlCislJURBVEFESVIlJS9zY3JpcHRzL3Nt
 Yi1jaGVjay12dWxucy5uc2UKKyUlREFUQURJUiUlL3NjcmlwdHMvc21iLWJydXRlLm5zZQorJSVE
 QVRBRElSJSUvc2NyaXB0cy9za3lwZXYyLXZlcnNpb24ubnNlCislJURBVEFESVIlJS9zY3JpcHRz
 L3JvYm90cy50eHQubnNlCislJURBVEFESVIlJS9zY3JpcHRzL3JlYWx2bmMtYXV0aC1ieXBhc3Mu
 bnNlCislJURBVEFESVIlJS9zY3JpcHRzL3BwdHAtdmVyc2lvbi5uc2UKKyUlREFUQURJUiUlL3Nj
 cmlwdHMvcG9wMy1jYXBhYmlsaXRpZXMubnNlCislJURBVEFESVIlJS9zY3JpcHRzL3BvcDMtYnJ1
 dGUubnNlCislJURBVEFESVIlJS9zY3JpcHRzL215c3FsLWluZm8ubnNlCislJURBVEFESVIlJS9z
 Y3JpcHRzL21zLXNxbC1pbmZvLm5zZQorJSVEQVRBRElSJSUvc2NyaXB0cy9pcmMtaW5mby5uc2UK
 KyUlREFUQURJUiUlL3NjcmlwdHMvaWF4Mi12ZXJzaW9uLm5zZQorJSVEQVRBRElSJSUvc2NyaXB0
 cy9odHRwLXRyYWNlLm5zZQorJSVEQVRBRElSJSUvc2NyaXB0cy9odHRwLXBhc3N3ZC5uc2UKKyUl
 REFUQURJUiUlL3NjcmlwdHMvaHR0cC1vcGVuLXByb3h5Lm5zZQorJSVEQVRBRElSJSUvc2NyaXB0
 cy9odHRwLWF1dGgubnNlCislJURBVEFESVIlJS9zY3JpcHRzL2h0bWwtdGl0bGUubnNlCislJURB
 VEFESVIlJS9zY3JpcHRzL2Z0cC1icnV0ZS5uc2UKKyUlREFUQURJUiUlL3NjcmlwdHMvZnRwLWJv
 dW5jZS5uc2UKKyUlREFUQURJUiUlL3NjcmlwdHMvZnRwLWFub24ubnNlCislJURBVEFESVIlJS9z
 Y3JpcHRzL2Rucy16b25lLXRyYW5zZmVyLm5zZQorJSVEQVRBRElSJSUvc2NyaXB0cy9kbnMtcmVj
 dXJzaW9uLm5zZQorJSVEQVRBRElSJSUvc2NyaXB0cy9kbnMtcmFuZG9tLXR4aWQubnNlCislJURB
 VEFESVIlJS9zY3JpcHRzL2Rucy1yYW5kb20tc3JjcG9ydC5uc2UKKyUlREFUQURJUiUlL3Njcmlw
 dHMvZGF5dGltZS5uc2UKKyUlREFUQURJUiUlL3NjcmlwdHMvYmFubmVyLm5zZQorJSVEQVRBRElS
 JSUvc2NyaXB0cy9hdXRoLXNwb29mLm5zZQorJSVEQVRBRElSJSUvc2NyaXB0cy9hdXRoLW93bmVy
 cy5uc2UKKyUlREFUQURJUiUlL3NjcmlwdHMvYXNuLXF1ZXJ5Lm5zZQogQGRpcnJtICUlREFUQURJ
 UiUlL3NjcmlwdHMKICUlREFUQURJUiUlL25zZWxpYi9odHRwLmx1YQogJSVEQVRBRElSJSUvbnNl
 bGliL2lwT3BzLmx1YQpAQCAtNjYsNiArNzUsMTUgQEAKICUlREFUQURJUiUlL25zZWxpYi9zbm1w
 Lmx1YQogJSVEQVRBRElSJSUvbnNlbGliL3BvcDMubHVhCiAlJURBVEFESVIlJS9uc2VsaWIvZG5z
 Lmx1YQorJSVEQVRBRElSJSUvbnNlbGliL3NzaDIubHVhCislJURBVEFESVIlJS9uc2VsaWIvc3No
 MS5sdWEKKyUlREFUQURJUiUlL25zZWxpYi9zbWJhdXRoLmx1YQorJSVEQVRBRElSJSUvbnNlbGli
 L3NtYi5sdWEKKyUlREFUQURJUiUlL25zZWxpYi9uc2VkZWJ1Zy5sdWEKKyUlREFUQURJUiUlL25z
 ZWxpYi9uZXRiaW9zLmx1YQorJSVEQVRBRElSJSUvbnNlbGliL21zcnBjdHlwZXMubHVhCislJURB
 VEFESVIlJS9uc2VsaWIvbXNycGNwZXJmb3JtYW5jZS5sdWEKKyUlREFUQURJUiUlL25zZWxpYi9t
 c3JwYy5sdWEKIEBkaXJybSAlJURBVEFESVIlJS9uc2VsaWIKICUlREFUQURJUiUlL25tYXAtbWFj
 LXByZWZpeGVzCiAlJURBVEFESVIlJS9ubWFwLW9zLWRiCg==
 --001636c5a2a5abd80c0466848e11--

From: Wouter Oosterveld <wouter@fizzyflux.nl>
To: bug-followup@freebsd.org
Cc:  
Subject: Re: ports/133268: security/nmap New recommended version
Date: Wed, 1 Apr 2009 23:39:52 +0200

 --001485f6d538dec5a904668527ff
 Content-Type: text/plain; charset=ISO-8859-1
 Content-Transfer-Encoding: 7bit
 
 > At request of maintainer here the changes as unified diff.
 
 Hmmm, possibly some gnats/GoogleMail mime/encoding issues.
 
 Second try.
 
 -Wouter
 
 --001485f6d538dec5a904668527ff
 Content-Type: text/plain; charset=US-ASCII; name="nmap-4.85BETA6.diff.txt"
 Content-Disposition: attachment; filename="nmap-4.85BETA6.diff.txt"
 Content-Transfer-Encoding: base64
 X-Attachment-Id: f_ft0jhz9q1
 
 ZGlmZiAtdXIgc2VjdXJpdHkvbm1hcF9vcmlnL01ha2VmaWxlIHNlY3VyaXR5L25tYXAvTWFrZWZp
 bGUKLS0tIHNlY3VyaXR5L25tYXBfb3JpZy9NYWtlZmlsZQkyMDA4LTA5LTI0IDE2OjQ3OjA0LjAw
 MDAwMDAwMCArMDIwMAorKysgc2VjdXJpdHkvbm1hcC9NYWtlZmlsZQkyMDA5LTA0LTAxIDE5OjA0
 OjQ2LjAwMDAwMDAwMCArMDIwMApAQCAtNiw3ICs2LDcgQEAKICMKIAogUE9SVE5BTUU9CW5tYXAK
 LVBPUlRWRVJTSU9OPQk0Ljc2CitESVNUVkVSU0lPTj0JNC44NUJFVEE2CiBDQVRFR09SSUVTPQlz
 ZWN1cml0eSBpcHY2CiBNQVNURVJfU0lURVM9CWh0dHA6Ly9ubWFwLm9yZy9kaXN0LyBcCiAJCWh0
 dHA6Ly93d3cubWlycm9ycy53aXJldGFwcGVkLm5ldC9zZWN1cml0eS9uZXR3b3JrLW1hcHBpbmcv
 bm1hcC8gXApkaWZmIC11ciBzZWN1cml0eS9ubWFwX29yaWcvZGlzdGluZm8gc2VjdXJpdHkvbm1h
 cC9kaXN0aW5mbwotLS0gc2VjdXJpdHkvbm1hcF9vcmlnL2Rpc3RpbmZvCTIwMDgtMDktMjQgMTY6
 NDc6MDQuMDAwMDAwMDAwICswMjAwCisrKyBzZWN1cml0eS9ubWFwL2Rpc3RpbmZvCTIwMDktMDQt
 MDEgMTk6MDQ6NDYuMDAwMDAwMDAwICswMjAwCkBAIC0xLDMgKzEsMyBAQAotTUQ1IChubWFwLTQu
 NzYudGFyLmJ6MikgPSAyNzhkZDJlODQ5Y2MzZGJiOTQ3ZGY5NjFhMWFhZmZkMAotU0hBMjU2IChu
 bWFwLTQuNzYudGFyLmJ6MikgPSA0ZTI0MzI4Y2E2ZWM5N2FmYjJhOGNhZjMxMmIxZjExMWExNWNm
 NDE3NjNhNWFjNDFlN2E2MzNmZGIyMTdkNjZkCi1TSVpFIChubWFwLTQuNzYudGFyLmJ6MikgPSA2
 MDYxMzE3CitNRDUgKG5tYXAtNC44NUJFVEE2LnRhci5iejIpID0gMzMwYWEzMDgwODQ1MTUwZDFk
 ZjNmNTk4YTgyMWUzMTAKK1NIQTI1NiAobm1hcC00Ljg1QkVUQTYudGFyLmJ6MikgPSAyMmE1NGI1
 ZDRmZjRhMzU4ZmM5NTlhYzAyM2I3YWY1MTE5YjBjODQ5YWJkMTQzYTM2MmFkZTA0ODYyYjJhOWU0
 CitTSVpFIChubWFwLTQuODVCRVRBNi50YXIuYnoyKSA9IDY0NTQwNTMKZGlmZiAtdXIgc2VjdXJp
 dHkvbm1hcF9vcmlnL2ZpbGVzL3BhdGNoLW5iYXNlX19jb25maWd1cmUgc2VjdXJpdHkvbm1hcC9m
 aWxlcy9wYXRjaC1uYmFzZV9fY29uZmlndXJlCi0tLSBzZWN1cml0eS9ubWFwX29yaWcvZmlsZXMv
 cGF0Y2gtbmJhc2VfX2NvbmZpZ3VyZQkyMDA4LTAzLTE0IDIyOjMwOjIzLjAwMDAwMDAwMCArMDEw
 MAorKysgc2VjdXJpdHkvbm1hcC9maWxlcy9wYXRjaC1uYmFzZV9fY29uZmlndXJlCTIwMDktMDQt
 MDEgMjI6NDk6MDAuMDAwMDAwMDAwICswMjAwCkBAIC0xLDExICsxLDExIEBACi0tLS0gbmJhc2Uv
 Y29uZmlndXJlLm9yaWcJVHVlIE5vdiAyNyAyMDozMjo0OSAyMDA3Ci0rKysgbmJhc2UvY29uZmln
 dXJlCUZyaSBKYW4gIDQgMTc6MTA6NDEgMjAwOAotQEAgLTMwMTUsNyArMzAxNSw3IEBACistLS0g
 bmJhc2UvY29uZmlndXJlLm9yaWcJMjAwOC0xMC0wOSAwMToxNzoxMS4wMDAwMDAwMDAgKzAyMDAK
 KysrKyBuYmFzZS9jb25maWd1cmUJMjAwOS0wNC0wMSAyMjo0NDowOS4wMDAwMDAwMDAgKzAyMDAK
 K0BAIC0zNjAwLDcgKzM2MDAsNyBAQAogIAogIAogIAotLWZvciBhY19oZWFkZXIgaW4gc3RyaW5n
 LmggZ2V0b3B0Lmggc3RyaW5ncy5oIHN5cy9wYXJhbS5oIHN5cy90aW1lLmggdW5pc3RkLmggZXJy
 bm8uaCBzeXMvdHlwZXMuaCBzeXMvc29ja2V0LmggbmV0aW5ldC9pbi5oIGFycGEvaW5ldC5oIHN5
 cy9zdGF0LmggbmV0L2lmLmggbmV0ZGIuaCBzeXMvd2FpdC5oIGZjbnRsLmggc3lzL3Jlc291cmNl
 LmgKLStmb3IgYWNfaGVhZGVyIGluIHN0cmluZy5oIHN0cmluZ3MuaCBzeXMvcGFyYW0uaCBzeXMv
 dGltZS5oIHVuaXN0ZC5oIGVycm5vLmggc3lzL3R5cGVzLmggc3lzL3NvY2tldC5oIG5ldGluZXQv
 aW4uaCBhcnBhL2luZXQuaCBzeXMvc3RhdC5oIG5ldC9pZi5oIG5ldGRiLmggc3lzL3dhaXQuaCBm
 Y250bC5oIHN5cy9yZXNvdXJjZS5oCistZm9yIGFjX2hlYWRlciBpbiBzdHJpbmcuaCBnZXRvcHQu
 aCBzdHJpbmdzLmggc3lzL3BhcmFtLmggc3lzL3RpbWUuaCB1bmlzdGQuaCBlcnJuby5oIHN5cy90
 eXBlcy5oIHN5cy9zb2NrZXQuaCBuZXRpbmV0L2luLmggYXJwYS9pbmV0Lmggc3lzL3N0YXQuaCBu
 ZXQvaWYuaCBuZXRkYi5oIHN5cy93YWl0LmggZmNudGwuaCBzeXMvcmVzb3VyY2UuaCBpbnR0eXBl
 cy5oCisrZm9yIGFjX2hlYWRlciBpbiBzdHJpbmcuaCBzdHJpbmdzLmggc3lzL3BhcmFtLmggc3lz
 L3RpbWUuaCB1bmlzdGQuaCBlcnJuby5oIHN5cy90eXBlcy5oIHN5cy9zb2NrZXQuaCBuZXRpbmV0
 L2luLmggYXJwYS9pbmV0Lmggc3lzL3N0YXQuaCBuZXQvaWYuaCBuZXRkYi5oIHN5cy93YWl0Lmgg
 ZmNudGwuaCBzeXMvcmVzb3VyY2UuaCBpbnR0eXBlcy5oCiAgZG8KICBhc19hY19IZWFkZXI9YGVj
 aG8gImFjX2N2X2hlYWRlcl8kYWNfaGVhZGVyIiB8ICRhc190cl9zaGAKLSBpZiBldmFsICJ0ZXN0
 IFwiXCR7JGFzX2FjX0hlYWRlcitzZXR9XCIgPSBzZXQiOyB0aGVuCisgaWYgeyBhc192YXI9JGFz
 X2FjX0hlYWRlcjsgZXZhbCAidGVzdCBcIlwkeyRhc192YXIrc2V0fVwiID0gc2V0IjsgfTsgdGhl
 bgpkaWZmIC11ciBzZWN1cml0eS9ubWFwX29yaWcvZmlsZXMvcGF0Y2gtb3V0cHV0LmNjIHNlY3Vy
 aXR5L25tYXAvZmlsZXMvcGF0Y2gtb3V0cHV0LmNjCi0tLSBzZWN1cml0eS9ubWFwX29yaWcvZmls
 ZXMvcGF0Y2gtb3V0cHV0LmNjCTIwMDctMDEtMDMgMTg6MTc6NDMuMDAwMDAwMDAwICswMTAwCisr
 KyBzZWN1cml0eS9ubWFwL2ZpbGVzL3BhdGNoLW91dHB1dC5jYwkyMDA5LTA0LTAxIDIyOjUzOjIy
 LjAwMDAwMDAwMCArMDIwMApAQCAtMSwxNCArMSwxNCBAQAotLS0tIG91dHB1dC5jYy5vcmlnCUZy
 aSBEZWMgIDggMDQ6MDE6MTkgMjAwNgotKysrIG91dHB1dC5jYwlXZWQgSmFuICAzIDE3OjEwOjQz
 IDIwMDcKLUBAIC0xMDksNiArMTA5LDcgQEAKLSAjaW5jbHVkZSAiTm1hcE91dHB1dFRhYmxlLmgi
 Ci0gI2luY2x1ZGUgIk1BQ0xvb2t1cC5oIgorLS0tIG91dHB1dC5jYy5vcmlnCTIwMDktMDQtMDEg
 MDA6Mjk6MDMuMDAwMDAwMDAwICswMjAwCisrKysgb3V0cHV0LmNjCTIwMDktMDQtMDEgMjI6NTI6
 MDEuMDAwMDAwMDAwICswMjAwCitAQCAtMTA4LDYgKzEwOCw3IEBACisgI2luY2x1ZGUgPG1hdGgu
 aD4KICAKKyAjaW5jbHVkZSA8c2V0PgogKyNpbmNsdWRlIDxzeXMvcGFyYW0uaD4KICAjaW5jbHVk
 ZSA8c3RyaW5nPgotIAotIC8qIFdvcmthcm91bmQgZm9yIGxhY2sgb2YgbmFtZXNwYWNlIHN0ZCBv
 biBIUC1VWCAxMS4wMCAqLwotQEAgLTc0Miw4ICs3NDMsOCBAQAorICNpbmNsdWRlIDx2ZWN0b3I+
 CisgI2luY2x1ZGUgPGxpc3Q+CitAQCAtMTAzMCw4ICsxMDMxLDggQEAKICAgIGNhc2UgTE9HX01B
 Q0hJTkU6CiAgICBjYXNlIExPR19TS0lEOgogICAgY2FzZSBMT0dfWE1MOgpkaWZmIC11ciBzZWN1
 cml0eS9ubWFwX29yaWcvcGtnLXBsaXN0IHNlY3VyaXR5L25tYXAvcGtnLXBsaXN0Ci0tLSBzZWN1
 cml0eS9ubWFwX29yaWcvcGtnLXBsaXN0CTIwMDgtMDktMjQgMTY6NDc6MDQuMDAwMDAwMDAwICsw
 MjAwCisrKyBzZWN1cml0eS9ubWFwL3BrZy1wbGlzdAkyMDA5LTA0LTAxIDE5OjA0OjQ2LjAwMDAw
 MDAwMCArMDIwMApAQCAtMSw1MyArMSw2MiBAQAogYmluL25tYXAKK2Jpbi9uY2F0CitiaW4vbmRp
 ZmYKICUlREFUQURJUiUlL3NjcmlwdHMvc2NyaXB0LmRiCi0lJURBVEFESVIlJS9zY3JpcHRzL3hh
 bXBwRGVmYXVsdFBhc3MubnNlCi0lJURBVEFESVIlJS9zY3JpcHRzL3N0cmFuZ2VTTVRQcG9ydC5u
 c2UKLSUlREFUQURJUiUlL3NjcmlwdHMvc2t5cGVfdjItdmVyc2lvbi5uc2UKLSUlREFUQURJUiUl
 L3NjcmlwdHMvc2hvd1NTSFZlcnNpb24ubnNlCi0lJURBVEFESVIlJS9zY3JpcHRzL3Nob3dTTVRQ
 VmVyc2lvbi5uc2UKLSUlREFUQURJUiUlL3NjcmlwdHMvc2hvd093bmVyLm5zZQotJSVEQVRBRElS
 JSUvc2NyaXB0cy9zaG93SFRUUFZlcnNpb24ubnNlCi0lJURBVEFESVIlJS9zY3JpcHRzL3Nob3dI
 VE1MVGl0bGUubnNlCiAlJURBVEFESVIlJS9zY3JpcHRzL3JwY2luZm8ubnNlCi0lJURBVEFESVIl
 JS9zY3JpcHRzL3JvYm90cy5uc2UKLSUlREFUQURJUiUlL3NjcmlwdHMvcmlwZVF1ZXJ5Lm5zZQot
 JSVEQVRBRElSJSUvc2NyaXB0cy9wcm9taXNjdW91cy5uc2UKLSUlREFUQURJUiUlL3NjcmlwdHMv
 bmV0Ymlvcy1zbWItb3MtZGlzY292ZXJ5Lm5zZQogJSVEQVRBRElSJSUvc2NyaXB0cy9uYnN0YXQu
 bnNlCi0lJURBVEFESVIlJS9zY3JpcHRzL2lyY1pvbWJpZVRlc3QubnNlCi0lJURBVEFESVIlJS9z
 Y3JpcHRzL2lyY1NlcnZlckluZm8ubnNlCi0lJURBVEFESVIlJS9zY3JpcHRzL2lheDJEZXRlY3Qu
 bnNlCi0lJURBVEFESVIlJS9zY3JpcHRzL2Z0cGJvdW5jZS5uc2UKICUlREFUQURJUiUlL3Njcmlw
 dHMvZmluZ2VyLm5zZQotJSVEQVRBRElSJSUvc2NyaXB0cy9lY2hvVGVzdC5uc2UKLSUlREFUQURJ
 UiUlL3NjcmlwdHMvZG5zLXRlc3Qtb3Blbi1yZWN1cnNpb24ubnNlCi0lJURBVEFESVIlJS9zY3Jp
 cHRzL2RheXRpbWVUZXN0Lm5zZQotJSVEQVRBRElSJSUvc2NyaXB0cy9jaGFyZ2VuVGVzdC5uc2UK
 LSUlREFUQURJUiUlL3NjcmlwdHMvYnJ1dGVUZWxuZXQubnNlCi0lJURBVEFESVIlJS9zY3JpcHRz
 L2Fub25GVFAubnNlCi0lJURBVEFESVIlJS9zY3JpcHRzL1NTTHYyLXN1cHBvcnQubnNlCi0lJURB
 VEFESVIlJS9zY3JpcHRzL1NTSHYxLXN1cHBvcnQubnNlCi0lJURBVEFESVIlJS9zY3JpcHRzL1NR
 TEluamVjdC5uc2UKLSUlREFUQURJUiUlL3NjcmlwdHMvU01UUGNvbW1hbmRzLm5zZQotJSVEQVRB
 RElSJSUvc2NyaXB0cy9TTVRQX29wZW5yZWxheV90ZXN0Lm5zZQotJSVEQVRBRElSJSUvc2NyaXB0
 cy9SZWFsVk5DX2F1dGhfYnlwYXNzLm5zZQotJSVEQVRBRElSJSUvc2NyaXB0cy9QUFRQdmVyc2lv
 bi5uc2UKLSUlREFUQURJUiUlL3NjcmlwdHMvTXlTUUxpbmZvLm5zZQotJSVEQVRBRElSJSUvc2Ny
 aXB0cy9NU1NRTG0ubnNlCi0lJURBVEFESVIlJS9zY3JpcHRzL0hUVFB0cmFjZS5uc2UKLSUlREFU
 QURJUiUlL3NjcmlwdHMvSFRUUHBhc3N3ZC5uc2UKLSUlREFUQURJUiUlL3NjcmlwdHMvSFRUUF9v
 cGVuX3Byb3h5Lm5zZQotJSVEQVRBRElSJSUvc2NyaXB0cy9IVFRQQXV0aC5uc2UKLSUlREFUQURJ
 UiUlL3NjcmlwdHMvVVBuUC1pbmZvLm5zZQotJSVEQVRBRElSJSUvc2NyaXB0cy96b25lVHJhbnMu
 bnNlCiAlJURBVEFESVIlJS9zY3JpcHRzL3dob2lzLm5zZQotJSVEQVRBRElSJSUvc2NyaXB0cy9w
 b3BjYXBhLm5zZQotJSVEQVRBRElSJSUvc2NyaXB0cy9kbnMtc2FmZS1yZWN1cnNpb24tdHhpZC5u
 c2UKLSUlREFUQURJUiUlL3NjcmlwdHMvZG5zLXNhZmUtcmVjdXJzaW9uLXBvcnQubnNlCi0lJURB
 VEFESVIlJS9zY3JpcHRzL2JydXRlUE9QMy5uc2UKLSUlREFUQURJUiUlL3NjcmlwdHMvU05NUHN5
 c2Rlc2NyLm5zZQotJSVEQVRBRElSJSUvc2NyaXB0cy9TTk1QY29tbXVuaXR5YnJ1dGUubnNlCi0l
 JURBVEFESVIlJS9zY3JpcHRzL0FTTi5uc2UKKyUlREFUQURJUiUlL3NjcmlwdHMvdXBucC1pbmZv
 Lm5zZQorJSVEQVRBRElSJSUvc2NyaXB0cy90ZWxuZXQtYnJ1dGUubnNlCislJURBVEFESVIlJS9z
 Y3JpcHRzL3NzbHYyLm5zZQorJSVEQVRBRElSJSUvc2NyaXB0cy9zc2h2MS5uc2UKKyUlREFUQURJ
 UiUlL3NjcmlwdHMvc3NoLWhvc3RrZXkubnNlCislJURBVEFESVIlJS9zY3JpcHRzL3NxbC1pbmpl
 Y3Rpb24ubnNlCislJURBVEFESVIlJS9zY3JpcHRzL3NubXAtc3lzZGVzY3IubnNlCislJURBVEFE
 SVIlJS9zY3JpcHRzL3NubXAtYnJ1dGUubnNlCislJURBVEFESVIlJS9zY3JpcHRzL3NuaWZmZXIt
 ZGV0ZWN0Lm5zZQorJSVEQVRBRElSJSUvc2NyaXB0cy9zbXRwLXN0cmFuZ2Vwb3J0Lm5zZQorJSVE
 QVRBRElSJSUvc2NyaXB0cy9zbXRwLW9wZW4tcmVsYXkubnNlCislJURBVEFESVIlJS9zY3JpcHRz
 L3NtdHAtY29tbWFuZHMubnNlCislJURBVEFESVIlJS9zY3JpcHRzL3NtYi1zeXN0ZW0taW5mby5u
 c2UKKyUlREFUQURJUiUlL3NjcmlwdHMvc21iLXNlcnZlci1zdGF0cy5uc2UKKyUlREFUQURJUiUl
 L3NjcmlwdHMvc21iLXNlY3VyaXR5LW1vZGUubnNlCislJURBVEFESVIlJS9zY3JpcHRzL3NtYi1w
 d2R1bXAubnNlCislJURBVEFESVIlJS9zY3JpcHRzL3NtYi1vcy1kaXNjb3ZlcnkubnNlCislJURB
 VEFESVIlJS9zY3JpcHRzL3NtYi1lbnVtLXVzZXJzLm5zZQorJSVEQVRBRElSJSUvc2NyaXB0cy9z
 bWItZW51bS1zaGFyZXMubnNlCislJURBVEFESVIlJS9zY3JpcHRzL3NtYi1lbnVtLXNlc3Npb25z
 Lm5zZQorJSVEQVRBRElSJSUvc2NyaXB0cy9zbWItZW51bS1wcm9jZXNzZXMubnNlCislJURBVEFE
 SVIlJS9zY3JpcHRzL3NtYi1lbnVtLWRvbWFpbnMubnNlCislJURBVEFESVIlJS9zY3JpcHRzL3Nt
 Yi1jaGVjay12dWxucy5uc2UKKyUlREFUQURJUiUlL3NjcmlwdHMvc21iLWJydXRlLm5zZQorJSVE
 QVRBRElSJSUvc2NyaXB0cy9za3lwZXYyLXZlcnNpb24ubnNlCislJURBVEFESVIlJS9zY3JpcHRz
 L3JvYm90cy50eHQubnNlCislJURBVEFESVIlJS9zY3JpcHRzL3JlYWx2bmMtYXV0aC1ieXBhc3Mu
 bnNlCislJURBVEFESVIlJS9zY3JpcHRzL3BwdHAtdmVyc2lvbi5uc2UKKyUlREFUQURJUiUlL3Nj
 cmlwdHMvcG9wMy1jYXBhYmlsaXRpZXMubnNlCislJURBVEFESVIlJS9zY3JpcHRzL3BvcDMtYnJ1
 dGUubnNlCislJURBVEFESVIlJS9zY3JpcHRzL215c3FsLWluZm8ubnNlCislJURBVEFESVIlJS9z
 Y3JpcHRzL21zLXNxbC1pbmZvLm5zZQorJSVEQVRBRElSJSUvc2NyaXB0cy9pcmMtaW5mby5uc2UK
 KyUlREFUQURJUiUlL3NjcmlwdHMvaWF4Mi12ZXJzaW9uLm5zZQorJSVEQVRBRElSJSUvc2NyaXB0
 cy9odHRwLXRyYWNlLm5zZQorJSVEQVRBRElSJSUvc2NyaXB0cy9odHRwLXBhc3N3ZC5uc2UKKyUl
 REFUQURJUiUlL3NjcmlwdHMvaHR0cC1vcGVuLXByb3h5Lm5zZQorJSVEQVRBRElSJSUvc2NyaXB0
 cy9odHRwLWF1dGgubnNlCislJURBVEFESVIlJS9zY3JpcHRzL2h0bWwtdGl0bGUubnNlCislJURB
 VEFESVIlJS9zY3JpcHRzL2Z0cC1icnV0ZS5uc2UKKyUlREFUQURJUiUlL3NjcmlwdHMvZnRwLWJv
 dW5jZS5uc2UKKyUlREFUQURJUiUlL3NjcmlwdHMvZnRwLWFub24ubnNlCislJURBVEFESVIlJS9z
 Y3JpcHRzL2Rucy16b25lLXRyYW5zZmVyLm5zZQorJSVEQVRBRElSJSUvc2NyaXB0cy9kbnMtcmVj
 dXJzaW9uLm5zZQorJSVEQVRBRElSJSUvc2NyaXB0cy9kbnMtcmFuZG9tLXR4aWQubnNlCislJURB
 VEFESVIlJS9zY3JpcHRzL2Rucy1yYW5kb20tc3JjcG9ydC5uc2UKKyUlREFUQURJUiUlL3Njcmlw
 dHMvZGF5dGltZS5uc2UKKyUlREFUQURJUiUlL3NjcmlwdHMvYmFubmVyLm5zZQorJSVEQVRBRElS
 JSUvc2NyaXB0cy9hdXRoLXNwb29mLm5zZQorJSVEQVRBRElSJSUvc2NyaXB0cy9hdXRoLW93bmVy
 cy5uc2UKKyUlREFUQURJUiUlL3NjcmlwdHMvYXNuLXF1ZXJ5Lm5zZQogQGRpcnJtICUlREFUQURJ
 UiUlL3NjcmlwdHMKICUlREFUQURJUiUlL25zZWxpYi9odHRwLmx1YQogJSVEQVRBRElSJSUvbnNl
 bGliL2lwT3BzLmx1YQpAQCAtNjYsNiArNzUsMTUgQEAKICUlREFUQURJUiUlL25zZWxpYi9zbm1w
 Lmx1YQogJSVEQVRBRElSJSUvbnNlbGliL3BvcDMubHVhCiAlJURBVEFESVIlJS9uc2VsaWIvZG5z
 Lmx1YQorJSVEQVRBRElSJSUvbnNlbGliL3NzaDIubHVhCislJURBVEFESVIlJS9uc2VsaWIvc3No
 MS5sdWEKKyUlREFUQURJUiUlL25zZWxpYi9zbWJhdXRoLmx1YQorJSVEQVRBRElSJSUvbnNlbGli
 L3NtYi5sdWEKKyUlREFUQURJUiUlL25zZWxpYi9uc2VkZWJ1Zy5sdWEKKyUlREFUQURJUiUlL25z
 ZWxpYi9uZXRiaW9zLmx1YQorJSVEQVRBRElSJSUvbnNlbGliL21zcnBjdHlwZXMubHVhCislJURB
 VEFESVIlJS9uc2VsaWIvbXNycGNwZXJmb3JtYW5jZS5sdWEKKyUlREFUQURJUiUlL25zZWxpYi9t
 c3JwYy5sdWEKIEBkaXJybSAlJURBVEFESVIlJS9uc2VsaWIKICUlREFUQURJUiUlL25tYXAtbWFj
 LXByZWZpeGVzCiAlJURBVEFESVIlJS9ubWFwLW9zLWRiCg==
 --001485f6d538dec5a904668527ff--

From: Wouter Oosterveld <wouter@fizzyflux.nl>
To: FreeBSD-gnats-submit@freebsd.org
Cc: wouter@fizzyflux.nl 
Subject: ports/133268: [ports][security/nmap] New recommended version
Date: Thu,  2 Apr 2009 00:55:58 +0200 (CEST)

 >Submitter-Id:	current-users
 >Originator:	Wouter Oosterveld 
 >Organization:	None
 >Confidential:	no
 >Synopsis:	ports/133268: [ports][security/nmap] New recommended version
 >Severity:	non-critical
 >Priority:	low
 >Category:	ports
 >Class:		change-request
 >Release:	FreeBSD 7.1-STABLE i386
 >Environment:
 System: FreeBSD harare.lan 7.1-STABLE FreeBSD 7.1-STABLE #1: Sat Feb 21 00:30:18 CET 2009 root@harare.lan:/srv/obj/usr/src/sys/GROTESMURF i386
 
 >Description:
 	Follow up with diff instead of shar.
 
 --- nmap-4.85BETA6.diff begins here ---
 diff -ur security/nmap_orig/Makefile security/nmap/Makefile
 --- security/nmap_orig/Makefile	2008-09-24 16:47:04.000000000 +0200
 +++ security/nmap/Makefile	2009-04-01 19:04:46.000000000 +0200
 @@ -6,7 +6,7 @@
  #
  
  PORTNAME=	nmap
 -PORTVERSION=	4.76
 +DISTVERSION=	4.85BETA6
  CATEGORIES=	security ipv6
  MASTER_SITES=	http://nmap.org/dist/ \
  		http://www.mirrors.wiretapped.net/security/network-mapping/nmap/ \
 diff -ur security/nmap_orig/distinfo security/nmap/distinfo
 --- security/nmap_orig/distinfo	2008-09-24 16:47:04.000000000 +0200
 +++ security/nmap/distinfo	2009-04-01 19:04:46.000000000 +0200
 @@ -1,3 +1,3 @@
 -MD5 (nmap-4.76.tar.bz2) = 278dd2e849cc3dbb947df961a1aaffd0
 -SHA256 (nmap-4.76.tar.bz2) = 4e24328ca6ec97afb2a8caf312b1f111a15cf41763a5ac41e7a633fdb217d66d
 -SIZE (nmap-4.76.tar.bz2) = 6061317
 +MD5 (nmap-4.85BETA6.tar.bz2) = 330aa3080845150d1df3f598a821e310
 +SHA256 (nmap-4.85BETA6.tar.bz2) = 22a54b5d4ff4a358fc959ac023b7af5119b0c849abd143a362ade04862b2a9e4
 +SIZE (nmap-4.85BETA6.tar.bz2) = 6454053
 diff -ur security/nmap_orig/files/patch-nbase__configure security/nmap/files/patch-nbase__configure
 --- security/nmap_orig/files/patch-nbase__configure	2008-03-14 22:30:23.000000000 +0100
 +++ security/nmap/files/patch-nbase__configure	2009-04-01 22:49:00.000000000 +0200
 @@ -1,11 +1,11 @@
 ---- nbase/configure.orig	Tue Nov 27 20:32:49 2007
 -+++ nbase/configure	Fri Jan  4 17:10:41 2008
 -@@ -3015,7 +3015,7 @@
 +--- nbase/configure.orig	2008-10-09 01:17:11.000000000 +0200
 ++++ nbase/configure	2009-04-01 22:44:09.000000000 +0200
 +@@ -3600,7 +3600,7 @@
   
   
   
 --for ac_header in string.h getopt.h strings.h sys/param.h sys/time.h unistd.h errno.h sys/types.h sys/socket.h netinet/in.h arpa/inet.h sys/stat.h net/if.h netdb.h sys/wait.h fcntl.h sys/resource.h
 -+for ac_header in string.h strings.h sys/param.h sys/time.h unistd.h errno.h sys/types.h sys/socket.h netinet/in.h arpa/inet.h sys/stat.h net/if.h netdb.h sys/wait.h fcntl.h sys/resource.h
 +-for ac_header in string.h getopt.h strings.h sys/param.h sys/time.h unistd.h errno.h sys/types.h sys/socket.h netinet/in.h arpa/inet.h sys/stat.h net/if.h netdb.h sys/wait.h fcntl.h sys/resource.h inttypes.h
 ++for ac_header in string.h strings.h sys/param.h sys/time.h unistd.h errno.h sys/types.h sys/socket.h netinet/in.h arpa/inet.h sys/stat.h net/if.h netdb.h sys/wait.h fcntl.h sys/resource.h inttypes.h
   do
   as_ac_Header=`echo "ac_cv_header_$ac_header" | $as_tr_sh`
 - if eval "test \"\${$as_ac_Header+set}\" = set"; then
 + if { as_var=$as_ac_Header; eval "test \"\${$as_var+set}\" = set"; }; then
 diff -ur security/nmap_orig/files/patch-output.cc security/nmap/files/patch-output.cc
 --- security/nmap_orig/files/patch-output.cc	2007-01-03 18:17:43.000000000 +0100
 +++ security/nmap/files/patch-output.cc	2009-04-01 22:53:22.000000000 +0200
 @@ -1,14 +1,14 @@
 ---- output.cc.orig	Fri Dec  8 04:01:19 2006
 -+++ output.cc	Wed Jan  3 17:10:43 2007
 -@@ -109,6 +109,7 @@
 - #include "NmapOutputTable.h"
 - #include "MACLookup.h"
 +--- output.cc.orig	2009-04-01 00:29:03.000000000 +0200
 ++++ output.cc	2009-04-01 22:52:01.000000000 +0200
 +@@ -108,6 +108,7 @@
 + #include <math.h>
   
 + #include <set>
  +#include <sys/param.h>
   #include <string>
 - 
 - /* Workaround for lack of namespace std on HP-UX 11.00 */
 -@@ -742,8 +743,8 @@
 + #include <vector>
 + #include <list>
 +@@ -1030,8 +1031,8 @@
     case LOG_MACHINE:
     case LOG_SKID:
     case LOG_XML:
 diff -ur security/nmap_orig/pkg-plist security/nmap/pkg-plist
 --- security/nmap_orig/pkg-plist	2008-09-24 16:47:04.000000000 +0200
 +++ security/nmap/pkg-plist	2009-04-01 19:04:46.000000000 +0200
 @@ -1,53 +1,62 @@
  bin/nmap
 +bin/ncat
 +bin/ndiff
  %%DATADIR%%/scripts/script.db
 -%%DATADIR%%/scripts/xamppDefaultPass.nse
 -%%DATADIR%%/scripts/strangeSMTPport.nse
 -%%DATADIR%%/scripts/skype_v2-version.nse
 -%%DATADIR%%/scripts/showSSHVersion.nse
 -%%DATADIR%%/scripts/showSMTPVersion.nse
 -%%DATADIR%%/scripts/showOwner.nse
 -%%DATADIR%%/scripts/showHTTPVersion.nse
 -%%DATADIR%%/scripts/showHTMLTitle.nse
  %%DATADIR%%/scripts/rpcinfo.nse
 -%%DATADIR%%/scripts/robots.nse
 -%%DATADIR%%/scripts/ripeQuery.nse
 -%%DATADIR%%/scripts/promiscuous.nse
 -%%DATADIR%%/scripts/netbios-smb-os-discovery.nse
  %%DATADIR%%/scripts/nbstat.nse
 -%%DATADIR%%/scripts/ircZombieTest.nse
 -%%DATADIR%%/scripts/ircServerInfo.nse
 -%%DATADIR%%/scripts/iax2Detect.nse
 -%%DATADIR%%/scripts/ftpbounce.nse
  %%DATADIR%%/scripts/finger.nse
 -%%DATADIR%%/scripts/echoTest.nse
 -%%DATADIR%%/scripts/dns-test-open-recursion.nse
 -%%DATADIR%%/scripts/daytimeTest.nse
 -%%DATADIR%%/scripts/chargenTest.nse
 -%%DATADIR%%/scripts/bruteTelnet.nse
 -%%DATADIR%%/scripts/anonFTP.nse
 -%%DATADIR%%/scripts/SSLv2-support.nse
 -%%DATADIR%%/scripts/SSHv1-support.nse
 -%%DATADIR%%/scripts/SQLInject.nse
 -%%DATADIR%%/scripts/SMTPcommands.nse
 -%%DATADIR%%/scripts/SMTP_openrelay_test.nse
 -%%DATADIR%%/scripts/RealVNC_auth_bypass.nse
 -%%DATADIR%%/scripts/PPTPversion.nse
 -%%DATADIR%%/scripts/MySQLinfo.nse
 -%%DATADIR%%/scripts/MSSQLm.nse
 -%%DATADIR%%/scripts/HTTPtrace.nse
 -%%DATADIR%%/scripts/HTTPpasswd.nse
 -%%DATADIR%%/scripts/HTTP_open_proxy.nse
 -%%DATADIR%%/scripts/HTTPAuth.nse
 -%%DATADIR%%/scripts/UPnP-info.nse
 -%%DATADIR%%/scripts/zoneTrans.nse
  %%DATADIR%%/scripts/whois.nse
 -%%DATADIR%%/scripts/popcapa.nse
 -%%DATADIR%%/scripts/dns-safe-recursion-txid.nse
 -%%DATADIR%%/scripts/dns-safe-recursion-port.nse
 -%%DATADIR%%/scripts/brutePOP3.nse
 -%%DATADIR%%/scripts/SNMPsysdescr.nse
 -%%DATADIR%%/scripts/SNMPcommunitybrute.nse
 -%%DATADIR%%/scripts/ASN.nse
 +%%DATADIR%%/scripts/upnp-info.nse
 +%%DATADIR%%/scripts/telnet-brute.nse
 +%%DATADIR%%/scripts/sslv2.nse
 +%%DATADIR%%/scripts/sshv1.nse
 +%%DATADIR%%/scripts/ssh-hostkey.nse
 +%%DATADIR%%/scripts/sql-injection.nse
 +%%DATADIR%%/scripts/snmp-sysdescr.nse
 +%%DATADIR%%/scripts/snmp-brute.nse
 +%%DATADIR%%/scripts/sniffer-detect.nse
 +%%DATADIR%%/scripts/smtp-strangeport.nse
 +%%DATADIR%%/scripts/smtp-open-relay.nse
 +%%DATADIR%%/scripts/smtp-commands.nse
 +%%DATADIR%%/scripts/smb-system-info.nse
 +%%DATADIR%%/scripts/smb-server-stats.nse
 +%%DATADIR%%/scripts/smb-security-mode.nse
 +%%DATADIR%%/scripts/smb-pwdump.nse
 +%%DATADIR%%/scripts/smb-os-discovery.nse
 +%%DATADIR%%/scripts/smb-enum-users.nse
 +%%DATADIR%%/scripts/smb-enum-shares.nse
 +%%DATADIR%%/scripts/smb-enum-sessions.nse
 +%%DATADIR%%/scripts/smb-enum-processes.nse
 +%%DATADIR%%/scripts/smb-enum-domains.nse
 +%%DATADIR%%/scripts/smb-check-vulns.nse
 +%%DATADIR%%/scripts/smb-brute.nse
 +%%DATADIR%%/scripts/skypev2-version.nse
 +%%DATADIR%%/scripts/robots.txt.nse
 +%%DATADIR%%/scripts/realvnc-auth-bypass.nse
 +%%DATADIR%%/scripts/pptp-version.nse
 +%%DATADIR%%/scripts/pop3-capabilities.nse
 +%%DATADIR%%/scripts/pop3-brute.nse
 +%%DATADIR%%/scripts/mysql-info.nse
 +%%DATADIR%%/scripts/ms-sql-info.nse
 +%%DATADIR%%/scripts/irc-info.nse
 +%%DATADIR%%/scripts/iax2-version.nse
 +%%DATADIR%%/scripts/http-trace.nse
 +%%DATADIR%%/scripts/http-passwd.nse
 +%%DATADIR%%/scripts/http-open-proxy.nse
 +%%DATADIR%%/scripts/http-auth.nse
 +%%DATADIR%%/scripts/html-title.nse
 +%%DATADIR%%/scripts/ftp-brute.nse
 +%%DATADIR%%/scripts/ftp-bounce.nse
 +%%DATADIR%%/scripts/ftp-anon.nse
 +%%DATADIR%%/scripts/dns-zone-transfer.nse
 +%%DATADIR%%/scripts/dns-recursion.nse
 +%%DATADIR%%/scripts/dns-random-txid.nse
 +%%DATADIR%%/scripts/dns-random-srcport.nse
 +%%DATADIR%%/scripts/daytime.nse
 +%%DATADIR%%/scripts/banner.nse
 +%%DATADIR%%/scripts/auth-spoof.nse
 +%%DATADIR%%/scripts/auth-owners.nse
 +%%DATADIR%%/scripts/asn-query.nse
  @dirrm %%DATADIR%%/scripts
  %%DATADIR%%/nselib/http.lua
  %%DATADIR%%/nselib/ipOps.lua
 @@ -66,6 +75,15 @@
  %%DATADIR%%/nselib/snmp.lua
  %%DATADIR%%/nselib/pop3.lua
  %%DATADIR%%/nselib/dns.lua
 +%%DATADIR%%/nselib/ssh2.lua
 +%%DATADIR%%/nselib/ssh1.lua
 +%%DATADIR%%/nselib/smbauth.lua
 +%%DATADIR%%/nselib/smb.lua
 +%%DATADIR%%/nselib/nsedebug.lua
 +%%DATADIR%%/nselib/netbios.lua
 +%%DATADIR%%/nselib/msrpctypes.lua
 +%%DATADIR%%/nselib/msrpcperformance.lua
 +%%DATADIR%%/nselib/msrpc.lua
  @dirrm %%DATADIR%%/nselib
  %%DATADIR%%/nmap-mac-prefixes
  %%DATADIR%%/nmap-os-db
 --- nmap-4.85BETA6.diff ends here ---
 
 

From: Daniel Roethlisberger <daniel@roe.ch>
To: bug-followup@FreeBSD.org
Cc:  
Subject: Re: ports/133268: [ports][security/nmap] New recommended version
Date: Thu, 9 Apr 2009 22:59:27 +0200

 Please close PR ports/133268.  I've submitted separate
 maintainer-updates to both security/nmap and security/zenmap to
 4.85BETA7.  Thanks!
 
 -- 
 Daniel Roethlisberger
 http://daniel.roe.ch/
State-Changed-From-To: feedback->closed 
State-Changed-By: linimon 
State-Changed-When: Thu Apr 9 21:44:54 UTC 2009 
State-Changed-Why:  
Superseded by ports/133547 from maintainer. 

http://www.freebsd.org/cgi/query-pr.cgi?pr=133268 
>Unformatted:
