Re: Doing something with OS fingerprint?

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

 



On 2021/02/21 06:37, Stef Bon wrote:
> Hi,
> 
> in the iptables subsystem of Linux it's possible to get the
> fingerprint of the peer OS.
> See:
> 
> man iptables-extensions
> under osf
> 
> If this information is available it's possible to adjust behaviour (a
> little) to meet the peer's flaws and maybe bugs. Have you ever thought
> about that?
> 
> Stef
> the Netherlands
> _______________________________________________
> openssh-unix-dev mailing list
> openssh-unix-dev@xxxxxxxxxxx
> https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev

If you want to make use of this information, you can redirect to different
ports depending on the OS type, and run multiple sshd instances with
different configuration. I can't really think of anything you might want
to do with it though (other than outright blocking access from unwanted
/ unexpected OS)..
_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@xxxxxxxxxxx
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev



[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux