Re: Doing something with OS fingerprint?

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

 



On 21.02.21 06:37, Stef Bon wrote:
> Hi,
> 
> in the iptables subsystem of Linux it's possible to get the
> fingerprint of the peer OS.
> See:
> 
> man iptables-extensions
> under osf
> 
> If this information is available it's possible to adjust behaviour (a
> little) to meet the peer's flaws and maybe bugs. Have you ever thought
> about that?

My - admittedly first ever - thoughts on that:

-- Doesn't OpenSSH already parse the peer's Hello String for that
   purpose?
-- (The possibility of SSH software other than the OS default being
   installed has already been mentioned)
-- osf can also differ from defaults (own fingerprint files being
   loaded, --ttl param etc.)
-- Just because the kernel('s iptables implementation) has that info
   doesn't mean that ssh(d) can easily get it
-- Not to forget non-Linux systems ...

Regards,
-- 
Jochen Bern
Systemingenieur

Binect GmbH

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@xxxxxxxxxxx
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux