Date: Sat, 26 Aug 2000 03:28:24 +0300 From: Fred Souza <cseg@kronus.com.br> To: rob <rob@enigma.gctr.net> Cc: security@freebsd.org Subject: Re: nmap OS detection Message-ID: <20000826032824.A11005@torment.secfreak.com> In-Reply-To: Your message of "Sat, Aug 26 2000 01:18:51 -0400" <Pine.BSF.4.21.0008260116100.1830-100000@enigma.gctr.net> References: <20000826002656.A6530@torment.secfreak.com> <Pine.BSF.4.21.0008260116100.1830-100000@enigma.gctr.net>
next in thread | previous in thread | raw e-mail | index | archive | help
> Unless I'm mistaken, Nmap remote OS detection use's a tcp packet with the > FIN / URG / PUSH flags set. This would explain why you were unable to > determine your OS when you had the net.inet.tcp.drop_synfin kernel option > set. Pherhaps your router is dropping such packets? Try to plug two > machines in to a hub, disable the kernel options and your filtering rules, > and then try this again. I've tried that already, no luck. -- This is what you get when you meet someone who has spent most of his/her entire life, thinking. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20000826032824.A11005>