Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 26 Aug 2000 03:28:24 +0300
From:      Fred Souza <cseg@kronus.com.br>
To:        rob <rob@enigma.gctr.net>
Cc:        security@freebsd.org
Subject:   Re: nmap OS detection
Message-ID:  <20000826032824.A11005@torment.secfreak.com>
In-Reply-To: Your message of "Sat, Aug 26 2000 01:18:51 -0400" <Pine.BSF.4.21.0008260116100.1830-100000@enigma.gctr.net>
References:  <20000826002656.A6530@torment.secfreak.com> <Pine.BSF.4.21.0008260116100.1830-100000@enigma.gctr.net>

next in thread | previous in thread | raw e-mail | index | archive | help
> Unless I'm mistaken, Nmap remote OS detection use's a tcp packet with the
> FIN / URG / PUSH flags set. This would explain why you were unable to
> determine your OS when you had the net.inet.tcp.drop_synfin kernel option
> set. Pherhaps your router is dropping such packets? Try to plug two
> machines in to a hub, disable the kernel options and your filtering rules,
> and then try this again.

  I've tried that already, no luck.


-- 
This is what you get when you meet someone who has spent most of his/her entire
life, thinking.


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20000826032824.A11005>