[9772] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Preventing remote OS detection

daemon@ATHENA.MIT.EDU (James Lockwood)
Tue Feb 23 20:28:51 1999

Date: 	Mon, 22 Feb 1999 14:17:41 -0800
Reply-To: James Lockwood <james@VANEYCK.GII.GETTY.EDU>
From: James Lockwood <james@VANEYCK.GII.GETTY.EDU>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <36D18C0F.1184C638@pgci.ca>

On Mon, 22 Feb 1999, Patrick Gilbert wrote:

> A technique exists to determine a remote operating system by sending
> obscure tcp
> packets and analyzing the response. Two utilites known as queso and nmap
> can
> determine with enough precision your operating system. This has been
> known for quite some time, but I haven't seen much on how to prevent it.

It's probably worth mentioning that IP Filter by Darren Reed can trap
many abnormal packets "in the wild", before the system TCP stack gets a
chance to play with them.  I prefer to swallow up anything that doesn't
fit my filters, but by playing with responses returned when packets with
strange flags are received you can forge another system.

I wouldn't think of running a production internet system without it:

http://coombs.anu.edu.au/~avalon/

--
James D. Lockwood                    The (former) Getty Information Institute
System Administrator                       1200 Getty Center Drive, Suite 300
james@gii.getty.edu                                Los Angeles, CA 90049-1680

home help back first fref pref prev next nref lref last post