| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: ZoneAlarm upgrade 6.0.631.003 - arghh!!! |
From: Mike '/m' OpenBSD has an OS fingerprint detector built in to the pf firewall. http://www.openbsd.org/faq/pf/filter.html#osfp and the current fingerprint file: http://www.openbsd.org/cgi-bin/cvsweb/src/etc/pf.os?rev=1.19&content-type=text/ x-cvsweb-markup&only_with_tag=HEAD One interesting aspect of this is that you can have a firewall rule that says, in effect, don't let Windows machines connect to this system. /m On Mon, 08 Aug 2005 21:21:44 -0700, Randall Parker wrote: >Well, security thru obscurity really is an advantage against a large array of attacks. > >Suppose OS/2 has some buffer overflow in its TCP/IP stack. The odds of an attacker >noticing that you have OS/2 in your firewall and then also having a tool to exploit >this seem remote. > >Mike N. wrote: >> Well, although I wouldn't have a problem with my financial institutions >> using OS/2 Warp for niche use where it is well isolated and protected, I >> would be very uncomfortable if they relied on "OS/2's hardened features". >> This is certainly a myth and the TCP stack undoubtably contains some >> ancient vulnerabilities since it was BSD derived. Just because it isn't a >> popular target doesn't mean it isn't vulnerable. I'll bet at least one >> Russian hacker still possesses a 0-day attack against OS/2. >> --- BBBS/NT v4.01 Flag-5* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45) SEEN-BY: 633/267 270 5030/786 @PATH: 379/45 1 106/2000 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.