TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: Randall Parker
from: Mike `/m`
date: 2005-08-09 17:45:02
subject: Re: ZoneAlarm upgrade 6.0.631.003 - arghh!!!

From: Mike '/m' 


OpenBSD has an OS fingerprint detector built in to the pf firewall.

http://www.openbsd.org/faq/pf/filter.html#osfp

and the current fingerprint file:
http://www.openbsd.org/cgi-bin/cvsweb/src/etc/pf.os?rev=1.19&content-type=text/
x-cvsweb-markup&only_with_tag=HEAD

One interesting aspect of this is that you can have a firewall rule that
says, in effect, don't let Windows machines connect to this system.

 /m


On Mon, 08 Aug 2005 21:21:44 -0700, Randall Parker

wrote:

>Well, security thru obscurity really is an advantage against a large array of
attacks.
>
>Suppose OS/2 has some buffer overflow in its TCP/IP stack. The odds of an
attacker
>noticing that you have OS/2 in your firewall and then also having a tool to
exploit
>this seem remote.
>
>Mike N. wrote:
>>    Well, although I wouldn't have a problem with my financial institutions
>> using OS/2 Warp for niche use where it is well isolated and protected, I
>> would be very uncomfortable if they relied on "OS/2's
hardened features".
>> This is certainly a myth and the TCP stack undoubtably contains some
>> ancient vulnerabilities since it was BSD derived.  Just because it isn't a
>> popular target doesn't mean it isn't vulnerable.     I'll bet at least one
>> Russian hacker still possesses a 0-day attack against OS/2.
>>

--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267 270 5030/786
@PATH: 379/45 1 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.