Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 23 Mar 2008 15:00:38 +0000
From:      Rui Paulo <rpaulo@FreeBSD.org>
To:        =?us-ascii?B?PT9JU08tODg1OS0xP1E/RGFuaWVsX0RpYXNfR29uPUU3YWx2ZXNf?= <daniel@dgnetwork.com.br>, ?=@fnop.net
Cc:        freebsd-hackers@freebsd.org, freebsd-pf@freebsd.org, freebsd-net@freebsd.org
Subject:   Re: FreeBSD OS Detection and Uptime
Message-ID:  <20080323150038.GA17070@fnop.net>
In-Reply-To: <47E5BD04.5050806@dgnetwork.com.br>
References:  <47E5BD04.5050806@dgnetwork.com.br>

next in thread | previous in thread | raw e-mail | index | archive | help
On Sat, Mar 22, 2008 at 11:14:28PM -0300, =?ISO-8859-1?Q?Daniel_Dias_Gon=E7alves_ wrote:
> Which methods used to prevent OS detection and uptime (nmap) ?
> http://nmap.org/misc/defeat-nmap-osdetect.html#BSD
> I tried, but not work.

The TCP Drop SYN+FIN sysctl might help.

% sysctl -d net.inet.tcp.drop_synfin
net.inet.tcp.drop_synfin: Drop TCP packets with SYN+FIN set

Regards.
-- 
Rui Paulo



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20080323150038.GA17070>