fooling nmap
Colin Alston
karnaugh at karnaugh.za.net
Sat Sep 4 12:22:10 PDT 2004
vxp wrote:
>On Sat, 4 Sep 2004, Wesley Shields wrote:
>
>
>>That is true, but the problem with these kinds of things is that users
>>will think that with a simple flip of a sysctl they are secure, when in
>>fact that are no more secure than before.
>>
>>
>
>that's also 100% true, however that's why documentation exists. there's
>even a security section within it..
>we would probably want to add something like 'obscurity is great if it's
>only _one of_ the components in your security setup, not _the only_
>component'. they might get the point. =)
>
>now, another question arises
>
>i could always code a parser for nmap fingerprints file, but i don't think
>that's a good idea to include something like that in the kernel.. what do
>you think? hardcode a few OS fingerprint choices, and call it a day ?
>
>in other words, what would you guys say be a _proper_ bsd-style thing to
>do, if this were to be done?
>
>
My point was if it provides no security, then there is no point to it at
all. Most attackers are going to exploit things at a service level
anyway. What is the point of changing the fingerprint? Change it to
Windows and attract more attension? Or just so that people attempt the
wrong attacks.
I still dont see any use, or need to implement something of that
nature(Given that more features can = more bugs).
The point of the comment "Security by obscurity is no security at all"
is that bugs and exploits should be FIXED and PATCHED not HIDDEN.
Regards.
--
Colin Alston <karnaugh at karnaugh.za.net>
About the use of language:
"It is impossible to sharpen a pencil with a blunt axe. It is
equally vain to try to do it with ten blunt axes instead."
-- E.W.Dijkstra, 18th June 1975. (Perl did not exist at the time.)
More information about the freebsd-net
mailing list