diff options
Diffstat (limited to 'etc')
-rw-r--r-- | etc/pf.os | 28 |
1 files changed, 14 insertions, 14 deletions
diff --git a/etc/pf.os b/etc/pf.os index fb9053ddae3..c4875b76ddd 100644 --- a/etc/pf.os +++ b/etc/pf.os @@ -1,8 +1,8 @@ -# $OpenBSD: pf.os,v 1.6 2003/08/28 18:17:09 frantzen Exp $ +# $OpenBSD: pf.os,v 1.7 2003/08/29 18:43:41 david Exp $ # passive OS fingerprinting # ------------------------- # -# SYN signatures. Those signatures work for SYN packets only (duh!). +# SYN signatures. Those signatures work for SYN packets only (duh!). # # (C) Copyright 2000-2003 by Michal Zalewski <lcamtuf@coredump.cx> # (C) Copyright 2003 by Mike Frantzen <frantzen@w4g.org> @@ -37,7 +37,7 @@ # cases, the value is just arbitrary. # # NEW SIGNATURE: if p0f reported a special value of 'Snn', the number -# appears to be a multiple of MSS (MSS*nn); a special value of 'Tnn' +# appears to be a multiple of MSS (MSS*nn); a special value of 'Tnn' # means it is a multiple of MTU ((MSS+40)*nn). Unless you notice the # value of nn is not fixed (unlikely), just copy the Snn or Tnn token # literally. If you know this device has a simple stack and a fixed @@ -46,7 +46,7 @@ # # If WSS otherwise looks like a fixed value (for example a multiple # of two), or if you can confirm the value is fixed, please quote -# it literaly. If there's no apparent pattern in WSS chosen, you +# it literally. If there's no apparent pattern in WSS chosen, you # should consider wildcarding this value. # # - Overall packet size - a function of all IP and TCP options and bugs. @@ -55,7 +55,7 @@ # # - Initial TTL - We check the actual TTL of a received packet. It can't # be higher than the initial TTL, and also shouldn't be dramatically -# lower (maximum distance is defined as 40 hops). +# lower (maximum distance is defined as 40 hops). # # NEW SIGNATURE: *Never* copy TTL from a p0f-reported signature literally. # You need to determine the initial TTL. The best way to do it is to @@ -82,7 +82,7 @@ # # - Window scaling (WSCALE) - this feature is used to scale WSS. # It extends the size of a TCP/IP window to 32 bits. Some modern -# systems implement this feature. +# systems implement this feature. # # NEW SIGNATURE: Observe several signatures. Initial WSCALE is often set # to zero or other low value. There's usually no need to wildcard this @@ -91,7 +91,7 @@ # - Timestamp - some systems that implement timestamps set them to # zero in the initial SYN. This case is detected and handled appropriately. # -# - Selective ACK permitted - a flag set by systems that implement +# - Selective ACK permitted - a flag set by systems that implement # selective ACK functionality. # # - The sequence of TCP all options (MSS, window scaling, selective ACK @@ -103,7 +103,7 @@ # NEW SIGNATURE: Copy the sequence literally. # # To wildcard any value (except for initial TTL or TCP options), replace -# it with '*'. You can also use a modulo operator to match any values +# it with '*'. You can also use a modulo operator to match any values # that divide by nnn - '%nnn'. # # Fingerprint entry format: @@ -113,7 +113,7 @@ # wwww - window size (can be *, %nnn, Snn or Tnn). The special values # "S" and "T" which are a multiple of MSS or a multiple of MTU # respectively. -# ttt - initial TTL +# ttt - initial TTL # D - don't fragment bit (0 - not set, 1 - set) # ss - overall SYN packet size # OOO - option value and order specification (see below) @@ -128,7 +128,7 @@ # bogus. # # If OS genre starts with @, it denotes an approximate hit for a group -# of operating systems (signature reporting still enabled in this case). +# of operating systems (signature reporting still enabled in this case). # Use this feature at the end of this file to catch cases for which # you don't have a precise match, but can tell it's Windows or FreeBSD # or whatnot by looking at, say, flag layout alone. @@ -154,7 +154,7 @@ # ----------------------- # # Do not add a system X as OS Y just because NMAP says so. It is often -# the case that X is a NAT firewall. While nmap is talking to the +# the case that X is a NAT firewall. While nmap is talking to the # device itself, p0f is fingerprinting the guy behind the firewall # instead. # @@ -350,7 +350,7 @@ S52:128:1:48:M1260,N,N,S: Windows:2000:Cisco VPN:Windows XP/2000 via Cisco VPN # Odds, ends, mods. Advanced Networking Pack turns out to be # responsible for enabling RFC1323, System Mechanic also messes # with TTLs and timestamps: - + *:128:1:64:M*,N,W2,N,N,T0,N,N,S: Windows:2000:SP4:Windows 2000 SP4 (AdvNetPack) or PalmPC S4:128:1:48:M*,N,N,S: Windows:2000:SP3:Windows 2000 SP3 (NetTweak) S44:128:1:64:M*,N,W0,N,N,T0,N,N,S: Windows:XP:AdvNetPack:Windows XP (AdvNetPack) @@ -383,7 +383,7 @@ S17:64:1:44:M1460: SCO:OpenServer:5.0:SCO Unixware 7.0.0 or OpenServer 5.0.4-5 # ---------------- NewtonOS ----------------- - + 4096:64:0:44:M1420: NewtonOS:2.1::NewtonOS 2.1 # ---------------- NeXTSTEP ----------------- @@ -413,7 +413,7 @@ S8:64:0:44:M512: NeXTSTEP:3.3::NeXTSTEP 3.3 # ---------- Firewalls / routers ------------ -S12:64:1:44:M1460: @Checkpoint:::Checkpoint (rnknown 1) +S12:64:1:44:M1460: @Checkpoint:::Checkpoint (unknown 1) S12:64:1:48:N,N,S,M1460: @Checkpoint:::Checkpoint (unknown 2) 4096:32:0:44:M1460: ExtremeWare:4.x::ExtremeWare 4.x 60352:64:0:52:M1460,N,W2,N,N,S: Clavister:7.03.01::Clavister firewall 7.03.01 |