Port scanners such as nmap and OS detectors such as queso are known to do
this, but not the way you indicate. Rather they send a set of packets to
the machine and look at the responses. By looking at the response, one
can determine the OS and even sometimes the kernel version. This is
because there are situations that are not required as part of the TCP
state engine. Hence each vendor impliments it a different way.
On Thu, 27 Jan 2000, Perry Blalock wrote:
> Hello redhat-list,
>
> Anyone ever hear of Liunx, as an OS, being identified anywhere in a
> TCP/IP packet header? Reason I'm asking is that a certain software
> claims to be able to glean that specific information from the
> packet header, dunno which daemon, of a Linux machine.
>
> Best regards,
> Perry mailto:[EMAIL PROTECTED]
>
>
>
> --
> To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
> as the Subject.
>
--
Aaron Turner, Core Developer http://vodka.linuxkb.org/~aturner/
Linux Knowledge Base Organization http://www.linuxkb.org/
Because world domination requires quality open documentation.
aka: [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED]
The difference between `Unstable' and `Usable' is only two characters: NT
--
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.