LinuxQuestions.org
Help answer threads with 0 replies.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 01-02-2004, 09:56 AM   #1
sopiaz57
Member
 
Registered: Apr 2003
Distribution: RH 8
Posts: 246

Rep: Reputation: 30
nmap -O


anyone know how to deter nmap from finding out such detailed OS fingerprint information on my linux 2.4 box?


Thanks
 
Old 01-02-2004, 01:39 PM   #2
frogman
Member
 
Registered: Sep 2003
Distribution: Mandrake, Slack, Debian and PicoBSD
Posts: 181

Rep: Reputation: 31
What's running vs needs to run?

I tend to drop everything unsolicited / don't respond to anything external to the lan (and only "known good" requests inside), but might not be an option for you.

BTW - Nmap will still _nearly_ always give the Linux, kernel 2 dot-something to kernel 2 dot something-higher, it's just less confident about specifics.
(Even if you set your box to drop ICMP, nmap -P0 will show the above - it will just take longer)

Assuming you're not running unnecessary services and have made a decent effort at locking down the box, I wouldn't lose too much sleep about what nmap thinks your OS is.

[edit: Obviously, putting a bog-standard router / any other box as a proxy in front of $target_machine will cloak what it is from the outside world. But I assume you're scanning $target_machine from the lan]

Last edited by frogman; 01-02-2004 at 01:51 PM.
 
Old 01-02-2004, 11:25 PM   #3
tarballedtux
Member
 
Registered: Aug 2001
Location: Off the coast of Madadascar
Posts: 498

Rep: Reputation: 30
I always feel if they can't talk to in anyway they can't find anything. IE Basically anything that should not be there is dropped externally on my firewall. If internal is the case you might not have that luxury.

--tarballedtux
 
Old 01-04-2004, 09:09 AM   #4
cjcuk
Member
 
Registered: Dec 2003
Distribution: Openwall, ~LFS
Posts: 128

Rep: Reputation: 15
If you are running anything that requires externally-initiated connections to succeed, then the fingerprinters have a good chance at a correct guess. If you completely lock down your box(es) to only allow outward-bound traffic then passive traffic analysis can still be done on any packets that can be seen externally ( http://lcamtuf.coredump.cx/p0f.shtml ). Trying to hide your operating system is one of the poorer attempts at security through obscurity. If you really must hide your operating system, then you should be looking at the TCP/IP stack. All the fingerprinting is done dependant on the implementation-defined elements of the stack. Change a few of the timings, sizes, etc around and you no longer match a fingerprint - but, this will only stop weak attempts at fingerprinting, determined users can still work it out. Also, realise that the values that are currently in the stack have been chosen because they are deemed to be the most suitable - hence, you may degrade network performance by changing them.

A better solution is to limit or eradicate any network accessable processes. If the remote user cannot interact with a userland process, then they would have to rely on a kernel vulnerability in the TCP/IP stack - which are, fortunately, pretty rare. Then all you need to do is make sure that none of the users with local access use remotely exploitable programs (ie, an MUA with a vulnerability could be abused from someone not on the system).

Also, the biggest thing (though I accuse nobody of it), is to not `stealth' your system and go through all these obscurity measures AND then put `powered by distro-x kern-x-x' on a web page. You might also want to check banners (eg, if OpenSSH just says OpenSSH then you are looking at an OpenBSD box most likely) as they can give a lot away - though be careful, as some banners (ie, SSH and maybe others) are used for `quirks' mode interoperability.

What I have said above is by no means a complete analysis of this area, but hopefully you can see that hiding your OS is often fairly futile.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
nmap ? how do i do nmap in linux ? command not found abbasakhtar Linux - Newbie 2 01-02-2011 01:08 AM
Nmap lgilleran Linux - Newbie 1 07-27-2005 05:50 AM
Nmap h4z Yoper 4 12-09-2004 02:09 AM
nmap sopiaz57 Linux - Software 2 09-16-2003 08:32 PM
nmap psyklops Linux - General 4 08-27-2003 10:44 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 03:03 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration