On Wed, Oct 18, 2006 at 05:09:12PM +0200, ropers wrote:
> On 18/10/06, stuartv <[EMAIL PROTECTED]> wrote:
> >I have one firewall that is on an external audit/scan list that the people
> >who actually do our audits doesn't believe really even exists because they
> >can't even find it.  Basically it has EVERYTHING locked down tight as a 
> >drum
> >and allows only a few things through to and from very specific places.
> 
> Just a curious guess:
> Is that box a packet filtering bridge with two NICs and no IP
> addresses assigned?
> 
> On a related note:
> Does anyone have an educated guess on whether it's possible to
> OS-fingerprint such bridges? (It shouldn't be, right?)

I can imagine that different OSes might react in different way to
malformed packets; this could also apply to L2, and would likely be
noticeable on bridges using L3 filtering (i.e., pf).

Of course, this is not a practical answer.

                Joachim

Reply via email to