On Wed, Oct 18, 2006 at 05:09:12PM +0200, ropers wrote: > On 18/10/06, stuartv <[EMAIL PROTECTED]> wrote: > >I have one firewall that is on an external audit/scan list that the people > >who actually do our audits doesn't believe really even exists because they > >can't even find it. Basically it has EVERYTHING locked down tight as a > >drum > >and allows only a few things through to and from very specific places. > > Just a curious guess: > Is that box a packet filtering bridge with two NICs and no IP > addresses assigned? > > On a related note: > Does anyone have an educated guess on whether it's possible to > OS-fingerprint such bridges? (It shouldn't be, right?)
I can imagine that different OSes might react in different way to malformed packets; this could also apply to L2, and would likely be noticeable on bridges using L3 filtering (i.e., pf). Of course, this is not a practical answer. Joachim