On Sat, Feb 09, 2002, Christien Bunting wrote:
> I did an nmap scan on my proxy box which consists on and iptables firewall and squid proxy server.
>
> This is the result I get after the scan.
>
> -------------------------------------------------------------------------------------------------
> Starting nmap V. 2.54BETA22 ( www.insecure.org/nmap/ )
> Host (xxx.xxx.xxx.xxx) appears to be up ... good.
> Initiating SYN Stealth Scan against (xxx.xxx.xxx.xxx)
> The SYN Stealth Scan took 2367 seconds to scan 1542 ports.
> Warning: OS detection will be MUCH less reliable because we did not
> find at least 1 open and 1 closed TCP port
> All 1542 scanned ports on (xxx.xxx.xxx.xxx) are: filtered
> Too many fingerprints match this host for me to give an accurate OS guess
> TCP/IP fingerprint:
> SInfo(V=2.54BETA22%P=i386-redhat-linux-gnu%D=2/8%Time=3C641C23%O=-1%C=-1)
> T5(Resp=N)
> T6(Resp=N)
> T7(Resp=N)
> PU(Resp=N)
> -------------------------------------------------------------------------------------------------
>
> Is there anyway to get rid of the Squid Finger Print ?
Which squid fingerprint?
Adrian
Received on Sat Feb 09 2002 - 07:15:47 MST
This archive was generated by hypermail pre-2.1.9 : Tue Dec 09 2003 - 17:06:13 MST