Re: Scary syslog entries, random breakage
Marcus Brinkmann wrote:
> Note that an IP stack diagnosis will show the Hurd system as a Linux 2.2
> system.
Nmap 2.54BETA7 (the one in linux/unstable) says the following:
TCP Sequence Prediction: Class=trivial time dependency
Difficulty=4 (Trivial joke)
I figure this means that tcp-spoofing against a hurd box should be
fairly easy?
It also says "No exact OS matches for host". I have now submitted the
fingerpring to the nmap maintainer ;)
Oystein
--
ssh -c rot13 otherhost
Reply to: