| The osf module does passive operating system fingerprinting. This module |
| compares some data (Window Size, MSS, options and their order, TTL, DF, |
| and others) from packets with the SYN bit set. |
| .TP |
| [\fB!\fP] \fB\-\-genre\fP \fIstring\fP |
| Match an operating system genre by using a passive fingerprinting. |
| .TP |
| \fB\-\-ttl\fP \fIlevel\fP |
| Do additional TTL checks on the packet to determine the operating system. |
| \fIlevel\fP can be one of the following values: |
| .IP \(bu 4 |
| 0 - True IP address and fingerprint TTL comparison. This generally works for |
| LANs. |
| .IP \(bu 4 |
| 1 - Check if the IP header's TTL is less than the fingerprint one. Works for |
| globally-routable addresses. |
| .IP \(bu 4 |
| 2 - Do not compare the TTL at all. |
| .TP |
| \fB\-\-log\fP \fIlevel\fP |
| Log determined genres into dmesg even if they do not match the desired one. |
| \fIlevel\fP can be one of the following values: |
| .IP \(bu 4 |
| 0 - Log all matched or unknown signatures |
| .IP \(bu 4 |
| 1 - Log only the first one |
| .IP \(bu 4 |
| 2 - Log all known matched signatures |
| .PP |
| You may find something like this in syslog: |
| .PP |
| Windows [2000:SP3:Windows XP Pro SP1, 2000 SP3]: 11.22.33.55:4024 -> |
| 11.22.33.44:139 hops=3 Linux [2.5-2.6:] : 1.2.3.4:42624 -> 1.2.3.5:22 hops=4 |
| .PP |
| OS fingerprints are loadable using the \fBnfnl_osf\fP program. To load |
| fingerprints from a file, use: |
| .PP |
| \fBnfnl_osf \-f /usr/share/xtables/pf.os\fP |
| .PP |
| To remove them again, |
| .PP |
| \fBnfnl_osf \-f /usr/share/xtables/pf.os \-d\fP |
| .PP |
| The fingerprint database can be downloaded from |
| http://www.openbsd.org/cgi-bin/cvsweb/src/etc/pf.os . |