I did an nmap scan on my proxy box which consists on and iptables firewall and squid proxy server.
This is the result I get after the scan.
-------------------------------------------------------------------------------------------------
Starting nmap V. 2.54BETA22 ( www.insecure.org/nmap/ )
Host (xxx.xxx.xxx.xxx) appears to be up ... good.
Initiating SYN Stealth Scan against (xxx.xxx.xxx.xxx)
The SYN Stealth Scan took 2367 seconds to scan 1542 ports.
Warning: OS detection will be MUCH less reliable because we did not
find at least 1 open and 1 closed TCP port
All 1542 scanned ports on (xxx.xxx.xxx.xxx) are: filtered
Too many fingerprints match this host for me to give an accurate OS guess
TCP/IP fingerprint:
SInfo(V=2.54BETA22%P=i386-redhat-linux-gnu%D=2/8%Time=3C641C23%O=-1%C=-1)
T5(Resp=N)
T6(Resp=N)
T7(Resp=N)
PU(Resp=N)
-------------------------------------------------------------------------------------------------
Is there anyway to get rid of the Squid Finger Print ?
I dont want it revealing system type or squid version info.
I do remember seeing a thread like this once. Compile time options ?
If anyone can help me I'd greatly appreciate it.
Thanks
Chris
Received on Sat Feb 09 2002 - 07:09:30 MST
This archive was generated by hypermail pre-2.1.9 : Tue Dec 09 2003 - 17:06:13 MST