Project

General

Profile

Actions

Feature #1977

open
WG CT

get the os info from TCP HTTP fingerprint

Feature #1977: get the os info from TCP HTTP fingerprint

Added by wilson green over 9 years ago. Updated about 7 years ago.

Status:
New
Priority:
Low
Target version:
Effort:
medium
Difficulty:
high
Label:

Description

can suricata get the OS from the TCP/SYN fingerprint.just like p0f.

VJ Updated by Victor Julien over 9 years ago Actions #1

  • Priority changed from Normal to Low
  • Target version set to TBD

Not at this time. There has been some discussion about how useful it would be for automatically setting the OS for target based reassembly for example. Consensus at SuriConDC seemed to be that it's low priority.

AH Updated by Andreas Herz almost 9 years ago Actions #2

  • Assignee set to Anonymous

JI Updated by Jason Ish almost 8 years ago Actions #3

  • Effort set to medium
  • Difficulty set to high

AH Updated by Andreas Herz about 7 years ago Actions #4

  • Assignee set to Community Ticket
Actions

Also available in: PDF Atom