Project

General

Profile

Actions

Feature #1977

open

get the os info from TCP HTTP fingerprint

Added by wilson green almost 5 years ago. Updated over 2 years ago.

Status:
New
Priority:
Low
Target version:
Effort:
medium
Difficulty:
high
Label:

Description

can suricata get the OS from the TCP/SYN fingerprint.just like p0f.

Actions #1

Updated by Victor Julien almost 5 years ago

  • Priority changed from Normal to Low
  • Target version set to TBD

Not at this time. There has been some discussion about how useful it would be for automatically setting the OS for target based reassembly for example. Consensus at SuriConDC seemed to be that it's low priority.

Actions #2

Updated by Andreas Herz over 4 years ago

  • Assignee set to Anonymous
Actions #3

Updated by Jason Ish over 3 years ago

  • Effort set to medium
  • Difficulty set to high
Actions #4

Updated by Andreas Herz over 2 years ago

  • Assignee set to Community Ticket
Actions

Also available in: Atom PDF