Project

General

Profile

Actions

Feature #1977

open

get the os info from TCP HTTP fingerprint

Added by wilson green over 7 years ago. Updated about 5 years ago.

Status:
New
Priority:
Low
Target version:
Effort:
medium
Difficulty:
high
Label:

Description

can suricata get the OS from the TCP/SYN fingerprint.just like p0f.

Actions #1

Updated by Victor Julien over 7 years ago

  • Priority changed from Normal to Low
  • Target version set to TBD

Not at this time. There has been some discussion about how useful it would be for automatically setting the OS for target based reassembly for example. Consensus at SuriConDC seemed to be that it's low priority.

Actions #2

Updated by Andreas Herz almost 7 years ago

  • Assignee set to Anonymous
Actions #3

Updated by Jason Ish almost 6 years ago

  • Effort set to medium
  • Difficulty set to high
Actions #4

Updated by Andreas Herz about 5 years ago

  • Assignee set to Community Ticket
Actions

Also available in: Atom PDF