[Snort-users] Snort, Queso and iptables [FIDUCIA virengeprüft - ohne Gewähr, daß alle bekannten Viren und deren Varianten erkannt wurden.]
tschweikle at ...3732...
Tue Oct 9 08:24:08 EDT 2001
> Just about every other day, snort reports a 'Possible Queso
> Fingerprint attempt' from a machine at kernel.org (most frequently
> mirrors.kernel.org). This is puzzling to me for several reasons:
Questo is a simple program to find out what OS your host is using.
Sometimes it misses, but most it guesses correct.
Nothing to worry about. Someone was trying to find out hat OS you where
using. Mostly for statistics, just to see what OS people use to surf there
site (sometimes interessting to have an idea what folks are there out
> With whitehats.com being down, I was unable to determine what a Queso
> Fingerprint is. Looks like some probe of my auth port, but I have no
> idea what it is actually trying to do.
> I believe that the people at kernel.org are good and righteous. Why
> would they try to probe my auth port.
To find out if there is a user authentication daemon running. This would
deliver some information without gussing via questo.
> Port 113 should be hidden behind my iptables firewall. In fact, I
> tried to connect to this port from the outside and was unsuccessful.
> Does snort actually analyze packets before they hit iptables? That
> seems somewhat weird.
snort listens using promiscous mode. If you have snort running an your
firewall it will see all packets before they are filtered by other
> Could anyone please shed some light on one or more of my questions?
More information about the Snort-users