Marcus Brinkmann wrote: > Note that an IP stack diagnosis will show the Hurd system as a Linux 2.2 > system.
Nmap 2.54BETA7 (the one in linux/unstable) says the following:
TCP Sequence Prediction: Class=trivial time dependency
Difficulty=4 (Trivial joke)
I figure this means that tcp-spoofing against a hurd box should be
fairly easy?
It also says "No exact OS matches for host". I have now submitted the
fingerpring to the nmap maintainer ;)
Oystein
--
ssh -c rot13 otherhost

