Doing something with OS fingerprint?

Stuart Henderson stu at
Mon Feb 22 00:22:24 AEDT 2021

On 2021/02/21 06:37, Stef Bon wrote:
> Hi,
> in the iptables subsystem of Linux it's possible to get the
> fingerprint of the peer OS.
> See:
> man iptables-extensions
> under osf
> If this information is available it's possible to adjust behaviour (a
> little) to meet the peer's flaws and maybe bugs. Have you ever thought
> about that?
> Stef
> the Netherlands
> _______________________________________________
> openssh-unix-dev mailing list
> openssh-unix-dev at

If you want to make use of this information, you can redirect to different
ports depending on the OS type, and run multiple sshd instances with
different configuration. I can't really think of anything you might want
to do with it though (other than outright blocking access from unwanted
/ unexpected OS)..

More information about the openssh-unix-dev mailing list