1
0
mirror of https://github.com/nmap/nmap.git synced 2026-01-10 08:29:02 +00:00

Add note about how the current echo server zeroes application layer data before encapsulating packets in NEP_ECHO messages, and how in the future we may want to extend the echo protocol to allow stripped-packet transport

This commit is contained in:
luis
2011-04-01 14:38:18 +00:00
parent 603082755d
commit e04f9d24ec

View File

@@ -54,7 +54,7 @@
level. None of them seems to work well, though.
* Consider using Nmap's proto-dependant payloads for UDP packets. According
to his tests, better results are obtained when sending UDP probes with a
to David's tests, better results are obtained when sending UDP probes with a
payload specific to the protocol.
* A few ideas for the Echo protocol:
@@ -70,7 +70,18 @@
- RFC. Improve description of encryptionless sessions. Suggested by Toni
Ruottu.
- Currently, the echo server zeroes any application layer data before
transmission in a NEP_ECHO message. This minimizes the impact of
errors in the server's packet matching engine or malicious attacks that
attempt to trick the server into echoing packets that do not belong to
a particular user. This works well but in the future, if one day we
create a NEPv2 specification, we may want to consider extending NEP_ECHO
packets to allow stripped-packet transport. This is, to allow echo servers
to remove application layer data before transmission, and include
additional information in the NEP_ECHO message so clients can determine
that the payload part was stripped and how long was it.
* Investigate about warning on old version of gcc like g++ 4.1.2 20080704
(Red Hat 4.1.2-48). No warnings are shown on newer version but it would be
nice to get rid of them if possible. There are some of them: