79.13 Identifying your System
Note that, for example, a HTTP server on port 80 identifying itself as:
or a SSH server on port 22 identifying itself as:
$ telnet togaware.com 22
Trying 150.229.8.170...
Connected to togaware.com.
Escape character is '^]'.
SSH-1.99-OpenSSH_3.6.1p2 Debian 1:3.6.1p2-10
is not really a security risk. Serious attacks will attempt all know vulnerabilities of the port, irrespective of what is running behind the port. Thus this is not regarded as sensitive information. On the other-hand, hiding the banner loses a lot for inter-operation.
Indeed, software should advertise its version number to aid debugging in all kinds of circumstances. If there’s a security flaw then the flaw should be fixed instead of trying to hide it.
Your donation will support ongoing availability and give you access to the PDF version of this book. Desktop Survival Guides include Data Science, GNU/Linux, and MLHub. Books available on Amazon include Data Mining with Rattle and Essentials of Data Science. Popular open source software includes rattle, wajig, and mlhub. Hosted by Togaware, a pioneer of free and open source software since 1984. Copyright © 1995-2022 Graham.Williams@togaware.com Creative Commons Attribution-ShareAlike 4.0