Nmap Development mailing list archives

[Version Detection] SSL only ports - softmatch


From: Tom Sellers <nmap () fadedcode net>
Date: Fri, 01 Mar 2013 17:49:28 -0600

All,
        Lines 6605 and 6606 of the nmap-service-probes file match when a HTTP server generates a response that 
indicates that a client should connect using SSL such as the following:


**************************************************************************************

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>400 Bad Request</title>
</head><body>
<h1>Bad Request</h1>
<p>Your browser sent a request that this server could not understand.<br />
Reason: You're speaking plain HTTP to an SSL-enabled server port.<br />
Instead use the HTTPS scheme to access this URL, please.<br />
<blockquote>Hint: <a href="https://xxx.xxx.xxx.xxx:8443/";><b>https://xxx.xxx.xxx.xx:8443/</b></a></blockquote></p>
</body></html>

**************************************************************************************


In the case above the device is not directing the client to connect via SSL on a different port, but to the same port 
using SSL.

Unfortunately this stops further version detection via SSL that might actually fingerprint the service.  I have a case 
like this in my lab now where converting 6605 and 6606 to a softmatch will permit
correct identification of the service.

I would like to change both 6605 and 6606 to softmatches.  I don't forsee any negative impacts but I wanted to see if 
anyone had any thoughts on this.
If approved I will submit the change in a commit that adds an fingerprint for a device where some versions respond 
similar to the above.

Thanks much,

Tom
_______________________________________________
Sent through the dev mailing list
http://nmap.org/mailman/listinfo/dev
Archived at http://seclists.org/nmap-dev/


Current thread: