pf.os revision 1.8
1# $OpenBSD: pf.os,v 1.8 2003/09/05 22:14:14 frantzen Exp $
2# passive OS fingerprinting
3# -------------------------
4#
5# SYN signatures. Those signatures work for SYN packets only (duh!).
6#
7# (C) Copyright 2000-2003 by Michal Zalewski <lcamtuf@coredump.cx>
8# (C) Copyright 2003 by Mike Frantzen <frantzen@w4g.org>
9#
10#  Permission to use, copy, modify, and distribute this software for any
11#  purpose with or without fee is hereby granted, provided that the above
12#  copyright notice and this permission notice appear in all copies.
13#
14#  THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
15#  WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
16#  MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
17#  ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
18#  WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
19#  ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
20#  OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
21#
22#
23# This fingerprint database is adapted from Michal Zalewski's p0f passive
24# operating system package.
25#
26#
27# Each line in this file specifies a single fingerprint. Please read the
28# information below carefully before attempting to append any signatures
29# reported as UNKNOWN to this file to avoid mistakes.
30#
31# We use the following set metrics for fingerprinting:
32#
33# - Window size (WSS) - a highly OS dependent setting used for TCP/IP
34#   performance control (max. amount of data to be sent without ACK).
35#   Some systems use a fixed value for initial packets. On other
36#   systems, it is a multiple of MSS or MTU (MSS+40). In some rare
37#   cases, the value is just arbitrary.
38#
39#   NEW SIGNATURE: if p0f reported a special value of 'Snn', the number
40#   appears to be a multiple of MSS (MSS*nn); a special value of 'Tnn'
41#   means it is a multiple of MTU ((MSS+40)*nn). Unless you notice the
42#   value of nn is not fixed (unlikely), just copy the Snn or Tnn token
43#   literally. If you know this device has a simple stack and a fixed
44#   MTU, you can however multiply S value by MSS, or T value by MSS+40,
45#   and put it instead of Snn or Tnn.
46#
47#   If WSS otherwise looks like a fixed value (for example a multiple
48#   of two), or if you can confirm the value is fixed, please quote
49#   it literally. If there's no apparent pattern in WSS chosen, you
50#   should consider wildcarding this value.
51#
52# - Overall packet size - a function of all IP and TCP options and bugs.
53#
54#   NEW SIGNATURE: Copy this value literally.
55#
56# - Initial TTL - We check the actual TTL of a received packet. It can't
57#   be higher than the initial TTL, and also shouldn't be dramatically
58#   lower (maximum distance is defined as 40 hops).
59#
60#   NEW SIGNATURE: *Never* copy TTL from a p0f-reported signature literally.
61#   You need to determine the initial TTL. The best way to do it is to
62#   check the documentation for a remote system, or check its settings.
63#   A fairly good method is to simply round the observed TTL up to
64#   32, 64, 128, or 255, but it should be noted that some obscure devices
65#   might not use round TTLs (in particular, some shoddy appliances use
66#   "original" initial TTL settings). If not sure, you can see how many
67#   hops you're away from the remote party with traceroute or mtr.
68#
69# - Don't fragment flag (DF) - some modern OSes set this to implement PMTU
70#   discovery. Others do not bother.
71#
72#   NEW SIGNATURE: Copy this value literally.
73#
74# - Maximum segment size (MSS) - this setting is usually link-dependent. P0f
75#   uses it to determine link type of the remote host.
76#
77#   NEW SIGNATURE: Always wildcard this value, except for rare cases when
78#   you have an appliance with a fixed value, know the system supports only
79#   a very limited number of network interface types, or know the system
80#   is using a value it pulled out of nowhere.  Specific unique MSS
81#   can be used to tell Google crawlbots from the rest of the population.
82#
83# - Window scaling (WSCALE) - this feature is used to scale WSS.
84#   It extends the size of a TCP/IP window to 32 bits. Some modern
85#   systems implement this feature.
86#
87#   NEW SIGNATURE: Observe several signatures. Initial WSCALE is often set
88#   to zero or other low value. There's usually no need to wildcard this
89#   parameter.
90#
91# - Timestamp - some systems that implement timestamps set them to
92#   zero in the initial SYN. This case is detected and handled appropriately.
93#
94# - Selective ACK permitted - a flag set by systems that implement
95#   selective ACK functionality.
96#
97# - The sequence of TCP all options (MSS, window scaling, selective ACK
98#   permitted, timestamp, NOP). Other than the options previously
99#   discussed, p0f also checks for timestamp option (a silly
100#   extension to broadcast your uptime ;-), NOP options (used for
101#   header padding) and sackOK option (selective ACK feature).
102#
103#   NEW SIGNATURE: Copy the sequence literally.
104#
105# To wildcard any value (except for initial TTL or TCP options), replace
106# it with '*'. You can also use a modulo operator to match any values
107# that divide by nnn - '%nnn'.
108#
109# Fingerprint entry format:
110#
111# wwww:ttt:D:ss:OOO...:OS:Version:Subtype:Details
112#
113# wwww     - window size (can be *, %nnn, Snn or Tnn).  The special values
114#            "S" and "T" which are a multiple of MSS or a multiple of MTU
115#            respectively.
116# ttt      - initial TTL
117# D        - don't fragment bit (0 - not set, 1 - set)
118# ss       - overall SYN packet size
119# OOO      - option value and order specification (see below)
120# OS       - OS genre (Linux, Solaris, Windows)
121# Version  - OS Version (2.0.27 on x86, etc)
122# Subtype  - OS subtype or patchlevel (SP3, lo0)
123# details  - Generic OS details
124#
125# If OS genre starts with '*', p0f will not show distance, link type
126# and timestamp data. It is useful for userland TCP/IP stacks of
127# network scanners and so on, where many settings are randomized or
128# bogus.
129#
130# If OS genre starts with @, it denotes an approximate hit for a group
131# of operating systems (signature reporting still enabled in this case).
132# Use this feature at the end of this file to catch cases for which
133# you don't have a precise match, but can tell it's Windows or FreeBSD
134# or whatnot by looking at, say, flag layout alone.
135#
136# Option block description is a list of comma or space separated
137# options in the order they appear in the packet:
138#
139# N	   - NOP option
140# Wnnn	   - window scaling option, value nnn (or * or %nnn)
141# Mnnn	   - maximum segment size option, value nnn (or * or %nnn)
142# S	   - selective ACK OK
143# T 	   - timestamp
144# T0 	   - timestamp with a zero value
145#
146# To denote no TCP options, use a single '.'.
147#
148# Please report any additions to this file, or any inaccuracies or
149# problems spotted, to the maintainers: lcamtuf@coredump.cx,
150# frantzen@openbsd.org and bugs@openbsd.org with a tcpdump packet
151# capture of the relevant SYN packet(s)
152#
153# WARNING WARNING WARNING
154# -----------------------
155#
156# Do not add a system X as OS Y just because NMAP says so. It is often
157# the case that X is a NAT firewall. While nmap is talking to the
158# device itself, p0f is fingerprinting the guy behind the firewall
159# instead.
160#
161# When in doubt, use common sense, don't add something that looks like
162# a completely different system as Linux or FreeBSD or LinkSys router.
163# Check DNS name, establish a connection to the remote host and look
164# at SYN+ACK - does it look similar?
165#
166# Some users tweak their TCP/IP settings - enable or disable RFC1323
167# functionality, enable or disable timestamps or selective ACK,
168# disable PMTU discovery, change MTU and so on. Always compare a new rule
169# to other fingerprints for this system, and verify the system isn't
170# "customized" before adding it. It is OK to add signature variants
171# caused by a commonly used software (personal firewalls, security
172# packages, etc), but it makes no sense to try to add every single
173# possible /proc/sys/net/ipv4 tweak on Linux or so.
174#
175# KEEP IN MIND: Some packet firewalls configured to normalize outgoing
176# traffic (OpenBSD pf with "scrub" enabled, for example) will, well,
177# normalize packets. Signatures will not correspond to the originating
178# system (and probably not quite to the firewall either).
179#
180# NOTE: Try to keep this file in some reasonable order, from most to
181# least likely systems. This will speed up operation. Also keep most
182# generic and broad rules near the end.
183#
184
185##########################
186# Standard OS signatures #
187##########################
188
189# ----------------- AIX ---------------------
190
191# AIX is first because its signatures are close to NetBSD, MacOS X and
192# Linux 2.0, but it uses a fairly rare MSSes, at least sometimes...
193# This is a shoddy hack, though.
194
19516384:64:0:44:M512:		AIX:4.3:2-3:AIX 4.3.2 and earlier
196
19716384:64:0:60:M512,N,W%2,N,N,T:	AIX:4.3:3:AIX 4.3.3-5.2
19816384:64:0:60:M512,N,W%2,N,N,T:	AIX:5.1-5.2::AIX 4.3.3-5.2
19932768:64:0:60:M512,N,W%2,N,N,T:	AIX:4.3:3:AIX 4.3.3-5.2
20032768:64:0:60:M512,N,W%2,N,N,T:	AIX:5.1-5.2::AIX 4.3.3-5.2
20165535:64:0:60:M512,N,W%2,N,N,T:	AIX:4.3:3:AIX 4.3.3-5.2
20265535:64:0:60:M512,N,W%2,N,N,T:	AIX:5.1-5.2::AIX 4.3.3-5.2
203
204# ----------------- Linux -------------------
205
206512:64:0:44:M*:			Linux:2.0:3x:Linux 2.0.3x
20716384:64:0:44:M*:		Linux:2.0:3x:Linux 2.0.3x
208
209S4:64:1:60:M1360,S,T,N,W0:	Linux:google::Linux (Google crawlbot)
210
211S3:64:1:60:M*,S,T,N,W0:		Linux:2.4:18-21:Linux 2.4.18 and newer
212S4:64:1:60:M*,S,T,N,W0:		Linux:2.4::Linux 2.4
213S3:64:1:60:M*,S,T,N,W1:		Linux:2.5::Linux 2.5
214S4:64:1:60:M*,S,T,N,W1:		Linux:2.5::Linux 2.5
215
216S20:64:1:60:M*,S,T,N,W0:	Linux:2.2:20-25:Linux 2.2.20 and newer
217S22:64:1:60:M*,S,T,N,W0:	Linux:2.2::Linux 2.2
218S11:64:1:60:M*,S,T,N,W0:	Linux:2.2::Linux 2.2
219
220# Popular cluster config scripts disable timestamps and
221# selective ACK:
222S4:64:1:48:M1460,N,W0:		Linux:2.4:cluster:Linux 2.4 in cluster
223
224# This needs to be investigated. On some systems, WSS
225# is selected as a multiple of MTU instead of MSS. I got
226# many submissions for this for many late versions of 2.4:
227T4:64:1:60:M1412,S,T,N,W0:	Linux:2.4::Linux 2.4 (late, uncommon)
228
229# This happens only over loopback, but let's make folks happy:
23032767:64:1:60:M16396,S,T,N,W0:	Linux:2.4:lo0:Linux 2.4 (local)
231S8:64:1:60:M3884,S,T,N,W0:	Linux:2.2:lo0:Linux 2.2 (local)
232
233# Opera visitors:
23416384:64:1:60:M*,S,T,N,W0:	Linux:2.2:Opera:Linux 2.2 (Opera?)
23532767:64:1:60:M*,S,T,N,W0:	Linux:2.4:Opera:Linux 2.4 (Opera?)
236
237# Some fairly common mods:
238#   S4:64:1:52:M*,N,N,S,N,W0:	Linux:2.4:noTS:Linux 2.4 w/o timestamps
239
240# ----------------- FreeBSD -----------------
241
24216384:64:1:44:M*:		FreeBSD:2.0-2.2::FreeBSD 2.0-4.1
24316384:64:1:44:M*:		FreeBSD:3.0-3.5::FreeBSD 2.0-4.1
24416384:64:1:44:M*:		FreeBSD:4.0-4.1::FreeBSD 2.0-4.1
24516384:64:1:60:M*,N,W0,N,N,T:	FreeBSD:4.4::FreeBSD 4.4
2461024:64:1:60:M*,N,W0,N,N,T:	FreeBSD:4.4::FreeBSD 4.4
247
24857344:64:1:44:M*:		FreeBSD:4.6-4.8:noRFC1323:FreeBSD 4.6-4.8 (no RFC1323)
24957344:64:1:60:M*,N,W0,N,N,T:	FreeBSD:4.6-4.8::FreeBSD 4.6-4.8
250
25165535:64:1:60:M*,N,W0,N,N,T:	FreeBSD:4.8-4.9::FreeBSD 4.8-5.0 (or MacOS X)
25265535:64:1:60:M*,N,W0,N,N,T:	FreeBSD:5.0::FreeBSD 4.8-5.0 (or MacOS X)
25332768:64:1:60:M*,N,W0,N,N,T:	FreeBSD:4.8-4.9::FreeBSD 4.8-5.0 (or MacOS X)
25432768:64:1:60:M*,N,W0,N,N,T:	FreeBSD:5.0::FreeBSD 4.8-5.0 (or MacOS X)
255
25665535:48:1:60:M*,N,W1,N,N,T:	FreeBSD:5.0-5.1::FreeBSD 5.0-5.1
257
258# 16384:64:1:60:M*,N,N,N,N,N,N,T:FreeBSD:4.4:noTS:FreeBSD 4.4 (w/o timestamps)
259
260# ----------------- NetBSD ------------------
261
26265535:64:0:60:M*,N,W0,N,N,T0:	NetBSD:1.6:opera:NetBSD 1.6 (Opera)
26316384:64:0:60:M*,N,W0,N,N,T0:	NetBSD:1.6::NetBSD 1.6
26416384:64:1:60:M*,N,W0,N,N,T0:	NetBSD:1.6:df:NetBSD 1.6 (DF)
26516384:64:0:60:M*,N,W0,N,N,T:	NetBSD:1.3::NetBSD 1.3
26665535:64:1:60:M*,N,W1,N,N,T0:	NetBSD:1.6::NetBSD 1.6W-current (DF)
267
268# ----------------- OpenBSD -----------------
269
27016384:64:0:60:M*,N,W0,N,N,T:		OpenBSD:2.6::NetBSD 1.3 (or OpenBSD 2.6)
27116384:64:1:64:M*,N,N,S,N,W0,N,N,T:	OpenBSD:3.0-3.4::OpenBSD 3.0-3.4
27216384:64:0:64:M*,N,N,S,N,W0,N,N,T:	OpenBSD:3.0-3.4:no-df:OpenBSD 3.0-3.4 (scrub no-df)
27357344:64:1:64:M*,N,N,S,N,W0,N,N,T:	OpenBSD:3.3-3.4::OpenBSD 3.3-3.4
27457344:64:0:64:M*,N,N,S,N,W0,N,N,T:	OpenBSD:3.3-3.4:no-df:OpenBSD 3.3-3.4 (scrub no-df)
275
27665535:64:1:64:M*,N,N,S,N,W0,N,N,T:	OpenBSD:3.0-3.4:opera:OpenBSD 3.0-3.4 (Opera)
277
278# ----------------- Solaris -----------------
279
280S17:64:1:64:N,W3,N,N,T0,N,N,S,M*:	Solaris:8:RFC1323:Solaris 8 RFC1323
281S17:64:1:48:N,N,S,M*:			Solaris:8::Solaris 8
282S34:64:1:48:M*,N,N,S:			Solaris:9::Solaris 9
283
284S23:255:1:44:M*:			Solaris:2.5:1:Solaris 2.5.1
285S17:255:1:44:M*:			Solaris:2.5-2.7::Solaris 2.5 to 7
286S6:255:1:44:M*:				Solaris:2.6-2.7::Solaris 2.6 to 7
287
288# ----------------- IRIX --------------------
289
29049152:64:0:44:M*:			IRIX:6.4::IRIX 6.4
29161440:64:0:44:M*:			IRIX:6.2-6.5::IRIX 6.2-6.5
29249152:64:0:52:M*,N,W2,N,N,S:		IRIX:6.5:RFC1323:IRIX 6.5 (RFC1323)
29349152:64:0:52:M*,N,W3,N,N,S:		IRIX:6.5:RFC1323:IRIX 6.5 (RFC1323)
294
29561440:64:0:48:M*,N,N,S:			IRIX:6.5:12:IRIX 6.5.12
29649152:64:0:48:M*,N,N,S:			IRIX:6.5:15-21:IRIX 6.5.15 - 6.5.21
297
298# ----------------- Tru64 -------------------
299
30032768:64:1:48:M*,N,W0:			Tru64:4.0f::Tru64 4.0f
30132768:64:0:48:M*,N,W0:			Tru64:5.0::Tru64 5.0
302# This looks awfully Linuxish :/
303# S22:64:0:60:M*,S,T,N,W0:		Tru64:5.0:a:Tru64 5.0a
30461440:64:0:48:M*,N,W0:			Tru64:5.1a:JP4:Tru64 v5.1a JP4 (or OpenVMS 7.2 on Compaq 5.1 stack)
305
306
307# ----------------- OpenVMS -----------------
308
3096144:64:1:60:M*,N,W0,N,N,T:		OpenVMS:7.2::OpenVMS 7.2 (Multinet 4.4 stack)
310
311# ----------------- MacOS -------------------
312
31316616:255:1:48:M*,W0:			MacOS:7.3-7.6:OTTCP:MacOS 7.3-8.6 (OTTCP)
31416616:255:1:48:M*,W0:			MacOS:8.0-8.6:OTTCP:MacOS 7.3-8.6 (OTTCP)
31532768:255:1:48:M*,W0,N:			MacOS:9.1-9.2::MacOS 9.1/9.2
31632768:64:0:60:M*,N,W0,N,N,T:		MacOS:X:10.2:MacOS X 10.2
317
318# ----------------- Windows -----------------
319
320# Windows 98 had a plenty of signatures depending on
321# release, but I don't have all the data.
322
323S44:64:1:48:N,N,S,M*:			Windows:98:SE:Windows 98SE
324S6:128:1:48:M*:				Windows:98:noSACK:Windows 98 (no sack)
3258192:128:1:48:M*,N,N,S:			Windows:98::Windows 98
32637300:64:1:48:M*,N,N,S:			Windows:98::Windows 98
3278192:128:1:44:M*:			Windows:NT:4.0:Windows NT 4.0
328
329
330%8192:128:1:48:M*,N,N,S:		Windows:XP::Windows XP/2000
331%8192:128:1:48:M*,N,N,S:		Windows:2000P::Windows XP/2000
33265535:128:1:48:M*,N,N,S:		Windows:2000:SP4:Windows 2000 SP4
333S44:128:1:48:M*,N,N,S:			Windows:XP::Windows XP or 2000 SP3+
334S44:128:1:48:M*,N,N,S:			Windows:2000:SP3:Windows XP or 2000 SP3+
335S6:128:1:48:M*,N,N,S:			Windows:XP::Windows XP or 2000 SP3
336S6:128:1:48:M*,N,N,S:			Windows:2000:SP3:Windows XP or 2000 SP3
337
338# This block yet to be verified
339S45:128:1:48:M*,N,N,S:			@Windows:XP::Windows XP
340S46:128:1:48:M*,N,N,S:			@Windows:XP::Windows XP
341
34232767:128:1:52:M*,N,W0,N,N,S:		Windows:NT4::Windows NT4
3436144:128:1:52:M*,N,W0,N,N,S:		Windows:NT4::Windows NT4
344S45:128:1:52:M*,N,W0,N,N,S:		Windows:2000:SP3:Windows 2000 SP3
345
34664512:128:1:48:M*,N,N,S:		Windows:XP::Windows XP/2000
34764512:128:1:48:M*,N,N,S:		Windows:2000::Windows XP/2000
348S52:128:1:48:M1260,N,N,S:		Windows:XP:Cisco VPN:Windows XP/2000 via Cisco VPN Adapter
349S52:128:1:48:M1260,N,N,S:		Windows:2000:Cisco VPN:Windows XP/2000 via Cisco VPN Adapter
350
351# Odds, ends, mods. Advanced Networking Pack turns out to be
352# responsible for enabling RFC1323, System Mechanic also messes
353# with TTLs and timestamps:
354
355*:128:1:64:M*,N,W2,N,N,T0,N,N,S:	Windows:2000:SP4:Windows 2000 SP4 (AdvNetPack) or PalmPC
356S4:128:1:48:M*,N,N,S:			Windows:2000:SP3:Windows 2000 SP3 (NetTweak)
357S44:128:1:64:M*,N,W0,N,N,T0,N,N,S:	Windows:XP:AdvNetPack:Windows XP (AdvNetPack)
35858944:64:1:52:M*,N,W2,N,N,S:		Windows:XP:system mechanic:Windows XP (System Mechanic tuned)
359
360# ----------------- HP/UX -------------------
361
36232768:64:1:44:M*:			HP-UX:B.10.20::HP-UX B.10.20
36332768:64:0:48:M*,W0,N:			HP-UX:11.0::HP-UX 11.0
36432768:64:1:48:M*,W0,N:			HP-UX:11.10-11.11::HP-UX 11.0 or 11.11
365
366# Whoa. Hardcore WSS.
3670:64:0:48:M*,W0,N:			HP-UX:B.11.00:A:HP-UX B.11.00 A (RFC1323)
368
369
370# ----------------- SCO ------------------
371S17:64:1:44:M1460:			SCO:Unixware:7.0:SCO Unixware 7.0.0 or OpenServer 5.0.4-5.06
372S17:64:1:44:M1460:			SCO:OpenServer:5.0:SCO Unixware 7.0.0 or OpenServer 5.0.4-5.06
373
374# ----------------- RiscOS ------------------
375
376# We don't yet support the ?12 TCP option
377#16384:64:1:68:M1460,N,W0,N,N,T,N,N,?12:	RISCOS:3.70::RISC OS 3.70
378
379# ----------------- BSD/OS ------------------
380
381# Once again, power of two WSS is also shared by MacOS X with DF set
3828192:64:1:60:M1460,N,W0,N,N,T:		BSD/OS:3.1::BSD/OS 3.1-4.3
3838192:64:1:60:M1460,N,W0,N,N,T:		BSD/OS:4.0-4.3::BSD/OS 3.1-4.3
384
385
386# ---------------- NewtonOS -----------------
387
3884096:64:0:44:M1420:		NewtonOS:2.1::NewtonOS 2.1
389
390# ---------------- NeXTSTEP -----------------
391
392S8:64:0:44:M512:		NeXTSTEP:3.3::NeXTSTEP 3.3
393
394# ------------------ BeOS -------------------
395
3961024:255:0:48:M*,N,W0:		BeOS:5.0-5.1::BeOS 5.0-5.1
39712288:255:0:44:M1402:		BeOS:5.0:3:BeOS 5.0.3
398
399# ------------------ OS/400 -----------------
400
4018192:64:1:60:M1440,N,W0,N,N,T:	OS/400:V4R4M000:L00:OS/400 V4R4M000 L00
402
403# ------------------ ULTRIX -----------------
404
40516384:64:0:40:.:		ULTRIX:4.5::ULTRIX 4.5
406
407# ------------------- DOS -------------------
408
4092048:255:0:44:M536:		DOS:WATTCP:1.05:DOS Arachne via WATTCP/1.05
410
411###########################################
412# Appliance / embedded / other signatures #
413###########################################
414
415# ---------- Firewalls / routers ------------
416
417S12:64:1:44:M1460:			@Checkpoint:::Checkpoint (unknown 1)
418S12:64:1:48:N,N,S,M1460:		@Checkpoint:::Checkpoint (unknown 2)
4194096:32:0:44:M1460:			ExtremeWare:4.x::ExtremeWare 4.x
42060352:64:0:52:M1460,N,W2,N,N,S:		Clavister:7.03.01::Clavister firewall 7.03.01
421
422# ------- Switches and other stuff ----------
423
4244128:255:0:44:M*:			Cisco:::Cisco Catalyst 3500, 7500 etc
42560352:128:1:64:M1460,N,W2,N,N,T,N,N,S:	Alteon:ACEswitch::Alteon ACEswitch
426
427# ---------- Caches and whatnots ------------
428
429S4:64:1:52:M1460,N,N,S,N,W0:		AOL:web cache::AOL web cache
430
43132850:64:1:64:N,W1,N,N,T,N,N,S,M*:	NetApp:5.x::NetApp Data OnTap 5.x
43216384:64:1:64:M1460,N,N,S,N,W0,N:	NetApp:5.3:1:NetApp 5.3.1
43365535:64:0:64:M1460,N,N,S,N,W3,N,N,T:	NetApp:5.3:1:NetApp 5.3.1
43465535:64:0:60:M1460,N,W0,N,N,T:		NetApp:CacheFlow::NetApp CacheFlow
4358192:64:1:64:M1460,N,N,S,N,W0,N,N,T:	NetApp:5.2:1:NetApp NetCache 5.2.1
436
437S4:64:0:48:M1460,N,N,S:			Cisco:Content Engine::Cisco Content Engine
438
43927085:128:0:40:.:			Dell:PowerApp cache::Dell PowerApp (Linux-based)
440
44165535:255:1:48:N,W1,M1460:		Inktomi:crawler::Inktomi crawler
442
44316384:255:0:40:.:			Proxyblocker:::Proxyblocker (what's this?)
444
445# ----------- Embedded systems --------------
446
447S9:255:0:44:M536:			PalmOS:Tungsten:C:PalmOS Tungsten C
448S5:255:0:44:M536:			PalmOS:3::PalmOS 3/4
449S5:255:0:44:M536:			PalmOS:4::PalmOS 3/4
450S4:255:0:44:M536:			PalmOS:3:5:PalmOS 3.5
451
452S23:64:1:64:N,W1,N,N,T,N,N,S,M1460:	SymbianOS:7::SymbianOS 7
4538192:255:0:44:M1460:			SymbianOS:6048::SymbianOS 6048 (on Nokia 7650?)
454
455# Perhaps S4?
4565840:64:1:60:M1452,S,T,N,W1:		Zaurus:3.10::Zaurus 3.10
457
45832768:128:1:64:M1460,N,W0,N,N,T0,N,N,S:	PocketPC:2002::PocketPC 2002
459
460S1:255:0:44:M346:			Contiki:1.1:rc0:Contiki 1.1-rc0
461
462
463
464####################
465# Fancy signatures #
466####################
467
4681024:64:0:40:.:				*NMAP:syn scan:1:NMAP syn scan (1)
4692048:64:0:40:.:				*NMAP:syn scan:2:NMAP syn scan (2)
4703072:64:0:40:.:				*NMAP:syn scan:3:NMAP syn scan (3)
4714096:64:0:40:.:				*NMAP:syn scan:4:NMAP syn scan (4)
472
4731024:64:0:60:W10,N,M265,T:		*NMAP:OS:1:NMAP OS detection probe (1)
4742048:64:0:60:W10,N,M265,T:		*NMAP:OS:2:NMAP OS detection probe (2)
4753072:64:0:60:W10,N,M265,T:		*NMAP:OS:3:NMAP OS detection probe (3)
4764096:64:0:60:W10,N,M265,T:		*NMAP:OS:4:NMAP OS detection probe (4)
477
478#####################################
479# Generic signatures - just in case #
480#####################################
481
482#*:64:1:60:M*,N,W*,N,N,T:		@FreeBSD:4.0-4.9::FreeBSD 4.x/5.x
483#*:64:1:60:M*,N,W*,N,N,T:		@FreeBSD:5.0-5.1::FreeBSD 4.x/5.x
484
485