summaryrefslogtreecommitdiffstats
path: root/utils/nfnl_osf.8.in
blob: 140b5c3f99a422f99dfd69442aead98d9de999e7 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
.TH NFNL_OSF 8 "" "@PACKAGE_STRING@" "@PACKAGE_STRING@"

.SH NAME
nfnl_osf \- OS fingerprint loader utility
.SH SYNOPSIS

.ad l
.in +8
.ti -8
.B nfnl_osf
.BI -f " fingerprints"
[
.B -d
]

.SH DESCRIPTION
The
.B nfnl_osf
utility allows to load a set of operating system signatures into the kernel for
later matching against using iptables'
.B osf
match.

.SH OPTIONS

.TP
.BI -f " fingerprints"
Read signatures from file
.IR fingerprints .

.TP
.B -d
Instead of adding the signatures from
.I fingerprints
into the kernel, remove them.

.SH EXIT STATUS
Exit status is 0 if command succeeded, otherwise a negative return code
indicates the type of error which happened:

.TP
.B -1
Illegal arguments passed, fingerprints file not readable or failure in netlink
communication.

.TP
.B -ENOENT
Fingerprints file not specified.

.TP
.B -EINVAL
Netlink handle initialization failed or fingerprints file format invalid.

.SH FILES

An up to date set of operating system signatures can be downloaded from
http://www.openbsd.org/cgi-bin/cvsweb/src/etc/pf.os .

.SH SEE ALSO

The description of
.B osf
match in
.BR iptables-extensions (8)
contains further information about the topic as well as example
.B nfnl_osf
invocations.