💾 Archived View for rawtext.club › ~sloum › geminilist › 007563.gmi captured on 2023-12-28 at 15:57:00. Gemini links have been rewritten to link to archived content
⬅️ Previous capture (2021-11-30)
-=-=-=-=-=-=-
Stephane Bortzmeyer stephane at sources.org
Mon Nov 8 17:03:35 GMT 2021
- - - - - - - - - - - - - - - - - - -
On Mon, Nov 08, 2021 at 05:14:18PM +0100, Philip Linde <linde.philip at gmail.com> wrote a message of 35 lines which said:
I wonder how hard it would be to automatically identify server
software that doesn't implement this properly. Probably some server
software could be differentiated based on their error code
descriptions or how they deal with some corner cases.
Yes, fingerprinting servers is certainly possible. Someone to takethis project?
Note that some servers send the TLS proper close for "normal" repliesbut fail to do so when there is an error, such as 51. It helps withfingerprinting, though.