Labrea + OpenBSD scrub = one very confused response from Nmap.
aaron@striterax:pts/3 ~/code/jtrigger % nmap -O -P0 64.253.xxx.xxx -p20-25
Starting nmap 3.50 (
http://www.insecure.org/nmap/ ) at 2004-10-26 20:18 EDT
Insufficient responses for TCP sequencing (1), OS detection may be less accurate
Insufficient responses for TCP sequencing (0), OS detection may be less accurate
Interesting ports on xxx.iglou.com (64.253.xxx.xxx):
PORT STATE SERVICE
20/tcp closed ftp-data
21/tcp closed ftp
22/tcp open ssh
23/tcp closed telnet
24/tcp closed priv-mail
25/tcp filtered smtp
Device type: WAP|firewall|general purpose|broadband router
Running: 2Wire embedded, Checkpoint Windows NT/2K/XP, Linux 2.4.X, OpenBSD 3.X, Belkin embedded, Sun Solaris 2.X|7|8|9
Too many fingerprints match this host to give specific OS details
Nmap run completed -- 1 IP address (1 host up) scanned in 28.812 seconds
Ports 22 and 25 are redirected to an internal instance of Labrea, which I must say is one nasty piece of software. Love!