tools:finger
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| tools:finger [2026/03/31 11:20] – [Dynamic Finger Responses] Humphrey Boa-Gart | tools:finger [2026/04/01 07:53] (current) – [More Reading] Humphrey Boa-Gart | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| ====== Finger ====== | ====== Finger ====== | ||
| - | {{wst>expand}} | + | The **Finger Protocol** is the structured TCP layer used by the '' |
| + | |||
| + | Openly sharing email addresses and live session data was considered fine in the early years of the internet. But by the early 90's, hackers & corporate spies were abusing the utility to exfiltrate sensitive internal data from corporate, government & military networks. When the daemon itself was found to be hackable - enabling full remote hijacking - it was the final straw and Finger daemons were gradually abandoned. By the turn of the millennium it had mostly vanished, surviving mostly on older systems until gradually most of them were tracked down and exploited as well. | ||
| + | |||
| + | Despite all this, the beleaguered protocol still has a small yet avid fanbase that overlaps with the remnants of the once-legendary [[tools: | ||
| Line 36: | Line 40: | ||
| Despite Finger' | Despite Finger' | ||
| - | The emerging scene of //" | + | The emerging scene of //" |
| - | For example, modern PHP installs come with '' | + | For example, modern PHP installs come with '' |
| <file cgi loader.cgi> | <file cgi loader.cgi> | ||
| Line 46: | Line 50: | ||
| For an easy example of serving dynamic data over the Finger protocol, give [[github> | For an easy example of serving dynamic data over the Finger protocol, give [[github> | ||
| + | |||
| + | |||
| + | ==== Finger Relays ==== | ||
| + | |||
| + | One lesser-known feature of Finger was its ability to do **relays**, almost like a built-in proxy service. To explain how it worked, lets suppose the client wants to finger user '' | ||
| + | |||
| + | finger alice@R7@R6@R5@R4@R3@R2@R1 | ||
| + | |||
| + | Here the client is connecting first to the host '' | ||
| + | |||
| + | Client -> R1 : " | ||
| + | R1 -> R2 : " | ||
| + | R2 -> R3 : " | ||
| + | R3 -> R4 : " | ||
| + | R4 -> R5 : " | ||
| + | R5 -> R6 : " | ||
| + | R6 -> R7 : " | ||
| + | R7 -> R7 target logic resolves to user query " | ||
| + | |||
| + | Since it is hop-by-hop forwarding, '' | ||
| + | |||
| Line 52: | Line 77: | ||
| The biggest drawback of Finger is that it is unencrypted, | The biggest drawback of Finger is that it is unencrypted, | ||
| - | But if you are like me, and you see a plaintext request/ | + | But if you are like me, and you see a plaintext request/ |
| + | |||
| + | If you are building mobile apps or using [[radio: | ||
| - | Well it turns out anyone can define a protocol, and it doesn' | + | Well it turns out anyone can define a protocol, and it doesn' |
| - | You can see the example in-progress '' | + | You can see the example in-progress '' |
| Line 73: | Line 100: | ||
| == Web Links == | == Web Links == | ||
| - | * [[rfc> | + | |
| - | * [[rfc> | + | |
| - | * [[wp>Finger|Finger (protocol)]] | + | * [[rfc> |
| + | * [[wp> | ||
| {{tag> | {{tag> | ||
tools/finger.1774956009.txt.gz · Last modified: (external edit)
Find this page online at: https://bestpoint.institute/tools/finger
Find this page online at: https://bestpoint.institute/tools/finger
Copyright 2026 Best Point Holdings Limited




