tools:finger
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| tools:finger [2026/03/31 19:05] – [Finger Relays] Humphrey Boa-Gart | tools:finger [2026/04/01 07:53] (current) – [More Reading] Humphrey Boa-Gart | ||
|---|---|---|---|
| Line 5: | Line 5: | ||
| Openly sharing email addresses and live session data was considered fine in the early years of the internet. But by the early 90's, hackers & corporate spies were abusing the utility to exfiltrate sensitive internal data from corporate, government & military networks. When the daemon itself was found to be hackable - enabling full remote hijacking - it was the final straw and Finger daemons were gradually abandoned. By the turn of the millennium it had mostly vanished, surviving mostly on older systems until gradually most of them were tracked down and exploited as well. | Openly sharing email addresses and live session data was considered fine in the early years of the internet. But by the early 90's, hackers & corporate spies were abusing the utility to exfiltrate sensitive internal data from corporate, government & military networks. When the daemon itself was found to be hackable - enabling full remote hijacking - it was the final straw and Finger daemons were gradually abandoned. By the turn of the millennium it had mostly vanished, surviving mostly on older systems until gradually most of them were tracked down and exploited as well. | ||
| - | Despite this, the beleaguered protocol still has a small yet avid fanbase that overlaps with the remnants of the once-legendary [[tools: | + | Despite |
| Line 54: | Line 54: | ||
| ==== Finger Relays ==== | ==== Finger Relays ==== | ||
| - | One lesser-known feature of Finger was its ability to do **relays**, almost like a built-in proxy service. To explain how it worked, lets suppose the client | + | One lesser-known feature of Finger was its ability to do **relays**, almost like a built-in proxy service. To explain how it worked, lets suppose the client wants to finger user '' |
| finger alice@R7@R6@R5@R4@R3@R2@R1 | finger alice@R7@R6@R5@R4@R3@R2@R1 | ||
| Line 69: | Line 69: | ||
| R7 -> R7 target logic resolves to user query " | R7 -> R7 target logic resolves to user query " | ||
| - | Since it is hop-by-hop forwarding, '' | + | Since it is hop-by-hop forwarding, '' |
| Line 100: | Line 100: | ||
| == Web Links == | == Web Links == | ||
| + | * [[https:// | ||
| * [[rfc> | * [[rfc> | ||
| * [[rfc> | * [[rfc> | ||
tools/finger.1774983925.txt.gz · Last modified: (external edit)
Find this page online at: https://bestpoint.institute/tools/finger
Find this page online at: https://bestpoint.institute/tools/finger
Copyright 2026 Best Point Holdings Limited




