Finger protocol


Finger protocol

In computer networking, the Name/Finger protocol and the Finger user information protocol are simple network protocols for the exchange of human-oriented status and user information.

Name/Finger protocol

The Name/Finger protocol, written by David Zimmerman, is based on Request for comments document 742 (December 1977) as an interface to the name and finger programs that provide status reports on a particular computer system or a particular person at network sites. The finger program was written in 1971 by Les Earnest who created the program to solve the need of users who wanted information on other users of the network. Information on who is logged-in was useful to check the availability of a person to meet. This was probably the earliest form of Presence information technology that worked for remote users over a network.

Prior to the finger program, the only way to get this information was with a who program that showed IDs and terminal line numbers for logged-in users, and people used to run their fingers down the who list. Earnest named his program after this concept. Fact|date=November 2007

Finger user information protocol

Finger is based on the Transmission Control Protocol, using TCP port 79 decimal. The local host opens a TCP connection to a remote host on the Finger port. An RUIP (Remote User Information Program) becomes available on the remote end of the connection to process the request. The local host sends the RUIP a one line query based upon the Finger query specification, and waits for the RUIP to respond. The RUIP receives and processes the query, returns an answer, then initiates the close of the connection. The local host receives the answer and the close signal, then proceeds closing its end of the connection.

The Finger user information protocol is based on RFC 1288 ("The Finger User Information Protocol", December 1991). Typically the server side of the protocol is implemented by a program fingerd (for finger daemon), while the client side is implemented by the name and finger programs which are supposed to return a friendly, human-oriented status report on either the system at the moment or a particular person in depth. There is no required format, and the protocol consists mostly of specifying a single command line. It is implemented on Unix, Unix-like systems and current versions of Windows.

The program would supply information such as whether a user is currently logged-on, e-mail address, full name etc. As well as standard user information, finger displays the contents of the .project and .plan files in the user's home directory. Often this file (maintained by the user) contains either useful information about the user's current activities, or alternatively all manner of humor.

ecurity concerns

Supplying such detailed information as e-mail addresses and full names was considered acceptable and convenient in the early days of Internetworking, but later was considered questionable for privacy and security reasons. Finger information has been frequently used by crackers as a way to initiate a social engineering attack on a company's computer security system. By using a finger client to get a list of a company's employee names, email addresses, phone numbers, and so on, a cracker can telephone or email someone at a company requesting information while posing as another employee. The finger daemon has also had several exploitable security holes which crackers have used to break into systems. The Morris worm exploited an overflow vulnerability in fingerd (among others) to spread.

For these reasons, while finger was widely used during the early days of Internet, by the 1990s the vast majority of sites on the internet no longer offered the service. Notable exceptions include John Carmack and Justin Frankel, who until recently still updated their status information occasionally. In late 2005, John Carmack switched to using a blog, instead of his old .plan site.

ee also

* Morris worm

External links

*RFC 742 (December 1977)
*RFC 1288 (December 1991)
* [http://www.djmnet.org/lore/finger-origin.txt Mail from Les Earnest explaining the origin of finger]
* [http://manpages.debian.net/cgi-bin/man.cgi?query=finger Linux finger command]
* [http://www.rajivshah.com/Case_Studies/Finger/Finger.htm History of the Finger protocol by Rajiv Shah]
* [http://technet.microsoft.com/en-us/library/bb490908.aspx Microsoft TechNet Finger article]


Wikimedia Foundation. 2010.

Look at other dictionaries:

  • Finger protocol — …   Википедия

  • Finger — Название: Finger Уровень (по модели OSI): Прикладной Семейство: TCP/IP Порт/ID: 79/TCP Назначение протокола: Предоставление интерфейса для получения данных о пользователях удаленного компьютера Спецификация …   Википедия

  • Finger — Saltar a navegación, búsqueda Para el uso aeroportuario del término, véase Pasarela de acceso a aeronaves. El servicio finger (puerto 79, TCP) es un protocolo que proporciona información de los usuarios de una máquina, estén o no conectados en el …   Wikipedia Español

  • Finger (disambiguation) — A finger is an appendage found on the hands of humans and primates.Finger may also refer to:* Finger (gesture), a hand gesture * Finger (aircraft) * Finger (fluid measure) * Fingers (1978 film) * The Finger (band) * Fingering, the positioning of… …   Wikipedia

  • finger —    An internet standard protocol and UNIX command that uncovers information about a known site or user. If a site supporting Finger is queried, the names of users currently logged in ar displayed.    Finger typically allows users to find out the… …   IT glossary of terms, acronyms and abbreviations

  • Client-To-Client Protocol — Das Client To Client Protocol (CTCP) dient einer besonderen Form der Kommunikation zwischen IRC Clients. CTCP erweitert dabei normale IRC Textnachrichten um spezielle Befehle, durch die bestimmte Nachrichten versandt und Informationen des… …   Deutsch Wikipedia

  • Milwaukee protocol — The Milwaukee protocol is an experimental course of treatment of an acute infection of rabies in a human being. The treatment involves putting the patient into a chemically induced coma and administering antiviral drugs. It was developed and… …   Wikipedia

  • Schéma d'URI — En informatique, un schéma d’URI est le premier niveau de la structure de nommage des identifiants uniformes de ressources (URI). Toutes les URIs sont construites à partir d’un nom de schéma, suivi de deux points (« : ») puis du reste… …   Wikipédia en Français

  • List of Internet topics — This page is a list of Internet topics. AlphanumericTOC align=center nobreak= numbers= externallinks= references= top=| A Abilene Network Ad hoc network Address resolution protocol Aggregator (news aggregator) ADSL AirPort All your base are… …   Wikipedia

  • Whois — (pronounced as the phrase who is) is a query and response protocol that is widely used for querying databases that store the registered users or assignees of an Internet resource, such as a domain name, an IP address block, or an autonomous… …   Wikipedia


Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”

We are using cookies for the best presentation of our site. Continuing to use this site, you agree with this.