Finger (protocol)
{{short description|Simple network protocols for the exchange of human-oriented status and user information}}
{{Use dmy dates|date=January 2019}}
In computer networking, the Name/Finger protocol and the Finger user information protocol are simple network protocols for the exchange of human-oriented status and user information.
Name/Finger protocol
The Name/Finger protocol is based on Request for Comments document name
and finger
programs that provide status reports on a particular computer system or a particular person at network sites. The finger program was written in 1971 by Les Earnest who created the program to solve the need of users who wanted information on other users of the network. Information on who is logged in was useful to check the availability of a person to meet. This was probably the earliest form of presence information for remote network users.
Prior to the finger program, the only way to get this information on WAITS was with a WHO program that showed IDs and terminal line numbers (the server's internal number of the communication line over which the user's terminal is connected) for logged-in users. In reference to the name FINGER, Les Earnest, wrote that he saw users of the WAITS time-sharing system run their fingers down the output of the WHO command.{{cite newsgroup
|author=Earnest, Les
|via=Colbath, Sean
|title=Origins of the finger command
|date=20 February 1990
|newsgroup=alt.folklore.computers
|message-id=1990Feb20.023931.13825@cs.rochester.edu
|url=https://groups.google.com/groups?selm=1990Feb20.023931.13825@cs.rochester.edu
}}{{Better source needed|date=October 2023 |reason=TBD use RFC742 as a source that Les Earnest wrote FINGER, also see https://www.saildart.org/ALT.FOL[1,LES]4}}
Finger user information protocol
The finger daemon runs on TCP port 79. The client will (in the case of remote hosts) open a connection to port 79. An RUIP (Remote User Information Program) is started on the remote end of the connection to process the request. The local host sends the RUIP one line query based upon the Finger query specification, and waits for the RUIP to respond. The RUIP receives and processes the query, returns an answer, then initiates the close of the connection. The local host receives the answer and the close signal, then proceeds to close its end of the connection.
The Finger user information protocol is based on fingerd
or in.fingerd
(for finger daemon), while the client side is implemented by the name
and finger
programs which are supposed to return a friendly, human-oriented status report on either the system at the moment or a particular person in depth. There is no required format, and the protocol consists mostly of specifying a single command line.
The program would supply information such as whether a user is currently logged-on, e-mail address, full name etc. As well as standard user information, finger displays the contents of the .project
and .plan
files in the user's home directory. Often this file (maintained by the user) contains either useful information about the user's current activities, similar to micro-blogging, or alternatively all manner of humor.
Security concerns
Supplying such detailed information as e-mail addresses and full names was considered acceptable and convenient in the early days of networking, but later was considered questionable for privacy and security reasons.{{fact|date=January 2022}}
Finger information has been used by hackers as a way to initiate a social engineering attack on a company's computer security system. By using a finger client to get a list of a company's employee names, email addresses, phone numbers, and so on, a hacker can call or email someone at a company requesting information while posing as another employee.
The finger daemon has also had several{{Citation needed|date=September 2020}} exploitable security holes crackers have used to break into systems. For example, in 1988 the Morris worm exploited an overflow vulnerability in fingerd
(among others) to spread.{{cite web |url=http://homes.cerias.purdue.edu/~spaf/tech-reps/823.pdf#page5 |title=An analysis of the worm |first=Eugene |last=Spafford |author-link=Gene Spafford |publisher=Purdue University |format=PDF |date=8 December 1988 |access-date=2021-06-10}}
For these reasons, by the late 1990s the vast majority of sites on the Internet no longer offered the service.{{cn|date=September 2016}}
Application support
See also
References
{{Reflist}}
{{URI scheme}}
{{Unix commands}}
{{Windows commands}}
{{DEFAULTSORT:Finger Protocol}}
Category:Unix user management and support-related utilities
Category:Unix network-related software