<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I have done some more reading in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/tcp-timestamps-security-vulnerabilities/m-p/2547175#M206191</link>
    <description>&lt;P&gt;I have done some more reading and found a couple of things about &lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa82/configuration/guide/config/conns_tcpnorm.html"&gt;TCP Normalization&lt;/A&gt;&amp;nbsp;and &lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa82/configuration/guide/config/conns_connlimits.html#wp1080757"&gt;Randomization&lt;/A&gt;&amp;nbsp;that can be configured on the ASA. Does anyone have any experience with that? Maybe it will help?&lt;/P&gt;</description>
    <pubDate>Mon, 13 Oct 2014 03:47:45 GMT</pubDate>
    <dc:creator>BrianEschen</dc:creator>
    <dc:date>2014-10-13T03:47:45Z</dc:date>
    <item>
      <title>TCP timestamps security vulnerabilities</title>
      <link>https://community.cisco.com/t5/network-security/tcp-timestamps-security-vulnerabilities/m-p/2547173#M206189</link>
      <description>&lt;P&gt;On my ASA 5520 with version 9.1(2)8&amp;nbsp;I am getting a warning about tcp timestamps when running the external security scan.&amp;nbsp;&lt;/P&gt;&lt;P&gt;" It was detected that the host implements RFC1323"&lt;/P&gt;&lt;P&gt;Solution = Disable TCP timestamps&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please correct me if I am wrong, from what I can tell the security issues in RFC1323 have been fixed by RFC1948 and that has been obsoleted&amp;nbsp;by RFC6528. But RFC1323 has been obsoleted by RFC7323, though RFC7323 was just released this September.&lt;/P&gt;&lt;P&gt;What should I do to eliminate my risk? Can I configure something&amp;nbsp;on the ASA to use RFC1948 or 6528? Do I just have to disable tcp timestamps&amp;nbsp;all together?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportforums.cisco.com/discussion/11015136/remote-service-implements-tcp-timestamps#comment-5808881" target="_blank"&gt;I found this page on clearing tcp timestamps&lt;/A&gt;&amp;nbsp;but that disables PAWS&lt;/P&gt;&lt;P&gt;thanks for any advice&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:54:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-timestamps-security-vulnerabilities/m-p/2547173#M206189</guid>
      <dc:creator>BrianEschen</dc:creator>
      <dc:date>2019-03-12T04:54:18Z</dc:date>
    </item>
    <item>
      <title>Hi,You would have to disable</title>
      <link>https://community.cisco.com/t5/network-security/tcp-timestamps-security-vulnerabilities/m-p/2547174#M206190</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;You would have to disable the time stamp to check for this RFC1323.&lt;/P&gt;&lt;P&gt;Check this on how to do it on the ASA device:-&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa84/configuration/guide/asa_84_cli_config/conns_connlimits.html&lt;/P&gt;&lt;P&gt;Also check this for more information:-&lt;/P&gt;&lt;P&gt;http://stackoverflow.com/questions/7880383/what-benefit-is-conferred-by-tcp-timestamp&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Sat, 11 Oct 2014 04:44:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-timestamps-security-vulnerabilities/m-p/2547174#M206190</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2014-10-11T04:44:21Z</dc:date>
    </item>
    <item>
      <title>I have done some more reading</title>
      <link>https://community.cisco.com/t5/network-security/tcp-timestamps-security-vulnerabilities/m-p/2547175#M206191</link>
      <description>&lt;P&gt;I have done some more reading and found a couple of things about &lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa82/configuration/guide/config/conns_tcpnorm.html"&gt;TCP Normalization&lt;/A&gt;&amp;nbsp;and &lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa82/configuration/guide/config/conns_connlimits.html#wp1080757"&gt;Randomization&lt;/A&gt;&amp;nbsp;that can be configured on the ASA. Does anyone have any experience with that? Maybe it will help?&lt;/P&gt;</description>
      <pubDate>Mon, 13 Oct 2014 03:47:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tcp-timestamps-security-vulnerabilities/m-p/2547175#M206191</guid>
      <dc:creator>BrianEschen</dc:creator>
      <dc:date>2014-10-13T03:47:45Z</dc:date>
    </item>
  </channel>
</rss>

