<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Remote service implements TCP timestamps in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/remote-service-implements-tcp-timestamps/m-p/1565932#M666453</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That is good news!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please mark the thread as Answered so that others can benefit in the future.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Take care,&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 12 Oct 2010 18:28:03 GMT</pubDate>
    <dc:creator>Panos Kampanakis</dc:creator>
    <dc:date>2010-10-12T18:28:03Z</dc:date>
    <item>
      <title>Remote service implements TCP timestamps</title>
      <link>https://community.cisco.com/t5/network-security/remote-service-implements-tcp-timestamps/m-p/1565929#M666450</link>
      <description>&lt;P class="MsoNormal" style="margin: 0in 0in 10pt;"&gt;&lt;SPAN style="font-family: Calibri; color: #000000; font-size: 12pt;"&gt;I trying to stop the RFC 1323 Timestamp leak (Nessus ID 25220), I have add the following commands to our PIX firewall. Test still comeback positive.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 10pt;"&gt;&lt;SPAN style="font-family: Calibri; color: #000000; font-size: 12pt;"&gt;access-list 100 deny icmp any any timestamp-request&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 10pt;"&gt;&lt;SPAN style="font-family: Calibri; color: #000000; font-size: 12pt;"&gt;access-list 100 deny icmp any any timestamp-reply&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 10pt;"&gt;&lt;SPAN style="font-family: Calibri; color: #000000; font-size: 12pt;"&gt;icmp deny any outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 10pt;"&gt;&lt;SPAN style="font-family: Calibri; color: #000000; font-size: 12pt;"&gt;icmp deny any inside&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:53:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-service-implements-tcp-timestamps/m-p/1565929#M666450</guid>
      <dc:creator>gjohnson1963</dc:creator>
      <dc:date>2019-03-11T18:53:18Z</dc:date>
    </item>
    <item>
      <title>Re: Remote service implements TCP timestamps</title>
      <link>https://community.cisco.com/t5/network-security/remote-service-implements-tcp-timestamps/m-p/1565930#M666451</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are dropping icmp timestamps. You need to clear the TCP timestamps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/conns_tcpnorm.html"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/conns_tcpnorm.html&lt;/A&gt; explains how, and the config will look like&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;tcp-map tmap&lt;/P&gt;&lt;P&gt;&amp;nbsp; timestamp&amp;nbsp; clear&lt;/P&gt;&lt;P&gt;access-list tcp-acl permit tcp any any&lt;/P&gt;&lt;P&gt;class-map tcp-class&lt;/P&gt;&lt;P&gt;&amp;nbsp; match access-l tcp-acl&lt;/P&gt;&lt;P&gt;policy-map pmap&lt;/P&gt;&lt;P&gt;&amp;nbsp; class ts-class&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; set connection advanced-options tmap&lt;/P&gt;&lt;P&gt;service-policy pmap global&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let us know if it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Oct 2010 14:31:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-service-implements-tcp-timestamps/m-p/1565930#M666451</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-10-12T14:31:24Z</dc:date>
    </item>
    <item>
      <title>Re: Remote service implements TCP timestamps</title>
      <link>https://community.cisco.com/t5/network-security/remote-service-implements-tcp-timestamps/m-p/1565931#M666452</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Solution worked, thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tcp-map tcp-map-timestamp&lt;/P&gt;&lt;P&gt;tcp-options timestamp clear&lt;/P&gt;&lt;P&gt;class-map class-map-timestamp&lt;BR /&gt;match any&lt;/P&gt;&lt;P&gt;policy-map policy-map-timestamp&lt;BR /&gt;class class-map-timestamp&lt;/P&gt;&lt;P&gt;set connection advanced-options tcp-map-timestamp&lt;/P&gt;&lt;P&gt;service-policy policy-map-timestamp global&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Oct 2010 17:59:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-service-implements-tcp-timestamps/m-p/1565931#M666452</guid>
      <dc:creator>gjohnson1963</dc:creator>
      <dc:date>2010-10-12T17:59:59Z</dc:date>
    </item>
    <item>
      <title>Re: Remote service implements TCP timestamps</title>
      <link>https://community.cisco.com/t5/network-security/remote-service-implements-tcp-timestamps/m-p/1565932#M666453</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That is good news!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please mark the thread as Answered so that others can benefit in the future.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Take care,&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Oct 2010 18:28:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-service-implements-tcp-timestamps/m-p/1565932#M666453</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-10-12T18:28:03Z</dc:date>
    </item>
    <item>
      <title>Remote service implements TCP timestamps</title>
      <link>https://community.cisco.com/t5/network-security/remote-service-implements-tcp-timestamps/m-p/1565933#M666454</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi hope everyone is fine. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It didnt work for our case. Our vendor simplified to command and after implementing it I still get the TCP timestamp vulnerability for hosts behind the FW. Is this command suppose to clear all TCP timestamp request for hosts behing the FW or is it simply just for the FW?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;tcp-map tmap-timestamp&lt;/EM&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; tcp-options timestamp clear&lt;/EM&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;policy-map global_policy&lt;/EM&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;class global-class&lt;/EM&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; set connection advanced-options tmap-timestamp&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope anyone can shed some light on what we did wrong or an alternate solution.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Mon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Dec 2013 01:37:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-service-implements-tcp-timestamps/m-p/1565933#M666454</guid>
      <dc:creator>Mon-Loi Perez</dc:creator>
      <dc:date>2013-12-18T01:37:42Z</dc:date>
    </item>
    <item>
      <title>Re: Remote service implements TCP timestamps</title>
      <link>https://community.cisco.com/t5/network-security/remote-service-implements-tcp-timestamps/m-p/3406839#M666455</link>
      <description>&lt;P&gt;Hi Panos,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I can clear timestamps, using tcp-map, but I've read PAWS is going to be disabled, and this might cause many TCP sessions to be reset,&amp;nbsp;PAWS uses the TCP Timestamps option defined in Section 4 of RF 1323 to protect against old duplicates from the same connection (¿issue to future?).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://www.ietf.org/rfc/rfc1323.txt" target="_blank"&gt;https://www.ietf.org/rfc/rfc1323.txt&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;in other side found that&amp;nbsp;RFC 1948 could solve the Vulnerability, therfore how do you for apply RFC in my Cisco ASA? 5585X (however it is not perfect and it also brings problems)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I remain attentive for your feedback.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Jun 2018 22:55:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-service-implements-tcp-timestamps/m-p/3406839#M666455</guid>
      <dc:creator>juan soporteco</dc:creator>
      <dc:date>2018-06-27T22:55:26Z</dc:date>
    </item>
  </channel>
</rss>

