<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Unexpected TCP timestamp option cleared in server's response in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/unexpected-tcp-timestamp-option-cleared-in-server-s-response/m-p/1560155#M685207</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the response. Are you sure that the ASA by default will clear the timestamp value? Why is the default tcp-map value for 'tcp-options timestamp' set to 'allow'? Also how does this explain TCP timestamp values NOT being cleared when the client sends a timestamp value in it's inital request(as seen in my example)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Buck&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 10 Nov 2010 16:54:30 GMT</pubDate>
    <dc:creator>bwallander</dc:creator>
    <dc:date>2010-11-10T16:54:30Z</dc:date>
    <item>
      <title>Unexpected TCP timestamp option cleared in server's response</title>
      <link>https://community.cisco.com/t5/network-security/unexpected-tcp-timestamp-option-cleared-in-server-s-response/m-p/1560152#M685204</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a question about the functionality of the ASA firewall in regards to TCP option handling which I've yet to find any relavant documentation or known bugs for.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Consider the following scenario:&lt;/P&gt;&lt;P&gt;ASA 5520 - 8.0(4)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;An HTTP client (outside) is making a simple port 80/tcp connection to an HTTP server hosted behind the ASA (inside). The client is specifically configured NOT to include the TCP timestamp value in it's initial SYN request to the server. The server however has a unique requirement where the timestamp option MUST be populated and included in it's SYN-ACK TCP header response to all clients, regardless of whether or not the client intially sent one. An iptables rule on the linux server is enforcing this requirement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My question is, in the above scenario, will the ASA allow the TCP timestamp option (8) to pass back to the client in the SYN-ACK response, containing it's TCP options? Or will the ASA clear the option since the client did not send a timpestamp in it's initial SYN?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Based on our tests the latter appears to be occuring. The ASA looks to be silently clearing this option in the header of the response from the server, possibly because of the RFC violation or some other similar reason. By default, the TCP normalization engine on the ASA should allow the timestamp option to pass ("tcp-options timestamp allow").&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;An actual tcpdump from the client's perspective:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tcpdump: verbose output suppressed, use -v or -vv for full protocol decode&lt;BR /&gt;listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes&lt;BR /&gt;00:00:26.137565 IP client-machine.local.42788 &amp;gt; www-server.www: Flags [S], seq 3692322182, win 5840, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0&lt;BR /&gt;00:00:26.392831 IP www-server.www &amp;gt; client-machine.local.42788: Flags [S.], seq 2550944951, ack 3692322183, win 5792, options [mss 1380,sackOK,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,wscale 7], length 0&lt;BR /&gt;00:00:26.392844 IP client-machine.local.42788 &amp;gt; www-server.www: Flags [.], ack 1, win 46, length 0&lt;BR /&gt;00:00:26.392902 IP client-machine.local.42788 &amp;gt; www-server.www: Flags [F.], seq 1, ack 1, win 46, length 0&lt;BR /&gt;00:00:26.646815 IP www-server.www &amp;gt; client-machine.local.42788: Flags [F.], seq 1, ack 2, win 46, options [nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop], length 0&lt;BR /&gt;00:00:26.646826 IP client-machine.local.42788 &amp;gt; www-server.www: Flags [.], ack 2, win 46, length 0&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:07:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unexpected-tcp-timestamp-option-cleared-in-server-s-response/m-p/1560152#M685204</guid>
      <dc:creator>bwallander</dc:creator>
      <dc:date>2019-03-11T19:07:26Z</dc:date>
    </item>
    <item>
      <title>Re: Unexpected TCP timestamp option cleared in server's response</title>
      <link>https://community.cisco.com/t5/network-security/unexpected-tcp-timestamp-option-cleared-in-server-s-response/m-p/1560153#M685205</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The ASA will by default clear the timestamps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If you want to allow them you need to use a tcp-map in the MPF. &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/conns_tcpnorm.html"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/conns_tcpnorm.html&lt;/A&gt;&lt;SPAN&gt; explains it and an example is here &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/conns_tcpnorm.html#wp1088337"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/conns_tcpnorm.html#wp1088337&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;hostname(config)# &lt;STRONG&gt;tcp-map tmap&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;hostname(config-tcp-map)#&lt;STRONG&gt; &lt;/STRONG&gt;&lt;STRONG&gt;tcp-options timestamp allow&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;hostname(config-tcp-map)#&lt;STRONG&gt; class-map urg-class&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;hostname(config-cmap)#&lt;STRONG&gt; match port tcp range ftp-data telnet&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;hostname(config-cmap)#&lt;STRONG&gt; policy-map pmap&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;hostname(config-pmap)#&lt;STRONG&gt; class urg-class&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;hostname(config-pmap-c)#&lt;STRONG&gt; set connection advanced-options tmap&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;DIV class="pEx1_Example1"&gt;&lt;PRE&gt;hostname(config-pmap-c)#&lt;STRONG&gt; service-policy pmap global
&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Nov 2010 16:45:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unexpected-tcp-timestamp-option-cleared-in-server-s-response/m-p/1560153#M685205</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-11-10T16:45:32Z</dc:date>
    </item>
    <item>
      <title>Re: Unexpected TCP timestamp option cleared in server's response</title>
      <link>https://community.cisco.com/t5/network-security/unexpected-tcp-timestamp-option-cleared-in-server-s-response/m-p/1560154#M685206</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For comparrison, here's another client-side perspective tcpdump when the timestamp value &lt;SPAN style="text-decoration: underline;"&gt;&lt;EM&gt;is&lt;/EM&gt;&lt;/SPAN&gt; included in the client's initial connection:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tcpdump: verbose output suppressed, use -v or -vv for full protocol decode&lt;BR /&gt;listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes&lt;BR /&gt;11:18:55.927671 IP client-machine.local.46822 &amp;gt; www-server.www: S 4090293543:4090293543(0) win 5840 &lt;MSS 1460=""&gt;&lt;BR /&gt;11:18:55.928360 IP www-server.www &amp;gt; client-machine.local.46822: S 1018691747:1018691747(0) ack 4090293544 win 5792 &lt;MSS 1380=""&gt;&lt;BR /&gt;11:18:55.928410 IP client-machine.local.46822 &amp;gt; www-server.www: . ack 1 win 46 &lt;NOP&gt;&lt;BR /&gt;11:18:57.361352 IP client-machine.local.46822 &amp;gt; www-server.www: F 1:1(0) ack 1 win 46 &lt;NOP&gt;&lt;BR /&gt;11:18:57.362314 IP www-server.www &amp;gt; client-machine.local.46822: F 1:1(0) ack 2 win 1448 &lt;NOP&gt;&lt;BR /&gt;11:18:57.362346 IP client-machine.local.46822 &amp;gt; www-server.www: . ack 2 win 46 &lt;NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/MSS&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Nov 2010 16:50:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unexpected-tcp-timestamp-option-cleared-in-server-s-response/m-p/1560154#M685206</guid>
      <dc:creator>bwallander</dc:creator>
      <dc:date>2010-11-10T16:50:42Z</dc:date>
    </item>
    <item>
      <title>Re: Unexpected TCP timestamp option cleared in server's response</title>
      <link>https://community.cisco.com/t5/network-security/unexpected-tcp-timestamp-option-cleared-in-server-s-response/m-p/1560155#M685207</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the response. Are you sure that the ASA by default will clear the timestamp value? Why is the default tcp-map value for 'tcp-options timestamp' set to 'allow'? Also how does this explain TCP timestamp values NOT being cleared when the client sends a timestamp value in it's inital request(as seen in my example)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Buck&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Nov 2010 16:54:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unexpected-tcp-timestamp-option-cleared-in-server-s-response/m-p/1560155#M685207</guid>
      <dc:creator>bwallander</dc:creator>
      <dc:date>2010-11-10T16:54:30Z</dc:date>
    </item>
    <item>
      <title>Re: Unexpected TCP timestamp option cleared in server's response</title>
      <link>https://community.cisco.com/t5/network-security/unexpected-tcp-timestamp-option-cleared-in-server-s-response/m-p/1560156#M685208</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I mis-spoke in the statement for the default behavior. I double checked and unless you set it in the tcp-map, the ASA should allow TCP timestamps.&lt;/P&gt;&lt;P&gt;So, if you don't have it configured, the ASA should not change the value.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can capture the packets on the ASA inside and outside to verify if the ASA is really clearing the response TCP timestamps. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Nov 2010 17:10:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unexpected-tcp-timestamp-option-cleared-in-server-s-response/m-p/1560156#M685208</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-11-10T17:10:16Z</dc:date>
    </item>
    <item>
      <title>Re: Unexpected TCP timestamp option cleared in server's response</title>
      <link>https://community.cisco.com/t5/network-security/unexpected-tcp-timestamp-option-cleared-in-server-s-response/m-p/1560157#M685209</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for clarifying. The ASA is not configured to modify the timestamp value.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We've also tried an MPF policy to allow any other possible TCP options (6,7, 9-255) in case something else was being set, however this didn't help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After looking at our captures from the client, ASA, and server we've determined that the ASA seems to be 'silently' clearing this option in the server's response. I say silently because I've not found a way to actually see the ASA reporting this occuring (through syslog, statistical counter, etc).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would there be a specific command, such as with the 'show asp table' command, to see if the ASA might be clearing these (or any) options from TCP headers?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Buck&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Nov 2010 18:33:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unexpected-tcp-timestamp-option-cleared-in-server-s-response/m-p/1560157#M685209</guid>
      <dc:creator>bwallander</dc:creator>
      <dc:date>2010-11-10T18:33:30Z</dc:date>
    </item>
    <item>
      <title>Re: Unexpected TCP timestamp option cleared in server's response</title>
      <link>https://community.cisco.com/t5/network-security/unexpected-tcp-timestamp-option-cleared-in-server-s-response/m-p/1560158#M685210</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It is too deep in the processing of the header to catch it. But it shouldn't be doing it though.&lt;/P&gt;&lt;P&gt;Are you sure it is the ASA? Did you capture the packets in and out of the ASA?&lt;/P&gt;&lt;P&gt;What version are your running?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Nov 2010 18:45:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unexpected-tcp-timestamp-option-cleared-in-server-s-response/m-p/1560158#M685210</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-11-10T18:45:41Z</dc:date>
    </item>
    <item>
      <title>Re: Unexpected TCP timestamp option cleared in server's response</title>
      <link>https://community.cisco.com/t5/network-security/unexpected-tcp-timestamp-option-cleared-in-server-s-response/m-p/1560159#M685211</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There's been several tests conducted, including one where two hosts are next to each other on the same network segment and the options show up just fine. It's only the single network hop that the ASA introduces that changes between a successful test and a failed one.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's a test of a telnet to port 80 from a client machine in the "inside" segment of the firewall connecting to the webserver (The web server actually resides in a DMZ segment). The tcpdump is taken from the client machine in a separate console at the time of performing the telnet connection:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;00:35:24.120280 IP (tos 0x10, ttl 64, id 44021, offset 0, flags [DF], proto: TCP (6), length: 52) inside-host.49899 &amp;gt; dmz-www-server.http: S, cksum 0xcaec (correct), 1075522845:1075522845(0) win 5840 &lt;MSS 1460=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;00:35:24.120896 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto: TCP (6), length: 60) dmz-www-server.http &amp;gt; inside-host.49899: S, cksum 0x39b3 (correct), 3973415110:3973415110(0) ack 1075522846 win 5792 &lt;MSS 1380=""&gt;nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,wscale 7&amp;gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;00:35:24.120928 IP (tos 0x10, ttl 64, id 44022, offset 0, flags [DF], proto: TCP (6), length: 40) inside-host.49899 &amp;gt; dmz-www-server.http: ., cksum 0xb4b3 (correct), 1:1(0) ack 1 win 46&lt;/P&gt;&lt;P&gt;00:35:24.121341 IP (tos 0x10, ttl 64, id 44023, offset 0, flags [DF], proto: TCP (6), length: 40) inside-host.49899 &amp;gt; dmz-www-server.http: F, cksum 0xb4b2 (correct), 1:1(0) ack 1 win 46&lt;/P&gt;&lt;P&gt;00:35:24.121846 IP (tos 0x0, ttl 64, id 50779, offset 0, flags [DF], proto: TCP (6), length: 52) dmz-www-server.http &amp;gt; inside-host.49899: F, cksum 0x7e9f (correct), 1:1(0) ack 2 win 46 &amp;lt;&lt;STRONG&gt;nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop,nop&lt;/STRONG&gt;&amp;gt;&lt;/P&gt;&lt;P&gt;00:35:24.121869 IP (tos 0x10, ttl 64, id 44024, offset 0, flags [DF], proto: TCP (6), length: 40) inside-host.49899 &amp;gt; dmz-www-server.http: ., cksum 0xb4b1 (correct), 2:2(0) ack 2 win 46&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Notice the "nop,nop,nop,nop," where something (ASA?) is clearing the TCP timestamp option. Also note that this looks like the same method of clearing an option that the ASA uses to clear other TCP options, such as TCP option 19 for MD5 authentication.&lt;/DIV&gt;&lt;DIV&gt;&lt;BR /&gt;&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Here's the same test but from a neighboring device in the same DMZ segment as the same server (No firewall traversal):&lt;/DIV&gt;&lt;DIV&gt;&lt;BR /&gt;&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;&lt;DIV&gt;00:32:38.761460 IP (tos 0x10, ttl 64, id 46277, offset 0, flags [DF], proto: TCP (6), length: 52) dmz-host.50167 &amp;gt; dmz-www-server.http: S, cksum 0x0861 (correct), 1518129205:1518129205(0) win 5840 &lt;MSS 1460=""&gt;&lt;/MSS&gt;&lt;/DIV&gt;&lt;DIV&gt;00:32:38.761665 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto: TCP (6), length: 60) dmz-www-server.http &amp;gt; dmz-host.50167: S, cksum 0x0eef (correct), 2756096771:2756096771(0) ack 1518129206 win 5792 &lt;MSS 1460=""&gt;timestamp 21264880 1,nop,wscale 7&amp;gt;&lt;/MSS&gt;&lt;/DIV&gt;&lt;DIV&gt;00:32:38.761697 IP (tos 0x10, ttl 64, id 46278, offset 0, flags [DF], proto: TCP (6), length: 40) dmz-host.50167 &amp;gt; dmz-www-server.http: ., cksum 0x087a (correct), 1:1(0) ack 1 win 4600:32:38.761947 IP (tos 0x10, ttl 64, id 46279, offset 0, flags [DF], proto: TCP (6), length: 40) dmz-host.50167 &amp;gt; dmz-www-server.http: F, cksum 0x0879 (correct), 1:1(0) ack 1 win 46&lt;/DIV&gt;&lt;DIV&gt;00:32:38.762182 IP (tos 0x0, ttl 64, id 51956, offset 0, flags [DF], proto: TCP (6), length: 52) dmz-www-server.http &amp;gt; dmz-host.50167: F, cksum 0x542b (correct), 1:1(0) ack 2 win 46 &lt;NOP&gt;&lt;/NOP&gt;&lt;/DIV&gt;&lt;DIV&gt;00:32:38.762206 IP (tos 0x10, ttl 64, id 46280, offset 0, flags [DF], proto: TCP (6), length: 40) dmz-host.50167 &amp;gt; dmz-www-server.http: ., cksum 0x0878 (correct), 2:2(0) ack 2 win 46&lt;/DIV&gt;&lt;DIV&gt;&lt;BR /&gt;&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Notice the timestamp header in the first ack packet.&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Nov 2010 21:41:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unexpected-tcp-timestamp-option-cleared-in-server-s-response/m-p/1560159#M685211</guid>
      <dc:creator>bwallander</dc:creator>
      <dc:date>2010-11-10T21:41:28Z</dc:date>
    </item>
    <item>
      <title>Re: Unexpected TCP timestamp option cleared in server's response</title>
      <link>https://community.cisco.com/t5/network-security/unexpected-tcp-timestamp-option-cleared-in-server-s-response/m-p/1560160#M685212</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I see. I would like to see the back before and after traversing the FW just to make sure but it looks your are right.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please open a TAC case to have it looked at.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Nov 2010 21:49:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unexpected-tcp-timestamp-option-cleared-in-server-s-response/m-p/1560160#M685212</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-11-10T21:49:00Z</dc:date>
    </item>
    <item>
      <title>Re: Unexpected TCP timestamp option cleared in server's response</title>
      <link>https://community.cisco.com/t5/network-security/unexpected-tcp-timestamp-option-cleared-in-server-s-response/m-p/1560161#M685213</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you have any module (IPS) on this 5520?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Nov 2010 23:50:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unexpected-tcp-timestamp-option-cleared-in-server-s-response/m-p/1560161#M685213</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-11-10T23:50:41Z</dc:date>
    </item>
    <item>
      <title>Re: Unexpected TCP timestamp option cleared in server's response</title>
      <link>https://community.cisco.com/t5/network-security/unexpected-tcp-timestamp-option-cleared-in-server-s-response/m-p/1560162#M685214</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nope, no modules.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Nov 2010 00:31:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unexpected-tcp-timestamp-option-cleared-in-server-s-response/m-p/1560162#M685214</guid>
      <dc:creator>bwallander</dc:creator>
      <dc:date>2010-11-11T00:31:41Z</dc:date>
    </item>
    <item>
      <title>Re: Unexpected TCP timestamp option cleared in server's response</title>
      <link>https://community.cisco.com/t5/network-security/unexpected-tcp-timestamp-option-cleared-in-server-s-response/m-p/1560163#M685215</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&amp;amp;bugId=CSCsh83148"&gt;http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&amp;amp;bugId=CSCsh83148&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CSCsh83148&amp;nbsp;&amp;nbsp;&amp;nbsp; Tcp Timestamp unexpectedly set to 0 for flows reordered by the firewall&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It appears that you are running a code where the fix is present.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We really need to get ingress and egress captures on the firewall and look at them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Nov 2010 02:56:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unexpected-tcp-timestamp-option-cleared-in-server-s-response/m-p/1560163#M685215</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-11-11T02:56:43Z</dc:date>
    </item>
    <item>
      <title>Re: Unexpected TCP timestamp option cleared in server's response</title>
      <link>https://community.cisco.com/t5/network-security/unexpected-tcp-timestamp-option-cleared-in-server-s-response/m-p/1560164#M685216</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks KS. I actually came across that bug as well during my searches but it doesn't seem to match in this situation enough to be relevant. I am working on getting captures from the device and can provide them when and if they become available.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the meantime we're wondering if the TCP state bypass feature introduced in 8.2(1) might help things since it disables TCP normalization for those selected flows. For all I know 8.2 might even contain a fix in the normalizer without even needing to use this feature.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/conns_tcpstatebypass.html"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/conns_tcpstatebypass.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have any comment on this?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Nov 2010 16:03:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unexpected-tcp-timestamp-option-cleared-in-server-s-response/m-p/1560164#M685216</guid>
      <dc:creator>bwallander</dc:creator>
      <dc:date>2010-11-11T16:03:09Z</dc:date>
    </item>
    <item>
      <title>Re: Unexpected TCP timestamp option cleared in server's response</title>
      <link>https://community.cisco.com/t5/network-security/unexpected-tcp-timestamp-option-cleared-in-server-s-response/m-p/1560165#M685217</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Tcp state bypass will treat tcp packets as udp packets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You will not see this issue if this is indeed caused by the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, I agree with you. If infact there is some other defect that you are running into, the upgrade to 8.2 may resolve the issue as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'd upgrade and try without tcp state bypass. Before doing that I'd get ingress and egress captures and make sure that it is this ASA that is clearing the timestamps ingress to egress.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cap capin int inside match tcp any ho x.x.x.x eq 80&lt;/P&gt;&lt;P&gt;cap capout int outside match tcp any ho y.y.y.y eq 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;save the captures &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://ip_address/capture/capin/pcap"&gt;https://ip_address/capture/capin/pcap&lt;/A&gt;&lt;SPAN&gt; and &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://ip_address/capture/capout/pcap"&gt;https://ip_address/capture/capout/pcap&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Nov 2010 17:42:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unexpected-tcp-timestamp-option-cleared-in-server-s-response/m-p/1560165#M685217</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-11-11T17:42:45Z</dc:date>
    </item>
    <item>
      <title>Re: Unexpected TCP timestamp option cleared in server's response</title>
      <link>https://community.cisco.com/t5/network-security/unexpected-tcp-timestamp-option-cleared-in-server-s-response/m-p/1560166#M685218</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Buck,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is actually expected behavior. The server in this case is violating RFC 1323 that specifically states that the responder can only use TCP Timestamp option if the initiator used it initially:&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; A TCP may send the Timestamps option (TSopt) in an initial &lt;SYN&gt; segment (i.e., segment containing a SYN bit and no ACK bit), and may send a TSopt in other segments only if it received a TSopt in the initial &lt;SYN&gt; segment for the connection.&lt;/SYN&gt;&lt;/SYN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA is enforcing this compliance unconditionally even if the default TCP Normalizer action is to not clear Timestamp. Enabling TCP State Bypass for the flow should lift this restriction, but this may open you up to other TCP-based network attacks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Andrew&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Nov 2010 22:02:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unexpected-tcp-timestamp-option-cleared-in-server-s-response/m-p/1560166#M685218</guid>
      <dc:creator>Andrew Ossipov</dc:creator>
      <dc:date>2010-11-11T22:02:08Z</dc:date>
    </item>
    <item>
      <title>Re: Unexpected TCP timestamp option cleared in server's response</title>
      <link>https://community.cisco.com/t5/network-security/unexpected-tcp-timestamp-option-cleared-in-server-s-response/m-p/1560167#M685219</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Good find Andrew ! Again !&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Nov 2010 23:37:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unexpected-tcp-timestamp-option-cleared-in-server-s-response/m-p/1560167#M685219</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-11-11T23:37:24Z</dc:date>
    </item>
    <item>
      <title>Re: Unexpected TCP timestamp option cleared in server's response</title>
      <link>https://community.cisco.com/t5/network-security/unexpected-tcp-timestamp-option-cleared-in-server-s-response/m-p/1560168#M685220</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Perfect, thank you Andrew. This is exactly what I was looking for. We're planning for an upgrade to 8.2(2) however it might take a few weeks to get clearance approval. Will let you know however.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you to EVERYONE for your help! &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Buck&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Nov 2010 16:01:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unexpected-tcp-timestamp-option-cleared-in-server-s-response/m-p/1560168#M685220</guid>
      <dc:creator>bwallander</dc:creator>
      <dc:date>2010-11-12T16:01:06Z</dc:date>
    </item>
  </channel>
</rss>

