<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PIX randomizing TCP sequence in ICMP Frag packets in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-randomizing-tcp-sequence-in-icmp-frag-packets/m-p/1009027#M941367</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The PIX altering the initial sequence number of the TCP SYN segment sent by the server is the normal (default) behavior for packets going from a higher security interface to a lower security interface (like in your case.) When going from a lower security interface to a higher security interface, the PIX does not randomize the initial sequence number. You are correct that Linux/Unix will drop ICMP messages that have TCP sequence numbers that fall outside the expected range, i.e. packets that have been sent and not yet acknowledged (in-flight packets). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As a resolution the PIX can be told to not to randomization of the TCP sequence number by adding the "norandomseq" keyword to the "nat" statements.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 13 Mar 2008 14:16:51 GMT</pubDate>
    <dc:creator>amritpatek</dc:creator>
    <dc:date>2008-03-13T14:16:51Z</dc:date>
    <item>
      <title>PIX randomizing TCP sequence in ICMP Frag packets</title>
      <link>https://community.cisco.com/t5/network-security/pix-randomizing-tcp-sequence-in-icmp-frag-packets/m-p/1009026#M941365</link>
      <description>&lt;P&gt;I have a PIX-515E, Software Version 7.2(1) with NAT disabled, in router mode, and almost all inspection off. REcently i noticed that PIX randomizing TCP sequence in ICMP Frag embedded message, that is last 4 bytes of the packet. Looks like windows hosts are okay with that, BUT i have some unix boxes and looks like they use TCP Seq header part for PathMTU discovery process. Is there some way to disable this randomization?&lt;/P&gt;&lt;P&gt;Here is tcpdump of packet before and after passing PIX:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this is packet from router with lower mtu just before PIX&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10:32:54.775244 00:1c:f6:2e:4b:6f &amp;gt; 00:1d:45:21:a6:51, ethertype IPv4 (0x0800), length 70: (tos 0x0, ttl 255, id 18463, offset 0, flags [none],&lt;/P&gt;&lt;P&gt;proto: ICMP (1), length: 56) 10.23.5.3 &amp;gt; 10.23.0.241: ICMP 10.35.1.3 unreachable - need to frag (mtu 1280), length 36&lt;/P&gt;&lt;P&gt;        (tos 0x8, ttl  61, id 2080, offset 0, flags [DF], proto: TCP (6),&lt;/P&gt;&lt;P&gt;length: 1420) 10.23.0.241.22 &amp;gt; 10.35.1.3.64856:  tcp 1384 [bad hdr length 16&lt;/P&gt;&lt;P&gt;- too short, &amp;lt; 20]&lt;/P&gt;&lt;P&gt;        0x0000:  4500 0038 481f 0000 ff01 5984 0a17 0503  E..8H.....Y.....&lt;/P&gt;&lt;P&gt;        0x0010:  0a17 00f1 0304 bdf6 0000 0500 4508 058c  ............E...&lt;/P&gt;&lt;P&gt;        0x0020:  0820 4000 3d06 1a17 0a17 00f1 0a23 0103  ..@.=........#..&lt;/P&gt;&lt;P&gt;        0x0030:  0016 fd58 2723 1573                      ...X'#.s&lt;/P&gt;&lt;P&gt;--------------------------^^^^^^^^^^^&lt;/P&gt;&lt;P&gt;note the bytes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and this is the same packet _after_ PIX&lt;/P&gt;&lt;P&gt;10:32:54.775492 00:1d:45:21:a6:52 &amp;gt; 00:1b:78:e3:c7:66, ethertype IPv4 (0x0800), length 70: (tos 0x0, ttl 255, id 18463, offset 0, flags [none],&lt;/P&gt;&lt;P&gt;proto: ICMP (1), length: 56) 10.23.5.3 &amp;gt; 10.23.0.241: ICMP 10.35.1.3 unreachable - need to frag (mtu 1280), length 36&lt;/P&gt;&lt;P&gt;        (tos 0x8, ttl  61, id 2080, offset 0, flags [DF], proto: TCP (6),&lt;/P&gt;&lt;P&gt;length: 1420) 10.23.0.241.22 &amp;gt; 10.35.1.3.64856:  tcp 1400 [bad hdr length 0&lt;/P&gt;&lt;P&gt;- too short, &amp;lt; 20]&lt;/P&gt;&lt;P&gt;        0x0000:  4500 0038 481f 0000 ff01 5984 0a17 0503  E..8H.....Y.....&lt;/P&gt;&lt;P&gt;        0x0010:  0a17 00f1 0304 a065 0000 0500 4508 058c  .......e....E...&lt;/P&gt;&lt;P&gt;        0x0020:  0820 4000 3d06 1a17 0a17 00f1 0a23 0103  ..@.=........#..&lt;/P&gt;&lt;P&gt;        0x0030:  0016 fd58 2e89 2b9e                      ...X..+.&lt;/P&gt;&lt;P&gt;---------------------------^^^^^^^^^&lt;/P&gt;&lt;P&gt;bytes changed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 12:13:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-randomizing-tcp-sequence-in-icmp-frag-packets/m-p/1009026#M941365</guid>
      <dc:creator>sergey.klusov</dc:creator>
      <dc:date>2019-03-11T12:13:46Z</dc:date>
    </item>
    <item>
      <title>Re: PIX randomizing TCP sequence in ICMP Frag packets</title>
      <link>https://community.cisco.com/t5/network-security/pix-randomizing-tcp-sequence-in-icmp-frag-packets/m-p/1009027#M941367</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The PIX altering the initial sequence number of the TCP SYN segment sent by the server is the normal (default) behavior for packets going from a higher security interface to a lower security interface (like in your case.) When going from a lower security interface to a higher security interface, the PIX does not randomize the initial sequence number. You are correct that Linux/Unix will drop ICMP messages that have TCP sequence numbers that fall outside the expected range, i.e. packets that have been sent and not yet acknowledged (in-flight packets). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As a resolution the PIX can be told to not to randomization of the TCP sequence number by adding the "norandomseq" keyword to the "nat" statements.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Mar 2008 14:16:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-randomizing-tcp-sequence-in-icmp-frag-packets/m-p/1009027#M941367</guid>
      <dc:creator>amritpatek</dc:creator>
      <dc:date>2008-03-13T14:16:51Z</dc:date>
    </item>
    <item>
      <title>Re: PIX randomizing TCP sequence in ICMP Frag packets</title>
      <link>https://community.cisco.com/t5/network-security/pix-randomizing-tcp-sequence-in-icmp-frag-packets/m-p/1009028#M941370</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for reply.&lt;/P&gt;&lt;P&gt;Actually i solved this issue by specifying this:&lt;/P&gt;&lt;P&gt;class-map global-class&lt;/P&gt;&lt;P&gt; match any&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global-policy&lt;/P&gt;&lt;P&gt; class global-class&lt;/P&gt;&lt;P&gt;  set connection random-sequence-number disable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;as i said before, i have NAT disabled.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Mar 2008 04:42:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-randomizing-tcp-sequence-in-icmp-frag-packets/m-p/1009028#M941370</guid>
      <dc:creator>sergey.klusov</dc:creator>
      <dc:date>2008-03-14T04:42:07Z</dc:date>
    </item>
  </channel>
</rss>

