<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic TCP timestamp response on MGMNT IP in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/tcp-timestamp-response-on-mgmnt-ip/m-p/384943#M1067</link>
    <description>&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;In my case, the team is performing a vulnerability assessment on PA820&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;&lt;STRONG&gt;Vulnerability Title:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;TCP timestamp response.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;&lt;STRONG&gt;Description:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;The remote host responded with a TCP timestamp. The TCP timestamp response can be used to approximate the remote host's uptime, potentially aiding in further attacks. Additionally, some operating systems can be fingerprinted based on the behavior of their TCP timestamps.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;The scanning was running to the MGMT IP,&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;How to disable the timestamp response.&lt;/STRONG&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 10 Feb 2021 06:38:51 GMT</pubDate>
    <dc:creator>Mohammed_Yasin</dc:creator>
    <dc:date>2021-02-10T06:38:51Z</dc:date>
    <item>
      <title>TCP timestamp response on MGMNT IP</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/tcp-timestamp-response-on-mgmnt-ip/m-p/384943#M1067</link>
      <description>&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;In my case, the team is performing a vulnerability assessment on PA820&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;&lt;STRONG&gt;Vulnerability Title:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;TCP timestamp response.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;&lt;STRONG&gt;Description:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;The remote host responded with a TCP timestamp. The TCP timestamp response can be used to approximate the remote host's uptime, potentially aiding in further attacks. Additionally, some operating systems can be fingerprinted based on the behavior of their TCP timestamps.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;The scanning was running to the MGMT IP,&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;How to disable the timestamp response.&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Feb 2021 06:38:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/tcp-timestamp-response-on-mgmnt-ip/m-p/384943#M1067</guid>
      <dc:creator>Mohammed_Yasin</dc:creator>
      <dc:date>2021-02-10T06:38:51Z</dc:date>
    </item>
    <item>
      <title>Re: TCP timestamp response on MGMNT IP</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/tcp-timestamp-response-on-mgmnt-ip/m-p/397043#M1112</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/131110"&gt;@Mohammed_Yasin&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A zone protection profile should help alleviate the problem. For the mgmt IP, a change in network may be needed where it is connected to a switch and then the traffic is routed through one of the data interfaces where the zone protection profile is enabled with relevant TCP options enabled.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/threat-prevention/best-practices-for-securing-your-network-from-layer-4-and-layer-7-evasions.html" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/threat-prevention/best-practices-for-securing-your-network-from-layer-4-and-layer-7-evasions.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope this helps&lt;/P&gt;
&lt;P&gt;Yogesh&lt;/P&gt;</description>
      <pubDate>Sat, 10 Apr 2021 03:33:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/tcp-timestamp-response-on-mgmnt-ip/m-p/397043#M1112</guid>
      <dc:creator>ydhanuka</dc:creator>
      <dc:date>2021-04-10T03:33:48Z</dc:date>
    </item>
    <item>
      <title>Re: TCP timestamp response on MGMNT IP</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/tcp-timestamp-response-on-mgmnt-ip/m-p/404709#M1139</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;@&lt;A href="https://www.myprepaidcenter.bid/" target="_self"&gt;MyPrepaidCente&amp;nbsp;&lt;/A&gt; wrote:&lt;BR /&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;In my case, the team is performing a vulnerability assessment on PA820&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;&lt;STRONG&gt;Vulnerability Title:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;TCP timestamp response.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;&lt;STRONG&gt;Description:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;The remote host responded with a TCP timestamp. The TCP timestamp response can be used to approximate the remote host's uptime, potentially aiding in further attacks. Additionally, some operating systems can be fingerprinted based on the behavior of their TCP timestamps.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;The scanning was running to the MGMT IP,&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;How to disable the timestamp response.&lt;/STRONG&gt;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;According to RFC 1323 (TCP Extensions for High Performance) TCP Timestamp is used for two main mechanisms:&lt;/P&gt;&lt;P&gt;PAWS (Protect Against Wrapped Sequence)&lt;BR /&gt;RTT (Round Trip Time)&lt;BR /&gt;PAWS - defense mechanism for identification and rejection of packets that arrived in other wrapping sequence (data integrity).&lt;/P&gt;&lt;P&gt;Round Trip Time - time for packet to get to the destination and sent acknowledgment back to the device it originated.&lt;/P&gt;</description>
      <pubDate>Wed, 05 May 2021 08:55:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/tcp-timestamp-response-on-mgmnt-ip/m-p/404709#M1139</guid>
      <dc:creator>Jeffrey454</dc:creator>
      <dc:date>2021-05-05T08:55:44Z</dc:date>
    </item>
    <item>
      <title>Re: TCP timestamp response on MGMNT IP</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/tcp-timestamp-response-on-mgmnt-ip/m-p/404824#M1140</link>
      <description>&lt;P&gt;I verified that you can estimate the uptime of the firewall by running:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;nmap -d -v -O &amp;lt;mgmt_ipaddress&amp;gt;&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To mitigate this, move the management-interface to a data port, and tie a Zone Protection profile with the option&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Packet Based Attack Protection &amp;gt; TCP Drop &amp;gt; Strip TCP Options &amp;gt; TCP Timestamp (check)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A fix would be to add an option in PAN-OS to enable/disable TCP Timestamps in the management interface (toggle the value of&amp;nbsp;&lt;SPAN&gt;net.ipv4.tcp_timestamps).&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Disabling the option can be achieved by editing the firewall's /etc/sysctl.conf file, and adding value ipv4.tcp_timestamps=0&amp;nbsp;&lt;/SPAN&gt;( I am with TAC and I verified this by going into root in the firewall in our lab and then running a new scan, which now shows clean).&amp;nbsp;&lt;SPAN class="s1"&gt;This will require a Feature Request, please involve your Palo Alto Networks SE to 'vote up' on FR ID: 10815.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 13 May 2021 16:56:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/tcp-timestamp-response-on-mgmnt-ip/m-p/404824#M1140</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2021-05-13T16:56:27Z</dc:date>
    </item>
  </channel>
</rss>

