01-17-2019 11:21 PM - edited 01-17-2019 11:22 PM
I would like to ssek your assistance on the following vunerability:
TCP timestamp response (generic-tcp-timestamp)
The remote host responded with a TCP timestamp. The TCP timestamp response can be used to approximate the remote host's uptime, potentially aiding in further attacks. Additionally, some operating systems can be fingerprinted based on the behavior of their TCP timestamps.
Is there any documentation or guide to disable the TCP timestamp on Infoblox appliances? Is this the best practise recommended by Infoblox?
Solved! Go to Solution.
01-18-2019 12:37 AM - edited 01-18-2019 12:41 AM
I believe the feature to disable TCP timestamps is coming in nios 8.4.
I would a suggest contacting your SE for more info on this feature and the pros and cons to using it.
01-18-2019 01:12 AM
This is absolutely true that the TCP timestamp response can be used to approximate the remote host's uptime.
<External link removed -Moderator>