Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 517246 - sys-apps/baselayout: tcp timestamps enabled
Summary: sys-apps/baselayout: tcp timestamps enabled
Status: RESOLVED WONTFIX
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Default Configs (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL:
Whiteboard: A3 [ebuild]
Keywords:
Depends on:
Blocks:
 
Reported: 2014-07-16 14:33 UTC by Agostino Sarubbo
Modified: 2014-07-31 17:55 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2014-07-16 14:33:59 UTC
During a scan with openvas. every gentoo install has this problem.




It was detected that the host implements RFC1323.

The following timestamps were retrieved with a delay of 1 seconds in-between:
Paket 1: 321774380
Paket 2: 321774480

Impact:
A side effect of this feature is that the uptime of the remote host can sometimes be computed.
Solution

To disable TCP timestamps on linux add the line 'net.ipv4.tcp_timestamps = 0' to /etc/sysctl.conf. Execute 'sysctl -p' to apply the settings at runtime.

To disable TCP timestamps on Windows execute 'netsh int tcp set global timestamps=disabled'

Starting with Windows Server 2008 and Vista, the timestamp can not be completely disabled.

The default behavior of the TCP/IP stack on this Systems is, to not use the Timestamp options when initiating TCP connections, but use them if the TCP peer that is initiating communication includes them in their synchronize (SYN) segment.

See also: http://www.microsoft.com/en-us/download/details.aspx?id=9152

Vulnerability Insight:
The remote host implements TCP timestamps, as defined by RFC1323.

Vulnerability Detection Method:
Special IP packets are forged and sent with a little delay in between to the target IP. The responses are searched for a timestamps. If found, the timestamps are reported.

References:
Other: 	http://www.ietf.org/rfc/rfc1323.txt
Comment 1 Agostino Sarubbo gentoo-dev 2014-07-16 14:43:11 UTC
Discussed with WilliamH before open the bug. I guess is not needed have it as restricted.
Comment 2 Chris Reffett (RETIRED) gentoo-dev Security 2014-07-16 14:44:56 UTC
This isn't A3, there's no potential for DoS here. It might _barely_ qualify as A4, info disclosure, but I'm not seeing major problems coming from an attacker guessing uptime.
Comment 3 William Hubbs gentoo-dev 2014-07-16 14:47:05 UTC
Security team, do you think I should do a revbump with a patch for this,
or should we wait for vapier to return in August to finish converting
the baselayout source tree from svn to git?
Comment 4 Alex Xu (Hello71) 2014-07-16 15:04:16 UTC
http://stackoverflow.com/questions/7880383/what-benefit-is-conferred-by-tcp-timestamp

http://wayback.archive.org/web/20131123045853/http://www.localhost.re/p/solusvm-whmcs-module-316-vulnerability

honestly, I wouldn't disable it for all gentoo machines. maybe put it in the security handbook at most.
Comment 5 Yury German Gentoo Infrastructure gentoo-dev 2014-07-16 23:57:40 UTC
Based on my understanding the timestamp in the packets is used for fingerprinting by automated scanners. This is purely information and will not tell the "Attacker" anything other then Linux is the operating system. 

As far as I know you can not perform any active attacks against this. 

This can also be turned off via:
sysctl -w net.ipv4.tcp_timestamps=0 

I would probably recommend that we ask the hardened project to add it to their Wiki? 

I personally do not see any Risk in identifying the system as Linux (without specific flavor of Linux).
Comment 6 SpanKY gentoo-dev 2014-07-31 13:37:36 UTC
i'm not seeing a problem here that needs addressing in the default sysctl.conf.  maybe hardened, but only because they are pessimistic about never giving an answer to anything rather than this being a known problem.
Comment 7 Yury German Gentoo Infrastructure gentoo-dev 2014-07-31 17:55:57 UTC
(In reply to SpanKY from comment #6)
> i'm not seeing a problem here that needs addressing in the default
> sysctl.conf.  maybe hardened, but only because they are pessimistic about
> never giving an answer to anything rather than this being a known problem.

Agreed .... closing as WONTFIX since it is a security guidance and not a vulnerability directly.

If someone has objections please advise.