<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SPLAT R75.40 - disable TCP / ICMP timestamp in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/SPLAT-R75-40-disable-TCP-ICMP-timestamp/m-p/10182#M1423</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We were under audit and one of the finding is a TCP and ICMP timestamp response vulnerability/risk. The auditors recommend to turn TCP and ICMP timestamp off.&lt;/P&gt;&lt;P&gt;Does someone know how to do it and if there will be some "side effects"?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;Stefano.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 25 Oct 2018 09:14:36 GMT</pubDate>
    <dc:creator>Stefano_Chiesa</dc:creator>
    <dc:date>2018-10-25T09:14:36Z</dc:date>
    <item>
      <title>SPLAT R75.40 - disable TCP / ICMP timestamp</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SPLAT-R75-40-disable-TCP-ICMP-timestamp/m-p/10182#M1423</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We were under audit and one of the finding is a TCP and ICMP timestamp response vulnerability/risk. The auditors recommend to turn TCP and ICMP timestamp off.&lt;/P&gt;&lt;P&gt;Does someone know how to do it and if there will be some "side effects"?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;Stefano.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Oct 2018 09:14:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SPLAT-R75-40-disable-TCP-ICMP-timestamp/m-p/10182#M1423</guid>
      <dc:creator>Stefano_Chiesa</dc:creator>
      <dc:date>2018-10-25T09:14:36Z</dc:date>
    </item>
    <item>
      <title>Re: SPLAT R75.40 - disable TCP / ICMP timestamp</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SPLAT-R75-40-disable-TCP-ICMP-timestamp/m-p/10183#M1424</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI Stefano,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you can find all timestamp services via the integrated search function of your SmartDashboard:&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="72390" class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/72390_pastedImage_1.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You've probably allowed icmp pings by permitting the entire icmp protocol suite, including timestamps:&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="72391" class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/72391_pastedImage_2.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just replace &lt;EM&gt;icmp-proto&lt;/EM&gt; with &lt;EM&gt;echo-request&lt;/EM&gt; like this:&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="72398" class="image-3 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/72398_pastedImage_5.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I wonder why your internal audit didn't note that &lt;A href="https://www.checkpoint.com/support-services/support-life-cycle-policy/"&gt;R75.40 is a version that went out of support in April 2016&lt;/A&gt;. You should consider upgrading to a more recent release, such as R77.30 or higher.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Oct 2018 12:01:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SPLAT-R75-40-disable-TCP-ICMP-timestamp/m-p/10183#M1424</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2018-10-25T12:01:39Z</dc:date>
    </item>
    <item>
      <title>Re: SPLAT R75.40 - disable TCP / ICMP timestamp</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SPLAT-R75-40-disable-TCP-ICMP-timestamp/m-p/10184#M1425</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Danny, &lt;SPAN class="" lang="en"&gt;&lt;SPAN&gt;thanks for the greetings.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Oct 2018 12:06:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SPLAT-R75-40-disable-TCP-ICMP-timestamp/m-p/10184#M1425</guid>
      <dc:creator>Stefano_Chiesa</dc:creator>
      <dc:date>2018-10-25T12:06:19Z</dc:date>
    </item>
    <item>
      <title>Re: SPLAT R75.40 - disable TCP / ICMP timestamp</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SPLAT-R75-40-disable-TCP-ICMP-timestamp/m-p/10185#M1426</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks a lot Danny, I'll try this solution. &lt;/P&gt;&lt;P&gt;Let me say that the most up-to-date clusters are R75.40 but there is a R65 HFA 70 cluster in production too.. &lt;img id="smileysad" class="emoticon emoticon-smileysad" src="https://community.checkpoint.com/i/smilies/16x16_smiley-sad.png" alt="Smiley Sad" title="Smiley Sad" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again.&lt;/P&gt;&lt;P&gt;Stefano.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Oct 2018 14:12:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SPLAT-R75-40-disable-TCP-ICMP-timestamp/m-p/10185#M1426</guid>
      <dc:creator>Stefano_Chiesa</dc:creator>
      <dc:date>2018-10-25T14:12:32Z</dc:date>
    </item>
    <item>
      <title>Re: SPLAT R75.40 - disable TCP / ICMP timestamp</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SPLAT-R75-40-disable-TCP-ICMP-timestamp/m-p/10186#M1427</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;SPAN class=""&gt;&lt;A _jive_internal="true" data-userid="64700" data-username="b8ad04d0-95be-311c-8182-bd6214571d75" href="https://community.checkpoint.com/people/b8ad04d0-95be-311c-8182-bd6214571d75"&gt;Stefano,&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;I do a lot of security audits at our company. I think the timstamp problem is the smallest.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;The following vulnerabilities should occur with R65HFA 70 and possibly R75.40:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;- SHA1 vulnerabilities&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;- RC4 vulnerabilities&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;- poodle vulnerabilitys&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;and and and&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;I agree with &lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&lt;A _jive_internal="true" class="" data-userid="41735" data-username="917b8439-9d5c-34f0-b86a-f0e1b0a14cbd" href="https://community.checkpoint.com/people/917b8439-9d5c-34f0-b86a-f0e1b0a14cbd"&gt;Danny&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt; here. I should urgently upgrade the systems to R77.30 or higher.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;Heiko&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Oct 2018 17:29:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SPLAT-R75-40-disable-TCP-ICMP-timestamp/m-p/10186#M1427</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2018-10-25T17:29:02Z</dc:date>
    </item>
    <item>
      <title>Re: SPLAT R75.40 - disable TCP / ICMP timestamp</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SPLAT-R75-40-disable-TCP-ICMP-timestamp/m-p/219232#M36530</link>
      <description>&lt;P&gt;Hi. Any idea how to disable the same but on MDS smart center or log server, for local vulnerability scanner, where there is no firewall in between?&amp;nbsp;&lt;BR /&gt;Edit: Have also some Eventia Reporter servers with same "issue", for which I can not even open smart console directly.&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jul 2024 06:47:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SPLAT-R75-40-disable-TCP-ICMP-timestamp/m-p/219232#M36530</guid>
      <dc:creator>Itri</dc:creator>
      <dc:date>2024-07-01T06:47:41Z</dc:date>
    </item>
    <item>
      <title>Re: SPLAT R75.40 - disable TCP / ICMP timestamp</title>
      <link>https://community.checkpoint.com/t5/General-Topics/SPLAT-R75-40-disable-TCP-ICMP-timestamp/m-p/219307#M36542</link>
      <description>&lt;P&gt;That requires disabling them at the OS level.&lt;BR /&gt;For TCP timestamps:&amp;nbsp;sysctl -w net.ipv4.tcp_timestamps=0&lt;BR /&gt;For ICMP, I'm not sure it's relevant or not and would recommend engaging TAC: &lt;A href="https://help.checkpoint.com" target="_blank"&gt;https://help.checkpoint.com&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jul 2024 18:50:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/SPLAT-R75-40-disable-TCP-ICMP-timestamp/m-p/219307#M36542</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-07-01T18:50:41Z</dc:date>
    </item>
  </channel>
</rss>

