TCP1323Opts question - TCP Timestamps
Hi,
We have to be PCI-DSS compliant and have several Windows servers running ISA and TMG.
We have:
Win 2K with ISA 2000 (on it's way out)
Win 2K3 with ISA 2006
Win 2K8 R2 with TMG 2010
All of these servers, in the registry have TCP1323Opts set to '0' as per
http://technet.microsoft.com/en-us/library/cc938205.aspx to disable TCP Timestamps.
This is confirmed using Netsh where RFC 1323 Timestamps : disabled
However, for PCI-DSS compliance we have to run vulnerability scans.
Although only informational, all these servers come back as giving Timestamp replies.
Although vulnerabilities due to this are minimal, from the timestamp is can be calculated how long a server has been running and therefore you can work out if it is missing the latest patches due to a lack of a reboot.
I'm mainly puzzled as to why this is showing up when it is meant to be disabled.
I've searched high and low across the Internet and can't find anything apart from the instructions as to how to change that reg entry.
Do I need to do anything extra for the driver or something?
Any help appreciated,
Adrian
October 22nd, 2010 3:47am
Hi,
Thanks for the post.
Please check if you add the Tcp1323Opts registry key as follows:
Tcp1323Opts
Key: Tcpip\Parameters
Value Type: REG_DWORD—number (flags)
Valid Range: 0 or 2
0 (disable the use of the TCP timestamps option)
2 (enable the use of the TCP timestamps option)
Default: No value.
Description:
This value controls the use of the RFC 1323 TCP Timestamp option. The default behavior of the TCP/IP stack is to not use the Timestamp options when initiating TCP connections, but use them if the TCP peer that is initiating
communication includes them in their synchronize (SYN) segment.
For more information about TCP/IP Registry Values, you could access this link:
http://download.microsoft.com/download/c/2/6/c26893a6-46c7-4b5c-b287-830216597340/tcpip_reg.doc
Hope this helps.
MilesPlease remember to click Mark as Answer on the post that helps you, and to click Unmark as Answer if a marked post does not actually answer your question. This can be beneficial to other community members reading the thread.
Free Windows Admin Tool Kit Click here and download it now
October 25th, 2010 3:54am
Hi,
Sorry about the late reply, I've been on holiday.
Unfortunately I've got the Tcp1323Opts option set to 0 but the PCI-DSS vulnerability tests we have done still show timestamps.
I'm stumped...
November 2nd, 2010 9:28am
Any progress on this issue? I am seeing the same results with the registry entry set to 0 and netsh results show it as disabled but the PCI scan is showing it enabled. Any insight would be appreciated.
Free Windows Admin Tool Kit Click here and download it now
March 23rd, 2011 4:40pm
Sounds stupid, but verify/set the Tcp1323Opts=0 in CurrentControlSet001, 002, etc as well. I've seen weird stuff like that before
March 23rd, 2011 10:41pm
Sorry to jump on someone else's thread but i'm also having this issue. I've verified Tcp1323Opts=0 is set in all CurrentControlSets correctly, and using netsh it's showing as disabled but our PCI scans are still reporting it's enabled (as are our Nessus
scans).
Any information anyone can give would be very helpful
Thanks
Free Windows Admin Tool Kit Click here and download it now
April 8th, 2011 5:21am
This answer does not seem adequate when several of us have the same issue and still have a flag reported by the PCI compliance scan. Someone suggested setting the parameters in the other control sets (beyond current control set). No one has
mentioned also setting the parameters for IPv6, does it matter? I have added it to all these places and will let you know the result of my next scan.
April 15th, 2011 12:16pm
Failed again... any other registry settings we need to change related to this?
Free Windows Admin Tool Kit Click here and download it now
April 21st, 2011 11:32am
I'm having this same issue. Any updates on this thread?
July 8th, 2011 1:16pm
We never succeeded with an automated PCI compliance scan even after making all the suggested changes by the vendor and Microsoft. We finally got resolution by contacting the vendor running the scan for us and making a manual exception to override
the results and we passed. So I can only suggest you do the same and hopefully your compliance vendor will give you approval.
Free Windows Admin Tool Kit Click here and download it now
July 8th, 2011 2:04pm