1. Home
  2. Network Vulnerabilities
  3. How to remediate – TCP/IP Timestamps Supported

How to remediate – TCP/IP Timestamps Supported

1. Introduction

The TCP/IP Timestamps Supported feature implements RFC1323 timestamps on network connections. This allows anyone able to observe traffic to estimate the uptime of a system. While generally low impact, this information can assist attackers in reconnaissance and potentially inform further attacks. Systems running any TCP/IP stack are usually affected. Likely impact is limited to confidentiality; integrity and availability are not directly threatened.

2. Technical Explanation

The remote host has enabled TCP timestamps as part of its TCP/IP implementation. This feature adds a timestamp field to each TCP packet, allowing for more accurate measurements of round-trip time. However, it also reveals the system’s uptime since boot. An attacker can passively observe network traffic and calculate this uptime, potentially identifying systems that have been running for extended periods without patching or reboots. There is no specific CVE associated with simply having timestamps enabled; it’s a configuration detail rather than a flaw. As an example, an attacker could use Wireshark to capture TCP packets from the target system and analyse the timestamp values.

  • Root cause: The TCP/IP stack is configured to support RFC1323 timestamps.
  • Exploit mechanism: An attacker passively captures network traffic containing TCP packets with timestamps, then calculates the host’s uptime based on these values.
  • Scope: Any system running a TCP/IP stack that supports RFC1323 timestamps is affected, including Windows, Linux, macOS, and networking equipment.

3. Detection and Assessment

You can confirm if a system is vulnerable by checking its network configuration or capturing live traffic. A quick check involves examining the TCP options in a packet capture.

  • Quick checks: Use Wireshark to capture packets from the target system, then filter for `tcp.analysis.flags` and look for the presence of timestamps.
  • Scanning: Nmap can detect this feature using script `tcp-timestamps`. Example: nmap -p 80 --script tcp-timestamps .
  • Logs and evidence: Network traffic captures will show TCP packets with the timestamp option set.
wireshark -i eth0 capture -w output.pcap; wireshark -r output.pcap tcp.analysis.flags contains "A"

4. Solution / Remediation Steps

Disabling TCP timestamps is the primary remediation step. This requires a system reboot to take effect.

4.1 Preparation

  • The roll back plan involves restoring from the snapshot or reverting the configuration change and rebooting.
  • A planned maintenance window is recommended, with approval from relevant IT teams.

4.2 Implementation

  1. Step 1: On Linux systems, edit `/etc/sysctl.conf` and add `net.ipv4.tcp_timestamps = 0`.
  2. Step 2: Apply the change with sudo sysctl -p.
  3. Step 3: Reboot the system for the changes to take effect.

4.3 Config or Code Example

Before

# /etc/sysctl.conf
net.ipv4.tcp_timestamps = 1

After

# /etc/sysctl.conf
net.ipv4.tcp_timestamps = 0

4.4 Security Practices Relevant to This Vulnerability

  • Practice 1: Least privilege can limit the impact of information disclosure if an attacker gains access to network traffic data.
  • Practice 2: Regular system patching and reboots reduce the time window during which this information is available.

4.5 Automation (Optional)

#!/bin/bash
# This script disables TCP timestamps on Linux systems.
sudo sysctl -w net.ipv4.tcp_timestamps=0
echo "net.ipv4.tcp_timestamps = 0" | sudo tee -a /etc/sysctl.conf
sudo reboot

5. Verification / Validation

  • Post-fix check: Use Wireshark to capture packets from the target system and verify that `tcp.analysis.flags` does not contain “A”.
  • Re-test: Re-run the earlier Wireshark test to confirm timestamps are disabled.
  • Smoke test: Verify basic network connectivity (ping, web browsing) still functions as expected.
  • Monitoring: Monitor network traffic for unexpected TCP flags or patterns that might indicate a regression. Example: alert on any packets with `tcp.analysis.flags` containing “A”.
wireshark -i eth0 capture -w output.pcap; wireshark -r output.pcap tcp.analysis.flags contains "A" # Should return no results

6. Preventive Measures and Monitoring

  • Baselines: Update security baselines to include a setting for disabling TCP timestamps, such as through CIS controls or group policy.
  • Pipelines: Include checks in CI/CD pipelines to ensure systems are configured with secure defaults, including disabled TCP timestamps.
  • Asset and patch process: Implement a regular patch cycle and system reboot schedule to minimize the time window of exposure.

7. Risks, Side Effects, and Roll Back

  • Risk or side effect 1: Disabling TCP timestamps may slightly reduce network performance in some cases, although this is usually negligible.
  • Roll back: Restore the original configuration by editing `/etc/sysctl.conf` and setting `net.ipv4.tcp_timestamps = 1`, then rebooting the system.

8. References and Resources

  • Vendor advisory or bulletin: N/A – this is a configuration detail, not a vendor-specific vulnerability.
  • NVD or CVE entry: N/A – no specific CVE exists for simply enabling TCP timestamps.
  • Product or platform documentation relevant to the fix: https://www.kernel.org/doc/html/latest/networking/tcp.html
Updated on December 27, 2025

Was this article helpful?

Related Articles