THREAT:ICMP (Internet Control and Error Message Protocol) is a protocol encapsulated in IP packets. It's principal purpose is to provide a protocollayer able to inform gateways of the inter-connectivity and accessibility of other gateways or hosts. "ping" is a well-known programfor determining if a host is up or down. It uses ICMP echo packets. ICMP timestamp packets are used to synchronize clocks between hosts.IMPACT:Unauthorized users can obtain information about your network by sending ICMP timestamp packets. For example, the internal systems clock shouldnot be disclosed since some internal daemons use this value to calculate ID or sequence numbers (i.e., on SunOS servers).SOLUTION:You can filter ICMP messages of type "Timestamp" and "Timestamp Reply" at the firewall level. Some system administrators choose to filter mosttypes of ICMP messages for various reasons. For example, they may want to protect their internal hosts from ICMP-based Denial Of Serviceattacks, such as the Ping of Death or Smurf attacks.However, you should never filter ALL ICMP messages, as some of them ("Don't Fragment", "Destination Unreachable", "Source Quench", etc) arenecessary for proper behavior of Operating System TCP/IP stacks.It may be wiser to contact your network consultants for advice, since this issue impacts your overall network reliability and security.COMPLIANCE:Not ApplicableEXPLOITABILITY:There is no exploitability information for this vulnerability.ASSOCIATED MALWARE:There is no malware information for this vulnerability.RESULTS:Timestamp of host (network byte ordering): 07:04:20 GMT
SENT (0.0778s) ICMP [x.x.x.x > x.x.x.x Timestamp request (type=13/code=0) id=33558 seq=1 orig=0 recv=0 trans=0] IP [ttl=64 id=17362 iplen=40 ]RCVD (0.0961s) ICMP [x.x.x.x > x.x.x.x Timestamp reply (type=14/code=0) id=33558 seq=1 orig=0 recv=26415483 trans=26415483] IP [ttl=56 id=32442 iplen=40 ]SENT (1.0784s) ICMP [x.x.x.x > x.x.x.x Timestamp request (type=13/code=0) id=33558 seq=2 orig=0 recv=0 trans=0] IP [ttl=64 id=17362 iplen=40 ]RCVD (1.1052s) ICMP [x.x.x.x > x.x.x.x Timestamp reply (type=14/code=0) id=33558 seq=2 orig=0 recv=26416492 trans=26416492] IP [ttl=56 id=62727 iplen=40 ]
SENT (0.0507s) ICMP [10.1.0.132 > x.x.x.x Timestamp request (type=13/code=0) id=12408 seq=1 orig=0 recv=0 trans=0] IP [ttl=64 id=15721 iplen=40 ]SENT (1.0509s) ICMP [10.1.0.132 > x.x.x.x Timestamp request (type=13/code=0) id=12408 seq=2 orig=0 recv=0 trans=0] IP [ttl=64 id=15721 iplen=40 ]
I created an "ICMP" "Timestamp" block before the general "ICMP" "any" allow rule. Now I can send timestamp requests using nping but don't get a reply anymore.