OPNsense
  • Home
  • Help
  • Search
  • Login
  • Register

  • OPNsense Forum »
  • Archive »
  • 18.1 Legacy Series »
  • Vulnerability test
« previous next »
  • Print
Pages: [1]

Author Topic: Vulnerability test  (Read 3112 times)

Julien

  • Hero Member
  • *****
  • Posts: 651
  • Karma: 32
    • View Profile
Vulnerability test
« on: April 25, 2018, 01:13:24 pm »
Hi Guys,
today i've done a Vulnerability test toward the appliance.
the result comes back with TCP timestamps
i know the risk is low,the attacker need to know how long your system is on.
is this something we can get fixed ? or need some tunable tricks ?
thank you
Logged
An intelligent man is sometimes forced to be drunk to spend time with his fool.

BeNe

  • Full Member
  • ***
  • Posts: 111
  • Karma: 13
  • Use *BSD and feel free!
    • View Profile
Re: Vulnerability test
« Reply #1 on: April 25, 2018, 02:02:58 pm »
Please try to set the value of net.inet.tcp.rfc1323 to 0 by running the following command:
Code: [Select]
sysctl -w net.inet.tcp.rfc1323=0
Additionally, put the following value in the default sysctl configuration file, generally sysctl.conf:
Code: [Select]
net.inet.tcp.rfc1323=0
Source --> https://pseudobsd.tumblr.com/post/87704883767/disabling-tcp-timestamp-response-on-freebsd
Logged

Julien

  • Hero Member
  • *****
  • Posts: 651
  • Karma: 32
    • View Profile
Re: Vulnerability test
« Reply #2 on: April 25, 2018, 05:59:14 pm »
Quote from: BeNe on April 25, 2018, 02:02:58 pm
Please try to set the value of net.inet.tcp.rfc1323 to 0 by running the following command:
Code: [Select]
sysctl -w net.inet.tcp.rfc1323=0
Additionally, put the following value in the default sysctl configuration file, generally sysctl.conf:
Code: [Select]
net.inet.tcp.rfc1323=0
Source --> https://pseudobsd.tumblr.com/post/87704883767/disabling-tcp-timestamp-response-on-freebsd
will this value be overwrite  after the updates ?
Logged
An intelligent man is sometimes forced to be drunk to spend time with his fool.

Oxygen61

  • Sr. Member
  • ****
  • Posts: 350
  • Karma: 31
  • Der Weg zum Erfolg hat keine Abkürzung - (Tanaka)
    • View Profile
Re: Vulnerability test
« Reply #3 on: April 25, 2018, 09:16:01 pm »
Quote
will this value be overwrite  after the updates ?
probably, sadly. :(

If you find some time, can you check if it is enough to add net.inet.tcp.rfc1323=0
to the tunables in [System: Settings: Tunables] ?
This may work aswell and even survive any upcoming updates. Besides that i would recommend to write down all these tunables somewhere, in case an update wrecks all additional made settings. :)

Logged

Julien

  • Hero Member
  • *****
  • Posts: 651
  • Karma: 32
    • View Profile
Re: Vulnerability test
« Reply #4 on: April 26, 2018, 11:41:52 am »
Quote from: Oxygen61 on April 25, 2018, 09:16:01 pm
Quote
will this value be overwrite  after the updates ?
probably, sadly. :(

If you find some time, can you check if it is enough to add net.inet.tcp.rfc1323=0
to the tunables in [System: Settings: Tunables] ?
This may work aswell and even survive any upcoming updates. Besides that i would recommend to write down all these tunables somewhere, in case an update wrecks all additional made settings. :)
Thank you for your answer.
after every changes we makes we take a backup.

Logged
An intelligent man is sometimes forced to be drunk to spend time with his fool.

  • Print
Pages: [1]
« previous next »
  • OPNsense Forum »
  • Archive »
  • 18.1 Legacy Series »
  • Vulnerability test
 

OPNsense is an OSS project © Deciso B.V. 2015 - 2023 All rights reserved
  • SMF 2.0.19 | SMF © 2021, Simple Machines
    Privacy Policy
    | XHTML | RSS | WAP2