TCP packets dropped by Firewall due to Invalid Timestamp option

TCP packets dropped by Firewall due to Invalid Timestamp option

47270
Created On 11/19/19 02:09 AM - Last Modified 11/19/19 03:11 AM


Symptom


  • TCP SYN and TCP SYN/ACK packets are not dropped by the firewall and are forwarded as expected
  • Firewall  randomly drops packets and global counter "tcp_invalid_ts_option" increments.

        > show counter global filter packet-filter yes delta yes

        Global counters:

        Elapsed time since last sampling: 3.298 seconds

        name value rate severity category aspect description

        --------------------------------------------------------------------------------

        tcp_drop_packet 1 0 warn tcp pktproc packets dropped because of failure in tcp reassembly

        tcp_invalid_ts_option 1 0 info tcp pktproc tcp packets with invalid timestamp option     >>>>>> Increment in Counter

  • Please refer the below document which explains how to check the global counter for a specific traffic:
             How to check global counters for a specific source and destination IP address


Environment


 
  • TCP timestamp option is exchanged between the client and server
  • “Check Timestamp option” is enabled on firewall


Cause


  • Firewall will drops all packets, except syn and syn-ack TCP packets where the TSVal (Timestamp Value) is zero. 
  • To check the TSVal in a TCP packet, refer the screenshot below:
       User-added image
  • By default “Check Timestamp option”  is enabled. Hence the firewall will drop this packet. We can check the setting by running the below command in CLI

       > show running tcp state

       session with asymmetric path : bypass inspection

       Bypass if OO queue limit is reached : no

       Favor new seg data : no

       Urgent data : clear

       Drop if zero after clear urgent flag : yes 

       Check Timestamp option : yes -----> This option is set to Yes by default

       Allow Challenge Ack : yes

       Remove MPTCP option : yes



Resolution


  • As per current design, the firewall will drop the packets with TSVal set to 0.
  • If this is legitimate traffic and you wish to allow, you can disable the "Timestamp Check".
 Note:  As per Best Practices on Firewall, it is recommended to enable this option. Best Practices for Securing Your Network from Layer 4 and Layer 7 Evasions
            If you do not wish to change this option please check on server or on client to see why it is sending a null timestamp value
.
  • From CLI:

       > configure       
       # set deviceconfig setting tcp check-timestamp-option no
       # commit

 

  •  From GUI:
Select Device --> Setup --> Session

       User-added image

Select Edit option in “TCP Settings”

       User-added image

Uncheck option “Drop segments with null timestamp option” and click on OK

       User-added image



Actions
  • Print
  • Copy Link

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PNXpCAO&refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail&refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail

Choose Language