Disabling TCP timestamps
The OS fingerprinting probe examines the remote server's implementation of TCP timestamps. Timestamps provide the attacker with a means to guess the operating system of the target.
For
z/OS®, TCP timestamps can be disabled by
executing the following steps:
- Find the TCP configuration data set, named as
Profile.TCPIPor similar. - Edit the TCP configuration data set by appending
NOTCPTIMESTAMPin the lineTCPCONFIG. - Using a user with
CONTROLaccess, run VARY TCPIP,SYNTAXCHECK, tcpConfigurationDatasetName to validate the syntax of the configuration file. - Using a user with
CONTROLaccess, run VARY TCPIP,,OBEYFILE, tcpConfigurationDatasetName to apply the changes.