There was a vulnerability test run on our developmental server having Red Hat Enterprise Linux Server release 5.11 (Tikanga) as the OS. There is one among others of concern here; it is to do with TCP timestamp response. The solution suggested is:
Set the value of net.ipv4.tcp_timestamps to 0 by running the following command:
sysctl -w net.ipv4.tcp_timestamps=0
I did not find the parameter net.ipv4.tcp_timestamps when I did sysctl –a.
Please suggest how to go about it.
Please revert with the reply to my query.
Regards