UCF STIG Viewer Logo

The system must use an appropriate reverse-path filter for IPv6 network traffic, if the system uses IPv6.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22552 GEN007900 SV-38964r1_rule ECSC-1 Medium
Description
Reverse-path filtering provides protection against spoofed source addresses by causing the system to discard packets that have source addresses for which the system has no route or if the route does not point towards the interface on which the packet arrived. Depending on the role of the system, reverse-path filtering may cause legitimate traffic to be discarded and, therefore, should be used with a more permissive mode or filter, or not at all. Whenever possible, reverse-path filtering should be used.
STIG Date
AIX 6.1 SECURITY TECHNICAL IMPLEMENTATION GUIDE 2018-09-18

Details

Check Text ( C-37917r1_chk )
Determine if the system is configured to use reverse-path filtering.
Examine the IPSec rules on the system.
# lsfilt -a
All systems must block inbound traffic destined to the loopback address from other network interfaces.

Additionally, if the system is multihomed and the attached networks are isolated or perform symmetric routing, traffic with source addresses expected on one interface must be blocked when received on another interface.

If filtering is not configured on the system, this is a finding.
Fix Text (F-33173r1_fix)
Configure the system to use reverse-path filtering using IP Sec filters.

Add rules to block traffic with loopback network source addresses from being received on interfaces other than the loopback, such as other ethernet interfaces.

Use smitty or genfilt command to block loopback address from network interfaces.
# smitty ipsec6
# genfilt -v6 -a D -s -m -d -M -c all -o any -O any -p 0 -P 0 -w I -l y -a en0

If the system is multihomed and the attached networks are isolated or perform symmetric routing, add rules to block traffic with source addresses expected on one interface when received on another interface.

# smitty ipsec6