UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The OS X system must not send IPv4 ICMP redirects by default.


Overview

Finding ID Version Rule ID IA Controls Severity
V-76141 AOSX-12-001210 SV-90829r1_rule Medium
Description
ICMP redirects are broadcast to reshape network traffic. A malicious user could use the system to send fake redirect packets and try to force all network traffic to pass through a network sniffer. Disabling ICMP redirect broadcasts mitigates this risk.
STIG Date
Apple OS X 10.12 Security Technical Implementation Guide 2018-12-24

Details

Check Text ( C-75827r1_chk )
To check if the system is configured to send ICMP redirects, run the following command:

sysctl net.inet.ip.redirect

If the values are not set to "0", this is a finding.
Fix Text (F-82779r1_fix)
To configure the system to not send ICMP redirects, add the following line to "/etc/sysctl.conf", creating the file if necessary:

net.inet.ip.redirect=0