UCF STIG Viewer Logo

The system must not respond to Internet Control Message Protocol (ICMP) timestamp requests sent to a broadcast address.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22411 GEN003604 SV-35026r1_rule ECSC-1 Medium
Description
The processing of ICMP timestamp requests increases the attack surface of the system. Responding to broadcast ICMP timestamp requests facilitates network mapping and provides a vector for amplification attacks.
STIG Date
HP-UX 11.23 Security Technical Implementation Guide 2015-12-02

Details

Check Text ( C-36504r1_chk )
Verify the system does not respond to ICMP timestamp requests set to broadcast addresses.
# ndd -get /dev/ip ip_respond_to_timestamp_broadcast

If the result is greater than 0, this is a finding.
Fix Text (F-31861r1_fix)
Configure the system to not respond to ICMP timestamp requests
sent to broadcast addresses.
# ndd -set /dev/ip ip_respond_to_timestamp_broadcast 0

Edit /etc/rc.config.d/nddconf and add/set:
TRANSPORT_NAME[x]=ip
NDD_NAME[x]=ip_respond_to_timestamp_broadcast
NDD_VALUE[x]=0