UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The system must not accept source-routed IPv4 packets.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22414 GEN003607 SV-29713r2_rule Medium
Description
Source-routed packets allow the source of the packet to suggest routers forward the packet along a different path than configured on the router, which can be used to bypass network security measures. This requirement applies only to the handling of source-routed traffic destined to the system itself, not to traffic forwarded by the system to another, such as when IPv4 forwarding is enabled and the system is functioning as a router.
STIG Date
HP-UX 11.31 Security Technical Implementation Guide 2017-12-08

Details

Check Text ( C-36509r2_chk )
Check the system for an IP Filter (IPF) rule blocking incoming source-routed packets.

# ipfstat -i

Examine the list for rules such as:
block in log quick [all] | [from any to any] with opt lsrr
block in log quick [all] | [from any to any] with opt ssrr

If the listed rules do not block incoming traffic with both lsrr and ssrr options, this is a finding.
Fix Text (F-31869r2_fix)
Edit /etc/opt/ipf/ipf.conf and add rules to block incoming source-routed packets, such as:

block in log quick [all] | [from any to any] with opt lsrr
block in log quick [all] | [from any to any] with opt ssrr

Reload the IPF rules.
# ipf -Fa -A -f /etc/opt/ipf/ipf.conf