UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The system must not accept source-routed IPv4 packets.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22414 GEN003607 M6 SV-38203r1_rule ECSC-1 Medium
Description
Source-routed packets allow the source of the packet to suggest routers forward the packet along a different path than configured on the router, which can be used to bypass network security measures. This requirement applies only to the handling of source-routed traffic destined to the system itself, not to traffic forwarded by the system to another, such as when IPv4 forwarding is enabled and the system is functioning as a router.
STIG Date
MAC OSX 10.6 Workstation Security Technical Implementation Guide 2013-04-09

Details

Check Text ( C-37660r1_chk )
Open a terminal session and enter the following command to view the value of "net.inet.ip.accept_sourceroute".

sysctl -a | grep net.inet.ip.accept_sourceroute

If the value of "net.inet.ip.accept_sourceroute" is not set to "0", this is a finding.
Fix Text (F-32901r1_fix)
Open a terminal session and edit the /etc/sysctl.conf file and add the following line.

net.inet.ip.accept_sourceroute=0

NOTE: If the sysctl.conf file does not exist use the following command to create one.
touch /etc/sysctl.conf