UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The system must not forward IPv4 source-routed packets.


Overview

Finding ID Version Rule ID IA Controls Severity
V-12002 GEN003600 SV-64451r1_rule ECSC-1 Medium
Description
Source-routed packets allow the source of the packet to suggest routers forward the packet along a different path than configured on the router, which can be used to bypass network security measures. This requirement applies only to the forwarding of source-routed traffic, such as when IPv4 forwarding is enabled and the system is functioning as a router.
STIG Date
Oracle Linux 5 Security Technical Implementation Guide 2015-06-05

Details

Check Text ( C-52877r1_chk )
Verify the system does not accept source-routed IPv4 packets.

Procedure:
# grep [01] /proc/sys/net/ipv4/conf/*/accept_source_route|egrep "default|all"

If all of the returned lines do not end with 0, this is a finding.

Note: The same setting is used by Linux for both the local acceptance and forwarding of source-routed IPv4 packets.
Fix Text (F-55055r1_fix)
Configure the system to not accept source-routed IPv4 packets.
Edit /etc/sysctl.conf and add a setting for "net.ipv4.conf.all.accept_source_route=0" and "net.ipv4.conf.default.accept_source_route=0".

Reload the sysctls.
Procedure:
# sysctl -p