UCF STIG Viewer Logo

The system must not respond to ICMPv6 echo requests sent to a broadcast address.


Overview

Finding ID Version Rule ID IA Controls Severity
V-23972 GEN007950 SV-63385r1_rule Medium
Description
Responding to broadcast ICMP echo requests facilitates network mapping and provides a vector for amplification attacks.
STIG Date
Oracle Linux 5 Security Technical Implementation Guide 2020-02-25

Details

Check Text ( C-52097r1_chk )
Check for an iptables rule that drops inbound IPv6 ICMP ECHO_REQUESTs sent to the all-hosts multicast address.

Procedure:
# less /etc/sysconfig/ip6tables

Check for a rule in, or referenced by, the INPUT chain such as:
-A INPUT -p icmpv6 -d ff02::1 --icmpv6-type 128 -j DROP

If such a rule does not exist, this is a finding.
Fix Text (F-53985r1_fix)
Add an iptables rule that drops inbound IPv6 ICMP ECHO_REQUESTs sent to the all-hosts multicast address.

Edit /etc/sysconfig/ip6tables and add a rule in, or referenced by, the INPUT chain such as:
-A INPUT -p icmpv6 -d ff02::1 --icmpv6-type 128 -j DROP

Reload the iptables rules.
Procedure:
# service ip6tables restart