Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-30618 | NET-IPV6-061 | SV-40399r1_rule | ECSC-1 | Medium |
Description |
---|
These options are intended to be for the Hop-by-Hop header only. The optional and extensible natures of the IPv6 extension headers require higher scrutiny since many imiplementtions do not always drop packets with headers that it can’t recognize and hence could cause a DoS on the target device. In addition, the type, lengthe, value (TLV) formatting provides the ability for headers to be very large. According to the DoD IPv6 IA Guidance for MO3, headers which may be valid but serve no intended use should not be allowed into or out of any network (S0-C2-opt-3). |
STIG | Date |
---|---|
Perimeter Router Security Technical Implementation Guide Juniper | 2015-07-01 |
Check Text ( C-39264r1_chk ) |
---|
Review the perimeter router or multi-layer switch configuration and determine if filters are bound to the applicable interfaces to drop all inbound and outbound IPv6 packets containing a Destination Option header with option type values of 0x05 (Router Alert) or 0xC2 (Jumbo Payload). The following example will block any inbound IPv6 packet containing a Destination Option header: interfaces fe-0/0/1 { unit 0 { family inet6 { filter { input IPV6-INGRESS-FILTER; } address 2001:1:0:146::4/64; } } } … firewall { filter IPV6-INGRESS-FILTER { term DROP-DEST-OPT { from { next-header { dstops; } } then { syslog; discard; } } … … term default-action { then { syslog; discard; } } } } Note: Currently JUNOS has no method to filter option type within either Hop-by-Hop or Destionation Option header. Hence, all packets with the Destionation Option header must be dropped. |
Fix Text (F-34369r1_fix) |
---|
Configure the perimeter router or multi-layer switch to drop all inbound and outbound IPv6 packets containing a Destination Option header with option type values of 0x05 (Router Alert) or 0xC2 (Jumbo Payload). |