Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-23972 | GEN007950 | SV-29788r1_rule | ECSC-1 | Medium |
Description |
---|
Responding to broadcast ICMP echo requests facilitates network mapping and provides a vector for amplification attacks. |
STIG | Date |
---|---|
Red Hat Enterprise Linux 5 Security Technical Implementation Guide | 2014-01-09 |
Check Text ( C-30069r1_chk ) |
---|
Check for an iptables rule that drops inbound IPv6 ICMP ECHO_REQUESTs sent to the all-hosts multicast address. Procedure: # less /etc/sysconfig/ip6tables Check for a rule in, or referenced by, the INPUT chain such as: -A INPUT -p icmpv6 -d ff02::1 --icmpv6-type 128 -j DROP If such a rule does not exist, this is a finding. |
Fix Text (F-26899r1_fix) |
---|
Add an iptables rule that drops inbound IPv6 ICMP ECHO_REQUESTs sent to the all-hosts multicast address. Edit /etc/sysconfig/ip6tables and add a rule in, or referenced by, the INPUT chain such as: -A INPUT -p icmpv6 -d ff02::1 --icmpv6-type 128 -j DROP Reload the iptables rules. Procedure: # service ip6tables restart |