UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The system must not accept source-routed IPv4 packets.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22414 GEN003607 SV-29711r2_rule Medium
Description
Source-routed packets allow the source of the packet to suggest that routers forward the packet along a different path than configured on the router, which can be used to bypass network security measures. This requirement applies only to the handling of source-routed traffic destined to the system itself, not to traffic forwarded by the system to another, such as when IPv4 forwarding is enabled and the system is functioning as a router.
STIG Date
Solaris 10 SPARC Security Technical Implementation Guide 2020-02-26

Details

Check Text ( C-30050r2_chk )
Determine the type of zone that you are currently securing.
# zonename

If the zone is not the global zone, determine if any interfaces are exclusive to the zone:
# dladm show-link

If the output indicates "insufficient privileges" then this requirement is not applicable.

If the zone is the global zone or the non-global zone has exclusive interfaces check the system for an IPF rule blocking incoming source-routed packets.

Procedure: # ipfstat -i

Examine the list for rules such as:
block in log quick all with opt lsrr
block in log quick all with opt ssrr

If the listed rules do not block incoming traffic with both lsrr and ssrr options, this is a finding.
Fix Text (F-26888r1_fix)
Edit /etc/ipf/ipf.conf and add rules to block incoming source-routed packets, such as:

block in log quick all with opt lsrr
block in log quick all with opt ssrr

Reload the IPF rules.
Procedure:
# ipf -Fa -A -f /etc/ipf/ipf.conf