Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-23972 | GEN007950 | SV-29785r2_rule | Medium |
Description |
---|
Responding to broadcast ICMP echo requests facilitates network mapping and provides a vector for amplification attacks. |
STIG | Date |
---|---|
Solaris 10 SPARC Security Technical Implementation Guide | 2020-02-26 |
Check Text ( C-30065r2_chk ) |
---|
Determine the type of zone that you are currently securing. # zonename If the zone is not the global zone, determine if any interfaces are exclusive to the zone: # dladm show-link If the output indicates "insufficient privileges" then this requirement is not applicable. If the zone is the global zone or the non-global zone has exclusive interfaces determine if the system is configured to ignore IPv6 multicast ICMP echo-requests. Procedure: # ndd -get /dev/ip ip6_respond_to_echo_multicast If the result is not 0, this is a finding. |
Fix Text (F-26896r1_fix) |
---|
Configure the system to not respond to IPv6 multicast ICMP echo-requests. Procedure: # ndd -set /dev/ip ip6_respond_to_echo_multicast 0 This command must also be added to a system startup script. |