UCF STIG Viewer Logo

The system must not respond to ICMPv6 echo requests sent to a broadcast address.


Overview

Finding ID Version Rule ID IA Controls Severity
V-227058 GEN007950 SV-227058r603265_rule Medium
Description
Responding to broadcast ICMP echo requests facilitates network mapping and provides a vector for amplification attacks.
STIG Date
Solaris 10 SPARC Security Technical Implementation Guide 2022-09-07

Details

Check Text ( C-29220r485549_chk )
Determine the type of zone that you are currently securing.
# zonename

If the zone is not the global zone, determine if any interfaces are exclusive to the zone:
# dladm show-link

If the output indicates "insufficient privileges" then this requirement is not applicable.

If the zone is the global zone or the non-global zone has exclusive interfaces determine if the system is configured to ignore IPv6 multicast ICMP echo-requests.

Procedure:
# ndd -get /dev/ip ip6_respond_to_echo_multicast

If the result is not 0, this is a finding.
Fix Text (F-29208r485550_fix)
Configure the system to not respond to IPv6 multicast ICMP echo-requests.

Procedure:
# ndd -set /dev/ip ip6_respond_to_echo_multicast 0

This command must also be added to a system startup script.