UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The system must not accept source-routed IPv6 packets.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22554 GEN007940 SV-42323r1_rule ECSC-1 Medium
Description
Source-routed packets allow the source of the packet to suggest that routers forward the packet along a different path than configured on the router, which can be used to bypass network security measures. This requirement applies only to the handling of source-routed traffic destined to the system itself, not to traffic forwarded by the system to another, such as when IPv6 forwarding is enabled and the system is functioning as a router.
STIG Date
Solaris 10 X86 Security Technical Implementation Guide 2014-04-04

Details

Check Text ( C-27888r1_chk )
Verify the system is configured to not forward IPv6 source-routed packets.
# ndd /dev/ip6 ip6_forward_src_routed
If the returned value is not 0, this is a finding.
Fix Text (F-24186r2_fix)
Configure the system to not forward IPv6 source-routed packets.
# ndd -set /dev/ip6 ip6_forward_src_routed 0

Also, add this command to a system startup script.