UCF STIG Viewer Logo

The system must not respond to ICMPv4 echoes sent to a broadcast address.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22410 GEN003603 SV-26622r2_rule Medium
Description
Responding to broadcast Internet Control Message Protocol (ICMP) echoes facilitates network mapping and provides a vector for amplification attacks.
STIG Date
SOLARIS 10 X86 SECURITY TECHNICAL IMPLEMENTATION GUIDE 2016-06-22

Details

Check Text ( C-27660r2_chk )
Determine the type of zone that you are currently securing.
# zonename

If the zone is not the global zone, determine if any interfaces are exclusive to the zone:
# dladm show-link

If the output indicates "insufficient privileges" then this requirement is not applicable.

If the zone is the global zone or the non-global zone has exclusive interfaces verify the system does not respond to ICMP ECHO_REQUESTs set to broadcast addresses.
# ndd /dev/ip ip_respond_to_echo_broadcast

If the result is not 0, this is a finding.
Fix Text (F-23865r1_fix)
Configure the system to not respond to ICMP ECHO_REQUESTs sent to broadcast addresses.
# ndd -set /dev/ip ip_respond_to_echo_broadcast 0
Also add this command to a system startup script.