UCF STIG Viewer Logo

The system must not process ICMP timestamp requests.


Overview

Finding ID Version Rule ID IA Controls Severity
V-227795 GEN003602 SV-227795r603266_rule Low
Description
The processing of Internet Control Message Protocol (ICMP) timestamp requests increases the attack surface of the system.
STIG Date
Solaris 10 X86 Security Technical Implementation Guide 2020-12-04

Details

Check Text ( C-29957r489739_chk )
Determine the type of zone that you are currently securing.
# zonename

If the zone is not the global zone, determine if any interfaces are exclusive to the zone:
# dladm show-link

If the output indicates "insufficient privileges" then this requirement is not applicable.

If the zone is the global zone or the non-global zone has exclusive interfaces verify the system does not respond to ICMP timestamp requests.
# ndd /dev/ip ip_respond_to_timestamp

If the result is not 0, this is a finding.
Fix Text (F-29945r489740_fix)
Disable ICMP timestamp responses on the system.
# ndd -set /dev/ip ip_respond_to_timestamp 0
Also add this command to a system startup script.