UCF STIG Viewer Logo

TCP backlog queue sizes must be set appropriately.


Overview

Finding ID Version Rule ID IA Controls Severity
V-227794 GEN003601 SV-227794r603266_rule Medium
Description
To provide some mitigation to TCP DoS attacks, the TCP backlog queue sizes must be set to at least 1280 or in accordance with product-specific guidelines.
STIG Date
Solaris 10 X86 Security Technical Implementation Guide 2022-09-07

Details

Check Text ( C-29956r489736_chk )
Determine the type of zone that you are currently securing.
# zonename

If the zone is not the global zone, determine if any interfaces are exclusive to the zone:
# dladm show-link

If the output indicates "insufficient privileges" then this requirement is not applicable.

If the zone is the global zone or the non-global zone has exclusive interfaces determine the network settings.

Procedure:
# ndd /dev/tcp tcp_conn_req_max_q0

If the returned value is not 1280 or greater, this is a finding.

Procedure:
# ndd /dev/tcp tcp_conn_req_max_q

If the returned value is not 1024, this is a finding.
Fix Text (F-29944r489737_fix)
Procedure:
# ndd -set /dev/tcp tcp_conn_req_max_q0 1280
# ndd -set /dev/tcp tcp_conn_req_max_q 1024

Ensure these commands are also present in system startup scripts.