UCF STIG Viewer Logo

The system must not respond to ICMP timestamp requests.


Overview

Finding ID Version Rule ID IA Controls Severity
V-216369 SOL-11.1-050020 SV-216369r603267_rule Low
Description
By accurately determining the system's clock state, an attacker can more effectively attack certain time-based pseudorandom number generators (PRNGs) and the authentication systems that rely on them.
STIG Date
Solaris 11 SPARC Security Technical Implementation Guide 2021-11-23

Details

Check Text ( C-17605r371195_chk )
Determine if ICMP time stamp responses are disabled.

# ipadm show-prop -p _respond_to_timestamp -co current ip


If the output of both commands is not "0", this is a finding.
Fix Text (F-17603r371196_fix)
The Network Management profile is required.

Disable source respond to timestamp.

# pfexec ipadm set-prop -p _respond_to_timestamp=0 ip