UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The system must ignore IPv4 Internet Control Message Protocol (ICMP) redirect messages.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22416 GEN003609 SV-45726r1_rule Medium
Description
ICMP redirect messages are used by routers to inform hosts that a more direct route exists for a particular destination. These messages modify the host's route table and are unauthenticated. An illicit ICMP redirect message could result in a man-in-the-middle attack.
STIG Date
SUSE Linux Enterprise Server v11 for System z 2016-12-20

Details

Check Text ( C-43093r1_chk )
Verify the system does not accept IPv4 ICMP redirect messages.

# grep [01] /proc/sys/net/ipv4/conf/*/accept_redirects|egrep "default|all"

If all of the resulting lines do not end with "0", this is a finding.
Fix Text (F-39124r1_fix)
Configure the system to not accept IPv4 ICMP redirect messages.
Edit /etc/sysctl.conf and add a setting for "net.ipv4.conf.all.accept_redirects=0" and "net.ipv4.conf.default.accept_redirects=0".
# sysctl -p