UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The system must not forward IPv6 source-routed packets.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22553 GEN007920 SV-45992r1_rule Medium
Description
Source-routed packets allow the source of the packet to suggest that routers forward the packet along a different path than configured on the router, which can be used to bypass network security measures. This requirement applies only to the forwarding of source-routed traffic, such as when IPv6 forwarding is enabled and the system is functioning as a router.
STIG Date
SUSE Linux Enterprise Server v11 for System z 2016-12-20

Details

Check Text ( C-43274r1_chk )
Determine if the system is configured to forward IPv6 source-routed packets.

Procedure:
# sysctl net.ipv6.conf.all.forwarding
# sysctl net.ipv6.conf.default.forwarding
If any value of the entries is not = "0", this is a finding.
Fix Text (F-39357r1_fix)
Configure the system to not forward IPv6 source-routed packets.

Procedure:
Edit the /etc/sysctl.conf file to include:
net.ipv6.conf.all.forwarding = 0
net.ipv6.conf.default.forwarding = 0

Reload the kernel parameters:
# sysctl -p