Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-23972 | GEN007950 | SV-45993r1_rule | Medium |
Description |
---|
Responding to broadcast ICMP echo requests facilitates network mapping and provides a vector for amplification attacks. |
STIG | Date |
---|---|
SUSE Linux Enterprise Server v11 for System z | 2017-05-18 |
Check Text ( C-43275r1_chk ) |
---|
Check for an ip6tables rule that drops inbound IPv6 ICMP ECHO_REQUESTs sent to the all-hosts multicast address. Procedure: # less /etc/sysconfig/scripts/SuSEfirewall2-custom Check for a rule in, or referenced by, the INPUT chain such as: ip6tables -A INPUT -p icmpv6 -d ff02::1 --icmpv6-type 128 -j DROP If such a rule does not exist, this is a finding. |
Fix Text (F-39358r1_fix) |
---|
Add an ip6tables rule that drops inbound IPv6 ICMP ECHO_REQUESTs sent to the all-hosts multicast address. Edit /etc/sysconfig/scripts/SuSEfirewall2-custom and add a rule in, or referenced by, the INPUT chain such as: ip6tables -A INPUT -p icmpv6 -d ff02::1 --icmpv6-type 128 -j DROP Reload the SuSEfirewall2 rules. Procedure: # rcSuSEfirewall2 restart |