UCF STIG Viewer Logo

The system must not respond to ICMPv6 echo requests sent to a broadcast address.


Overview

Finding ID Version Rule ID IA Controls Severity
V-23972 GEN007950 SV-45993r1_rule Medium
Description
Responding to broadcast ICMP echo requests facilitates network mapping and provides a vector for amplification attacks.
STIG Date
SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide 2018-09-19

Details

Check Text ( C-43275r1_chk )
Check for an ip6tables rule that drops inbound IPv6 ICMP ECHO_REQUESTs sent to the all-hosts multicast address.

Procedure:
# less /etc/sysconfig/scripts/SuSEfirewall2-custom

Check for a rule in, or referenced by, the INPUT chain such as:
ip6tables -A INPUT -p icmpv6 -d ff02::1 --icmpv6-type 128 -j DROP

If such a rule does not exist, this is a finding.
Fix Text (F-39358r1_fix)
Add an ip6tables rule that drops inbound IPv6 ICMP ECHO_REQUESTs sent to the all-hosts multicast address.

Edit /etc/sysconfig/scripts/SuSEfirewall2-custom and add a rule in, or referenced by, the INPUT chain such as:
ip6tables -A INPUT -p icmpv6 -d ff02::1 --icmpv6-type 128 -j DROP

Reload the SuSEfirewall2 rules.
Procedure:
# rcSuSEfirewall2 restart