UCF STIG Viewer Logo

TCP connection response retransmissions are not controlled.


Overview

Finding ID Version Rule ID IA Controls Severity
V-4437 5.097 SV-29612r1_rule ECSC-1 Low
Description
In a SYN flood attack, the attacker sends a continuous stream of SYN packets to a server, and the server leaves the half-open connections open until it is overwhelmed and no longer is able to respond to legitimate requests.
STIG Date
Windows 2003 Member Server Security Technical Implementation Guide 2015-06-24

Details

Check Text ( None )
None
Fix Text (F-6084r1_fix)
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> “MSS: (TcpMaxConnectResponseRetransmissions) SYN-ACK retransmissions when a connection is not acknowledged” to “3 & 6 seconds, half-open connections dropped after 21 seconds”, “3 seconds, half-open connections dropped after 9 seconds” or “No retransmission, half-open connections dropped after 3 seconds”.