Check: GEN007920
SUSE Linux Enterprise Server v11 for System z STIG:
GEN007920
(in versions v1 r12 through v1 r9)
Title
The system must not forward IPv6 source-routed packets. (Cat II impact)
Discussion
Source-routed packets allow the source of the packet to suggest that routers forward the packet along a different path than configured on the router, which can be used to bypass network security measures. This requirement applies only to the forwarding of source-routed traffic, such as when IPv6 forwarding is enabled and the system is functioning as a router.
Check Content
Determine if the system is configured to forward IPv6 source-routed packets. Procedure: # sysctl net.ipv6.conf.all.forwarding # sysctl net.ipv6.conf.default.forwarding If any value of the entries is not = "0", this is a finding.
Fix Text
Configure the system to not forward IPv6 source-routed packets. Procedure: Edit the /etc/sysctl.conf file to include: net.ipv6.conf.all.forwarding = 0 net.ipv6.conf.default.forwarding = 0 Reload the kernel parameters: # sysctl -p
Additional Identifiers
Rule ID: SV-45992r1_rule
Vulnerability ID: V-22553
Group Title: GEN007920
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-001551 |
The organization defines approved authorizations for controlling the flow of information between interconnected systems. |
Controls
Number | Title |
---|---|
AC-4 |
Information Flow Enforcement |