Check: GEN003612
SUSE Linux Enterprise Server v11 for System z STIG:
GEN003612
(in versions v1 r12 through v1 r9)
Title
The system must be configured to use TCP syncookies when experiencing a TCP SYN flood. (Cat II impact)
Discussion
A TCP SYN flood attack can cause Denial of Service by filling a system's TCP connection table with connections in the SYN_RCVD state. Syncookies are a mechanism used to only track a connection when a subsequent ACK is received, verifying the initiator is attempting a valid connection and is not a flood source. This technique does not operate in a fully standards-compliant manner, but is only activated when a flood condition is detected, and allows defense of the system while continuing to service valid requests.
Check Content
Verify the system configured to use TCP syncookies when experiencing a TCP SYN flood. # cat /proc/sys/net/ipv4/tcp_syncookies If the result is not "1", this is a finding.
Fix Text
Configure the system to use TCP syncookies when experiencing a TCP SYN flood. Edit /etc/sysctl.conf and add a setting for "net.ipv4.tcp_syncookies=1". # sysctl -p
Additional Identifiers
Rule ID: SV-46277r1_rule
Vulnerability ID: V-22419
Group Title: GEN003612
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-001092 |
The information system protects against or limits the effects of the organization-defined or referenced types of denial of service attacks. |
Controls
Number | Title |
---|---|
No controls are assigned to this check |