Check: WN12-SO-000037
Microsoft Windows Server 2012/2012 R2 Domain Controller STIG:
WN12-SO-000037
(in versions v3 r7 through v2 r7)
Title
IPv6 source routing must be configured to the highest protection level. (Cat III impact)
Discussion
Configuring the system to disable IPv6 source routing protects against spoofing.
Check Content
If the following registry value does not exist or is not configured as specified, this is a finding: Registry Hive: HKEY_LOCAL_MACHINE Registry Path: \SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\ Value Name: DisableIPSourceRouting Type: REG_DWORD Value: 2
Fix Text
Configure the policy value for Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options -> "MSS: (DisableIPSourceRouting IPv6) IP source routing protection level (protects against packet spoofing)" to "Highest protection, source routing is completely disabled". (See "Updating the Windows Security Options File" in the STIG Overview document if MSS settings are not visible in the system's policy tools.)
Additional Identifiers
Rule ID: SV-226302r794594_rule
Vulnerability ID: V-226302
Group Title: SRG-OS-000480-GPOS-00227
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000366 |
The organization implements the security configuration settings. |
Controls
Number | Title |
---|---|
CM-6 |
Configuration Settings |