|
123456789101112131415161718192021222324252627282930313233343536373839404142434445 |
- # 3.2.3 Ensure secure ICMP redirects are not accepted
- #
- # Description
- # ===========
- # Secure ICMP redirects are the same as ICMP redirects, except they come from
- # gateways listed on the default gateway list. It is assumed that these
- # gateways are known to your system, and that they are likely to be secure.
- #
- # Rationale
- # =========
- # It is still possible for even known gateways to be compromised. Setting
- # net.ipv4.conf.all.secure_redirects to 0 protects the system from routing
- # table updates by possibly compromised known gateways.
- #
- # Audit
- # =====
- #
- # Run the following commands and verify output matches:
- #
- # # sysctl net.ipv4.conf.all.secure_redirects
- # net.ipv4.conf.all.secure_redirects = 0
- # # sysctl net.ipv4.conf.default.secure_redirects
- # net.ipv4.conf.default.secure_redirects = 0
- #
- # Remediation
- # ===========
- #
- # Set the following parameters in the /etc/sysctl.conf file:
- #
- # net.ipv4.conf.all.secure_redirects = 0
- # net.ipv4.conf.default.secure_redirects = 0
- #
- # Run the following commands to set the active kernel parameters:
- #
- # # sysctl -w net.ipv4.conf.all.secure_redirects=0
- # # sysctl -w net.ipv4.conf.default.secure_redirects=0
- # # sysctl -w net.ipv4.route.flush=1
-
- parameters:
- linux:
- system:
- kernel:
- sysctl:
- net.ipv4.conf.all.secure_redirects: 0
- net.ipv4.conf.default.secure_redirects: 0
|