|
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748 |
- # 3.2.2 Ensure ICMP redirects are not accepted
- #
- # Description
- # ===========
- # ICMP redirect messages are packets that convey routing information and tell
- # your host (acting as a router) to send packets via an alternate path. It is
- # a way of allowing an outside routing device to update your system routing
- # tables. By setting net.ipv4.conf.all.accept_redirects to 0, the system will
- # not accept any ICMP redirect messages, and therefore, won't allow outsiders
- # to update the system's routing tables.
- #
- # Rationale
- # =========
- # Attackers could use bogus ICMP redirect messages to maliciously alter the
- # system routing tables and get them to send packets to incorrect networks and
- # allow your system packets to be captured.
- #
- # Audit
- # =====
- #
- # Run the following commands and verify output matches:
- #
- # # sysctl net.ipv4.conf.all.accept_redirects
- # net.ipv4.conf.all.accept_redirects = 0
- # # sysctl net.ipv4.conf.default.accept_redirects
- # net.ipv4.conf.default.accept_redirects = 0
- #
- # Remediation
- # ===========
- #
- # Set the following parameters in the /etc/sysctl.conf file:
- #
- # net.ipv4.conf.all.accept_redirects = 0
- # net.ipv4.conf.default.accept_redirects = 0
- #
- # Run the following commands to set the active kernel parameters:
- #
- # # sysctl -w net.ipv4.conf.all.accept_redirects=0
- # # sysctl -w net.ipv4.conf.default.accept_redirects=0
- # # sysctl -w net.ipv4.route.flush=1
-
- parameters:
- linux:
- system:
- kernel:
- sysctl:
- net.ipv4.conf.all.accept_redirects: 0
- net.ipv4.conf.default.accept_redirects: 0
|