|
- # 3.2.7 Ensure Reverse Path Filtering is enabled
- #
- # Description
- # ===========
- # Setting net.ipv4.conf.all.rp_filter and net.ipv4.conf.default.rp_filter to 1
- # forces the Linux kernel to utilize reverse path filtering on a received
- # packet to determine if the packet was valid. Essentially, with reverse path
- # filtering, if the return packet does not go out the same interface that the
- # corresponding source packet came from, the packet is dropped (and logged if
- # log_martians is set).
- #
- # Rationale
- # =========
- # Setting these flags is a good way to deter attackers from sending your system
- # bogus packets that cannot be responded to. One instance where this feature
- # breaks down is if asymmetrical routing is employed. This would occur when
- # using dynamic routing protocols (bgp, ospf, etc) on your system. If you are
- # using asymmetrical routing on your system, you will not be able to enable
- # this feature without breaking the routing.
- #
- # Audit
- # =====
- #
- # Run the following commands and verify output matches:
- #
- # # sysctl net.ipv4.conf.all.rp_filter
- # net.ipv4.conf.all.rp_filter = 1
- # # sysctl net.ipv4.conf.default.rp_filter
- # net.ipv4.conf.default.rp_filter = 1
- #
- # Remediation
- # ===========
- #
- # Set the following parameters in the /etc/sysctl.conf file:
- #
- # net.ipv4.conf.all.rp_filter = 1
- # net.ipv4.conf.default.rp_filter = 1
- #
- # Run the following commands to set the active kernel parameters:
- #
- # # sysctl -w net.ipv4.conf.all.rp_filter=1
- # # sysctl -w net.ipv4.conf.default.rp_filter=1
- # # sysctl -w net.ipv4.route.flush=1
-
- parameters:
- linux:
- system:
- kernel:
- sysctl:
- net.ipv4.conf.all.rp_filter: 1
- net.ipv4.conf.default.rp_filter: 1
|