Information
The operating system must not have unauthorized IP tunnels configured.
Rationale:
IP tunneling mechanisms can be used to bypass network filtering. If tunneling is required, it must be documented with the the Authorizing Official of the organization.
Solution
Remove all unapproved tunnels from the system, or document them with the Authorizing Official.
To remove them edit the /etc/ipsec.conf and /etc/ipsec.d/*.conf files removing any lines indicating a conn parameter is configured.
Example: vim /etc/ipsec.conf
Remove and lines with a 'conn' parameter set.
Notes:
This Benchmark recommendation maps to:
Red Hat Enterprise Linux 7 Security Technical Implementation Guide:
Version 2, Release: 3 Benchmark Date: 26 Apr 2019
Vul ID: V-72317
Rule ID: SV-86941r2_rule
STIG ID: RHEL-07-040820
Severity: CAT II