3.3.2 Ensure IPv6 redirects are not accepted - 'net.ipv6.conf.all.accept_redirects = 0 /etc/sysctl.conf /etc/sysctl.d/*'

Information

It is recommended that systems not accept ICMP redirects as they could be tricked into routing traffic to compromised machines. Setting hard routes within the system (usually a single default route to a trusted router) protects the system from bad routes.

Solution

Set the following parameters in the /etc/sysctl.conf file - net.ipv6.conf.all.accept_redirects = 0
net.ipv6.conf.default.accept_redirects = 0Run the following commands to set the active kernel parameters - # sysctl -w net.ipv6.conf.all.accept_redirects=0
# sysctl -w net.ipv6.conf.default.accept_redirects=0
# sysctl -w net.ipv6.route.flush=1

See Also

https://workbench.cisecurity.org/files/1863

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-7(12), CSCv6|9.2

Plugin: Unix

Control ID: b4128f7236d412fea56aed5ec54eec8cb8596bc449777375cf5a1c9f5fe7a2c3