3.2.8 Ensure TCP SYN Cookies is enabled - sysctl

Information

Attackers use SYN flood attacks to perform a denial of service attacked on a system by sending many SYN packets without completing the three way handshake. This will quickly use up slots in the kernel's half-open connection queue and prevent legitimate connections from succeeding. SYN cookies allow the system to keep accepting valid connections, even if under a denial of service attack.

Solution

Set the following parameter in the /etc/sysctl.conf file - net.ipv4.tcp_syncookies = 1 Run the following commands to set the active kernel parameters - # sysctl -w net.ipv4.tcp_syncookies=1
# sysctl -w net.ipv4.route.flush=1

See Also

https://workbench.cisecurity.org/files/1863

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-7(12), CSCv6|9.2

Plugin: Unix

Control ID: a03081d7af405f7d2b8e3801202af125d6197260fbd843c407352176135d3065