3.5.1.2 Ensure IPv6 loopback traffic is configured - OUTPUT

Information

Configure the loopback interface to accept traffic. Configure all other interfaces to deny
traffic to the loopback network (::1).

Rationale:

Loopback traffic is generated between processes on machine and is typically critical to
operation of the system. The loopback interface is the only place that loopback network
(::1) traffic should be seen, all other interfaces should ignore traffic on this network as an
anti-spoofing measure.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Run the following commands to implement the loopback rules:

# ip6tables -A INPUT -i lo -j ACCEPT
# ip6tables -A OUTPUT -o lo -j ACCEPT
# ip6tables -A INPUT -s ::1 -j DROP

Notes:

Changing firewall settings while connected over network can result in being locked out of
the system.

Remediation will only affect the active system firewall, be sure to configure the default
policy in your firewall management to apply on boot as well.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

See Also

https://workbench.cisecurity.org/files/2420

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-7(12), CSCv6|9.1, CSCv7|9.4

Plugin: Unix

Control ID: 01de877421d0d8749e5fceed504e17d3be75970551635de7b0d10fa57ff6e9c6