AOSX-13-001210 - The macOS system must not send IPv4 ICMP redirects by default.

Information

ICMP redirects are broadcast to reshape network traffic. A malicious user could use the system to send fake redirect packets and try to force all network traffic to pass through a network sniffer. Disabling ICMP redirect broadcasts mitigates this risk.

Solution

To configure the system to not send ICMP redirects, add the following line to '/etc/sysctl.conf', creating the file if necessary:

net.inet.ip.redirect=0

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Apple_OS_X_10-13_V2R5_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Rule-ID|SV-214913r609363_rule, STIG-ID|AOSX-13-001210, STIG-Legacy|SV-96419, STIG-Legacy|V-81705, Vuln-ID|V-214913

Plugin: Unix

Control ID: f729238c8a22021faae89c05d93e16fb8625064497c3efb8f1f4fcd88de29d17