AOSX-13-001220 - The macOS system must not process Internet Control Message Protocol [ICMP] timestamp requests.

Information

ICMP timestamp requests reveal information about the system and can be used to determine which operating system is installed. Precise time data can also be used to launch time-based attacks against the system. Configuring the system to drop incoming ICMPv4 timestamp requests mitigates these risks.

Solution

To disable ICMP timestamp responses, add the following line to '/etc/sysctl.conf', creating the file if necessary:

net.inet.icmp.timestamp=0

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Apple_OS_X_10-13_V2R5_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Rule-ID|SV-214916r609363_rule, STIG-ID|AOSX-13-001220, STIG-Legacy|SV-96427, STIG-Legacy|V-81713, Vuln-ID|V-214916

Plugin: Unix

Control ID: a6182d017e8ac057bf65daa92b384357d4dfbb560d268ba23ff0f8f752cd0a3f