AOSX-13-001200 - The macOS system must ignore IPv4 ICMP redirect messages.

Information

ICMP redirects are broadcast to reshape network traffic. A malicious user could craft fake redirect packets and try to force all network traffic to pass through a network sniffer. If the system is not configured to ignore these packets, it could be susceptible to this kind of attack.

Solution

To configure the system to ignore 'ICMP redirect' messages, add the following line to '/etc/sysctl.conf', creating the file if necessary:

net.inet.icmp.drop_redirect=1

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Apple_OS_X_10-13_V2R5_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Rule-ID|SV-214910r609363_rule, STIG-ID|AOSX-13-001200, STIG-Legacy|SV-96413, STIG-Legacy|V-81699, Vuln-ID|V-214910

Plugin: Unix

Control ID: 69656dbca435818c3be3deee613629f0d4a3058fa6f336e30525f0aed2e023de