RHEL-06-000099 - The system must ignore ICMPv6 redirects by default - config

Information

An illicit ICMP redirect message could result in a man-in-the-middle attack.

Solution

To set the runtime status of the 'net.ipv6.conf.default.accept_redirects' kernel parameter, run the following command:

# sysctl -w net.ipv6.conf.default.accept_redirects=0

Set the system to the required kernel parameter by adding the following line to '/etc/sysctl.conf' or a config file in the /etc/sysctl.d/ directory (or modify the line to have the required value):

net.ipv6.conf.default.accept_redirects = 0

Issue the following command to make the changes take effect:

# sysctl --system

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_RHEL_6_V2R2_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Rule-ID|SV-217926r603264_rule, STIG-ID|RHEL-06-000099, STIG-Legacy|SV-50349, STIG-Legacy|V-38548, Vuln-ID|V-217926

Plugin: Unix

Control ID: 821e569a6038e14b55bd2065da7fbbb1d584b3cc4f5582684c37f8a782f77136