GEN003604 - The system must not respond to ICMP timestamp requests sent to a broadcast address - dladm show-link

Information

The processing of Internet Control Message Protocol (ICMP) timestamp requests increases the attack surface of the system. Responding to broadcast ICMP timestamp requests facilitates network mapping and provides a vector for amplification attacks.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Configure the system to not respond to ICMP timestamp requests sent to broadcast addresses.
# ndd -set /dev/ip ip_respond_to_echo_broadcast 0
Also add this command to a system startup script.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SOL_10_x86_V2R4_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Rule-ID|SV-227797r603266_rule, STIG-ID|GEN003604, STIG-Legacy|SV-26624, STIG-Legacy|V-22411, Vuln-ID|V-227797

Plugin: Unix

Control ID: 9b260a03092f70c178dd2ca2da7b45884c66ec1630f944e62cb007ced04eabe3