SOL-11.1-050370 - The system must prevent local applications from generating source-routed packets.

Information

Source-routed packets allow the source of the packet to suggest that routers forward the packet along a different path than configured on the router, which can be used to bypass network security measures.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

The root role is required.

# pfedit /etc/ipf/ipf.conf

For Solaris 11, 11.1, 11.2, and 11.3 that use IP Filter dd rules to block outgoing source-routed packets, such as:

block out log quick all with opt lsrr
block out log quick all with opt ssrr

Reload the IPF rules.

# ipf -Fa -A -f /etc/ipf/ipf.conf

For Solaris 11.3 or newer that use Packet Filter remove or modify any rules that include 'allow-opts'.

Reload the Packet Filter rules:
# svcadm refresh firewall:default

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SOL_11_x86_V3R1_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|III, CCI|CCI-000366, Rule-ID|SV-216157r959010_rule, STIG-ID|SOL-11.1-050370, STIG-Legacy|SV-61085, STIG-Legacy|V-48213, Vuln-ID|V-216157

Plugin: Unix

Control ID: 30220a47b819f15d3274e34acd8f8724e5e8ac1b828fbefaf6cc2eb1d9be8ab1