| # 3.2.2 Ensure ICMP redirects are not accepted |
| # |
| # Description |
| # =========== |
| # ICMP redirect messages are packets that convey routing information and tell |
| # your host (acting as a router) to send packets via an alternate path. It is |
| # a way of allowing an outside routing device to update your system routing |
| # tables. By setting net.ipv4.conf.all.accept_redirects to 0, the system will |
| # not accept any ICMP redirect messages, and therefore, won't allow outsiders |
| # to update the system's routing tables. |
| # |
| # Rationale |
| # ========= |
| # Attackers could use bogus ICMP redirect messages to maliciously alter the |
| # system routing tables and get them to send packets to incorrect networks and |
| # allow your system packets to be captured. |
| # |
| # Audit |
| # ===== |
| # |
| # Run the following commands and verify output matches: |
| # |
| # # sysctl net.ipv4.conf.all.accept_redirects |
| # net.ipv4.conf.all.accept_redirects = 0 |
| # # sysctl net.ipv4.conf.default.accept_redirects |
| # net.ipv4.conf.default.accept_redirects = 0 |
| # |
| # Remediation |
| # =========== |
| # |
| # Set the following parameters in the /etc/sysctl.conf file: |
| # |
| # net.ipv4.conf.all.accept_redirects = 0 |
| # net.ipv4.conf.default.accept_redirects = 0 |
| # |
| # Run the following commands to set the active kernel parameters: |
| # |
| # # sysctl -w net.ipv4.conf.all.accept_redirects=0 |
| # # sysctl -w net.ipv4.conf.default.accept_redirects=0 |
| # # sysctl -w net.ipv4.route.flush=1 |
| |
| parameters: |
| linux: |
| system: |
| kernel: |
| sysctl: |
| net.ipv4.conf.all.accept_redirects: 0 |
| net.ipv4.conf.default.accept_redirects: 0 |