Show pageOld revisionsBacklinksBack to top This page is read only. You can view the source, but not change it. Ask your administrator if you think this is wrong. ======3.1.2 Ensure packet redirect sending is disabled (Scored)====== =====Profile Applicability===== <code> Level 1 - Server Level 1 - Workstation </code> =====Description===== ICMP Redirects are used to send routing information to other hosts. As a host itself does not act as a router (in a host only configuration), there is no need to send redirects. =====Rationale===== An attacker could use a compromised host to send invalid ICMP redirects to other router devices in an attempt to corrupt routing and have users access a system set up by the attacker as opposed to a valid system. =====Audit===== Run the following command and verify output matches: <Code:bash> # sysctl net.ipv4.conf.all.send_redirects net.ipv4.conf.all.send_redirects = 0 # sysctl net.ipv4.conf.default.send_redirects net.ipv4.conf.default.send_redirects = 0 </Code> =====Remediation===== Set the following parameter in the "/etc/sysctl.conf" file: <Code:bash> net.ipv4.conf.all.send_redirects = 0 net.ipv4.conf.default.send_redirects = 0 </Code> Run the following commands to set the active kernel parameters: <Code:bash> # sysctl -w net.ipv4.conf.all.send_redirects=0 # sysctl -w net.ipv4.conf.default.send_redirects=0 # sysctl -w net.ipv4.route.flush=1 </Code> ubuntu1604/3/1/2.txt Last modified: 2017/05/02 12:44by 127.0.0.1