3.2.6 Ensure bogus ICMP responses are ignored (sysctl.conf/sysctl.d)

Information

Setting icmp_ignore_bogus_error_responses to 1 prevents the kernel from logging bogus responses (RFC-1122 non-compliant) from broadcast reframes, keeping file systems from filling up with useless log messages. Some routers (and some attackers) will send responses that violate RFC-1122 and attempt to fill up a log file system with many useless error messages.

Solution

Set the following parameter in the /etc/sysctl.conf file: net.ipv4.icmp_ignore_bogus_error_responses = 1 Run the following commands to set the active kernel parameters: # sysctl -w net.ipv4.icmp_ignore_bogus_error_responses=1# sysctl -w net.ipv4.route.flush=1

See Also

https://workbench.cisecurity.org/files/1866

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-7(12), CSCv6|11

Plugin: Unix

Control ID: 07524b4a589fb1b4e5a4381c15ea4462654b717c76fa5f06daca340198bd27df