V-38535: Don't respond to ICMPv4 broadcast
Implements: blueprint security-hardening Change-Id: Ib1d3eaa0d0f4f15ba9b238c17f312170d2dcdde5
This commit is contained in:
parent
fa99650739
commit
19d49e0ea7
3
doc/source/developer-notes/V-38535.rst
Normal file
3
doc/source/developer-notes/V-38535.rst
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
By default, Ubuntu 14.04 rejects ICMPv4 packets sent to a broadcast address.
|
||||||
|
The Ansible tasks for this STIG configuration ensures that the secure default
|
||||||
|
setting is maintained.
|
@ -36,6 +36,18 @@
|
|||||||
- cat3
|
- cat3
|
||||||
- V-38537
|
- V-38537
|
||||||
|
|
||||||
|
# This is the default in Ubuntu 14.04
|
||||||
|
- name: V-38535 - The system must not respond to ICMPv4 sent to the broadcast address
|
||||||
|
sysctl:
|
||||||
|
name: net.ipv4.icmp_echo_ignore_broadcasts
|
||||||
|
value: 1
|
||||||
|
state: present
|
||||||
|
sysctl_set: yes
|
||||||
|
tags:
|
||||||
|
- kernel
|
||||||
|
- cat3
|
||||||
|
- V-38535
|
||||||
|
|
||||||
# This is the default in Ubuntu 14.04
|
# This is the default in Ubuntu 14.04
|
||||||
- name: V-38596 - Enable virtual address space randomization
|
- name: V-38596 - Enable virtual address space randomization
|
||||||
sysctl:
|
sysctl:
|
||||||
|
Loading…
x
Reference in New Issue
Block a user