Disable Kernel Parameter for Accepting ICMP Redirects by Default on IPv4 Interfaces
An XCCDF Rule
Description
To set the runtime status of the net.ipv4.conf.default.accept_redirects
kernel parameter, run the following command:
$ sudo sysctl -w net.ipv4.conf.default.accept_redirects=0To make sure that the setting is persistent, add the following line to a file in the directory
/etc/sysctl.d
: net.ipv4.conf.default.accept_redirects = 0
Rationale
ICMP redirect messages are used by routers to inform hosts that a more
direct route exists for a particular destination. These messages modify the
host's route table and are unauthenticated. An illicit ICMP redirect
message could result in a man-in-the-middle attack.
This feature of the IPv4 protocol has few legitimate uses. It should
be disabled unless absolutely required.
- ID
- xccdf_org.ssgproject.content_rule_sysctl_net_ipv4_conf_default_accept_redirects
- Severity
- Medium
- References
- Updated
Remediation - Kubernetes Patch
---
apiVersion: machineconfiguration.openshift.io/v1
kind: MachineConfig
spec:
config:
ignition: