RHEL 8 must not forward source-routed packets by default.

STIG ID: RHEL-08-040250  |  SRG: SRG-OS-000480-GPOS-00227 |  Severity: medium |  CCI: CCI-000366 |  Vulnerability Id: V-230539

Vulnerability Discussion

Source-routed packets allow the source of the packet to suggest that routers forward the packet along a different path than configured on the router, which can be used to bypass network security measures. This requirement applies only to the forwarding of source-routed traffic, such as when forwarding is enabled and the system is functioning as a router.

Check

Verify RHEL 8 does not accept source-routed packets by default.

Note: If either IPv4 or IPv6 is disabled on the system, this requirement only applies to the active internet protocol version.

Check the value of the accept source route variable with the following command:

$ sudo sysctl net.ipv4.conf.default.accept_source_route net.ipv6.conf.default.accept_source_route

net.ipv4.conf.default.accept_source_route = 0
net.ipv6.conf.default.accept_source_route = 0

If the returned lines do not have a value of "0", a line is not returned, or either returned line is commented out, this is a finding.

Fix

Configure RHEL 8 to not forward source-routed packets by default with the following commands:

$ sudo sysctl -w net.ipv4.conf.default.accept_source_route=0

$ sudo sysctl -w net.ipv6.conf.default.accept_source_route=0

If "0" is not the system's default value then add or update the following lines in the appropriate file under "/etc/sysctl.d":

net.ipv4.conf.default.accept_source_route=0

net.ipv6.conf.default.accept_source_route=0