The SUSE operating system must not be performing Internet Protocol version 6 (IPv6) packet forwarding by default unless the system is a router.

STIG ID: SLES-12-030365  |  SRG: SRG-OS-000480-GPOS-00227 |  Severity: medium |  CCI: CCI-000366 |  Vulnerability Id: V-237623 | 

Vulnerability Discussion

Routing protocol daemons are typically used on routers to exchange network topology information with other routers. If this software is used when not required, system network information may be unnecessarily transmitted across the network.

Check

Verify the SUSE operating system is not performing IPv6 packet forwarding by default, unless the system is a router.

Check to see if IPv6 forwarding is disabled by default using the following command:

> sudo sysctl net.ipv6.conf.default.forwarding
net.ipv6.conf.default.forwarding = 0

If the network parameter "ipv6.conf.default.forwarding" is not equal to "0" or nothing is returned, this is a finding.

Fix

Configure the SUSE operating system to not performing IPv6 packet forwarding by default by running the following command as an administrator:

> sudo sysctl -w net.ipv6.conf.default.forwarding=0

If "0" is not the system's default value, add or update the following line in "/etc/sysctl.d/99-stig.conf":

> sudo sh -c 'echo "net.ipv6.conf.default.forwarding=0" >> /etc/sysctl.d/99-stig.conf'

> sudo sysctl --system