STIGQter STIGQter: STIG Summary: Solaris 10 X86 Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 22 Jan 2021:

The system must log martian packets.

DISA Rule

SV-227804r603266_rule

Vulnerability Number

V-227804

Group Title

SRG-OS-000062

Rule Version

GEN003611

Severity

CAT III

CCI(s)

Weight

10

Fix Recommendation

Configure the system to log martian packets using IPF. Add rules logging inbound traffic containing invalid source addresses, which minimally include the system's own addresses and broadcast addresses for attached subnets.

For example, consider a system with a single network connection having IP address 192.168.1.10 with a local subnet broadcast address of 192.168.1.255. Packets with source addresses of 192.168.1.10 and 192.168.1.255 must be logged if received by the system from the network connection.

Edit /etc/ipf/ipf.conf and add the following rules, substituting local addresses and interface names:
block in log quick on ce0 from 192.168.1.10 to any
block in log quick on ce0 from 192.168.1.255 to any

Reload the IPF rules.
Procedure:
# ipf -Fa -A -f /etc/ipf/ipf.conf

Check Contents

If the system is not a global zone, this vulnerability is not applicable.

Determine if the system is configured to log martian packets. Examine the IPF rules on the system.

Procedure:
# ipfstat -i

There must be rules logging inbound traffic containing invalid source addresses, which minimally include the system's own addresses and broadcast addresses for attached subnets. If such rules do not exist, this is a finding.

Vulnerability Number

V-227804

Documentable

False

Rule Version

GEN003611

Severity Override Guidance

If the system is not a global zone, this vulnerability is not applicable.

Determine if the system is configured to log martian packets. Examine the IPF rules on the system.

Procedure:
# ipfstat -i

There must be rules logging inbound traffic containing invalid source addresses, which minimally include the system's own addresses and broadcast addresses for attached subnets. If such rules do not exist, this is a finding.

Check Content Reference

M

Target Key

4061

Comments