The system must not respond to ICMP timestamp requests.
Severity | Group ID | Group Title | Version | Rule ID | Date | STIG Version |
---|---|---|---|---|---|---|
low | V-216369 | SRG-OS-000480 | SOL-11.1-050020 | SV-216369r959010_rule | 2024-11-25 | 3 |
Description |
---|
By accurately determining the system's clock state, an attacker can more effectively attack certain time-based pseudorandom number generators (PRNGs) and the authentication systems that rely on them. |
ℹ️ Check |
---|
Determine if ICMP time stamp responses are disabled. # ipadm show-prop -p _respond_to_timestamp -co current ip If the output of both commands is not "0", this is a finding. |
✔️ Fix |
---|
The Network Management profile is required. Disable source respond to timestamp. # pfexec ipadm set-prop -p _respond_to_timestamp=0 ip |