The system must provide protection against IP fragmentation attacks.

From AIX 6.1 SECURITY TECHNICAL IMPLEMENTATION GUIDE

Part of GEN000000-AIX0230

Associated with IA controls: ECSC-1

Associated with: CCI-000032

SV-38702r1_rule The system must provide protection against IP fragmentation attacks.

Vulnerability discussion

The parameter ip_nfrag provides an additional layer of protection against IP fragmentation attacks. The value the ip_nfrag specifies is the maximum number of fragments of an IP packet that can be kept in the IP reassembly queue at any time. The default value of this network option is 200. This is a reasonable value for most environments and offers protection from IP fragmentation attacks.

Check content

Fix text

Set the ip_nfrag parameter to 200. # /usr/sbin/no -p -o ip_nfrag=200

Pro Tips

Lavender hyperlinks in small type off to the right (of CSS class id, if you view the page source) point to globally unique URIs for each document and item. Copy the link location and paste anywhere you need to talk unambiguously about these things.

You can obtain data about documents and items in other formats. Simply provide an HTTP header Accept: text/turtle or Accept: application/rdf+xml.

Powered by sagemincer