UCF STIG Viewer Logo

The firewall implementation must block all inbound traceroutes to prevent network discovery by unauthorized users.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-NET-000273-FW-000258 SRG-NET-000273-FW-000258 SRG-NET-000273-FW-000258_rule Medium
Description
The traceroute tool will display routes and trip times on an IP network. An attacker can use traceroute responses to create a map of the subnets and hosts behind the perimeter. The traditional traceroute relies on TTL - time exceeded responses from routers along the path and an ICMP port-unreachable message from the target host. In some operating systems, such as UNIX, traceroute will use UDP port 33400 and increment ports on each response. Since blocking these UDP ports alone will not block traceroute capabilities without also blocking potentially legitimate traffic on a network, it is unnecessary to block them explicitly. Because traceroutes typically rely on an ICMP Type 11 - Time Exceeded message, the time-exceeded message will be the target, either implicitly or explicitly blocking outbound traffic from the trusted network.
STIG Date
Firewall Security Requirements Guide 2014-07-07

Details

Check Text ( C-SRG-NET-000273-FW-000258_chk )
Review the configuration of the firewall implementation to determine if ACLs block ICMP Type 11 - Time Exceeded outbound to untrusted networks (e.g., ISP and other non-DoD networks). If ICMP Type 11 - Time Exceeded is not blocked outbound on the router, this is a finding.
Fix Text (F-SRG-NET-000273-FW-000258_fix)
Configure the firewall implementation to block ICMP Type 11 - Time Exceeded outbound to untrusted networks (e.g., ISP and other non-DoD networks).