STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide

V-269256

CAT II (Medium)

AlmaLinux OS 9 must not send Internet Control Message Protocol (ICMP) redirects.

Rule ID

SV-269256r1050138_rule

STIG

Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide

Version

V1R6

CCIs

CCI-000366

Discussion

ICMP redirect messages are used by routers to inform hosts that a more direct route exists for a particular destination. These messages contain information from the system's route table possibly revealing portions of the network topology. The ability to send ICMP redirects is only appropriate for systems acting as routers.

Check Content

Verify AlmaLinux OS 9 does not send ICMP redirects.

Check the value of the "send_redirects" variables with the following command:

$ sysctl -a | grep send_redirects

net.ipv4.conf.all.send_redirects = 0
net.ipv4.conf.default.send_redirects = 0
net.ipv4.conf.enp1s0.send_redirects = 0
net.ipv4.conf.lo.send_redirects = 0

If the returned lines do not all have a value of "0", this is a finding.

Fix Text

Configure AlmaLinux OS 9 to not allow interfaces to perform ICMP redirects.

Create a numbered *.conf file in /etc/sysctl.d/ with the following content:

net.ipv4.conf.all.send_redirects = 0
net.ipv4.conf.default.send_redirects = 0
net.ipv4.conf.lo.send_redirects = 0
EOF

The system configuration files need to be reloaded for the changes to take effect. To reload the contents of the files, run the following command:

$ sysctl –system