The system must not respond to ICMP timestamp requests.
Severity | Group ID | Group Title | Version | Rule ID | Date | STIG Version |
|---|---|---|---|---|---|---|
| low | V-216369 | SRG-OS-000480 | SOL-11.1-050020 | SV-216369r959010_rule | 2025-05-05 | 3 |
| Description |
|---|
| By accurately determining the system's clock state, an attacker can more effectively attack certain time-based pseudorandom number generators (PRNGs) and the authentication systems that rely on them. |
| ℹ️ Check |
|---|
| Determine if ICMP time stamp responses are disabled. # ipadm show-prop -p _respond_to_timestamp -co current ip If the output of both commands is not "0", this is a finding. |
| ✔️ Fix |
|---|
| The Network Management profile is required. Disable source respond to timestamp. # pfexec ipadm set-prop -p _respond_to_timestamp=0 ip |