Korean
<< Back
VID 13006
Severity 30
Port
Protocol IP
Class Protocol
Detailed Description The host is detected to have IP forwarding enabled.
IP forwarding allow a host to act as a router, allowing other hosts to forward packets through the host. If the target host is acting as a firewall, it is essential that IP forwarding be disabled, or an attacker can simply route through the target host directly to access systems behind this system.

* References:
http://www.iss.net/security_center/static/193.php
Recommendation Disable IP forwarding unless this host is acting as a gateway.

To be disable IP Forwarding in Windows:

1. Use Registry Editor (Regedt32.exe) to view the following registry key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters

2. Set the following registry value:
Value Name: IPEnableRouter
Value type: REG_DWORD
Value Data: 0

3. Restart the system

To be disable IP Forwarding in Solaris:

# ndd /dev/ip ip_forwarding
1
# ndd -set /dev/ip ip_forwarding 0
# ndd /dev/ip ip_forwarding
0

To be disable IP Forwarding in AIX:

# no -o ipforwarding
ipforwarding = 1
# no -o ipforwarding=0
# no -o ipforwarding
ipforwarding = 0

To be disable IP Forwarding in HP-UX:

1. Edit '/etc/conf/netinet/ip_var.h' file
2. Go to the line '#define IPFORWARDING 1'
3. Modify '1' to '0'
4. Recompile kernel (by typing 'make' command) at /stand/build directory, and Reboot the system
Related URL CVE-1999-0511 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)