RHEL 10 must be configured to use Transmission Control Protocol (TCP) syncookies.

STIG ID: RHEL-10-800080  |  SRG: SRG-OS-000420-GPOS-00186 |  Severity: medium (CAT II)  |  CCI: CCI-002385,CCI-001095 |  Vulnerability Id: V-281340

Vulnerability Discussion

Denial of service (DoS) is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or must operate at degraded capacity.

Managing excess capacity ensures that sufficient capacity is available to counter flooding attacks. Employing increased capacity and service redundancy may reduce the susceptibility to some DoS attacks. Managing excess capacity may include, for example, establishing selected usage priorities, quotas, or partitioning.

Satisfies: SRG-OS-000420-GPOS-00186, SRG-OS-000142-GPOS-00071

Check

Verify RHEL 10 is configured to use Internet Protocol version 4 (IPv4) TCP syncookies.

Check the value of all "net.ipv4.tcp_syncookies" variables with the following command:

$ sudo sysctl net.ipv4.tcp_syncookies
net.ipv4.tcp_syncookies = 1

If the network parameter "ipv4.tcp_syncookies" is not equal to "1", or nothing is returned, this is a finding.

Fix

Configure RHEL 10 to use TCP syncookies.

Create a configuration file if it does not already exist:

$ sudo vi /etc/sysctl.d/99-ipv4_tcp_syncookies.conf

Add the following line to the file:

net.ipv4.tcp_syncookies = 1

Reload settings from all system configuration files with the following command:

$ sudo sysctl --system