SV-238367r654276_rule
V-238367
SRG-OS-000420-GPOS-00186
UBTU-20-010446
CAT II
10
Configure the application firewall to protect against or limit the effects of DoS attacks by ensuring the Ubuntu operating system is implementing rate-limiting measures on impacted network interfaces. 
 
Check all the services listening to the ports with the following command: 
 
$ sudo ss -l46ut 
 
Netid               State                Recv-Q                Send-Q                               Local Address:Port                               Peer Address:Port               Process                
tcp                 LISTEN               0                     128                                           [::]:ssh                                        [::]:* 
 
For each service with a port listening to connections, run the following command, replacing "[service]" with the service that needs to be rate limited. 
 
$ sudo ufw limit [service] 
 
Rate-limiting can also be done on an interface. An example of adding a rate-limit on the eth0 interface follows: 
 
$ sudo ufw limit in on eth0
Verify an application firewall is configured to rate limit any connection to the system. 
 
Check all the services listening to the ports with the following command: 
 
$ sudo ss -l46ut 
 
Netid               State                Recv-Q                Send-Q                               Local Address:Port                               Peer Address:Port               Process                
tcp                 LISTEN               0                     128                                           [::]:ssh                                        [::]:* 
 
For each entry, verify that the Uncomplicated Firewall is configured to rate limit the service ports with the following command: 
 
$ sudo ufw status 
 
Status: active 
 
To                         Action      From 
--                         ------      ---- 
22/tcp                     LIMIT       Anywhere                   
22/tcp (v6)                LIMIT       Anywhere (v6) 
 
If any port with a state of "LISTEN" is not marked with the "LIMIT" action, this is a finding.
V-238367
False
UBTU-20-010446
Verify an application firewall is configured to rate limit any connection to the system. 
 
Check all the services listening to the ports with the following command: 
 
$ sudo ss -l46ut 
 
Netid               State                Recv-Q                Send-Q                               Local Address:Port                               Peer Address:Port               Process                
tcp                 LISTEN               0                     128                                           [::]:ssh                                        [::]:* 
 
For each entry, verify that the Uncomplicated Firewall is configured to rate limit the service ports with the following command: 
 
$ sudo ufw status 
 
Status: active 
 
To                         Action      From 
--                         ------      ---- 
22/tcp                     LIMIT       Anywhere                   
22/tcp (v6)                LIMIT       Anywhere (v6) 
 
If any port with a state of "LISTEN" is not marked with the "LIMIT" action, this is a finding.
M
5318