27.01.2014 Views

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

GUIDELINES ON SECURING PUBLIC WEB SERVERS<br />

• Time value of data (if data is valuable but for <strong>on</strong>ly a short time period [e.g., days as opposed to<br />

years], then a weaker encrypti<strong>on</strong> algorithm could be used)<br />

• Threat to data (the higher the threat level, the str<strong>on</strong>ger the required encrypti<strong>on</strong>)<br />

• Other protective measures that are in place and that may reduce the need for str<strong>on</strong>ger<br />

encrypti<strong>on</strong>—for example, using protected methods of communicati<strong>on</strong>s, such as dedicated circuits<br />

as opposed to the public Internet<br />

Required performance (higher performance requirements may require procurement of additi<strong>on</strong>al<br />

system resources, such as a hardware cryptographic accelerator, or may necessitate weaker<br />

encrypti<strong>on</strong>)<br />

System resources (fewer resources [e.g., process, memory] may necessitate weaker encrypti<strong>on</strong>)<br />

Import, export, or usage restricti<strong>on</strong>s<br />

Encrypti<strong>on</strong> schemes supported by <strong>Web</strong> server applicati<strong>on</strong><br />

Encrypti<strong>on</strong> schemes supported by <strong>Web</strong> browsers of expected users.<br />

7.5.5 Implementing SSL/TLS<br />

A digital signature is needed to implement SSL/TLS <strong>on</strong> a <strong>Web</strong> server. A certificate, which is the digital<br />

equivalent of an ID card, is used in c<strong>on</strong>juncti<strong>on</strong> with a public key encrypti<strong>on</strong> system. Certificates can be<br />

issued by trusted third parties, known as CAs, or can be self-signed. Organizati<strong>on</strong>al requirements<br />

determine which approach is used.<br />

Although the sequence of steps is not identical for all <strong>Web</strong> servers, the implementati<strong>on</strong> of a third-party<br />

signed certificate for a <strong>Web</strong> server generally includes at least three steps:<br />

Generating and submitting a certificate-signing request (CSR)<br />

Picking up a signed SSL/TLS certificate from a CA<br />

Installing the certificate and c<strong>on</strong>figuring the <strong>Web</strong> server to use SSL/TLS for any specified resources.<br />

A CSR c<strong>on</strong>sists of three parts: certificati<strong>on</strong> request informati<strong>on</strong>, a signature algorithm identifier, and a<br />

digital signature over the certificati<strong>on</strong> request informati<strong>on</strong>. <strong>Web</strong> servers that are SSL/TLS enabled<br />

provide specific instructi<strong>on</strong>s for the generati<strong>on</strong> of a CSR. There are two major types of CSRs. The most<br />

popular is the encoded <strong>Public</strong> Key Cryptography Standard (PKCS) #10, Certificati<strong>on</strong> Request Syntax<br />

Standard, which is used by newer <strong>Web</strong> servers [RSA00]. The other CSR type, based <strong>on</strong> the Privacy<br />

Enhanced Mail (PEM) specificati<strong>on</strong>, is called either PEM message header or <strong>Web</strong> site professi<strong>on</strong>al<br />

format. The use of this CSR is generally limited to older <strong>Web</strong> servers. Most <strong>Web</strong> servers generate PKCS<br />

#10-compliant CSRs similar to the sample CSR shown in Figure 7-2. A CSR provides not <strong>on</strong>ly<br />

additi<strong>on</strong>al informati<strong>on</strong> about a given entity, or a “challenge password” by which the entity may later<br />

request certificate revocati<strong>on</strong>, but also attributes for inclusi<strong>on</strong> in X.509 certificates [RSA00].<br />

7-8

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!