27.01.2014 Views

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

GUIDELINES ON SECURING PUBLIC WEB SERVERS<br />

7.5.6 SSL/TLS Implementati<strong>on</strong>s<br />

Although some <strong>Web</strong> servers come packaged with SSL capabilities already integrated, many do not. This<br />

secti<strong>on</strong> discusses various commercial and open-source SSL/TLS implementati<strong>on</strong>s. Some of these<br />

packages c<strong>on</strong>tain the functi<strong>on</strong>ality to generate SSL certificates without the need of a CA. The following<br />

list includes some of the SSL toolkits available:<br />

OpenSSL is an open-source implementati<strong>on</strong> of SSL/TLS for Unix and Linux platforms<br />

(http://www.openssl.org/).<br />

Network Security Services (NSS) is an open-source implementati<strong>on</strong> of SSL/TLS developed by the<br />

Mozilla foundati<strong>on</strong>. 61 NSS is derived from the original Netscape SSL implementati<strong>on</strong>.<br />

GnuTLS is an open-source implementati<strong>on</strong> of SSL/TLS developed by the Free Software<br />

Foundati<strong>on</strong>. 62<br />

Java Secure Socket Extensi<strong>on</strong> (JSSE) is an implementati<strong>on</strong> of SSL/TLS developed by Sun for<br />

distributi<strong>on</strong> as part of the Java Runtime Envir<strong>on</strong>ment (JRE). 63<br />

Security Support Provider Interface (SSPI) is an implementati<strong>on</strong> of SSL/TLS available <strong>on</strong> Microsoft<br />

Windows Server 2003.<br />

IBM Java Secure Sockets Extensi<strong>on</strong> (IBMJSSE) is an implementati<strong>on</strong> of SSL/TLS for the<br />

<strong>Web</strong>Sphere Applicati<strong>on</strong> Server.<br />

Federal government organizati<strong>on</strong>s are required to use Federal Informati<strong>on</strong> Processing Standards (FIPS)-<br />

validated SSL/TLS implementati<strong>on</strong>s when protecting data using SSL/TLS. The Cryptographic Module<br />

Validati<strong>on</strong> Program (CMVP) performs validati<strong>on</strong> testing of cryptographic modules, including SSL/TLS<br />

implementati<strong>on</strong>s. 64 <str<strong>on</strong>g>NIST</str<strong>on</strong>g> provides a list of FIPS 140-2 65 -compliant vendors and implementati<strong>on</strong>s. 66<br />

Regardless of what SSL/TLS implementati<strong>on</strong> is used, it is important to ensure that security patches are<br />

regularly applied. Security flaws in SSL/TLS implementati<strong>on</strong>s can potentially allow attackers to spoof<br />

PKI certificates, forge digital signatures, perform DoS attacks, or execute arbitrary code in the <strong>Web</strong><br />

server.<br />

7.6 Brute Force Attacks<br />

Many <strong>Web</strong> sites authenticate users via username and password combinati<strong>on</strong>s—whether through HTTP<br />

Basic, HTTP Digest, or a <strong>Web</strong> form over SSL. Regardless of implementati<strong>on</strong>, username and password<br />

combinati<strong>on</strong>s are susceptible to brute force attacks. Brute force attacks can occur in multiple forms:<br />

Username Harvesting—Applicati<strong>on</strong>s that differentiate between an invalid password and an invalid<br />

username can allow attackers to c<strong>on</strong>struct a list of valid user accounts.<br />

61<br />

62<br />

63<br />

64<br />

65<br />

66<br />

http://www.mozilla.org/projects/security/pki/nss/<br />

http://www.gnu.org/software/gnutls/<br />

http://java.sun.com/products/jsse/index.jsp<br />

http://csrc.nist.gov/cryptval/<br />

http://csrc.nist.gov/publicati<strong>on</strong>s/fips/fips140-2/fips1402.pdf<br />

http://csrc.nist.gov/cryptval/140-1/1401vend.htm<br />

7-12

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!