19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

S 4.9 Use of the security mechanisms of X Windows<br />

Initiation responsibility: <strong>IT</strong> Security Management, Administrators<br />

Implementation responsibility: Administrators<br />

Release 5 of the X Window software offers only a few features enhancing<br />

security in case of data transmission between the X server and the X client;<br />

hence use of X Windows software can only be recommended for secure<br />

environments.<br />

- Computer-specific access control: Each X server comprises a list of<br />

approved computers, which can be altered with the xhost command. It is<br />

essential that this is confined to those computers which really need access<br />

to the X server; under no circumstances should universal access with<br />

xhost + be allowed. This can be achieved by explicitly entering computers<br />

in the xhost table. Moreover, it should be borne in mind that every user has<br />

unrestricted access to the X server on one of the computers that have been<br />

approved. This type of access control can therefore only be recommended<br />

when there are compelling reasons as to why none of the security<br />

mechanisms listed below can be used.<br />

- User-specific access control: <strong>The</strong> X server process can be configured in<br />

such a way that in case of a log-in (e.g. by means of xdm) a key will be<br />

generated which will be used for authentication for transmission between a<br />

client and a server. This key (MAGIC COOKIE) is filed in the home directory<br />

of the user in the .Xauthority file and can, by means of the xauth command,<br />

also be transmitted to the X client. Whilst, however, the M<strong>IT</strong> MAGIC COOKIE<br />

mechanism must be regarded only as a type of password which can be<br />

intercepted during transmission, a mechanism offered in conjunction with<br />

NIS and working with a form of DES encryption offers greater security and<br />

should therefore be used wherever possible.<br />

- Access control via Secure Shell: communication between X client and X<br />

server can also take place over a protected channel of an ssh connection<br />

(see also S 5.64 Use of Secure Shell). <strong>The</strong> result is both a computer-based<br />

and also a user-based access control system. <strong>The</strong> authentication and user<br />

data is encrypted. If X Windows is to be securely operated, the use of<br />

Secure Shell is therefore recommended.<br />

It is possible for keyboard inputs at a remote terminal to be translated into<br />

plain text and viewed under X Windows with an additional program. When<br />

using the xterm program forwarding of keyboard inputs by suppressing<br />

transmission of KeyPress events to other applications can be prevented. To<br />

ensure that only the corresponding window has access to the keyboard, the<br />

secure keyboard option must be enabled from the xterm menu.<br />

Additional controls:<br />

- Are steps taken to prevent users from disabling the computer-specific<br />

access control system via the command xhost +?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

xhost command<br />

M<strong>IT</strong>-MAGIC-COOKIE<br />

NIS authentication<br />

DMA channel<br />

Eavesdropping of<br />

keyboard inputs

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!