19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

S 4.21 Preventing unauthorised acquisition of<br />

administrator rights<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: Administrators<br />

With the su command, any user can obtain superuser privileges if he knows<br />

the relevant password. Since there is no upper limit on the number of<br />

unsuccessful attempts at log-on in the case of su, there is an increased risk that<br />

the password may be discovered by systematic try-out with the help of<br />

suitable programs. <strong>The</strong>refore, su should be available only to the superuser.<br />

Alternatively, a modified su can be installed under which the number of<br />

unsuccessful attempts is restricted, the delay before su can be invoked again is<br />

longer, and, after a certain number of unsuccessful attempts, it is not possible<br />

to executability of su and/or the terminal as a whole is blocked. All use of the<br />

su command should be logged.<br />

Where permitted by the given system, a log-in name other than root may be<br />

selected for the superuser. However, only Administrator log-ins should be<br />

created as additional superuser log-ins (see S 2.33 Division of Administrator<br />

roles under UNIX)<br />

To prevent discovery of the Administrator's password through line tapping, he<br />

should only be allowed to work from the console. Under Solaris, for instance,<br />

this can be achieved by appropriately configuring the /etc/default/login file.<br />

Under BSD UNIX, root can only log on at terminals designated as secure in<br />

the /etc/ttytab file. If this option is removed from all terminals, an<br />

Administrator can only log on at a terminal with the command su as root.<br />

Consideration should be given to setting up a user group to which execution of<br />

the command su is limited.<br />

If under BSD UNIX, the console is designated as secure in the /etc/ttytab file,<br />

no password is requested during start-up in the single-user mode. It is<br />

therefore essential that this entry is removed.<br />

<strong>The</strong> file /etc/ftpusers contains the log-in names which are not allowed to log<br />

on via ftp. With ftp, passwords are transmitted over an unprotected plain text<br />

connection. <strong>The</strong>refore administrative accesses (root, bin, daemon, sys, adm,<br />

lp, smtp, uucp, nuucp, etc.) should be entered in this file. Under some standard<br />

installations, root is not contained in this file.<br />

If a user or a user program executes a superuser file (files with the owner root<br />

and with s bit set), this user or program will, during execution, obtain<br />

superuser rights. This is required for certain applications, but can in instances<br />

also be abused. <strong>The</strong>refore, care must be taken to ensure that only essential<br />

program files are superuser files and that no extra superuser files can be added<br />

by third persons.<br />

Automatic mounting of devices for exchangeable data media<br />

With s bit programs in the mounted drive, an ordinary user can acquire<br />

superuser rights. <strong>The</strong>refore, automatic mounting (automounting) must be<br />

restricted. Some versions of UNIX offer a variant of the mount command<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Restrict access to su<br />

Administrative tasks<br />

should only be<br />

performed at the console<br />

Do not designate<br />

console as secure<br />

Block ftp for<br />

administrative accesses<br />

Avoid s bit<br />

Avoid automatic<br />

mounting

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!