19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

S 4.100 Firewalls and active content<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: Administrators<br />

One of the biggest difficulties with the conceptual design of a firewall is how<br />

to deal with problems that arise as a result of the transmission of active<br />

content to the computers in the network requiring protection. This includes not<br />

only the detection and eradication of computer viruses, which can be carried<br />

out relatively easily, even on users’ computers, but also the much more<br />

difficult problem of detecting ActiveX controls, Java applets or scripting<br />

programs with damaging functions. At present there are still no practicable<br />

programs for this purpose, none which enable the effective detection of<br />

damaging functions similar to that which is possible in the area of computer<br />

viruses.<br />

<strong>The</strong> magnitude of the danger originating from active content for the computers<br />

in the network being protected can be illustrated with the aid of the following<br />

example. In accordance with the Java specifications, a Java applet or the<br />

browser is allowed to establish a network connection to the server from which<br />

it was loaded. This possibility, although still very rarely used at the moment, is<br />

a key prerequisite for the use of network computers (NCs) or similar<br />

equipment which have to load programs from the server without this being<br />

specifically initiated by the user. In order to be able support this property in<br />

full despite the use of a packet filter, a great many more port numbers have to<br />

be enabled or it is necessary to use a dynamic packet filter. If this is the case,<br />

Java applets can be used to enable the establishment of barely controllable IP<br />

connections.<br />

<strong>The</strong>re are essentially two approaches to countering the problems of “active<br />

content with damaging functions”. Firstly, control and therefore also<br />

responsibility for execution can be shifted to the users, who have the option in<br />

their browsers of disabling the active content and only reactivating it when<br />

they are sure that individual offers are „trustworthy“. <strong>The</strong> main problem with<br />

this solution is, how is it possible to establish which providers are trustworthy<br />

and which are not.<br />

<strong>The</strong> other possible method of controlling active content is to use an<br />

appropriate filter in conjunction with a firewall. Proxy processes, by dint of<br />

their design, are basically very well suited to analysing the transmitted user<br />

data. <strong>The</strong> corresponding programs are called up within an HTML page using<br />

special tags (tag = label for structures within an HTML page). It is also<br />

conceivable to use a solution where all lines with corresponding tags are<br />

deleted from an HTML page or are replaced by output lines which indicate to<br />

the user that the required Java applet has been blocked by the firewall.<br />

<strong>The</strong> problem with this approach is that it is not easily possible to recognise all<br />

HTML pages and, in turn, to recognise all tags that are to be deleted on those<br />

pages. For example – and this occurs frequently nowadays – HTML pages can<br />

be sent as the contents of e-mails. Intelligent e-mail programs recognise this<br />

and automatically start a browser which can display the HTML page, and<br />

which then of course also runs the Java applet or ActiveX control. It is also<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!