19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Hardware & Software Remarks<br />

____________________________________________________________________ .........................................<br />

SET ADD<strong>IT</strong>IONAL SECUR<strong>IT</strong>Y CHECKS = ON<br />

This parameter activates additional security checks which are incompatible<br />

with earlier NDS versions.<br />

<strong>The</strong> parameters listed above are absolutely mandatory for observance of the<br />

security certification in accordance with class C2 and class F-C2/E2. <strong>The</strong><br />

parameters in the following can be used for extending the security functions.<br />

SET CHECK EQUIVALENT TO ME = ON (Default=OFF)<br />

This parameter forces checking of the NDS attribute "Equivalent To Me" on<br />

the server. If the value for extended security is set to ON, the attributes<br />

"Equivalence" and "Equivalent To Me" must be synchronised with the<br />

DSREPAIR application. Activating this option may possibly have detrimental<br />

effects on the system’s authentication speed.<br />

SET NCP PACKET SIGNATURE = 3 (Default=1)<br />

Communication between a Novell Netware client and a Novell Netware server<br />

is controlled by the Netware Core Protocol (NCP). <strong>The</strong> client and server<br />

exchange individual packets which contain data. A potential attacker can<br />

monitor these packets by using special programs (see T 5.58 "Hacking Novell<br />

Netware") and can manipulate packets belonging to users with higher<br />

privileges.<br />

<strong>The</strong> packet signature was developed to counteract this threat. When a user<br />

logs on to the network, a secret key is determined. Whenever a workstation<br />

then sends an inquiry to the network using NCP, it is provided with a<br />

signature formed from the secret key and the signature of the previous packet.<br />

This signature will be attached to the relevant packet and sent to the server.<br />

<strong>The</strong> server will verify the packet signature before dealing with the actual<br />

inquiry.<br />

<strong>The</strong> packet signature can be activated on the server with this parameter. <strong>The</strong><br />

following NCP packet signature levels are possible:<br />

0 = <strong>The</strong>re are no NCP packet signatures.<br />

1 = <strong>The</strong> Novell Netware server uses NCP packet signatures at the<br />

request of the client.<br />

2 = <strong>The</strong> Novell Netware server requires an NCP packet-signature from<br />

the client. If the client cannot supply one, communication between<br />

the client and the Novell Netware server is nonetheless allowed.<br />

3 = <strong>The</strong> NCP packet signature is mandatory.<br />

To guarantee security, the value for the NCP packet signature should be set to<br />

3. <strong>The</strong> Novell Netware server and the client sotware on the workstations must<br />

be configured accordingly. However, as use of the NCP packet signature<br />

increases network load, it should be clarified beforehand whether performance<br />

will be reduced unacceptably as a result.<br />

SECURE CONSOLE<br />

This command triggers several functions. It should therefore only be executed<br />

on security-sensitive systems. <strong>The</strong> functions are:<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!