19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

the preceding point, the availability of these commands can be verified,<br />

e.g. by entering the vrfy useralias command.<br />

- <strong>The</strong> configuration file sendmail.cf should belong to root, and read and<br />

write access should also be confined to root. <strong>The</strong> same goes for the higherlevel<br />

directories since, otherwise, by simply renaming these directories, it<br />

is possible to generate a new sendmail.cf file.<br />

- Identification of executable programmes or of files as valid addresses for a<br />

recipient or sender must be prevented by the configuration of sendmail.cf<br />

or, by appropriate measures, be confined to certain safe programmes and<br />

files.<br />

- <strong>The</strong> F command (that is, for instance, FX/path [^#]) which serves to define<br />

classes should be used in the configuration file (sendmail.cf) only to read<br />

files which anyhow can be read system-wide, as, otherwise, relevant<br />

security information from protected files might become generally<br />

available. <strong>The</strong> programme format of the F command (e.g. FXFehler! Es<br />

wurde kein Textmarkenname vergeben./tmp/prg) should not be used!<br />

- For definition of the delivery agent (e.g. Mlocal), only absolute paths may<br />

be indicated (e.g. P=/bin/mail). Also the S (suid) flag should be set only<br />

when any security problems involved have been resolved.<br />

- For any file to which sendmail could write, e.g. sendmail.st for statistics,<br />

only root should have write access, and it should also only be listed in the<br />

directories belonging to root. <strong>The</strong> same goes for files used by sendmail,<br />

such as :include: in mailing lists<br />

- Privileged users like bin or root should not have a .forward file. If the user<br />

or group write-access rights for this file are set incorrectly, or if a user<br />

manages to get into a privileged group, he can generate a shell with the<br />

privileged user ID.<br />

In the case of normal users, only the owner should have write access to the<br />

.forward file, and this must be located in a directory belonging to the<br />

owner.<br />

In case asystem-wide write access to a home directory needs to be<br />

available, e.g. uucp, creation of a deleterious .forward file can be prevented<br />

in the following way: A directory with the name .forward, the rights 000<br />

and the owner root and, under this directory, a file also having the rights<br />

000 and the owner root must be created so that nobody else but root can<br />

modify or delete these files. In this case, the home directory of uucp should<br />

also belong to root and be provided with the sticky bit (t). A similar<br />

approach is recommended also for other configuration files (e.g. .login,<br />

.cshrc) in directories which can system-wide be written to.<br />

- Any executable programme, including uudecode in particular, should be<br />

removed from the alias file. Moreover, the alias file and the pertinent<br />

database should belong to root, and only root should have write access to<br />

them.<br />

- It must be borne in mind that any received mail might be corrupt.<br />

Corruption can occur either in the mail queue or through log-in on port 25.<br />

<strong>The</strong> first situation can be avoided if the mail queue directory belongs to<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!