19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

S 5.21 Secure use of telnet, ftp, tftp and rexec<br />

Initiation responsibility: <strong>IT</strong> Security Management, Administrators<br />

Implementation responsibility: Administrators<br />

With the telnet hostname command it is possible to log into the hostname<br />

computer after entry of a user name and associated password. With ftp,<br />

sizeable quantities of data can be copied, and rexec allows execution of a<br />

command on another computer without previously logging on. For all of these<br />

three programs, the entered user names and passwords are transmitted<br />

unencrypted over the network; so they should only be used when one can be<br />

certain that the network cannot be intercepted (cf. T 5.7). All calls to telnet, ftp<br />

and rexec must be logged. Particular attention must be paid to unsuccessful<br />

connection attempts by external <strong>IT</strong> systems.<br />

When using the ftpd daemon, it must be borne in mind that, as in the case of<br />

sendmail (cf. S 5.19 Use of the sendmail security mechanisms), new, serious<br />

security flaws are constantly coming to light which may make it possible to<br />

gain Administrator privileges without a password (on this point, see CERT<br />

notice CA-94-08. 14 April 1994). ftp versions that are older than those<br />

described there should not be used.<br />

In addition, all user names for which ftp access is not to be permitted should<br />

be entered in the /etc/ftpusers file. <strong>The</strong>se include, for example, root, uucp and<br />

bin. When configuring new users, care should be taken to ensure that these are<br />

entered in /etc/ftpusers if their profile does not permit them any ftp access (see<br />

also S 2.30 Provisions governing the configuration of users and user groups).<br />

With .netrc-files, automatic FTP accesses to remote <strong>IT</strong> systems are permitted<br />

as .netrc files contain the necessary passwords. Steps must therefore be taken<br />

to ensure that there are no .netrc-files in the user directories or else that they<br />

are empty and the user is unable to access them.<br />

Use of the tftpd, rexd and rexecd daemons must be prevented (e.g. by deleting<br />

the corresponding entry in /etc/inetd.conf) or, as a minimum, steps must be<br />

taken to ensure that, when using tftp, users only have restricted access to files<br />

from the log-in directory (see also S 2.32 Establishment of a restricted user<br />

environment). This can be verified by making the following entries:<br />

tftp hostname<br />

tftp>get /etc/passwd /tmp/txt<br />

If the tftp daemon does not respond with an error message, its use must be<br />

prevented.<br />

If notwithstanding tftp is still used for the start-up process of active network<br />

components or X terminals, it is essential that this is documented and the<br />

underlying rationale is explained. Again, if tftp is used, steps must be taken to<br />

ensure that the tftp daemon is started with the option –s directory. <strong>The</strong><br />

directory entered here must be the only directory which is visible to the<br />

daemon.<br />

Secure Shell (ssh) can be used as a substitute for telnet and rexec. It makes use<br />

of extensive functions designed to ensure secure authentication and to<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Passwords in plain text<br />

Security weaknesses in<br />

ftpd<br />

Restrict ftp access<br />

Restricted file access<br />

with tftp<br />

Use Secure Shell as a<br />

substitute

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!