19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

S 5.34 Use of one-time passwords<br />

Initiation responsibility: <strong>IT</strong> Security Management, Administrators<br />

Implementation responsibility: Administrators<br />

It is relatively easy to intercept passwords which are transferred in uncoded<br />

form through networks. Implementation and logging errors in the operating<br />

system and application software might even threaten the security of encrypted<br />

passwords as well.<br />

For this reason, it is advisable to use one-time passwords which are changed<br />

after first usage. Both hardware and software-aided generation of one-time<br />

passwords is possible.<br />

Users must generate one-time passwords on the local <strong>IT</strong> system or via a token,<br />

or read them from a list which is generated by the remote <strong>IT</strong> system and must<br />

be kept in a safe place. One-time passwords must be verified by the remote <strong>IT</strong><br />

system.<br />

Public-domain programmes, e.g. OPIE or S/Key, can be used for one-time<br />

passwords. OPIE (one-time passwords in everything) is a public-domain<br />

advancement of S/Key, which is now marketed as a commercial product.<br />

As opposed to OPIE, S/Key still uses the MD4 algorithm as standard for<br />

generating and verifying one-time passwords. Due to the recognised<br />

weaknesses of the MD4 algorithm the MD5 algorithm supplied should be<br />

used.<br />

<strong>The</strong> OPIE and S/key programmes consist of a routine on the server for<br />

verifying entered passwords and a routine on the user's <strong>IT</strong> system. After<br />

logging into the remote system and entering their name, users obtain a display<br />

of the sequential number of the password to be entered and an ID. Using these<br />

two items and a confidential password, OPIE or S/Key calculate the one-time<br />

password for this session on the local <strong>IT</strong> system. If no local programme is<br />

available to the user for the purpose of calculating one-time passwords, the<br />

remote system can generate a list of one-time passwords which must then be<br />

kept in a safe place.<br />

Non-recurrent passwords can also be generated via tokens which provide the<br />

generation and which can consist of chip cards or devices similar to pocket<br />

calculators. <strong>The</strong> token first requires authentication by the user. After that, the<br />

token either authenticates itself automatically to the server, or provides the<br />

user with a display of the one-time password to be entered on the client.<br />

<strong>The</strong> greater the amount of sensitive information which needs to be protected<br />

against unauthorised access simply through the use of passwords, the greater<br />

the importance of one-time passwords and hardware-based authentication<br />

methods. Hardware-based systems should be used in situations where the use<br />

of software-based one-time password systems such as OPIE are not readily<br />

accepted. In addition, many hardware-based systems also offer the possibility<br />

of configuring a ”single sign-on” option. With this option, users no longer<br />

have to employ a different password for each individual <strong>IT</strong> system, even in<br />

large, heterogeneous networks. Instead, they only need to authenticate<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!