19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

<strong>The</strong> command SYST, with which a client asks for the operation system<br />

version of the server, should be linked to an authorisation administration and<br />

blocked for untrustworthy users.<br />

Moreover, it must be possible to encrypt the transmission of files, directory<br />

information and passwords.<br />

SMTP<br />

Simple Mail Transfer Protocol (SMTP) is a simple protocol for transmitting<br />

electronic mail on the Internet consisting of only a few commands.<br />

<strong>The</strong> commands VRFY and EXPN can call up internal information, so the use<br />

of these commands should only be allowed within the protected network. For<br />

untrustworthy users, VRFY and EXPN must be blocked. <strong>The</strong> firewall should<br />

be able to encrypt SMTP connections between trustworthy users, although this<br />

is only advisable if a strong authentication mechanism is used.<br />

DNS<br />

Domain Name Service (DNS) is used to convert computer names into IP<br />

numbers and vice versa and provides information on computer systems using<br />

the network. <strong>The</strong> information transmitted is not protected by cryptographic<br />

procedures, so spoofing attacks are possible using forged data. This should be<br />

taken into consideration especially in the event of DNS responses from the<br />

Internet.<br />

To gain access to computers on a network, an intruder first needs their<br />

addresses which he can either get by random searching or more simply by<br />

analysing the DNS information. Once he has the address the intruder can, for<br />

example, forge an address (IP spoofing) by pretending that his computer<br />

belongs to the network to be protected and sending packets to it.<br />

It must always be remembered that all information made available by DNS<br />

can be misused. How a firewall must be configured in order to provide risk<br />

protection when using DNS is described in Safeguard S 2.77 Secure<br />

Arrangement of Further Components.<br />

NNTP<br />

Network News Transfer Protocol (NNTP) is used for transmitting news<br />

articles.<br />

<strong>The</strong> firewall must be able to prevent the transport of certain news groups<br />

entirely or only admit them for certain computers. <strong>The</strong>re must be a guarantee<br />

that when sending news, no information percolates via the network to be<br />

protected (e.g. computer names) into the external network.<br />

HTTP<br />

Hypertext Transfer Protocol (HTTP) is used for transmitting data between<br />

WWW clients and WWW servers. It supports four operations: Connection,<br />

Request, Response, and Close.<br />

<strong>The</strong> firewall must be able to analyse the commands of an HTTP packet and<br />

restrict it with filters. It must, for instance, be possible to prevent<br />

implementation of the POST command and the associated file change during a<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!