19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

PAP works with simple, unencrypted passwords, thereby offering little in the<br />

way of responsible protocol for confirmations of authenticity. This protocol<br />

will normally only be selected if the external workstation and the server<br />

cannot agree on a form of encryption that offers more security.<br />

Depending upon which level of protection is required, the RAS encryption<br />

protocol should be selected according to the following table, so that at least<br />

the relevant protocol given below is deployed. This can mean that, if the<br />

security demands are high, the use of clients not supporting the required<br />

protocol must be ruled out.<br />

<strong>Protection</strong><br />

requirement<br />

Type of encryption RAS encryption protocol<br />

High One-sided CHAP, MD5<br />

Moderate Mutual SPAP<br />

Low Unencrypted Text PAP<br />

Data encryption protects data and ensures a secure dial-up connection. <strong>The</strong><br />

RAS administrator can set up the RAS server in such a way that the<br />

transmission of data always takes place in encrypted form. Users connected to<br />

this server automatically encrypt all data sent.<br />

Note: This option requires that all connected clients know how to encrypt<br />

data. In this case as, for example, in a homogeneous Windows NT network,<br />

this option must in any case be activated.<br />

<strong>The</strong> start options for RAS are set under the control panel option "Services",<br />

and the configuration takes place via the control panel option "Network",<br />

where the choice of authentication procedure also takes place. By choosing the<br />

option "Only Microsoft-encrypted confirmation of authenticity", the choice of<br />

CHAP can be forced by MD5; the encryption for data can additionally be<br />

activated. Under the german version of Windows NT transmitted data is then<br />

not encrypted with DES but with RC4.<br />

RAS supports the security-hosts of other manufacturers, whereby the securityhost<br />

switches between the remote user and the RAS server. A security host is<br />

an additional computer in the network, which offers security services such as<br />

support for chip cards. A security host of this type generally offers an extra<br />

security level by demanding an identity card for confirmation of authenticity,<br />

or by supporting similarly strong authentication procedures, before allowing<br />

access to the RAS Server.<br />

Access supervision via call-back is an additional safeguard offered by RAS.<br />

With this function the system administrator can demand that a certain remote<br />

user dials from a previously determined place (e.g. private telephone line) or<br />

that this user can be dialled from anywhere. With access supervision via callback,<br />

the user initialises a call and makes a connection with the RAS server.<br />

<strong>The</strong> RAS server then hangs up and momentarily calls the previously-given<br />

call-back number. When using an analogue telephone network call-back<br />

modems must be installed, where during transmission via ISDN or X.25 (e.g.<br />

Datex-P), the features of these networks can be used. However, it must be<br />

borne in mind that the security of the partner identification is no longer<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!