19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

S 5.59 <strong>Protection</strong> against DNS spoofing<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: Administrators<br />

A threat from DNS spoofing can arise when authentication is performed using<br />

computer names. Host-based authentication, which means that permissions are<br />

granted on the basis of computer names or IP addresses, should be protected<br />

with one (or a combination) of the following measures:<br />

1. IP addresses should be used, not host names.<br />

2. If host names are used, they should all be resolved locally (entries in the<br />

file /etc/hosts).<br />

3. If host names are used and cannot be resolved locally, all names should be<br />

resolved directly by a name server which acts as primary or secondary<br />

name server, i.e. stores the names permanently instead of in a temporary<br />

cache.<br />

<strong>The</strong> first configuration provides the highest security, the third provides the<br />

lowest security. <strong>The</strong> aim of these measures is to perform a mapping between<br />

IP addresses and computer names in a secure environment. If name resolution<br />

cannot be performed directly, i.e. if a temporary cache is made use of, then<br />

host-based access should never be allowed via a host name.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!