19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

widespread use. This version is command-line oriented, but it can also be<br />

integrated into graphical user interfaces and mail clients with add-on<br />

programs. PGP can be obtained from various sources; among others, there are<br />

public domain versions available from numerous WWW, FTP or mail servers.<br />

<strong>The</strong> controversial Corporate Message Recovery (CMR) function was<br />

introduced with Version 5. CMR offers the option of making it possible for a<br />

third person to decrypt files or messages that have been encrypted by one<br />

person for a second. <strong>The</strong> use of a "third key" of this type can be made<br />

mandatory by the administrator in the configuration.<br />

On account of the legal restrictions on the export of cryptographic products in<br />

force in the USA, it should be ensured with all versions of PGP that they are<br />

obtained from European suppliers or servers.<br />

Secure installation and operation<br />

Although PGP makes use of cryptographic procedures that are recognised as<br />

being secure, incorrect configuration or operator errors may result in lowering<br />

of the level of security. As with most relatively complex crypto products, the<br />

installation and configuration of PGP, including key generation, is not entirely<br />

easy. To prevent the possibility of operating errors creeping in, familiarisation<br />

with the product and with certain basic cryptographic terms is essential.<br />

In every organisation, therefore, one member of staff should familiarise himor<br />

herself with handling PGP and be available to the others as a PGP contact<br />

person. This person should then instruct the other users in the secure operation<br />

of PGP. In particular, users should have intensive practice in encryption,<br />

signatures and key management before they use PGP. It is also recommended<br />

that a uniform version of PGP should be used within a particular organisation<br />

in order to avoid any of the compatibility problems described above. <strong>The</strong>re is<br />

extensive documentation accompanying PGP; this should be read before PGP<br />

is put to use. Experience shows, though, that not all users have the patience to<br />

read the documentation, so it is advisable to draw up written instructions that<br />

are adapted to the specifics of the organisation concerned.<br />

If users have any questions about PGP which go beyond the scope of the<br />

supplied documentation, there are various means of obtaining answers:<br />

- Firstly there is a collection of the most commonly posed questions about<br />

PGP and answers to these questions (Frequently Asked Questions - FAQ)<br />

on the Internet, as well as guides and explanations on the subject of PGP.<br />

- It is possible to obtain answers to PGP problems very quickly via<br />

newsgroups such as alt.security.pgp, de.comp.security or sci.crypt.<br />

- <strong>The</strong>re are several books on PGP.<br />

Key generation:<br />

With PGP, all users generate their own "key pair" themselves. <strong>The</strong> following<br />

points should be borne in mind in this connection:<br />

- When generating RSA keys it is possible to select between various key<br />

lengths. It should be remembered that resistance to deciphering increases<br />

with key length, but also that performance drops. <strong>The</strong> chosen key length<br />

should therefore be 768 bits or, preferably, 1024 bits.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!