19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

are used to ensure the cryptographically secure assignment of a person to a<br />

public key. <strong>The</strong> certificates are allocated by a trustworthy third party.<br />

With PGP, every user can authenticate the public keys of other people with<br />

certificates. However, a user should only certify a public key if he or she<br />

knows or has checked the identity of the owner of the key and the public key<br />

was handed over personally.<br />

Alternatively, the authenticity of a public key can also be verified with the aid<br />

of what is known as the "fingerprint". This involves calculating a number<br />

sequence (hash value) from the public key and appending the value to the key.<br />

After a public key has been sent, the recipient can contact the sender to<br />

compare the number sequence, for example by telephone, in order to certify<br />

the public key after confirmation of the fingerprint.<br />

Certification hierarchy - web of trust - Internet key server<br />

Essentially, PGP can be used both in a certification hierarchy and in a "web of<br />

trust". In a web of trust, the certificates of other users are relied upon to be<br />

trustworthy, whereas in a certification hierarchy trustworthy third parties,<br />

known as certifying agencies, authenticate the keys of all of their users in a<br />

reliable and demonstrable way.<br />

Within a company or an agency, a certification hierarchy should be<br />

established in the intranet. <strong>The</strong> PGP expert should certify all keys for his or<br />

her area of the organisation or for the organisation as a whole. <strong>The</strong> certified<br />

public keys should be accessible to all members of staff on a server in the<br />

intranet. Access to this area should be exclusively read-only, however. <strong>The</strong><br />

web of trust method should only be used for the field of private<br />

communications.<br />

In the Internet, public PGP keys can be made available on key servers. <strong>The</strong>se<br />

must in no way be confused with certifying agencies, however. Key servers<br />

receive keys from anywhere, and distribute them on request. It should be made<br />

clear that keys which are obtained from a key server are not checked by the<br />

key server in any way.<br />

In order to verify the authenticity of a public key that has been made available<br />

on a key server, the fingerprint technique mentioned above should be used.<br />

<strong>The</strong> public key's own signature<br />

Of the parts of a PGP public key, only the user ID is overwritten by the public<br />

key's own signature. <strong>The</strong> use of the public key's own signature makes it<br />

possible to detect a denial-of-service attack (see T 5.28 Denial of services),<br />

but it does not prevent such an attack. As the user ID of a public key is not<br />

encrypted, it can be corrupted. <strong>The</strong> consequence of this would be that, if a<br />

"corrupted" key is used, the encrypted e-mails would no longer reach the<br />

owner of the key because they would be redirected to a different e-mail<br />

address. <strong>The</strong> confidentiality of the encrypted message is not put at risk<br />

because of this, as the message can only be decrypted with the aid of the<br />

private key.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!