19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

S 5.64 Secure Shell<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: Administrators, users<br />

Without special extensions, the telnet and ftp protocols offer only rudimentary<br />

mechanisms for authentication. As a rule, a simple request is issued for the<br />

user ID and password, which then – in exactly the same way as the user data –<br />

are sent as plain text. <strong>The</strong> confidentiality of the authentication data and user<br />

data can therefore not be ensured. <strong>The</strong> related protocols rsh, rlogin and rcp,<br />

which are often grouped under the term r-services, exhibit similar security<br />

deficiencies.<br />

Secure Shell (ssh) can be used as a substitute for the r-services. It makes use<br />

of extensive functions designed to ensure secure authentication and to<br />

maintain confidentiality and integrity. This is achieved with a hybrid<br />

encryption technique, in other words a combination of asymmetric and<br />

symmetric encryption. <strong>The</strong> Secure Shell resides on layer 7 (application layer)<br />

of the ISO/OSI reference model; other protocols can also be transported via<br />

ssh, however, such as the X11 protocol, which is used by the graphical user<br />

interface X-Windows.<br />

Currently Secure Shell is based on three protocols, one built upon the other.<br />

An Internet draft has been drawn up for each one.<br />

- <strong>The</strong> lowest protocol is the transport layer protocol. This protocol performs<br />

the majority of the security functions of ssh, namely authentication at the<br />

host level, encryption, and protection of data integrity. <strong>The</strong> cryptographic<br />

algorithms are negotiable between the communication partners.<br />

- <strong>The</strong> middle protocol is the user authentication protocol. This allows<br />

authentication at the user level; in this case, too, the procedure can be<br />

negotiated. If a method of simple transmission of user IDs and passwords<br />

is used for the purpose of authentication, the confidentiality of the<br />

information with respect to the communication route is ensured by the<br />

underlying transport layer protocol. <strong>The</strong> recommended approach,<br />

however, is to use a public key procedure for authentication.<br />

- <strong>The</strong> connection protocol is built on the two preceding protocols and allows<br />

several logical user information channels to be set up. <strong>The</strong> data on these<br />

user information channels is transmitted via a common single Secure Shell<br />

connection.<br />

<strong>The</strong>re are implementations of ssh clients and ssh servers for all commonly<br />

used Unix operating systems. <strong>The</strong>re are also ssh clients for 32-bit Windows,<br />

OS/2 and Macintosh, among others, and as a Java applet.<br />

Basically the use of Secure Shell is to be recommended if the functionalities<br />

of the r-services are used via communication channels which are not<br />

adequately protected against compromise and/or manipulation (for example<br />

via the Internet). A few notes on the secure use of ssh are given below.<br />

One risk that is particularly significant is that of attacks known as man-in-themiddle<br />

attacks. <strong>The</strong>se involve the attacker filtering all traffic between the<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!