19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

communication partners and forwarding forged public keys. If the<br />

communication partners are unable to check the public keys, the attacker can<br />

read and manipulate all of the traffic by decrypting the data himself, then<br />

reading it and modifying it before finally encrypting it with another key and<br />

forwarding it to its destination. This can be prevented with the aid of a suitable<br />

key/certificate management structure. When Secure Shell is in practical<br />

operation, however, a compromise solution is often used, which allows the use<br />

of ssh without any additional infrastructure. When a connection is set up to a<br />

host whose public key is not yet known, the public key is sent via the nonsecure<br />

network and stored in a local database. For all subsequent connections<br />

with that host, the public key can then be checked using the local database. It<br />

must be clarified within the framework of the security concept whether this<br />

approach, which offers a lower level of security against man-in-the-middle<br />

attacks, is adequate for the application concerned.<br />

<strong>The</strong> Internet drafts contain definitions of cryptographic procedures which have<br />

to be made available by the Secure Shell implementations. <strong>The</strong>re is also the<br />

option, however, of implementing additional cryptographic algorithms. <strong>The</strong><br />

procedures that are actually used are negotiated during the establishment of a<br />

connection. Suitable client and server programs must be chosen and an<br />

appropriate configuration put in place in order to ensure that the ssh client and<br />

ssh server agree on eligible cryptographic algorithms which satisfy the<br />

security requirements.<br />

Whenever ssh is used, if possible all other protocols whose functionality is<br />

covered by Secure Shell, i.e. for example the r-services and telnet, should be<br />

entirely deactivated so that the safeguards cannot be circumvented. This<br />

assumes, however, that all communication partners have suitable<br />

implementations at their disposal.<br />

<strong>The</strong>re are known to have been program errors relevant to security in older<br />

implementations of ssh. A version should therefore be used in which any such<br />

deficiencies have been eliminated. Compatibility between implementations<br />

with widely differing program versions may be a problem in some<br />

circumstances. Mixed operation should therefore be avoided if possible.<br />

It should be noted that when ssh is used across firewalls, it is no longer<br />

possible to have content-sensitive control of the data flow.<br />

Additional controls:<br />

- Are r-services or similar protocols used via non-secure communication<br />

channels?<br />

- How is the verification of public host keys regulated when using Secure<br />

Shell (organisational measures, for example)?<br />

- Have all of the known security deficiencies been corrected in the version of<br />

Secure Shell that is used?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!