19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

Only version 3 or higher of SSL should be used, because the additional server<br />

authentication these versions provide means that man-in-the-middle attacks<br />

are no longer possible, as was the case with SSLv2.<br />

Key length<br />

Various cryptographic algorithms with various key lengths can be used with<br />

SSL, for example RC2 or RC4 with a 40-bit or 128-bit key length, DES with a<br />

56-bit key length, triple DES with a 112-bit key length, or IDEA with a 128bit<br />

key length, and MD5 or SHA-1 for example as hash functions (see also S<br />

3.23 Introduction to basic cryptographic terms in this connection). <strong>The</strong> client<br />

and server must agree on the procedures to be used in the session at the time<br />

when the connection is set up.<br />

In browsers from US vendors the integrated encryption procedures have only<br />

extremely short key lengths (40-bit), on account of the US export restrictions.<br />

<strong>The</strong>se do not stand up to brute-force attacks for long, i.e. attacks involving<br />

simply trying out all possible keys. If the protection requirements for the<br />

transmitted data are low, this short key length may be adequate, and it at least<br />

protects against opportunist offenders. Otherwise, to overcome this<br />

shortcoming use should be made of add-on products from local vendors,<br />

which also allow the use of longer keys even within standard browsers. Public<br />

domain software such as SSLeay or OpenSSL can also be used for this<br />

purpose.<br />

Certificates<br />

One difficult problem with data communications across open networks is how<br />

to check the identity of the communication partners, because it cannot be<br />

relied upon that specified names will be correct. With SSL, the identity of the<br />

communication partners is checked by means of certificates. Certificates<br />

contain their public keys together with verification from another entity of the<br />

correct assignment of the public key to its "owner", in this case therefore a<br />

server or client. <strong>The</strong> value of a certificate is therefore dependent not least on<br />

the trustworthiness of this verification entity (also known as a trust centre or<br />

certification body). <strong>The</strong> genuineness of the certificate can, in turn, be checked<br />

using the public key of the verification entity.<br />

A distinction is drawn between three different types of certificates with SSL:<br />

- User certificates, which are required for client authentication<br />

- Certificates from certification bodies, although some certification bodies<br />

have several certificates, depending on their underlying security policy<br />

- Certificates from software producers or from operators of Web pages<br />

All browsers already contain SSL certificates from certain certification bodies<br />

when they are installed. <strong>The</strong>se certification bodies have very different security<br />

guidelines and conditions under which they grant certificates. Initially,<br />

therefore, all certificates should be deactivated, and only reactivated when you<br />

are convinced that their security policy satisfies your own security needs.<br />

When a new certificate is adopted, care should be taken that it is not activated<br />

until after its fingerprint has been checked. <strong>The</strong> fingerprint is a hexadecimal<br />

number that is transmitted together with the certificate. It should also be<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!