19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

server have a corresponding implementation. With regard to negotiation of<br />

the procedure, care should be taken to ensure that client and server are both<br />

configured so that only the procedures specified in the <strong>IT</strong> security<br />

guidelines are accepted. Steps must also be taken to ensure that<br />

unencrypted communication is not chosen as callback variant if no<br />

compatible procedure could be negotiated between client and server.<br />

Explicit negotiation of the unencrypted communication must also be<br />

prohibited.<br />

Tunnelling at Layer 3: IPsec<br />

Whereas the Layer 2 protocols make use of the security mechanisms of the<br />

underlying PPP protocol, with the IPsec Layer 3 specification separate<br />

security procedures and mechanisms are specified. One limitation of IPsec is<br />

the fact that only IP-based communication is supported. However, in most<br />

cases this is not a serious disadvantage as today most operating systems and<br />

applications are able to utilise IP-based communication.<br />

As regards security requirements, the situation regarding IPsec is as follows:<br />

- User authentication<br />

Tunnel protocols at Layer 3 assume that authentication of the tunnel end<br />

points has been completed already before the tunnel is established and do<br />

not offer any separate mechanisms. <strong>The</strong> only exception here is the IPsec<br />

IKE procedure (formerly ISAKMP/Oakley), which allows mutual<br />

authentication of the tunnel end points at application level. However,<br />

authentication at user level is not possible with this. But since a Layer 3<br />

protocol is actually transmitted over a Layer 2 protocol, in principle use<br />

can be made here of the security mechanisms of both protocol layers.<br />

When RAS is being used, the mechanisms for user authentication of the<br />

underlying Layer 2 protocol actually have to be used as otherwise an<br />

unauthorised third person could circumvent the security mechanism, for<br />

example, through a physical attack on the client.<br />

- Data encryption<br />

<strong>The</strong> standard IPsec prescribes that IPsec-compliant implementations must<br />

as a minimum make available the DES and Triple-DES encryption<br />

procedures as well as the MD5 and SHA-1 hash functions. However there<br />

is no reason why another procedure should not be used here, although in<br />

this case the same procedure must also be available to the communication<br />

partner. In general, only generally recognised and established procedures<br />

should be used. <strong>The</strong> keys used for symmetric encryption procedures should<br />

be at least 80 bits long.<br />

- Key management<br />

IPsec defines several methods for the generation, exchange and<br />

management of keys. With the "<strong>Manual</strong> IPsec" procedure, there is no<br />

automatic key management. In general keys are exchanged by the<br />

communication partners over a secure channel (e.g. courier, encrypted email).<br />

<strong>The</strong> interval for the regular exchange of keys here is much larger<br />

than with the automatic procedures, such as the above-mentioned IKE<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!