19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

FreeS/WAN can be used to protect communications between two local<br />

networks over the Internet. <strong>The</strong> configuration of the components in the two<br />

networks is as follows:<br />

firewall.west firewall.east<br />

gateway.west<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Internet<br />

lan.west lan.east<br />

gateway.east<br />

<strong>The</strong> two locations west and east of an organisation both have a connection to<br />

the Internet. <strong>The</strong>y both use a multi-level firewall system which, however, for<br />

the sake of simplification is represented in the diagram by a single symbol.<br />

gateway.west and gateway.east are <strong>IT</strong> systems which run under the Linux<br />

operating system and are to serve as gateways for the local networks lan.west<br />

and lan.east with the aid of FreeS/WAN. Each of the gateways has two<br />

network cards connecting it to the firewall systems and the local networks.<br />

<strong>The</strong> aim is to ensure that all the <strong>IT</strong> systems in lan.west and lan.east can<br />

communicate securely with each other. <strong>Protection</strong> of communications is to be<br />

transparent for these <strong>IT</strong> systems.<br />

It is important that a suitable key management procedure is chosen. It is<br />

recommended that automatic exchange of keys over a public key procedure<br />

(RSA) is used. Compared with the other procedures supported by the<br />

FreeS/WAN, this offers the highest security level. <strong>The</strong> first step in the<br />

configuration process therefore entails the generation of RSA key pairs for the<br />

two gateways. This can be achieved, for example, using the command ipsec<br />

rsasigkey. <strong>The</strong> keys should be at least 768 bits long. As noted in the<br />

documentation, the keys thus generated may only be used for signatures and<br />

not for encryption. <strong>The</strong> FreeS/WAN software package ensures that this is the<br />

case. <strong>The</strong> command ipsec rsasigkey produces in each case the public and<br />

private RSA keys. It is critical to the security of the VPN that the private key<br />

cannot be compromised under any circumstances (see also S 2.46<br />

Appropriate Key Management). <strong>The</strong> private key is stored in file<br />

/etc/ipsec.secrets on the gateway. Ownership and permissions should be set as<br />

follows:<br />

-rw------- root root /etc/ipsec.secrets<br />

By contrast, the public key is entered in file /etc/ipsec.conf (see below). This<br />

file is where all the other settings for FreeS/WAN are made. <strong>The</strong> format is<br />

designed in such a way that it may be possible to use the same file on both<br />

gateways. Configuration entails making settings in the form parameter =<br />

value in several sections. All the parameters which have to be set differently<br />

for the two gateways have the prefix left or right. <strong>The</strong> relevant FreeS/WAN

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!