19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 3.42 Insecure configuration of RAS clients<br />

<strong>The</strong> security of the RAS system depends both on the secure configuration of<br />

the RAS server and also on the RAS client. Even if the configuration of the<br />

server is under the full control of an administrator, the RAS clients will often<br />

be outside of the organisation. This means that the computer can only loosely<br />

be included in administrative processes. Especially where mobile RAS clients<br />

are used, users can also be given certain administrative rights to enable them<br />

to resolve problems with RAS access by changing the RAS configuration<br />

parameters, either by themselves or by being guided over the telephone.<br />

<strong>The</strong> limited ability of the system administrators to exercise control over RAS<br />

clients may result in these being insecurely configured. Examples are:<br />

- Browsers are frequently not at all straightforward to configure, and often<br />

this results in incorrect settings. If security mechanisms are disabled (e.g.<br />

Java, JavaScript and/or ActiveX are activated), it is possible for unreliable<br />

software to get onto the client.<br />

- Another problem is the installation of non-permitted software on the RAS<br />

client, as this may contain security loopholes or allow the introduction of<br />

computer viruses or Trojan horses.<br />

- Often RAS users will fail to make proper use of the available security<br />

mechanisms are or else they will make the wrong settings (see also T 5.91<br />

Disabling of RAS access security mechanisms).<br />

- Other problems may arise if incompatible authentication mechanisms are<br />

used between RAS client and RAS server. Thus, for example, the<br />

authentication protocol MS-CHAP of a Windows 3.11 RAS client is<br />

incompatible with the MS-CHAP protocol of a Windows NT 4.0 server.<br />

<strong>The</strong> result is that the client cannot establish a connection with the server.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Limited scope for<br />

administration with RAS<br />

clients<br />

Insecure configuration of<br />

the browser<br />

Use of incompatible<br />

authentication<br />

mechanisms

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!