19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 4.12 Lack of authentication possibilities between X<br />

Server and X Client<br />

Without suitable security mechanisms, such as, for example, "magic cookies"<br />

or use of Secure Shell, the X Windows system especially should only be used<br />

in a trusted environment. Without security enforcing functions it is possible<br />

for any participating user to corrupt both the X client and the X server. <strong>The</strong> X<br />

server process, which is responsible for the input and output on a computer,<br />

has no means of detecting the identity of the owner of the X client process<br />

which is communicating with it. In this way all X clients can access all data<br />

input on an X server, and the X server has no means of telling from which X<br />

client it is receiving data. Thus, for example, the meltdown program simulates<br />

optical "melting" of the screen of any X server, while it equally possible to<br />

read data of an xterm client or to send own data to that client, i.e. make screen<br />

copies from another computer that runs on X Windows.<br />

Examples<br />

- With the xspy tool it is possible to automatically record keyboard inputs<br />

remotely on an xterm client.<br />

- Windows which are displayed by an aggressor on an X server are visually<br />

no different from those of the intended X client. In this way an aggressor<br />

could implant false information or provoke the input of sensitive<br />

information with the aid of "imposter" windows.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!