19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 5.61 Misuse of remote access to management<br />

functions on routers<br />

Routers are equipped with remote access ports for management functions. All<br />

administration, maintenance and signalling tasks can be performed via these<br />

ports. Such ports are useful, and sometimes even indispensable, particularly in<br />

large networks possessing several routers and LANs linked via long-range<br />

lines.<br />

<strong>The</strong>re are two types of remote access:<br />

- Modem access via dedicated interfaces (e.g. V.24)<br />

- Direct access via reserved bandwidths<br />

If SNMP (Simple Network Management Protocol) is used for network<br />

management, a fundamental lack of security measures, or a failure to<br />

implement existing measures, gives rise to threats over and above the direct<br />

misuse of unprotected remote interfaces:<br />

- An unauthorised user intercepts data packets from an SNMP management<br />

station and modifies their parametrised values for his own purposes. <strong>The</strong><br />

manipulated data packets are then forwarded to their original, intended<br />

destination. <strong>The</strong> receiving unit is not able to detect the manipulation of the<br />

data, and handles the information in the packet as though it had been sent<br />

directly from the management station.<br />

- If the owner of a network management station gains access to a network<br />

administered using SNMP, it is possible for the owner to impersonate a<br />

community (an administrative area within SNMP). As a result, an<br />

unauthorised user is able to feign an authorised identity, and read all the<br />

information from the agents (objects to be managed in the network,<br />

such as routers) as well as perform all management operations. In this<br />

case, the agents are not able to distinguish between the correct and<br />

incorrect identities.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!