19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 5.92 Use of the RAS client as RAS server<br />

<strong>The</strong> RAS software installed on RAS clients may possibly allow the client to<br />

function as a RAS server and to accept incoming connections (e.g. Windows<br />

RAS). If this option is enabled, then anyone who knows the number of the<br />

telephone connection to which the client is connected can connect to this<br />

computer. If an aggressor succeeds in getting past the RAS authentication<br />

mechanism (for example, by trying out or guessing passwords, use of user<br />

accounts that are not password-protected, use of Guest user IDs with standard<br />

passwords), then he can access the data on the RAS client. If the client is<br />

connected over ISDN, then it is even possible to establish another outgoing<br />

connection (e.g. to the corporate network). If connection is automated<br />

(because the RAS password is stored on the machine), then the aggressor can<br />

also access data on the LAN without authorisation. It is therefore essential to<br />

prevent a RAS client from being used as a RAS server.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!