19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

S 2.102 Relinquishing activation of the remote console<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: Administrators<br />

With the help of the program SYS:\SYSTEM\RCONSOLE.EXE, the Novell<br />

Netware network operating system allows remote control of the Novell<br />

Netware server console from a workstation. <strong>The</strong> Novell Netware server is set<br />

up in the AUTOEXEC.NCF file by loading RSPX.NLM and REMOTE.NLM<br />

with the corresponding password. It should be ensured that the password is not<br />

contained in the AUTOEXEC.NCF file in plain text. This can be done by<br />

entering the command REMOTE ENCRYPT on the server console after<br />

running the REMOTE.NLM program. <strong>The</strong> password that has been called up is<br />

then encrypted and, if required, can be stored in the LDREMOTE.NCF file<br />

using the necessary command. <strong>The</strong> command in the LDREMOTE.NCF file is<br />

as follows:<br />

LOAD REMOTE -E 0613BB68060099<br />

Network analysis tools, so-called Sniffers, can pick up and save data<br />

exchanged between the workstation and the Novell Netware server. This<br />

includes the encrypted password which must also be entered in order to<br />

remotely control the Novell Netware server. Special software can be used to<br />

decrypt the encrypted password. <strong>The</strong>refore, unauthorised personnel could be<br />

in a position to gain access to the Novell Netware server console via remote<br />

control.<br />

In order to prevent remote sessions from being recorded with network analysis<br />

tools then simply replayed into the network, it should be ensured that<br />

signatures for the RSPX packets are activated. This can be checked using the<br />

command RSPX on the console of the server. <strong>The</strong> response should be as<br />

follows:<br />

RSPX Packet Signatures:<br />

All packets must contain signatures.<br />

If no signatures are active, use the command RSPX SIGNATURES ON. As<br />

these functions are not supported by Netware versions prior to Netware 3.12,<br />

it is essential that the current version is used.<br />

For security reasons, the option to remotely control Novell Netware servers<br />

should be avoided if prevailing conditions and operating procedures allow.<br />

In general, however, the SYS:\SYSTEM\RCONSOLE.EXE program should not<br />

be used if C2 security is to be achieved (see also S 4.102 C2 Security under<br />

Novell 4.11)<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!