HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual T 5.91 Disabling of RAS access security mechanisms

T 5.91 Disabling of RAS access security mechanisms

The security of RAS access depends significantly on correct use of the security mechanisms provided. However, it is generally possible to configure the RAS system (client and/or server) in such away that either weak or no security mechanisms are used. If, for example, the mechanisms used for data encryption are dynamically negotiated between client and server when a connection is established (e.g. this can occur if IPSec or SSL is used), generally this negotiation process entails the client offering the server a list of procedures supported (known as cipher suites) for selection, from which the server chooses one. The list of algorithms can be altered by making the appropriate configuration changes. Usually there is also a "no encryption" option.

If an unencrypted connection is one of the options allowed between clients and server, then there is a risk that protection of the data transmitted will be disabled. This is particularly problematic where users are able in the event of problems to modify the RAS system configuration settings on RAS clients to fit local circumstances.

Examples

.
© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
October 2000
home