summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc2504.txt
diff options
context:
space:
mode:
authorThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
committerThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
commit4bfd864f10b68b71482b35c818559068ef8d5797 (patch)
treee3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc2504.txt
parentea76e11061bda059ae9f9ad130a9895cc85607db (diff)
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc2504.txt')
-rw-r--r--doc/rfc/rfc2504.txt1851
1 files changed, 1851 insertions, 0 deletions
diff --git a/doc/rfc/rfc2504.txt b/doc/rfc/rfc2504.txt
new file mode 100644
index 0000000..97cd940
--- /dev/null
+++ b/doc/rfc/rfc2504.txt
@@ -0,0 +1,1851 @@
+
+
+
+
+
+
+Network Working Group E. Guttman
+Request for Comments: 2504 Sun Microsystems
+FYI: 34 L. Leong
+Category: Informational COLT Internet
+ G. Malkin
+ Bay Networks
+ February 1999
+
+
+ Users' Security Handbook
+
+Status of this Memo
+
+ This memo provides information for the Internet community. It does
+ not specify an Internet standard of any kind. Distribution of this
+ memo is unlimited.
+
+Copyright Notice
+
+ Copyright (C) The Internet Society (1999). All Rights Reserved.
+
+Abstract
+
+ The Users' Security Handbook is the companion to the Site Security
+ Handbook (SSH). It is intended to provide users with the information
+ they need to help keep their networks and systems secure.
+
+Table of Contents
+
+ Part One: Introduction . . . . . . . . . . . . . . . . . . . . 2
+ 1. READ.ME . . . . . . . . . . . . . . . . . . . . . . . . . 2
+ 2. The Wires have Ears . . . . . . . . . . . . . . . . . . . 3
+ Part Two: End-users in a centrally-administered network . . . 4
+ 3. Watch Out! . . . . . . . . . . . . . . . . . . . . . . . 4
+ 3.1. The Dangers of Downloading . . . . . . . . . . . . . . 4
+ 3.2. Don't Get Caught in the Web . . . . . . . . . . . . . . 5
+ 3.3. Email Pitfalls . . . . . . . . . . . . . . . . . . . . 6
+ 3.4. Passwords . . . . . . . . . . . . . . . . . . . . . . . 7
+ 3.5. Viruses and Other Illnesses . . . . . . . . . . . . . . 7
+ 3.6. Modems . . . . . . . . . . . . . . . . . . . . . . . . 8
+ 3.7. Don't Leave Me... . . . . . . . . . . . . . . . . . . . 9
+ 3.8. File Protections . . . . . . . . . . . . . . . . . . . 9
+ 3.9. Encrypt Everything . . . . . . . . . . . . . . . . . . 10
+ 3.10. Shred Everything Else . . . . . . . . . . . . . . . . . 10
+ 3.11. What Program is This, Anyway? . . . . . . . . . . . . . 11
+ 4. Paranoia is Good . . . . . . . . . . . . . . . . . . . . 11
+ Part Three: End-users self administering a networked computer 14
+ 5. Make Your Own Security Policy . . . . . . . . . . . . . . 14
+
+
+
+Guttman, et. al. Informational [Page 1]
+
+RFC 2504 Users' Security Handbook February 1999
+
+
+ 6. Bad Things Happen . . . . . . . . . . . . . . . . . . . . 15
+ 6.1. How to Prepare for the Worst in Advance . . . . . . . . 15
+ 6.2. What To Do if You Suspect Trouble . . . . . . . . . . . 16
+ 6.3. Email . . . . . . . . . . . . . . . . . . . . . . . . . 17
+ 7. Home Alone . . . . . . . . . . . . . . . . . . . . . . . 17
+ 7.1. Beware of Daemons . . . . . . . . . . . . . . . . . . . 17
+ 7.2. Going Places . . . . . . . . . . . . . . . . . . . . . 19
+ 7.3. Secure It! . . . . . . . . . . . . . . . . . . . . . . 20
+ 8. A Final Note . . . . . . . . . . . . . . . . . . . . . . 20
+ Appendix: Glossary of Security Terms . . . . . . . . . . . . . 21
+ Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 31
+ References . . . . . . . . . . . . . . . . . . . . . . . . . . 31
+ Security Considerations . . . . . . . . . . . . . . . . . . . 32
+ Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . 32
+ Full Copyright Statement . . . . . . . . . . . . . . . . . . . 33
+
+Part One: Introduction
+
+ This document provides guidance to the end-users of computer systems
+ and networks about what they can do to keep their data and
+ communication private, and their systems and networks secure. Part
+ Two of this document concerns "corporate users" in small, medium and
+ large corporate and campus sites. Part Three of the document
+ addresses users who administer their own computers, such as home
+ users.
+
+ System and network administrators may wish to use this document as
+ the foundation of a site-specific users' security guide; however,
+ they should consult the Site Security Handbook first [RFC2196].
+
+ A glossary of terms is included in an appendix at the end of this
+ document, introducing computer network security notions to those not
+ familiar with them.
+
+1. READ.ME
+
+ Before getting connected to the Internet or any other public network,
+ you should obtain the security policy of the site that you intend to
+ use as your access provider, and read it. A security policy is a
+ formal statement of the rules by which users who are given access to
+ a site's technology and information assets must abide. As a user,
+ you are obliged to follow the policy created by the decision makers
+ and administrators at your site.
+
+ A security policy exists to protect a site's hardware, software and
+ data. It explains what the security goals of the site are, what
+ users can and cannot do, what to do and who to contact when problems
+ arise, and generally informs users what the "rules of the game" are.
+
+
+
+Guttman, et. al. Informational [Page 2]
+
+RFC 2504 Users' Security Handbook February 1999
+
+
+2. The Wires have Ears
+
+ It is a lot easier to eavesdrop on communications over data networks
+ than to tap a telephone conversation. Any link between computers may
+ potentially be insecure, as can any of the computers through which
+ data flows. All information passing over networks may be
+ eavesdropped on, even if you think "No one will care about this..."
+
+ Information passing over a network may be read not only by the
+ intended audience but can be read by others as well. This can happen
+ to personal Email and sensitive information that is accessed via file
+ transfer or the Web. Please refer to the "Don't Get Caught in the
+ Web" and "Email Pitfalls" sections for specific information on
+ protecting your privacy.
+
+ As a user, your utmost concerns should, firstly, be to protect
+ yourself against misuse of your computer account(s) and secondly, to
+ protect your privacy.
+
+ Unless precautions are taken, every time you log in over a network,
+ to any network service, your password or confidential information may
+ be stolen. It may then be used to gain illicit access to systems you
+ have access to. In some cases, the consequences are obvious: If
+ someone gains access to your bank account, you might find yourself
+ losing some cash, quickly. What is not so obvious is that services
+ which are not financial in nature may also be abused in rather costly
+ ways. You may be held responsible if your account is misused by
+ someone else!
+
+ Many network services involve remote log in. A user is prompted for
+ his or her account ID (ie. user name) and password. If this
+ information is sent through the network without encryption, the
+ message can be intercepted and read by others. This is not really an
+ issue when you are logging in to a "dial-in" service where you make a
+ connection via telephone and log in, say to an online service
+ provider, as telephone lines are more difficult to eavesdrop on than
+ Internet communications.
+
+ The risk is there when you are using programs to log in over a
+ network. Many popular programs used to log in to services or to
+ transfer files (such as telnet and ftp, respectively) send your user
+ name and password and then your data over the network without
+ encrypting them.
+
+ The precaution commonly taken against password eavesdropping by
+ larger institutions, such as corporations, is to use one-time
+ password systems.
+
+
+
+
+Guttman, et. al. Informational [Page 3]
+
+RFC 2504 Users' Security Handbook February 1999
+
+
+ Until recently, it has been far too complicated and expensive for
+ home systems and small businesses to employ secure log in systems.
+ However, an increasing number of products enable this to be done
+ without fancy hardware, using cryptographic techniques. An example
+ of such a technique is Secure Shell [SSH], which is both freely and
+ commercially available for a variety of platforms. Many products
+ (including SSH-based ones) also allow data to be encrypted before it
+ is passed over the network.
+
+Part Two: End-users in a centrally-administered network
+
+ The following rules of thumb provide a summary of the most important
+ pieces of advice discussed in Part Two of this document:
+
+ - Know who your security point-of-contact is.
+ - Keep passwords secret at all times.
+ - Use a password-locked screensaver or log out when you leave your
+ desk.
+ - Don't let simply anyone have physical access to your computer or
+ your network.
+ - Be aware what software you run and very wary of software of
+ unknown origin. Think hard before you execute downloaded
+ software.
+ - Do not panic. Consult your security point-of-contact, if
+ possible, before spreading alarm.
+ - Report security problems as soon as possible to your security
+ point-of-contact.
+
+3. Watch Out!
+
+3.1. The Dangers of Downloading
+
+ An ever expanding wealth of free software has become available on the
+ Internet. While this exciting development is one of the most
+ attractive aspects of using public networks, you should also exercise
+ caution. Some files may be dangerous. Downloading poses the single
+ greatest risk.
+
+ Be careful to store all downloaded files so that you will remember
+ their (possibly dubious) origin. Do not, for example, mistake a
+ downloaded program for another program just because they have the
+ same name. This is a common tactic to fool users into activating
+ programs they believe to be familiar but could, in fact, be
+ dangerous.
+
+
+
+
+
+
+
+Guttman, et. al. Informational [Page 4]
+
+RFC 2504 Users' Security Handbook February 1999
+
+
+ Programs can use the network without making you aware of it. One
+ thing to keep in mind is that if a computer is connected, any program
+ has the capability of using the network, with or without informing
+ you. Say, for example:
+
+ You download a game program from an anonymous FTP server. This
+ appears to be a shoot-em-up game, but unbeknownst to you, it
+ transfers all your files, one by one, over the Internet to a
+ cracker's machine!
+
+ Many corporate environments explicitly prohibit the downloading and
+ running of software from the Internet.
+
+3.2. Don't Get Caught in the Web
+
+ The greatest risk when web browsing is downloading files. Web
+ browsers allow any file to be retrieved from the Internet. See "The
+ Dangers of Downloading".
+
+ Web browsers are downloading files even when it is not entirely
+ obvious. Thus, the risk posed by downloading files may be present
+ even if you do not actively go out and retrieve files overtly. Any
+ file which you have loaded over the network should be considered
+ possibly dangerous (even files in the web browser's cache). Do not
+ execute them by accident, as they may be malicious programs.
+ (Remember, programs are files, too. You may believe you have
+ downloaded a text file, when in fact it is a Trojan Horse program,
+ script, etc.)
+
+ Web browsers may download and execute programs on your behalf, either
+ automatically or after manual intervention. You may disable these
+ features. If you leave them enabled, be sure that you understand the
+ consequences. You should read the security guide which accompanies
+ your web browser as well as the security policy of your company. You
+ should be aware that downloaded programs may be risky to execute on
+ your machine. See "What program is this, anyway?".
+
+ Web pages often include forms. Be aware that, as with Email, data
+ sent from a web browser to a web server is not secure. Several
+ mechanisms have been created to prevent this, most notably Secure
+ Sockets Layer [SSL]. This facility has been built into many web
+ browsers. It encrypts data sent between the user's web browser and
+ the web server so no one along the way can read it.
+
+ It is possible that a web page will appear to be genuine, but is, in
+ fact, a forgery. It is easy to copy the appearance of a genuine web
+ page and possible to subvert the network protocols which contact the
+ desired web server, to misdirect a web browser to an imposter.
+
+
+
+Guttman, et. al. Informational [Page 5]
+
+RFC 2504 Users' Security Handbook February 1999
+
+
+ That threat may be guarded against using SSL to verify if a web page
+ is genuine. When a 'secure' page has been downloaded, the web
+ browser's 'lock' or 'key' will indicate so. It is good to
+ double-check this: View the 'certificate' associated with the web
+ page you have accessed. Each web browser has a different way to do
+ this. The certificate will list the certificate's owner and who
+ issued it. If these look trustworthy, you are probably OK.
+
+3.3 Email Pitfalls
+
+ All the normal concerns apply to messages received via Email that you
+ could receive any other way. For example, the sender may not be who
+ he or she claims to be. If Email security software is not used, it
+ is very difficult to determine for sure who sent a message. This
+ means that Email itself is a not a suitable way to conduct many types
+ of business. It is very easy to forge an Email message to make it
+ appear to have come from anyone.
+
+ Another security issue you should consider when using Email is
+ privacy. Email passes through the Internet from computer to
+ computer. As the message moves between computers, and indeed as it
+ sits in a user's mailbox waiting to be read, it is potentially
+ visible to others. For this reason, it is wise to think twice before
+ sending confidential or extremely personal information via Email.
+ You should never send credit card numbers and other sensitive data
+ via unprotected Email. Please refer to "The Wires Have Ears".
+
+ To cope with this problem, there are privacy programs available, some
+ of which are integrated into Email packages.
+
+ One service many Email users like to use is Email forwarding. This
+ should be used very cautiously. Imagine the following scenario:
+
+ A user has an account with a private Internet Service Provider and
+ wishes to receive all her Email there. She sets it up so that her
+ Email at work is forwarded to her private address. All the Email
+ she would receive at work then moves across the Internet until it
+ reaches her private account. All along the way, the Email is
+ vulnerable to being read. A sensitive Email message sent to her
+ at work could be read by a network snoop at any of the many stops
+ along the way the Email takes.
+
+ Note that Email sent or received at work may not be private. Check
+ with your employer, as employers may (in some instances) legally both
+ read your Email and make use of it. The legal status of Email
+ depends on the privacy of information laws in force in each country.
+
+
+
+
+
+Guttman, et. al. Informational [Page 6]
+
+RFC 2504 Users' Security Handbook February 1999
+
+
+ Many mail programs allow files to be included in Email messages. The
+ files which come by Email are files like any other. Any way in which
+ a file can find its way onto a computer is possibly dangerous. If
+ the attached file is merely a text message, fine. But it may be more
+ than a text message. If the attached file is itself a program or an
+ executable script, extreme caution should be applied before running
+ it. See the section entitled "The Dangers of Downloading".
+
+3.4 Passwords
+
+ Passwords may be easily guessed by an intruder unless precautions are
+ taken. Your password should contain a mixture of numbers, upper and
+ lower case letters, and punctuation. Avoid all real words in any
+ language, or combinations of words, license plate numbers, names and
+ so on. The best password is a made-up sequence (e.g., an acronym
+ from a phrase you won't forget), such as "2B*Rnot2B" (but don't use
+ this password!).
+
+ Resist the temptation to write your password down. If you do, keep
+ it with you until you remember it, then shred it! NEVER leave a
+ password taped onto a terminal or written on a whiteboard. You
+ wouldn't write your PIN code on your automated teller machine (ATM)
+ card, would you? You should have different passwords for different
+ accounts, but not so many passwords that you can't remember them.
+ You should change your passwords periodically.
+
+ You should also NEVER save passwords in scripts or login procedures
+ as these could be used by anyone who has access to your machine.
+
+ Be certain that you are really logging into your system. Just
+ because a login prompt appears and asks you for your password does
+ not mean you should enter it. Avoid unusual login prompts and
+ immediately report them to your security point-of-contact. If you
+ notice anything strange upon logging in, change your password.
+
+ Unless precautions have been taken to encrypt your password when it
+ is sent over the network, you should, if possible, use "one-time
+ passwords" whenever you log in to a system over a network. (Some
+ applications take care of that for you.) See "The Wires Have Ears"
+ for more information on the risks associated with logging in over a
+ network.
+
+3.5 Viruses and Other Illnesses
+
+ Viruses are essentially unwanted pieces of software that find their
+ way onto a computer. What the virus may do once it has entered its
+ host, depends on several factors: What has the virus been programmed
+ to do? What part of the computer system has the virus attacked?
+
+
+
+Guttman, et. al. Informational [Page 7]
+
+RFC 2504 Users' Security Handbook February 1999
+
+
+ Some viruses are 'time bombs' which activate only when given a
+ particular condition, such as reaching a certain date. Others remain
+ latent in the system until a particular afflicted program is
+ activated. There are still others which are continually active,
+ exploiting every opportunity to do mischief. A subtle virus may
+ simply modify a system's configuration, then hide.
+
+ Be cautious about what software you install on your system. Use
+ software from "trusted sources", if possible. Check your site policy
+ before installing any software: Some sites only allow administrators
+ to install software to avoid security and system maintenance
+ problems.
+
+ Centrally-administered sites have their own policy and tools for
+ dealing with the threat of viruses. Consult your site policy or find
+ out from your systems administrator what the correct procedures are
+ to stay virus free.
+
+ You should report it if a virus detection tool indicates that your
+ system has a problem. You should notify your site's systems
+ administrators as well as the person you believe passed the virus to
+ you. It is important to remain calm. Virus scares may cause more
+ delay and confusion than an actual virus outbreak. Before announcing
+ the virus widely, make sure you verify its presence using a virus
+ detection tool, if possible, with the assistance of
+ technically-competent personnel.
+
+ Trojan Horse programs and worms are often categorized with viruses.
+ Trojan Horse programs are dealt with in the "What Program is This,
+ Anyway?" section. For the purposes of this section, worms should be
+ considered a type of virus.
+
+3.6 Modems
+
+ You should be careful when attaching anything to your computer, and
+ especially any equipment which allows data to flow. You should get
+ permission before you connect anything to your computer in a
+ centrally-administered computing environment.
+
+ Modems present a special security risk. Many networks are protected
+ by a set of precautions designed to prevent a frontal assault from
+ public networks. If your computer is attached to such a network, you
+ must exercise care when also using a modem. It is quite possible to
+ use the modem to connect to a remote network while *still* being
+ connected to the 'secure' net. Your computer can now act as a hole
+ in your network's defenses. Unauthorized users may be able to get
+ onto your organization's network through your computer!
+
+
+
+
+Guttman, et. al. Informational [Page 8]
+
+RFC 2504 Users' Security Handbook February 1999
+
+
+ Be sure you know what you are doing if you leave a modem on and set
+ up your computer to allow remote computers to dial in. Be sure you
+ use all available security features correctly. Many modems answer
+ calls by default. You should turn auto-answer off unless you are
+ prepared to have your computer respond to callers. Some 'remote
+ access' software requires this. Be sure to turn on all the security
+ features of your 'remote access' software before allowing your
+ computer to be accessed by phone.
+
+ Note that having an unlisted number will not protect you from someone
+ breaking into your computer via a phone line. It is very easy to
+ probe many phone lines to detect modems and then launch attacks.
+
+3.7 Don't Leave Me...
+
+ Do not leave a terminal or computer logged in and walk away. Use
+ password-locked screensavers whenever possible. These can be set up
+ so that they activate after the computer has been idle for a while.
+
+ Sinister as it may seem, someone coming around to erase your work is
+ not uncommon. If you remained logged in, anyone can come by and
+ perform mischief for which you may be held accountable. For example,
+ imagine the trouble you could be in for if nasty Email were sent to
+ the president of your company in your name, or your account were used
+ to transfer illegal pornography.
+
+ Anyone who can gain physical access to your computer can almost
+ certainly break into it. Therefore, be cautious regarding who you
+ allow access to your machine. If physically securing your machine is
+ not possible, it is wise to encrypt your data files kept on your
+ local hard disk. If possible, it is also wise to lock the door to
+ one's office where the computer is stored.
+
+3.8 File Protections
+
+ Data files and directories on shared systems or networked file
+ systems require care and maintenance. There are two categories of
+ such systems:
+
+ - Files to share
+
+ Shared files may be visible to everyone or to a restricted group
+ of other users. Each system has a different way of specifying
+ this. Learn how to control sharing permissions of files and
+ implement such control without fail.
+
+
+
+
+
+
+Guttman, et. al. Informational [Page 9]
+
+RFC 2504 Users' Security Handbook February 1999
+
+
+ - Protected files
+
+ These include files that only you should have access to, but
+ which are also available to anyone with system administrator
+ privileges. An example of this are files associated with the
+ delivery of Email. You don't want other users to read your Email,
+ so make sure such files have all the necessary file permissions
+ set accordingly.
+
+3.9 Encrypt Everything
+
+ Additionally, there are files that are private. You may have files
+ which you do not wish anyone else to have access to. In this case,
+ it is prudent to encrypt the file. This way, even if your network is
+ broken into or the systems administrator turns into Mr. Hyde, your
+ confidential information will not be available. Encryption is also
+ very important if you share a computer. For example, a home computer
+ may be shared by room mates who are friends but prefer to keep their
+ Email and financial information private. Encryption allows for
+ shared yet private usage.
+
+ Before you encrypt files, you should check your site's security
+ policy. Some employers and countries expressly forbid or restrict
+ the storing and/or transferring of encrypted files.
+
+ Be careful with the passwords or keys you use to encrypt files.
+ Locking them away safely not only helps to keep them from prying eyes
+ but it will help you keep them secure too; for if you lose them, you
+ will lose your ability to decrypt your data as well! It may be wise
+ to save more than one copy. This may even be required, if your
+ company has a key escrow policy, for example. This protects against
+ the possibility that the only person knowing a pass phrase may leave
+ the company or be struck by lightning.
+
+ Whilst encryption programs are readily available, it should be noted
+ that the quality can vary widely. PGP (which stands for "Pretty Good
+ Privacy") for example, offers a strong encryption capability. Many
+ common software applications include the capability to encrypt data.
+ The encryption facilities in these are typically very weak.
+
+ You should not be intimidated by encryption software. Easy-to-use
+ software is being made available.
+
+3.10 Shred Everything Else
+
+ You would be surprised what gets thrown away into the waste-paper
+ basket: notes from meetings, old schedules, internal phone lists,
+ computer program listings, correspondence with customers and even
+
+
+
+Guttman, et. al. Informational [Page 10]
+
+RFC 2504 Users' Security Handbook February 1999
+
+
+ market analyses. All of these would be very valuable to competitors,
+ recruiters and even an overzealous (hungry?) journalist looking for a
+ scoop. The threat of dumpster diving is real - take it seriously!
+ Shred all potentially useful documents before discarding them.
+
+ You should also be aware that deleting a file does not erase it in
+ many cases. The only way to be sure that an old hard disk does not
+ contain valuable data may be to reformat it.
+
+3.11 What Program is This, Anyway?
+
+ Programs have become much more complex in recent years. They are
+ often extensible in ways which may be dangerous. These extensions
+ make applications more flexible, powerful and customizable. They
+ also open the end-user up to all sorts of risks.
+
+ - A program may have "plug-in" modules. You should not trust the
+ plug-ins simply because you are used to trusting the programs
+ they plug into. For example: Some web pages suggest that the
+ user download a plug-in to view or use some portion of the web
+ page's content. Consider: What is this plug-in? Who wrote it?
+ Is it safe to include it in your web browser?
+
+ - Some files are "compound documents". This means that instead of
+ using one single program, it will be necessary to run several
+ programs in order to view or edit a document. Again, be careful
+ of downloading application components. Just because they
+ integrate with products which are well-known does not mean that
+ they can be trusted. Say, you receive an Email message which can
+ only be read if you download a special component. This component
+ could be a nasty program which wipes out your hard drive!
+
+ - Some programs are downloaded automatically when accessing web
+ pages. While there are some safeguards to make sure that these
+ programs may be used safely, there have been security flaws
+ discovered in the past. For this reason, some centrally-
+ administered sites require that certain web browser capabilities
+ be turned off.
+
+4. Paranoia is Good
+
+ Many people do not realize it, but social engineering is a tool which
+ many intruders use to gain access to computer systems. The general
+ impression that people have of computer break-ins is that they are
+ the result of technical flaws in computer systems which the intruders
+ have exploited. People also tend to think that break-ins are purely
+ technical. However, the truth is that social engineering plays a big
+
+
+
+
+Guttman, et. al. Informational [Page 11]
+
+RFC 2504 Users' Security Handbook February 1999
+
+
+ part in helping an attacker slip through security barriers. This
+ often proves to be an easy stepping-stone onto the protected system
+ if the attacker has no authorized access to the system at all.
+
+ Social engineering may be defined, in this context, as the act of
+ gaining the trust of legitimate computer users to the point where
+ they reveal system secrets or help someone, unintentionally, to gain
+ unauthorized access to their system(s). Using social engineering, an
+ attacker may gain valuable information and/or assistance that could
+ help break through security barriers with ease. Skillful social
+ engineers can appear to be genuine but are really full of deceit.
+
+ Most of the time, attackers using social enginering work via
+ telephone. This not only provides a shield for the attacker by
+ protecting his or her identity, it also makes the job easier because
+ the attacker can claim to be a particular someone with more chances
+ of getting away with it.
+
+ There are several types of social engineering. Here are a few
+ examples of the more commonly-used ones:
+
+ - An attacker may pretend to be a legitimate end-user who is new to
+ the system or is simply not very good with computers. This
+ attacker may approach systems administrators and other end-users
+ for help. This "user" may have lost his password, or simply can't
+ get logged into the system and needs to access the system
+ urgently. Attackers have also been known to identify themselves
+ as some VIP in the company, screaming at administrators to get
+ what they want. In such cases, the administrator (or it could be
+ an end-user) may feel threatened by the caller's authority and
+ give in to the demands.
+
+ - Attackers who operate via telephone calls may never even have seen
+ the screen display on your system before. In such cases, the
+ trick attackers use is to make details vague, and get the user to
+ reveal more information on the system. The attacker may sound
+ really lost so as to make the user feel that he is helping a
+ damsel in distress. Often, this makes people go out their way to
+ help. The user may then reveal secrets when he is off-guard.
+
+ - An attacker may also take advantage of system problems that have
+ come to his attention. Offering help to a user is an effective
+ way to gain the user's trust. A user who is frustrated with
+ problems he is facing will be more than happy when someone comes
+ to offer some help. The attacker may come disguised as the
+ systems administrator or maintenance technician. This attacker
+ will often gain valuable information because the user thinks that
+ it is alright to reveal secrets to technicians. Site visits may
+
+
+
+Guttman, et. al. Informational [Page 12]
+
+RFC 2504 Users' Security Handbook February 1999
+
+
+ pose a greater risk to the attacker as he may not be able to make
+ an easy and quick get-away, but the risk may bring fruitful
+ returns if the attacker is allowed direct access to the system by
+ the naive user.
+
+ - Sometimes, attackers can gain access into a system without prior
+ knowledge of any system secret nor terminal access. In the same way
+ that one should not carry someone else's bags through Customs, no user
+ should key in commands on someone's behalf. Beware of attackers who
+ use users as their own remotely-controlled fingers to type commands on
+ the user's keyboard that the user does not understand, commands which
+ may harm the system. These attackers will exploit system software
+ bugs and loopholes even without direct access to the system. The
+ commands keyed in by the end-user may bring harm to the system, open
+ his own account up for access to the attacker or create a hole to
+ allow the attacker entry (at some later time) into the system. If you
+ are not sure of the commands you have been asked to key in, do not
+ simply follow instructions. You never know what and where these could
+ lead to...
+
+ To guard against becoming a victim of social engineering, one
+ important thing to remember is that passwords are secret. A password
+ for your personal account should be known ONLY to you. The systems
+ administrators who need to do something to your account will not
+ require your password. As administrators, the privileges they have
+ will allow them to carry out work on your account without the need
+ for you to reveal your password. An administrator should not have to
+ ask you for your password.
+
+ Users should guard the use of their accounts, and keep them for their
+ own use. Accounts should not be shared, not even temporarily with
+ systems administrators or systems maintenance techinicians. Most
+ maintenance work will require special privileges which end-users are
+ not given. Systems administrators will have their own accounts to
+ work with and will not need to access computer systems via an
+ end-user's account.
+
+ Systems maintenance technicians who come on site should be
+ accompanied by the local site administrator (who should be known to
+ you). If the site administrator is not familiar to you, or if the
+ technician comes alone, it is wise to give a call to your known site
+ administrator to check if the technician should be there. Yet, many
+ people will not do this because it makes them look paranoid and it is
+ embarrassing to show that they have no, or little trust in these
+ visitors.
+
+
+
+
+
+
+Guttman, et. al. Informational [Page 13]
+
+RFC 2504 Users' Security Handbook February 1999
+
+
+ Unless you are very sure that the person you are speaking to is who he
+ or she claims to be, no secret information should ever be revealed to
+ such people. Sometimes, attackers may even be good enough to make
+ themselves sound like someone whose voice you know over the phone. It
+ is always good to double check the identity of the person. If you are
+ unable to do so, the wisest thing to do is not to reveal any secrets.
+ If you are a systems administrator, there should be security
+ procedures for assignment and reassignment of passwords to users, and
+ you should follow such procedures. If you are an end-user, there
+ should not be any need for you to have to reveal system secrets to
+ anyone else. Some companies assign a common account to multiple
+ users. If you happen to be in such a group, make sure you know
+ everyone in that group so you can tell if someone who claims to be in
+ the group is genuine.
+
+Part Three: End-users self administering a networked computer
+
+ The home user or the user who administers his own network has many of
+ the same concerns as a centrally-administered user. The following is
+ a summary of additional advice given in Part Three:
+
+ - Read manuals to learn how to turn on security features, then turn
+ them on.
+ - Consider how private your data and Email need to be. Have you
+ invested in privacy software and learned how to use it yet?
+ - Prepare for the worst in advance.
+ - Keep yourself informed about what the newest threats are.
+
+5. Make Your Own Security Policy
+
+ You should decide ahead of time what risks are acceptable and then
+ stick to this decision. It is also wise to review your decision at
+ regular intervals and whenever the need to do so arises. It may be
+ wise to simply avoid downloading any software from the network which
+ comes from an unknown source to a computer storing business records,
+ other valuable data and data which is potentially damaging if the
+ information was lost or stolen.
+
+ If the system has a mixed purpose, say recreation, correspondence
+ and some home accounting, perhaps you will hazard some downloading of
+ software. You unavoidably take some risk of acquiring stuff
+ which is not exactly what it seems to be.
+
+ It may be worthwhile installing privacy software on a computer if it
+ is shared by multiple users. That way, a friend of a room mate won't
+ have access to your private data, and so on.
+
+
+
+
+
+Guttman, et. al. Informational [Page 14]
+
+RFC 2504 Users' Security Handbook February 1999
+
+
+6. Bad Things Happen
+
+ If you notice that your files have been modified or ascertain somehow
+ that your account has been used without your consent, you should
+ inform your security point-of-contact immediately. When you do
+ not know who your security point-of-contact is, try calling
+ your Internet service provider's help desk as a first step.
+
+6.1 How to Prepare for the Worst in Advance
+
+ - Read all user documentation carefully. Make sure that it is clear
+ when services are being run on your computer. If network services
+ are activated, make sure they are properly configured (set all
+ permissions so as to prevent anonymous or guest logins, and so
+ on). Increasingly, many programs have networking capabilities
+ built in to them. Learn how to properly configure and safely use
+ these features.
+
+ - Back up user data. This is always important. Backups are
+ normally thought of as a way of ensuring you will not lose your
+ work if a hard disk fails or if you make a mistake and delete a
+ file. Backing up is also critical to insure that data cannot be
+ lost due to a computer security incident. One of the most vicious
+ and unfortunately common threats posed by computer viruses and
+ Trojan Horse programs is erasing a computer's hard disk.
+
+ - Obtain virus checking software or security auditing tools. Learn
+ how to use them and install them before connecting to a public
+ network. Many security tools require that they be run on a
+ "clean" system, so that comparisons can be made between the
+ present and pristine states. Thus, it is necessary for some work
+ to be done ahead of time.
+
+ - Upgrade networking software regularly. As new versions of
+ programs come out, it is prudent to upgrade. Security
+ vulnerabilities will likely have been fixed. The longer you wait
+ to do this, the greater the risk that security vulnerabilities of
+ the products will be become known and be exploited by some network
+ assailant. Keep up to date!
+
+ - Find out who to contact if you suspect trouble. Does your
+ Internet Service Provider have a security contact or Help Desk?
+ Investigate this before trouble happens so you won't lose time
+ trying to figure it out should trouble occur. Keep the contact
+ information both online and offline for easy retrieval.
+
+
+
+
+
+
+Guttman, et. al. Informational [Page 15]
+
+RFC 2504 Users' Security Handbook February 1999
+
+
+ There are 3 ways to avoid problems with viruses:
+
+ 1. Don't be promiscuous
+
+ If at all possible, be cautious about what software you install on
+ your system. If you are unaware of or unsure of the origin of a
+ program, it is wise not to run it. Obtain software from trusted
+ sources. Do not execute programs or reboot using old diskettes
+ unless you have reformatted them, especially if the old diskettes
+ have been used to bring software home from a trade show and other
+ potentially security-vulnerable places.
+
+ Nearly all risk of getting infected by viruses can be eliminated
+ if you are extremely cautious about what files are stored on your
+ computer. See "The Dangers of Downloading" for more details.
+
+ 2. Scan regularly.
+
+ Give your system a regular check-up. There are excellent
+ virus checking and security audit tools for most computer
+ platforms available today. Use them, and if possible, set them to
+ run automatically and regularly. Also, install updates of these
+ tools regularly and keep yourself informed of new virus threats.
+
+ 3. Notice the unusual.
+
+ It's not true that a difference you cannot detect is no difference
+ at all, but it is a good rule of thumb. You should get used to
+ the way your system works. If there is an unexplainable change
+ (for instance, files you believe should exist are gone, or strange
+ new files are appearing and disk space is 'vanishing'), you should
+ check for the presense of viruses.
+
+ You should take some time to be familiar with computer virus
+ detection tools available for your type of computer. You should use
+ an up-to-date tool (i.e. not older than three months). It is very
+ important to test your computer if you have been using shared
+ software of dubious origin, someone else's used floppy disks to
+ transfer files, and so on.
+
+6.2 What To Do if You Suspect Trouble
+
+ If you suspect that your home computer has a virus, that a malicious
+ program has been run, or that a system has been broken into, the
+ wisest course of action is to first disconnect the system from all
+ networks. If available, virus detection or system auditing software
+ should be used.
+
+
+
+
+Guttman, et. al. Informational [Page 16]
+
+RFC 2504 Users' Security Handbook February 1999
+
+
+ Checking vital system files for corruption, tampering or malicious
+ replacement is very tedious work to do by hand. Fortunately there are
+ many virus detection programs available for PCs and Macintosh
+ computers. There are security auditing programs available for
+ UNIX-based computers. If software is downloaded from the network, it
+ is wise to run virus detection or auditing tools regularly.
+
+ If it becomes clear that a home system has been attacked, it is time
+ to clean up. Ideally, a system should be rebuilt from scratch. This
+ means erasing everything on the hard disk. Next, install the
+ operating system and then all additional software the system needs.
+ It is best to install the operating system and additional software
+ from the original distribution diskettes or CD-roms, rather than from
+ backup storage. The reason for this is that a system may have been
+ broken into some time ago, so the backed up system or program files
+ may already include some altered files or viruses. Restoring a system
+ from scratch is tedious but worthwhile. Do not forget to re-install
+ all security related fixes you had installed before the security
+ incident. Obtain these from a verified, unsuspicious source.
+
+6.3 Email
+
+ Remember to be careful with saved Email. Copies of sent or received
+ Email (or indeed any file at all) placed in storage provided by an
+ Internet service provider may be vulnerable. The risk is that
+ someone might break into the account and read the old Email. Keep
+ your Email files, indeed any sensitive files, on your home machine.
+
+7. Home Alone
+
+ A home system can be broken into over the Internet if a home user is
+ unwary. The files on the home system can be stolen, altered or
+ destroyed. The system itself, if compromised, could be accessed
+ again some time in the future. This section describes issues and
+ makes recommendations relevant to a home user of the Internet.
+
+7.1 Beware of Daemons
+
+ A home system which uses PPP to connect directly to the Internet is
+ increasingly common. These systems are at the greatest risk if they
+ run certain kinds of programs called "services". If you run a
+ service, you are in effect making your computer available to others
+ across the network. Some services include:
+
+ - File servers (an NFS server, a PC with 'file sharing' turned on)
+ - An FTP server
+ - A Web server
+
+
+
+
+Guttman, et. al. Informational [Page 17]
+
+RFC 2504 Users' Security Handbook February 1999
+
+
+ There are, in general, two types of programs which operate on the
+ Internet: Clients (like web browsers and Email programs) and Servers
+ (like web servers and mail servers).
+
+ Most software which runs on home systems is of the client variety;
+ but, increasingly, server software is available on traditionally
+ client platforms (e.g., PCs). Server software which runs in the
+ background is referred to as a "daemon" (pronounced dee-mon). Many
+ Internet server software programs that run as daemons have names that
+ end in `d', like "inetd" (Internet Daemon) and "talkd" (Talk Daemon).
+ When set to run, these programs wait for clients to request some
+ particular service from across the network.
+
+ There are four very important things to keep in mind as far as the
+ security implications of running services on a home computer are
+ concerned.
+
+ - First and most important, if a server is not properly configured,
+ it is very vulnerable to being attacked over a network. It is
+ vital, if you run services, to be familiar with the proper
+ configuration. This is often not easy, and may require training
+ or technical expertise.
+
+ - All software has flaws, and flaws exploited deviously can be used
+ to breach computer security. If you run a server on your home
+ machine, you have to stay aware. This requires work: You have to
+ stay in touch with the supplier of the software to get security
+ updates. It is highly recommended that you keep up with security
+ issues through on-line security forums. See [RFC2196] for a list
+ of references.
+
+ If security flaws in your server software are discovered, you will
+ need to either stop using the software or apply "patches" or
+ "fixes" which eliminate the vulnerability. The supplier of the
+ software, if it is a decent company or freeware author, will
+ supply information and updates to correct security flaws. These
+ "patches" or "fixes" must be installed as soon as possible.
+
+ - As a rule of thumb, the older the software, the greater the chance
+ that it has known vulnerabilities. This is not to say you should
+ simply trust brand new software either! Often, it takes time to
+ discover even obvious security flaws in servers.
+
+ - Some servers start up without any warning. There are some web
+ browsers and telnet clients which automatically start FTP servers
+ if not explicitly configured to not do so. If these servers are
+ not themselves properly configured, the entire file system of the
+ home computer can become available to anyone on the Internet.
+
+
+
+Guttman, et. al. Informational [Page 18]
+
+RFC 2504 Users' Security Handbook February 1999
+
+
+ In general, any software MAY start up a network daemon. The way to
+ be safe here is to know the products you are using. Read the manual,
+ and if any questions arise, call the company or mail the author of
+ free software to find out if you are actually running a service by
+ using the product.
+
+ A home user running a remote login service on his home machine faces
+ very serious risks. This service allows the home user to log in to
+ his home machine from other computers on the Internet and can be
+ quite convenient. But the danger is that someone will secretly
+ observe the logging in and then be able to masquerade as the user
+ whenever they choose to do so in the future. See "The Wires Have
+ Ears" which suggests precautions to take for remote log in.
+
+ If possible, activate all "logging" options in your server software
+ which relate to security. You need to review these logs regularly in
+ order to gain any benefit from this logging. You should also be
+ aware that logs often grow very quickly in size, so you need to be
+ careful they don't fill up your hard disk!
+
+7.2 Going Places
+
+ Remote logins allow a user privileged access onto physically remote
+ systems from the comfort of his own home.
+
+ More and more companies are offering their employees the ability to
+ work from home with access to their computer accounts through dial-up
+ connections. As the convenience of Internet connectivity has led to
+ lowered costs and wide-spread availability, companies may allow
+ remote login to their systems via the Internet. Customers of
+ companies with Internet access may also be provided with remote login
+ accounts. These companies include Internet service providers, and
+ even banks. Users should be very careful when making remote logins.
+
+ As discussed in "The Wires have Ears" section, Internet connections
+ can be eavesdropped on. If you intend to use a remote login service,
+ check that the connection can be done securely, and make sure that
+ you use the secure technologies/features.
+
+ Connections may be secured using technologies like one-time
+ passwords, secure shell (SSH) and Secure Sockets Layer (SSL). One-
+ time passwords make a stolen password useless to steal, while secure
+ shell encrypts data sent over the connection. Please refer to "Don't
+ Get Caught in the Web" for a discussion on SSL. Secure services such
+ as these have to be made available on the systems to which you log in
+ remotely.
+
+
+
+
+
+Guttman, et. al. Informational [Page 19]
+
+RFC 2504 Users' Security Handbook February 1999
+
+
+7.3 Secure It!
+
+ Administering your own home computer means you get to choose what
+ software is run on it. Encryption software provides protection for
+ data. If you keep business records and other sensitive data on your
+ computer, encryption will help to keep it safe. For example, if you
+ ran a network service from your home computer and missed setting
+ restrictions on a private directory, a remote user (authorized or
+ not) may gain access to files in this private directory. If the
+ files are encrypted, the user will not be able to read them. But as
+ with all forms of encryption running on any system, the keys and
+ passwords should first be kept safe!
+
+8. A Final Note
+
+ This document has provided the reader with an introduction and as
+ much concise detail as possible. Present security issues go out of
+ date quickly, and although effort has been made to keep discussions
+ general, examples given may not be relevant in the future as the
+ Internet and computer industry continue to grow.
+
+ Just as home-owners are now taking increased cautions at the expense
+ of convenience, to secure their homes in the changing world we live
+ in, computer network users should not ignore security. It may be
+ inconvenient, but it is always better to be safe than sorry.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Guttman, et. al. Informational [Page 20]
+
+RFC 2504 Users' Security Handbook February 1999
+
+
+Appendix: Glossary of Security Terms
+
+ Acceptable Use Policy (AUP)
+
+ A set of rules and guidelines that specify in more or less detail
+ the expectations in regard to appropriate use of systems or
+ networks.
+
+ Account
+
+ See (Computer) Account
+
+ Anonymous and Guest Log In
+
+ Services may be made available without any kind of authentication.
+ This is commonly done, for instance, with the FTP protocol to
+ allow anonymous access. Other systems provide a special account
+ named "guest" to provide access, typically restricting the
+ privileges of this account.
+
+ Auditing Tool
+
+ Tools to analyze computer systems or networks in regard to their
+ security status or in relation to the set of services provided by
+ them. COPS (Computer Oracle Password and Security analyzer) and
+ SATAN (Security Administrator's Tool for Analyzing Networks) are
+ famous examples of such tools.
+
+ Authentication
+
+ Authentication refers to mechanisms which are used to verify the
+ identity of a user. The process of authentication typically
+ requires a name and a password to be supplied by the user as proof
+ of his identity.
+
+ Centrally-Administered Network
+
+ A network of systems which is the responsibility of a single group
+ of administrators who are not distributed but work centrally to
+ take care of the network.
+
+ Certificate
+
+ Certificates are data which is used to verify digital signatures.
+ A certificate is only as trustworthy as the agency which issued
+ it. A certificate is used to verify a particular signed item,
+ such as an Email message or a web page. The digital signature,
+ the item and the certificate are all processed by a mathematical
+
+
+
+Guttman, et. al. Informational [Page 21]
+
+RFC 2504 Users' Security Handbook February 1999
+
+
+ program. It is possible to say, if the signature is valid, that
+ "According to the agency which issued the certificate, the signer
+ was (some name)".
+
+ Clean System
+
+ A computer which has been freshly installed with its operating
+ system and software obtainied from trusted software distribution
+ media. As more software and configuration are added to a
+ computer, it becomes increasingly difficult to determine if the
+ computer is 'clean' or has been compromised by viruses, trojan
+ horse or misconfiguration which reduces the security of the
+ system.
+
+ Client
+
+ Depending on the point of view, a client might be a computer
+ system which an end-user uses to access services hosted on another
+ computer system called a server. 'Client' may also refer to a
+ program or a part of a system that is used by an end-user to
+ access services provided by another program (for example, a web
+ browser is a client that accesses pages provided by a Web Server).
+
+ Compound Documents
+
+ A 'document' is a file containing (a set of) data. Files may
+ consist of multiple parts: a plain document, an encrypted
+ document, a digitally-signed documents or a compressed document.
+ Multi-part files are known as compound documents and may require a
+ variety of programs to be used in order to interpret and
+ manipulate it. These programs may be used without the user's
+ knowledge.
+
+ (Computer) Account
+
+ This term describes the authorization to access a specific
+ computer system or network. Each end-user has to use an account,
+ which consists most probably of a combination of user name and
+ password or another means of proving that the end-user is the
+ person the account is assigned to.
+
+ Configuring Network Services
+
+ The part of an administrator's task that is related to specifying
+ the conditions and details of network services that govern the
+ service provision. In regard to a Web server, this includes which
+ Web pages are available to whom and what kind of information is
+ logged for later review purposes.
+
+
+
+Guttman, et. al. Informational [Page 22]
+
+RFC 2504 Users' Security Handbook February 1999
+
+
+ Cookies
+
+ Cookies register information about a visit to a web site for
+ future use by the server. A server may receive information of
+ cookies of other sites as well which create concern in terms of
+ breach of privacy.
+
+ Cracker
+
+ This term is used to describe attackers, intruders or other bad
+ guys that do not play by the rules and try to circumvent security
+ mechanisms and/or attack individuals and organisations.
+
+ Daemons (inetd, talkd, etc.)
+
+ These are processes that run on computer systems to provide
+ services to other computer systems or processes. Typically,
+ daemons are considered "servers".
+
+ Decrypting
+
+ The process of reversing the encryption of a file or message to
+ recover the original data in order to use or read it.
+
+ Default Account
+
+ Some systems and server software come with preconfigured accounts.
+ These accounts may be set up with a predefined (user name and)
+ password to allow anyone access and are often put there to make it
+ convenient for users to login initially. Default accounts should
+ be turned off or have their predefined passwords changed, to
+ reduce the risk of abuse to the system.
+
+ Dial-in Service
+
+ A way of providing access to computer systems or networks via a
+ telecommunications network. A computer uses a modem to make a
+ telephone call to a another modem, which in turn provides 'network
+ access service'. See also: PPP.
+
+ Digital Signature
+
+ A digital signature is created by a mathematical computer program.
+ It is not a hand-written signature nor a computer-produced picture
+ of one. The signature is like a wax seal that requires a special
+ stamp to produce it, and is attached to an Email message or file.
+ The origin of the message or file may then be verified by the
+ digital signature (using special tools).
+
+
+
+Guttman, et. al. Informational [Page 23]
+
+RFC 2504 Users' Security Handbook February 1999
+
+
+ Downloaded Software
+
+ Software packages retrieved from the Internet (using, for example,
+ the FTP protocol).
+
+ Downloading
+
+ The act of retrieving files from a server on the network.
+
+ Email Packages
+
+ To communicate via electronic mail, an end-user usually makes use
+ of an Email client that provides the user-interface to create,
+ send, retrieve and read Email. Various different Email packages
+ provide the same set of basic functions but have different user-
+ interfaces and perhaps, special/extra functions. Some Email
+ packages provide encryption and digital signature capabilities.
+
+ Email Security Software
+
+ Software which provides security through digital signatures and
+ encryption (and decryption) to enable the end-user to protect
+ messages and documents prior to sending them over a possibly
+ insecure network. PGP is an example of such software.
+
+ Encrypting / Encryption
+
+ This is a mathematical process of scambling data for privacy
+ protection.
+
+ Encryption Software
+
+ The software that actually provides the needed functionality for
+ end users to encrypt messages and files. PGP is one example.
+
+ End-User
+
+ An (human) individual that makes use of computer systems and
+ networks.
+
+ Files (programs, data, text and so on)
+
+ Files include user data, but also programs, the computer operating
+ system and the system's configuration data.
+
+
+
+
+
+
+
+Guttman, et. al. Informational [Page 24]
+
+RFC 2504 Users' Security Handbook February 1999
+
+
+ File Server
+
+ A computer system that provides a way of sharing and working on
+ files stored on the system among users with access to these files
+ over a network.
+
+ File Transfer
+
+ The process of transferring files between two computer systems
+ over a network, using a protocol such as FTP or HTTP.
+
+ Fixes, Patches and installing them
+
+ Vendors, in response to the discovery of security vulnerabilities,
+ provide sets of files that have to be installed on computer
+ systems. These files 'fix' or 'patch' the computer system or
+ programs and remove the security vulnerability.
+
+ FTP (File Transfer Protocol)
+
+ A protocol that allows for the transfer of files between an FTP
+ client and FTP server.
+
+ Group of Users
+
+ Security software often allow permissions to be set for groups (of
+ users) as opposed to individuals.
+
+ Help Desk
+
+ A support entity that can be called upon to get help with a
+ computer or communication problem.
+
+ Internet
+
+ A collection of interconnected networks that use a common set of
+ protocols called the TCP/IP stack to enable communication between
+ the connected computer systems.
+
+ Key Escrow
+
+ Keys are used to encrypt and decrypt files. key escrow is used to
+ store keys for use by third parties to access the data in
+ encrypted files.
+
+
+
+
+
+
+
+Guttman, et. al. Informational [Page 25]
+
+RFC 2504 Users' Security Handbook February 1999
+
+
+ Keys Used to Encrypt and Decrypt Files
+
+ To make use of encryption, an end-user has to provide some secret,
+ in the form of some data, usually called a key.
+
+ Log In, Logging into a System
+
+ This is an action performed by an end-user, when he authenticates
+ himself to a computer system.
+
+ Log In Prompt
+
+ The characters that are displayed when logging into a system to
+ ask for user name and password.
+
+ Logged In
+
+ If an end-user has successfully proven to have legitimate access
+ to a system, he is considered to be logged in.
+
+ Logging
+
+ Systems and server software often provide the ability to keep
+ track of events. Events may be configured to be written out to a
+ file known as a log. The log file can be read later and allows
+ for system failures and security breaches to be identified.
+
+ Masquerade (see Remote Log In)
+
+ Anyone who pretends to be someone they are not in order to obtain
+ access to a computer account is said to be in 'masquerade'. This
+ may be accomplished by providing a false user name, or stealing
+ someone else's password and logging in as him.
+
+ Network File System (NFS, file sharing with PCs, etc.)
+
+ NFS is an application and protocol suite that provides a way of
+ sharing files between clients and servers. There are other
+ protocols which provide file access over networks. These provide
+ similar functionality, but do not interoperate with each other.
+
+ Networking Features of Software
+
+ Some software has features which make use of the network to
+ retrieve or share data. It may not be obvious that software has
+ networking features.
+
+
+
+
+
+Guttman, et. al. Informational [Page 26]
+
+RFC 2504 Users' Security Handbook February 1999
+
+
+ Network Services
+
+ Services which are not provided on the local computer system the
+ end-user is working on but on a server located in the network.
+
+ One-Time Passwords (OTP)
+
+ Instead of using the same password over and over again, a
+ different password is used on each subsequent log in.
+
+ Passphrase
+
+ A passphrase is a long password. It is often composed of several
+ words and symbols to make it harder to guess.
+
+ Password-Locked Screensaver
+
+ A screen saver obscures the normal display of a monitor. A
+ password-locked screensaver can only be deactivated if the end-
+ user's password is supplied. This prevents a logged-in system
+ from being abused and hides the work currently being done from
+ passers-by.
+
+ Patch
+
+ See "Fixes, Patches and installing them"
+
+ Permissions
+
+ Another word for the access controls that are used to control the
+ access to files and other resources.
+
+ PGP (Pretty Good Privacy)
+
+ PGP is an application package that provides tools to encrypt and
+ digitally sign files on computer systems. It is especially useful
+ to encrypt and/or sign files and messages before sending them via
+ Email.
+
+ Plug-in Modules
+
+ Software components that integrate into other software (such as
+ web browsers) to provide additional features.
+
+
+
+
+
+
+
+
+Guttman, et. al. Informational [Page 27]
+
+RFC 2504 Users' Security Handbook February 1999
+
+
+ Point-of-Contact, Security
+
+ In case of security breaches or problems, many organisations
+ provide a designated point-of-contact which can alert others and
+ take the appropriate actions.
+
+ PPP (Point to Point Protocol)
+
+ PPP is the mechanism which most end-users establish a network
+ connection between their PC and their Internet service provider
+ with. Once connected, the PC is able to transmit and receive data
+ to any other system on the network.
+
+ Privacy Programs
+
+ Another term for encryption software that highlights the use of
+ this software to protect the confidentiality and therefore privacy
+ of the end-users that make use of it.
+
+ Remote Access Software
+
+ This software allows a computer to use a modem to connect to
+ another system. It also allows a computer to 'listen' for calls
+ on a modem (this computer provides 'remote access service'.)
+ Remote access software may provide access to a single computer or
+ to a network.
+
+ Remote Log In
+
+ If an end-user uses a network to log in to a system, this act is
+ known as remote log in.
+
+ Security Features
+
+ These are features which provide protection or enable end-users
+ and administrators to assess the security of a system, for
+ example, by auditing it.
+
+ Security Policy
+
+ A security policy is written by organisations to address security
+ issues, in the form of "do's" and "don'ts". These guidelines and
+ rules are for users with respect to physical security, data
+ security, information security and content (eg. rules stating that
+ sites with sexual content should not be visited, and that
+ copyrights should be honoured when downloading software, etc).
+
+
+
+
+
+Guttman, et. al. Informational [Page 28]
+
+RFC 2504 Users' Security Handbook February 1999
+
+
+ Server
+
+ A server is a computer system, or a set of processes on a computer
+ system providing services to clients across a network.
+
+ Shared Account
+
+ A common account is one which is shared by a group of users as
+ opposed to a normal account which is available to only one user.
+ If the account is misused, it is very difficult or impossible to
+ know which of users was responsible.
+
+ Sharing Permissions
+
+ Many computer systems allow users to share files over a network.
+ These systems invariably provide a mechanism for users to use to
+ control who has permission to read or overwrite these files.
+
+ Site
+
+ Depending on the context in which this term is used, it might
+ apply to computer systems that are grouped together by
+ geographical location, organizational jurisdiction, or network
+ addresses. A Site typically refers to a network under a common
+ administration.
+
+ SSH (Secure Shell)
+
+ SSH provides a protocol between a client and server, allowing for
+ encrypted remote connectivity.
+
+ SSL (Secure Sockets Layer)
+
+ This protocol provides security services to otherwise insecure
+ protocols which operate over a network. SSL is typically used by
+ web browsers to encrypt data sent to and downloaded from a server.
+
+ Systems Administrator
+
+ The individual who maintains the system and has system
+ administrator privileges. In order to avoid errors and mistakes
+ done by this individual while not acting as an administrator,
+ he/she should limit the time he/she acts as an administrator (as
+ known to the system) to a minimum.
+
+
+
+
+
+
+
+Guttman, et. al. Informational [Page 29]
+
+RFC 2504 Users' Security Handbook February 1999
+
+
+ System Administrator Privileges
+
+ System administrators have more rights (greater permissions) as
+ their work involve the maintenance of system files.
+
+ System Files
+
+ The set of files on a system that do not belong to end-users,
+ which govern the functionality of the system. System files have
+ a great impact on the security of the system.
+
+ Telnet
+
+ A protocol that enables remote log in to other computer systems
+ over the network.
+
+ Terminal
+
+ A dumb device that is connected to a computer system in order to
+ provide (text-based) access to it for users and administrators.
+
+ Terms of Service (TOS)
+
+ See "Acceptable Use Policy (AUP)".
+
+ Threats
+
+ The potential that an existing vulnerability can be exploited to
+ compromise the security of systems or networks. Even if a
+ vulnerability is not known, it represents a threat by this
+ definition.
+
+ Trojan Horse
+
+ A program which carries within itself a means to allow the creator
+ of the program access to the system using it.
+
+ Virus
+
+ A program which replicates itself on computer systems by
+ incorporating itself (secretly and maliciously) into other
+ programs. A virus can be transferred onto a computer system in a
+ variety of ways.
+
+ Virus-Detection Tool
+
+ Software that detects and possibly removes computer viruses,
+ alerting the user appropriately.
+
+
+
+Guttman, et. al. Informational [Page 30]
+
+RFC 2504 Users' Security Handbook February 1999
+
+
+ Vulnerability
+
+ A vulnerability is the existence of a weakness, design, or
+ implementation error that can lead to an unexpected, undesirable
+ event compromising the security of the system, network,
+ application, or protocol involved.
+
+ Web Browser Cache
+
+ This is the part of the file system that is used to store web
+ pages and related files. It can be utilized to reload recently
+ accessed files from the cache instead of loading it every time
+ from the network.
+
+ Web Browser Capabilities
+
+ The set of functionalities on a web browser for use by the end-
+ user. This includes the set of plug-ins available.
+
+ Web Server
+
+ A server program that provides access to web pages. Some web
+ servers provide access to other services, such as databases, and
+ directories.
+
+ Worm
+
+ A computer program which replicates itself and is self-
+ propogating. Worms, as opposed to viruses, are meant to spawn in
+ network environments.
+
+Acknowledgments
+
+ The User Security Handbook was a collaborative effort of the Site
+ Security Handbook Working Group of the IETF. There were also others
+ who made significant contributions --- Simson Garfinkle and Eric
+ Luiijf provided very helpful feedback on this document. The Glossary
+ contribution by Klaus-Peter Kossakowski is much appreciated.
+
+References
+
+ [GLOSSARY] Malkin, G., Ed., "Internet User's Glossary", FYI 18, RFC
+ 1983 August 1996.
+
+ [RFC2196] Fraser, B., Ed., "Site Security Handbook", FYI 8, RFC 2196
+ September 1997.
+
+
+
+
+
+Guttman, et. al. Informational [Page 31]
+
+RFC 2504 Users' Security Handbook February 1999
+
+
+Security Considerations
+
+ This document discusses what computer users can do to improve
+ security on their systems.
+
+Authors' Addresses
+
+ Erik Guttman
+ Sun Microsystems
+ Bahnstr. 2
+ 74915 Waibstadt
+ Germany
+
+ Phone: +49 7263 911701
+ EMail: erik.guttman@sun.com
+
+
+ Lorna Leong
+ COLT Internet
+ 250 City Road
+ City Forum, London
+ England
+
+ Phone: +44 171 390 3900
+ EMail: lorna@colt.net
+
+
+ Gary Malkin
+ Bay Networks
+ 8 Federal Street
+ Billerca, MA 01821
+ USA
+
+ Phone: +1 508 916 4237
+ EMail: gmalkin@baynetworks.com
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Guttman, et. al. Informational [Page 32]
+
+RFC 2504 Users' Security Handbook February 1999
+
+
+Full Copyright Statement
+
+ Copyright (C) The Internet Society (1999). All Rights Reserved.
+
+ This document and translations of it may be copied and furnished to
+ others, and derivative works that comment on or otherwise explain it
+ or assist in its implementation may be prepared, copied, published
+ and distributed, in whole or in part, without restriction of any
+ kind, provided that the above copyright notice and this paragraph are
+ included on all such copies and derivative works. However, this
+ document itself may not be modified in any way, such as by removing
+ the copyright notice or references to the Internet Society or other
+ Internet organizations, except as needed for the purpose of
+ developing Internet standards in which case the procedures for
+ copyrights defined in the Internet Standards process must be
+ followed, or as required to translate it into languages other than
+ English.
+
+ The limited permissions granted above are perpetual and will not be
+ revoked by the Internet Society or its successors or assigns.
+
+ This document and the information contained herein is provided on an
+ "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
+ TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
+ BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
+ HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
+ MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Guttman, et. al. Informational [Page 33]
+