Page 597 - StudyBook.pdf
P. 597

Public Key Infrastructure • Chapter 10  581

                 the new directory you created, and wants to see what is in there. Joe can restore the
                 directory to another location, view the contents within the directory, and obtain a
                 copy of the private keys.As the security administrator, you can handle this problem
                 two different ways. First, you can enable auditing for the network OS.Auditing file
                 access, additions, deletions, and modifications, can track this type of activity within
                 the network. Likewise, permissions for the backup operator can be limited to
                 backup only, and require another party (such as the network administrator) to per-
                 form recoveries.
                    That’s why most software key storage schemes encrypt the private keys, using
                 some form of password or key prior to granting access.The password protecting
                 the private key is prompted for when the key is needed. Or the key is encrypted
                 using a key derived from the user’s logon password, such that a user’s keys all
                 become available when he or she is logged on, and are unavailable when he or she
                 is logged off, or to another person who is logged on. If the key is needed for a
                 background process (e.g., a service or a daemon), the key can be encrypted using a
                 machine-based secret. In Windows, this secret can be further protected by using the
                 SYSKEY utility.
                    There is another risk involved with the software storage of private keys.You
                 granted access to yourself and the company CIO, Phil. Phil has a bad habit of
                 leaving his computer without logging out or locking the screen via a screen saver.
                 Dave, the mail clerk, can easily walk into Phil’s office and look at all of the files and
                 directories that Phil has access to, thereby accessing the directory where the private
                 keys are stored.This type of attack is known as a lunchtime attack.The best fix for
                 lunchtime attacks is user education.Teaching users to properly secure their work-
                 station when not in use prevents many types of security breaches, including
                 lunchtime attacks.

                   Lunchtime Attacks
               Damage & Defense…  initiated by employees of an organization. But, they are also one of the
                   Lunchtime attacks are one of the most common types of internal attacks

                   easiest attacks to defend against. Most OSes (Windows, Linux, and so
                   forth) offer the ability to automatically lock desktops through screen-
                   savers that activate after a brief period of inactivity. For those companies
                   with “Phils” who constantly leave their computers unlocked, this is an
                   easy way to reduce the amount of lunchtime attacks. (Other types of
                   attacks are covered in detail in Chapter 2.)
                        There are other appropriate technological protections against this
                   type of attack, such as the use of locking screensavers and short timeouts;

                                                                                        Continued

                                                                              www.syngress.com
   592   593   594   595   596   597   598   599   600   601   602