Lotus Notes and Domino R5.0 Security Infrastructure Revealed
Total Page:16
File Type:pdf, Size:1020Kb
CT6TPNAwhite.qxd 4/28/99 4:00 PM Page 1 Lotus Notes and Domino R5.0 Security Infrastructure Revealed Søren Peter Nielsen, Frederic Dahm, Marc Lüscher, Hidenobu Yamamoto, Fiona Collins, Brian Denholm, Suresh Kumar, John Softley International Technical Support Organization http://www.redbooks.ibm.com SG24-5341-00 44 Lotus Notes and Domino R5.0 Security Infrastructure Revealed SG24-5341-00 International Technical Support Organization Lotus Notes and Domino R5.0 Security Infrastructure Revealed May 1999 Take Note! Before using this information and the product it supports, be sure to read the general information in the Special Notices section at the back of this book. First Edition (May 1999) This edition applies to Lotus Domino Release 5.0. Comments may be addressed to: IBM Corporation, International Technical Support Organization Dept. JN9B Building 045 Internal Zip 2834 11400 Burnet Road Austin, Texas 78758-3493 When you send information to IBM, you grant IBM a non-exclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. © International Business Machines Corporation 1999. All rights reserved. Note to U.S. Government Users: Documentation related to restricted rights. Use, duplication or disclosure is subject to restrictions set forth in GSA ADP Schedule Contract with IBM Corp. Contents Preface ....................... vii 2 What Is Lotus Domino? ........21 The Team That Wrote This Redbook ...... viii Domino R5.0 Server .................21 Comments Welcome ................. x Lotus QuickPlace .................21 1 Basic Security Concepts Domino Mail Server ...............22 Revealed ....................... 1 Domino Application Server ...........22 Important Terminology ............... 2 Domino Enterprise Server ............22 Computer System ................. 2 Services Offered by Domino Servers .....22 Computer Security ................ 2 Clients for Domino R5.0 ...............24 Sensitive Information .............. 3 Notes R5.0 .....................25 Computer Security Services ............ 4 Domino Administrator R5.0 ..........26 Data Integrity ................... 4 Domino Designer R5.0 ..............28 Confidentiality ................... 5 Levels of Security Offered by Identification and Authentication ....... 5 Notes and Domino ..............30 Access Control ................... 6 Server Security ...................31 Non-Repudiation ................. 6 Data Access Security ...............32 Computer Security Objectives ........... 7 Database Access Control ............33 The Computer Security Policy ......... 7 Form Access Control ...............40 The Security Architecture ............ 8 Document Access Control ............41 Understanding the Risks ............ 9 Field Access Control ...............43 Establishing the Security Services .......10 Summary ........................43 Finally, Savor the Fruits of Your Labor ...12 3 Notes Public Key Cryptographic Techniques .............13 Infrastructure Revealed ..........45 Symmetric Key Encryption ...........13 Lotus Notes Certification Hierarchies ......45 Public Key Encryption ..............16 Notes Certificates .................45 Secure Hash Functions ..............17 Certification Hierarchies ............47 Combinations of Cryptographic Notes IDs and Domino Directory .........48 Techniques ...................18 User ID, Server ID, and Certifier ID .....48 Public Key Certificates ..............18 Contents of Notes ID ...............49 Public Key Cryptographic Standard .....19 Alternate Naming .................50 Summary ........................20 User Passwords ..................51 Contents iii ID File and Password Recovery ........55 Registering Your CA to Domino Domino Directory .................58 Directory ....................90 Domino Domain and Certification Invoking SSL on Your Domino Server ......92 Hierarchies ...................59 Using a Self-Certified Certificate .......92 Cross-Certification ..................60 Applying for a Server Certificate to an Notes Authentication .................62 Internal/External CA .............93 Validation and Authentication .........62 Applying for VeriSign Global Secure Site ID .........................98 Switching Off Certificate-Based Authentication .................65 Configuring the Server Document to Enable SSL .................. 100 Facilities for Data Integrity .............66 Issuing X.509 Certificates by Domino CA ... 100 Facilities for Confidentiality ............67 Issuing X.509 Certificates to a Web Mail Message Encryption ............69 Browser .................... 101 Other Notes Encryption Features .......70 Registering the Client Certificate to Summary ........................70 Domino Directory .............. 106 4 Domino Internet Issuing X.509 Certificates for Notes ....... 106 Security Revealed ...............71 Notes/Domino R5 and X.509 Certificates . 106 HTTP Basic Authentication .............71 Generating and Distributing X.509 Client Certificates for Notes ............ 108 How Basic Authentication Works .......71 Obtaining X.509 Client Certificates Using Is Basic Authentication Secure? ........73 the Notes Browser .............. 110 X.509 Certificate ....................74 Internet Cross-Certificate ........... 111 What Is the X.509 Standard? ..........74 Secure E-mail Messaging ............. 112 X.509 Certificate Content ............75 Commonly Used Mail Protocols ....... 112 Secure Sockets Layer (SSL) .............76 Problems with These Protocols ....... 114 Overview ......................76 Improvements to These Protocols ...... 115 How SSL Operates ................76 Message Encryption .............. 117 Export Restrictions on How S/MIME Works ............. 118 Encryption Keys ................78 Obtaining a Client Certificate for SSL Deployment Considerations .......79 S/MIME .................... 123 Serving Certificates to Browsers ........83 Obtaining a Recipient’s Certificate for Comparisons Between Notes Security S/MIME .................... 124 and SSL .....................84 Using Lotus Notes R5.0 as S/MIME Client .. 124 The Domino Certificate Authority ........85 How Notes R5.0 Implements S/MIME ... 124 Setting Up the Domino Certificate Sending and Receiving Encrypted Authority ....................85 S/MIME Messages ............. 125 Key Ring File ....................86 Sending Signed S/MIME Messages .... 126 Setting Up Your Domino Server as an Receiving Signed S/MIME Messages ... 126 Internal Root CA ...............86 Summary ....................... 127 iv Lotus Notes and Domino R5.0 Security Infrastructure Revealed 5 Domino and Firewalls Revealed . 129 Domino Replication Using a Proxy and a Firewall .................... 165 Firewall Basics .................... 130 Domino Replication Using Multiple What Is a Firewall? ............... 131 Proxies ..................... 166 Basic Functions of a Firewall ......... 132 Multi-Hop Domino Replication with The Measure of Protection a Firewall Can Proxies and Firewall ............ 168 Offer ...................... 132 Firewall Using Network Address The Measure of Protection a Firewall Translation .................. 169 Cannot Offer ................. 133 Domino and Notes Proxy Configurations ... 172 Access Needs Versus Security Domino Server Proxy Configuration .... 172 Requirements ................ 134 Notes Client Proxy Configuration ...... 173 Firewall Configuration and Architecture ... 135 Troubleshooting Tools and Techniques .... 176 TCP/IP Services ................. 135 TCP/IP Tools ................... 176 Firewall Components ............. 138 Notes and Domino Tools ........... 179 Packet Filters ................... 139 Protocol and Network Analyzers ...... 181 Bastion Hosts ................... 142 Some Firewall Best Practices ........... 182 Proxy Services .................. 143 DHCP Issues ................... 182 Gateway Services ................ 144 Fully Qualified Domain Names ....... 183 System Protection, Logging and Auditing . 144 IP Addresses in the Domino Directory ... 184 Types of Firewalls ................. 144 Encrypt Whenever Possible .......... 184 Circuit-Level Firewalls ............. 144 Have a Stringent Security Policy ...... 185 Application-Level Firewalls ......... 146 Security Is... .................... 186 The Demilitarized Zone (DMZ) ......... 147 Summary ....................... 186 Notes and Domino Services ........... 149 Standard Notes and Domino Services ... 149 6 Directories and Single Sign On Revealed .............. 187 Proxies Supported by Domino ........ 150 Directories and Single Sign On — What’s It Real World Examples Using Notes and All About? .................. 187 Domino .................... 152 Directories — Technical Background ...... 189 NRPC Services: No Firewall, No Proxy .. 154 What Is a Directory? .............. 189 Dial-up Internet Connection ......... 155 Differences Between Directories and Browsing with Proxies and Firewall .... 156 Databases ................... 190 SSL Browsing with Proxies and Firewall . 157 Directory Clients and Servers ........ 191 Notes Client Access Using the HTTP Distributed Directories ............. 192 Tunnel Proxy ................. 158 Directory Security ................ 194 Browsing Using the Web Retriever, Proxies, and Firewalls ........... 160 The Directory as an Infrastructure Service . 194 Mail Routing using Dial-Up NRPC ..... 161 Directory-Enabled Applications ....... 195 SMTP Mail Routing Using a Firewall ... 163 The Benefits of a Common Directory .... 195 Contents v The Domino Directory ..............