HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 4.129 Secure handling of Notes ID files

S 4.129 Secure handling of Notes ID files

Initiation responsibility: Head of IT Section, IT Security Management

Implementation responsibility: Administrator, users

Lotus Notes users authenticate themselves to a Domino server through their Notes IDs. The Notes ID is held in the form of file and is generally identified with this. As well as the Notes certificate (certified public key) and the associated private key of a user, additional information can be stored in the Notes ID as well. Such information includes, for example, Internet certificates, symmetric encryption keys and information needed to recover Notes ID files (recovery information). All this information is protected by the Notes ID password. Before the Notes ID can be used, the user must enter the appropriate password. As a Notes ID contains sensitive information, it has a high protection requirement. The following aspects must therefore be considered when handling Notes IDs:

There are four categories of Notes ID:

  1. Certifier IDs. These constitute the identities which issue Notes IDs for servers and users. Generally, certifier IDs represent organisational units within an agency or company and form a hierarchy. As a result of their intended use certifier IDs are particularly sensitive and therefore require special protection. This applies especially to the first Certifier ID generated - the root certifier ID - with which all other certifier IDs are signed.
  1. Server IDs. These identify servers to users (or rather, to their Notes clients) and other servers. For a server to function, it needs a separate identity in the form of the server ID. The server ID is automatically generated during installation of the server and it is certified by a certifier ID. As server IDs are used to identify critical system components, they must be correspondingly well protected.
  1. Administrator IDs. These are used to identify Administrators to servers. Administrator IDs may be distinguished from user IDs through extended privileges which make it possible to administer servers. As Administrators have a privileged position among the users, Administrator IDs require special protection.
  1. User IDs. These are used to identify ordinary users to servers.

Depending on the various security requirements, different protective measures must be taken for Notes IDs. The following aspects need to be considered here:

Password quality requirements can be specified at the point at which a new user ID is created. A numeric quality scale from 0 (no password) to 16 is available here. Although generally the accepted password length agrees with the numeric quality value, it is not the only evaluation criterion. Unfortunately at present no list is available from Lotus which describes what precise conditions a password must satisfy to achieve a specific quality level.

For the various categories of Notes ID, the following list contains appropriate recommendations which can be adapted and expanded as required.

- Creation. The ID is automatically created when the first Notes server is configured. It is generated in a secure environment, applying the two-person rule. - Creation. The ID is automatically created during server installation. Created in secure environment. Two-person rule applied. - Creation. Automatically created during server installation ("User.id" file). Created in secure environment. Two-person rule applied. - Creation. Created by the user administrator of a server. Created in secure environment. Two-person rule applied as the certifier ID is necessary.

In general it should be borne in mind when handling Notes IDs that these are used for the unique authentication (identification) of users. While it is true that the Notes ID files are password protected, this password must be of appropriate quality and must only be known to the owner of the Notes ID. If the password is compromised, then unauthorised third parties could succeed in identifying themselves to a server using the Notes ID.

A user (or Administrator) can also possess more than one copy of a Notes ID. Every copy of a user's Notes ID can be given its own password. If a Notes ID file is copied unauthorised and its password is compromised, then unauthorised usage cannot be prevented by changing the password on the original without additional safeguards as well.

Additional controls:


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
July 2001
home