HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual T 3.46 Error in the configuration of a Lotus Notes server

T 3.46 Error in the configuration of a Lotus Notes server

Errors in the configuration of a software system are frequently the cause of successful attacks. Because of the complexity of a Notes server, there is a real possibility that the Notes system might not satisfy the security requirements if configured incorrectly. Due to the large number of variables requiring configuration and the fact that a lot of parameters interact with other parameters, a number of threats can arise. Some typical incorrect configurations are listed below:

The problem areas listed are examples of possible threats which could come about as a result of incorrect configuration. Depending on the particular operational environment, there could be additional threats.

Example:

A server is configured in such a way that anonymous access is not permitted. On the Web interface only SSL connections are allowed. Therefore, when configuring the database ACLs no "Anonymous" entry is created. Moreover, SSL-protected Web access is not enforced as the server only accepts SSL connections to the Web interface. The "default" privileges defined in the database templates have not been changed in order to minimise the administrative effort involved in modifying the templates. A new database which contains public information is subsequently added, and the server is now configured so that normal Web access is permitted to this database (on an anonymous basis, not SSL-protected). From now on it is possible to gain anonymous access to all the server databases, with the "-Default-" privileges, which often permit at least read access, in force. As a result there is a danger that unauthorised persons could see confidential data or tamper with information.


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
July 2001
home