SECURITY


Securing Internet passwords
Internet passwords can be subject to attacks by malicious sources. For example:
Use one or more of the following features to secure access to Internet passwords stored in the Domino Directory, or make them more difficult to guess.
Using xACLs to secure Internet passwords

One way to secure Internet passwords is to use Extended ACLs, or xACLs, to control access based on levels in the naming hierarchy, and at the form and field level.

For passwords stored in the Domino Directory, administrators can set up xACLs to limit access to Internet passwords to the users themselves, for accessing their own passwords, and adminstrators, for allowing administrative changes to passwords.

First, enable extended access for the Domino Directory:

1. Open the database, and choose File - Application - Access Control.

2. Make sure you have Manager access in the database ACL.

3. Click Advanced, and then select "Enable Extended Access."

4. At this prompt, click Yes to continue:


5. At this prompt, which appears only if the advanced database ACL option "Enforce a consistent Access Control List across all replicas" is not yet enabled, click Yes:
6. At this prompt, click OK:
7. Click OK in the Access Control List dialog box.

8. At this prompt, click OK:


Next, set up the extended access to secure Internet passwords.

9. Open the database, and choose File - Application - Access Control.

10. Click Extended Access. The Extended Access dialog box appears.

11. In the Target pane, select the root [ /] and click Add.

12. In the Access List pane, select Default.

13. Click Form and Field Access. The Form and Field dialog box appears.

14. In the Forms list box, select Person. Leave the Access settings for Forms blank.

15. In the Fields list box:

16. Click Ok.

17. Repeat this process for the HttpPassword and dspHttpPassword (if it appears) settings in the Person form for the following Access List entries:
Access List entryRead access settingWrite access setting
SelfAllowAllow
[Local administrators group]AllowAllow
[Local servers group]AllowAllow
Note If Anonymous access was previously defined in the access list, it should be set up to deny read and write access to HTTPPassword and dspHTTPPassword (if it appears) fields in the Person form.

Note Once xACLs are enabled for a Domino Directory, LDAP anonymous access is not controlled by the list of fields in the All Server Configuration document. Since the default xACL setting for Anonymous is "No Access," once xACLs are enabled all anonymous LDAP searches will fail.

Using more secure password format

When you enter an Internet password and save the Person document, Domino automatically one-way encrypts the Internet password field. To improve the default password, use the more secure password format.

You can upgrade the password format for Person documents that already exist or automatically use the more secure password format for all Person documents that you create.

For existing Person documents

1. From the Domino Administrator, click People & Groups, and select the Person documents that you want to upgrade to a more secure password format.

2. Choose Actions - Upgrade to More Secure Internet Password Format.

3. Click Yes.

For new Person documents

1. From the Domino Administrator, click Configuration, and select All Server Documents.

2. Choose Actions - Edit Directory Profile.

3. Select Yes in the "Use more secure Internet passwords" field.

4. Save and close the document.

Note The more secure password format is required if you choose to synchronize a user's Internet password with their Notes password.

Another way of preventing malicious sources from guessing passwords is to simply make them harder to guess - by making the passwords longer and more complex, using a variety of characters, avoiding the use of real words, and so on.

Using Internet password lockout

Internet password lockout lets administrators set a threshold value for Internet password authentication failures for Domino Web and Domino Web Access users. This helps to prevent brute force and dictionary attacks on user Internet accounts by locking out any user who fails to log in within a preset number of attempts. Information about authentication failures and lockouts are maintained in the Internet Lockout application, where the administrator can respectively clear failures and unlock user accounts.

It should be noted that this feature is subject to Denial of Service (DoS) attacks. A DoS attack is one in which malicious users explicitly prevent legitimate users of a service from using that service. In the case of Internet password lockout, legitimate Internet users could be prevented from logging in to a Domino server by attackers who intentionally make failed log in attempts.

Note Internet password lockout has no affect on Domino Off-Line Services (DOLS).

There are some usage restrictions for Internet password lockout:


For single sign-on, the Domino server on which the Internet password lockout feature is enabled must also be the server that issues the single sign-on key. If this key is retrieved from another source (another Domino server or WebSphere server), the SSO token will always be valid on the Domino server, regardless if Internet password locking is enabled.

The Internet Lockout database

The Internet Lockout database (inetlockout.nsf) is created from inetlockout.ntf:


By default, the Internet Lockout database ACL allows manager access only to the Admin Group. Default and anonymous are denied access. However, the database ACL can be modified to provide users and groups access to view and unlock users.

For each user attempting to log in to Domino using an Internet name and password, information about the lockout state is maintained in the Internet Lockout database, including the user name, number of failed attempts, and lockout status. Lockout attempts are not recorded in the lockout database if the user is already locked out, or if the user logs in successfully. However, while the Internet Lockout database maintains lockout state information, the Domino Domain Manager (DDM) is the location in which login failures and lockout history information should be maintained, providing you with historical records of login failure attempts.

Any changes to the access information for users stored in the Internet Lockout database are implemented immediately. You do not need to restart the HTTP server in order for changes to take effect.

There are two views in the Lockout database:


The fields are the same for both views:
You delete a record to unlock a user.

You can mark multiple records for unlocking or deletion by clicking 'Mark for Delete/Unlock' in the tool bar, and then delete them by clicking 'Delete Marked Items.''

It is recommended that you periodically verify that that the Internet Lockout database contains only records of valid users. Remove the names of those users who have had name changes, or who have been removed as users of the Domino server. There is no automatic cleanup of the database; while having outdated user records will not cause functional problems, too many records in the database could cause Internet authentication performance to slow down.

You can create custom login-forms for the Internet Lockout database that can be used to tell users that they may be locked out. For more information on creating custom Web forms, see the topic Custom Web server messages.

Replicating the Internet Lockout database
As an administrator, you need to decide whether replicating the Internet Lockout database to other servers is useful for you. A major advantage of replicating the database is that lockout information is replicated to multiple servers. You can look at any replica and determine the lockout status of users across multiple servers, instead of having to open up the Internet Lockout database on each server for which Internet password locking is enabled.

However, replication also has its disadvantages; for example, replication storms can occur if your network is under attack, or if a denial-of-service attack occurs. Additionally, if replication is slow to occur, anyone checking the lockout database on a given server might not be able to see that a person is locked until replication occurs (however, they can always open the replica directly on the server in question).

The Internet Lockout database is created with a replica ID that stays the same for any replica on any server for which Internet password locking is enabled in a domain. By default, replication is temporarily disabled for Internet lockout databases. This is to prevent replication storms described earlier. To replicate the database to another server, disable the Temporarily disable replication option in the Other section of the Replication Settings dialog box. You can then set up the database to replicate (either scheduled or clustered replication).

Note When you replicate this database to other servers, the 'invalid attempts' information is calculated for each individual server. For example, if the threshold for 'John Doe' is three, and he has two invalid attempts on Server A and has one on Server B, he is not locked out of either server. The attempts are not combined for a total of three. The reason for replication is ease of administration, not to establish global thresholds.

Configuring Internet password lockout

You enable Internet password lockout in the server configuration settings document. This allows administrators to turn on the Internet Lockout feature across multiple servers.

Note It is recommended that the Server document option 'Fewer name variations with higher security' is enabled. This minimizes the problem of ambiguous names. Domino supports logging in to the Web server with a short form of the user name (if the password is correct), even though the short name may match two or more people in the directory. Incorrect logins that occur when a user types in an ambiguous name will result in a failure for each ambiguous match, because there is no way to tell which user was trying to log in. Furthermore, failure attempts being cleared using the 'lockout expiration' settings occur only for the user whose username and password successfully match.

To enable and configure Internet password lockout
1. In the Domino Administrator, click Configuration - Server - Configurations. Open the configuration settings document for the server for which you want to enable Internet password lockout.

2. Click Security. You have three options for the setting Enforce Internet Password Lockout:

Policy settings for Internet password lockout

With the exception of the log settings, the options described previously can also be specified in a user policy. This might be useful if an administrator only wants to enforce Internet password lockout for a subset of users in an organization. In this case, these settings can be established for that group.

For more information on using a policy for Internet password lockout, see Creating a security policy settings document.

See also