[3983] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: Lotus Notes Tender System

daemon@ATHENA.MIT.EDU (THunterD@aol.com)
Tue Jan 14 22:37:26 1997

From: THunterD@aol.com
Date: Tue, 14 Jan 1997 20:17:17 -0500 (EST)
To: linehan@watson.ibm.com, mprice@pwd.nsw.gov.au
cc: Www-Security@ns2.rutgers.edu
Errors-To: owner-www-security@ns2.rutgers.edu

 Mark H Linehan on 01-13-97 09:37 PM wrote:

  Lotus Notes has very extensive security features.   There's a
  documentation database that comes with Notes that describes these
  security features in detail.  Examples:  it uses public-key algorithms to
  authenticate users; mail and database entries can be signed or encrypted
  or both; the transport link between Notes clients and servers can be
  encrypted, etc.  As with any security mechanisms, it takes some learning
  and some thought to apply the Notes security features effectively.  But
  they can be very effective.

While the above is true, security must take into account the ability of
someone to compromise the access controls.  Lotus Notes stores your password
in an ID file.  The password remains with that ID file and not on the server.
 Therefore, if I can compromise your password and get a copy of your ID file
I can have permanent access to your lotus notes database.   To make matters
worse, the user can choose to either have a password or not.  This option is
configurable at the client, so it is feasible that users may not even require
a password.  Additionally, some of the basic security administration
functions are not available on Notes.  Activities such as reviewing invalid
access attempts are not part of Notes.  In order for a Notes application to
be secure it must be part of a larger solution which has comprehensive
security controls and policies in place and in force.

Tom Davis

home help back first fref pref prev next nref lref last post