S 5.9 Novell eDirectory

Logo Novell eDirectory

Description

Novell eDirectory is a complex and versatile product that,

These two scenarios pose completely different threats to the use and operation of such a system. A combination of these operational scenarios poses a particularly great challenge from the perspective of information security.

Accordingly, the security of the underlying operating system is always a contributing factor for the security of the data stored in an eDirectory directory. However, the security of the underlying operating system is not covered in this module; detailed information relating to the secure operation of the operating system used can be found in the Layer 3 modules. Likewise, basic protection of the Novell eDirectory as a directory service must be implemented. For this, module S 5.15 General directory service must be applied in addition to this module.

eDirectory was developed from the Novell Directory Services (NDS) directory service, which was a component of the Netware 4 operating system. When it first appeared on the market, it constituted a major improvement on the NetWare 3 operating system. Novell is now offering these directory services as a stand-alone product called eDirectory that is completely independent of the Netware operating system. eDirectory can be installed and operated on a number of different operating systems. In the literature and resources, however, there are frequent references to the "Novell Directory Services", rendering NDS synonymous with eDirectory.

This module examines the English language version of eDirectory Version 8.6 in particular. The software supports the Netware, Windows NT/2000, Linux, and Sun Solaris platforms.

eDirectory can be used with special client software such as Novell Client for the Windows operating systems. These clients are integrated into the boot procedure of the corresponding computer and take over the task of authenticating users for the eDirectory directory service. A similar method is available for Unix operating systems (Linux, Solaris) that use the Pluggable Authentication Modules (PAM) mechanism, in which case the Novell Account Management Modules are used. The users are authenticated for the eDirectory directory service here as well when logging in.

Access via the LDAP interface is another possibility. Using this standardised interface makes it possible to use eDirectory with other applications and systems as well. The LDAP protocol is generally used as the method to access the Internet.

Diagram of the architecture
Figure: Diagram of the architecture

Furthermore, the eDirectory software offers a number of tools, including iMonitor, which provides monitoring and diagnostics capabilities in a web browser through the server of a directory service.

Threat scenario

Due to the large number of functions provided and the complexity of the software, an eDirectory directory service is subject to a series of threats. In addition, the threats posed to the operating system used, and especially to general server accesses and the file system, also need to be considered.

The following typical threats to the IT-Grundschutz of a Novell eDirectory system are assumed to exist:

Force Majeure

T 1.2 Failure of the IT system

Organisational Shortcomings

T 2.1 Lack of, or insufficient, rules
T 2.2 Insufficient knowledge of rules and procedures
T 2.7 Unauthorised use of rights
T 2.69 Lack of, or inadequate, planning of the use of Novell eDirectory
T 2.70 Lack of, or inadequate, planning of partitioning and replication in Novell eDirectory
T 2.71 Lack of, or inadequate, planning of LDAP access to Novell eDirectory

Human Error

T 3.9 Improper IT system administration
T 3.13 Passing on false or internal information
T 3.16 Incorrect administration of site and data access rights
T 3.34 Unsuitable configuration of the management system
T 3.35 Disabling the server while in operation
T 3.36 Misinterpretation of events
T 3.38 Errors in configuration and operation
T 3.43 Inappropriate handling of passwords
T 3.50 Improper configuration of Novell eDirectory
T 3.51 Errors in the assignment of access rights in Novell eDirectory
T 3.52 Errors in the configuration of intranet client access to Novell eDirectory
T 3.53 Errors in the configuration of LDAP access to Novell eDirectory

Technical Failure

T 4.10 Complexity of access possibilities to networked IT systems
T 4.13 Loss of stored data
T 4.33 Poor-quality or missing authentication
T 4.34 Failure of a cryptomodule
T 4.44 Failure of Novell eDirectory

Deliberate Acts

T 5.16 Threat during maintenance/administration work
T 5.18 Systematic trying-out of passwords
T 5.19 Abuse of user rights
T 5.20 Misuse of administrator rights
T 5.65 Denial of services in a database system
T 5.78 DNS spoofing
T 5.81 Unauthorized use of a cryptomodule

Method recommendation

To secure the information system examined, other modules will need to be implemented in addition to this module. These modules are selected based on the results of the IT-Grundschutz modelling process.

A security concept specifically for the use of the eDirectory components should be created during the planning phase that can be integrated consistently into the existing organisation-wide security concept. The eDirectory system must be configured so that the existing security requirements can be implemented while meeting the additional eDirectory-specific requirements.

An eDirectory system is generally used in an environment together with other systems that control access to the internal network from the outside. In particular, the eDirectory may need to work with firewall systems and systems used for remote maintenance. For this reason, the corresponding safeguards from the modules relevant to the other systems affected must be taken into account as well when implementing the eDirectory-specific safeguards. In addition to the modules in Layer 3, the following modules also need to be mentioned:

A series of safeguards need to be implemented for the secure implementation of an eDirectory system, starting with the planning and installation phase and continuing through the operation phase. The individual steps to take as well as the appropriate safeguards to consider in each step are summarised below:

Planning and design

S 2.236 (A) Planning the use of Novell eDirectory
S 2.237 (B) Planning of partitioning and replication in Novell eDirectory
S 2.238 (A) Specification of security guidelines for Novell eDirectory
S 2.239 (A) Planning the use of Novell eDirectory on the Intranet
S 2.240 (A) Planning the use of Novell eDirectory on the Extranet

Implementation

S 3.29 (A) Training on the administration of Novell eDirectory
S 3.30 (A) Training on the use of Novell eDirectory client software
S 4.153 (A) Secure installation of Novell eDirectory
S 4.154 (A) Secure installation of the Novell eDirectory client software
S 4.155 (A) Secure configuration of Novell eDirectory
S 4.156 (A) Secure configuration of the Novell eDirectory client software
S 4.157 (A) Setting of access authorisations to Novell eDirectory
S 4.158 (B) Setting of the LDAP access to Novell eDirectory

Operation

S 4.159 (A) Secure operation of Novell eDirectory
S 4.160 (B) Monitoring of Novell eDirectory
S 5.97 (B) Protection of communications with Novell eDirectory

Contingency Planning

S 6.81 (A) Creation of data backups for Novell eDirectory