37 lines
		
	
	
		
			1.1 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
		
		
			
		
	
	
			37 lines
		
	
	
		
			1.1 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
|  | 
 | ||
|  | 1. Use of SSL | ||
|  | 
 | ||
|  |    The data which is transfered between you and the LAM server is very sensitive. | ||
|  |    Please always use SSL encrypted connections between LAM and your browser to | ||
|  |    protect yourself against network sniffers. | ||
|  | 
 | ||
|  | 
 | ||
|  | 2. LDAP+SSL and TLS | ||
|  | 
 | ||
|  |    LAM should start TLS automatically if possible. LDAP+SSL will be used if you use | ||
|  |    ldaps://servername in your configuration file. | ||
|  | 
 | ||
|  | 
 | ||
|  | 3. Chrooted servers | ||
|  | 
 | ||
|  |    If your server is chrooted and you have no access to /dev/random or /dev/urandom | ||
|  |    this can be a security risk. LAM stores your LDAP password encrypted in the session. | ||
|  |    LAM uses rand() to generate the key if /dev/random and /dev/urandom are not accessible. | ||
|  |    Therefore the key can be easily guessed. | ||
|  |    An attaker needs read access to the session file (e.g. by another Apache instance) to | ||
|  |    exploit this. | ||
|  | 
 | ||
|  | 
 | ||
|  | 4. LDAP-password protection | ||
|  | 
 | ||
|  |    Your LDAP-password is stored encrypted in the session file. The key and IV to decrypt | ||
|  |    it are stored in two cookies. We use AES to encrypt the passwort. | ||
|  | 
 | ||
|  | 
 | ||
|  | 5. Protection of new user passwords | ||
|  | 
 | ||
|  |    These passwords are, if stored in the session file, encrypted with the same key and IV | ||
|  |    as your LDAP-password. | ||
|  | 
 | ||
|  | 
 |