LDAPAccountManager/lam/docs
Roland Gruber e9d9e5f4bc added $scope parameter to getModuleAlias 2004-02-21 17:28:28 +00:00
..
README.fpdf Added PDF-Support 2003-05-31 10:52:15 +00:00
README.hosts Added Readme-File 2003-08-11 12:40:06 +00:00
README.lamdaemon.pl added test-function in landaemon.pl 2003-10-23 18:25:55 +00:00
README.openldap updated TODO 2003-06-09 22:29:54 +00:00
README.security Blowfish update 2004-01-10 11:08:10 +00:00
modules-specification.htm added $scope parameter to getModuleAlias 2004-02-21 17:28:28 +00:00

README.security

1. Use of SSL

   The data which is transfered between you and the LAM server is very sensitive.
   Please always use SSL encrypted connections between LAM and your browser to
   protect yourself against network sniffers.


2. LDAP+SSL and TLS

   LAM should start TLS automatically if possible. LDAP+SSL will be used if you use
   ldaps://servername in your configuration file.


3. Chrooted servers

   If your server is chrooted and you have no access to /dev/random or /dev/urandom
   this can be a security risk. LAM stores your LDAP password encrypted in the session.
   LAM uses rand() to generate the key if /dev/random and /dev/urandom are not accessible.
   Therefore the key can be easily guessed.
   An attaker needs read access to the session file (e.g. by another Apache instance) to
   exploit this.


4. LDAP-password protection

   Your LDAP-password is stored encrypted in the session file. The key and IV to decrypt
   it are stored in two cookies. We use MCrypt/AES or Blowfish to encrypt the password.


5. Protection of new user passwords

   These passwords are, if stored in the session file, encrypted with the same key and IV
   as your LDAP-password.