Novell iFolder 3 User guide

Type
User guide
www.novell.com/documentation
Security Administration Guide
iFolder 3.9.1
August 28, 2012
Legal Notices
Novell,Inc.,makesnorepresentationsorwarrantieswithrespecttothecontentsoruseofthisdocumentation,andspecifically
disclaimsanyexpressorimpliedwarrantiesofmerchantabilityorfitnessforanyparticularpurpose.Further,Novell,Inc.,
reservestherighttorevisethispublicationandtomakechangestoitscontent,at
anytime,withoutobligationtonotifyany
personorentityofsuchrevisionsorchanges.
Further,Novell,Inc.,makesnorepresentationsorwarrantieswithrespecttoanysoftware,andspecificallydisclaimsany
expressorimpliedwarrantiesofmerchantabilityorfitnessforanyparticularpurpose.Further,Novell,Inc.,reservestheright
to
makechangestoanyandallpartsofNovellsoftware,atanytime,withoutanyobligationtonotifyanypersonorentityof
suchchanges.
AnyproductsortechnicalinformationprovidedunderthisAgreementmaybesubjecttoU.S.exportcontrolsandthetrade
lawsofothercountries.Youagreeto
complywithallexportcontrolregulationsandtoobtainanyrequiredlicensesor
classificationtoexport,reexportorimportdeliverables.YouagreenottoexportorreexporttoentitiesonthecurrentU.S.
exportexclusionlistsortoanyembargoedorterroristcountriesasspecifiedintheU.S.
exportlaws.Youagreetonotuse
deliverablesforprohibitednuclear,missile,orchemicalbiologicalweaponryenduses.PleaserefertotheNovellInternational
TradeServicesWebPage(http://www.novell.com/info/exports/)formoreinformationonexportingNovellsoftware.Novell
assumesnoresponsibilityforyourfailuretoobtainanynecessaryexportapprovals.
Copyright©
20072012Novell,Inc.Allrightsreserved.Permissionisgrantedtocopy,distribute,and/ormodifythisdocument
underthetermsoftheGNUFreeDocumentationLicense(GFDL),Version1.2oranylaterversion,publishedbytheFree
SoftwareFoundationwithnoInvariantSections,noFrontCoverTexts,andnoBackCover
Texts.AcopyoftheGFDLcanbe
foundattheGNUFreeDocumentationLicence(http://www.fsf.org/licenses/fdl.html).
THISDOCUMENTANDMODIFIEDVERSIONSOFTHISDOCUMENTAREPROVIDEDUNDERTHETERMSOFTHE
GNUFREEDOCUMENTATIONLICENSEWITHTHEFURTHERUNDERSTANDINGTHAT:
1.THEDOCUMENTISPRO VIDEDONANʺASISʺBASIS,WITHOUT
WARRANTYOFANYKIND,EITHEREXPRESSED
ORIMPLIED,INCLUDING,WITHOUTLIMITATION,WARRANTIESTHATTHEDOCUMENTORMODIFIEDVERSION
OFTHEDOCUMENTISFREEOFDEFECTS,MERCHANTABLE,FITFORAPARTICULARPURPOSE,ORNON
INFRINGING.THEENTIRERISKASTOTHEQUALITY,ACCURACY,ANDPERFORMANCEOFTHEDOCUMENTOR
MODIFIEDVERSION
OFTHEDOCUMENTISWITHYOU.SHOULDANYDOCUMENTORMODIFIEDVERSIONPROVE
DEFECTIVEINANYRESPECT,YOU(NOTTHEINITIALWRITER,AUTHORORANYCONTRIBUTOR)ASSUMETHE
COSTOFANYNECESSARYSERVICING,REPAIRORCORRECTION.THISDISCLAIMEROFWARRANTYCONSTITUTES
ANESSENTIALPARTOFTHISLICENSE.NOUSEOFANY
DOCUMENTORMODIFIEDVERSIONOFTHEDOCUMENT
ISAUTHORIZEDHEREUNDEREXCEPTUNDERTHISDISCLAIMER;AND
2.UNDERNOCIRCUMSTANCESANDUNDERNOLEGALTHEORY,WHETHERINTORT(INCLUDING
NEGLIGENCE),CONTRACT,OROTHERWISE,SHALLTHEAUTHOR,INITIALWRITER,ANYCONTRIBUTOR,ORANY
DISTRIBUTOROFTHEDOCUMENTORMODIFIEDVERSIONOFTHEDOCUMENT,
ORANYSUPPLIEROFANYOF
SUCHPARTIES,BELIABLETOANYPERSONFORANYDIRECT,INDIRECT,SPECIAL,INCIDENTAL,OR
CONSEQUENTIALDAMAGESOFANYCHARACTERINCLUDING,WITHOUTLIMITATION,DAMAGESFORLOSSOF
GOODWILL,WORKSTOPPAGE,COMPUTERFAILUREORMALFUNCTION,ORANYANDALLOTHERDAMAGESOR
LOSSESARISINGOUTOF
ORRELATINGTOUSEOFTHEDOCUMENTANDMODIFIEDVERSIONSOFTHE
DOCUMENT,EVENIFSUCHPARTYSHALLHAVEBEENINFORMEDOFTHEPOSSIBILITYOFSUCHDAMAGES.
Novell, Inc.
1800 South Novell Place
Provo, UT 84606
U.S.A.
www.novell.com
OnlineDocumentation:ToaccesstheonlinedocumentationforthisandotherNovellproducts,andtogetupdates,seethe
NovellDocumentationWeb
page(http://www.novell.com/documentation).
Novell Trademarks
ForNovelltrademarks,seetheNovellTrademarkandServiceMarklist(http://www.novell.com/company/legal/trademarks/
tmlist.html).
Third-Party Materials
Allthirdpartytrademarksarethepropertyoftheirrespectiveowners.
Contents 3
Contents
About This Guide 5
1 Security Best Practices Overview 7
1.1 Security Recommendations for iFolder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7
2 Security Best Practices for Novell iFolder 9
2.1 Secure Communication with the LDAP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10
2.1.1 Using SSL for Server Communications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10
2.2 Communication between the Web Admin Server and the Web Admin Browser . . . . . . . . . . . . . . . .10
2.3 Enterprise Client/Server Communications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10
2.4 Web Access Server Communications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
2.5 Disabling the SSL 2.0 Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10
2.6 Configuring a Cipher Suite to Use for SSL/TLS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11
2.7 Installing Trusted Roots and Certifications on the iFolder Server . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.8 Installing Server Certificates from a Known Certificate Authority. . . . . . . . . . . . . . . . . . . . . . . . . . . .11
2.9 Using a Shared Certificate in iFolder Clusters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
2.10 Ensuring Privilege Separation for the iFolder Proxy User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12
2.11 Using Synchronize Now to Remove Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12
2.12 Controlling Access to the iFolder Data Store . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12
2.13 Controlling Access to the iFolder Server Configuration Files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
2.14 Controlling Access to And Backing Up the iFolder Audit Logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13
2.15 Encrypting Data on the Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13
2.16 Preventing the Propagation of Viruses. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13
2.17 Backing Up the iFolder Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13
2.18 Loading the Recovery Agent Certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
3 Security Best Practices for the iFolder Client 15
3.1 Configuring Client-Side Firewalls for iFolder Communications . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15
3.2 Configuring Client-Side Virus Scanners for iFolder Communications . . . . . . . . . . . . . . . . . . . . . . . .15
3.3 Configuring a Web Browser to Use SSL 3.0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16
3.4 Creating an Encrypted iFolder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16
3.5 Using the Recovery Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16
3.6 Transferring the Encryption Key. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17
4 Other Security Best Practices 19
4.1 Controlling Physical Access to the iFolder Servers and Resources. . . . . . . . . . . . . . . . . . . . . . . . . . 19
4.2 Securing Access to the Servers with a Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
4.3 Securing Communications with a VPN If SSL Is Disabled. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
4.4 Securing Wireless LAN Connections If SSL Is Disabled . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20
4.5 Creating Strong Password And Passphrase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20
A Documentation Updates 21
A.1 December 2008 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
4 Novell iFolder 3.9.1 Security Administration Guide
A.2 December 2007 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
A.3 October 2007 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
A.4 August 15, 2006. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22
A.5 November 1, 2005 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23
About This Guide 5
About This Guide
Thisguideprovidesspecificinstructionsonhowtoinstall,configure,andmaintainNovelliFolder
serverandiFolde rclientsinthemostsecurewaypossible.
Chapter 1,“SecurityBestPracticesOverview,”onpage 7
Chapter 2,“SecurityBestPracticesforNovelliFolder,”onpage 9
Chapter 3,“SecurityBestPracticesfortheiFolderClient,”onpage 15
Chapter 4,“OtherSecurityBestPractices,”onpage 19
Appendix A,“DocumentationUpdates,”onpage 21
Audience
Thisguideisintendedfornetworksecurityadministrators.
Feedback
Wewanttohearyourcommentsandsuggestionsaboutthismanualand theotherdocumentation
includedwiththisproduct.PleaseusetheUserCommentfeatureatthebottomofeachpageofthe
onlinedocumentation.
Documentation Updates
ForthemostrecentversionoftheNovelliFolder3.xSecurityAdministratorGuide,visittheNovell
iFolder3.xdocumentationWebsite(http://www.novell.com/documentation/ifolder3/).
ForemergingissueswithNovelliFolderserverandclient,seetheNovelliFolder3.9.1Readme(http://
www.novell.com/documentation/ifolder3/index.html).
Additional Documentation
NovelliFolder3.xdocumentation(http://www.novell.com/documentation/ifolder3/index.html)
NovellTechnicalSupport(http://www.novell.com/support/)
Whenasinglepathnamecanbewrittenwithabackslashforsomeplatformsoraforwardslashfor
otherplatforms,thepathnameispresentedwithabackslash.Usersofplatformsthatrequirea
forwardslash,suchasLinuxorUNIX,should
useforwardslashesasrequiredbyyoursoftware.
6 Novell iFolder 3.9.1 Security Administration Guide
1
Security Best Practices Overview 7
1
Security Best Practices Overview
Thissectionsummarizestherecommendedconfigurationsandsettingsrequiredtorun Novell
iFolderserverandtheiFolderclientsinasecuremode.
Section 1.1,“SecurityRecommendationsforiFolder,”onpage 7
1.1 Security Recommendations for iFolder
ThefollowingtableliststheiFolderserverconfigurationsettingsthatimpactiFoldersecurity.
Table 1-1 SecurityRecommendations
Parameter Possible Values Default Value
Recommended Value
for Best Security
iFolder Admin user User-specified User-specified
administrator user
Special iFolder Admin
user identity for
managing iFolder
services
Equivalent iFolder
Admin users
User-specified None Users with limited
administrator rights,
such as for a specific
iFolder server
iFolder Proxy user
password
User-specified Auto generated during
initial configuration of the
iFolder server
User-specified, using
strong password
practices
Server to client
communications
SimiasRequireSSL (Yes/
No)
SimiasRequireSSL =
Yes
SimiasRequireSSL =
Yes
Server to Server
Communication
Select Yes during setup
to enable SSL, or select
No to disable SSL
Yes, SSL enabled
SimiasUrl https
SimiasCert <RAW
certificate>
Yes, SSL enabled
/usr/web/
web.config
file
SimiasUrl (https/http)
SimiasCert (RAW
certificate/none)
SimiasRequireSSL https
SimiasCert <RAW
certificate>
SimiasRequireSSL https
SimiasCert <RAW
certificate>
8 Novell iFolder 3.9.1 Security Administration Guide
2
Security Best Practices for Novell iFolder 9
2
Security Best Practices for Novell
iFolder
Thissectionprovidessp ecificinstructionsonhowtoinstall,configure,andmaintainNovelliFolder
inthemostsecurewaypossible.
Section 2.1,“SecureCommunicationwiththeLDAPServer,”onpage 10
Section 2.2,“CommunicationbetweentheWebAdminServerandtheWebAdminBrowser,”on
page 10
Section 2.3,“EnterpriseClient/ServerCommunications,”onpage 10
Section 2.4,“Web
AccessServerCommunications,”onpage 10
Section 2.5,“DisablingtheSSL2.0Protocol,”onpage 10
Section 2.6,“ConfiguringaCipherSuitetoUseforSSL/TLS,”onpage 11
Section 2.7,“InstallingTrustedRootsandCertificationsontheiFolderServer,”onpage 11
Section 2.8,“InstallingServerCertificatesfromaKnownCertificateAuthority,”onpage 11
Section 2.9,“Usinga
SharedCertificateiniFolderClusters,”onpage 12
Section 2.10,“EnsuringPrivilegeSeparationfortheiFolderProxyUser,”onpage 12
Section 2.11,“UsingSynchronizeNowtoRemoveUsers,”onpage 12
Section 2.12,“ControllingAccesstotheiFolderDataStore,”onpage 12
Section 2.13,“ControllingAccesstotheiFolderServerConfigurationFiles,”onpage 12
Section 2.14,“ControllingAccess
toAndBackingUptheiFolderAuditLogs,”onpage 13
Section 2.15,“EncryptingDataontheServer,”onpage 13
Section 2.16,“PreventingthePropagationofViruses,onpage 13
Section 2.17,“BackingUptheiFolderServer,”onpage 13
Section 2.18,“LoadingtheRecoveryAgentCertificates,”onpage 14
10 Novell iFolder 3.9.1 Security Administration Guide
2.1 Secure Communication with the LDAP Server
Section 2.1.1,“UsingSSLforServerCommunications,”onpage 10
2.1.1 Using SSL for Server Communications
Bydefault,theiFolderenterpriseserverisconfiguredtocommunicatewiththeLDAPserverviaSSL.
Formostdeployments,thissettingshouldnotbechanged.IftheLDAPservercoexistsonthesame
serverastheiFolderenterpriseserver,youcanreconfiguretodisableSSL,whichincreasesthe
performanceof
LDAPauthentications.
Forinformation,seeConfiguringtheiFolderEnterpriseServerintheNovelliFolder3.9.1
AdministrationGuide.
2.2 Communication between the Web Admin Server and the
Web Admin Browser
Bydefault,theNovelliFolderWebAdminusesSSLforcommunicationstotheiFolderenterprise
serverbeingmanaged.Formostdeployments,thissettingshouldnotbechanged.IftheWebAdmin
serviceandtheiFolderenterpriseserviceareonthe sameserver,SSLisnotrequired.ForHTTP
connections,thepassword
ispassedintheclear.
2.3 Enterprise Client/Server Communications
Bydefault,theiFolderenterpriseserverisconfiguredforsharediFolderaccess.Client/Server
communicationisnotthroughSSL.Alldataissenttotheserverintheclear.Formostdeployments,
thissettingisusedforhighperformance.Thissettingcanbechangedduringthesimiasserversetup
configurationforiFolder.
IfyoudisableSSLforclient/servercommunications,youshoulduseaVPN(virtualprivatenetwork)
forcommunicationsoverwirelessnetworksandoutsidethefirewall.Forinformation,seeSection 4.3,
“SecuringCommunicationswithaVPNIfSSLIsDisabled,”onpage 19.
2.4 Web Access Server Communications
Bydefault,theiFolderWebAccessserverisconfiguredtorequireSSL.AllWebbrowserbased
communicationtotheWebAccessserverisencryptedbyusing theSSLprotocol.Inmost
deployments,thissettingshouldnotbechangedbecauseiFolderusesFormsbasedauthentication
forbrowsercommunications,whichmeanspasswordsare
senttotheserverintheclear.For
information,seeConfiguringtheWebAccessServerforSSLCommunicationswithWebBrowsers
intheNovelliFolder3.9.1AdministrationGuide.
2.5 Disabling the SSL 2.0 Protocol
ThebuiltinprotectionsofSSL3.0forversionrollbackattacks(wherethesessionisrolledbacktoSSL
2.0evenwhenbothclientandserversupportSSL3.0)arenoteffectiveagainstaversionrollback
attackerswhocanbruteforcethekeyandsubstituteanew
ENCRYPTED-KEY-DATA
messagecontaining
Security Best Practices for Novell iFolder 11
thesamekey(butwithnormalpadding)beforetheapplicationspecifiedwaitthresholdhasexpired.
YoucandisableSSL2.0ontheserver,soitisnotpossibletoestablishasessionusingSSL2.0,andso
versionrollbackattacksarenotbepossible.
ForinformationaboutdisablingtheSSL2.0
protocolfortheApacheserver,seeConfiguringtheSSL
CipherSuitesandProtocolfortheApacheServerintheNovelliFolder3.9.1AdministrationGuide.
ForinformationaboutconfiguringstrongSSL/TLSsecuritysolutions,seeSSL/TLSStrong
Encryption:HowTo(http://httpd.apache.org/docs/2.0/ssl/ssl_howto.html)ontheApache.orgWeb
site.
2.6 Configuring a Cipher Suite to Use for SSL/TLS
Toensurestrongencryption, westronglyrecommendthefollowingconfigurationfortheApache
serversSSLciphersuitesettings:
UseonlyHighandMediumsecurityciphersuites,suchasRC4andRSA.
Removefromconsiderationanyciphersthatdonotauthenticate,suchasAnonymousDiffie
Hellman(ADH)ciphers.
DisabletheLow,Export,
andNullciphersuitesunlessyouneedthemforotherapplications.
DonotdisabletheLowandExportciphersuitesiftheyarerequiredbyyourcustomerbase.
Individualsusingolderbrowsers(45yearsold)andolderversionsofWindows,suchas
Windows98mightstillneedthoseciphersuites
forotherservices.
Forinformation,seeConfiguringtheSSLCipherSuitesfortheApacheServerintheNovelliFolder
3.9.1AdministrationGuide.
ForinformationaboutconfiguringstrongSSL/TLSsecuritysolutions,seeSSL/TLSStrong
Encryption:HowTo(http://httpd.apache.org/docs/2.0/ssl/ssl_howto.html)ontheApache.orgWeb
site.
2.7 Installing Trusted Roots and Certifications on the iFolder
Server
Youcanmanuallyinstallthetrustedrootsandthedirectorypublickeyoutofband.Forinformation,
seeManagingSSLCertificatesforApacheintheNovelliFolder3.9.1AdministrationGuide.
2.8 Installing Server Certificates from a Known Certificate
Authority
YoushouldusevalidcertificatesforboththeApacheserverandforcommunicationbetweenthe
SimiasserverandtheSimiasclientdaemon.SimiasisthetechnologyunderpinningyouriFolder
serverandclientsoftware.Youshouldhavetheserverpublickeysignedbyaknowncertificate
authority(CA).Forinformation,see
GeneratinganSSLCertificatefortheServerintheNovell
iFolder3.9.1AdministrationGuide.
12 Novell iFolder 3.9.1 Security Administration Guide
2.9 Using a Shared Certificate in iFolder Clusters
Foraclusterwhereallofthenodesareactinglikethesamemachinewhentheyaretakingtheirturn
hosting,theusershouldhaveasinglecertificateforthehighlyavailableIPaddressthatallofthe
nodesintheclustershare.Forinformation,seeConfiguringApachetoPoint
toanSSLCertificateon
aniFolderServerintheNovelliFolder3.9.1Administration Guide.
2.10 Ensuring Privilege Separation for the iFolder Proxy User
TheiFolderProxyuserisaproxyuseridentityusedtoaccesstheLDAPservertoretrievealistof
authorizedusers.TheproxyuserisautomaticallycreatedduringtheiFolderenterpriseserver
configuration.Theusernameispredetermined(hardcoded)onthesystem.Formostdeployments,
thisusernameshouldneverchange.
MakesurethattheuseraccountassignedastheiFolderProxyuserisdifferentthantheoneusedfor
theiFolderAdminuserandothersystemusers.Separatingtheproxyuserfromtheadministrator
providesprivilegeseparation.
Theproxyuserpasswordisautogeneratedandstoredbrieflyinthe
/<data path>/simias/
.simias.ppf
fileoftheiFolderserver.Thisfileiscreatedduringtheconfigurat ionoftheiFolder
enterpriseserverandisremovedwhentheserverstartsforthefirsttime.ArestartofApacheis
forcedattheendoftheconfigurationprocess,whichinturnstartstheiFolderservice.Duringthe
initialstartup,theiFolderprocessreadsthefile,storesandencryptsthepasswordbyusingthepublic
keyoftheiFolderserverintheserversSimiasdatabase,andthenremovesthepasswordfromthe
file.
2.11 Using Synchronize Now to Remove Users
TheiFolderuserorgrouplistisperiodicallyupdatedbasedontheLDAPsynchronizationinterval.
WheneveryouremoveusersorgroupsfromaLDAPSearchDN,orremovecontextsfromtheSearch
DNlist,youshouldsynchronizethelistimmediatelyusingtheSynchronizenowoptionintheserver
detailspagein
theWebiFolderAdmintoenforceyourchanges.
2.12 Controlling Access to the iFolder Data Store
Bydefault,theiFolderserverstoresthedatabaseanduserfilesunderthe
/<data path>/simias
directory.TheApacheServeruserwwwrunbydefaultownsthosefiles.Youmustuseevery
precautiontoavoidinadvertentlyassignrightstounauthorizedusers.
2.13 Controlling Access to the iFolder Server Configuration
Files
TheiFolderserverstorestheconfigurationfilesinthe
/<data path>/simias
directory.TheApache
Serveruserwwwrunownstheconfigurationfile.Youmustuseeveryprecautiontoavoid
inadvertentlyassigningrightstounauthorizedusers.
Security Best Practices for Novell iFolder 13
2.14 Controlling Access to And Backing Up the iFolder Audit
Logs
Bydefault,theiFolderserverstorestheauditlogsinthe
/<data path>/simias/logs
directory.The
iFolderserveradministratorshouldguaranteethatrights arenotinadvertentlyassignedto
unauthorizedusers.Administratorsshouldalsoperiodicallybackuptherolledoverlogsincasethey
areeverneededforforensicpurposes.Auditlogsshouldbemonitoredperiodically.
Forinformation,seeManagingthe SimiasLogandSimias
AccessLogintheNovelliFolder3.9.1
AdministrationGuide.
2.15 Encrypting Data on the Server
iFolderusesBlowfishtoencryptthedataonthewire.Thedataisthenencryptedandstoredonthe
enterpriseserver.ThisissameasiniFolder2.x,whichprovidespassphrasebasedencryption.To
enableencryptionfortheusers,settheencryptionpolicytoOnundertheSystempolicyin
theWeb
Adminconsole.
Formoreinformation,seeConfiguringSystemPoliciesintheNovelliFolder3.9.1Administration
Guide.
2.16 Preventing the Propagation of Viruses
BecauseiFolderisacrossplatformdistributedsolution,thereisapossibilityofavirusinfectionon
oneplatformmigratingacrosstheiFolder servertootherplatforms,andviceversa.Youshould
enforceserverbasedvirusscanningtopreventvirusesfromenteringthecorporatenetwork.
Youshouldalsoenforceclientbased
virusscanning.
2.17 Backing Up the iFolder Server
BackinguptheiFolderuserdataandconfigurationdatashouldbedoneregularly.Thebackupmedia
shouldbestoredinasecureoffsite facility.
Duringbackupandrestore,theiFolderdataitselfisnotencrypted.IftheiFolderstoreandthe
backupmediaareondifferentcomputers,useSSLtotransfer
databetweenthecomputers.Itisnot
necessarytouseSSLiftheiFolderstoreandbackup media areonthesamecomputer.
Forinformation,seethefollowingintheNovelliFolder3.9.1AdministrationGuide:
BackingUptheiFolderServer
RecoveringfromaCatastrophicLossoftheiFolder
Server
RecoveringiFolderDatafromFileSystemBackup
Forsensitivedata,useoneofthefo llow ingmethodstoencryptthedatabackup:
Encryptthedataitselfiftheapplicationthatcreatesthedatasupportsencryption.Forexample,
databaseproducts andthirdpartytoolssupportdataencryption.
Usebackupsoftwarethat
isabletoencryptdataasyoubackitup.Thismethodhasp erformance
andmanageabilitychallenges,especiallyformanagingencryptionkeys.
Useanencryptionappliancethatencryptssensitivebackupmediaasdataisbackedup.
14 Novell iFolder 3.9.1 Security Administration Guide
Ifyoutransportandstoremediaoffsite,useacompanythatspecializesinmediashipmentand
storage.Thisway,yourtapesaretrackedviabarcodes,storedinenvironmentallyfriendly
conditions,andarehandledbyacompanywhosereputationrestsonitsabilitytohandleyourmedia
properly.
2.18 Loading the Recovery Agent Certificates
TheNovelliFolderservicebydefaultisnotconfiguredfortheRecoveryagent.Duringserver
configuration,ensurethattheRecoveryagentpathisconfigured.Thispathshouldcontainthelistof
certificatesthattheservicecanloadfortheuserstoselectfrom.Formoreinformationonloadingthe
Recoveryagent
certificates,seeRecoveryAgentCertificatesintheNovelliFolder3.9.1
AdministrationGuide.
3
Security Best Practices for the iFolder Client 15
3
Security Best Practices for the iFolder
Client
Thissectionprovidessp ecificinstructionsonhowtoinstall,configure,andmaintaintheiFolder
clientinthemostsecurewaypossible.
Section 3.1,“ConfiguringClientSideFirewallsforiFolderCommunications,”onpage 15
Section 3.2,“ConfiguringClientSideVirusScannersforiFolderCommunications,”onpage 15
Section 3.3,“ConfiguringaWebBrowsertoUseSSL3.0,”
onpage 16
Section 3.4,“CreatinganEncryptediFolder,”onpage 16
Section 3.5,“UsingtheRecoveryAgent,”onpage 16
Section 3.6,“TransferringtheEncryptionKey,”onpage 17
3.1 Configuring Client-Side Firewalls for iFolder
Communications
Ifusersdeployaclientsidefirewall,theymustsetthefirewalltoallowtheiFolderclientto
communicatelocally(onthesamecomputer)withMonoXSPServer.iFoldercommunicatestoMono
XSPWebservices,whichcommunicates,inturn,withtheiFolderenterpriseserverviaHTTPBASIC
orSSL,asgoverned
bythesystemsettingsfortheiFolderenterpriseserver.Theusercanallow
iFoldertochoosealocaldynamicportforlocaliFoldertraffic,orconfigurealocalstaticportfor
iFoldertouseforthatpurpose.
3.2 Configuring Client-Side Virus Scanners for iFolder
Communications
BecauseiFolderisacrossplatformdistributedsolution,thereisapossibilityofavirusinfectionon
oneplatformmigratingacrosstheiFolder servertootherplatforms,andviceversa.Youshould
enforceclientbasedvirusscanningtopreventvirusesfromenteringthecorporatenetwork.
Scanningthe
..\simias\WorkArea\
directoryforvirusescausesproblemswithsynchronizationifa
virusisdetectedondownload.The
..\simias\WorkArea\
directoryiswhereiFolderstagesfilesfor
downloadfromtheserver.Usersshouldsettheirvirusscannerstoavoidscanningthe
..\simias\WorkArea
directory.ScannerscandetecttheviruswheniFoldermovestheinfectedfile
fromthestagingareatothetargetiFolder.
16 Novell iFolder 3.9.1 Security Administration Guide
3.3 Configuring a Web Browser to Use SSL 3.0
NovelliFolderserversexpectuserstoconnecttotheenterpriseserveraccountandtheWebaccess
serverwithSSL3.0connections.Boththeclientandbrowserconnectionsusethebrowserssettings
forSSL.IfMicrosoftIEisinstalledonyoursys tem,theiFolderclientusesthosesettingsoverany
otherbrowser
configurationfortheclient.MakesuretheIEbrowsersettingsandotherbrowsersyou
usetoconnecttoiFolderserversareconfiguredtouseSSL3.0.
3.4 Creating an Encrypted iFolder
NovelliFoldersupportsencryptediFolderstorage.Tostorethefilesencrypted,usersmustensure
thattheiFoldertheyareuploadingtoiscreatedasencrypted.Forthat,theymustensurethatthe
optionforEncryptionisselected.TheyalsomustspecifyapassphraseandselectaRecoveryagent
whencreatingan
encryptediFolderbyusingtheiFolderthickclient.However,thisoptionis
availableonlywhenyousettheEncryptionpolicytoOn.Inthis case,usersarefreetochoosebetween
thetwooptions:RegularandEncrypted.However,ifyousettheencryptionpolicytoEnforced,users
cancreate
onlyencryptediFoldersandtheycannotchangethisencryptionsettingsfortheiriFolders.
NOTE:EveniftheencryptionpolicyissettoEnforced,youcancreatearegulariFolderbyusingthe
CreatebuttonontheiFolderpageoftheiFolderWebAdminconsole.
AnexistingiFoldercannotbeconvertedtobeanencryptediFolder,andanencryptediFoldercannot
beconvertedtobearegulariFolder.
DuringthecreationofanencryptediFolder,theuserispromptedtoenterapassphraseandselect
a
Recoveryagent.iFolderusesthepassphrasetodynamicallygenerateaunique encryptionkeyfor
encryptinganddecryptingthekeyusedfordataencryption.TheencryptediFoldersarenot
processedwithoutthepassphrase.Iftheuserforgetsthesecretpassphrase,heorshecannotaccess
eithertheiFolderdataor
theencryptedkeyusedforrecoveringit.Inthiscase,theRecoveryagent
thatisselectedwhenthepassphraseissethelpsinrecoveringthe encryptionkey.Formore
informationontheRecoveryagent,seetheSection 3.5,“UsingtheRecoveryAgent,”onpage 16.
3.5 Using the Recovery Agent
TheNovelliFolderenterpriseserverusesaRecoveryagent,whichisanX.509certificatebasedentity
usedtorecoveralostorotherwiseunavailablekeyforencryptediFolders.
iFolderpromptsausertoselectaRecoveryagentfromalistwhentheuserspecifiesthepassphrase
foranencryptediFolder.However,
thisoptionisavailableonlyifyousetencryptionpolicytoOnby
usingtheWebAdminconsole.Whentheuserhaslostorforgottenthepassphrase,theRecovery
agenthelpstheusertorecoverthedata.Theuserexportstheencryptedkeyandsendsittothe
Recoveryagentby
usingtheKeyRecoveryoptionavailableundertheSecuritymenuintheclient.After
receivingtheencryptedkey,theRecoveryagentdecryptsitbyusingitsprivatekey,andsendsitback
totheiFolderuser.Theuserthenimportsthedecryptedkeyandthenresetsthepassphrasebyusing
the
Securitymenuintheclient.
Security Best Practices for the iFolder Client 17
3.6 Transferring the Encryption Key
TheRecoveryagentcanencryptthedecryptedkeysusingaonetimepassphrase(OTP),thenitsends
boththeencryptedpassphraseandthekeytotheuser.ForsecureOTPtransfer,makesurethatthe
Recoveryagent usesanoutofbandcommunicationoraseparateemailcommunicationtosend
the
passphraseandthekeytotheuser.
AllthekeysareBase4encodedforeasierdataexchange.Thekeyishighlyvulnerableduringtransfer
ifitisnotencryptedwiththeOTP.
18 Novell iFolder 3.9.1 Security Administration Guide
4
Other Security Best Practices 19
4
Other Security Best Practices
ThissectiondiscussesothersecuritybestpracticesforyourNovelliFolderserversandresources.
Section 4.1,“ControllingPhysic alAccesstotheiFolderServersandResources,”onpage 19
Section 4.2,“SecuringAccesstotheServerswithaFirewall,onpage 19
Section 4.3,“SecuringCommunicationswithaVPNIfSSLIsDisabled,”onpage 19
Section 4.4,“Securing
WirelessLANConnectionsIfSSLIsDisabled,”onpage 20
Section 4.5,“CreatingStrongPasswordAndPassphrase,”onpage 20
4.1 Controlling Physical Access to the iFolder Servers and
Resources
Serversmustbekeptinaphysicallysecurelocationwithaccessbyauthorizedpersonnelonly.
Thecorporatenetworkmustbephysicallysecuredagainsteavesdroppingorpacketsniffing.
4.2 Securing Access to the Servers with a Firewall
IftheiFolderenterpriseserver,WebAdminserverorWebAccessserverisaccessiblefromoutside
thecorporatenetwork,afirewallshouldbeemployedtopreventdirectaccess byawouldbe
intruder.
4.3 Securing Communications with a VPN If SSL Is Disabled
WerecommendconfiguringNovelliFoldertouseencryptionforalldataexchangesbetweenits
differentcomponentsbecauseiFolderdataisnotencryptedbydefault.IfyouconfigureiFoldernotto
useencryptionbetweentheenterpriseserverandclientorbetweentheWebaccessserverandthe
usersWebbrowser,theuser
dataissusceptibletoeavesdroppingorpacketsniffingbythirdparties
outsidethecorporatefirewall.
Evenifyouconsiderthecorporateenvironmenttobeatrustedenvironment,aVPN(virtualprivate
network)shouldbeemployedforserverclientandserverbrowserconnectionsinthefoll owing
situations:
Whentheusersaccess
theserversfromoutsideofthecorporatefirewall
Whentheusersaccesstheserversacrossawirelessnetwork.Wirelessaccesspointsandadapters
broadcastdataintospace,wherethesignalscanbeinterceptedbyanyonewiththeabilityto
listeninattheappropriatefrequency.
ForaccessingtheWebAccessserver
overaVPN,makesuretodisablesplittunnelingsothatthe
trafficgoesthroughtheVPNconnectiontothecorporatenetwork,notoverthepublicInternet.
20 Novell iFolder 3.9.1 Security Administration Guide
ForinformationaboutconfiguringSSLfeaturesforthesecommunications,seethefollowing:
Section 2.3,“EnterpriseClient/ServerCommunications,”onpage 10
Section 2.4,“WebAccessServerCommunications,”onpage 10
4.4 Securing Wireless LAN Connections If SSL Is Disabled
Protectingawirelessnetworkrequiresforethoughtandplanning,justasprotectingawirednetwork
does.Amongthekeyprotectivemeasurestobeundertakenare:
EnableWEP(WiredEquivalentPrivacy)encryption,butdonotrelyonWEPalonetoprovide
securityforthewirelessnetwork.UseothertypicalLANsecuritymechanismssuch
asVPNs,
firewalls,andauthenticationtoensureprivacy.Forinformation,seeSection 4.3,“Securing
CommunicationswithaVPNIfSSLIsDisabled,onpage 19.
SurveytheinterferenceandjamminglikelihoodforaplannedwirelessLANbeforeitis
installed.
Changethedefaultmanufacturerspasswordforyourwirelessaccesspoints,gateways,or
routers.
Limit,as muchasispossible,whocanattachtoawirelessnetwork.Forexample,usingMAC
addressfilteringispracticalforsmallnetworks,butitisatimeconsumingadministrativeeffort
forlargenetworks.
UseananonymousServiceSetIdentifier(SSID)byturningofftheSSIDbroadcastfor
access
points.
4.5 Creating Strong Password And Passphrase
Makesuretoemploysecuritybestpracticesforpasswords,suchasthefollowing:
Length:Theminimumrecommendedlengthis6characters.Asecurepasswordisatleast8
characters;longerpasswordsarebetter.
Complexity:Asecurepasswordcontainsamixtureoflettersandnumbers.Itshouldcontain
bothuppercaseandlowercase
lettersandatleastonenumericcharacter.Addingnumbersto
passwords,especiallywhentheyareaddedtothemiddleandnotjustatthebeginningorthe
end,canenhancepasswordstrength.Specialcharacterssuchas
&
,
$
,and
>
cangreatlyimprove
thestrengthofapassword.
Donotuserecognizablewords,suchaspropernamesorwordsfromadictionary,evenifthey
arebookendedwithnumbers.Donotusepersonalinformation,suchasphonenumbers,birth
dates,anniversarydates,addresses,orZIPcodes.Donotinvertrecognizableinformation;
invertingbadpasswordsdoesnotmakethemmoresecure.
Uniqueness:Donotusethesamepasswordsforallservers.Makesuretouseseparate
passwordsforeachserversothatifoneserveriscompromised,allofyourserversarenot
immediatelyatrisk.
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24

Novell iFolder 3 User guide

Type
User guide

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI