LDD Today


ID and password recovery

by Timothy Speed
and Mary LaRoche

Level: All
Works with: Domino 5.0
Updated: 01-Nov-2001


Here's an ID and password recovery fish story:

Cindy HelpDesk answered the phone and heard a timid voice at the other end. ”Hello Cindy, this is Bubba Smith. I lost my ID file.”

“What happened to your ID file?”

“It’s at the bottom of the Gulf of Mexico, with my laptop. . . .I was out fishing with my buddy, Billy JoBob, and I decided to check my e-mail. Then this huge shark swallowed the bait and started a tremendous fight. I dropped my laptop to grab the pole, and the laptop slipped into the water.”

“Did you catch the shark?”

Mr. Smith sheepishly said, “Nope, it got away, but I have a new laptop now. I need a Notes ID and password, and I also had an X.509 certificate in my Notes ID file. I don’t know how to get a replacement.”

“Let me check. Your ID was last harvested two weeks ago. How long ago did you import the X.509 certificate into your ID file?"

“About four months ago.”

“Then you should be OK. I’m sending your ID to your manager now. Here is the key to unlock your ID—5829692949294a36. Also I'm e-mailing the procedures on how to unlock the ID file to your manager; it takes just a few steps to unlock the ID and enter a new password. Without the number I've just given you, no one will be able to unlock your ID file, so guard it just as carefully as your password.”

Mr. Smith sighed with relief. “Thanks, Cindy. You were a great help!”

Great story with a happy ending. User drowns laptop, user gets a new laptop, and then user gets ID back. All this without getting wet. This success story was brought to you by the ID and Password Recovery (also called ID Recovery) mechanism that is built into Lotus Notes R5. This article explains how to implement ID and Password Recovery for your organization.

What ID Recovery does for you
The ID Recovery mechanism is basically simple. If an ID has been created with a certifier that has recovery information, the ID file contains at least one recovery password that is randomly generated and encrypted with an administrator's public key. The password is unique for each administrator and user. For example, administrator Cindy HelpDesk has a unique recovery password for user Bubba Smith, and that password is stored in Bubba’s ID file.

Before ID Recovery, if a user lost the password to her ID, the administrator had to either get the ID file from an archive or create a new ID file for the user. Both options posed problems:
ID and Password Recovery makes user ID management simpler and better with these new features:
These powerful features allow an enterprise Domino installation to securely manage ID files while also providing better service to users.

How to implement ID and Password Recovery
Here are the basic steps for implementing ID and Password Recovery in your organization:
Let's review each of these steps in more detail.

1. Define security policies and procedures for ID and password management
First, before creating recovery policies and procedures, you need to have a basic, organization-wide security policy. If you need help here, several books and Web sites can help you, including The Internet Security Guidebook, ISBN:0122374711; "An IT Security Policy: What Every Hacker Does Not Want You To Have in Place," (THE VIEW, November/December 2000); and the National Institute of Standards and Technology (NIST) Internet Security Policy guidebook. These materials can help you create security policies and procedures to support your security infrastructure.

Then, in relation to ID Recovery, you need to define the following:
Identify the number of Recovery Authority IDs to be placed in certifiers
Here are your options. Which you choose depends on your organization's security policies:
Identify the minimum number of administrator IDs (Recovery Authorities) required to open an ID file
The Lotus recommended minimum number is three. Many organizations follow standard security practice for sensitive IDs and require two. Other organizations have minimal security requirements and only require one, and/or use a shared recovery ID.

Identify the naming standard of the administrator IDs (Recovery Authorities) that can unlock an ID
This can be any person that has a Notes public key in the address book. The Domino R5 Administration Help suggests using existing administrator IDs. You could also create specific ID files for administrators that would be dedicated to opening ID files. For example:
Recovery1/Recovery/TheCompany

2. Create a recovery database to house each set of IDs
As we mentioned earlier, you can use one database for the whole organization or one per O or OU. In either case, you must:
We recommend that you also:
3. Create a mail-in database record for each recovery database
Every certifier ID has an internal memory location that lists the name of the mail-in database for the recovery of IDs. The administrator can have a single database for all certifiers or one database for each certifier.

To create a mail-in database record for each recovery database:
4. Add recovery information to each OU certifier
Every certifier ID can hold recovery information. This recovery information is "stamped" into each new user ID when that ID is created using an R5 Administrator client. This recovery information can also be exported and imported into R4-based IDs that are on R5 clients.

For each OU certifier:
At this point, the Recovery Authority information is complete and will take affect for all new users. For existing users, you will need to export the information and send it to them. This step is covered in the next section.

Here's an example of what a completed Edit Master Recovery Authority List dialog box looks like:

Completed Edit Master Recovery Authority List dialog box

In this case, only one Recovery Authority is required, so either Mike Jones, TIm Speed, or Tom Smith will be able to recover (unlock) an ID file. The name of the mail-in database is Dallas IDPR. All new and harvested IDs will be sent to this mail-in database for the OU /Dallas/TheCompany.

You repeat this process of adding recovery information for each OU in your organization. All new users will have recovery information in their IDs and their IDs will be automatically mailed to the recovery database. The example below shows how the recovery database looks after registering two new users:

Recovery database entries

These messages look like any normal mail message, but they house a backup copy of the user’s Notes ID file. Here is what the message looks like:

message with ID file

5. Export recovery information and send it to all current R5 users
Now your new users are protected, but any existing R5 users and R4.x users you have migrated to R5 clients and servers still do not have recovery information in their IDs. What do you do to fix this? You can export the recovery information from the certifiers and send it to the users. You need to repeat the following steps for each group of users certified with a specific certifier:
Note that this export can happen at any time, but if you are dealing with any type of migration, you will save yourself headaches if you finish the migration before you export the recovery information and send it to the users. The same is true if you are in the process of moving users from one O or OU level certifier to another one.

Now let's go through the process with one user. Suppose Billy JoBob was an R4 user that recently upgraded to an R5 client.

Tell users about ID Recovery
This is the most important step you can take, because until users accept the recovery information and mail back their IDs, their IDs will not be protected. Use whatever notification methods you normally use, but send the message several times. Explain how important it is. You might even include a button for them to acknowledge the message.

Export the recovery information
Next, you export the recovery information and send it to the users. Remember that you have to do this for each certifier used to register users:
In this example, we have selected Billy JoBob. Once we click the Send button, the message will be delivered to Billy JoBob’s mail file. Here's how it looks in Billy's mail file. Notice that the instructions are in the Subject line of the message.

Notification in the user's mail file

The user accepts the recovery information
Next, Billy opens the message and follows the directions in the Subject line, choosing Actions - Accept Recovery Information:

Choosing Actions - Accept Recovery Information

The user sends the ID with the recovery information to the recovery database
Once Billy has chosen the Accept Recovery Information option, the Backup ID File dialog box appears, prompting Billy to send his ID to the recovery database:

Backup ID File dialog box

The new recovery information is placed into users ID files once they have accepted it, even if they cancel the dialog box to e-mail a backup copy to the recovery database. But let's review the impact of several different scenarios, based on Billy's actions.

If Billy decides not to bother with another “boring administration message" and doesn't open the message and accept recovery information—in other words, does absolutely nothing—there will be no way to recover his ID file. You will probably need to issue a new ID file to Billy, even if he still has the ID file and has only forgotten the password. This will take time, and Billy will not be happy. If Billy has any encrypted messages or other data, those are permanently lost, and he will be even less happy.

By the way, if Billy is ever under suspicion of illegal activity, your audit department will not be pleased when you tell them that you cannot read his encrypted messages. Of course, an intelligent criminal won’t send you the ID file with the private key that she uses for clandestine activity, but at least if you have the ID file in the recovery database, the audit department will know you did everything possible.

If Billy opens the message and chooses Actions - Accept Recovery Information but then cancels out of the Backup ID dialog box, the ID will be recoverable, but a current copy of the ID file will not be in the recovery database. This means that the following information will not be available:
In other words, Billy and you are in almost the same predicament as if he hadn’t done anything at all. The only advantage is that someone could possibly make a copy of the ID file on Billy’s workstation and send it to you and then you could recover it—not an option when the ID file is at the bottom of the Gulf of Mexico.

The moral is that you should never shortcut the first step—telling users about ID Recovery. It's important to impress the importance of ID Recovery on your users and to make sure they follow through. In fact, it's much better for you—and for everyone else—if you keep track of which users have sent in their recoverable IDs and harass the others until they do too.

Also, if people in your organization use S/MIME or other X.509 certificates, it is a good idea to repeat the recovery process every few months to keep this information up-to-date. Otherwise, normal recertification will take care of keeping the stored user IDs current.

How to recover an ID
So far, we've discussed setting up ID Recovery and showed you that once the recovery was enabled, it would place the recovery data in new user IDs. We also showed you how to harvest and enable IDs that were created before ID Recovery was implemented. Now we can turn our attention to how you actually recover an ID.

Before ID Recovery, it didn’t matter whether the user had lost the ID file or had only forgotten the password—in either case, if you had a backup of the ID file with a known password, you could send it to the user, either by sneaker net or by sending the file to the user’s local administrator or manager. Otherwise, you would have to give the user a totally new ID file.

With ID Recovery in place, the process of recovering from a forgotten password is different than from recovering from a lost ID. When the user has only forgotten the password, the whole recovery process can take place over the phone, which means that if the administration team is available, the user can be back in business in minutes. If the ID file is at the bottom of the Gulf of Mexico, the physical ID file has to be delivered to the user, but at least all the certificates and private keys are current.

The basic process has four steps:
Here are the steps in detail.

1. Copy the ID file from the recovery database
This step is simple. You:
2. Find the recovery passwords for the ID
This step is also straightforward:
3. Give the recovery information to the user
At this point, you have essentially two choices: You can read the recovery passwords to the user over the phone or you can recover the ID yourself, assign an easier password, and send the ID and password to the user’s administrator or manager. Some users have so much trouble entering a 16-character random string that they actually prefer to wait and get the ID file itself with an easier password, or your organization may expect local administrators to do the recovery for the user.

4. You or the user enter the recovery passwords and recover the ID file
Actual recovery of the ID file can occur under either scenario, with either you recovering the ID yourself or the user recovering the ID with the recovery information you give them.

If you, as an administrator, are going to recover the ID file for the user, you can follow these steps:
If, on the other hand, the user is going to recover her own ID file, the File - Tools - User ID - Recover ID won’t work, because she can’t use her Notes client without knowing the password to the ID file. The solution is simple, but not necessarily obvious. To recover an ID file when you can’t get into the Notes client:
Whether you have recovered the user's ID, reset her password, and sent her the ID file or she has done the recovery herself, if she is running Windows NT or Windows 2000 and the Domino synchronization code, there is one more step to take. The user will be prompted to synchronize the Windows and Notes passwords, either right after she finishes setting the recovered ID's new password or when she first uses the recovered ID.

Synchronize password message

The user should follow the directions in the message to synchronize the passwords.

The end of the story
That’s it; now you know why it was so easy for Cindy HelpDesk to help Bubba Smith with his lost ID. The ID Recovery process is straightforward to set up and use. The only part that takes effort is getting your users to understand how important it is—before they drop their laptops in the Gulf of Mexico. Otherwise, once you have set up the databases and certifiers, sent recovery information to existing users, and retrieved their updated ID files, you have a working recovery system that will make life easier for you and your users.


ABOUT THE AUTHORS
Timothy Speed is an infrastructure and security architect for Lotus Professional Services (LPS). Tim has been involved in Internet and messaging security for the last nine years. He also participated with the Domino infrastructure at the Nagano Olympics and assisted with the Lotus Notes systems for the Sydney Olympics. His certifications include, MCSE©, VCA (VeriSign Certified Administrator), Lotus Domino CLP Principal Administrator, and Lotus Domino CLP Principal Developer. Tim has also co-authored two books: The Internet Security Guidebook, ISBN: 0122374711, February, 2001, and The Personal Internet Security Guidebook, ISBN: 0126565619, October, 2001. You can reach Timothy at Tim_Speed@Lotus.com.

Mary LaRoche is a consulting IT security and infrastructure specialist for Lotus Professional Services (LPS). Mary has been working with messaging security and Notes and organizational security for the last eight years. She recently worked with several Federal agencies to implement secure organization-wide Domino infrastructures. You can reach Mary at Mary.LaRoche@Lotus.com.