Page 358 - StudyBook.pdf
P. 358

342    Chapter 5 • Communication Security: Web Based Services

             tory is laid out. If the hacker can gain access to the directory using LDAP queries,
             he or she could then use this information to access objects contained in different
             OUs named after departments on the chart. Using naming conventions internal to
             the company (such as calling a London base of operations DISTRICT1) or using
             some creativity in naming schemes (such as calling an OU containing computer
             accounts WK instead of WORKSTATIONS) will make the hierarchy’s structure
             less obvious to outsiders.While using the organizational chart of a company and
             geographical locations can be used as a basis for designing the hierarchy, it should
             not be an easy-to-guess blueprint of the directory and network infrastructure.

             Objects,Attributes and the Schema

             As mentioned, entries in the directory are used to represent user accounts, com-
             puters, printers, services, shared resources, and other elements of the network.These
             objects are named, and as we discussed with organizational units, each object must
             have a name that’s unique to its place in the namespace of the hierarchy. Just as you
             can’t have two files with the same name in a folder on your hard disk, you can’t
             have two objects with the same name in an OU.The name given to each of these
             objects is referred to as a common name, which identifies the object but doesn’t show
             where it resides in the hierarchy.
                 The common name is part of the LDAP naming convention. Just as a filename
             identifies a file, and a full pathname identifies its place in a directory structure, the
             same can be seen in the LDAP naming scheme.The common name identifies the
             object, but a distinguished name can be used to identify the object’s place in the hier-
             archy.An example of a distinguished name is the following, which identifies a com-
             puter named DellDude that resides in an organizational unit called Marketing in
             the tacteam.net domain:

             DN: CN=DellDude,OU=Marketing,DC=tacteam,DC=net
             The distinguished name is a unique identifier for the object, and is made up of sev-
             eral attributes of the object. It consists of the relative distinguished name, which is
             constructed from some attribute(s) of the object, followed by the distinguished
             name of the parent object.
                 Each of the attributes associated with an object are defined in the schema.The
             schema defines the object classes and attribute types, and allows administrators to
             create new attributes and object classes specific to the needs of their network or
             company. For example, a “supervisor” attribute in a user account might contain the
             name of the user’s manager, while a “mail” attribute would contain the user’s e-mail




          www.syngress.com
   353   354   355   356   357   358   359   360   361   362   363