Domino Server TCP and SSL Ports and Domino Security Settings

Mindwatering Incorporated

Author: Tripp W Black

Created: 03/28/2002 at 12:33 PM

 

Category:
Domino Upgrades / Installations
Software (Re)Configuration

Task:
Know the Notes/Domino ports and set-up typical security precautions for HCL Domino (previously Lotus/IBM) for commonly used web ports.

We will review:
- Domino TCP / SSL Ports
- Firewall Settings
- Server document - Ports set-up
- Internet Site - IP and Security (SSL/TLS) settings.

Default Domino TCP / SSL Ports:

Protocol
TCP Port
SSL Port
Notes RPC
1352
N/A
HTTP/HTTPS
80
443
LDAP
389
636
NNTP
119
563
IMAP
143
993
POP3
110
995
SMTP in/out
25
465
IIOP
Domino Controller
63148
2050
63149
Use the FirewallD following commands to set-up open the ports needed on Red Hat / CentOS:
Notes:
In this example we restrict the Domino mgmt 2050 port, SSH and e-mail to internal networks only.
In addition, port 2050 is not typically used anymore w/Linux and containers.
# firewall-cmd --zone=public --add-port=1352/tcp --permanent
# firewall-cmd --zone=public --add-port=80/tcp --permanent
# firewall-cmd --zone=public --add-port=443/tcp --permanent
# firewall-cmd --zone=public --add-port=993/tcp --permanent
# firewall-cmd --permanent --zone=public --add-rich-rule="rule family="ipv4" source address="192.168.199.0/16" port protocol="tcp" port="2050" accept"
# firewall-cmd --permanent --zone=public --add-rich-rule="rule family="ipv4" source address="192.168.199.0/16" port protocol="tcp" port="22" accept"
# firewall-cmd --permanent --zone=public --add-rich-rule="rule family="ipv4" source address="192.168.211.0/28" port protocol="tcp" port="25" accept"
# firewall-cmd --reload
Confirm loaded and running:
# firewall-cmd --state


SERVER DOCUMENT:
Assuming you have TLS (SSL) certificate set-up, you should redirect your non-secure ports to secure ports for the non-HTTP ports. Below is an example for IMAP settings on the Ports tab of the Server document.
- Redirect to SSL (TLS) Redirect if possible, and you want it to be forced. So we redirect for IMAP, but not globally for Web, so we can support non-HTTPS (SSL/TLS) web sites.
- Enforce server access (enables the Security tab)

Web
(HTTP/HTTPS)
TCP/IP port number:80
TCP/IP port status:Enabled
Enforce server access settings:Yes
SSL port number:443
SSL port status:Enabled

MailMail
(IMAP)
TCP/IP port number:143
TCP/IP port status:Redirect to SSL
Enforce server access settings:Yes
SSL port number:993
SSL port status:Enabled


INTERNET SITE DOCUMENT:
Below is an example of our IMAP confirmation.
On the Basics tab:
Site Information
Descriptive name for this site:MW Net IMAP
Organization:MWNet
Host names or addresses mapped to this site: mydomain.com
mydomain.net
10.1.12.117

10.1.12.217
Domino servers that host this site:*


On the Security tab:
- We use name/password, and all names/emails with password are entered w/TLS active.
- 2022 Keyring files (kyr/sth) are still supported, but it is highly recommended to utilize the Certificate Authority (CA server task) and Certificate Store (CertStore.nsf application) for configuration in Domino R10 and higher. Various set-up documents in this support application site are available. When using the Certificate Store, the Key File name in the Web Site document must match the key file name for the TLS domain record - the name does not need to include .kyr at the end. We typically using the domain name as the file name since no .kyr/.sth files are used with the CA task.
- 2023/2025 The TLS Authentication section has been updated with Passkey (WebAuthn) option in Domino 14.0.x and higher, and TCP / TLS Authentication can include TOTP (Yes with TOTP) in Domino 12.0.x and higher.
- When HCL releases Domino updates, the SSL cipher list will have new choices added. After applying patches, click the Modify button and deselect any ciphers that are considered weak since the last review.
- 2025 TLS ciphers have been updated to the 4 ciphers considered strong at this time

TCP Authentication
Anonymous:Yes
Name & password:Yes
Redirect TCP to TLS:Yes

TLS Authentication
Anonymous:Yes
Name & password:Yes ( or Yes with TOTP )
Client certificate:No
Bearer token (JWT):No
Passkey (WebAuthn):No

TLS Options
Key file name:mwnet
Accept TLS site certificates:No
Accept expired TLS certificates:Yes
Check for CRLs:No
Trust expired CRLs:Yes
Allow CRL search to fail:Yes
TLS Security
TLS ciphers:ECDHE_RSA_WITH_AES_256_GCM_SHA384 [C030]
DHE_RSA_WITH_AES_256_GCM_SHA384 [9F]
ECDHE_RSA_WITH_AES_128_GCM_SHA256 [C02F]
DHE_RSA_WITH_AES_128_GCM_SHA256 [9E]

Note: Version 9.x Domino servers will ignore this selection. They use the server INI setting SSLCipherSpec instead.





previous page

×