Characterizing Hosting and Security Practices for Public-Facing LDAP Servers

Abstract

The Lightweight Directory Access Protocol (LDAP) is widely used to make structured data available for standardized lookup, which may sometimes include personal information or authentication credentials. Previous work, including ours, found security issues such as public LDAP servers leaking sensitive information without prior authentication and server configurations with poor communication security. However, prior work did not investigate whether, or to what extent, the identified problems are linked to hosting and management setups. In this paper, we address this gap and explore the organizations hosting publicfacing LDAP servers. We identify the network segments more likely to host LDAP instances, the products and operating systems used, and examine the management practices related to Public Key Infrastructure (PKI) setups for LDAP. In contrast to studies on Web and email, which have revealed strong centralization tendencies in deployment, we show that the LDAP ecosystem is diverse, with a wide range of different hosting networks. In this study, we identify 69.1 k LDAP instances—6.5× more than prior work—and map these to the respective LDAP products. We find that 5.8% of the servers use a product that is end-of-life or runs on a deprecated OS. We identify servers using problematic X. 509 certificates, eg, those associated with publicly known private keys. From our observations, we give recommendations for network operators to improve their security posture.

Publication
Proceedings of the 21st International Conference on Network and Service Management (CNSM ‘25)
Fabian Ising
Fabian Ising
IT Security Researcher & Group Leader Advanced Cryptographic Engineering

My research interests include defensive IT security, applied cryptography, email security, network and protocol security, and IT security in healthcare.