ad-assurance - RE: [AD-Assurance] Microsoft Strategy / FICAM / Kantara
Subject: Meeting the InCommon Assurance profile criteria using Active Directory
List archive
- From: "Capehart,Jeffrey D" <>
- To: "" <>
- Subject: RE: [AD-Assurance] Microsoft Strategy / FICAM / Kantara
- Date: Tue, 7 May 2013 19:28:15 +0000
- Accept-language: en-US
- Authentication-results: sfpop-ironport01.merit.edu; dkim=neutral (message not signed) header.i=none
David, I’ve just skimmed through the 478 page FICAM
Roadmap and Implementation Guidance Version 2.0
http://www.idmanagement.gov/documents/FICAM_Roadmap_and_Implementation_Guidance_v2%200_20111202.pdf Big Picture: Maybe we have been looking at this wrong? Ultimate question: Is AD-DS really in scope? My take on the FICAM roadmap document is that they want to help federal agencies get out of the business of maintaining separate
ID’s and passwords for every application that a government worker has to login to. So right now, doing that is a bigger problem than say, following the letter of SP800-63 as defined for the credential store (i.e. Active Directory). Here are some examples where the more difficult parts of SP800-63 seem to be overlooked, bypassed, worked-around, or future-to-worry-about. (See page 93.)
4.6. Create, Issue, and Maintain Password Token (Read through the use case and then note the assumptions below.) Assumptions in this use case include: ·
The as-is process will not describe password management via domain controllers or other central management tools. ·
Management of roles, identity data or privileges associated with the password is out of scope of this use case; those activities are described in other use cases. As you may read through the roadmap, there are references to SP800-63, and even some proofing wording pulled right out of LOA1 and LOA2. But nowhere do they
discuss the password storage. So, if FICAM isn’t worried about it in their roadmap, it begs the question as to why even bother. As we have seen, AD-FS pushes off the authentication to AD-DS,
and as you said we had determined that AD-DS was out-of-scope for AD-FS. By that extension, if we’re using Shibboleth SAML 2.0, and say the VT middleware app that does LDAPS authentication to Active Directory, why should that be
considered differently than how AD-FS works that puts AD-DS out-of-scope for Silver? And here is even more explicit wording pulled straight from a 3-letter agency Protection Profile (PP) updated as of 8/31/2012: FPT_APW_EXT.1.1 The TSF shall store credentials in non-plaintext form.
FPT_APW_EXT.1.2 The TSF shall prevent the reading of plaintext credentials.
Application Note: The intent of the requirement is that raw authentication data are not stored in the clear, and that no user or administrator is able to read the raw authentication data through ―normal‖
interfaces. An all-powerful administrator of course could directly read memory to capture a password but is trusted not to do so. In this version of the PP there are no requirements on the method used to store the credentials in non-plaintext form, but cryptographic
methods based on the requirements in FCS_COP are preferred.
In future versions of this PP, FCS_COP-based cryptographic methods that conform to the Level 2 Credential Storage requirements from NIST SP 800-63 will be required. FCS_COP says: “should use sufficiently strong and sufficiently trusted encryption algorithms to protect data in transit to and from the TOE.” 4.5 Protected Credentials
Protecting transmitted credential information is only part of the credential protection picture. It is also critical to protect the credentials as stored by the TOE so that they cannot be accessed in a raw
plaintext form, and the subsequently replayed and used to impersonate a user. The upshot is that maybe we will find out from Microsoft that some future Windows version will be fully compliant and use only approved algorithms for storing
authentication secrets, and that time is needed to transition to the fully compliant version. If so, then we need to figure out if Active Directory is good enough as-is, good enough with at least a minimum set of compensating controls, good enough with configuration
X-Y-Z, or perhaps scope it out like everyone else seems to be doing. We know AD-DS is the credential store. As such it is hard to just ignore it. But is that a battle for today or tomorrow, and is following the crowd the right
way to go? Ideally, we do want to have full compliance with the specs. Jeff From: [mailto:]
On Behalf Of David Walker Jeff, David, Question
In Windows 7 and Server 2008 Kerberos DES encryption is disabled by default. Answer
DES is still available as an option on Windows 8 and Windows Server 2012, though it is disabled by default. It is too early to discuss the availability of DES in future versions of Windows right now.
|
- [AD-Assurance] Microsoft Strategy / FICAM / Kantara, Capehart,Jeffrey D, 05/06/2013
- Re: [AD-Assurance] Microsoft Strategy / FICAM / Kantara, David Walker, 05/06/2013
- RE: [AD-Assurance] Microsoft Strategy / FICAM / Kantara, Capehart,Jeffrey D, 05/06/2013
- Re: [AD-Assurance] Microsoft Strategy / FICAM / Kantara, David Walker, 05/07/2013
- Re: [AD-Assurance] Microsoft Strategy / FICAM / Kantara, Ann West, 05/07/2013
- RE: [AD-Assurance] Microsoft Strategy / FICAM / Kantara, Capehart,Jeffrey D, 05/07/2013
- Re: [AD-Assurance] Microsoft Strategy / FICAM / Kantara, David Walker, 05/07/2013
- RE: [AD-Assurance] Microsoft Strategy / FICAM / Kantara, Capehart,Jeffrey D, 05/08/2013
- Re: [AD-Assurance] Microsoft Strategy / FICAM / Kantara, Ann West, 05/08/2013
- Re: [AD-Assurance] Microsoft Strategy / FICAM / Kantara, David Walker, 05/08/2013
- RE: [AD-Assurance] Microsoft Strategy / FICAM / Kantara, Capehart,Jeffrey D, 05/08/2013
- Re: [AD-Assurance] Microsoft Strategy / FICAM / Kantara, David Walker, 05/07/2013
- Re: [AD-Assurance] Microsoft Strategy / FICAM / Kantara, David Walker, 05/07/2013
- RE: [AD-Assurance] Microsoft Strategy / FICAM / Kantara, Capehart,Jeffrey D, 05/06/2013
- Re: [AD-Assurance] Microsoft Strategy / FICAM / Kantara, David Walker, 05/06/2013
Archive powered by MHonArc 2.6.16.