ad-assurance - RE: [AD-Assurance] NTLMv2 and Kerberos with RC4-HMAC
Subject: Meeting the InCommon Assurance profile criteria using Active Directory
List archive
- From: "Capehart,Jeffrey D" <>
- To: "" <>
- Subject: RE: [AD-Assurance] NTLMv2 and Kerberos with RC4-HMAC
- Date: Mon, 20 May 2013 21:17:57 +0000
- Accept-language: en-US
- Authentication-results: sfpop-ironport02.merit.edu; dkim=neutral (message not signed) header.i=none
David, Probably the leverage depends on the specific network level control. I’ll list some general ideas and then it would be up to each institution to identify how
they meet or exceed, as compared with the standard. Protected Channel (between IdMS system components):
Meets: IPSec with an approved algorithm, between IdMS system components Meets: SSL/TLS tunnel with Approved Algorithm ?? SSL/TLS tunnel with strong encryption but not Approved Algorithm (i.e. RC4 128-bit) ?? VLAN over routers that are part of the campus network (internal network) ?? Isolated routers with no other outside network connections (internal network) ?? Firewall/router rules limiting network access to only internal addresses (internal network) ?? NAC – network access controls require authentication prior to allowing access
Some controls that might help “protect” a server with a credential store that doesn’t meet the specs: Intrusion Detection System - identify if credential store system has been compromised (then quickly take action to remediate?) Administrative Controls
-
Are remote logins allowed or is console-only access allowed?
-
Do administrators read email or web surf on domain controllers?
-
Is anti-virus software installed and up-todate?
-
Do administrator accounts require much stronger password policy, like 15+ characters?
-
Are servers in a tightly physical-access controlled location with keycard+PIN access and recorded video monitoring?
-
Do servers have alarms/monitoring for unexpected removal or service interruption? Can anyone else think of some comparable or compensating controls that collectively may be worth consideration for alternative means on an otherwise difficult
requirement to meet to the letter? Jeff From: [mailto:]
On Behalf Of David Walker Jeff, We should probably consider some of the assumptions in NIST SP 800-63 and apply those assumptions to Bronze and Silver. For example, authentications over the internal network for AD-DS probably use the internal
(controlled) network, whereas Federated Shibboleth and SAML 2.0 authentications and assertions would be more likely to use the external network.
|
- [AD-Assurance] NTLMv2 and Kerberos with RC4-HMAC, David Walker, 05/17/2013
- RE: [AD-Assurance] NTLMv2 and Kerberos with RC4-HMAC, Brian Arkills, 05/20/2013
- Re: [AD-Assurance] NTLMv2 and Kerberos with RC4-HMAC, David Walker, 05/20/2013
- Re: [AD-Assurance] NTLMv2 and Kerberos with RC4-HMAC, David Walker, 05/20/2013
- RE: [AD-Assurance] NTLMv2 and Kerberos with RC4-HMAC, Eric Goodman, 05/20/2013
- Re: [AD-Assurance] NTLMv2 and Kerberos with RC4-HMAC, David Walker, 05/20/2013
- RE: [AD-Assurance] NTLMv2 and Kerberos with RC4-HMAC, Michael W. Brogan, 05/20/2013
- RE: [AD-Assurance] NTLMv2 and Kerberos with RC4-HMAC, Eric Goodman, 05/20/2013
- Re: [AD-Assurance] NTLMv2 and Kerberos with RC4-HMAC, David Walker, 05/20/2013
- RE: [AD-Assurance] NTLMv2 and Kerberos with RC4-HMAC, Capehart,Jeffrey D, 05/20/2013
- Re: [AD-Assurance] NTLMv2 and Kerberos with RC4-HMAC, David Walker, 05/20/2013
- RE: [AD-Assurance] NTLMv2 and Kerberos with RC4-HMAC, Capehart,Jeffrey D, 05/20/2013
- Re: [AD-Assurance] NTLMv2 and Kerberos with RC4-HMAC, David Walker, 05/20/2013
- Re: [AD-Assurance] NTLMv2 and Kerberos with RC4-HMAC, David Walker, 05/20/2013
- RE: [AD-Assurance] NTLMv2 and Kerberos with RC4-HMAC, Brian Arkills, 05/20/2013
Archive powered by MHonArc 2.6.16.