ad-assurance - Re: [AD-Assurance] RE: Notes from the May 24 AD Assurance call
Subject: Meeting the InCommon Assurance profile criteria using Active Directory
List archive
- From: David Walker <>
- To:
- Subject: Re: [AD-Assurance] RE: Notes from the May 24 AD Assurance call
- Date: Mon, 03 Jun 2013 15:25:09 -0700
- Authentication-results: sfpop-ironport01.merit.edu; dkim=pass (signature verified)
I failed to complete my action item of consulting with David on “long term” vs “short term” authentication secrets. I will note that the IAP uses the term “plain text passwords” or “passwords” and not 800-63’s more general “authentication secrets”, which seems to support David’s argument that NTLMv2 and non-armored Kerberos meet the IAP “as is” for purposes of this portion of 4.2.3.5.2 (Basic Protection of Authentication Secret (B)), 4.2.3.6.1b/2 (Strong Protection of Authentication Secrets (S)). Well, I was in Hawaii, so I would have been hard to track down... Personally, I wouldn't consider a challenge or response as a secret. The secret in this form of authentication is the encryption key used to create the response from the challenge. Generally, I would assume that public key encryption would be used, so the only "secret" would be the private key that (in theory) would never leave the control of the user. The 800-82 document that Jeff referenced, though, implies a shared symmetric key (perhaps common practice for industrial control systems?), which would have many of the same risks as passwords, although still not transmitted during authentication. David On Thu, 2013-05-30 at 23:42 +0000, Eric Goodman wrote: AD Cookbook edits From: [mailto:] On Behalf Of Eric Goodman
|
- Re: [AD-Assurance] RE: Notes from the May 24 AD Assurance call, David Walker, 06/03/2013
Archive powered by MHonArc 2.6.16.