ad-assurance - RE: [AD-Assurance] VERY drafty alternative means statement
Subject: Meeting the InCommon Assurance profile criteria using Active Directory
List archive
- From: "Michael W. Brogan" <>
- To: "" <>
- Subject: RE: [AD-Assurance] VERY drafty alternative means statement
- Date: Fri, 9 Aug 2013 22:56:28 +0000
- Accept-language: en-US
I have a really basic question about the IAP requirements and our gaps table.
I believe we’ve interpreted section 4.2.5 (Authentication Process) to apply to any authentication events that involve a credential that is also used by the
IdP. That’s why we’ve had to spend time discussing NTLM and LDAP. But as I read through the IAP I wonder if that was the intent of the requirements: ·
Under 4.2.5 the IAP talks only about the subject and the IdP ·
Under 4.2.5.2 the IAP talks only about the subject, verifier, and relying party ·
Under 4.2.5.3 the IAP talks only about the subject and IdP ·
Under 4.2.5.5 the IAP talks only about the IdP ·
4.2.5 makes no mention of non-IdP apps I understand that attacks against authentication events involving non-IdP apps can compromise credentials also used by the IdP, but I’m questioning if section
4.2.5 has a scope any broader than authentication events involving the subject, the IdP, and the IdP’s verifier. We made this narrower interpretation at the UW during a preliminary gap analysis based on IAP 1.1. I don’t think the changes in IAP 1.2 would have affected
that interpretation. Are we making too much work for ourselves in regards to 4.2.5? --Michael From: [mailto:]
On Behalf Of David Walker In our last call, I said I'd take a stab at an alternatives means statement for the use of unapproved algorithms in AD. As I got further into writing, though, I realized I'm really not sure what we're looking for and where in the IAP we
need it. Looking over our "gaps" table, I think we need this only in 4.2.5.1 and 4.2.5.2 for MS Kerberos's use of MD4-HMAC without a tunnel, that NTLMv2 is OK, so I've written it up that way. Is that all we're concerned about, or are we also wanting
to include weaker authentication protocols like NTLMv1 and unsigned/unencrypted LDAP? I apologize that my memory of last week's discussion is not up to the task. |
- [AD-Assurance] VERY drafty alternative means statement, David Walker, 08/08/2013
- RE: [AD-Assurance] VERY drafty alternative means statement, Michael W. Brogan, 08/09/2013
- RE: [AD-Assurance] VERY drafty alternative means statement, Eric Goodman, 08/09/2013
- RE: [AD-Assurance] VERY drafty alternative means statement, Michael W. Brogan, 08/09/2013
- RE: [AD-Assurance] VERY drafty alternative means statement, Ron Thielen, 08/09/2013
- RE: [AD-Assurance] VERY drafty alternative means statement, Michael W. Brogan, 08/09/2013
- Re: [AD-Assurance] VERY drafty alternative means statement, David Walker, 08/09/2013
- RE: [AD-Assurance] VERY drafty alternative means statement, Michael W. Brogan, 08/09/2013
- Re: [AD-Assurance] VERY drafty alternative means statement, Ann West, 08/12/2013
- RE: [AD-Assurance] VERY drafty alternative means statement, Michael W. Brogan, 08/09/2013
- Re: [AD-Assurance] VERY drafty alternative means statement, David Walker, 08/09/2013
- RE: [AD-Assurance] VERY drafty alternative means statement, Eric Goodman, 08/09/2013
- RE: [AD-Assurance] VERY drafty alternative means statement, Michael W. Brogan, 08/09/2013
Archive powered by MHonArc 2.6.16.