ad-assurance - RE: [AD-Assurance] RE: Edits to AD Cookbook
Subject: Meeting the InCommon Assurance profile criteria using Active Directory
List archive
- From: Eric Goodman <>
- To: "" <>
- Subject: RE: [AD-Assurance] RE: Edits to AD Cookbook
- Date: Thu, 26 Sep 2013 19:54:40 +0000
- Accept-language: en-US
Thanks Ron, I think that the term service, though not defined, is used in the IAP and IAAF in more of a ITSM type context than a technical one. So, my desktop talking
to a domain controller might not be covered by 4.2.3.6.2 at all, because my desktop is not a service. However, it could be exposing Authentication Secrets in a transient fashion and covered by 4.2.3.6.3. … So, I would argue that generally non-password tokens are not in scope. Tokens that incidentally contain passwords used by the IdP or hashes of those not
using approved algorithms would be in scope. Just to clarify, you are in agreement with the text here, right? (Wasn’t sure if this was responding to the cookbook text or David’s comments). I agree with the notion that if non-password, non-IdP tokens could be used to leverage a Silver certified credential then they might be in scope; however,
that would only be if that leverage allowed you to compromise the actual “Authentication Secrets used by the IdP (or the IdP’s Verifier)”. I believe that’s what you mean by “within the context of an IdP authentication event”
although I find that a little cumbersome. Yes. The phrase “(within the context|as part|outside) of an IdP authentication event” came from the AAC’s request that we clarify that 4.2.5 only applies if
the tokens are actually being handled by the IdP or as part of generating (validating) an IdP assertion, whereas 4.2.3.6 applies for any authentication events. Again, if there’s better language I’m happy to take suggestions. I think that removing the qualifier
altogether would be ambiguous, and barring better language I’d vote for cumbersome over ambiguous. I also agree that “should” vs. “must” is an important distinction, as I pointed out back in August.
Yes, my comment “as discussed before” was meant to say “as someone else pointed out before”, and was intended to refer to that comment. :) However, I don’t have a feeling for how auditors would look at the difference. I hope to persuade them on the point. You neglected to indicate what view you hope to persuade them to here! --- Eric From: [mailto:]
On Behalf Of Ron Thielen I don’t know if this helps or not, but these are my thoughts on the 4.2.3.6 thread. The difference between 4.2.3.6.2 and 4.2.3.6.3 is that the former is scoped to exchanges between services and the latter expands to include any transient exposure
of the secret, for example through conversations between the subject and a service. Neither one “wins” over the other necessarily. I think that the term service, though not defined, is used in the IAP and IAAF in more of a ITSM type context than a technical
one. So, my desktop talking to a domain controller might not be covered by 4.2.3.6.2 at all, because my desktop is not a service. However, it could be exposing Authentication Secrets in a transient fashion and covered by 4.2.3.6.3.
One key to all of this is that the “Identity Provider” as defined in the IAAF is “The IdMS system component that issues Assertions.” While 4.2.3.6.2 and .3
talk both about non-IdP applications, they are both still scoped to “Authentication Secrets used by the IdP (or the IdP’s Verifier).” I believe that commonly AD will not be IdP because it is not “The IdMS system component that issues Assertions.” Is anyone
issuing SAML assertions from AD? So, “Authentication Secrets used by the IdP (or the IdP’s Verifier)” will never be NTLMv2 tokens. They could be NTLMv1 tokens because we know that those actually contain a hash of the password, but again it is because it
is a hash of the password used by the IdP not because it is just any old Authentication Secret. So, I would argue that generally non-password tokens are not in scope. Tokens that incidentally contain passwords used by the IdP or hashes of those not using
approved algorithms would be in scope. I agree with the notion that if non-password, non-IdP tokens could be used to leverage a Silver certified credential then they might be in scope; however, that
would only be if that leverage allowed you to compromise the actual “Authentication Secrets used by the IdP (or the IdP’s Verifier)”. I believe that’s what you mean by “within the context of an IdP authentication event”
although I find that a little cumbersome. So given all that, I disagree with the notion that a general statement about “Authentication Secrets, including non-IdP replayable tokens” suffices. The only
Authentication Secrets in scope are those that are used by the IdP or its Verifier or could be used to compromise those same secrets. Not all Authentication Secrets are equal, and not all contexts are equal. I also agree that “should” vs. “must” is an important distinction, as I pointed out back in August. However, I don’t have a feeling for how auditors would
look at the difference. I hope to persuade them on the point. Ron From:
[]
On Behalf Of Eric Goodman Most of these look fine. If I have any quibbles when editing I’ll let you know. I wanted to respond to the most substantive question you raised:
To be more precise, by our interpretations BOTH 4.2.3.6.2 and 4.2.3.6.3 apply when password authentication is used. But as 4.2.3.6.2 is the more restrictive
requirement, it would “win”. So while password-handling applications are technically covered in 4.2.3.6.3, they would still require Protected Channels (per the preceding section). So I like your language, but would want to add that caveat about passwords. If you’re questioning the interpretation of the applicability of 4.2.3.6.2 in these
cases (and I invited such scrutiny in my original message), I’m still stuck. The language in 4.2.3.6.2 refers to “Authentication Secrets used by the IdP (or the IdP’s Verifier)” being sent from “some non-IdP application to a Verifier”,
which really sounds like “passing the plaintext password” to me. Our interpretation of 4.2.3.6.2 is in line with this assumption. I will note that – as discussed before – 4.2.3.6.2 does use the language “should” and not “must” with respect to Protected Channels,
so perhaps there is no actual requirement here. I.e., campuses could choose not to use Protected Channels for these operations and claim compliance because it’s not required though that means there’s no standard for positively meeting the requirement if Protected
Channels are not used. If there’s an intent (on the part of the AAC) to exclude these non-IdP web apps collecting passwords from the requirements outlined 4.2.3.6.2, I’m still not
clear what the “non-IdP application” language is addressing in this section. --- Eric From:
[]
On Behalf Of David Walker Eric,
Two other comments:
|
- [AD-Assurance] Edits to AD Cookbook, Eric Goodman, 09/23/2013
- [AD-Assurance] RE: Edits to AD Cookbook, Eric Goodman, 09/23/2013
- [AD-Assurance] RE: Edits to AD Cookbook, Eric Goodman, 09/23/2013
- Re: [AD-Assurance] RE: Edits to AD Cookbook, David Walker, 09/24/2013
- RE: [AD-Assurance] RE: Edits to AD Cookbook, Rank, Mark, 09/24/2013
- Re: [AD-Assurance] RE: Edits to AD Cookbook, Ann West, 09/24/2013
- RE: [AD-Assurance] RE: Edits to AD Cookbook, Eric Goodman, 09/24/2013
- Re: [AD-Assurance] RE: Edits to AD Cookbook, David Walker, 09/24/2013
- Re: [AD-Assurance] RE: Edits to AD Cookbook, David Walker, 09/24/2013
- RE: [AD-Assurance] RE: Edits to AD Cookbook, Eric Goodman, 09/25/2013
- RE: [AD-Assurance] RE: Edits to AD Cookbook, Ron Thielen, 09/25/2013
- RE: [AD-Assurance] RE: Edits to AD Cookbook, Eric Goodman, 09/26/2013
- RE: [AD-Assurance] RE: Edits to AD Cookbook, Capehart,Jeffrey D, 09/26/2013
- RE: [AD-Assurance] RE: Edits to AD Cookbook, Eric Goodman, 09/26/2013
- RE: [AD-Assurance] RE: Edits to AD Cookbook, Ron Thielen, 09/25/2013
- RE: [AD-Assurance] RE: Edits to AD Cookbook, Eric Goodman, 09/27/2013
- RE: [AD-Assurance] RE: Edits to AD Cookbook, Eric Goodman, 09/25/2013
- [AD-Assurance] RE: Edits to AD Cookbook, Eric Goodman, 09/23/2013
- [AD-Assurance] RE: Edits to AD Cookbook, Eric Goodman, 09/23/2013
Archive powered by MHonArc 2.6.16.