ad-assurance - [AD-Assurance] RE: [aac] Assurance Cookbook: February 2014 Interpretation Sections
Subject: Meeting the InCommon Assurance profile criteria using Active Directory
List archive
[AD-Assurance] RE: [aac] Assurance Cookbook: February 2014 Interpretation Sections
Chronological Thread
- From: "Capehart,Jeffrey D" <>
- To: "" <>
- Subject: [AD-Assurance] RE: [aac] Assurance Cookbook: February 2014 Interpretation Sections
- Date: Tue, 11 Mar 2014 20:04:26 +0000
- Accept-language: en-US
Eric, I don’t have any solutions, but I thought I would try to come at the problem from a different angle and see if this covers it: I think part of the reason we had so much protocol-centric concerns with IAP 4.2.3.6.3 in the AD cookbook was because we are trying to carve out a slice where we can make AD fit into the silver profile. When we use HTTPS (with an approved cipher, of course) to transport a clear-text password, and let the IdP talk to the verifier on its own secure channel (LDAPS, start TLS, etc.) then we are “covered” for approved
algorithms from the IdP side of things regardless of whether AD uses an approved algorithm. (IAP 4.2.3.6.2) However, when AD does its own (non IdP) authentications and protocols like NTLM, etc. (as a Verifier to a non-IdP app), then AD transports the secret around perhaps in a manner that is not using approved algorithms
and so it would be helpful to identify those as either out of scope or non-IdP protocols so they don’t matter. I think we say those ‘secrets’ aren’t used by the IdP (directly). Of course, they do matter for offline password cracking (eavesdropper), but they wouldn’t matter for replay, hijack, etc., so that’s where those other cases get lumped in, even if they are covered under other
parts of the IAP. I think we already determined that IAP 4.2.5 applies only to IdP, whereas IAP 4.2.3 covers all credential technology. But maybe we’re trying to say that we’re covering most (but not all) of the same requirements needed to ensure strong
protection of authentication secrets. This gets to be where we start shaving off some of the square peg and hammering it into that round hole. Jeff From: [mailto:]
On Behalf Of Eric Goodman Hi Eric, thanks for forwarding those comments to the list! :) Chris' comment refers to the interpretation of IAP section 4.2.3.6.3. Tom Barton had also responded with comments on that section. Ironically, there are contradictory interpretations between us, Tom Barton
and Chris Spadanuda on the meaning of the sections. In short, what we seem to be saying is:
Tom's interpretation would lead me to delete IAP 4.2.3.6.3 from the Cookbook altogether (as I commented in response to his message), as it is not related to protocols or authentication, really, just in-app
handling of secrets within non-IdP applications. Chris' interpretation of IAP 4.2.3.6.3 would cause me to simplify the language in 4.2.3.6.2 to refer only to IdP use of credentials and to shift some of the language in our interpretation of IAP 4.2.3.6.2
(around use of credentials in the non-IdP applications) into IAP 4.2.3.6.3, and potentially to remove some elements from IAP 4.2.3.6.3 (around other non-IdP protocols). It's not immediately obvious to me which way to go here. My take after reviewing the section against each interpretation is that Tom's interpretation is perhaps most literally correct, so I would be inclined
to follow my previous suggestion of removing most references to IAP 4.2.3.6.3. However, if the AAC is split, it's not clear that we should use one vs. the other's interpretation. But I guess we now at least have a topic for this Friday's call! --- Eric From:
[]
On Behalf Of Eric Goodman Greetings AD Assurance folks. This was the last comment (beyond Tom and Warren's) on our current draft, which was forwarded to me (and not the list) this AM.
I will respond to this shortly with my own thoughts on Chris' input, but I wanted to let Chris' message be in the thread as its own item for easier retrieval in the future. --- Eric From: Farmer, Jacob []
From:
[]
On Behalf Of Christopher A Spadanuda My two cents. As Tom stated, it may be easier to say nothing about auth secrets that are not in the scope for the IAP. Looking at 4.2.4. Interpretation of IAP Requirement, Section 4.2.3.6.3 - Strong Protection of Authentication Secrets FWIW my interpretation of 4.2.3.6.3 is that it is not about technical replay or technical protections during transit, but more about having protections in place for situations in which a non-IdP application might try to utilize the IdP's
credentials. A mitigation might be a policy that informs users they are not to use their IdP credentials for non-IdP applications. e.g. - Users shall not use their university credentials for non-university applications such as facebook and twitter. Or "Campus
AD credentials shall not be used on the separate AD run by a School or College." Chris ___________________________________________________________________ From:
"Jacob Farmer" <> From:
[]
On Behalf Of Tom Barton Hi Eric and everyone, On 2/22/2014 12:22 AM, Eric Goodman wrote:
|
- [AD-Assurance] FW: [aac] Assurance Cookbook: February 2014 Interpretation Sections, Eric Goodman, 03/11/2014
- [AD-Assurance] RE: [aac] Assurance Cookbook: February 2014 Interpretation Sections, Eric Goodman, 03/11/2014
- [AD-Assurance] RE: [aac] Assurance Cookbook: February 2014 Interpretation Sections, Capehart,Jeffrey D, 03/11/2014
- [AD-Assurance] RE: [aac] Assurance Cookbook: February 2014 Interpretation Sections, Eric Goodman, 03/11/2014
- [AD-Assurance] RE: [aac] Assurance Cookbook: February 2014 Interpretation Sections, Capehart,Jeffrey D, 03/11/2014
- [AD-Assurance] RE: [aac] Assurance Cookbook: February 2014 Interpretation Sections, Eric Goodman, 03/11/2014
Archive powered by MHonArc 2.6.16.