ad-assurance - RE: [AD-Assurance] RE: [aac] Assurance Cookbook: February 2014 Interpretation Sections
Subject: Meeting the InCommon Assurance profile criteria using Active Directory
List archive
RE: [AD-Assurance] RE: [aac] Assurance Cookbook: February 2014 Interpretation Sections
Chronological Thread
- From: Eric Goodman <>
- To: "" <>
- Subject: RE: [AD-Assurance] RE: [aac] Assurance Cookbook: February 2014 Interpretation Sections
- Date: Tue, 18 Mar 2014 22:45:02 +0000
- Accept-language: en-US
Based on our discussion last Friday, I am documenting the following three items:
1.
Modification to the IAP 4.2.3.6.2 Interpretation: Add the following language (I’m assuming I don’t need to actually add this language prior to sending this summary to the AAC): “We treat the following language in this requirement:
Protected Channels should be used, but Protected Channels without client authentication may be used To mean that one or the other (Protected Channels or
Protected Channels minus client authentication) MUST be used, even though a literal parsing of the sentence may imply that there is no specific requirement (the both verbs used –
should and may – imply an optional practice)”
2.
Request for clarification of distinction between IAP 4.2.3.6.2/3.
Which definition of the distinction between these sections is correct? (We lean towards the answer being “Tom’s”)
3.
Clarification of IAP overall: Is there any IAP restriction on using a protocol that meets the following criteria? (a)
Is not used by the IdP directly (b)
Does not send the password or a hashed/encrypted version of the password in the authentication interaction (c)
Uses a user’s verifier password in the authentication mechanism in a way that makes the password viable to infer by an eavesdropper? NTLMv1 in particular is a protocol that meets all of these criteria; there are websites that allow submission of an eavesdropped NTLMv1 authentication packet, and the site will return the plaintext password
within ~24 hours. Given that ·
IAP 4.2.5.x addresses authentication to the IdP (not the IdP Verifier)
·
IAP 4.2.3.6.2 only applies to Authentication Secrets used by the IdP Verifier ·
IAP 4.2.3.6.3 does not apply any specific requirements, and may (based on answer to #2, above) not apply to non-IdP Protocols/Authentication Secrets, it appears as if the IAP is silent on protocols meeting this criteria. Using NTLMv1 as an example again, while we (the Cookbook team) want to recommend against using NTLMv1, it’s unclear if it is a compliance
requirement as compared to just a recommended best practice. By comparison, NIST 800-63-2 section explicitly restricts uses of these kinds of protocols. (We understand that the IAP is distinct from 800-63, we call this out to clarify the kind of protocol behavior we
want clarity on.) From NIST 800-63-2, section 8.2.2 “Eavesdropping-resistant protocols make it impractical[27] for an Attacker to carry out an off-line attack where he or she records an authentication
protocol run and then analyzes it on his or her own system for an extended period to determine the token secret or possible token authenticators.” Footnote 27 of NIST 800-63-2 defines an entropy level to achieve the “impractical” standard (80 bits of entropy in the token secret), and requires that LoA 2 implementations meet
this “impractical” level of resistance. Is that sufficient to explain and share the information with the AAC? --- Eric From: [mailto:]
On Behalf Of Ann West We can also send your comparison chart to the AAC, Eric, and ask them to reconcile the differences. Ann On 3/11/14 6:42 PM, "Eric Goodman" <> wrote:
|
- Re: [AD-Assurance] RE: [aac] Assurance Cookbook: February 2014 Interpretation Sections, Ann West, 03/12/2014
- RE: [AD-Assurance] RE: [aac] Assurance Cookbook: February 2014 Interpretation Sections, Eric Goodman, 03/18/2014
- Re: [AD-Assurance] RE: [aac] Assurance Cookbook: February 2014 Interpretation Sections, David Walker, 03/18/2014
- RE: [AD-Assurance] RE: [aac] Assurance Cookbook: February 2014 Interpretation Sections, Eric Goodman, 03/19/2014
- Re: [AD-Assurance] RE: [aac] Assurance Cookbook: February 2014 Interpretation Sections, David Walker, 03/19/2014
- RE: [AD-Assurance] RE: [aac] Assurance Cookbook: February 2014 Interpretation Sections, Eric Goodman, 03/19/2014
- Re: [AD-Assurance] RE: [aac] Assurance Cookbook: February 2014 Interpretation Sections, David Walker, 03/18/2014
- RE: [AD-Assurance] RE: [aac] Assurance Cookbook: February 2014 Interpretation Sections, Eric Goodman, 03/18/2014
Archive powered by MHonArc 2.6.16.