ad-assurance - RE: [AD-Assurance] RE: AD Silver Comment - AAC Response
Subject: Meeting the InCommon Assurance profile criteria using Active Directory
List archive
- From: "Capehart,Jeffrey D" <>
- To: "" <>
- Subject: RE: [AD-Assurance] RE: AD Silver Comment - AAC Response
- Date: Tue, 1 Apr 2014 20:38:09 +0000
- Accept-language: en-US
Good point Eric, regarding strong protection. I think we have an opportunity here to identify (in the cookbook) the protocols used by AD that we would consider “strong” for the “strong protection of authentication
secrets”. Now, grant you, strong encryption can be made weak by using a short, human generated password when cracking via off-line guessing. So, that said, do we need to also consider some “’entropy” concerns as well
to go along with “strong” that are at least the minimum entropy required for online guessing, but might there need to be higher entropy for the protection to be strong enough? This is where maybe a 12 char password is better than an 8 char. These extra
cookbook requirements would not be there solely to meet the IAP entropy, but to meet sufficient strength for non-IdP authentication. Also there could be a mix rather than a hard set limit of # chars, complexity, character set count, etc. My point is that the secrets aren’t going to be foolproof, but they need to have strong protection and resistance, and I think that would be excellent guidance for the cookbook to make. Think of it like a dartboard or target where a bull’s-eye is the best, 10 points. Next ring is 9 points, then 7 points. If you are below X points or maybe not even on the board, then that isn’t good enough.
If it is easy to figure out if you are compliant, then it will be easy to audit too. Jeff From: [mailto:]
On Behalf Of Eric Goodman After some digesting, I agree with Jeff that there may be details they missed that flow from our discussion, but I also think that without dragging them down our ratholes this is probably as good a read as we’d
be able to get from a committee. I could believe we could engage individuals (Hi Tom!) more, but given that they are reviewing our interpretations, I’m not sure it does make sense to get their concurrence on our listed implications. Parsing their response: AAC: We do not believe that this statement implies that Protected Channels MUST be used. There may be other controls that could provide strong protection of Authentication secrets, depending on the specific use
case. Ultimately, it will depend on whether an auditor is satisfied, should an implementer decide not to use Protected Channels. Since our interpretation does not explicitly require Protected Channels, no Alternate Means is required. The Cookbook can of course
recommend best practices as you see fit. I take it as significant that the response repeats the wording “strong protection of authentication secrets” from the title of the requirement and that they use language around “other controls that could provide
strong protection”. That is, I would now interpret this as them saying that word “strong” from the section title is itself implicitly part of the requirement, and that the specific measures listed in *.2 are giving an example measure that “strong” protection
can be compared against. Taking that point of view, I’m tempted to argue that while NTLMv1-type protocols are not explicitly addressed in the IAP, this language clarification does provide for excluding NTLMv1 support on the basis that
it fails to provide “strong protection” of passwords/authentication secrets. That is, NTLMv1 can be shown under most reasonable scenarios to not provide strong protection of the password. My only hesitation with that argument is that there’s also a possible
argument against NTLMv2 and Kerberos here (i.e. that they are not strong for some definitions of “strong”) but I’m happy avoiding that can of worms, since it starts getting into less self-evident descriptions of what “strong” means.
As far as how well the AAC understood the “Bronze requirement being stronger than the Silver one” issue, I assume this was at least considered during the overall discussion even if it wasn’t explicitly raised
(I’m making the assumption because the point was part of Ron and Tom’s discussion).
I guess going further than my comment in the first paragraph of this message, it seems that we’ve found a fairly firm limit to how much guidance we’re going to get from the AAC, and that the next validation-related
steps are more likely to be driven by auditors actually going through reviews and applications being sent to InCommon than via our more theoretical discussions. Proposed Action Items: ·
Clarification of Protected Channels in 4.2.6.2
o
Look at our categorization of protocols to ensure no language is in conflict with the updated interpretation.
o
Clarify IAP 4.2.6.2’s interpretation to match the interpretation.
o
Determine language around NTLMv1
·
IAP 4.2.6.3 clarification
o
Update the Cookbook to take IAP 4.2.6.3 out of scope of the AD Cookbook
o
Further clarify IAP 4.2.6.2’s interpretation in the Cookbook to also match the clarification (Tom’s interpretation of transmission vs. handling of passwords) here. ·
IAP silent on NTLMv1?
o
No change here, though the language may already be changed based on Protected Channels in 4.2.6.2, above. --- Eric From:
[]
On Behalf Of David Walker Yeah, wow. It would seem that this would allow a Silver-compliant system to send passwords for verification purposes in the clear. I wonder if they realize that 4.2.3.5 is Bronze only. On 04/01/2014 07:54 AM, Capehart,Jeffrey D wrote:
|
- [AD-Assurance] Fwd: AD Silver Comment - AAC Response, Eric Goodman, 04/01/2014
- [AD-Assurance] RE: AD Silver Comment - AAC Response, Capehart,Jeffrey D, 04/01/2014
- Re: [AD-Assurance] RE: AD Silver Comment - AAC Response, David Walker, 04/01/2014
- RE: [AD-Assurance] RE: AD Silver Comment - AAC Response, Eric Goodman, 04/01/2014
- RE: [AD-Assurance] RE: AD Silver Comment - AAC Response, Capehart,Jeffrey D, 04/01/2014
- RE: [AD-Assurance] RE: AD Silver Comment - AAC Response, Eric Goodman, 04/01/2014
- Re: [AD-Assurance] RE: AD Silver Comment - AAC Response, David Walker, 04/02/2014
- RE: [AD-Assurance] RE: AD Silver Comment - AAC Response, Eric Goodman, 04/02/2014
- Re: [AD-Assurance] RE: AD Silver Comment - AAC Response, David Walker, 04/02/2014
- RE: [AD-Assurance] RE: AD Silver Comment - AAC Response, Curry, Warren, 04/02/2014
- Re: [AD-Assurance] RE: AD Silver Comment - AAC Response, David Walker, 04/02/2014
- RE: [AD-Assurance] RE: AD Silver Comment - AAC Response, Eric Goodman, 04/01/2014
- RE: [AD-Assurance] RE: AD Silver Comment - AAC Response, Capehart,Jeffrey D, 04/01/2014
- RE: [AD-Assurance] RE: AD Silver Comment - AAC Response, Eric Goodman, 04/01/2014
- Re: [AD-Assurance] RE: AD Silver Comment - AAC Response, David Walker, 04/01/2014
- [AD-Assurance] RE: AD Silver Comment - AAC Response, Capehart,Jeffrey D, 04/01/2014
Archive powered by MHonArc 2.6.16.