Skip to Content.
Sympa Menu

assurance - RE: [Assurance] silver and two-factor ...

Subject: Assurance

List archive

RE: [Assurance] silver and two-factor ...


Chronological Thread 
  • From: "Roy, Nicholas S" <>
  • To: "" <>
  • Subject: RE: [Assurance] silver and two-factor ...
  • Date: Thu, 15 Mar 2012 20:22:10 +0000
  • Accept-language: en-US

It’s not the spirit of Level 2 - “some confidence in the asserted identity’s validity” that is hard to achieve with many campus authentication systems.  It’s the letter of the FICAM and Silver requirements re: things like salting passwords in a proscriptive way when hashing them.  That’s just not something that’s changeable in a lot of infrastructures to comply with Silver.  The spirit of that requirement is arguably being achieved via other means.  Many schools don’t let things like NTLM traffic or LDAP binds in the clear go off-campus, and actively monitor for MITM attacks.  Those types of practices meet the spirit of the requirement for “Some confidence in asserted identity’s validity,” but not the letter of some sections of the IAP.

 

If someone could assure me that I could get a Silver audit report past the Assurance review panel by saying things like “although we don’t salt our passwords, they have X bits of entropy and are hashed using A algorithm and encrypted using B cipher” where B cipher is “industry standard” but not NIST-recommended, that might help build a case that we should be using passwords for Silver.

 

Nick

 

From: [mailto:] On Behalf Of Jones, Mark B
Sent: Thursday, March 15, 2012 2:50 PM
To:
Subject: RE: [Assurance] silver and two-factor ...

 

InCommon Bronze and Silver are intended to be compatible with US federal government Identity, Credential, and Access Management (ICAM) Trust Framework Provider Adoption Process (TFPAP) Levels of Assurance 1 and 2.

http://www.incommon.org/docs/assurance/IAP_V1.1.pdf

 

The ICAM (http://www.idmanagement.gov/pages.cfm/page/ICAM) Levels of Assurance are based on OMB M-04-04 E-Authentication Guidance which describes level 1 and 2 as:

 

Level 1: Little or no confidence in the asserted identity’s validity.

Level 2: Some confidence in the asserted identity’s validity.

 

If your institution’s existing password credential is being managed at less than level 2 (meaning you are at level 1) and is being used to access student systems (FERPA), employee systems (PII), financial systems, or patient care systems (PHI), then I submit that there are plenty of justifications other than InCommon Silver qualification to overhaul your password credential management.

 

If you are of the mind that “Some confidence in the asserted identity’s validity” is not sufficient then we should not be talking about modifying Silver (which is based on a well defined standard) but instead talking about an InCommon Gold profile that would be based on OMB Level 3.

 

From: On Behalf Of David Bantz
Sent: Thursday, March 15, 2012 1:44 PM
To:
Subject: Re: [Assurance] silver and two-factor ...

 

If an institution's existing password credential management can be tweaked to meet requirements of an assurance profile (say because you already require high-entropy passwords and encrypt both store and communication of passwords) I can see how the institution justifies this effort as meeting best practices, future-proofing, and providing potential services to researchers.

 

If an institution's existing password credential management would require substantial revision - say policy changes that impact existing services or user experience - how does the institution justify the effort & cost required for those changes?  The immediate benefits appear to be limited to researchers who may require Silver LoA for some NSF or NIH services, but that's a small population on most campuses.   Are considerations like adopting best practices or increasing assurance qualitatively adequate to justify what may be seen as costly inconveniences by many users?  Or does the apparent high cost/benefit driving institutions toward adopting certificate or OTP ("two factor authN") for the small population of users initially benefitting from Silver LoA?

 

Perhaps another way of asking this question is, if you had your wish, would you make your IAM infrastructure generally Silver LoA rather than adopting OTP or certificate-based authN for a subset of users to enable them to use services requiring Silver LoA?

 

David Bantz

 

 

 

On Thu, 15 Mar 2012, at 10:12 , Roy, Nicholas S wrote:

 

Thanks David,

 

“I suggest considering cloning your existing username/password technology, probably with the same usernames but different passwords, managing it in a way that makes you feel comfortable with its Silver-ness.”

 

That’s a solution we’ve considered, but we are trying to “eat our own dog food” when it comes to using a single central campus authentication service for passwords.  If we did that it would be setting a precedent that I don’t think we want to set.  There is also the risk (and high likelihood, from other such behavior we’ve observed) that people would manually sync passwords between the two systems.

 

Using a solution like OTP tokens or personal certs is valuable in that it is a completely different type of authentication mechanism, which can be said to provide a benefit for campus beyond the existing username/password system.  It’s then an easier job of selling a new service like that, when we can say that it will benefit lots of other applications around campus that could use the service for enhanced security.  Rooting the registration process for Silver in the issuance of a token or enrollment of a certificate on something like a smart card or secure USB fob also provides a lot of advantages when trying to create the registration process necessary for Silver.

 

Nick

 

From:   On Behalf Of David Walker
Sent: Wednesday, March 14, 2012 1:01 PM
To: 
Subject: RE: [Assurance] silver and two-factor ...

 

I think there are two issues here:

  • First, is the existing authentication service good enough for Silver?
  • Second, if the answer to the first question is no, what should be done?


I think for many institutions that the answer to the first question would be something like "Well, it would be, but we have a number of the issues Nick mentioned."  That brings us to the second question.

Adding a second factor is one way to address the second question, particularly if you're already using second-factor technology.  If you're not already using that second authentication technology, though, it can be expensive.

I suggest considering cloning your existing username/password technology, probably with the same usernames but different passwords, managing it in a way that makes you feel comfortable with its Silver-ness.  I recognize that many institutions want to implement 2-factor authentication anyway, and that's fine, but the requirements for federal LoA-2 (and, therefore, Silver) are satisfied without it, so this could be a less expansive path for many institutions.

David Walker

On Wed, 2012-03-14 at 17:16 +0000, Roy, Nicholas S wrote:

A question I have is what kind of authentication services are schools running who feel that they can use passwords to achieve Silver? Specifically, what is your central source of authentication? What will end up providing the verifier role to your Silver-compliant IdP? What kind of clients of this service do you have (ERPs, *.webapp, workstations (Windows, OS X, Linux, other?), printers, file servers, network appliances, etc.) How tightly controlled is access to the service? What kinds of authentication endpoints are available (LDAP, LDAPS, Kerberos, RADIUS, web services, etc.) how are those endpoints protected and from what network scope can clients connect to them (only on-campus, off campus, only via a VPN, other?) Do you provision passwords to other authentication services that aren't your central provider? How do you plan to assess and/or enforce client behavior (for example, use of SSL for web forms that validate passwords against your authentication service), or do you consider that out of scope?

I'm not saying you can't use passwords to achieve Silver, but the project complexity seems pretty high in a big, heterogeneous campus environment.

Nick

-----Original Message-----
From:  [] On Behalf Of Steven Carmody
Sent: Tuesday, March 13, 2012 11:48 AM
To: 
Subject: [Assurance] silver and two-factor ...

I'm wondering why so many sites that are interested in Silver are so 
interested in two-factor....

I haven't looked at the Silver profile in a long time. But, my memory is 
that strong passwords, stored sufficiently securely, and not replicated 
into uncontrolled environments (eg google), would pass muster with 
Silver. I'm assuming, of course, that the other Silver criteria (eg 
around identity proofing, account claiming, etc) would also be met.

I can imagine that there may be issues with those passwords passing 
through a variety of systems (eg systems that are then authenticating 
users against a central ldap, for instance). But, that's just a guess -- 
I would be interested in hearing about specific concerns that are 
driving sites toward two-factor.

Thanks for any light you can shine on this!

 




Archive powered by MHonArc 2.6.16.

Top of Page