The following settings have been applied to Campus Active Directory in order to secure credential secrets in a way that is compliant with InCommon Silver.
188.8.131.52 Stored Authentication Secrets
Authentication Secrets shall not be stored as plaintext. Access to encrypted stored Secrets and to decrypted copies shall be protected by discretionary access controls that limit access to administrators and applications that require access (see also §184.108.40.206).
Three alternative methods may be used to protect the stored Secret:
1. Authentication Secrets may be concatenated to a variable salt (variable across a group of Authentication Secrets that are stored together) and then hashed with an industry standard algorithm so that the computations used to conduct a dictionary or exhaustion attack on a stolen Authentication Secret file are not useful to attack other similar Authentication Secret files. The hashed Authentication Secrets are then stored in the Authentication Secret file. The variable salt may be composed using a global salt (common to a group of Authentication Secrets) and the userID (unique per Authentication Secret) or some other technique to ensure uniqueness of the salt within the group of Authentication Secrets; or
2. Store Secrets in encrypted form using industry standard algorithms and decrypt the needed Secret only when immediately required for authentication; or
3. Any method protecting stored Secrets at NIST [SP 800-63] Level 3 or 4 may be used.
220.127.116.11 Protected Authentication Secrets
1. Any Credential Store containing Authentication Secrets used by the IdP (or the IdP’s Verifier) is subject to the operational constraints in §18.104.22.168 and §4.2.8 (that is, the same constraints as IdMS Operations). When Authentication Secrets are sent from one Credential Store to another Credential Store (for example in an account provisioning operation) Protected Channels must be used.
2. Whenever Authentication Secrets used by the IdP (or the IdP’s Verifier) are sent between services for verification purposes (for example, an IdP to a Verifier, or some non-IdP application to a Verifier), Protected Channels should be used, but Protected Channels without client authentication may be used.
3. If Authentication Secrets used by the IdP (or the IdP’s Verifier) are exposed in a transient fashion to non-IdP applications (for example, when users sign on to those applications using these Credentials), the IdPO must have appropriate policies and procedures in place to minimize risk from this exposure.
22.214.171.124 Resist Replay Attack
The authentication process must ensure that it is impractical to achieve successful authentication by recording and replaying a previous authentication message.
126.96.36.199 Resist Eavesdropper Attack
The authentication protocol must resist an eavesdropper attack. Any eavesdropper who records all the messages passing between a Subject and a Verifier or relying party must find that it is impractical to learn the Authentication Secret or to otherwise obtain information that would allow the eavesdropper to impersonate the Subject.
188.8.131.52 Secure communication
Industry standard cryptographic operations are required between Subject and IdP in order to ensure use of a Protected Channel to communicate.
RADIUS clients must use PEAP-MS-CHAPv2 and not only MS-CHAPv2
IDS to detect NTLMv1 authentication and LDAP clear binds
Enable auditing to detect SASL binds that do not require signing and connections that are not SSL/TLS encrypted
Network security: Do not store LAN Manager hash value on next password change
Domain Controller: LDAP Server signing requirements
Network security: LDAP client signing requirements
Network security: LAN Manager authentication level
Client, service, and program incompatibilities that may occur when you modify security settings and user rights assignments
How to enable LDAP signing in Windows Server 2008