Re: [sacm] minor comments on draft-lin-sacm-nid-mp-security-baseline-03

Benjamin Kaduk <kaduk@mit.edu> Mon, 23 July 2018 21:17 UTC

Return-Path: <kaduk@mit.edu>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5DAA1130E2D for <sacm@ietfa.amsl.com>; Mon, 23 Jul 2018 14:17:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level:
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id W-wAwRJs4Apx for <sacm@ietfa.amsl.com>; Mon, 23 Jul 2018 14:17:28 -0700 (PDT)
Received: from dmz-mailsec-scanner-6.mit.edu (dmz-mailsec-scanner-6.mit.edu [18.7.68.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 71833130E73 for <sacm@ietf.org>; Mon, 23 Jul 2018 14:17:28 -0700 (PDT)
X-AuditID: 12074423-b71ff700000047aa-92-5b5645e7e255
Received: from mailhub-auth-4.mit.edu ( [18.7.62.39]) (using TLS with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by dmz-mailsec-scanner-6.mit.edu (Symantec Messaging Gateway) with SMTP id 65.B5.18346.7E5465B5; Mon, 23 Jul 2018 17:17:27 -0400 (EDT)
Received: from outgoing.mit.edu (OUTGOING-AUTH-1.MIT.EDU [18.9.28.11]) by mailhub-auth-4.mit.edu (8.13.8/8.9.2) with ESMTP id w6NLHQaF011953; Mon, 23 Jul 2018 17:17:27 -0400
Received: from kduck.kaduk.org (24-107-191-124.dhcp.stls.mo.charter.com [24.107.191.124]) (authenticated bits=56) (User authenticated as kaduk@ATHENA.MIT.EDU) by outgoing.mit.edu (8.13.8/8.12.4) with ESMTP id w6NLHN8U008324 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Mon, 23 Jul 2018 17:17:25 -0400
Date: Mon, 23 Jul 2018 16:17:23 -0500
From: Benjamin Kaduk <kaduk@mit.edu>
To: Adam Montville <adam.w.montville@gmail.com>
Cc: sacm@ietf.org
Message-ID: <20180723211722.GZ92448@kduck.kaduk.org>
References: <20180723180058.GX92448@kduck.kaduk.org> <9483592D-A262-451D-9016-35C134AFBB97@gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <9483592D-A262-451D-9016-35C134AFBB97@gmail.com>
User-Agent: Mutt/1.9.1 (2017-09-22)
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFmpileLIzCtJLcpLzFFi42IRYrdT133uGhZt0D5F3mLLwzYWixdLuxgd mDx2zrrL7rFkyU+mAKYoLpuU1JzMstQifbsErowtZ+ezFzyUrLi/ZQ9TA+MFkS5GTg4JAROJ N5/6WbsYuTiEBBYzSTxtf8MM4WxklFh9vYcVpEpI4CqTxNxp/iA2i4CqxMK3a1lAbDYBFYmG 7svMILaIgL7EzRknGUFsZgFBiU3zDoLVCAsESdx+dwFsDi/QtkXvz7BDzEyXeL5pEjtEXFDi 5MwnLBC9WhI3/r1k6mLkALKlJZb/4wAJcwrYShxY+hdslaiAssTevkPsExgFZiHpnoWkexZC 9wJG5lWMsim5Vbq5iZk5xanJusXJiXl5qUW6Znq5mSV6qSmlmxjBQeqivIPxZZ/3IUYBDkYl Ht4L30KjhVgTy4orcw8xSnIwKYnymtqHRQvxJeWnVGYkFmfEF5XmpBYfYpTgYFYS4b3EBlTO m5JYWZValA+TkuZgURLnzVnEGA30b2JJanZqakFqEUxWhoNDSYJXFRiNQoJFqempFWmZOSUI aSYOTpDhPEDDF7gA1fAWFyTmFmemQ+RPMVpynLo3ZRIzx5/3U4Hkvu5pk5iFWPLy81KlxHl1 QYYKgDRklObBzQQlHYns/TWvGMWBXhTm3QAylgeYsOCmvgJayAS0UDQZ5JvikkSElFQDo/rF ZUbsOn82vBe90dXguDnYoTtK8UtIbYWrUnjtzCqPg1emHlnUwLI+9f2dBbz+Es8aNLOkhS6r Cocx3RP8Lm19gkmj7/Y21kWcksGbD3yLEQlfeXQ5v7xW5oQlDoWfMhxKxOY+/vPt3wnLS5cd HyQqRWzy4eT8ciM48aH52Sd72s1j1ablKrEUZyQaajEXFScCAEokfSYVAwAA
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/uwjrCDDR6jZpDRWgRkg6DmcY2Zc>
Subject: Re: [sacm] minor comments on draft-lin-sacm-nid-mp-security-baseline-03
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 23 Jul 2018 21:17:31 -0000

On Mon, Jul 23, 2018 at 03:28:30PM -0500, Adam Montville wrote:
> Two good points, Ben. I have two comments inline. 
> 
> I think I mentioned this at the mic, during the SACM session, but I'm interested in whether anyone else sees value in defining a "baseline registry" over draft-based baselines (I'm still not sure that baseline is the right label for these, but I'm going with it until I think of something better). 
> 
> For example, a year from now those password complexity settings may be something the world wants to remove from the baseline... I wouldn't want to need to reopen the draft. I'd prefer to update a registry somewhere. This may be less of an issue (but not a non-issue) for network devices, and it's certainly an issue for operating systems, applications, cloud environments, and probably IoT.
> 
> If folks think this is a sane idea, I'd volunteer to create such a draft.

I'm of a mixed mind on this; it seems like something that might want more
nuance than a registry allows, and thus fit better as a BCP doc (that could
be regularly updated), though as you know the process for that is more
heavyweight.

> Kind regards,
> 
> Adam
> 
> > On Jul 23, 2018, at 1:01 PM, Benjamin Kaduk <kaduk@mit.edu> wrote:
> > 
> > During Jessica's talk I noticed a couple things I wanted to mention, but
> > that didn't seem to merit getting up to the mic:
> > 
> > There's a container for 'telnet' admin access; my understanding is that
> > there are not any applications out there that could be called "telnet" and
> > are actually secure these days (but maybe I'm missing some!); e.g.,
> > kerberized telnet mostly only uses single-DES and a lousy cipher mode, with
> > a vendor-specific option for triple-DES, which is deprecated as of my
> > document that's currently at the RFC Editor.  So we may want to have some
> > text clarifying the situation and disrecommending its use (or even remove
> > it entirely, if that's feasible).
> 
> 
> FWIW, I don't believe there's a single recent CIS Benchmark (security configuration guide) that doesn't recommend disabling telnet entirely.
> 
> > 
> > Similarly, there's a pwd-sec-policy container that describes password
> > security policies.  While it's definitely true that password policies and
> > mandatory change intervals are currently widely deployed, it's less clear
> > whether their usage should still be considered useful or a best current
> > practice -- I think I've seen some research go by that suggests that not
> > requiring character classes or frequency of change can be just as secure
> > (and, of course, if passwords can be avoided entirely that can also help).
> > So, perhaps there is room for some qualifying text here as well.
> 
> Qualifying text is a good idea. There are usually caveats accompanying more modern guidance (i.e. MFA or use of loooong passwords). At CIS, we've had a hard time reconciling both worlds while we're in a transition. There is still a large group of folks out there who find comfort in the complexity constraints and don't have faith in users to rely on long pass phrases, etc.

Indeed, this is a hard space to get universal agreement on what is "best".
Perhaps the best (sic) we can do is to document the tradeoffs involved.

-Ben