Coming from a similar type of University setting the powers that were decided 
to keep all of the various domains separate but under the same *.university.edu 
address space.  They appeared to be part of the same forest but were in fact 
multiple forests.  There were trusts setup as the main campus domain had all 
the Exchange/email severs so they controlled the email but the individual 
domains controlled who was allowed to access email and hours they could login.  
At the time the main campus was Win 2003 ffl.  Many sub domains were running 
2008 but not all.  I understand they are still doing it the same way now.  It 
just allowed for more flexibility within the University but it also keep the 
intra university fighting down.  The main campus could demand that some things 
were to be done a certain way but enforcement was really difficult for them.  
The various sub domains that I had seen were actually far better at keeping up 
with security than the main campus was.  Besides the medical colleges this 
university had a number of semi-independent research institutes.  Those had 
special needs like NDA's and control of IP that was contracted to them.  One of 
the things the main campus tried to push was McAfee AV on all machines 
controlled from a server they controlled.  That did not happen most of the 
individual forests just laughed and ask what drug they were using.  They also 
tried pushing a broken disk encryption program that only they would control 
that also saw a lot of laughter.
 
Jon
 
From: [email protected]
To: [email protected]
Subject: RE: [NTSysADM] PCI compliance and account lockout policies
Date: Wed, 25 Sep 2013 00:26:46 +0000









Leaving PCI aside for a moment…
 
We are a university and are looking at pulling our medical center users into 
the greater campus. On the medical center side they have implemented lockout (we
 do not use lockout here) and we had a long discussion about the effectiveness 
of lockouts in general.

 
At the end of the day, the purpose of lockout is to provide a mechanism to 
prevent passwords from being guessed. To be more specific, what we really want 
is
 to manage the percentage of all possible passwords that can be guessed. If 
your password policy requires and allows only a single-character, lowercase, 
English character for a password you have 26 possible passwords. Allowing 25 
failures over the life of the
 password would mean that only a hacker with my luck will not pwn the password. 
If, however, your password policy requires complex passwords that are at least 
10 characters long, are checked against a dictionary and have a mixture of 
characters/numbers/etc.,
 25 attempts would be trivial. That being said, all things being equal, the 
fewer guesses you allow, the better assurance you have that the password is not 
compromised. It will never be perfect, of course, because there is always a 
chance that someone will
 guess it right the first time.

Example: Let’s say that I have a password policy that requires users to change 
their password every 90 days. Users being users, they all wait until day 90 to
 change. Then I create a lockout policy that locks the account after 6 failed 
attempts with a 30 minute reset window. Given those parameters, a bad guy could 
make 10 guesses per hour = 240 per day  = 21,600 over the life of the password. 
That may or may not
 be acceptable in any particular environment based on use requirements and 
password entropy, but on the face of it that looks like a big number. I would 
also assert that most organizations would NOT CATCH (or at least not catch for 
a long time) a well-crafted
 guessing scheme that used these parameters, especially if it was able to get 
in the door.
 
What if I wanted more assurance than the 21,600 maximum guesses would give me? 
Using the same lockout parameters I could shorten the password age or increase
 the entropy I required in the password. But if I am willing to rethink the 
notion of lockout and the associated parameters, I can significantly increase 
the assurance AND potentially decrease the number of calls a user makes to the 
helpdesk. I might also be
 able to catch systematic compromise attempts more readily. Here is what I 
would do.
 
I would start by defining the maximum number of guesses I was willing to accept 
over the entire life of the password (which is really what I want to control
 for anyways). That decision can be made based on password composition 
requirements and what the password is used for. Next, I would keep track of 
every bad password attempt from all sources over the life of the password. I 
would also eliminate the notion of
 lockout after a few failed attempts over a short windows of time. (A guess is 
a guess… there is no difference between 1,000 guesses made in one second vs. 
making 1,000 guesses over a few days. The only thing guess reset windows do for 
us is create helpdesk
 calls.) Instead I would monitor the percentage of guesses that had been 
consumed for each password over the entire life of the password.
 
So in the example above, I want to reduce the total possible number of guesses 
for each password to 1,000 over the life of the password. I pulled 1,000 out
 of thin air for this example… my thinking here is that a normal user will not 
make 1,000 wrong guesses in three months. That number should also be able to 
handle someone fat-fingering their password in a smart-phone and not catching 
if for a day. 1,000 guesses
 is just 5 percent of the possible number above (much higher assurance) and I 
don’t have to use aggressive lockout to implement it. In terms of monitoring, 
all I do is watch the percentage of guessed passwords consumed and guess 
consumption rate for each user.
 Outliers will quickly stand out and could be monitored, trigger action from 
the security office and/or trigger a proactive help desk call to the user. Once 
the maximum number of guesses has been consumed OR the maximum age has been 
exceeded (to account for
 shoulder surfing and other compromise modes), the password would be treated as 
expired and must be changed.
 
As of today, this scheme is not possible using AD or most other authentication 
providers so this is all theoretical. But as password assurance becomes more
 critical, Microsoft and other vendors need to look at options like this to 
replace traditional, older methods in places where high-assurance, 
single-factor password authentication is required.

James Rupprecht            

Enterprise IT Architect, Microsoft Technologies

University of Kansas Information Technology    

 
 
 
 
 
 



From: [email protected] [mailto:[email protected]]
On Behalf Of Maglinger, Paul

Sent: Tuesday, September 24, 2013 5:13 PM

To: '[email protected]'

Subject: RE: [NTSysADM] PCI compliance and account lockout policies


 
But it’s what PCI requires that counts…
 


From:
[email protected] [mailto:[email protected]]
On Behalf Of Michael B. Smith

Sent: Tuesday, September 24, 2013 4:00 PM

To: [email protected]

Subject: RE: [NTSysADM] PCI compliance and account lockout policies


 
Microsoft no longer recommends using account lockout policies, instead 
requiring complex passwords.
 


From:
[email protected] [mailto:[email protected]]
On Behalf Of Ziots, Edward

Sent: Tuesday, September 24, 2013 2:43 PM

To: [email protected]

Subject: RE: [NTSysADM] PCI compliance and account lockout policies


 
Actually answered my own question: PCI DSS 2.0 documents.

8.5.13 Limit repeated access attempts by locking out the user ID after not more 
than six attempts. 
 (So asking for 3 attempts and 30 mins, abeit a little stringent is more than 
what the specification is asking which is no-more than six attempts).

 
But also note the following:
8.2 In addition to assigning a unique ID,
employ at least one of the following methods to authenticate all users:

§  Something you know, such as a password or passphrase

§  Something you have, such as a token device or smart card

§  Something you are, such as a biometric
 
So without assuming anything are those whom would have access to the PCI 
environment have the following:
1)     
Unique ID’s
2)     
Two factor Authentication.

 
Note this does not take in effect any service accounts that might be used.

 
HTH
Z
 
 
 

Edward E. Ziots, CISSP, CISA, Security +, Network +
Security Engineer
Lifespan Organization
[email protected]
Work:401-255-2497
 
 
This electronic message and any attachments may be privileged and confidential 
and protected from disclosure. If you are reading this message, but are not the
 intended recipient, nor an employee or agent responsible for delivering this 
message to the intended recipient, you are hereby notified that you are 
strictly prohibited from copying, printing, forwarding or otherwise 
disseminating this communication. If you
 have received this communication in error, please immediately notify the 
sender by replying to the message. Then, delete the message from your computer. 
Thank you.

 

 


From:
[email protected] [mailto:[email protected]]
On Behalf Of Ziots, Edward

Sent: Tuesday, September 24, 2013 1:52 PM

To: [email protected]

Subject: RE: [NTSysADM] PCI compliance and account lockout policies


 
MY question is which section in PCI explicitly states you need to use account 
lockout for compliance aspect. You are right there is a legitimate risk of 
having
 your accounts locked out, causing a DOS, but also the DOS itself would be 
pretty noisy and you should be able to detect that in your incident response 
measures.

 
Also if you are using long and complex passwords, its going to be pretty hard 
to bruteforce guess the password. (Now if they get the hash to the account then
 that is another story)
 
Z
 
Edward E. Ziots, CISSP, CISA, Security +, Network +
Security Engineer
Lifespan Organization
[email protected]
Work:401-255-2497
 
 
This electronic message and any attachments may be privileged and confidential 
and protected from disclosure. If you are reading this message, but are not the
 intended recipient, nor an employee or agent responsible for delivering this 
message to the intended recipient, you are hereby notified that you are 
strictly prohibited from copying, printing, forwarding or otherwise 
disseminating this communication. If you
 have received this communication in error, please immediately notify the 
sender by replying to the message. Then, delete the message from your computer. 
Thank you.

 
 
From:
[email protected] [mailto:[email protected]]
On Behalf Of Eric Wittersheim

Sent: Tuesday, September 24, 2013 1:20 PM

To: [email protected]

Subject: [NTSysADM] PCI compliance and account lockout policies
 


I'm wondering what you all are using for your account lockout policy if you are 
PCI compliant or something similar.  Our auditors are requesting account lock 
out after 3 attempts for a minimum duration of 30 minutes.  Our concern is what
 happens if we are brute forced and all of our users are locked out.  We 
already have very strict firewall policies in place and our network is 
segmented as well but you never know.  Do any of you use any tools that might 
help mitigate damage that can occur
 with a lockout policy in place?  


 


Thank you,


 


Eric



                                          

<<inline: image001.jpg>>

Reply via email to