-
-
Notifications
You must be signed in to change notification settings - Fork 680
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Is 2.9.1 a duplicate of 14.8.1 (secrets management) #2589
Comments
Seems so, pretty much the same situation as #2576 |
Agree that merging is the way to go.
|
This is typically a per-user public key (smartcard, FIDO). In the case of smart card, the public key would often come from a X509 certificate issues by a PKI. In this case, the only thing stored on the server would be the Distinguished Name associated with the user. (Hence, there is not so much to protect anyway.) For FIDO keys, the server would (I think) typically store the public key of the user's FIDO device. Protection against modification is relevant but I don't think this would be covered by a TPM or HSM, would it? On the other hand, 14.8.1 is about:
I don't think that the things we are talking about in 14.8.1 and 2.9.1 are similar, have similar security requirements and would usually be handled using similar solutions. So I'm not sure it really makes sense to merge them. |
For smartcards, surely there is still a signed certificate that needs to be stored and not modified to assure the security of the system? For FIDO keys, sounds like this is a public key where modification needs to be avoided. However, I accept that this is not really a "secret" as such. What if we reword the requirement to: "[MODIFIED, LEVEL L2 > L3] Verify that the certificates used to verify cryptographic authentication assertions are stored in a way protects them from modification." I would also add a note to the section text which says: 'Where shared or secret keys are used for cryptographic authentication, these should be stored using the same mechanisms as other system secrets, as documented in the "Secret Management" section.' What do you think @randomstuff ? |
Chapter text for 2.9:
Cryptographic authentication mechanism include smart cards or FIDO keys, where the user has to plug in or pair the cryptographic device to the computer to complete authentication. The authenticatoin server will send a challenge nonce to the cryptographic device or software, and the device or software calculates a response based upon a securely stored cryptographic key.
The requirements for single-factor cryptographic devices and software, and multi-factor cryptographic devices and software are the same, as verification of the cryptographic device proves possession of the authentication factor.
Relevant requirements for this issue:
Should 2.9.1 be merged into 14.8.1? Feels like it is covered there. Is this something that absolutely needs its own separate requirement.
@elarlang @jmanico @randomstuff
The text was updated successfully, but these errors were encountered: