On Fri, Oct 06, 2006 at 02:41:31PM -0400, stuartv wrote:
> Ryan,
> 
> Thanks for your input.  I have been gently pushing those who make
> the decisions here towards sftp for some time now; however, 
> ultimately that is one decision that is out of my hands.  
> According to the inspector that is doing our PCI inspection the 
> only requirement we haven't met as reguards to our FTP server is the
> one for locking out an account that has failed 3 times in a row.
> Personally I think that this requirement is rather dumb and adds
> little to security, but we have to do what the inspector wants if 
> we want certification.  I have told my supervisor of your thoughts 
> as to encrypted passwords (or the lack of in FTP) so we'll see if
> that helps. 
> 
> Thanks again,
> stuart
> 
> >You mean besides the fact that you're running FTP at all, right?
> >- PCI requires that all passwords are encrypted in transmission, and FTP
> >  doesn't do this.
> >- Depending on how you interpret the wording, PCI either prohibits or
> >  strongly discourages the use of FTP from 'untrusted' networks/hosts
> >
> >Consider replacing your FTP solution with scp/sftp.
> >
> >-Ryan

I've had the misfortune of working with auditors regarding SOX 
compliance.  I'm not sure who's coming up with these security 
policies, but they don't seem to have a background in security work.
To compound the problem, the auditors I've dealt with seemed to simply 
be following a checklist.  It's almost like the people creating the 
auditing requirements read Gene Spafford's article on "Security Myths and 
Passwords" [1] and decided to base their policies on the myths.

        So where did the change passwords once a month dictum 
        come from? Back in the days when people were using 
        mainframes without networking, the biggest uncontrolled 
        authentication concern was cracking. Resources, however, 
        were limited. As best as I can find, some DoD 
        contractors did some back-of-the-envelope calculation 
        about how long it would take to run through all the 
        possible passwords using their mainframe, and the result 
        was several months. So, they (somewhat reasonably) set 
        a password change period of 1 month as a means to defeat 
        systematic cracking attempts. This was then enshrined 
        in policy, which got published, and largely accepted by 
        others over the years. As time went on, auditors began 
        to look for this and ended up building it into their 
        best practice that they expected. It also got written 
        into several lists of security recommendations.

-Damian

[1] http://www.cerias.purdue.edu/weblogs/spaf/general/post-30/

Reply via email to