On Fri, Oct 06, 2006 at 02:41:31PM -0400, stuartv wrote:
> Ryan,
>
> Thanks for your input. I have been gently pushing those who make
> the decisions here towards sftp for some time now; however,
> ultimately that is one decision that is out of my hands.
> According to the inspector that is doing our PCI inspection the
> only requirement we haven't met as reguards to our FTP server is the
> one for locking out an account that has failed 3 times in a row.
> Personally I think that this requirement is rather dumb and adds
> little to security, but we have to do what the inspector wants if
> we want certification. I have told my supervisor of your thoughts
> as to encrypted passwords (or the lack of in FTP) so we'll see if
> that helps.
>
> Thanks again,
> stuart
>
> >You mean besides the fact that you're running FTP at all, right?
> >- PCI requires that all passwords are encrypted in transmission, and FTP
> > doesn't do this.
> >- Depending on how you interpret the wording, PCI either prohibits or
> > strongly discourages the use of FTP from 'untrusted' networks/hosts
> >
> >Consider replacing your FTP solution with scp/sftp.
> >
> >-Ryan
I've had the misfortune of working with auditors regarding SOX
compliance. I'm not sure who's coming up with these security
policies, but they don't seem to have a background in security work.
To compound the problem, the auditors I've dealt with seemed to simply
be following a checklist. It's almost like the people creating the
auditing requirements read Gene Spafford's article on "Security Myths and
Passwords" [1] and decided to base their policies on the myths.
So where did the change passwords once a month dictum
come from? Back in the days when people were using
mainframes without networking, the biggest uncontrolled
authentication concern was cracking. Resources, however,
were limited. As best as I can find, some DoD
contractors did some back-of-the-envelope calculation
about how long it would take to run through all the
possible passwords using their mainframe, and the result
was several months. So, they (somewhat reasonably) set
a password change period of 1 month as a means to defeat
systematic cracking attempts. This was then enshrined
in policy, which got published, and largely accepted by
others over the years. As time went on, auditors began
to look for this and ended up building it into their
best practice that they expected. It also got written
into several lists of security recommendations.
-Damian
[1] http://www.cerias.purdue.edu/weblogs/spaf/general/post-30/