Hi Pedro,
Current NIST recommendations are to use loooong passwords and NOT change them too frequently. 😊
-Roman
--
You received this message because you are subscribed to the Google Groups "NetSec WG - Public (CA/B Forum)" group.
To unsubscribe from this group and stop receiving emails from it, send an email to netsec+un...@groups.cabforum.org.
To view this discussion on the web visit https://groups.google.com/a/groups.cabforum.org/d/msgid/netsec/474DBF19-CB66-4065-89C2-8E28CAC8F22B%40wisekey.com.
On 6 Aug 2024, at 09:55, Roman Fischer <roman....@swisssign.com> wrote:
Hi Pedro,Current NIST recommendations are to use loooong passwords and NOT change them too frequently. 😊-RomanFrom: 'Pedro FUENTES' via NetSec WG - Public (CA/B Forum) <net...@groups.cabforum.org>
Sent: Dienstag, 6. August 2024 09:47
To: net...@groups.cabforum.org
Subject: [netsec] Question about section 2.2.5
Hello,I’d appreciate if someone can refresh me about what was the rational for this: “The CA SHALL NOT require periodic password changes with a period less than two (2) years.”
Thanks!Pedro
WISeKey SAAddress: Avenue Louis-Casaï 58 | 1216 Cointrin | SwitzerlandStay connected with WISeKeyTHIS IS A TRUSTED MAIL: This message is digitally signed with a WISeKey identity. If you get a mail from WISeKey please check the signature to avoid security risksCONFIDENTIALITY: This email and any files transmitted with it can be confidential and it’s intended solely for the use of the individual or entity to which they are addressed. If you are not the named addressee you should not disseminate, distribute or copy this e-mail. If you have received this email in error please notify the senderDISCLAIMER: WISeKey does not warrant the accuracy or completeness of this message and does not accept any liability for any errors or omissions herein as this message has been transmitted over a public network. Internet communications cannot be guaranteed to be secure or error-free as information may be intercepted, corrupted, or contain viruses. Attachments to this e-mail are checked for viruses; however, we do not accept any liability for any damage sustained by viruses and therefore you are kindly requested to check for viruses upon receipt.
--
You received this message because you are subscribed to the Google Groups "NetSec WG - Public (CA/B Forum)" group.
To unsubscribe from this group and stop receiving emails from it, send an email to netsec+un...@groups.cabforum.org.
To view this discussion on the web visit https://groups.google.com/a/groups.cabforum.org/d/msgid/netsec/474DBF19-CB66-4065-89C2-8E28CAC8F22B%40wisekey.com.
--
You received this message because you are subscribed to the Google Groups "NetSec WG - Public (CA/B Forum)" group.
To unsubscribe from this group and stop receiving emails from it, send an email to netsec+un...@groups.cabforum.org.
To view this discussion on the web visit https://groups.google.com/a/groups.cabforum.org/d/msgid/netsec/ZR0P278MB0170E42BF0E3172565E91A5BFABF2%40ZR0P278MB0170.CHEP278.PROD.OUTLOOK.COM.
I believe the current proposal that is being worked on to revamp that section, changes this to a SHOULD NOT, rather than a SHALL NOT. I don’t have the docs URL here right now though.
Regards,
Martijn
To view this discussion on the web visit https://groups.google.com/a/groups.cabforum.org/d/msgid/netsec/06A55930-B1D5-467B-9D3F-5113432A914C%40wisekey.com.
Because forcing people to change their passwords regularly causes them to use weaker passwords, for example by appending the year and just rotating that. I was actually sitting in a talk by Kevin Mitnick where he was complaining about 90 days passwords causing passwords like “Spring2018!” and decided to fix it.
Note that this requirement does not preclude changes when there IS a good reason to change it, for example, known or suspected compromise.
It just says that if you have a policy mandating password changes after a certain time period for no reason at all, that mandated rotation period must be greater than or equal to two years.
-Tim
To view this discussion on the web visit https://groups.google.com/a/groups.cabforum.org/d/msgid/netsec/CA%2B1gtabs83iWaC%2Bw3daP09E-jy7xzC1JUxP2xooybBOSs1j_NA%40mail.gmail.com.
To view this discussion on the web visit https://groups.google.com/a/groups.cabforum.org/d/msgid/netsec/SN7PR14MB6492F3A69ED92EE0E25F184C83BF2%40SN7PR14MB6492.namprd14.prod.outlook.com.
To view this discussion on the web visit https://groups.google.com/a/groups.cabforum.org/d/msgid/netsec/04A06CE0-AD1C-4DCB-AE96-57CD7E2C22DC%40apple.com.
Le 6 août 2024 à 18:20, 'Clint Wilson' via NetSec WG - Public (CA/B Forum) <net...@groups.cabforum.org> a écrit :
Exactly :)
To view this discussion on the web visit https://groups.google.com/a/groups.cabforum.org/d/msgid/netsec/04A06CE0-AD1C-4DCB-AE96-57CD7E2C22DC%40apple.com.
Is there a particular need for mandatory password rotation policies less than two years? I want to understand why people need flexibility here.
Otherwise, my opinion on whether such policies should be allowed remains unchanged. But that’s just me.
-Tim
To view this discussion on the web visit https://groups.google.com/a/groups.cabforum.org/d/msgid/netsec/C4339FF8-692A-4C4B-8524-CFDB7AFF885B%40wisekey.com.
We’ve seen at least one platform which allows a rotation requirement to be set between 30 and 730 days, which with leap years, doesn’t cut it.
To view this discussion on the web visit https://groups.google.com/a/groups.cabforum.org/d/msgid/netsec/SN7PR14MB6492EA237C07167312C00E1883BF2%40SN7PR14MB6492.namprd14.prod.outlook.com.
>Isn't this all in a section that says "where technically feasible" at the top?
Not that I could spot.
>1) You must force rotation between 30 and 730 days,
This ^^
To view this discussion on the web visit https://groups.google.com/a/groups.cabforum.org/d/msgid/netsec/SN7PR14MB6492CA84CBDF47B26523C04E83BF2%40SN7PR14MB6492.namprd14.prod.outlook.com.
2(g) in v1.7 of the NCSSRs.
It looks like it got lost in the 2.0 re-organization.
-Tim
To view this discussion on the web visit https://groups.google.com/a/groups.cabforum.org/d/msgid/netsec/SA1PR17MB6503879C54A4F83A23BB1FDBE3BF2%40SA1PR17MB6503.namprd17.prod.outlook.com.
To view this discussion on the web visit https://groups.google.com/a/groups.cabforum.org/d/msgid/netsec/SN7PR14MB6492CB2DAD8F365092A4D15B83BF2%40SN7PR14MB6492.namprd14.prod.outlook.com.
I would personally not suggest adding this back in; shifting to a SHOULD NOT effectively includes this sentiment (and a bit more) as we’re using RFC 2119 definitions of that phrase:This requirement is somewhat awkward in the current document structure, but hopefully fits better within the updated section 2.2.4. The requirement has been moved towards the end of the 2.2 “Access Management” section, as it seemed appropriate to follow Workstation and MFA/MPC requirements, but it’s certainly reasonable that it should be located elsewhere if there are opinions on the matter.The requirement has also been rephrased into 4 discrete requirements intended to:1. Remove prose not related to requirements;2. Reformat to align with draft document style; and3. Consolidate or remove duplicative requirementsSeparately, I’ve included the removal of the clause which currently heavily limits the reliability of the current requirements, i.e. “where technically feasible”.
Cheers,This phrase, or the phrase "NOT RECOMMENDED" mean that there may exist valid reasons in particular circumstances when the particular behavior is acceptable or even useful, but the full implications should be understood and the case carefully weighed before implementing any behavior described with this label.
To view this discussion on the web visit https://groups.google.com/a/groups.cabforum.org/d/msgid/netsec/SN7PR14MB6492CB2DAD8F365092A4D15B83BF2%40SN7PR14MB6492.namprd14.prod.outlook.com.
To view this discussion on the web visit https://groups.google.com/a/groups.cabforum.org/d/msgid/netsec/B69B827A-EC5D-4ABF-B6E4-5FD63A1EA2B0%40apple.com.