Action Items from June 23

(AI) Chris Misra will draft language for the FOPP, which will then be vetted by TAC and ultimately recommended to Steering

(AI) Steve will incorporate the proposed changes to the “TAC Response to Priority Planning” and send the revised document to TAC no later than June 27 for comment. The document will be finalized after the close of business on June 29 and will be sent to Kevin Morooney for consideration.

(AI) Steve will contact TAC members about draft charters for items on the TAC Work Plan in time for the July 7 TAC call.

Minutes

Attending: Tom Barton, Steve Carmody, Tom Mitchell, Mark Scheible, Jim Jokl, Scott Cantor, Kim Milford, Keith Hazelton, Albert Wu

With: Dean Woodbeck, Nick Roy, David Walker, IJ Kim, Ian Young, Tom Scavo, Mike LaHaye, Paul Caskey, Ann West 

Action Items

 TAC agreed to recommend the FOPP changes to Steering and will propose to InCommon management that incident response procedures be created and an incident response plan be documented, perhaps with the help of one or more campus security officers (and others as needed). (AI) Steve Carmody will send notes to Steering and InCommon management with these recommendations.

Approval of Minutes from June 23

Approved to make public

Ops Update

Upgrades that are in progress

  1. Upgrading to Shibboleth xmlsectool 2.0.0
  2. IJ has completed a major overhaul of the FM software stack
    1. secure linux 7.2
    2. Apache v2.4.6
    3. Ruby on Rails v4.2.6
    4. Ruby v2.2.4
    5. Postgres v9.5
  3. New database server will be installed in the coming weeks
  4. Federation Manager code now committed in Internet2's Github Enterprise account, working with a software development firm on a review of the code there.

To support the Steward Model, major changes to the Federation Manager are required. IJ has a prototype. IdP mdui:DisplayName will be editable. Will have multiple IdPs per organization (will be an undocumented feature).

The Ops Advisory Group recommends that Ops implement the following Interfederation Technical Policy rules:

  1.  Modify import filter check_idp_non_saml2
    1.  Require HTTP-Redirect OR HTTP-POST (instead of focusing on HTTP-Redirect)
  2.  Modify import filter check_shib_regscope
    1.  Continue to filter any IdP entity descriptor with a regexp scope
    2.  Implement a whitelist of approved regexp scopes
  3.  Implement import filter check_duplicate_scope
    1.  Filter imported IdP metadata having a scope belonging to an IdP registered by InCommon
  4.  Implement import filter check_dup_display
    1.  Filter imported IdP metadata with duplicate <mdui:DisplayName> values

IdPv3 upgrade communications

FOPP Suggested Text About Incident Response

After discussion at the last TAC meeting, Chris Misra reviewed the FOPP looking for a place that addresses security, with an eye toward inserting language allowing the InCommon Federation to take action should a security situation arise. He recommends this change to section 10.3.1:

10.3.1 Suspension for reasons of security

A Participant may request the suspension of any Federation services in the case of Administrator credential compromise, participant key compromise, or other security compromise within the Participant's systems. This request may be made via e-mail or telephone from the Executive or Administrator and will be verified by InCommon using trusted communication channels. Suspension may include processes such as revoking credentials, or removing or modifying Metadata.

 If InCommon suspects any compromise or negligence on the part of a Participant, it will make reasonable efforts to contact Participant to verify Participant's statusIn the case of a significant security incident that poses an unacceptable risk to InCommon or other Federation participants, InCommon may take immediate remediation actions commensurate with the impact of the incident. For example, a non-responsive Administrator's account may be suspended for the security and safety of Participant's Metadata if InCommon suspects an Administrator is no longer active and its repeated attempts at contact go unanswered.

Chris also recommended developing a document that would include InCommon’s incident response procedures, that would be approved by both TAC and InCommon Steering. 

TAC agreed to recommend the FOPP changes to Steering and will propose to InCommon management that incident response procedures be created and an incident response plan be documented, perhaps with the help of one or more campus security officers (and others as needed). (AI) Steve Carmody will send notes to Steering and InCommon management with these recommendations.

Status of TAC Work Plan

https://docs.google.com/spreadsheets/d/1-08e_nWxbxbsQsFuQiOsh_G-zqAvXf7T4Ka7dF3Ai8c/edit#gid=0

Steve Carmody provided an update on a number of items in the TAC work plan, including:

Next Meeting - Thurs., July 21, 2016 - 1 pm ET