[OPSAWG]Re: New Version Notification for draft-ietf-opsawg-tacacs-tls13-06.txt: 9525 Section
"Douglas Gash (dcmgash)" <dcmgash@cisco.com> Tue, 07 May 2024 13:49 UTC
Return-Path: <dcmgash@cisco.com>
X-Original-To: opsawg@ietfa.amsl.com
Delivered-To: opsawg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 11BC6C14F6A2 for <opsawg@ietfa.amsl.com>; Tue, 7 May 2024 06:49:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -12.553
X-Spam-Level:
X-Spam-Status: No, score=-12.553 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.669, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_SPF_HELO_PERMERROR=0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rS_Awk-r2UhY for <opsawg@ietfa.amsl.com>; Tue, 7 May 2024 06:48:59 -0700 (PDT)
Received: from alln-iport-5.cisco.com (alln-iport-5.cisco.com [173.37.142.92]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EF58EC14F61F for <opsawg@ietf.org>; Tue, 7 May 2024 06:48:58 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; i=@cisco.com; l=60995; q=dns/txt; s=iport; t=1715089739; x=1716299339; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=/MEc6dEdu47GMJRtDZjd34Ldj7TAnoa9ksNDE4dIbKg=; b=ZHmcpMRXDKCBFC2ljjiE5hrH2fgbCmDBoBSWCKcwZX8w/bla/fWLTV+q 1Z8wOS3kVbC8gl+LS7oZAkPRTBXWQNojtUFQgfhtNULw00MqgrLjmO5Y2 sApSLtfDtotjmD7HujU6ca0CVnvwJMwMBwqwfHhEAIdAdyb46qjShjjLO w=;
X-CSE-ConnectionGUID: 88o31zOCT1KXX+Tm9Ro+5g==
X-CSE-MsgGUID: UggY8QhMQsupERl/UmVh8Q==
X-IPAS-Result: A0ABAADFLzpmmIYNJK1RCRkBAQEBAQEBAQEBAQEBAQEBAQESAQEBAQEBAQEBAQEBQCWBFgQBAQEBAQsBgUAxKih6AoEHEkEHhTGCcAOETl+IbQOLYYVijEcUgREDVg8BAQENAQE9BwQBAYUGAk8Jh1cCJjQJDgECBAEBAQEDAgMBAQEBAQEBAQYBAQUBAQECAQcFFAEBAQEBAQEBHhkFDhAnhTsBOAEMhlkBAQEBAQISCBNKAhACAQgRAwECIQEGByARFAkIAgQOBQgXA4JeAYIcFAMxAwEQBqZ0AYFAAoooeIE0gQGCGAWBPQIBD0HZCw2CUQaBSAGEcYMeHgEkgTGBcYIYG4RDJxuCDYEUAUKCaD6CH0IBAQEBAReBDAUBCAMHAQkaBQcSBhACg12CLwSNIoEDGx1qgihBgVEwX4EcR4MWDAEQgSt1C4EPgQVZD1oBeYZ4VHciAyYzIREBVRMXCz4JFgIWAxsUBDAPCQsmAyoGNgISDAYGBlkgFgkEIwMIBANEAyBxEQMEGgQLB3WBfIE1BBNHgTiJegxBgTyBNCmBTimBDYMTS2xAg0qBeA5ig1yEAx1AAwttPTUUGwUEHwGBGAWgJwQ1AoJKASVGBQJjBA0HBAoNDBYCAgsHDQ4BHzQCEzUIGRUGCgIXBQoCERiSPQ0LJIMPi3RHjgWUE3AKhBOMDo8qhioXhAWMfphNZJhiII1UhAGRFQIqEwQLhQUCBAIEBQIPAQEGgWU6a3BwFRqDCFIZD4EbBY0aH3YBCYJChRS6PngCOQIHAQoBAQMJiG4CJgeBSwEB
IronPort-PHdr: A9a23:7a91ohc9IYtDXjspz2swCo2WlGM/eoqcDmcuAtIPgrZKdOGk55v9e RCZ7vR2h1iPVoLeuLpIiOvT5rjpQndIoY2Av3YLbIFWWlcbhN8XkQ0tDI/NCUDyIPPwKS1vN M9DT1RiuXq8NBsdA97wMmXbuWb69jsOAlP6PAtxKP7yH9vehMG43vuy05bSeA5PwjG6ZOA6I BC/tw6ErsANmsMiMvMrxxnEqWcAd+VNkGVvI1/S1xqp7car95kl+CNV088=
IronPort-Data: A9a23:B6aaQ6ATvZtcaRVW/1Hjw5YqxClBgxIJ4kV8jS/XYbTApGh212EBz WQYDWzTaPyNYGXzLY1waYW0phwH7Mfcx9A1OVdlrnsFo1CmBibm6XV1Cm+qYkt+++WaFBoPA /02M4SGdIZsCCaE+n9BC5C5xVFkz6aEW7HgP+DNPyF1VGdMRTwo4f5Zs7ZRbrVA357hU2thh fuo+5eDYAL9hGYvWo4pw/vrRC1H7ayaVAww5jTSVdgT1HfCmn8cCo4oJK3ZBxMUlaENQ4ZW7 86apF2I1juxEyUFU7tJoZ6nGqE+eYM+CCDV4pZgtwdOtTAZzsA6+v5T2PPx8i67gR3R9zx64 I0lWZBd1W7FM4WU8NnxXSW0HAkubaodoa3gCkTmkvyjjHHDIkHrgKhhWRRe0Y0woo6bAElH8 fgebTsKdB3G3rjwy7OgQe4qjcMmRCXpFNpA4Tc7k3eAVrB/Gsyrr6bivbe02B88jcVBFO3eT 8EYcjFoKh/HZnWjP39NV8pjzbv31yiXnztwlV2alPoO403q1xFp/YLpd+fQRNzafJAA9qqfj jmbpzuiWE5y2Mak4T2d6XuzicfOkD/1HoUIG9WFGuVCiVmXwCkYDwcbEALh5/K4kUW5HdlYL iT45xbCs4BipEvwF8vadCHhg060/SIZCuBXULA1vVTlJrXv3y6VAW0NTzhkYdMgtdMrSTFC6 rNvt42zbdCImOPMIU9x5oupQSWO1T/5xFLuiAcNSQ8DptLkuox210iJRdd4G6nzhdrwcd0R/ 9xohHZg71nwpZdXv0lewbwhq2nwznQuZlVljjg7pkr/smtEiHeNPuREE2Tz4/daN5q+RVKcp nUCkMX2xLlRVMzVznTXH7xTR+7BCxO53Nv03A4H834JqmTFxpJfVd84DMxWfR42YpheJVcFn meK5VgOjHOsAJdaRfQqO93qUZtCIVnIHtX+XfecdctVfpV0b0eG+iooDXN8LEiz+HXAZZoXY M/BGe71VC5yIf0+kFKeGbxHuZd1nX9W+I8mbc2hp/hR+eDANCf9pHZsGAbmU93VG4vf+F+Pr IsAaZXRo/idOcWnChTqHUcoBQliBVAwBIv9rIpccevrH+asMDhJ5yP5qV/5R7FYog==
IronPort-HdrOrdr: A9a23:jrsPia5djy1UVz2k8wPXwYiCI+orL9Y04lQ7vn2ZFiYlEfBwxv rPoB1E737JYW4qKQ8dcLC7VJVpQRvnhPhICPoqTMaftWjdySSVxe5ZnPHfKlHbaknDH6tmpN hdmstFeZPN5DpB/LvHCWCDer5KrqjkgcWVbKXlvgtQpGpRGthdBnJCe32m+zpNNXF77PQCZf 2hz/sCjQCNPV4QacO2DGQEWe/sm/3n/aiNXTc2QzQcxE2rlz2H1J7WeiL04v4ZaVxy6IZn1V KAvx3y562lvf3+4ATbzXXv45Nfn8ak4sdfBeSX4/JlagnEu0KNXsBMSreCtDc6rKWE81Axiu TBpB8mIoBa927RRGeouhHgsjOQkwrGqkWSi2Nws0GT5fARdwhKTPapQrgpNCcx3nBQ+e2UFp g7hl5x+aAnVS8o1x6Nl+QgHysa5XZc50BS0NL6SxdkINEjgHg7l/1FwKtYfa1wbh7S+cQpFv JjA9rb4+sTeVSGb2rBtm0q29C0WG8vdy32CHTql/blmwS+pkoJhHcw1YgahDMN5Zg9Q55L66 DNNblpjqhHSosTYbhmDOkMTMOrAiiVKCi8fF66MBDiDuUKKnjNo5n47PE84/yrYoUByN83lI 7aWF1VuGYucwblCNGI3pdM7hfRKV/NEAjF24Vb/dx0q7f8TL3kPWmKT00vidKpp7EFDsjSS5 +ISdtr6j/YXB3T8KpyrnrDssNpWAwjueUuy6IGZ24=
X-Talos-CUID: 9a23:9j/k5GAjrQgdK0n6E3k38xVNCOcOTiT+/EeTH0rpM2EqFbLAHA==
X-Talos-MUID: 9a23:pmkIfgz0Uu4dPqfjYU0D5R4O95OaqJmhB3FdqJUjgtKZLQFKP3CgiQq3ErZyfw==
X-IronPort-Anti-Spam-Filtered: true
Received: from alln-core-12.cisco.com ([173.36.13.134]) by alln-iport-5.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 07 May 2024 13:48:57 +0000
Received: from alln-opgw-4.cisco.com (alln-opgw-4.cisco.com [173.37.147.252]) by alln-core-12.cisco.com (8.15.2/8.15.2) with ESMTPS id 447DmvC2028131 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for <opsawg@ietf.org>; Tue, 7 May 2024 13:48:57 GMT
X-CSE-ConnectionGUID: bVURkMqxTd2c0Amx5OlHDA==
X-CSE-MsgGUID: sZlL0LTcTY+LpJT7FM7tqA==
Authentication-Results: alln-opgw-4.cisco.com; dkim=pass (signature verified) header.i=@cisco.com; spf=Pass smtp.mailfrom=dcmgash@cisco.com; dmarc=pass (p=reject dis=none) d=cisco.com
X-IronPort-AV: E=Sophos;i="6.08,261,1712620800"; d="scan'208,217";a="29269209"
Received: from mail-dm6nam12lp2168.outbound.protection.outlook.com (HELO NAM12-DM6-obe.outbound.protection.outlook.com) ([104.47.59.168]) by alln-opgw-4.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 07 May 2024 13:48:57 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Y0dOVSez2nOGR6qGl9w0x67Kz1uEboEUNWSwywQUp5qegWB81JS09Rq568dLQwRkhqFqZSNUpFWIKC5jdROtrZHEz2Pvw2sXuUNiARQTnfUTgXDTfYqsrPVU+xa0kIAzGzk3g8CtdfTtC2DgG0MuJ32x/H6e8bgmldvE4eanx8TjhtKZv3ovTft1qcT23BKI48DQk90zfESVKLmJ0VL9EvasMuw3IaWCLcv0kCpFb1nPWzGF0ApE4LEjvDGX6I+qRHFjOrbiKnUzIxjJ2s/qOpaJ0ef4KJuMi+ZTBYq4U5lmnN4+Oo4xJrJkO/D9Cs4qMVpcqb6gdyTbA2nlg3W8jg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=/MEc6dEdu47GMJRtDZjd34Ldj7TAnoa9ksNDE4dIbKg=; b=UUxoHm5+PxYoeZiMkNVRyo5Z1sfnrk4u409oGdenVjhdj/EwYU8nMuRwFeWh+HtCpIcire9NotoeM03ShrCL2VhyiRSQC/eLyb2Izl1AKUOo4tYTzq/Z3EiqCddz3T/JkJEmEgsTJT+Zsj0hcAtFsouN64zgOtDZYkQPevzhCT54zR0TjRSCxkMKGnjBfOMHxu+NyZtAKpwNBbqQEBl243KmJK0FadB12tAowVwvL+X/9GxbeHa48LtdpWnm+wVpAhWtXW5/i7DVJDWRjH3R6VIbGE3Y9hVDN89y8QCmCxY3nXIYkTWWl364fMu4gwlvM+uabMpWBJBg+itekg/qSg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
Received: from DM4PR11MB6384.namprd11.prod.outlook.com (2603:10b6:8:8a::11) by SN7PR11MB6996.namprd11.prod.outlook.com (2603:10b6:806:2af::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7544.42; Tue, 7 May 2024 13:48:55 +0000
Received: from DM4PR11MB6384.namprd11.prod.outlook.com ([fe80::a7bd:40e8:f741:5345]) by DM4PR11MB6384.namprd11.prod.outlook.com ([fe80::a7bd:40e8:f741:5345%7]) with mapi id 15.20.7544.036; Tue, 7 May 2024 13:48:55 +0000
From: "Douglas Gash (dcmgash)" <dcmgash@cisco.com>
To: "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>
Thread-Topic: New Version Notification for draft-ietf-opsawg-tacacs-tls13-06.txt: 9525 Section
Thread-Index: AQHaoIVN59YSg/ieVE+PwkvOTBRLrw==
Date: Tue, 07 May 2024 13:48:55 +0000
Message-ID: <DM4PR11MB6384A6B3B4FEC73C64A6C937B7E42@DM4PR11MB6384.namprd11.prod.outlook.com>
References: <171094844069.8406.1730131072887926375@ietfa.amsl.com> <BL3PR11MB6364F94772DDCCC57DF18748B7332@BL3PR11MB6364.namprd11.prod.outlook.com> <DU2PR02MB10160514500051EDA4B5D1441880F2@DU2PR02MB10160.eurprd02.prod.outlook.com> <BL3PR11MB6364B8968DE1CC0E83600660B70D2@BL3PR11MB6364.namprd11.prod.outlook.com> <DU2PR02MB1016055635A500C074019FE3A880D2@DU2PR02MB10160.eurprd02.prod.outlook.com> <BL3PR11MB63646F83D464F49D9D729ACAB7122@BL3PR11MB6364.namprd11.prod.outlook.com>
In-Reply-To: <BL3PR11MB63646F83D464F49D9D729ACAB7122@BL3PR11MB6364.namprd11.prod.outlook.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Enabled=True;MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SiteId=90c7a20a-f34b-40bf-bc48-b9253b6f5d20;MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SetDate=2024-04-17T15:33:41.0000000Z;MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Name=unrestricted_parent.2;MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ContentBits=0;MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Method=Privileged
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: DM4PR11MB6384:EE_|SN7PR11MB6996:EE_
x-ms-office365-filtering-correlation-id: 83b1b395-eaf9-472d-07f2-08dc6e9c6fea
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230031|1800799015|376005|366007|38070700009;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DM4PR11MB6384.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230031)(1800799015)(376005)(366007)(38070700009);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_DM4PR11MB6384A6B3B4FEC73C64A6C937B7E42DM4PR11MB6384namp_"
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM4PR11MB6384.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 83b1b395-eaf9-472d-07f2-08dc6e9c6fea
X-MS-Exchange-CrossTenant-originalarrivaltime: 07 May 2024 13:48:55.1212 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: dJvwwXcWksZJQpl+RtDvlA/7MWtgZYhojBdwkONYwkHkQ9emVzjZ0PQTdPvJzAd+1LwLzJf9W2lrz9x+P6tm3g==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN7PR11MB6996
X-Outbound-SMTP-Client: 173.37.147.252, alln-opgw-4.cisco.com
X-Outbound-Node: alln-core-12.cisco.com
Message-ID-Hash: VEB46AFHM3H2IR2WL5GDEPZNQU3VCWOA
X-Message-ID-Hash: VEB46AFHM3H2IR2WL5GDEPZNQU3VCWOA
X-MailFrom: dcmgash@cisco.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-opsawg.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: John Heasley <heas@shrubbery.net>, Andrej Ota <andrej@ota.si>, "opsawg@ietf.org" <opsawg@ietf.org>
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [OPSAWG]Re: New Version Notification for draft-ietf-opsawg-tacacs-tls13-06.txt: 9525 Section
List-Id: OPSA Working Group Mail List <opsawg.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsawg/9KVRdXBtQ1DTxKzmezwlk_nGNAs>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsawg>
List-Help: <mailto:opsawg-request@ietf.org?subject=help>
List-Owner: <mailto:opsawg-owner@ietf.org>
List-Post: <mailto:opsawg@ietf.org>
List-Subscribe: <mailto:opsawg-join@ietf.org>
List-Unsubscribe: <mailto:opsawg-leave@ietf.org>
Hi Mohamed, having ingested 9525 (Thank you for pointing it out), we have updated the TLS Ident section thusly (NB, we moved from SN to subjectAltName as 9525 pointed out its weakness). New: 3.3. TLS Identification For the client-side validation of presented server identities, implementations MUST follow the process specified in [RFC9525]. Identifier types DNS-ID, IP-ID or SRV-ID are applicable for use with the TLS TACACS+ protocol, selected by operators depending upon the deployment design. Although limited wildcards are permitted in [RFC9525], they MUST NOT be used in presented server identities for Purposes of TLS for TACACS. For the server-side validation of client identities, implementations MUST allow operators to specify which certificate fields are to be used for client-identification, to verify that the client is a valid source for the received certificate and that it is permitted access to TACACS+. Implementations MUST support either: Network location based validation methods as described in Section 5.2 of [RFC5425]. or Client Identity validation of a shared identity in the certificate subjectAltName. This is applicable in deployments where the client securely supports an identity which is shared with the server. This approach allows a client's network location to be reconfigured without issuing a new client certificate, in this case, only the server mapping needs to be updated. Implementations SHOULD support the TLS Server Name Indication extension (Section 3 of [RFC6066]), and SHOULD include the server domain name in the SNI "server_name" extension of the client hello. Original: 3.3. TLS Identification In addition to authentication of TLS certificates, implementations MUST allow operators to specify which certificate fields are to be used for peer-identification, to verify that the peer is a valid source for the received certificate and that it is permitted access to TACACS+. Implementations MUST support either: Network location based validation methods as described in Section 5.2 of [RFC5425]. or Device Identity based validation methods where the peer's identity is used in the certificate subjectName. This is applicable in deployments where the device securely supports an identity which is shared with its peer. This approach allows a peer's network location to be reconfigured without issuing a new client certificate. Only the local server mapping needs to be updated. Implementations SHOULD support the TLS Server Name Indication extension (Section 3 of [RFC6066]), and SHOULD include the server domain name in the SNI "server_name" extension of the client hello. Certificate Provisioning is out of scope of this document. From: Douglas Gash (dcmgash) <dcmgash@cisco.com> Date: Monday, 22 April 2024 at 10:21 To: mohamed.boucadair@orange.com <mohamed.boucadair@orange.com> Cc: John Heasley <heas@shrubbery.net>, Andrej Ota <andrej@ota.si>, Thorsten Dahm <thorsten.dahm@gmail.com>, opsawg@ietf.org <opsawg@ietf.org> Subject: Re: New Version Notification for draft-ietf-opsawg-tacacs-tls13-06.txt. Thanks Mohamed, please see inline… <Doug/> From: mohamed.boucadair@orange.com <mohamed.boucadair@orange.com> Date: Friday, 19 April 2024 at 18:31 To: Douglas Gash (dcmgash) <dcmgash@cisco.com> Cc: John Heasley <heas@shrubbery.net>, Andrej Ota <andrej@ota.si>, Thorsten Dahm <thorsten.dahm@gmail.com>, opsawg@ietf.org <opsawg@ietf.org> Subject: RE: New Version Notification for draft-ietf-opsawg-tacacs-tls13-06.txt. Hi Douglas, Please see inline. Cheers, Med De : Douglas Gash (dcmgash) <dcmgash@cisco.com> Envoyé : vendredi 19 avril 2024 18:46 À : BOUCADAIR Mohamed INNOV/NET <mohamed.boucadair@orange.com> Cc : John Heasley <heas@shrubbery.net>; Andrej Ota <andrej@ota.si>; Thorsten Dahm <thorsten.dahm@gmail.com>; opsawg@ietf.org Objet : Re: New Version Notification for draft-ietf-opsawg-tacacs-tls13-06.txt. Hi Mohamad, We are working through the comments and enhancements that you kindly sent. There are two comments that we’d be grateful if you could clarify: BMI10: “What about raw public keys?” (on: Implementations MAY support TLS authentication with Pre-Shared Keys): I’m guessing this relates to fact that, as we mention only PSK, that this indicates that we mean to imply that non PSK authentications are not included. If this is the case, then for sure, we will clarify that they are. If you have something else in mind, please expand, thanks! [Med] Yeah. <Doug>Got it, will clarify that this section just relates to PSK and dosent impact the use of other PKI options</Doug> BMI16: “What about configuration of name/address/port number of the server?” (on: Certificate Provisioning is out of scope of this document.), would be grateful if you could please expand on what you had in mind here [Med] Clients should be provided with the IP address(es) and alternate port number (if the default is not used) of the server. Clients may also require to be provided with the domain name of the server. <Doug>So we didn’t have in mind any additional configuration at the T+ level other than the regular TACACS+ for this, (where clients will have servers defined and vice versa), with the caveat of the restrictions in 5.2. TACACS+ Configuration (to ensure that TLS and non TLS can be easily differentiated at implementation level to reduce the likelihood of operators accidentally mixing TLS and non TLS traffic which may lead to downgrade attacks.) </Doug> Also, given that you define “tacacss”, do you had in mind to use that for service discovery? <Doug> not at this point, it is more for IANA considerations, assuming that we do end up requesting a new port number</Doug> Please note that if a name is also provided to the client, then you may indicate that the name will be used also for rfc9525 validation to compare the domain name with the certificate that is provided. If no name is provided, do you assume that the certificate is <Doug>To restate to ensure I’m on your page : the actual T+ protocol won’t have the domain name embedded anywhere, so this is OOB of tacacs and encapsulated within the TLS transport and peer configuration, which can validate as usual as it knows the peer connection details. We will clarify that recommendation. If there is somehting we’re missing there, LMK, thanks !</Doug> BTW, I wonder whether you need to indicate whether the certificate authority that issued the server certificate will need to support at least DNS-ID and SRV-ID identifier types? I don’t think URI-ID is needed. Similarly, do we need to include a mention about wildcard “*”? I think it SHOULD NOT. <Doug>Agreed, I think there was a discussion on that, and it was discounted. We’ll make that explicit</Doug> Feel free to grab whatever useful for you. Thanks. Many thanks! From: mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.com> <mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.com>> Date: Wednesday, 17 April 2024 at 16:42 To: Douglas Gash (dcmgash) <dcmgash@cisco.com<mailto:dcmgash@cisco.com>>, opsawg@ietf.org<mailto:opsawg@ietf.org> <opsawg@ietf.org<mailto:opsawg@ietf.org>> Cc: John Heasley <heas@shrubbery.net<mailto:heas@shrubbery.net>>, Andrej Ota <andrej@ota.si<mailto:andrej@ota.si>> Subject: RE: New Version Notification for draft-ietf-opsawg-tacacs-tls13-06.txt Hi Douglas, all, Thank you for taking care of the comments. I managed to review the latest version. FWIW, the comments can be retrieved here: Pdf: https://github.com/boucadair/IETF-Drafts-Reviews/blob/master/2024/draft-ietf-opsawg-tacacs-tls13-06-rev%20Med.pdf Doc: https://github.com/boucadair/IETF-Drafts-Reviews/raw/master/2024/draft-ietf-opsawg-tacacs-tls13-06-rev%20Med.doc There are still some points to be fixed, but I think the document is getting stable more and more. Cheers, Med De : OPSAWG <opsawg-bounces@ietf.org<mailto:opsawg-bounces@ietf.org>> De la part de Douglas Gash (dcmgash) Envoyé : mercredi 20 mars 2024 16:40 À : opsawg@ietf.org<mailto:opsawg@ietf.org> Cc : John Heasley <heas@shrubbery.net<mailto:heas@shrubbery.net>>; Andrej Ota <andrej@ota.si<mailto:andrej@ota.si>> Objet : Re: [OPSAWG] New Version Notification for draft-ietf-opsawg-tacacs-tls13-06.txt Dear OPSAWG, We have uploaded a new version of the doc, primarily to address as much as possible of the comprehensive review kindly submitted by Mohamed Boucadair. We thank Mohamed for the time and trouble taken to the review the doc so thoroughly. We will be happy to discuss further any omissions or new comments and rectify quickly. And we will endeavour to respond ASAP to any other comments of any kind on the doc. Many thanks, Regards, The Authors. From: internet-drafts@ietf.org<mailto:internet-drafts@ietf.org> <internet-drafts@ietf.org<mailto:internet-drafts@ietf.org>> Date: Wednesday, 20 March 2024 at 15:27 To: Douglas Gash (dcmgash) <dcmgash@cisco.com<mailto:dcmgash@cisco.com>>, Douglas Gash (dcmgash) <dcmgash@cisco.com<mailto:dcmgash@cisco.com>>, Andrej Ota <andrej@ota.si<mailto:andrej@ota.si>>, John Heasley <heas@shrubbery.net<mailto:heas@shrubbery.net>>, Thorsten Dahm <thorsten.dahm@gmail.com<mailto:thorsten.dahm@gmail.com>> Subject: New Version Notification for draft-ietf-opsawg-tacacs-tls13-06.txt A new version of Internet-Draft draft-ietf-opsawg-tacacs-tls13-06.txt has been successfully submitted by Douglas C. Medway Gash and posted to the IETF repository. Name: draft-ietf-opsawg-tacacs-tls13 Revision: 06 Title: TACACS+ TLS 1.3 Date: 2024-03-20 Group: opsawg Pages: 15 URL: https://www.ietf.org/archive/id/draft-ietf-opsawg-tacacs-tls13-06.txt Status: https://datatracker.ietf.org/doc/draft-ietf-opsawg-tacacs-tls13/ HTML: https://www.ietf.org/archive/id/draft-ietf-opsawg-tacacs-tls13-06.html HTMLized: https://datatracker.ietf.org/doc/html/draft-ietf-opsawg-tacacs-tls13 Diff: https://author-tools.ietf.org/iddiff?url2=draft-ietf-opsawg-tacacs-tls13-06 Abstract: The Terminal Access Controller Access-Control System Plus (TACACS+) Protocol [RFC8907] provides device administration for routers, network access servers and other networked computing devices via one or more centralized servers. This document adds Transport Layer Security (TLS 1.3) support and obsoletes former inferior security mechanisms. The IETF Secretariat ____________________________________________________________________________________________________________ Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration, Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci. This message and its attachments may contain confidential or privileged information that may be protected by law; they should not be distributed, used or copied without authorisation. If you have received this email in error, please notify the sender and delete this message and its attachments. As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified. Thank you. ____________________________________________________________________________________________________________ Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration, Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci. This message and its attachments may contain confidential or privileged information that may be protected by law; they should not be distributed, used or copied without authorisation. If you have received this email in error, please notify the sender and delete this message and its attachments. As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified. Thank you.
- Re: [OPSAWG] New Version Notification for draft-i… Douglas Gash (dcmgash)
- Re: [OPSAWG] New Version Notification for draft-i… mohamed.boucadair
- Re: [OPSAWG] New Version Notification for draft-i… Douglas Gash (dcmgash)
- Re: [OPSAWG] New Version Notification for draft-i… Douglas Gash (dcmgash)
- Re: [OPSAWG] New Version Notification for draft-i… mohamed.boucadair
- Re: [OPSAWG] New Version Notification for draft-i… Douglas Gash (dcmgash)
- Re: [OPSAWG] New Version Notification for draft-i… mohamed.boucadair
- [OPSAWG]Re: New Version Notification for draft-ie… Douglas Gash (dcmgash)
- [OPSAWG]Re: New Version Notification for draft-ie… mohamed.boucadair
- [OPSAWG]Re: New Version Notification for draft-ie… Douglas Gash (dcmgash)