Re: [OPSAWG] Red: RFC8907 (was: Re: Can we please adopt draft-tuexen-opsawg-pcapng?)

Alan DeKok <aland@deployingradius.com> Thu, 12 November 2020 22:22 UTC

Return-Path: <aland@deployingradius.com>
X-Original-To: opsawg@ietfa.amsl.com
Delivered-To: opsawg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D4EA13A0E6E for <opsawg@ietfa.amsl.com>; Thu, 12 Nov 2020 14:22:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pn-GscZFSVt7 for <opsawg@ietfa.amsl.com>; Thu, 12 Nov 2020 14:22:33 -0800 (PST)
Received: from mail.networkradius.com (mail.networkradius.com [62.210.147.122]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 194A13A0E70 for <opsawg@ietf.org>; Thu, 12 Nov 2020 14:22:32 -0800 (PST)
Received: from [192.168.46.129] (24-52-251-6.cable.teksavvy.com [24.52.251.6]) by mail.networkradius.com (Postfix) with ESMTPSA id 582BDC9F; Thu, 12 Nov 2020 22:22:30 +0000 (UTC)
Authentication-Results: NetworkRADIUS; dmarc=none (p=none dis=none) header.from=deployingradius.com
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.120.23.2.4\))
From: Alan DeKok <aland@deployingradius.com>
In-Reply-To: <20201112220244.GD39343@faui48f.informatik.uni-erlangen.de>
Date: Thu, 12 Nov 2020 17:22:28 -0500
Cc: "Joe Clarke (jclarke)" <jclarke=40cisco.com@dmarc.ietf.org>, opsawg <opsawg@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <EF3EB8B3-3ABF-4854-95DB-49BDB6C953BD@deployingradius.com>
References: <20201111080817.g4oc75o5ufwtxd5p@anna.jacobs.jacobs-university.de> <873CA76D-E744-45CA-A82C-1228798619CB@tzi.org> <20201111092125.GF39343@faui48f.informatik.uni-erlangen.de> <079EB1DE-694E-403B-A9C5-F4ECD28DBC59@cisco.com> <20201111150739.GG39343@faui48f.informatik.uni-erlangen.de> <e195e3de-5d4a-8416-7e36-c17cec32af03@gmail.com> <9215_1605164101_5FACDC45_9215_16_1_787AE7BB302AE849A7480A190F8B933031578800@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <758CFA2F-E353-409D-987C-000C23EA0EC3@tzi.org> <22094_1605167175_5FACE847_22094_64_1_787AE7BB302AE849A7480A190F8B933031578836@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <9C197251-812E-4687-A585-4EF8B702E466@cisco.com> <20201112220244.GD39343@faui48f.informatik.uni-erlangen.de>
To: Toerless Eckert <tte@cs.fau.de>
X-Mailer: Apple Mail (2.3608.120.23.2.4)
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsawg/CMkqe7URkhJtyc7DVWFZmifJBTs>
Subject: Re: [OPSAWG] Red: RFC8907 (was: Re: Can we please adopt draft-tuexen-opsawg-pcapng?)
X-BeenThere: opsawg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: OPSA Working Group Mail List <opsawg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsawg>, <mailto:opsawg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsawg/>
List-Post: <mailto:opsawg@ietf.org>
List-Help: <mailto:opsawg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsawg>, <mailto:opsawg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 12 Nov 2020 22:22:35 -0000

On Nov 12, 2020, at 5:02 PM, Toerless Eckert <tte@cs.fau.de> wrote:
> 
> Interesting document (RFC8907).
> 
> Several problems i see that would be good to avoid (althoigh not all are applicable to subject draft):
> 
> - The RFC It does not mention who developed the protocol. It may be clear to the ones in the know
>  (or who read THEDRAFT), but i remember older RFCs that clearly state when a protocol
>  is a proprietary vendor protocol not developed by the IETF. I think this RFC should
>  have done it too for clarity. BY not writing it clearly, it looks like a particular
>  vendor endorsement by IETF in an inappropriate fashion.

  That's a reasonable point.  But the doc is "Informational", and the protocol has a 20+ year history.  So it's pretty clear where it came from.  And, that documentation does not imply endorsement.

> - This RFC does not not explain who has change control over the protocol. I would guess
>  that Cisco wants to maintain change control, but the fact alone that i have to guess
>  and that this is not written out makes this a problematic IETF product.

  Which is why the specification is Informational.  It documents existing practices.

  Updates to the protocol (if any) will be under IETF change control.

> - This RFC does seem to mix the solely vendor defined and controlled protocol with
>  a profile subset of what the IETF WG deemed to be important enough for todays use,
>  but it merges both into a single document.  It would have IMHO be a lot better to
>  have had a separate document just for the proprietary protocol (in whatever form,
>  independent submissions seems good), and then a small RFC solely with the profile.
>  That profile RFC could then even have been a BCP.

  There was a very long discussion about this topic.  The document describes WG consensus.

  In short, there was significant objection (including at the IESG level) to documenting insecure parts of the protocol, even if it was just historical practices.  The decision was to document what "worked", while deprecating the worst parts.  The remaining bits were acceptable under the "holding your nose" kind of thing.

> - Of course, if change control would have been given up by Cisco and passed to IETF
>  and this was written into the document, then merging the proprietary protocol with
>  the IETF WG defined profile would be ok. Still not my preference.

  The WG discussion was that any next step was to write a spec which pretty much wraps TACACS+ in TLS, and call it secure.  There are additional details, but that's the basic idea.

  Given the larger implementation deployment of the legacy TACACS+ protocol, it's simply impossible to make substantive changes to it.  i.e. any "clean room" redesign is just not going to be supported by _any_ vendor who currently implements TACACS+.

> - I don't understand how that RFC can have BCP14 language. I thought that was reserved to
>  standards track IETF documents ?

  That's a question for the IETF process as a whole, not for this WG.  There are many other Informational documents which use RFC 2119 language, including RFC 2866 for one.

> - I am worried about the shepherd writeup:

  That's a question for the IETF process.  The document has been published.  It's a _little_ late to be asking many of these questions.

  Alan DeKok.