Re: [OPSAWG] Submission of new version of TACACS+ TLS Spec (V4)

"Douglas Gash (dcmgash)" <dcmgash@cisco.com> Wed, 03 January 2024 10:51 UTC

Return-Path: <dcmgash@cisco.com>
X-Original-To: opsawg@ietfa.amsl.com
Delivered-To: opsawg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 34D58C14CE39 for <opsawg@ietfa.amsl.com>; Wed, 3 Jan 2024 02:51:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.605
X-Spam-Level:
X-Spam-Status: No, score=-14.605 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OvhU5f0fBShv for <opsawg@ietfa.amsl.com>; Wed, 3 Jan 2024 02:51:41 -0800 (PST)
Received: from rcdn-iport-6.cisco.com (rcdn-iport-6.cisco.com [173.37.86.77]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D4353C14CF1F for <opsawg@ietf.org>; Wed, 3 Jan 2024 02:51:40 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; i=@cisco.com; l=36320; q=dns/txt; s=iport; t=1704279100; x=1705488700; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=isgOx7ynmyQfnF0+GXlhfsKCVsvRPoceypaiEuzW9xE=; b=hSD3tMq+2rwxpCVk6MGJKiK94uYedZAvoP0cb4vMWhyShxUmQjyNhR+T 9ghWEdWNZZ1Qw1O+VARcC74sz74Dz8BN7Xxg9Ym1szULeB8v3cBU+Q1Ze bqTKTgyqPtV1CxC52EYQRwnjX9CddC/42FGF8PHUK+ys6bvqU2qA7jE3/ Y=;
X-CSE-ConnectionGUID: zY0l6t6zTR2sIkVwHhtMmA==
X-CSE-MsgGUID: osBuoJdSSJmF6qfEbmHnFw==
X-IPAS-Result: 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
IronPort-PHdr: A9a23:GjXC+BOA9Onl+Fz47hol6nfIWUAX0o4cdiYc7p4hzrVWfbvmptLpP VfU4rNmi1qaFYnY6vcRk+PNqOigQm0P55+drWoPOIJBTR4LiMga3kQgDceJBFe9LavCZC0hF 8MEX1hgrDmgKUYAIM/lfBXJp2GqqzsbGxHxLw1wc+j+H4HblMSf3OGp8JqVaAJN13KxZLpoJ 0CupB7K/okO1JJ/I7w4zAfIpHYAd+VNkGVvI1/S1xqp7car95kl+CNV088=
IronPort-Data: A9a23:aXvdpKBYfAmiQBVW/1bjw5YqxClBgxIJ4kV8jS/XYbTApDMm32RVy mcaXGHQPvaLMGb0Kdt2Ydvi909U6pfRndQ3OVdlrnsFo1CmBibm6XV1Cm+qYkt+++WaFBoPA /02M4SGdIZsCCaE+n9BC5C5xVFkz6aEW7HgP+DNPyF1VGdMRTwo4f5Zs7ZRbrVA357hX2thh fuo+5eDYAb9gGYtWo4pw/vrRC1H7ayaVAww5jTSVdgT1HfCmn8cCo4oJK3ZBxMUlaENQ4ZW7 86apF2I1juxEyUFU7tJoZ6nGqE+eYM+CCDV4pZgtwdOtTAZzsA6+v5T2PPx8i67gR3R9zx64 I0lWZBd1W7FM4WU8NnxXSW0HAlsDPVCpqOZM0SF69eyzHPZU3vw5vBHWRRe0Y0woo6bAElU/ vAebTsKdB3G16S9wamwTa9ngcFLwMvDZdxE/Co/i2CCS696HfgvQI2SjTNc9Ds7g89HBvb2b MsCYj0pZxPFC/FKEg5JVsxmxb/z3xETdRVfs3iIoog72FPxySIvybbAOt/1fPKVEJA9ckGw/ T+eoD+jXXn2Lue3ziKe+22jru7CgS29X5gdfIBU7dZwi1GVg2cUEhBTBR2woOKyjQi1XNc3x 1EoFjQGv5lq8BK3EMvBZUejgX26oT4cR/9VOrhvgO2S8Zb87wGcD2kCazdObt06qcM7LQDGM HfUz7sF4hQx6NWopWKhy1uCkd+l1cEowYIqfyQIS04O5MPu5dF1hRPURdElG6mw5jEUJd0S6 27XxMTdr+xP5SLu60ld1QuY695LjsSRJjPZHi2NAgqYAvpRPeZJnbCA51nB9upnJ42EVFSHt 3Vss5HBtLxXXMvWynLXGL9l8FSVCxCtbWy0bblHQcBJythR0y/LkX14uWghdBkzbq7ohxezO hOM0e+u2HOjFCD3NfAsOd3Z5zUCxqn7HtOtTeHPctdLedBwcgTBlByClmbOt10BZHMEyPllU b/CKJ7EJS9DWcxPkmHsL89DiuBD+8zL7T6JLXwN5075geP2ib/8YeptDWZimchgs//d+lSOq ogBXyZIoj0GONDDjuDs2dd7BXgBLGMwAtb9rMk/SwJJClMO9L0JYxMJ/Y4cRg==
IronPort-HdrOrdr: A9a23:OERrC6y2ul0GHvrICeMPKrPxZegkLtp133Aq2lEZdPULSL36qy n+ppQmPEHP6Qr5AEtQ5+xoWJPtfZvdnaQFh7X5To3SLTUO2VHYYL2KgrGSuQEIdxeOktK1kJ 0QDJSWa+eAQmSS7/yKnTVQeuxIqLLogcLY4Ns2jU0dMT2CAJsQljuRfzzraXGeMzM2fabReq DsgfZvln6LQ1hSRMK9AXUOQujEoPP2tL+OW3Q7Li9iwjOjyRez5pDHMzXw5HojujV0rosKwC zgqUjU96+ju/a0xlv3zGnI9albn9Pn159qGNGMotJ9EESsti+YIKBaH5GStjE8p++irHwwls PXnhsmN8Nvr1vMY2COpwf30QWI6kdv15ai8y7avZLQm729eNsIMbsEuWufSGqf16MUhqA/7E uM5RPei3MYN2KYoM233am5a/gjrDvGnZNlq59cs5SaOrFuM4O4auckjRtoOYZFEyTg5I89Fu 5ySMna+fZNaFufK2vUp2913bWXLz8O9zq9MwE/U/auonBrtWE8y1FdyN0Un38G+p54Q55Y5/ 7cOqAtkL1VVMcZYa90Ge9EGKKMeyHwaAOJNHjXLUXsFakBNX6Io5nr4K8t7OXvfJAT1pM9lJ nITVsdv28vfEDlD9GIwfRwg1rwaXT4WS6oxtBV5pB/tLG5TL33MTebQFRriMekq+V3OLysZx 9yAuMgPxbOFxqbJW8S5XyNZ3B7EwhqbPEo
X-Talos-CUID: 9a23:J6e7AWgWQTMGxQp8eKYuYGFH4DJuYEyFyCnMfV2EMzxyab6rVn+Q5IZhup87
X-Talos-MUID: 9a23:ZjKvcwxq1Zu1pShYmDv7U/721OmaqKO1Il0Ks5k9gOuBG3JpNRqXiRSxbJByfw==
X-IronPort-Anti-Spam-Filtered: true
Received: from rcdn-core-8.cisco.com ([173.37.93.144]) by rcdn-iport-6.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 03 Jan 2024 10:51:39 +0000
Received: from alln-opgw-1.cisco.com (alln-opgw-1.cisco.com [173.37.147.229]) by rcdn-core-8.cisco.com (8.15.2/8.15.2) with ESMTPS id 403ApdS5012616 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for <opsawg@ietf.org>; Wed, 3 Jan 2024 10:51:39 GMT
X-CSE-ConnectionGUID: UoTq+QD5ReiGG+L4/rqpRQ==
X-CSE-MsgGUID: k4/AP8W4RDKiSt9wd+7ILg==
Authentication-Results: alln-opgw-1.cisco.com; dkim=pass (signature verified) header.i=@cisco.com; spf=Pass smtp.mailfrom=dcmgash@cisco.com; dmarc=pass (p=quarantine dis=none) d=cisco.com
X-IronPort-AV: E=Sophos;i="6.04,327,1695686400"; d="scan'208,217";a="18494509"
Received: from mail-mw2nam04lp2168.outbound.protection.outlook.com (HELO NAM04-MW2-obe.outbound.protection.outlook.com) ([104.47.73.168]) by alln-opgw-1.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 03 Jan 2024 10:51:38 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Air0bFDdjBhA2xDk6Y+NgUQvvMdgjVj73GWkAUQ/Dfe3gRHG5jM9VGGm9bgfjFJVGrrxwlNQhCMFHgi2BTcVOw0hGLCtEI3NR3Yz2Tgt+5IOTm1fgWCZIxnjCHGOZTw1fTKlyzu9uqy4BSw2+XcVKVVQdF977k0cPRSUO50/zSpCZ0LXEhbxCSzmWF6X98hNGN1j+jAVL3IOyn72uq9gQfDqOnz/8U74bYM8eGw6L9OfOGda2jYyprpGwoOc+uwAwgLivNph7PwQGfQi4q2pvWDk+jwX/uOrloMbEhgztZ2BybBKgXhmGxrLR1oRcIbKKsolDbegr04Ku2qiGn9uHQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=isgOx7ynmyQfnF0+GXlhfsKCVsvRPoceypaiEuzW9xE=; b=Yb4F/UJqh61O8zR0SLfVmWOWfzro7IHBvey875KPKT4To3vAqiQrgSM3OEtV8VgYzHTLKffKfFPjg59Jqb5RDkadI3GwIslWJbraTSr86gnPFoff+7uXoZFNWwJYZCJb0wzWqkv14gUm4VJxX1oC0Wo24Tj7kEweXMo4GLo1TQZBlReNUH/TEpwQigELU6FHEb9cG6wtVVQpmwSa+mV4nn3/WSWHesTnwoXuSUuFs4VyYRr0LefyRBc41tC0SgUIAwRlP02c/0vwMxkVGCrS7zQuSAdCqnGv53Eg7hRzqa2OTCGKNPL9MpWVRCs8ouD5GRAWXLZHHTfrQhLqbg5pfA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
Received: from DM4PR11MB6384.namprd11.prod.outlook.com (2603:10b6:8:8a::11) by SJ2PR11MB8346.namprd11.prod.outlook.com (2603:10b6:a03:536::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7159.13; Wed, 3 Jan 2024 10:51:36 +0000
Received: from DM4PR11MB6384.namprd11.prod.outlook.com ([fe80::82c4:765:7b1:196f]) by DM4PR11MB6384.namprd11.prod.outlook.com ([fe80::82c4:765:7b1:196f%7]) with mapi id 15.20.7135.023; Wed, 3 Jan 2024 10:51:35 +0000
From: "Douglas Gash (dcmgash)" <dcmgash@cisco.com>
To: Alan DeKok <aland@deployingradius.com>
CC: "opsawg@ietf.org" <opsawg@ietf.org>, John Heasly <heas@shrubbery.net>, Andrej Ota <andrej@ota.si>
Thread-Topic: [OPSAWG] Submission of new version of TACACS+ TLS Spec (V4)
Thread-Index: AQHaNPX0ejHHIV+6kEWYbEbyJeE0bbC/fvIAgAhqyno=
Date: Wed, 03 Jan 2024 10:51:35 +0000
Message-ID: <DM4PR11MB6384E57E57834EC09B725C51B760A@DM4PR11MB6384.namprd11.prod.outlook.com>
References: <BL3PR11MB63644D3F5582B72ECC98B6BEB794A@BL3PR11MB6364.namprd11.prod.outlook.com> <51549EE7-6065-407F-8A2E-D179B1AA8D54@deployingradius.com>
In-Reply-To: <51549EE7-6065-407F-8A2E-D179B1AA8D54@deployingradius.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: DM4PR11MB6384:EE_|SJ2PR11MB8346:EE_
x-ms-office365-filtering-correlation-id: df88eb3a-1052-4b91-4c1c-08dc0c49f4c5
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DM4PR11MB6384.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(376002)(39860400002)(396003)(136003)(346002)(366004)(230922051799003)(451199024)(64100799003)(1800799012)(186009)(2906002)(38100700002)(66899024)(166002)(38070700009)(86362001)(41300700001)(33656002)(55016003)(9326002)(966005)(8676002)(8936002)(71200400001)(83380400001)(6916009)(64756008)(66446008)(66476007)(66556008)(7696005)(66946007)(76116006)(54906003)(316002)(5660300002)(478600001)(53546011)(122000001)(52536014)(4326008)(9686003)(6506007); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_DM4PR11MB6384E57E57834EC09B725C51B760ADM4PR11MB6384namp_"
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM4PR11MB6384.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: df88eb3a-1052-4b91-4c1c-08dc0c49f4c5
X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Jan 2024 10:51:35.8252 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: fgko6sHT7lseV+ykDs1PP1pJolvGrVrVV3R0wPvPfZjU8pHsnrkpiCNwfkUIQWei1zhbzqHCqL1V1Osv6bNGbw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ2PR11MB8346
X-Outbound-SMTP-Client: 173.37.147.229, alln-opgw-1.cisco.com
X-Outbound-Node: rcdn-core-8.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsawg/LU3bTp6f9hLXh4ON9P5Hy3r-yu8>
Subject: Re: [OPSAWG] Submission of new version of TACACS+ TLS Spec (V4)
X-BeenThere: opsawg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: OPSA Working Group Mail List <opsawg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsawg>, <mailto:opsawg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsawg/>
List-Post: <mailto:opsawg@ietf.org>
List-Help: <mailto:opsawg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsawg>, <mailto:opsawg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Jan 2024 10:51:45 -0000

Hi Alan,

Many thanks for your feedback, as ever, we appreciate your valuable time and insights. We have added your comments as issues for tracking and resolution in the next version.

Please see inline for some initial response:

From: Alan DeKok <aland@deployingradius.com>
Date: Friday, 29 December 2023 at 01:15
To: Douglas Gash (dcmgash) <dcmgash@cisco.com>
Cc: opsawg@ietf.org <opsawg@ietf.org>, John Heasly <heas@shrubbery.net>, Andrej Ota <andrej@ota.si>
Subject: Re: [OPSAWG] Submission of new version of TACACS+ TLS Spec (V4)
On Dec 22, 2023, at 11:53 AM, Douglas Gash (dcmgash) <dcmgash=40cisco.com@dmarc.ietf.org> wrote:
> Some brief notes regarding the broader topics raised in v3, all items of course, are open for re-aligning as the group sees fit.
>
>        • Regarding the allocation of a specific port, a key motivation concerns the pervasive use of default ports in current configurations. Ensuring the client implementations work correctly with default ports now TLS is introduced, to minimise burden for operators whilst avoiding wrinkles with downgrade attacks does require said new default port to be allocated, and we will explicitly mention this in a new section in the new doc. We hope this should help account for our request for an allocated port.

  I think it's reasonable to allow use of the old port.  I would add a section explaining why this choice was made.  Perhaps also adding some text on how packet inspection systems / firewalls can distinguish the two protocols over the same port.

  For example, it may be useful for firewalls to allow TACACS+ traffic, but only if it's encrypted.

  The non-TLS TACAC+ connections have the first octet as 0xc0 or 0xc1, and the second octet is 0x01, 0x02, or 0x03.  Whereas TLS begins with a TLS handshake 0x16, followed by the TLS major version 0x03.

   I think it would be sufficient to just check the first octet.  If it's 0xc0 ... 0xcf, it's unlikely to be TLS and could be blocked.  Those values are unassigned in the TLS ContentType registry, and are likely to remain unassigned for the foreseeable future.

 I suspect that by the time those values are assigned for TLS ContentType, all uses of non-TLS TACACS+ would be long deprecated.
One of the main factors we have in mind regarding config the Secured T+ deployment, including port recommendations, is to try to do whatever we can to prevent unintended accidental mixing of secured and unsecured T+ traffic during migration of fleets of client devices, likely from different vendors with potentially different handling of default ports. In that context, we though a separate well defined port would offer advantages over re-using the original. A deployment can always override the defaults to get around a local challenge, but it wouldn’t be recommended.




>        • RFC9325 does look a timely reference, and we have tried to delegate what we can from the new TACACS+ doc to it.
>        • Tracking the discussion on the deprecation of obfuscation option inside TLS, our current reading is that:
>                • All TLS traffic must NOT use obfuscation.

  I would phrase that as "TACACS+ application data sent inside of a TLS tunnel MUST NOT use obfuscation".

>                • Setting the non-obfuscation option (TACACS has a flag for unencrypted)  is mandatory for all TLS TACACS+ traffic.

  Yes.

>                • The aim is to avoid any ambiguity and to remove MD5 operations from this level of the protocol.

  It would be good to give some explanation as to why MD5 is being removed.
Issue Tracking #14
In the document we say merely: “The MD5 Obfuscation specified in the original protocol definition is not fit for purpose,”
We’ll provide some reference as to why.



>        • We hope we have addressed the raised issues nits and ambiguities.

  It's looking good.

  Some additional nits on the new version:

* Section 2

  I would suggest some modifications to the terms.  Perhaps:

     Historic TACACS+: as defined in RFC 8907

  The intention here is to say also that it's not just "TACACS+ without TLS", but it's *historic* and should not be used.

    TACACS+TLS: TLS transport with TACACS+ as the application data
Issue Tracking #15 "Terms Cleanup"

Agreed


* Section 3

  Perhaps "TACACS+ over TLS" instead of "TLS for TACACS+" ?
Added to Issue Tracking #15 "Terms Cleanup"




  I don't think it's necessary for the first paragraph to re-explain how TACAC+ connections work.

  Perhaps also explain that TACACS+TLS is little more than a TLS wrapper around un-obfuscated TLS.  i.e. could it be implemented simply with stunnel + a historic TLS client/server?
Issue Tracking #16
We will rationalise the summary on T+, there are some restrictions on using a pure old server. Will clarify.


* Section 3.1

  Perhaps explain why the same port is being (or could be) used.
Well, as discussed above, we may have a divergence here 😉 What we actually say in the doc is: “where a different well-known system TCP/IP port is
   assigned by IANA,” so we do specify a different port. So I think we’d rather explain why a different port should be used. LMK if we have a conflict that requires resolution here, after we close that, I’ll raise appropriate ticket.


  "Therefore, TLS Hello MUST be initiated ..."

  What's a "Hello" ?  Perhaps just say instead that the connection begins with TLS, and leave it at that.

 "This document favors the predictable use of TLS security for a deployment"

  I'm not sure what that means.  Maybe "prefers" or "mandates" the use of TLS?  I find the phrasing to be confusing.
Issue Tracking #17
Agreed.


* Section 3.2.2

  It may be useful to move the TLS-PSK discussion from 5.1.3 to here.

  Though the RADEXT WG recently went through a long process of defining TLS-PSK for RADIUS.  It wasn't trivial.  See https://datatracker.ietf.org/doc/draft-ietf-radext-tls-psk/

  If the document is going to say "TLS-PSK is possible" but nothing more, then I would suggest just forbidding it.  There are a lot of details to get right with TLS-PSK.
Issue Tracking  #18
Thanks for the reference, we will attempt digestion the doc you kindly referred to, and optimise the doc structure to incorporate the elements we can extract.


* Section 3.4

  ALPN needs to have ALPN strings defined.  There's a similar (and long) discussion in https://datatracker.ietf.org/doc/draft-ietf-radext-radiusv11/

  TACACS+TLS doesn't need that level of complexity.  The RADEXT document is trying to be compatible with historic RADIUS, which is hard.  So it's a good idea to require the use of ALPN now.

  Perhaps for TACACS+TLS, just say that the client and server MUST use a particular ALPN string.  Maybe "tacacs+/12.1", which could mean both 12.0 and 12.1 versions of TACACS+,
Agreed. The doc is written on the assumption that we will negotiate a String (just like with the new port).


 Over all, I'd like to see more content in the document.  Right now it outlines how TACACS+TLS should work, but gives very little guidance to implementors or operators.  I'd suggest reading the RADEXT TLS-PSK and ALPN documents linked above.  They go into exhaustive detail about how every little bit is supposed to work.  I've found that documenting the protocol in such detail greatly improves the quality of the implementations, and is more likely to result in interoperation between the implementations.

We’ll Absorb that doc. I would prefer to defer raising an issue for tracking of the doc until we can determine the specifics to fix, and will forward details of the specific issues when we get there.
Regarding the TLS specifications and crypto choices, we have attempted as far as possible to defer to actual TLS specs docs and TLS best practices docs, such as RFC 9325. We have tried to restrict details of T+ to RFC8907, unless changes are required.
However, we do believe it is essential to help implementors and operators as much as we can at this point and will certainly be keen to leverage your experience with the docs you mention.
Many thanks as ever, please LMK on any of the answers above and regarding our potential divergence of our intent to recommend a different port.
Best Regards,
The Authors.


  Alan DeKok.