Re: [OPSAWG] I-D Action: draft-ietf-opsawg-tacacs-tls13-03.txt

"Joe Clarke (jclarke)" <jclarke@cisco.com> Wed, 05 July 2023 15:17 UTC

Return-Path: <jclarke@cisco.com>
X-Original-To: opsawg@ietfa.amsl.com
Delivered-To: opsawg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 24BC4C14CE29 for <opsawg@ietfa.amsl.com>; Wed, 5 Jul 2023 08:17:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.593
X-Spam-Level:
X-Spam-Status: No, score=-9.593 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b="HnnxQ2fx"; dkim=pass (1024-bit key) header.d=cisco.com header.b="eA6MCQVX"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id t1-y3rQS4cBe for <opsawg@ietfa.amsl.com>; Wed, 5 Jul 2023 08:17:35 -0700 (PDT)
Received: from rcdn-iport-8.cisco.com (rcdn-iport-8.cisco.com [173.37.86.79]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2FF21C15108A for <opsawg@ietf.org>; Wed, 5 Jul 2023 08:17:35 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=29219; q=dns/txt; s=iport; t=1688570255; x=1689779855; h=from:to:subject:date:message-id:references:in-reply-to: mime-version; bh=BvlS2P4e3HuLnziOMRWAcLtlj8mY7GMOL3UuE5nuvZA=; b=HnnxQ2fxluFyAHkK+9mD8tXWGx9W16lS+OSaZlVl/AgiCBAoNDKolgn8 yzfKHjqhX3TwbwSzBIPE6ScTuMvZnRDFEBMsCfqsjkiC77APa6hoTawzh k3vJRNYLtX65oaHjsygK4GUs8u0d1Lc5aaEwfwwOUOgZAFidR5lILb7yn E=;
X-IPAS-Result: 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
IronPort-PHdr: A9a23:fA03dxXV3xT1FEX9jIuTvQweHX7V8K0xAWYlg6HPw5pUeailupP6M 1OauLNmjUTCWsPQ7PcXw+bVsqW1QWUb+t7Bq3ENdpVQSgUIwdsbhQ0uAcOJSAX7IffmYjZ8H ZFqX15+9Hb9Ok9QS47lf1OHmnSp9nYJHwnncw98J+D7AInX2sa80+mo+JD7aARTjz37arR3f 126qAzLvZwOiJB5YuYpnwLUq2FBffhXw24gKVOIyhD74MrxtJI2+CVLsPVn/MlFOZg=
IronPort-Data: A9a23:sWLy06KgRkDiO3wdFE+RspUlxSXFcZb7ZxGr2PjKsXjdYENS0jJTn TYYCjuAbPbeYmr2c490PoXl90NV75KDzNFlSFcd+CA2RRqmiyZq6fd1j6vUF3nPRiEWZBs/t 63yUvGZcIZsCCW0Si6FatANl1EkvU2zbuS6ULes1hxZH1c+E39+0U87wYbVv6Yx6TSHK1LV0 T/Ni5W31G+Ng1aY5UpNtspvADs21BjDkGtwUm4WPJinj3eC/5UhN6/zEInqR5fOria4KcbhL wrL5OnREmo0ZH7BAPv9+lrwWhVirrI/oWFih1IOM5VOjCSuqQQ1/fcdOas/UH5QljelvfZ60 cliqrmZHFJB0q3kwIzxUjFCGC14eKZB4rKCfz60sNeYyAvNdH6EL/dGVR5te9ZHvLcsRzgTq pT0KxhVBvyHr+C9xLuhSeREjcU4J86tN4Qa0p1l5W6EVa93HMyfK0nMzeBI0RQqps4TJu/fa ekIQgh2bCrRehIabz/7D7pnzLv32RETaQZwr0qOrLU4y2ne0AI316LiWOc5YfSQTslT202fv G+DoSLyAwoRM5qUzj/tHm+QavHnmgyqfo9DN4SB8eNorH+1zXUPJwIzfA7uyRWmsXKWV9VaI k0S3yMhq6ku6UCmJuURuTXl/RZoWTZBBbJt//0GBBKlkfWLvl7IboQQZnsQN4x87Z5eqSkCj wfRx7vU6SpTXKp5oE9xG5+Opj+0fCMSN2JHO2kPTBAO5J/op4RbYvPzojRLTvTdYj7dQGGYL 9W2QM4W2+x7YSkji/zTwLw/q2jwzqUltyZsjuktYkqr7xlieKmubJGy5F7Q4J5oddjJHgXQ4 SRfx5HFsYji6K1hcgTTGI3h+5n3v5643MH02jaD4rF4rW32oi7/FWyuyGAueS+FzfroiRewM BOM5mu9FbdYPWChaudscpmtBsExpZUM5vy7Ps04muFmO8ArHCfepXkGTRfJgwjFzhN2+YlhY sjzTCpZJStAYUiR5GDoF751PH5C7n1W+F4/srihl077iurEPS/MIVrHWXPXBt0EAGq/iFy92 /5UNtCBzFNUV+iWX8Ud2dd7wYwiRZTjOa3Llg==
IronPort-HdrOrdr: A9a23:FctByqA4wF14xnHlHegesceALOsnbusQ8zAXPh9KKCC9I/b3qy nxppsmPEfP+UossREb8+xoS5PwPk80lKQFrLX5WI3DYOCIghrREGgP1/qG/9SkIVyCygc/79 YtT0EdMqyKMbESt6+Ti2XIcKdD/DDEytHTuQ609QYLcegeUdAY0+4PMHf8LqQZfngjOXM+Lv ehz/sCgwDlVWUcb8y9CHVAdfPEvcf3mJXvZgNDLwI76SGV5AnYpoLSIly95FMzQjlPybAt/S zuiAri/JiutPm911v1y3LT1ZJLg9Hso+EzRfBky/JlagkEuDzYJriJaIfy+QzdZ9vfrGrCpe O84CvI+f4DrE85MFvF5ycFkDOQrgrGo0WSuGNwx0GT7vAQgFkBepJ8bUUzSGqB16It0esMoJ 5jziaXsYFaAgjHmzm479/UVwtynk7xunY6l/UP5kYvGbf2RYUh27D3xnklWasoDWb/8sQqAe NuBMbT6LJfdk6bdWnQui1qzMa3Vno+Ex+aSgxa0/blmQR+jTR81Q8V1cYflnAP+NY0TIRF/f 3NNuBtmKtVRsEbYKphDKMKQNexCGbKXRXQWVjiamjPBeUCITbAupT36LI66KWjf4EJ1oI7nN DbXFZRpQcJCjXT4A21rel2Gzz2MRCAtG7Wu7JjDrBCy8/BeIY=
X-Talos-CUID: 9a23:3+OfNWsdH74E122VemdTnuDf6IsiXSz7wSbzGna/FGRFapueUEO/54ZNxp8=
X-Talos-MUID: 9a23:Bd84WAom7S8etkOVGcQezw5yOeRyw6rzM1kMn7YXkPudNRJhIjjI2Q==
X-IronPort-Anti-Spam-Filtered: true
Received: from rcdn-core-6.cisco.com ([173.37.93.157]) by rcdn-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 05 Jul 2023 15:17:34 +0000
Received: from rcdn-opgw-5.cisco.com (rcdn-opgw-5.cisco.com [72.163.7.169]) by rcdn-core-6.cisco.com (8.15.2/8.15.2) with ESMTPS id 365FHXEJ022328 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for <opsawg@ietf.org>; Wed, 5 Jul 2023 15:17:34 GMT
Authentication-Results: rcdn-opgw-5.cisco.com; dkim=pass (signature verified) header.i=@cisco.com; spf=Pass smtp.mailfrom=jclarke@cisco.com; dmarc=pass (p=quarantine dis=none) d=cisco.com
X-IronPort-AV: E=Sophos;i="6.01,183,1684800000"; d="scan'208,217";a="3835381"
Received: from mail-dm6nam11lp2177.outbound.protection.outlook.com (HELO NAM11-DM6-obe.outbound.protection.outlook.com) ([104.47.57.177]) by rcdn-opgw-5.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 05 Jul 2023 15:17:33 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=OAlnRmPgVhAzRS64B7QTMd7hINoGCR8piLobBvhGaQgmAkA4C6GhVYtHYvCDYswJfWJJLdOQR5FPsLVNuDood5OGJRUCOcue+KExAtoNq4SyJ5CgNvj1l+Wk/+ojsN/xGc1H0eyij68JUtTWqakS7Vv6VPyMpV5wtnqGdOdlyI+r0BRiraj9CzNGMo5yvWfyiJLvDsCW8JSQrdU7ATmJKI3xgGDHSUSF5Jwo7wSsGnWmyWm0K65lFEqZJLaZliS4wKQCX5zKHZ5jaIguPLIkqN63LwnlmP4E12nhWRF7PfMUKENAC31TluGjZ3NzDK+bokt6J7eCwkANh1L0ePSwPQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=+lj21mibanomNRhmj+HITY28z0MZMME2nYKpDvlZsqw=; b=X9zvanY5gZ25dOp3Ci4e3CcB85YRKe1sG5buDIY7gWI2s7m2lfTUHAuhT5nJdNxTSrI5kWjCAF9so/GOrUHOOQUf4QMsqc2Ji8j1SK5TzpwyRHQe57TovYWYTs5O41IxUaIGEJjyRskF86yQW/BC2UYKimrIOp6vznzWvJ2+UKio+ihzReoMHotq1mzl6rJFliEHb3GXlBo1Uy51TasdMA7QFTB+OetUDwaDKyDJLd34WSFqpvTXI9347dt2f0fOnYqd/FMagCaN1IJD9nOsW9Cu5abc6CuJ6/EIVyy/7rhevlmaKoct8UmcT09mcirXKjXZvY3kDT5yGgNROIhNKg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=+lj21mibanomNRhmj+HITY28z0MZMME2nYKpDvlZsqw=; b=eA6MCQVXGYOJFFdGcIAZ3SZ93BllkgtvcokLUg1xi740gvqiSbTjDJDAxSH6ckZBehbG++EROisjBvwlxrZ8qEPCsoaYtTkMJexcS2z/WVE6FUYyp0xl6gNktTZv9BJECLwXRcS2TfHIEtpBwnegRXF5fyG/STm0Fdsw7dImmmQ=
Received: from BN9PR11MB5371.namprd11.prod.outlook.com (2603:10b6:408:11c::11) by SJ0PR11MB4878.namprd11.prod.outlook.com (2603:10b6:a03:2d8::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6544.24; Wed, 5 Jul 2023 15:17:31 +0000
Received: from BN9PR11MB5371.namprd11.prod.outlook.com ([fe80::365e:8627:9e70:45ef]) by BN9PR11MB5371.namprd11.prod.outlook.com ([fe80::365e:8627:9e70:45ef%4]) with mapi id 15.20.6544.024; Wed, 5 Jul 2023 15:17:31 +0000
From: "Joe Clarke (jclarke)" <jclarke@cisco.com>
To: "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "opsawg@ietf.org" <opsawg@ietf.org>
Thread-Topic: [OPSAWG] I-D Action: draft-ietf-opsawg-tacacs-tls13-03.txt
Thread-Index: AQHZqpnQi7GkEw7UXEuuj7Oe45XXqq+rQtf7gAAHCmCAAAYNrw==
Date: Wed, 05 Jul 2023 15:17:31 +0000
Message-ID: <BN9PR11MB5371BABF4EBC116C901D16F2B82FA@BN9PR11MB5371.namprd11.prod.outlook.com>
References: <168805050611.46147.7135705558590726585@ietfa.amsl.com> <BN9PR11MB537112089669BC32EF2C0772B82FA@BN9PR11MB5371.namprd11.prod.outlook.com> <DU2PR02MB10160503322FB68A7CBFA3988882FA@DU2PR02MB10160.eurprd02.prod.outlook.com>
In-Reply-To: <DU2PR02MB10160503322FB68A7CBFA3988882FA@DU2PR02MB10160.eurprd02.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Enabled=True; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SiteId=90c7a20a-f34b-40bf-bc48-b9253b6f5d20; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SetDate=2023-07-05T14:47:52.0000000Z; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Name=unrestricted_parent.2; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ContentBits=0; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Method=Privileged
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BN9PR11MB5371:EE_|SJ0PR11MB4878:EE_
x-ms-office365-filtering-correlation-id: 9f0d85e6-ec36-4f6b-0167-08db7d6af3e0
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: ORPuY9BiEO8sOTjFDVv/Wi+HCddp5tqVrOb4wY4Cwew2TsiOFkhETikUSgj7tt/4lsQ0YVlMWAmVfo1rRuKeaotBBdDZDDyCFox9tTamH/IZYJyEjnhBmahymLitPW9yUcN7+IxHemGkjkqQGF/nZoZavDEMoELIrTpsItZtncVbWOlT/KnmzgualpYPsAV240eqh7gL+WpepTq9KEh5CklXMZgspE1VQ5uuMHJbWLfE4u4IeJkohYpO6gOnGmRPmZ6rCzxXb+9Npf7vceSfniZjBuLwqghrDmx189dGtfxPAiGcL+INc6T4ba67uCRjGg3Bjxo26xV5df7ky4vWQHl0jNyC3ZrRStn+/kOCeRCnjeAtC80cy/Ts87q4oM088Hb0oCwCMwIG3hY2/I6XN9Q907nETego5lHdSk/bXRlIiw4eDYG9gyMMQc+eNHRmyDTlwEeALefre4Qrbozs0VGXaJgBqunZaKD55J+83IB8AM6tIKAziqF24IGoIW8Er7+opWGQ5/669phItKUlt3/DQpk0oKnyffMYf33WzDa0XLHuPmaJJkbhZim2SBJo7WsCHcygFIOoysBRHkhOXQ630lXbnZEd+YhnzSrRseoTycGeh3PsBLlWKbC/ttzVwkgk4enydgG2ek/kRZA8Ig==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BN9PR11MB5371.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(4636009)(39860400002)(346002)(376002)(366004)(136003)(396003)(451199021)(478600001)(9686003)(966005)(6506007)(71200400001)(86362001)(186003)(38100700002)(53546011)(66446008)(66946007)(66476007)(66556008)(83380400001)(110136005)(66574015)(64756008)(7696005)(91956017)(166002)(76116006)(316002)(122000001)(8676002)(52536014)(8936002)(21615005)(38070700005)(41300700001)(2906002)(55016003)(5660300002)(33656002); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_BN9PR11MB5371BABF4EBC116C901D16F2B82FABN9PR11MB5371namp_"
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN9PR11MB5371.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 9f0d85e6-ec36-4f6b-0167-08db7d6af3e0
X-MS-Exchange-CrossTenant-originalarrivaltime: 05 Jul 2023 15:17:31.4387 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: Nrz1IyT4M71k2DgumDL8t1wh9Cp9jmw+pBuNo2Zt0n0r/GBzgpsUqDsasHIDESYGJkHkznHkCqRDriDO0mU64A==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR11MB4878
X-Outbound-SMTP-Client: 72.163.7.169, rcdn-opgw-5.cisco.com
X-Outbound-Node: rcdn-core-6.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsawg/WcD68g2kWfHIUpDOokI7ZNbXqZA>
Subject: Re: [OPSAWG] I-D Action: draft-ietf-opsawg-tacacs-tls13-03.txt
X-BeenThere: opsawg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: OPSA Working Group Mail List <opsawg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsawg>, <mailto:opsawg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsawg/>
List-Post: <mailto:opsawg@ietf.org>
List-Help: <mailto:opsawg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsawg>, <mailto:opsawg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Jul 2023 15:17:40 -0000

Fair point.  I was agreeing to the dedicated port for tacacss.  That said, I do believe tacacss meets the secure requirement set forth in 7605 with respect to creating a new, secure service that replicates and insecure service in a non-backwards compatible way.

That part of Section 7.1 should be cited as a justification for the assignment.

Joe

From: mohamed.boucadair@orange.com <mohamed.boucadair@orange.com>
Date: Wednesday, July 5, 2023 at 11:04
To: Joe Clarke (jclarke) <jclarke@cisco.com>, opsawg@ietf.org <opsawg@ietf.org>
Subject: RE: [OPSAWG] I-D Action: draft-ietf-opsawg-tacacs-tls13-03.txt
Hi Joe, all,

On the port number point, I’m afraid that the arguments in Section 8 are more for justifying why distinct port numbers might be useful, not why a well-known port number has to be assigned. I would suggest to strengthen that part before making the request (see more in rfc6335#section-7.2 and also rfc7605#section-7).
Cheers,
Med

De : OPSAWG <opsawg-bounces@ietf.org> De la part de Joe Clarke (jclarke)
Envoyé : mercredi 5 juillet 2023 16:42
À : opsawg@ietf.org
Objet : Re: [OPSAWG] I-D Action: draft-ietf-opsawg-tacacs-tls13-03.txt

Thanks for the update on this document.  I’ve reviewed this new version in its entirety.  To summarize:


·         TACACS+ TLS will use a dedicated “tacacss” TCP port number

·         Obfuscation is prohibited by TACACS+ TLS compliant clients/servers (within the tunnel)

These were two issues I believe were discussion points in the WG.  As a contributor, I am convinced that both make sense for the reasons put forth in the draft.  Hopefully during the migration process, implementors won’t forget the obfuscation on non-TLS sessions.

I like the migration section, but I am curious why, after migration, one would need any legacy servers at all (regardless of server lists).  I can see having my “DEVICE_ADMIN” T+ list having both TLS servers first followed by legacy servers while I sus out the stability of the new implementation.  But when I’m satisfied, I likely would remove the legacy servers altogether.  Moreover, at least with Cisco config, I assume I’d have each server defined with various TLS attributes and it wouldn’t matter what list they are in.

I guess what I’m suggesting is dropping the second paragraph in Section 6.2 and saying something to the effect of, when migration from legacy, obfuscated T+ to T+ TLS, insecure and secure servers MAY be mixed in redundant service lists.  However, secure servers SHOULD be tried first before falling back to insecure servers.

As a nit, Indication is misspelled in Section 3.3.

As co-chair:


·         WG, please review this draft!

·         Authors, any thoughts to what port number to use for tacacss or whatever IANA can assign?  I’d like to see a few more reviews before pinging the ADs on early allocation.

·         Are there any implementations of this thus far?  If so having an Appendix for them would help.

Joe

From: OPSAWG <opsawg-bounces@ietf.org<mailto:opsawg-bounces@ietf.org>> on behalf of internet-drafts@ietf.org<mailto:internet-drafts@ietf.org> <internet-drafts@ietf.org<mailto:internet-drafts@ietf.org>>
Date: Thursday, June 29, 2023 at 10:55
To: i-d-announce@ietf.org<mailto:i-d-announce@ietf.org> <i-d-announce@ietf.org<mailto:i-d-announce@ietf.org>>
Cc: opsawg@ietf.org<mailto:opsawg@ietf.org> <opsawg@ietf.org<mailto:opsawg@ietf.org>>
Subject: [OPSAWG] I-D Action: draft-ietf-opsawg-tacacs-tls13-03.txt

A New Internet-Draft is available from the on-line Internet-Drafts
directories. This Internet-Draft is a work item of the Operations and
Management Area Working Group (OPSAWG) WG of the IETF.

   Title           : TACACS+ TLS 1.3
   Authors         : Thorsten Dahm
                     Douglas Gash
                     Andrej Ota
                     John Heasley
   Filename        : draft-ietf-opsawg-tacacs-tls13-03.txt
   Pages           : 12
   Date            : 2023-06-29

Abstract:
   The TACACS+ Protocol [RFC8907] provides device administration for
   routers, network access servers and other networked computing devices
   via one or more centralized servers.  This document, a companion to
   the TACACS+ protocol [RFC8907], adds Transport Layer Security
   (currently defined by TLS 1.3 [RFC8446]) support and obsoletes former
   inferior security mechanisms.

The IETF datatracker status page for this Internet-Draft is:
https://datatracker.ietf.org/doc/draft-ietf-opsawg-tacacs-tls13/

There is also an HTML version available at:
https://www.ietf.org/archive/id/draft-ietf-opsawg-tacacs-tls13-03.html

A diff from the previous version is available at:
https://author-tools.ietf.org/iddiff?url2=draft-ietf-opsawg-tacacs-tls13-03

Internet-Drafts are also available by rsync at rsync.ietf.org::internet-drafts


_______________________________________________
OPSAWG mailing list
OPSAWG@ietf.org<mailto:OPSAWG@ietf.org>
https://www.ietf.org/mailman/listinfo/opsawg

____________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc

pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler

a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,

Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.



This message and its attachments may contain confidential or privileged information that may be protected by law;

they should not be distributed, used or copied without authorisation.

If you have received this email in error, please notify the sender and delete this message and its attachments.

As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.

Thank you.