[OPSAWG] I-D Action: draft-dahm-opsawg-tacacs-security-00.txt (was: Re: I-D Action: draft-dahm-tacacs-security-01.txt)
John Heasley <heas@shrubbery.net> Fri, 03 June 2022 05:19 UTC
Return-Path: <heas@shrubbery.net>
X-Original-To: opsawg@ietfa.amsl.com
Delivered-To: opsawg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BA86DC15AAC9 for <opsawg@ietfa.amsl.com>; Thu, 2 Jun 2022 22:19:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.907
X-Spam-Level:
X-Spam-Status: No, score=-6.907 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PNONREwGscsJ for <opsawg@ietfa.amsl.com>; Thu, 2 Jun 2022 22:19:05 -0700 (PDT)
Received: from sea.shrubbery.net (sea.shrubbery.net [129.250.47.99]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 084D8C15AACB for <opsawg@ietf.org>; Thu, 2 Jun 2022 22:19:04 -0700 (PDT)
Received: by sea.shrubbery.net (Postfix, from userid 7053) id BF48C40C4B9; Fri, 3 Jun 2022 05:19:04 +0000 (UTC)
Date: Fri, 03 Jun 2022 05:19:04 +0000
From: John Heasley <heas@shrubbery.net>
To: opsawg@ietf.org
Cc: "dcmgash@cisco.com" <dcmgash@cisco.com>, Andrej Ota <andrej@ota.si>, John Heasley <heas@shrubbery.net>, Thorsten Dahm <thorsten.dahm@gmail.com>
Message-ID: <YpmZyGqdRjOjPKXo@shrubbery.net>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <YpmIgNMv4NKkjHm7@shrubbery.net> <165423328014.33534.11053475454976694459@ietfa.amsl.com>
X-PGPkey: http://www.shrubbery.net/~heas/public-key.asc
X-note: live free, or die!
X-homer: i just want to have a beer while i am caring.
X-Claimation: an engineer needs a manager like a fish needs a bicycle
X-reality: only YOU can put an end to the embarrassment that is Tom Cruise
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsawg/pwZQQJmFF9kJPeFxQQTMZqQORtc>
Subject: [OPSAWG] I-D Action: draft-dahm-opsawg-tacacs-security-00.txt (was: Re: I-D Action: draft-dahm-tacacs-security-01.txt)
X-BeenThere: opsawg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: OPSA Working Group Mail List <opsawg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsawg>, <mailto:opsawg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsawg/>
List-Post: <mailto:opsawg@ietf.org>
List-Help: <mailto:opsawg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsawg>, <mailto:opsawg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 Jun 2022 05:19:08 -0000
Fri, Jun 03, 2022 at 04:05:20AM +0000, John Heasley: > > A New Internet-Draft is available from the on-line Internet-Drafts directories. > > > > Title : TACACS+ Security and SSH Public Keys > > Authors : Thorsten Dahm > > Douglas Gash > > Andrej Ota > > John Heasley > > Filename : draft-dahm-tacacs-security-01.txt > > Pages : 15 > > Date : 2022-06-02 > > > > Abstract: > > The TACACS+ Protocol [RFC8907] provides device administration for > > routers, network access servers and other networked computing devices > > via one or more centralized servers. This document, a companion to > > the TACACS+ protocol [RFC8907], adds new packet formats to improve > > security and function and support for SSH [RFC4716] public keys. > > > This version represents the latter part of the separation of TLS > support from other topics that were part of the previous version. Sorry, I'd forgotten to add -opsawg- to the draft name as requested by the chairs. It should instead be: A New Internet-Draft is available from the on-line Internet-Drafts directories. Title : TACACS+ Security and SSH Public Keys Authors : Thorsten Dahm Douglas Gash Andrej Ota John Heasley Filename : draft-dahm-opsawg-tacacs-security-00.txt Pages : 14 Date : 2022-06-02 Abstract: The TACACS+ Protocol [RFC8907] provides device administration for routers, network access servers and other networked computing devices via one or more centralized servers. This document, a companion to the TACACS+ protocol [RFC8907], adds new packet formats to improve security and function and support for SSH [RFC4716] public keys. The IETF datatracker status page for this draft is: https://datatracker.ietf.org/doc/draft-dahm-opsawg-tacacs-security/ There is also an HTML version available at: https://www.ietf.org/archive/id/draft-dahm-opsawg-tacacs-security-00.html
- Re: [OPSAWG] I-D Action: draft-dahm-tacacs-securi… John Heasley
- [OPSAWG] I-D Action: draft-dahm-opsawg-tacacs-sec… John Heasley