[OPSAWG]Re: New Version Notification for draft-ietf-opsawg-tacacs-tls13-06.txt: 9525 Section

mohamed.boucadair@orange.com Tue, 07 May 2024 17:05 UTC

Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: opsawg@ietfa.amsl.com
Delivered-To: opsawg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1A4D6C151077 for <opsawg@ietfa.amsl.com>; Tue, 7 May 2024 10:05:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.093
X-Spam-Level:
X-Spam-Status: No, score=-2.093 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=orange.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eKd89bGpgbmg for <opsawg@ietfa.amsl.com>; Tue, 7 May 2024 10:05:26 -0700 (PDT)
Received: from smtp-out.orange.com (smtp-out.orange.com [80.12.210.122]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 853C2C14F6BF for <opsawg@ietf.org>; Tue, 7 May 2024 10:05:25 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=orange.com; i=@orange.com; q=dns/txt; s=orange002; t=1715101526; x=1746637526; h=to:cc:subject:date:message-id:references:in-reply-to: mime-version:from; bh=Bd/sVMY7/+JsNzaGRxCT4GswuJPSxZVa2W6pqW2PSwQ=; b=e0zYv20BHSKDFaLsQgnOWNsy8IIFcb2pYacKclNAXmM/+QgORkKP021q EGwtDejOn3I9pLvgHrY+8ZbcWeDEegVmehOt1yyXd/VfCu2K7W6CqRfAr GEo+kv/5mlcQ3K3NfuwkAywqymIIc1Eyz74WAGn/rGIo9EpCW0RLOzZOk XoO/L2gy1iZNimXL3gcBZ8VXP6FplEnZzkd0f/bR+KwKrz2QlkqLP/Dzl h9Oglga3cdOAnvPGrfPjpVi1MXJka49F9tLvsRhlmWf8LEv9Mqa+Xa6QD jmmcbMneckqWmi1bGl1A1X/90dO2xYf8BgA6p0iVerpe2qFAlxw2RUojj Q==;
Received: from unknown (HELO opfedv3rlp0e.nor.fr.ftgroup) ([x.x.x.x]) by smtp-out.orange.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 07 May 2024 19:05:23 +0200
Received: from unknown (HELO opzinddimail8.si.fr.intraorange) ([x.x.x.x]) by opfedv3rlp0e.nor.fr.ftgroup with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 07 May 2024 19:05:23 +0200
Received: from opzinddimail8.si.fr.intraorange (unknown [127.0.0.1]) by DDEI (Postfix) with SMTP id 3A25D765673 for <opsawg@ietf.org>; Tue, 7 May 2024 19:05:23 +0200 (CEST)
Received: from opzinddimail8.si.fr.intraorange (unknown [127.0.0.1]) by DDEI (Postfix) with ESMTP id 7B68A7655F5 for <opsawg@ietf.org>; Tue, 7 May 2024 19:03:14 +0200 (CEST)
Received: from smtp-out365.orange.com (unknown [x.x.x.x]) by opzinddimail8.si.fr.intraorange (Postfix) with ESMTPS for <opsawg@ietf.org>; Tue, 7 May 2024 19:03:14 +0200 (CEST)
Received: from mail-vi1eur02lp2041.outbound.protection.outlook.com (HELO EUR02-VI1-obe.outbound.protection.outlook.com) ([104.47.11.41]) by smtp-out365.orange.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 07 May 2024 19:03:14 +0200
Received: from DU2PR02MB10160.eurprd02.prod.outlook.com (2603:10a6:10:49b::6) by AS2PR02MB10439.eurprd02.prod.outlook.com (2603:10a6:20b:64a::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7544.42; Tue, 7 May 2024 17:03:11 +0000
Received: from DU2PR02MB10160.eurprd02.prod.outlook.com ([fe80::c9a1:d43c:e7c6:dce1]) by DU2PR02MB10160.eurprd02.prod.outlook.com ([fe80::c9a1:d43c:e7c6:dce1%6]) with mapi id 15.20.7544.041; Tue, 7 May 2024 17:03:11 +0000
From: mohamed.boucadair@orange.com
X-TM-AS-ERS: 10.218.35.128-127.5.254.253
X-TM-AS-SMTP: 1.0 c210cC1vdXQzNjUub3JhbmdlLmNvbQ== bW9oYW1lZC5ib3VjYWRhaXJAb 3JhbmdlLmNvbQ==
X-DDEI-TLS-USAGE: Used
Authentication-Results: smtp-out365.orange.com; dkim=none (message not signed) header.i=none; spf=Fail smtp.mailfrom=mohamed.boucadair@orange.com; spf=Pass smtp.helo=postmaster@EUR02-VI1-obe.outbound.protection.outlook.com
Received-SPF: Fail (smtp-in365b.orange.com: domain of mohamed.boucadair@orange.com does not designate 104.47.11.41 as permitted sender) identity=mailfrom; client-ip=104.47.11.41; receiver=smtp-in365b.orange.com; envelope-from="mohamed.boucadair@orange.com"; x-sender="mohamed.boucadair@orange.com"; x-conformance=spf_only; x-record-type="v=spf1"; x-record-text="v=spf1 include:spfa.orange.com include:spfb.orange.com include:spfc.orange.com include:spfd.orange.com include:spfe.orange.com include:spff.orange.com include:spf6a.orange.com include:spffed-ip.orange.com include:spffed-mm.orange.com -all"
Received-SPF: Pass (smtp-in365b.orange.com: domain of postmaster@EUR02-VI1-obe.outbound.protection.outlook.com designates 104.47.11.41 as permitted sender) identity=helo; client-ip=104.47.11.41; receiver=smtp-in365b.orange.com; envelope-from="mohamed.boucadair@orange.com"; x-sender="postmaster@EUR02-VI1-obe.outbound.protection.outlook.com"; x-conformance=spf_only; x-record-type="v=spf1"; x-record-text="v=spf1 ip4:40.92.0.0/15 ip4:40.107.0.0/16 ip4:52.100.0.0/14 ip4:104.47.0.0/17 ip6:2a01:111:f400::/48 ip6:2a01:111:f403::/49 ip6:2a01:111:f403:8000::/51 ip6:2a01:111:f403:c000::/51 ip6:2a01:111:f403:f000::/52 -all"
IronPort-Data: A9a23:9qG1gaMh98Hz+rrvrR2zkMFynXyQoLVcMsEvi/4bfWQNrUor0GdUn DMbD2qEParcZmamKt9yaduy8EsPuZHWyoI3HgZtpSBmQkwRpJueD7x1DKtR0wB+jCHnZBg6h ynLQoCYdKjYdleF+lH3dOGJQUBUjcmgXqD7BPPPJhd/TAplTDZJoR94kobVuKYw6TSCK13L4 YOaT/H3Ygf/h2Ypaj1Mt8pvlTs01BjMkGJB1rABTaAT1LPuvyF9JI4SI6i3M0z5TuF8dgJtb 7+epF0R1jqxEyYFUrtJoJ6iGqE5aue60Ty1t5Zjc/PKbi6uBMAF+v1T2PI0MS+7gtgS9jx74 I0lWZeYEW/FMkBQ8QgQe0EwLs1wAUFJ0LvYGVWur8eT9EftUSXAgMhXPWIEELRNr46bAUkWn RAZAB0wVEjZwtyXmfe8QOQqgdk/Js72Oo9Zomtn0TzSEfchR9bEXrnO4thbmjw3g6iiH96HP 5ZfNWUpNU2GP0Qn1lQ/UPrSmM+tgXn2djBU7liSuKE+72HS1iR2yrHrP9eTcduPLSlQth3G+ D2aozmnav0cHOC7mDaf8kqdvKyMuz/6Vt9RNeK6x8c/1TV/wURIU0dKCjNXu8KRhkW7VNtEK 2Qf+zElqu4580nDZtnwVgaQu36eoxQWVsBBVes39Gmlw6zY+QubLm8YR3haabQOqM8xXyc22 1nPk9rpABRgtbSUTTSW8bL8hTSqIiEKIkcDaDMKCwwf7LHeTJobixvOSpN9Efe4k8etQzXom WjW9W45mqkZitMN2+Oj51fbjjmwp5/PCAko+gHQWWHj5QR8DGK4W2C2wVzE1dtRMo2ZdVOqn iYo2PWn3cM8IKjYwURhX94xNL2u4v+ENhjVjlhuA4Qt+lyRF5iLLdE4DNZWdBYBDyoURQIFd nM/rit42Pdu0JaCaKZ2Z8evCp0n0LK4T9D9DKiIN5xJf4R7cxKB8Gd2f0mM0mvxkU8q16YiJ ZOcdsXqBnEfYUiG8NZUb7ZFuVPI7nllrY82eXwd50r8uVZ5TCDPIYrpyHPUMogEAFqs+W05C ep3OcqQ0Al4W+bjeCTR+oN7BQlVdCVjX8is9ZEIKLDrzu9a9IcJWqe5LVQJKtQNokipvruSo yHVtrJwlASg2SaXcVXiho5LMeqzBcslxZ7EAcDcFQ3zgSR8CWpexKIefIEwZr4p6KRoyuRsJ 8TpiO3Rasmjvg/vomxHBbGk9NIKXE3y2WqmYXD5CBBhJMUIb1KSpbfZkv7Hr3Vm4tyf7pZm/ 9VNF2rzHfI+euiVJJ2JNa/wlQrh4iZ1dSAbdxKgH+S/sX7EqOBCQxEdRNduSy3QAX0vBwd21 jp6xT81mNOV+coL0YCMgqqJ6YC0D+F5A0xWWXHB6qq7PjXb+WzlxpJcVOGPfnbWU2acFGCKe 7BO1/+lWBEYtA8ijma+O+4DIWECCx/HoKVTyAtpWn7MajxHz5t+d2Ke05AnWrJlmtdkhOduZ n+yxw==
IronPort-HdrOrdr: A9a23:3Y0b/KPQBanZ8sBcTgKjsMiBIKoaSvp037B87TEIdfU1SL39qy nKppgmPHDP5wr5NEtPpTniAtjkfZq/z+8X3WBLB8baYOCOggLBR+sO0WKF+Vzd8kbFh4xgPM lbE5RWOZnIFl59gt/94A6kV/gd4PTvytHUuc7ui053Swdkcqdh6Bo8LD26PAlZeClqbKBJbq Z1SaB81kGdkdh8VLXdOpGlNdKzweH2qA==
X-Talos-CUID: 9a23:3VJiQ2Hy0M5Z4o4JqmJj63Y5C94uckbX51WODwyFMFdKepCsHAo=
X-Talos-MUID: 9a23:97zS0QiHH3IDGncqs0rjisMpCOM5776uMHE30tYgp8iKaG9RZDWstWHi
X-IronPort-AV: E=Sophos;i="6.08,142,1712613600"; d="scan'208,217";a="36674456"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=UV92G1rVKZPE2+AJycuMaPPn1DBeDBYhFSixb/gylnlJGEnG4JGadqZHP/a4qxuf0fdYskfXTQZWVNK070Fvad1Zsj4wvbyhpeij83RxRkng8QC3akhadXtQwWpTYMbFpR59ICnjYE9b2BY5r+cZGs5dc/Vsi1bXyrm10l5zcG/F0hzSzfTp/E81GejbpHARcl71MbZRUvv/ho4j3NMetdmSnfLqRWeaHEOQmIHLm7Gg9zM+T3O2Hc013JW5nSlZWrVG1Zs/rhJ5VTiWAFWX6Ficxrjvu2HrgYSRgwPuLOKR0nefb75AIQCGAiV6VYS53jxg1NjyoAl/fxGMcFht0g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=wxR+iJ6yRB9hcFSuMmU9ftPUdW/LG61yMOaMqYgPLlQ=; b=oaXwZ1inzSiRxo4I7EusFPJ1J+r0PdhR8vJi0mRozBax545ax0uImPTTPD+u0OgOoWs6KnVFzIAaKuF4RKaCNhlLvD0FQvflg94cb6xWSGK9Y8aKPXbqewfwn8GrNXZR+8JOT+/NozPE4BiYET5Sayqf0MphkJzhztc/smFeU098VKAfeldA9ZEuENR2TjjiZAiMA9+FqaCvho5gYzDnF0AawIJQrmDOXtqUffX1WKyIDNN7LuES5gfDDo9sMtPUVh/taYPqRRsDvz/uzRosgspyHIRBcT6KemHswy/WYmBCtkhfZzF8xzgnaiUu+37hhlM8jBUQMuQqedO6dTHy1w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=orange.com; dmarc=pass action=none header.from=orange.com; dkim=pass header.d=orange.com; arc=none
To: "Douglas Gash (dcmgash)" <dcmgash@cisco.com>
Thread-Topic: New Version Notification for draft-ietf-opsawg-tacacs-tls13-06.txt: 9525 Section
Thread-Index: AQHaoIVN59YSg/ieVE+PwkvOTBRLr7GL+xDg
Message-ID: <DU2PR02MB10160916FBB5338E89A5CCD4188E42@DU2PR02MB10160.eurprd02.prod.outlook.com>
References: <171094844069.8406.1730131072887926375@ietfa.amsl.com> <BL3PR11MB6364F94772DDCCC57DF18748B7332@BL3PR11MB6364.namprd11.prod.outlook.com> <DU2PR02MB10160514500051EDA4B5D1441880F2@DU2PR02MB10160.eurprd02.prod.outlook.com> <BL3PR11MB6364B8968DE1CC0E83600660B70D2@BL3PR11MB6364.namprd11.prod.outlook.com> <DU2PR02MB1016055635A500C074019FE3A880D2@DU2PR02MB10160.eurprd02.prod.outlook.com> <BL3PR11MB63646F83D464F49D9D729ACAB7122@BL3PR11MB6364.namprd11.prod.outlook.com> <DM4PR11MB6384A6B3B4FEC73C64A6C937B7E42@DM4PR11MB6384.namprd11.prod.outlook.com>
In-Reply-To: <DM4PR11MB6384A6B3B4FEC73C64A6C937B7E42@DM4PR11MB6384.namprd11.prod.outlook.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Enabled=True;MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SiteId=90c7a20a-f34b-40bf-bc48-b9253b6f5d20;MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SetDate=2024-04-17T15:33:41.0000000Z;MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Name=unrestricted_parent.2;MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ContentBits=0;MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Method=Privileged
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: DU2PR02MB10160:EE_|AS2PR02MB10439:EE_
x-ms-office365-filtering-correlation-id: 1964184f-7e9e-4c16-29dc-08dc6eb793a4
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230031|376005|366007|1800799015|38070700009;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DU2PR02MB10160.eurprd02.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230031)(376005)(366007)(1800799015)(38070700009);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_DU2PR02MB10160916FBB5338E89A5CCD4188E42DU2PR02MB10160eu_"
MIME-Version: 1.0
X-OriginatorOrg: orange.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DU2PR02MB10160.eurprd02.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 1964184f-7e9e-4c16-29dc-08dc6eb793a4
X-MS-Exchange-CrossTenant-originalarrivaltime: 07 May 2024 17:03:11.4763 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 90c7a20a-f34b-40bf-bc48-b9253b6f5d20
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: O2b6u3QDwNNx8Kj9Rr6+tPG+tLKJLFGcjSbcve3AoQ9gq4xi9PZFr9UogcbGw+zwak82R1lvqFCIS3sxu5XijYTxvxsGaOON9v/UsZVqzaY=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS2PR02MB10439
X-TM-AS-ERS: 10.218.35.128-127.5.254.253
X-TM-AS-SMTP: 1.0 c210cC1vdXQzNjUub3JhbmdlLmNvbQ== bW9oYW1lZC5ib3VjYWRhaXJAb 3JhbmdlLmNvbQ==
X-TMASE-Version: DDEI-5.1-9.1.1004-28368.001
X-TMASE-Result: 10--35.053800-10.000000
X-TMASE-MatchedRID: 7u3eoxEoplDZU9L012+8KppiU2kgoGAL/cdhqO7KmN86En2bnefhoBFB DiQWqOMkdYT/7KDsCQ6UMB46rLha58qpCRJs4e9Eu9QzWW8MxDr5Jwn+WOYz2CkDYTG6KmZa+32 SXw3QiFx/cLJHsj+DkeqB7/rwwa8NmIc/vzdiZ+KNrFmNgJn2Xa5bb5QEYSkdndls9F9zmi2ynk 7TnYzMuqDNvgYfNWvTnkdZZMkzym1MTA0fFM5czGZUH1Vj8gcTLRNiY8cLz7gBqNb4Qv6Vo7Dy5 Wdq7TXeHDPvbMPO+Q7XOKyXfcZtKxtktlBrBRHmEMhNgPxqudk3vTBeEjQNflvh1cEykiSGlA5g GtckIoCyuhpiqaRnaqKnDnwlJfeMr2hI0pY2KmaCKQp76hMfYeXYI0z4MDj0G08M2I9s0LoZFeX guNpWv+UP462xeFyzGLyzmhOFRR31BCRucMKoiIxpy4UOhqKrkCThXPqsqitsbmSr/Hd3mDxzAG 47ocHfkcAnsyni1Co64KuxjWhSqFJ7cEHBHUO8zDUEuKkyOHTf2ZJbLRf3D61ZGUKR0YgsDRQo0 212LVyePBItIuQel3Nhrpqo5RvGYjqAbDQOvjw/hipRlQcKsTcaq+arRhiUSOZtBHQ3LLxtpkxr R+BG1q/bkSZCeFm3v/nLHkYI1ePKP+b8OQZNZAHanlFtFm9ph2VzUlo4HVNiLWdntYHosRHfiuj uTbeduUNwQjJFWYWO7hbtJEox4mdmhyCLQBx3sVirkAjO572Si82OWa7YYw0t4dkV926hebU/xP BdG2IWcE6m3CDbNkv9UviLWgxOWlBoY1ejY3KXBXaJoB9JZ8BX4Iey09T4Vb3rZjw/bpwUyRS/O CD9xZUdXE/WGn0FuJhoZaSpA56RX0oTG5q4N+JGF26G8SWy8lP6F/raTZghtlJZdlnnbQ==
X-TMASE-SNAP-Result: 1.821001.0001-0-1-22:0,33:0,34:0-0
X-TMASE-INERTIA: 0-0;;;;
X-TMASE-XGENCLOUD: 467586d1-c894-429c-a993-7b9e9bf40907-0-0-200-0
Message-ID-Hash: 5S4WZI7UTVNGDO6D4BCGP2TYNPF4GUP5
X-Message-ID-Hash: 5S4WZI7UTVNGDO6D4BCGP2TYNPF4GUP5
X-MailFrom: mohamed.boucadair@orange.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-opsawg.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: John Heasley <heas@shrubbery.net>, Andrej Ota <andrej@ota.si>, "opsawg@ietf.org" <opsawg@ietf.org>
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [OPSAWG]Re: New Version Notification for draft-ietf-opsawg-tacacs-tls13-06.txt: 9525 Section
List-Id: OPSA Working Group Mail List <opsawg.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsawg/xsQapyVABkj2WiFeZzOdQBCAcaQ>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsawg>
List-Help: <mailto:opsawg-request@ietf.org?subject=help>
List-Owner: <mailto:opsawg-owner@ietf.org>
List-Post: <mailto:opsawg@ietf.org>
List-Subscribe: <mailto:opsawg-join@ietf.org>
List-Unsubscribe: <mailto:opsawg-leave@ietf.org>
Date: Tue, 21 May 2024 17:26:42 -0000
X-Original-Date: Tue, 7 May 2024 17:03:11 +0000

Hi Doug,

Thanks for the follow-up.

Please see inline.

Cheers,
Med

De : Douglas Gash (dcmgash) <dcmgash@cisco.com>
Envoyé : mardi 7 mai 2024 15:49
À : BOUCADAIR Mohamed INNOV/NET <mohamed.boucadair@orange.com>
Cc : John Heasley <heas@shrubbery.net>; Andrej Ota <andrej@ota.si>; Thorsten Dahm <thorsten.dahm@gmail.com>; opsawg@ietf.org
Objet : Re: New Version Notification for draft-ietf-opsawg-tacacs-tls13-06.txt: 9525 Section

Hi Mohamed, having ingested 9525 (Thank you for pointing it out), we have updated the TLS Ident section thusly (NB, we moved from SN to subjectAltName as 9525 pointed out its weakness).

New:

3.3.  TLS Identification

   For the client-side validation of presented server identities,
   implementations MUST follow the process specified in [RFC9525].
[Med] s/ the process specified in [RFC9525]/[RFC9525] validation techniques

   Identifier types DNS-ID, IP-ID or SRV-ID are applicable for use with
   the TLS TACACS+ protocol, selected by operators depending upon the
   deployment design.
[Med] I would add "TLS TACACS+ doesn't use URI-IDs for server identity verification." to comply with this part of 9525:

"If the technology does not use URIs to identify application services, then the specification MUST state that URI-ID as defined in this document is not supported."


Although limited wildcards are permitted in
   [RFC9525], they MUST NOT be used in presented server identities for
   Purposes of TLS for TACACS.
[Med] I would simplify as follows:

"The wildcard character MUST NOT be included in the presented server identities."

To echo this part of 9525:

"A technology MAY disallow the use of the wildcard character in presented identifiers. If it does so, then the specification MUST state that wildcard certificates as defined in this document are not supported."

   For the server-side validation of client identities, implementations
   MUST allow operators
[Med] s/allow operators/support a configuration parameter

(note that we may be challenged whether the normative language is justified here for a local configuration parameter, but please keep it for now)

to specify which certificate fields are to be
   used for client-identification, to verify that the client is a valid
   source for the received certificate and that it is permitted access
   to TACACS+. Implementations MUST support either:

   Network location based validation methods as described in Section 5.2
   of [RFC5425].

   or

   Client Identity validation of a shared identity in the certificate
   subjectAltName.  This is applicable in deployments where the client
   securely supports an identity which is shared with the server.  This
   approach allows a client's network location to be reconfigured
   without issuing a new client certificate, in this case, only the
   server mapping needs to be updated.

   Implementations SHOULD support the TLS Server Name Indication
[Med] s/Server Name Indication/ Server Name Indication(SNI)

   extension (Section 3 of [RFC6066]), and SHOULD include the server
   domain name in the SNI "server_name" extension of the client hello.

[Med] Please note that this is the first mention of "server domain name". We need to make sure that this is introduced earlier (as part of the required configuration tasks).


Original:

3.3.  TLS Identification

   In addition to authentication of TLS certificates, implementations
   MUST allow operators to specify which certificate fields are to be
   used for peer-identification, to verify that the peer is a valid
   source for the received certificate and that it is permitted access
   to TACACS+.  Implementations MUST support either:

   Network location based validation methods as described in Section 5.2
   of [RFC5425].

   or

   Device Identity based validation methods where the peer's identity is
   used in the certificate subjectName.  This is applicable in
   deployments where the device securely supports an identity which is
   shared with its peer.  This approach allows a peer's network location
   to be reconfigured without issuing a new client certificate.  Only
   the local server mapping needs to be updated.

   Implementations SHOULD support the TLS Server Name Indication
   extension (Section 3 of [RFC6066]), and SHOULD include the server
   domain name in the SNI "server_name" extension of the client hello.

   Certificate Provisioning is out of scope of this document.


From: Douglas Gash (dcmgash) <dcmgash@cisco.com<mailto:dcmgash@cisco.com>>
Date: Monday, 22 April 2024 at 10:21
To: mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.com> <mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.com>>
Cc: John Heasley <heas@shrubbery.net<mailto:heas@shrubbery.net>>, Andrej Ota <andrej@ota.si<mailto:andrej@ota.si>>, Thorsten Dahm <thorsten.dahm@gmail.com<mailto:thorsten.dahm@gmail.com>>, opsawg@ietf.org<mailto:opsawg@ietf.org> <opsawg@ietf.org<mailto:opsawg@ietf.org>>
Subject: Re: New Version Notification for draft-ietf-opsawg-tacacs-tls13-06.txt.
Thanks Mohamed, please see inline... <Doug/>

From: mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.com> <mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.com>>
Date: Friday, 19 April 2024 at 18:31
To: Douglas Gash (dcmgash) <dcmgash@cisco.com<mailto:dcmgash@cisco.com>>
Cc: John Heasley <heas@shrubbery.net<mailto:heas@shrubbery.net>>, Andrej Ota <andrej@ota.si<mailto:andrej@ota.si>>, Thorsten Dahm <thorsten.dahm@gmail.com<mailto:thorsten.dahm@gmail.com>>, opsawg@ietf.org<mailto:opsawg@ietf.org> <opsawg@ietf.org<mailto:opsawg@ietf.org>>
Subject: RE: New Version Notification for draft-ietf-opsawg-tacacs-tls13-06.txt.
Hi Douglas,

Please see inline.

Cheers,
Med

De : Douglas Gash (dcmgash) <dcmgash@cisco.com<mailto:dcmgash@cisco.com>>
Envoyé : vendredi 19 avril 2024 18:46
À : BOUCADAIR Mohamed INNOV/NET <mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.com>>
Cc : John Heasley <heas@shrubbery.net<mailto:heas@shrubbery.net>>; Andrej Ota <andrej@ota.si<mailto:andrej@ota.si>>; Thorsten Dahm <thorsten.dahm@gmail.com<mailto:thorsten.dahm@gmail.com>>; opsawg@ietf.org<mailto:opsawg@ietf.org>
Objet : Re: New Version Notification for draft-ietf-opsawg-tacacs-tls13-06.txt.


Hi Mohamad,

We are working through the comments and enhancements that you kindly sent.

There are two comments that we'd be grateful if you could clarify:


BMI10: "What about raw public keys?" (on: Implementations MAY support TLS authentication with Pre-Shared Keys): I'm guessing this relates to fact that, as we mention only PSK, that this indicates that we mean to imply that non PSK authentications are not included. If this is the case, then for sure, we will clarify that they are. If you have something else in mind, please expand, thanks!
[Med] Yeah.
<Doug>Got it, will clarify that this section just relates to PSK and dosent impact the use of other PKI options</Doug>


BMI16: "What about configuration of name/address/port number of the server?" (on: Certificate Provisioning is out of scope of this document.), would be grateful if you could please expand on what you had in mind here
[Med] Clients should be provided with the IP address(es) and alternate port number (if the default is not used) of the server. Clients may also require to be provided with the domain name of the server.
<Doug>So we didn't have in mind any additional configuration at the T+ level other than the regular TACACS+ for this, (where clients will have servers defined and vice versa), with the caveat of the restrictions in 5.2.  TACACS+ Configuration (to ensure that TLS and non TLS can be easily differentiated at implementation level to reduce the likelihood of operators accidentally mixing TLS and non TLS traffic which may lead to downgrade attacks.) </Doug>


Also, given that you define "tacacss", do you had in mind to use that for service discovery?
<Doug> not at this point, it is more for IANA considerations, assuming that we do end up requesting a new port number</Doug>

Please note that if a name is also provided to the client, then you may indicate that the name will be used also for rfc9525 validation to compare the domain name with the certificate that is provided. If no name is provided, do you assume that the certificate is
<Doug>To restate to ensure I'm on your page : the actual T+ protocol won't have the domain name embedded anywhere, so this is OOB of tacacs and encapsulated within the TLS transport and peer configuration, which can validate as usual as it knows the peer connection details. We will clarify that recommendation. If there is somehting we're missing there, LMK, thanks !</Doug>

BTW, I wonder whether you need to indicate whether the certificate authority that issued the server certificate will need to support at least DNS-ID and SRV-ID identifier types? I don't think URI-ID is needed. Similarly, do we need to include a mention about wildcard "*"? I think it SHOULD NOT.
<Doug>Agreed, I think there was a discussion on that, and it was discounted. We'll make that explicit</Doug>

Feel free to grab whatever useful for you. Thanks.

Many thanks!

From: mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.com> <mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.com>>
Date: Wednesday, 17 April 2024 at 16:42
To: Douglas Gash (dcmgash) <dcmgash@cisco.com<mailto:dcmgash@cisco.com>>, opsawg@ietf.org<mailto:opsawg@ietf.org> <opsawg@ietf.org<mailto:opsawg@ietf.org>>
Cc: John Heasley <heas@shrubbery.net<mailto:heas@shrubbery.net>>, Andrej Ota <andrej@ota.si<mailto:andrej@ota.si>>
Subject: RE: New Version Notification for draft-ietf-opsawg-tacacs-tls13-06.txt
Hi Douglas, all,

Thank you for taking care of the comments. I managed to review the latest version. FWIW, the comments can be retrieved here:


Pdf: https://github.com/boucadair/IETF-Drafts-Reviews/blob/master/2024/draft-ietf-opsawg-tacacs-tls13-06-rev%20Med.pdf

Doc: https://github.com/boucadair/IETF-Drafts-Reviews/raw/master/2024/draft-ietf-opsawg-tacacs-tls13-06-rev%20Med.doc

There are still some points to be fixed, but I think the document is getting stable more and more.

Cheers,
Med

De : OPSAWG <opsawg-bounces@ietf.org<mailto:opsawg-bounces@ietf.org>> De la part de Douglas Gash (dcmgash)
Envoyé : mercredi 20 mars 2024 16:40
À : opsawg@ietf.org<mailto:opsawg@ietf.org>
Cc : John Heasley <heas@shrubbery.net<mailto:heas@shrubbery.net>>; Andrej Ota <andrej@ota.si<mailto:andrej@ota.si>>
Objet : Re: [OPSAWG] New Version Notification for draft-ietf-opsawg-tacacs-tls13-06.txt

Dear OPSAWG,

We have uploaded a new version of the doc, primarily to address as much as possible of the comprehensive review kindly submitted by Mohamed Boucadair. We thank Mohamed for the time and trouble taken to the review the doc so thoroughly. We will be happy to discuss further any omissions or new comments and rectify quickly.

And we will endeavour to respond ASAP to any other comments of any kind on the doc.

Many thanks,

Regards,

The Authors.

From: internet-drafts@ietf.org<mailto:internet-drafts@ietf.org> <internet-drafts@ietf.org<mailto:internet-drafts@ietf.org>>
Date: Wednesday, 20 March 2024 at 15:27
To: Douglas Gash (dcmgash) <dcmgash@cisco.com<mailto:dcmgash@cisco.com>>, Douglas Gash (dcmgash) <dcmgash@cisco.com<mailto:dcmgash@cisco.com>>, Andrej Ota <andrej@ota.si<mailto:andrej@ota.si>>, John Heasley <heas@shrubbery.net<mailto:heas@shrubbery.net>>, Thorsten Dahm <thorsten.dahm@gmail.com<mailto:thorsten.dahm@gmail.com>>
Subject: New Version Notification for draft-ietf-opsawg-tacacs-tls13-06.txt
A new version of Internet-Draft draft-ietf-opsawg-tacacs-tls13-06.txt has been
successfully submitted by Douglas C. Medway Gash and posted to the
IETF repository.

Name:     draft-ietf-opsawg-tacacs-tls13
Revision: 06
Title:    TACACS+ TLS 1.3
Date:     2024-03-20
Group:    opsawg
Pages:    15
URL:      https://www.ietf.org/archive/id/draft-ietf-opsawg-tacacs-tls13-06.txt
Status:   https://datatracker.ietf.org/doc/draft-ietf-opsawg-tacacs-tls13/
HTML:     https://www.ietf.org/archive/id/draft-ietf-opsawg-tacacs-tls13-06.html
HTMLized: https://datatracker.ietf.org/doc/html/draft-ietf-opsawg-tacacs-tls13
Diff:     https://author-tools.ietf.org/iddiff?url2=draft-ietf-opsawg-tacacs-tls13-06

Abstract:

   The Terminal Access Controller Access-Control System Plus (TACACS+)
   Protocol [RFC8907] provides device administration for routers,
   network access servers and other networked computing devices via one
   or more centralized servers.  This document adds Transport Layer
   Security (TLS 1.3) support and obsoletes former inferior security
   mechanisms.



The IETF Secretariat

____________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc

pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler

a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,

Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.



This message and its attachments may contain confidential or privileged information that may be protected by law;

they should not be distributed, used or copied without authorisation.

If you have received this email in error, please notify the sender and delete this message and its attachments.

As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.

Thank you.

____________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc

pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler

a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,

Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.



This message and its attachments may contain confidential or privileged information that may be protected by law;

they should not be distributed, used or copied without authorisation.

If you have received this email in error, please notify the sender and delete this message and its attachments.

As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.

Thank you.
____________________________________________________________________________________________________________
Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.