Skip to main content

Terminal Access Controller Access-Control System Plus over TLS 1.3 (TACACS+ over TLS)
draft-ietf-opsawg-tacacs-tls13-24

Revision differences

Document history

Date Rev. By Action
2025-12-09
(System)
Received changes through RFC Editor sync (changed state to RFC, created became rfc relationship between draft-ietf-opsawg-tacacs-tls13 and RFC 9887, changed IESG state to RFC …
Received changes through RFC Editor sync (changed state to RFC, created became rfc relationship between draft-ietf-opsawg-tacacs-tls13 and RFC 9887, changed IESG state to RFC Published)
2025-12-08
24 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2025-10-24
24 (System) RFC Editor state changed to AUTH48
2025-08-07
24 Cindy Morgan Downref to RFC 8907 approved by Last Call for draft-ietf-opsawg-tacacs-tls13-24
2025-07-16
24 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2025-07-16
24 (System) IANA Action state changed to Waiting on RFC Editor from In Progress
2025-07-16
24 (System) IANA Action state changed to In Progress from Waiting on Authors
2025-07-15
24 (System) IANA Action state changed to Waiting on Authors from In Progress
2025-07-15
24 (System) IANA Action state changed to In Progress from Waiting on Authors
2025-07-14
24 (System) IANA Action state changed to Waiting on Authors from In Progress
2025-07-14
24 (System) IANA Action state changed to In Progress from Waiting on Authors
2025-07-11
24 (System) IANA Action state changed to Waiting on Authors from In Progress
2025-07-10
24 (System) RFC Editor state changed to EDIT
2025-07-10
24 (System) IESG state changed to RFC Ed Queue from Approved-announcement sent
2025-07-10
24 (System) Announcement was received by RFC Editor
2025-07-10
24 (System) IANA Action state changed to In Progress
2025-07-10
24 (System) Removed all action holders (IESG state changed)
2025-07-10
24 Morgan Condie IESG state changed to Approved-announcement sent from Approved-announcement to be sent
2025-07-10
24 Morgan Condie IESG has approved the document
2025-07-10
24 Morgan Condie Closed "Approve" ballot
2025-07-10
24 Morgan Condie Ballot approval text was generated
2025-07-09
24 Mohamed Boucadair IESG state changed to Approved-announcement to be sent from Approved-announcement to be sent::AD Followup
2025-07-09
24 (System) Changed action holders to Mohamed Boucadair (IESG state changed)
2025-07-09
24 (System) Sub state has been changed to AD Followup from Revised I-D Needed
2025-07-09
24 dcmgash@cisco.com New version available: draft-ietf-opsawg-tacacs-tls13-24.txt
2025-07-09
24 (System) New version approved
2025-07-09
24 (System) Request for posting confirmation emailed to previous authors: "dcmgash@cisco.com" , Andrej Ota , John Heasley , Thorsten Dahm
2025-07-09
24 dcmgash@cisco.com Uploaded new revision
2025-06-26
23 (System) Changed action holders to John Heasley, Thorsten Dahm, dcmgash@cisco.com, Andrej Ota (IESG state changed)
2025-06-26
23 Cindy Morgan IESG state changed to Approved-announcement to be sent::Revised I-D Needed from Approved-announcement to be sent::AD Followup
2025-06-26
23 Cindy Morgan IESG state changed to Approved-announcement to be sent::AD Followup from IESG Evaluation
2025-06-26
23 Jim Guichard [Ballot Position Update] New position, No Objection, has been recorded for Jim Guichard
2025-06-25
23 Orie Steele [Ballot comment]
Thank you to Rich Salz for the ARTART review.
2025-06-25
23 Orie Steele [Ballot Position Update] New position, No Objection, has been recorded for Orie Steele
2025-06-25
23 Mike Bishop [Ballot comment]
I second the comments around referencing ECH if the visibility of the Client Hello is a concern.
2025-06-25
23 Mike Bishop [Ballot Position Update] New position, No Objection, has been recorded for Mike Bishop
2025-06-25
23 Ketan Talaulikar
[Ballot comment]
Thanks for the work on this document and updating TACACS+ for TLS. This is a much needed security upgrade for the widely used …
[Ballot comment]
Thanks for the work on this document and updating TACACS+ for TLS. This is a much needed security upgrade for the widely used protocol.

Thanks for clarification on the history of why TACACS+ was developed as informational document to help clear my DISCUSS.

I am still wondering whether informational status is not more appropriate for this document as well.
2025-06-25
23 Ketan Talaulikar [Ballot Position Update] Position for Ketan Talaulikar has been changed to No Objection from Discuss
2025-06-24
23 Paul Wouters
[Ballot comment]
Thanks for a clear document. I just have one comment:

        5.1.5. TLS Server Name Indicator (SNI)

      …
[Ballot comment]
Thanks for a clear document. I just have one comment:

        5.1.5. TLS Server Name Indicator (SNI)

        Operators should be aware that the TLS SNI extension is
        part of the TLS client hello and is, therefore, subject to
        eavesdropping. Also see Section 11.1 of [RFC6066].

I am not sure why this really matters? I presume the name is already in
public DNS and/or reverse DNS and is probably already well known? It
will be using a new tacacss well-known port so the name isn't needed
to leak information that the connection is tacacs.

Also, if it mattered, since the server is likely dedicated to this
purpose, why use SNI? One could just not use it, as the target server
doesn't need to vhost demux the HTTPS request anyway? And finally,
one could use ECH to protect against SNI sniffing, if it really mattered.
2025-06-24
23 Paul Wouters [Ballot Position Update] New position, Yes, has been recorded for Paul Wouters
2025-06-24
23 Gunter Van de Velde
[Ballot comment]
# Gunter Van de Velde, RTG AD, comments for draft-ietf-opsawg-tacacs-tls13-23

# The line numbers used are rendered from IETF idnits tool: https://author-tools.ietf.org/api/idnits?url=https://www.ietf.org/archive/id/draft-ietf-opsawg-tacacs-tls13-23.txt

# …
[Ballot comment]
# Gunter Van de Velde, RTG AD, comments for draft-ietf-opsawg-tacacs-tls13-23

# The line numbers used are rendered from IETF idnits tool: https://author-tools.ietf.org/api/idnits?url=https://www.ietf.org/archive/id/draft-ietf-opsawg-tacacs-tls13-23.txt

# This is a great write-up and needed extension to TACACS+

# I noted some non-blocking observations in the text that follows. Mostly idnits and clarifications.

# Detailed Review
# ===============

16 Abstract
17
18   The Terminal Access Controller Access-Control System Plus (TACACS+)
19   protocol provides device administration for routers, network access
20   servers, and other networked computing devices via one or more
21   centralized TACACS+ servers.  This document adds Transport Layer
22   Security (TLS 1.3) support to TACACS+ and obsoletes former inferior
23   security mechanisms.
24
25   This document updates RFC 8907.

GV> What about the following textblob alternative:

"
This document specifies the use of Transport Layer Security (TLS) version 1.3 to secure the communication channel between a TACACS+ client and server. TACACS+ is a protocol used for Authentication, Authorization, and Accounting (AAA) in networked environments. The original TACACS+ protocol, defined in RFC 8907, does not mandate the use of encryption or secure transport. This specification defines a profile for using TLS 1.3 with TACACS+, including guidance on authentication, connection establishment, and operational considerations. The goal is to enhance the confidentiality, integrity, and authenticity of TACACS+ traffic, aligning the protocol with modern security best practices.

This document updates RFC 8907.
"

183 3.1.  Separating TLS Connections
184
185   All data exchanged by TACACS+ peers MUST be encrypted, including the
186   mutual authentication of the peers.  Therefore, when a TCP connection
187   is established for the service, a TLS handshake begins immediately.

GV> This reads like a storm of energy of change and leaves no room for introduction. The text states "peers MUST be encrypted". While true when supporting this RFC-to-be, it was not the situation before this RFC-to-be. Maybe mention in the text that it MUST be supported when this RFC-to-be is supported.

189   To ensure separation of TACACS+ traffic that uses TLS from that which
190   does not (Section 5.3), TLS TACACS+ servers MUST be deployed on a
191   separate TCP/IP port number from Non-TLS TACACS+ servers (preferably
192   on a separate host, as recommended in Section 5.1.1).  Because of the
193   widespread use of default port number settings in numerous existing
194   TACACS+ client configurations, a well-known system TCP/IP port number
195   is assigned: the designated port number is [TBD] (Section 7) with the
196   service name tacacss (Section 7).  This ensures that the client can
197   separate TLS and Non-TLS traffic even where default port numbers are
198   omitted from its TACACS+ server connection configuration.
199
200   Under exceptional circumstances, this document permits any other TCP
201   port number to be configured when required by deployment specifics,
202   but the implications in Section 5.3 have to be considered by

GV> What about the following alternative textblob:

"
To ensure clear separation between TACACS+ traffic using TLS and that which does not (see Section 5.3), servers supporting TACACS+ over TLS MUST listen on a TCP/IP port distinct from that used by non-TLS TACACS+ servers. Where feasible, it is further RECOMMENDED to deploy the TLS and non-TLS services on separate hosts, as discussed in Section 5.1.1.

Given the prevalence of default port usage in existing TACACS+ client implementations, this specification assigns a well-known TCP port number for TACACS+ over TLS: [TBD], with the associated service name "tacacss" (see Section 7). This allows clients to unambiguously distinguish between TLS and non-TLS connections, even in the absence of an explicitly configured port number.

While the use of the designated port is strongly encouraged, deployments with specific requirements MAY use alternative TCP port numbers. In such cases, operators must carefully consider the operational implications described in Section 5.3.
"

213   TLS 1.3 [RFC8446] must be used for transport, though it is expected
214   that TACACS+ as described in this document will work with future
215   versions of TLS.  Earlier versions of TLS MUST NOT be used.

GV> Would it be beneficial to state that "minimum TLS 1.3 MUST be used for transport ..."?

217   Once the TLS connection is established, the exchange of TACACS+ data
218   proceeds as defined in [RFC8907], except that it is transmitted over
219   TLS as TLS application data and without TACACS+ obfuscation
220   (Section 4).

GV> What about:

"
Once the TLS connection has been successfully established, the exchange of TACACS+ data SHALL proceed in accordance with the procedures defined in [RFC8907]. However, all TACACS+ messages SHALL be transmitted as TLS application data. The TACACS+ obfuscation mechanism defined in [RFC8907] MUST NOT be applied when operating over TLS (see Section 4)
"

225   negotiated, when an inactivity timeout occurs.  Why it closed has no
226   bearing on TLS resumption, unless closed by a TLS error, in which
227   case the ticket might be invalidated.

GV> What is meant with "ticket"?

229   TACACS+ connections are not long-lived.  Non 'Single Connection Mode'
230   (Section 4.3 of [RFC8907]) connections are closed as soon as the
231   TACACS+ session completes.  Single Connection Mode connections are
232   longer lived, but even these are timed out and closed after a short
233   period of inactivity.  For this reason, keepalives are not required
234   to be supported.

GV> What about:

"
TACACS+ connections are generally not long-lived. For connections not operating in Single Connection Mode (as defined in Section 4.3 of [RFC8907]), the TCP session SHALL be closed upon completion of the associated TACACS+ session. Connections operating in Single Connection Mode MAY persist for a longer duration but are typically subject to timeout and closure after a brief period of inactivity. Consequently, support for transport-layer keepalive mechanisms is NOT REQUIRED.
"

421   The introduction of TLS PSK, certificate peer authentication, and TLS
422   encryption to TACACS+ replaces these former mechanisms and so
423   obfuscation is hereby obsoleted.

GV>  Is TLS PSK in this document not documented after the TLS Encryption? Maybe follow order in the above phrase to be conmsistent with the documentation in this RFC-to-be for readability?

502   completes.  Replay of this data is a risk.  Given the sensitivity of
503   TACACS+ data, clients MUST NOT send data until the full TLS handshake
504   completes; that is, clients MUST NOT send 0-RTT data and TLS TACACS+
505   servers MUST abruptly disconnect clients that do.

GV> Beyond the abruptly disconnect, is an operational logging recommended?


Many thanks for this document,
Gunter Van de Velde,
Routing AD
2025-06-24
23 Gunter Van de Velde Ballot comment text updated for Gunter Van de Velde
2025-06-24
23 Mohamed Boucadair
[Ballot comment]
FWIW, the approach followed in this spec is what was agreed with the IESG at the time of publication of RFC 8907 and …
[Ballot comment]
FWIW, the approach followed in this spec is what was agreed with the IESG at the time of publication of RFC 8907 and which is captured in the note sent by Warren to the WG to act upon (2021): https://mailarchive.ietf.org/arch/msg/opsawg/IPNhvGyhDAawsavqRUHIliCr4xk/, especially this part:

" When we wrote this, it was with the understanding that we'd first puslish how TACACS+ currently works, and then a second document which, AFAIR, would basically say "... and now just run this over TLS, K,  thanks, done". "
2025-06-24
23 Mohamed Boucadair Ballot comment text updated for Mohamed Boucadair
2025-06-24
23 Gunter Van de Velde
[Ballot comment]
# Gunter Van de Velde, RTG AD, comments for draft-ietf-opsawg-tacacs-tls13-23

# The line numbers used are rendered from IETF idnits tool: https://author-tools.ietf.org/api/idnits?url=https://www.ietf.org/archive/id/draft-ietf-opsawg-tacacs-tls13-23.txt

# …
[Ballot comment]
# Gunter Van de Velde, RTG AD, comments for draft-ietf-opsawg-tacacs-tls13-23

# The line numbers used are rendered from IETF idnits tool: https://author-tools.ietf.org/api/idnits?url=https://www.ietf.org/archive/id/draft-ietf-opsawg-tacacs-tls13-23.txt

# This is a great write-up and needed extension to TACACS+

# I noted some non-blocking observations in the text that follows. Mostly idnits and clarifications.

# A support the DISCUSS from Ketan

# Detailed Review
# ===============

16 Abstract
17
18   The Terminal Access Controller Access-Control System Plus (TACACS+)
19   protocol provides device administration for routers, network access
20   servers, and other networked computing devices via one or more
21   centralized TACACS+ servers.  This document adds Transport Layer
22   Security (TLS 1.3) support to TACACS+ and obsoletes former inferior
23   security mechanisms.
24
25   This document updates RFC 8907.

GV> What about the following textblob alternative:

"
This document specifies the use of Transport Layer Security (TLS) version 1.3 to secure the communication channel between a TACACS+ client and server. TACACS+ is a protocol used for Authentication, Authorization, and Accounting (AAA) in networked environments. The original TACACS+ protocol, defined in RFC 8907, does not mandate the use of encryption or secure transport. This specification defines a profile for using TLS 1.3 with TACACS+, including guidance on authentication, connection establishment, and operational considerations. The goal is to enhance the confidentiality, integrity, and authenticity of TACACS+ traffic, aligning the protocol with modern security best practices.

This document updates RFC 8907.
"

183 3.1.  Separating TLS Connections
184
185   All data exchanged by TACACS+ peers MUST be encrypted, including the
186   mutual authentication of the peers.  Therefore, when a TCP connection
187   is established for the service, a TLS handshake begins immediately.

GV> This reads like a storm of energy of change and leaves no room for introduction. The text states "peers MUST be encrypted". While true when supporting this RFC-to-be, it was not the situation before this RFC-to-be. Maybe mention in the text that it MUST be supported when this RFC-to-be is supported.

189   To ensure separation of TACACS+ traffic that uses TLS from that which
190   does not (Section 5.3), TLS TACACS+ servers MUST be deployed on a
191   separate TCP/IP port number from Non-TLS TACACS+ servers (preferably
192   on a separate host, as recommended in Section 5.1.1).  Because of the
193   widespread use of default port number settings in numerous existing
194   TACACS+ client configurations, a well-known system TCP/IP port number
195   is assigned: the designated port number is [TBD] (Section 7) with the
196   service name tacacss (Section 7).  This ensures that the client can
197   separate TLS and Non-TLS traffic even where default port numbers are
198   omitted from its TACACS+ server connection configuration.
199
200   Under exceptional circumstances, this document permits any other TCP
201   port number to be configured when required by deployment specifics,
202   but the implications in Section 5.3 have to be considered by

GV> What about the following alternative textblob:

"
To ensure clear separation between TACACS+ traffic using TLS and that which does not (see Section 5.3), servers supporting TACACS+ over TLS MUST listen on a TCP/IP port distinct from that used by non-TLS TACACS+ servers. Where feasible, it is further RECOMMENDED to deploy the TLS and non-TLS services on separate hosts, as discussed in Section 5.1.1.

Given the prevalence of default port usage in existing TACACS+ client implementations, this specification assigns a well-known TCP port number for TACACS+ over TLS: [TBD], with the associated service name "tacacss" (see Section 7). This allows clients to unambiguously distinguish between TLS and non-TLS connections, even in the absence of an explicitly configured port number.

While the use of the designated port is strongly encouraged, deployments with specific requirements MAY use alternative TCP port numbers. In such cases, operators must carefully consider the operational implications described in Section 5.3.
"

213   TLS 1.3 [RFC8446] must be used for transport, though it is expected
214   that TACACS+ as described in this document will work with future
215   versions of TLS.  Earlier versions of TLS MUST NOT be used.

GV> Would it be beneficial to state that "minimum TLS 1.3 MUST be used for transport ..."?

217   Once the TLS connection is established, the exchange of TACACS+ data
218   proceeds as defined in [RFC8907], except that it is transmitted over
219   TLS as TLS application data and without TACACS+ obfuscation
220   (Section 4).

GV> What about:

"
Once the TLS connection has been successfully established, the exchange of TACACS+ data SHALL proceed in accordance with the procedures defined in [RFC8907]. However, all TACACS+ messages SHALL be transmitted as TLS application data. The TACACS+ obfuscation mechanism defined in [RFC8907] MUST NOT be applied when operating over TLS (see Section 4)
"

225   negotiated, when an inactivity timeout occurs.  Why it closed has no
226   bearing on TLS resumption, unless closed by a TLS error, in which
227   case the ticket might be invalidated.

GV> What is meant with "ticket"?

229   TACACS+ connections are not long-lived.  Non 'Single Connection Mode'
230   (Section 4.3 of [RFC8907]) connections are closed as soon as the
231   TACACS+ session completes.  Single Connection Mode connections are
232   longer lived, but even these are timed out and closed after a short
233   period of inactivity.  For this reason, keepalives are not required
234   to be supported.

GV> What about:

"
TACACS+ connections are generally not long-lived. For connections not operating in Single Connection Mode (as defined in Section 4.3 of [RFC8907]), the TCP session SHALL be closed upon completion of the associated TACACS+ session. Connections operating in Single Connection Mode MAY persist for a longer duration but are typically subject to timeout and closure after a brief period of inactivity. Consequently, support for transport-layer keepalive mechanisms is NOT REQUIRED.
"

421   The introduction of TLS PSK, certificate peer authentication, and TLS
422   encryption to TACACS+ replaces these former mechanisms and so
423   obfuscation is hereby obsoleted.

GV>  Is TLS PSK in this document not documented after the TLS Encryption? Maybe follow order in the above phrase to be conmsistent with the documentation in this RFC-to-be for readability?

502   completes.  Replay of this data is a risk.  Given the sensitivity of
503   TACACS+ data, clients MUST NOT send data until the full TLS handshake
504   completes; that is, clients MUST NOT send 0-RTT data and TLS TACACS+
505   servers MUST abruptly disconnect clients that do.

GV> Beyond the abruptly disconnect, is an operational logging recommended?


Many thanks for this document,
Gunter Van de Velde,
Routing AD
2025-06-24
23 Gunter Van de Velde [Ballot Position Update] New position, No Objection, has been recorded for Gunter Van de Velde
2025-06-24
23 Deb Cooley
[Ballot comment]

I support Ketan's discuss.  This protocol is in wide use, it would be useful to have the whole protocol be PS.

Thanks to …
[Ballot comment]

I support Ketan's discuss.  This protocol is in wide use, it would be useful to have the whole protocol be PS.

Thanks to Russ Housley for their secdir review.

Section 3, last sentence:  This draft is almost in the RFC Editor's queue.  It would be better if it could be a normative reference, since it is exactly what you are trying to specify here.

Section 3.4.1:  Sometimes these (both cert path validation and revocation checking) can be quite hard.  Many implementations of TLS allow a bypass in the case of network latency issues.  And while it pains me to say this as 'a PKI person', you may need to consider whether there needs to be an allowance for a bypass. What happens if there are network issues blocking chains or OCSP? 

Section 5.1.2:  There is an 'early data extension' that the client could include to enable the ability to send early data.  Perhaps the statement 'A TLS client or server MUST NOT include the "early_data" extension. See Section 2.3 and 4.2.10 of [RFC8446] for security concerns.' or something similar could be added.

Section 5.1.5:  'subject to eavesdropping' because SNI is sent in the clear in the Client Hello?  Would it be more direct to say something like, 'the TLS SNI extension is part of the TLS client hello, which is sent in cleartext and is, therefore...'  That might make for an awkward sentence, which could be split into two sentences. 

Section 5.2:  Nit:  just be sure the (TBD) is properly flagged for IANA.

Section 5.3:  I'm not sure it is necessary to throw STARTTLS 'under the bus' as it were.  The point can be made w/out it (especially since no reference to STARTTLS is supplied).  I'd be happy to help with the re-write.  [https://en.wikipedia.org/wiki/Throw_under_the_bus]
2025-06-24
23 Deb Cooley [Ballot Position Update] New position, No Objection, has been recorded for Deb Cooley
2025-06-24
23 Éric Vyncke
[Ballot comment]

# Éric Vyncke, INT AD, comments for draft-ietf-opsawg-tacacs-tls13-23
CC @evyncke

Thank you for the work put into this document.

Please find below some …
[Ballot comment]

# Éric Vyncke, INT AD, comments for draft-ietf-opsawg-tacacs-tls13-23
CC @evyncke

Thank you for the work put into this document.

Please find below some non-blocking COMMENT points/nits (replies would be appreciated even if only for my own education).

Special thanks to Joe Clarke for the shepherd's detailed write-up including the WG consensus *and* the justification of the intended status especially the relationship to the informational RFC 8907.

I hope that this review helps to improve the document,

Regards,

-éric

## COMMENTS (non-blocking)

### Header

The header part is missing the draft name (not critical at this stage).

### QUIC

At least, some justifications why TLS was preferred to QUIC or HTTPS would be welcome.

### Section 3.1

I was unaware that the TLS handshake can be done not immediately after the TCP handshake as hinted by `Therefore, when a TCP connection is established for the service, a TLS handshake begins immediately.` or should this sentence be removed ?

s/separate TCP/IP port number /separate TCP port/

### Section 3.2

s/in which case the ticket might be invalidated/in which case the *session resumption* ticket might be invalidated/

I am not a security expert, but s/might/SHOULD/ seems more appropriate with an explanation *when* it can be kept.


### Section 3.4.1

When can the "SHOULD" by bypassed in `TLS Cached Information Extension [RFC7924] SHOULD be implemented.` ?

### Section 7

Unsure how to read `IANA (has allocated) is requested ` as the IANA has not yet allocated a port number (you may want to suggest a value).

### Operational considerations

Should the impact of the use of mutual TLS authentication be described ? Notably the provisioning of certs to all peers.
2025-06-24
23 Éric Vyncke [Ballot Position Update] New position, Yes, has been recorded for Éric Vyncke
2025-06-23
23 (System) IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed
2025-06-23
23 Roman Danyliw [Ballot comment]
Thank you to Russ Housley for the GENART review.
2025-06-23
23 Roman Danyliw [Ballot Position Update] New position, No Objection, has been recorded for Roman Danyliw
2025-06-21
23 dcmgash@cisco.com New version available: draft-ietf-opsawg-tacacs-tls13-23.txt
2025-06-21
23 (System) New version approved
2025-06-21
23 (System) Request for posting confirmation emailed to previous authors: "dcmgash@cisco.com" , Andrej Ota , John Heasley , Thorsten Dahm
2025-06-21
23 dcmgash@cisco.com Uploaded new revision
2025-06-21
22 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed
2025-06-21
22 dcmgash@cisco.com New version available: draft-ietf-opsawg-tacacs-tls13-22.txt
2025-06-21
22 (System) New version approved
2025-06-20
21 Ketan Talaulikar
[Ballot discuss]
Thanks for the work on this document and updating TACAS+ for TLS.

I have read the shepherd writeup regarding the proposed PS status …
[Ballot discuss]
Thanks for the work on this document and updating TACAS+ for TLS.

I have read the shepherd writeup regarding the proposed PS status for this. Since the security issues were the reason why the base TACAS+ document was downgraded from PS and this document is fixing that, I would like to discuss with the authors/WG why they did not do this work as a BIS such that the base TACAS+ would also get elevated to PS status?

Given its use, I would have thought updating TACAS+ to PS with this fix would be of help to the community.
2025-06-20
21 Ketan Talaulikar [Ballot Position Update] Position for Ketan Talaulikar has been changed to Discuss from No Objection
2025-06-20
21 Ketan Talaulikar [Ballot Position Update] New position, No Objection, has been recorded for Ketan Talaulikar
2025-06-20
22 (System) Request for posting confirmation emailed to previous authors: "dcmgash@cisco.com" , Andrej Ota , John Heasley , Thorsten Dahm
2025-06-20
22 dcmgash@cisco.com Uploaded new revision
2025-06-17
21 Gorry Fairhurst [Ballot Position Update] New position, No Objection, has been recorded for Gorry Fairhurst
2025-06-13
21 Mahesh Jethanandani
[Ballot comment]
Thanks to Russ Housley for the General Area Review Team (Gen-ART) review
(https://mailarchive.ietf.org/arch/msg/gen-art/cNyvkP_-A4zahKP-Ln_-DgozZzg).

In general, found the document easy to read. …
[Ballot comment]
Thanks to Russ Housley for the General Area Review Team (Gen-ART) review
(https://mailarchive.ietf.org/arch/msg/gen-art/cNyvkP_-A4zahKP-Ln_-DgozZzg).

In general, found the document easy to read. I have some minor COMMENT and NIT.

-------------------------------------------------------------------------------
COMMENT
-------------------------------------------------------------------------------

No reference entries found for these items, which were mentioned in the text:
[draft-ietf-radext-tls-psk] and [I-D.ietf-uta-require-tls13].

Found terminology that should be reviewed for inclusivity; see
https://www.rfc-editor.org/part2/#inclusive_language for background and more
guidance:

* Term "man"; alternatives might be "individual", "people", "person"

-------------------------------------------------------------------------------
NIT
-------------------------------------------------------------------------------

All comments below are about very minor potential issues that you may choose to
address in some way - or ignore - as you see fit. Some were flagged by
automated tools (via https://github.com/larseggert/ietf-reviewtool), so there
will likely be some false positives. There is no need to let me know what you
did with these suggestions.

Section 3.4, paragraph 1
>    Deploying TLS certificate-based uthentication correctly will
>    considerably improve the security of TACACS+ deployments.  It is
>    essential for implementers and operators to understand the
>    implications of a TLS certificate-based authentication solution,
>    including the correct handling of certificates, Certificate
>    Authorities (CAs), and all elements of TLS configuration.  For
>    guidance, start with [BCP195].

s/uthentication/authentication/

Section 5.1.6, paragraph 0
>    The use of wildcards in TLS server identities creates a single point
>    of failure: a compromised private key of a wildcard certificate
>    impacts all servers using it.  Their use MUST follow recommendations
>    of Section 7.1 of [RFC9525].  Operators MUST ensure that the wildcard
>    is limited to a subdomain dedicated solely to TLS TACACS+ servers.
>    Further, operators MUST ensure that the TLS TACACS+ servers covered
>    by a wildcard certificate MUST be impervious to redirection of
>    traffic to a different server (for example, due to MiTM attacks or
>    DNS cache poisoning).

Though expanded later, would prefer that MiTM is expanded here, as it is the first use of the acronym.

Uncited references: [TLSCSREC].

Section 3.6, paragraph 2
> lient and servers MUST operate with regards to the obfuscation mechanism. Pe
>                                ^^^^^^^^^^^^^^^
Use "in regard to", "with regard to", or more simply "regarding".
2025-06-13
21 Mahesh Jethanandani [Ballot Position Update] New position, No Objection, has been recorded for Mahesh Jethanandani
2025-06-12
21 Andy Newton
2025-06-12
21 Andy Newton [Ballot Position Update] New position, No Objection, has been recorded for Andy Newton
2025-05-22
21 Erik Kline [Ballot Position Update] New position, No Objection, has been recorded for Erik Kline
2025-05-13
21 David Dong IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed
2025-05-13
21 David Dong IANA Experts State changed to Expert Reviews OK from Issues identified
2025-05-13
21 Cindy Morgan Placed on agenda for telechat - 2025-06-26
2025-05-13
21 Mohamed Boucadair Ballot has been issued
2025-05-13
21 Mohamed Boucadair [Ballot Position Update] New position, Yes, has been recorded for Mohamed Boucadair
2025-05-13
21 Mohamed Boucadair Created "Approve" ballot
2025-05-13
21 Mohamed Boucadair IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead::AD Followup
2025-05-13
21 Mohamed Boucadair Ballot writeup was changed
2025-05-11
21 (System) Changed action holders to Mohamed Boucadair (IESG state changed)
2025-05-11
21 (System) Sub state has been changed to AD Followup from Revised I-D Needed
2025-05-11
21 (System) IANA Review state changed to Version Changed - Review Needed from IANA - Not OK
2025-05-11
21 dcmgash@cisco.com New version available: draft-ietf-opsawg-tacacs-tls13-21.txt
2025-05-11
21 (System) New version approved
2025-05-11
21 (System) Request for posting confirmation emailed to previous authors: "dcmgash@cisco.com" , Andrej Ota , John Heasley , Thorsten Dahm
2025-05-11
21 dcmgash@cisco.com Uploaded new revision
2025-05-09
20 David Dong IANA Experts State changed to Issues identified from Reviews assigned
2025-04-29
20 (System) Changed action holders to John Heasley, Thorsten Dahm, dcmgash@cisco.com, Andrej Ota (IESG state changed)
2025-04-29
20 Mohamed Boucadair IESG state changed to Waiting for AD Go-Ahead::Revised I-D Needed from Waiting for AD Go-Ahead
2025-04-29
20 (System) IESG state changed to Waiting for AD Go-Ahead from In Last Call
2025-04-25
20 David Dong
IESG/Authors/WG Chairs:

IANA has completed its review of draft-ietf-opsawg-tacacs-tls13-20. If any part of this review is inaccurate, please let us know.

IANA understands that, upon …
IESG/Authors/WG Chairs:

IANA has completed its review of draft-ietf-opsawg-tacacs-tls13-20. If any part of this review is inaccurate, please let us know.

IANA understands that, upon approval of this document, there is a single action which we must complete.

A single new port number is to be registered in the Service Name and Transport Protocol Port Number Registry located at

https://www.iana.org/assignments/service-names-port-numbers/

as follows:

Service Name: tacacss
Port Number: [ TBD-at-Registration ]
Transport Protocol: TCP
Assignee: IESG
Contact: IETF Chair
Description: TLS Secure Login Host Protocol (TACACSS)
Reference: [ RFC-to-be ]
Assignment Notes:

As this requests a registration in an Expert Review or Specification Required (see RFC 8126) registry, we will initiate the required Expert Review via a separate request. This review must be completed before the document's IANA state can be changed to "IANA OK."

NOTE: The action requested in this document will not be completed until the document has been approved for publication as an RFC. This message is meant only to confirm the action that will be performed.

For definitions of IANA review states, please see:

https://datatracker.ietf.org/help/state/draft/iana-review

Thank you,

David Dong
IANA Services Sr. Specialist
2025-04-25
20 (System) IANA Review state changed to IANA - Not OK from IANA - Review Needed
2025-04-22
20 David Dong IANA Experts State changed to Reviews assigned
2025-04-16
20 Rich Salz Request for IETF Last Call review by ARTART Completed: Ready with Nits. Reviewer: Rich Salz. Sent review to list.
2025-04-16
20 Russ Housley Request for IETF Last Call review by GENART Completed: Ready. Reviewer: Russ Housley. Sent review to list.
2025-04-16
20 Barry Leiba Request for IETF Last Call review by ARTART is assigned to Rich Salz
2025-04-16
20 Cullen Jennings Assignment of request for IETF Last Call review by ARTART to Cullen Jennings was rejected
2025-04-16
20 Barry Leiba Request for IETF Last Call review by ARTART is assigned to Cullen Jennings
2025-04-16
20 Jean Mahoney Request for IETF Last Call review by GENART is assigned to Russ Housley
2025-04-14
20 Cindy Morgan IANA Review state changed to IANA - Review Needed
2025-04-14
20 Cindy Morgan
The following Last Call announcement was sent out (ends 2025-04-28):

From: The IESG
To: IETF-Announce
CC: draft-ietf-opsawg-tacacs-tls13@ietf.org, jclarke@cisco.com, mohamed.boucadair@orange.com, opsawg-chairs@ietf.org, opsawg@ietf.org …
The following Last Call announcement was sent out (ends 2025-04-28):

From: The IESG
To: IETF-Announce
CC: draft-ietf-opsawg-tacacs-tls13@ietf.org, jclarke@cisco.com, mohamed.boucadair@orange.com, opsawg-chairs@ietf.org, opsawg@ietf.org
Reply-To: last-call@ietf.org
Sender:
Subject: Last Call:  (Terminal Access Controller Access-Control System Plus over TLS 1.3 (TACACS+ over TLS)) to Proposed Standard


The IESG has received a request from the Operations and Management Area
Working Group WG (opsawg) to consider the following document: - 'Terminal
Access Controller Access-Control System Plus over TLS 1.3
  (TACACS+ over TLS)'
  as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-call@ietf.org mailing lists by 2025-04-28. Exceptionally, comments may
be sent to iesg@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


  The Terminal Access Controller Access-Control System Plus (TACACS+)
  protocol provides device administration for routers, network access
  servers, and other networked computing devices via one or more
  centralized TACACS+ servers.  This document adds Transport Layer
  Security (TLS 1.3) support to TACACS+ and obsoletes former inferior
  security mechanisms.

  This document updates RFC 8907.





The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-opsawg-tacacs-tls13/



No IPR declarations have been submitted directly on this I-D.


The document contains these normative downward references.
See RFC 3967 for additional information:
    rfc8907: The Terminal Access Controller Access-Control System Plus (TACACS+) Protocol (Informational - Internet Engineering Task Force (IETF) stream)



2025-04-14
20 Cindy Morgan IESG state changed to In Last Call from Last Call Requested
2025-04-14
20 Cindy Morgan Last call announcement was generated
2025-04-13
20 Mohamed Boucadair Last call was requested
2025-04-13
20 Mohamed Boucadair Last call announcement was generated
2025-04-13
20 Mohamed Boucadair Ballot approval text was generated
2025-04-13
20 Mohamed Boucadair Ballot writeup was generated
2025-04-13
20 Mohamed Boucadair IESG state changed to Last Call Requested from AD Evaluation::AD Followup
2025-04-13
20 (System) Changed action holders to Mohamed Boucadair (IESG state changed)
2025-04-13
20 (System) Sub state has been changed to AD Followup from Revised I-D Needed
2025-04-13
20 dcmgash@cisco.com New version available: draft-ietf-opsawg-tacacs-tls13-20.txt
2025-04-13
20 (System) New version approved
2025-04-13
20 (System) Request for posting confirmation emailed to previous authors: "dcmgash@cisco.com" , Andrej Ota , John Heasley , Thorsten Dahm
2025-04-13
20 dcmgash@cisco.com Uploaded new revision
2025-04-09
19 Mohamed Boucadair See https://mailarchive.ietf.org/arch/msg/opsawg/DC6GQN6vnmU639eNqBGWyOvOSuo/
2025-04-09
19 (System) Changed action holders to John Heasley, Thorsten Dahm, Mohamed Boucadair, dcmgash@cisco.com, Andrej Ota (IESG state changed)
2025-04-09
19 Mohamed Boucadair IESG state changed to AD Evaluation::Revised I-D Needed from Publication Requested
2025-04-09
19 Joe Clarke
## Document History

1. Does the working group (WG) consensus represent the strong concurrence of a
  few individuals, with others being silent, or did …
## Document History

1. Does the working group (WG) consensus represent the strong concurrence of a
  few individuals, with others being silent, or did it reach broad agreement?

The consensus represents the strong concurrence of a few individuals, with
others being silent.


2. Was there controversy about particular points, or were there decisions where
  the consensus was particularly rough?

No controversy. The authors was responsive enough in tracking and processing all
Comments.

3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If
  so, please summarize the areas of conflict in separate email messages to the
  responsible Area Director. (It should be in a separate email because this
  questionnaire is publicly available.)

No.

4. For protocol documents, are there existing implementations of the contents of
  the document? Have a significant number of potential implementers indicated
  plans to implement? Are any existing implementations reported somewhere,
  either in the document itself (as [RFC 7942][3] recommends) or elsewhere
  (where)?

Yes, at least an implementation was disclosed at
https://mailarchive.ietf.org/arch/msg/opsawg/XQ3nytQ-bnXmWcrcqZRMvcbQ3ok/

A plan to implement was also shared here:
https://mailarchive.ietf.org/arch/msg/opsawg/UOWVLRZab_02QzIqevRlS6-shrw/ 


## Additional Reviews

5. Do the contents of this document closely interact with technologies in other
  IETF working groups or external organizations, and would it therefore benefit
  from their review? Have those reviews occurred? If yes, describe which
  reviews took place.

Yes. The document leverages BCPs and specifications developed in other WGs.
The document avoids specific/customized behaviors when possible and tried to maximize
factorization of existing behaviors. Also, in order to inherit future guidelines,
the document cites BCP195 instead of RFC 9325.

There were some areas where existing BCPs/RFCs do not provide sufficient implementation
details. The document inspired from other applications (e.g., draft-ietf-radext-tls-psk).
This is ACKed in the document.

Many iterations were needed to converge on the current level details. Thanks to the support
of experts such as Alan DeKok.

The development of the document revealed the need for global guidance (e.g., by UTA)
rather that each application relying on TLS specifies its own behavior  (e.g., Debugging TACACS+ over TLS).
See https://mailarchive.ietf.org/arch/msg/opsawg/RpstFYI1dVcLnOm9Hb_FjXmkmnE/ for more details
about what seems a plan.

See also below for the external reviews, including from UTA.

6. Describe how the document meets any required formal expert review criteria,
  such as the MIB Doctor, YANG Doctor, media type, and URI type reviews.

N/A

7. If the document contains a YANG module, has the final version of the module
  been checked with any of the [recommended validation tools][4] for syntax and
  formatting validation? If there are any resulting errors or warnings, what is
  the justification for not fixing them at this time? Does the YANG module
  comply with the Network Management Datastore Architecture (NMDA) as specified
  in [RFC 8342][5]?

N/A

8. Describe reviews and automated checks performed to validate sections of the
  final version of the document written in a formal language, such as XML code,
  BNF rules, MIB definitions, CBOR's CDDL, etc.

N/A

## Document Shepherd Checks

9. Based on the shepherd's review of the document, is it their opinion that this
  document is needed, clearly written, complete, correctly designed, and ready
  to be handed off to the responsible Area Director?

Definitely. This is an over-due document. It is well-written and is technically solid.

10. Several IETF Areas have assembled [lists of common issues that their
    reviewers encounter][6]. For which areas have such issues been identified
    and addressed? For which does this still need to happen in subsequent
    reviews?

The WG actively sought early in the process to secure reviews from OPS, transport,
and security areas.

The WG also solicited UTA WG, with the WGLC circulated also in UTA:
  * https://mailarchive.ietf.org/arch/msg/uta/KmRofaCQU2OWNp8acXuGjDyoPng/

Also, the WG sought for experts reviews for the TLS part, particularly:

* Valery: https://mailarchive.ietf.org/arch/msg/opsawg/U3mPq3WlRF48blMmr2uCF80KLiI/
* Tiru: https://mailarchive.ietf.org/arch/msg/opsawg/lWIGe93NCcmUF7U1XUgQY0aqH5w/

All these reviews were adequately addressed by the authors.

No further reviews are needed.

11. What type of RFC publication is being requested on the IETF stream ([Best
    Current Practice][12], [Proposed Standard, Internet Standard][13],
    [Informational, Experimental or Historic][14])? Why is this the proper type
    of RFC? Do all Datatracker state attributes correctly reflect this intent?

The document targets Proposed Standard. This is well-documented in both the front
page and Datatracker metadata.

This intended track is justified given the interoperability requirement to deploy
TACACS+TLS clients and servers. The document includes the requirement normative
behavior to ensure such interoperability.

Note that the document updates an Informational document (RFC 8907), though. However,
that is not a problem because the status of RFC 8907 was set on-purpose as Informational
at the time of publication to acknowledge that, although RFC 8907 specifies a protocol
and given its security limitations, the publication was granted to document the protocol
as widely deployed. The deal with the IESG at the time was that the WG will supplement
a PS that will fix these issues.
This document removes those security limitations and Proposed Standard is adequate.

12. Have reasonable efforts been made to remind all authors of the intellectual
    property rights (IPR) disclosure obligations described in [BCP 79][7]? To
    the best of your knowledge, have all required disclosures been filed? If
    not, explain why. If yes, summarize any relevant discussion, including links
    to publicly-available messages when applicable.

Yes.

  * Thorsten: https://mailarchive.ietf.org/arch/msg/opsawg/BKAFwpGB6guT0li2OXEkCw9lqDM/
  * John: https://mailarchive.ietf.org/arch/msg/opsawg/9ttUzCNXz-RdNpOyNZk6djwdiY8/ 
  * Doug: https://mailarchive.ietf.org/arch/msg/opsawg/sBuAyZjhQaf3MjgGsnwclG0Hh68/
  * Andrej: https://mailarchive.ietf.org/arch/msg/opsawg/wvz4aMxEuRJg7VPTtyGO6Nxk8Ck/

13. Has each author, editor, and contributor shown their willingness to be
    listed as such? If the total number of authors and editors on the front page
    is greater than five, please provide a justification.

Yes, as evidenced by the replies to IPR polls.

14. Document any remaining I-D nits in this document. Simply running the [idnits
    tool][8] is not enough; please review the ["Content Guidelines" on
    authors.ietf.org][15]. (Also note that the current idnits tool generates
    some incorrect warnings; a rewrite is underway.)

The following should be fixed:

  == Unused Reference: 'TLSCSREC' is defined on line 767, but no explicit
    reference was found in the text

  -- Obsolete informational reference (is this intentional?): RFC 4020
    (Obsoleted by RFC 7120)

I suggest to delete both entries.

15. Should any informative references be normative or vice-versa? See the [IESG
    Statement on Normative and Informative References][16].

All references are well classified.

16. List any normative references that are not freely available to anyone. Did
    the community have sufficient access to review any such normative
    references?

N/A.

17. Are there any normative downward references (see [RFC 3967][9] and [BCP
    97
][10]) that are not already listed in the [DOWNREF registry][17]? If so,
    list them.

Yes, RFC 8907. This normative dependency is unavoidable given that the document
Leverage the “legacy” TACACS+ and enhances it to be more secure by adding TLS.

Also, the document has a normative dependency on BCP195/RFC9325, which is not
in the downref. However, the registry should be fixed given existing normative
dependency on that RFC as evidenced by https://datatracker.ietf.org/doc/rfc9325/referencedby/.

18. Are there normative references to documents that are not ready to be
    submitted to the IESG for publication or are otherwise in an unclear state?
    If so, what is the plan for their completion?

No. All normative references are published RFCs.

19. Will publication of this document change the status of any existing RFCs? If
    so, does the Datatracker metadata correctly reflect this and are those RFCs
    listed on the title page, in the abstract, and discussed in the
    introduction? If not, explain why and point to the part of the document
    where the relationship of this document to these other RFCs is discussed.

This document will update RFC 8907. This is clearly indicated on the title
page, the abstract, and the introduction.

20. Describe the document shepherd's review of the IANA considerations section,
    especially with regard to its consistency with the body of the document.
    Confirm that all aspects of the document requiring IANA assignments are
    associated with the appropriate reservations in IANA registries. Confirm
    that any referenced IANA registries have been clearly identified. Confirm
    that each newly created IANA registry specifies its initial contents,
    allocations procedures, and a reasonable name (see [RFC 8126][11]).

The document requests IANA to register a well-known port number and a service
Name to TACACS+TLS. The target registry is clearly identified with a link
Included. Also, the required information to perform the registration is provided.

Note that the authors refers to RFC4020, but that reference can be removed as
no early allocation is requested here, but a permanent assignment.

The WG reached out early in the development process of this document with
The TSV directorate to specifically review this request. The assigned
Reviewer didn’t flag any concern and confirmed that the request is
justified (2024-05-05).

21. List any new IANA registries that require Designated Expert Review for
    future allocations. Are the instructions to the Designated Expert clear?
    Please include suggestions of designated experts, if appropriate.

N/A. The document does not introduce any new registry.

[1]: https://www.ietf.org/about/groups/iesg/
[2]: https://www.rfc-editor.org/rfc/rfc4858.html
[3]: https://www.rfc-editor.org/rfc/rfc7942.html
[4]: https://wiki.ietf.org/group/ops/yang-review-tools
[5]: https://www.rfc-editor.org/rfc/rfc8342.html
[6]: https://wiki.ietf.org/group/iesg/ExpertTopics
[7]: https://www.rfc-editor.org/info/bcp79
[8]: https://www.ietf.org/tools/idnits/
[9]: https://www.rfc-editor.org/rfc/rfc3967.html
[10]: https://www.rfc-editor.org/info/bcp97
[11]: https://www.rfc-editor.org/rfc/rfc8126.html
[12]: https://www.rfc-editor.org/rfc/rfc2026.html#section-5
[13]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.1
[14]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.2
[15]: https://authors.ietf.org/en/content-guidelines-overview
[16]: https://www.ietf.org/about/groups/iesg/statements/normative-informative-references/
[17]: https://datatracker.ietf.org/doc/downref/
2025-04-09
19 Joe Clarke IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up
2025-04-09
19 Joe Clarke IESG state changed to Publication Requested from I-D Exists
2025-04-09
19 (System) Changed action holders to Mohamed Boucadair (IESG state changed)
2025-04-09
19 Joe Clarke Document is now in IESG state Publication Requested
2025-04-09
19 Joe Clarke Tag Awaiting Expert Review/Resolution of Issues Raised cleared.
2025-04-09
19 Russ Housley Request for IETF Last Call review by SECDIR Completed: Ready. Reviewer: Russ Housley. Sent review to list.
2025-04-09
19 Mohamed Boucadair AD review: https://github.com/boucadair/IETF-Drafts-Reviews/blob/master/2025/draft-ietf-opsawg-tacacs-tls13-19-rev%20Med.pdf
2025-04-08
19 Mahesh Jethanandani Shepherding AD changed to Mohamed Boucadair
2025-04-08
19 Joe Clarke
## Document History

1. Does the working group (WG) consensus represent the strong concurrence of a
  few individuals, with others being silent, or did …
## Document History

1. Does the working group (WG) consensus represent the strong concurrence of a
  few individuals, with others being silent, or did it reach broad agreement?

The consensus represents the strong concurrence of a few individuals, with
others being silent.


2. Was there controversy about particular points, or were there decisions where
  the consensus was particularly rough?

No controversy. The authors was responsive enough in tracking and processing all
Comments.

3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If
  so, please summarize the areas of conflict in separate email messages to the
  responsible Area Director. (It should be in a separate email because this
  questionnaire is publicly available.)

No.

4. For protocol documents, are there existing implementations of the contents of
  the document? Have a significant number of potential implementers indicated
  plans to implement? Are any existing implementations reported somewhere,
  either in the document itself (as [RFC 7942][3] recommends) or elsewhere
  (where)?

Yes, at least an implementation was disclosed at
https://mailarchive.ietf.org/arch/msg/opsawg/XQ3nytQ-bnXmWcrcqZRMvcbQ3ok/

A plan to implement was also shared here:
https://mailarchive.ietf.org/arch/msg/opsawg/UOWVLRZab_02QzIqevRlS6-shrw/ 


## Additional Reviews

5. Do the contents of this document closely interact with technologies in other
  IETF working groups or external organizations, and would it therefore benefit
  from their review? Have those reviews occurred? If yes, describe which
  reviews took place.

Yes. The document leverages BCPs and specifications developed in other WGs.
The document avoids specific/customized behaviors when possible and tried to maximize
factorization of existing behaviors. Also, in order to inherit future guidelines,
the document cites BCP195 instead of RFC 9325.

There were some areas where existing BCPs/RFCs do not provide sufficient implementation
details. The document inspired from other applications (e.g., draft-ietf-radext-tls-psk).
This is ACKed in the document.

Many iterations were needed to converge on the current level details. Thanks to the support
of experts such as Alan DeKok.

The development of the document revealed the need for global guidance (e.g., by UTA)
rather that each application relying on TLS specifies its own behavior  (e.g., Debugging TACACS+ over TLS).
See https://mailarchive.ietf.org/arch/msg/opsawg/RpstFYI1dVcLnOm9Hb_FjXmkmnE/ for more details
about what seems a plan.

See also below for the external reviews, including from UTA.

6. Describe how the document meets any required formal expert review criteria,
  such as the MIB Doctor, YANG Doctor, media type, and URI type reviews.

N/A

7. If the document contains a YANG module, has the final version of the module
  been checked with any of the [recommended validation tools][4] for syntax and
  formatting validation? If there are any resulting errors or warnings, what is
  the justification for not fixing them at this time? Does the YANG module
  comply with the Network Management Datastore Architecture (NMDA) as specified
  in [RFC 8342][5]?

N/A

8. Describe reviews and automated checks performed to validate sections of the
  final version of the document written in a formal language, such as XML code,
  BNF rules, MIB definitions, CBOR's CDDL, etc.

N/A

## Document Shepherd Checks

9. Based on the shepherd's review of the document, is it their opinion that this
  document is needed, clearly written, complete, correctly designed, and ready
  to be handed off to the responsible Area Director?

Definitely. This is an over-due document. It is well-written and is technically solid.

10. Several IETF Areas have assembled [lists of common issues that their
    reviewers encounter][6]. For which areas have such issues been identified
    and addressed? For which does this still need to happen in subsequent
    reviews?

The WG actively sought early in the process to secure reviews from OPS, transport,
and security areas.

The WG also solicited UTA WG, with the WGLC circulated also in UTA:
  * https://mailarchive.ietf.org/arch/msg/uta/KmRofaCQU2OWNp8acXuGjDyoPng/

Also, the WG sought for experts reviews for the TLS part, particularly:

* Valery: https://mailarchive.ietf.org/arch/msg/opsawg/U3mPq3WlRF48blMmr2uCF80KLiI/
* Tiru: https://mailarchive.ietf.org/arch/msg/opsawg/lWIGe93NCcmUF7U1XUgQY0aqH5w/

All these reviews were adequately addressed by the authors.

No further reviews are needed.

11. What type of RFC publication is being requested on the IETF stream ([Best
    Current Practice][12], [Proposed Standard, Internet Standard][13],
    [Informational, Experimental or Historic][14])? Why is this the proper type
    of RFC? Do all Datatracker state attributes correctly reflect this intent?

The document targets Proposed Standard. This is well-documented in both the front
page and Datatracker metadata.

This intended track is justified given the interoperability requirement to deploy
TACACS+TLS clients and servers. The document includes the requirement normative
behavior to ensure such interoperability.

Note that the document updates an Informational document (RFC 8907), though. However,
that is not a problem because the status of RFC 8907 was set on-purpose as Informational
at the time of publication to acknowledge that, although RFC 8907 specifies a protocol
and given its security limitations, the publication was granted to document the protocol
as widely deployed. The deal with the IESG at the time was that the WG will supplement
a PS that will fix these issues.
This document removes those security limitations and Proposed Standard is adequate.

12. Have reasonable efforts been made to remind all authors of the intellectual
    property rights (IPR) disclosure obligations described in [BCP 79][7]? To
    the best of your knowledge, have all required disclosures been filed? If
    not, explain why. If yes, summarize any relevant discussion, including links
    to publicly-available messages when applicable.

Yes.

  * Thorsten: https://mailarchive.ietf.org/arch/msg/opsawg/BKAFwpGB6guT0li2OXEkCw9lqDM/
  * John: https://mailarchive.ietf.org/arch/msg/opsawg/9ttUzCNXz-RdNpOyNZk6djwdiY8/ 
  * Doug: https://mailarchive.ietf.org/arch/msg/opsawg/sBuAyZjhQaf3MjgGsnwclG0Hh68/
  * Andrej: https://mailarchive.ietf.org/arch/msg/opsawg/wvz4aMxEuRJg7VPTtyGO6Nxk8Ck/

13. Has each author, editor, and contributor shown their willingness to be
    listed as such? If the total number of authors and editors on the front page
    is greater than five, please provide a justification.

Yes, as evidenced by the replies to IPR polls.

14. Document any remaining I-D nits in this document. Simply running the [idnits
    tool][8] is not enough; please review the ["Content Guidelines" on
    authors.ietf.org][15]. (Also note that the current idnits tool generates
    some incorrect warnings; a rewrite is underway.)

The following should be fixed:

  == Unused Reference: 'TLSCSREC' is defined on line 767, but no explicit
    reference was found in the text

  -- Obsolete informational reference (is this intentional?): RFC 4020
    (Obsoleted by RFC 7120)

I suggest to delete both entries.

15. Should any informative references be normative or vice-versa? See the [IESG
    Statement on Normative and Informative References][16].

All references are well classified.

16. List any normative references that are not freely available to anyone. Did
    the community have sufficient access to review any such normative
    references?

N/A.

17. Are there any normative downward references (see [RFC 3967][9] and [BCP
    97
][10]) that are not already listed in the [DOWNREF registry][17]? If so,
    list them.

Yes, RFC 8907. This normative dependency is unavoidable given that the document
Leverage the “legacy” TACACS+ and enhances it to be more secure by adding TLS.

Also, the document has a normative dependency on BCP195/RFC9325, which is not
in the downref. However, the registry should be fixed given existing normative
dependency on that RFC as evidenced by https://datatracker.ietf.org/doc/rfc9325/referencedby/.

18. Are there normative references to documents that are not ready to be
    submitted to the IESG for publication or are otherwise in an unclear state?
    If so, what is the plan for their completion?

No. All normative references are published RFCs.

19. Will publication of this document change the status of any existing RFCs? If
    so, does the Datatracker metadata correctly reflect this and are those RFCs
    listed on the title page, in the abstract, and discussed in the
    introduction? If not, explain why and point to the part of the document
    where the relationship of this document to these other RFCs is discussed.

This document will update RFC 8907. This is clearly indicated on the title
page, the abstract, and the introduction.

20. Describe the document shepherd's review of the IANA considerations section,
    especially with regard to its consistency with the body of the document.
    Confirm that all aspects of the document requiring IANA assignments are
    associated with the appropriate reservations in IANA registries. Confirm
    that any referenced IANA registries have been clearly identified. Confirm
    that each newly created IANA registry specifies its initial contents,
    allocations procedures, and a reasonable name (see [RFC 8126][11]).

The document requests IANA to register a well-known port number and a service
Name to TACACS+TLS. The target registry is clearly identified with a link
Included. Also, the required information to perform the registration is provided.

Note that the authors refers to RFC4020, but that reference can be removed as
no early allocation is requested here, but a permanent assignment.

The WG reached out early in the development process of this document with
The TSV directorate to specifically review this request. The assigned
Reviewer didn’t flag any concern and confirmed that the request is
justified (2024-05-05).

21. List any new IANA registries that require Designated Expert Review for
    future allocations. Are the instructions to the Designated Expert clear?
    Please include suggestions of designated experts, if appropriate.

N/A. The document does not introduce any new registry.

[1]: https://www.ietf.org/about/groups/iesg/
[2]: https://www.rfc-editor.org/rfc/rfc4858.html
[3]: https://www.rfc-editor.org/rfc/rfc7942.html
[4]: https://wiki.ietf.org/group/ops/yang-review-tools
[5]: https://www.rfc-editor.org/rfc/rfc8342.html
[6]: https://wiki.ietf.org/group/iesg/ExpertTopics
[7]: https://www.rfc-editor.org/info/bcp79
[8]: https://www.ietf.org/tools/idnits/
[9]: https://www.rfc-editor.org/rfc/rfc3967.html
[10]: https://www.rfc-editor.org/info/bcp97
[11]: https://www.rfc-editor.org/rfc/rfc8126.html
[12]: https://www.rfc-editor.org/rfc/rfc2026.html#section-5
[13]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.1
[14]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.2
[15]: https://authors.ietf.org/en/content-guidelines-overview
[16]: https://www.ietf.org/about/groups/iesg/statements/normative-informative-references/
[17]: https://datatracker.ietf.org/doc/downref/
2025-04-08
19 Joe Clarke Notification list changed to mohamed.boucadair@orange.com, jclarke@cisco.com from mohamed.boucadair@orange.com because the document shepherd was set
2025-04-08
19 Joe Clarke Document shepherd changed to Joe Clarke
2025-04-08
19 Tero Kivinen Request for IETF Last Call review by SECDIR is assigned to Russ Housley
2025-04-08
19 Tero Kivinen Requested IETF Last Call review by SECDIR
2025-04-04
19 Joe Clarke Tag Awaiting Expert Review/Resolution of Issues Raised set.
2025-04-04
19 Joe Clarke IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call
2025-04-03
19 dcmgash@cisco.com New version available: draft-ietf-opsawg-tacacs-tls13-19.txt
2025-04-03
19 (System) New version approved
2025-04-03
19 (System) Request for posting confirmation emailed to previous authors: "dcmgash@cisco.com" , Andrej Ota , John Heasley , Thorsten Dahm
2025-04-03
19 dcmgash@cisco.com Uploaded new revision
2025-03-13
18 Qin Wu Request for Last Call review by OPSDIR Completed: Has Nits. Reviewer: Qin Wu. Review has been revised by Qin Wu.
2025-03-13
18 Qin Wu Request for Last Call review by OPSDIR Completed: Has Nits. Reviewer: Qin Wu. Review has been revised by Qin Wu.
2025-03-13
18 Qin Wu Request for Last Call review by OPSDIR Completed: Has Nits. Reviewer: Qin Wu. Sent review to list.
2025-03-12
18 Carlos Pignataro Request for Last Call review by OPSDIR is assigned to Qin Wu
2025-03-08
18 Russ Housley Request for Last Call review by SECDIR Completed: Not Ready. Reviewer: Russ Housley. Sent review to list. Submission of review completed at an earlier date.
2025-03-08
18 Russ Housley Request for Last Call review by SECDIR Completed: Not Ready. Reviewer: Russ Housley.
2025-03-07
18 Tero Kivinen Request for Last Call review by SECDIR is assigned to Russ Housley
2025-03-06
18 Magnus Westerlund Closed request for Last Call review by TSVART with state 'Withdrawn': TSV-ART review did not raise any issues that needed to be re-reviewed.
2025-03-06
18 Joe Clarke Requested Last Call review by TSVART
2025-03-06
18 Joe Clarke Requested Last Call review by OPSDIR
2025-03-06
18 Joe Clarke Requested Last Call review by SECDIR
2025-03-06
18 Joe Clarke Tag Revised I-D Needed - Issue raised by WGLC cleared.
2025-03-06
18 Joe Clarke IETF WG state changed to In WG Last Call from WG Document
2025-02-13
18 dcmgash@cisco.com New version available: draft-ietf-opsawg-tacacs-tls13-18.txt
2025-02-13
18 (System) New version approved
2025-02-13
18 (System) Request for posting confirmation emailed to previous authors: "dcmgash@cisco.com" , Andrej Ota , John Heasley , Thorsten Dahm
2025-02-13
18 dcmgash@cisco.com Uploaded new revision
2025-01-27
17 dcmgash@cisco.com New version available: draft-ietf-opsawg-tacacs-tls13-17.txt
2025-01-27
17 (System) New version approved
2025-01-27
17 (System) Request for posting confirmation emailed to previous authors: "dcmgash@cisco.com" , Andrej Ota , John Heasley , Thorsten Dahm
2025-01-27
17 dcmgash@cisco.com Uploaded new revision
2024-12-12
16 dcmgash@cisco.com New version available: draft-ietf-opsawg-tacacs-tls13-16.txt
2024-12-12
16 (System) New version approved
2024-12-09
16 (System) Request for posting confirmation emailed to previous authors: "dcmgash@cisco.com" , Andrej Ota , John Heasley , Thorsten Dahm
2024-12-09
16 dcmgash@cisco.com Uploaded new revision
2024-11-18
15 dcmgash@cisco.com New version available: draft-ietf-opsawg-tacacs-tls13-15.txt
2024-11-18
15 (System) New version approved
2024-11-18
15 (System) Request for posting confirmation emailed to previous authors: "dcmgash@cisco.com" , Andrej Ota , John Heasley , Thorsten Dahm
2024-11-18
15 dcmgash@cisco.com Uploaded new revision
2024-10-18
14 Carlos Pignataro Closed request for Last Call review by OPSDIR with state 'Overtaken by Events'
2024-10-18
14 Carlos Pignataro Assignment of request for Last Call review by OPSDIR to Joel Jaeggli was marked no-response
2024-10-16
14 dcmgash@cisco.com New version available: draft-ietf-opsawg-tacacs-tls13-14.txt
2024-10-16
14 (System) New version approved
2024-10-16
14 (System) Request for posting confirmation emailed to previous authors: "dcmgash@cisco.com" , Andrej Ota , John Heasley , Thorsten Dahm
2024-10-16
14 dcmgash@cisco.com Uploaded new revision
2024-10-09
13 dcmgash@cisco.com New version available: draft-ietf-opsawg-tacacs-tls13-13.txt
2024-10-09
13 (System) New version approved
2024-10-09
13 (System) Request for posting confirmation emailed to previous authors: "dcmgash@cisco.com" , Andrej Ota , John Heasley , Thorsten Dahm
2024-10-09
13 dcmgash@cisco.com Uploaded new revision
2024-09-18
12 dcmgash@cisco.com New version available: draft-ietf-opsawg-tacacs-tls13-12.txt
2024-09-18
12 (System) New version approved
2024-09-18
12 (System) Request for posting confirmation emailed to previous authors: "dcmgash@cisco.com" , Andrej Ota , John Heasley , Thorsten Dahm
2024-09-18
12 dcmgash@cisco.com Uploaded new revision
2024-08-12
11 dcmgash@cisco.com New version available: draft-ietf-opsawg-tacacs-tls13-11.txt
2024-08-12
11 (System) New version approved
2024-08-12
11 (System) Request for posting confirmation emailed to previous authors: "dcmgash@cisco.com" , Andrej Ota , John Heasley , Thorsten Dahm
2024-08-12
11 dcmgash@cisco.com Uploaded new revision
2024-08-03
10 Yingzhen Qu Request for Early review by OPSDIR Completed: Has Issues. Reviewer: Yingzhen Qu. Sent review to list.
2024-07-15
10 Carlos Pignataro Request for Early review by OPSDIR is assigned to Yingzhen Qu
2024-07-15
10 Carlos Pignataro Assignment of request for Early review by OPSDIR to Sarah Banks was marked no-response
2024-07-10
10 Joe Clarke
Based on comments from the working group and authors, we are going to hold this draft in the WG for now.  There is an outstanding …
Based on comments from the working group and authors, we are going to hold this draft in the WG for now.  There is an outstanding question on external PSKs where more WG input is needed (the authors have proposed two choices on this front).  Additionally, we have some SEC DIR feedback pending.
2024-07-10
10 Joe Clarke
Based on comments from the working group and authors, we are going to hold this draft in the WG for now.  There is an outstanding …
Based on comments from the working group and authors, we are going to hold this draft in the WG for now.  There is an outstanding question on external PSKs where more WG input is needed (the authors have proposed two choices on this front).  Additionally, we have some SEC DIR feedback pending.
2024-07-10
10 Joe Clarke Tag Revised I-D Needed - Issue raised by WGLC set.
2024-07-10
10 Joe Clarke IETF WG state changed to WG Document from In WG Last Call
2024-07-02
10 Carlos Pignataro Request for Last Call review by OPSDIR is assigned to Joel Jaeggli
2024-07-01
10 Russ Housley Request for Last Call review by SECDIR Completed: Not Ready. Reviewer: Russ Housley. Sent review to list.
2024-06-28
10 Tero Kivinen Request for Last Call review by SECDIR is assigned to Russ Housley
2024-06-24
10 Joe Clarke Requested Last Call review by OPSDIR
2024-06-24
10 Joe Clarke Requested Last Call review by SECDIR
2024-06-24
10 Joe Clarke IETF WG state changed to In WG Last Call from WG Document
2024-05-22
10 dcmgash@cisco.com New version available: draft-ietf-opsawg-tacacs-tls13-10.txt
2024-05-22
10 (System) New version approved
2024-05-22
10 (System) Request for posting confirmation emailed to previous authors: "dcmgash@cisco.com" , Andrej Ota , John Heasley , Thorsten Dahm
2024-05-22
10 dcmgash@cisco.com Uploaded new revision
2024-05-21
09 dcmgash@cisco.com New version available: draft-ietf-opsawg-tacacs-tls13-09.txt
2024-05-21
09 (System) New version approved
2024-05-21
09 (System) Request for posting confirmation emailed to previous authors: "dcmgash@cisco.com" , Andrej Ota , John Heasley , Thorsten Dahm
2024-05-21
09 dcmgash@cisco.com Uploaded new revision
2024-05-09
08 dcmgash@cisco.com New version available: draft-ietf-opsawg-tacacs-tls13-08.txt
2024-05-09
08 (System) New version approved
2024-05-09
08 (System) Request for posting confirmation emailed to previous authors: "dcmgash@cisco.com" , Andrej Ota , John Heasley , Thorsten Dahm
2024-05-09
08 dcmgash@cisco.com Uploaded new revision
2024-05-05
07 Colin Perkins Request for Early review by TSVART Completed: Ready. Reviewer: Colin Perkins. Sent review to list.
2024-04-25
07 Russ Housley Request for Early review by SECDIR Completed: Not Ready. Reviewer: Russ Housley. Sent review to list.
2024-04-25
07 Tero Kivinen Request for Early review by SECDIR is assigned to Russ Housley
2024-04-23
07 dcmgash@cisco.com New version available: draft-ietf-opsawg-tacacs-tls13-07.txt
2024-04-23
07 (System) New version approved
2024-04-23
07 (System) Request for posting confirmation emailed to previous authors: "dcmgash@cisco.com" , Andrej Ota , John Heasley , Thorsten Dahm
2024-04-23
07 dcmgash@cisco.com Uploaded new revision
2024-04-22
06 Magnus Westerlund Request for Early review by TSVART is assigned to Colin Perkins
2024-04-20
06 Joe Clarke Requested Early review by TSVART
2024-04-19
06 Carlos Pignataro Request for Early review by OPSDIR is assigned to Sarah Banks
2024-04-19
06 Joe Clarke Requested Early review by OPSDIR
2024-04-19
06 Joe Clarke Requested Early review by SECDIR
2024-04-19
06 Joe Clarke Changed consensus to Yes from Unknown
2024-04-19
06 Joe Clarke Intended Status changed to Proposed Standard from None
2024-03-21
06 Joe Clarke Notification list changed to mohamed.boucadair@orange.com because the document shepherd was set
2024-03-21
06 Joe Clarke Document shepherd changed to Mohamed Boucadair
2024-03-20
06 dcmgash@cisco.com New version available: draft-ietf-opsawg-tacacs-tls13-06.txt
2024-03-20
06 (System) New version approved
2024-03-20
06 (System) Request for posting confirmation emailed to previous authors: "dcmgash@cisco.com" , Andrej Ota , John Heasley , Thorsten Dahm
2024-03-20
06 dcmgash@cisco.com Uploaded new revision
2024-01-23
05 dcmgash@cisco.com New version available: draft-ietf-opsawg-tacacs-tls13-05.txt
2024-01-23
05 (System) New version approved
2024-01-23
05 (System) Request for posting confirmation emailed to previous authors: "dcmgash@cisco.com" , Andrej Ota , John Heasley , Thorsten Dahm
2024-01-23
05 dcmgash@cisco.com Uploaded new revision
2023-12-22
04 dcmgash@cisco.com New version available: draft-ietf-opsawg-tacacs-tls13-04.txt
2023-12-22
04 (System) New version approved
2023-12-22
04 (System) Request for posting confirmation emailed to previous authors: "dcmgash@cisco.com" , Andrej Ota , John Heasley , Thorsten Dahm
2023-12-22
04 dcmgash@cisco.com Uploaded new revision
2023-06-29
03 dcmgash@cisco.com New version available: draft-ietf-opsawg-tacacs-tls13-03.txt
2023-06-29
03 (System) New version approved
2023-06-29
03 (System) Request for posting confirmation emailed to previous authors: "dcmgash@cisco.com" , Andrej Ota , John Heasley , Thorsten Dahm
2023-06-29
03 dcmgash@cisco.com Uploaded new revision
2023-03-13
02 John Heasley New version available: draft-ietf-opsawg-tacacs-tls13-02.txt
2023-03-13
02 (System) New version approved
2023-03-13
02 (System) Request for posting confirmation emailed to previous authors: "dcmgash@cisco.com" , Andrej Ota , John Heasley , Thorsten Dahm
2023-03-13
02 John Heasley Uploaded new revision
2022-11-30
01 John Heasley New version available: draft-ietf-opsawg-tacacs-tls13-01.txt
2022-11-30
01 John Heasley New version accepted (logged-in submitter: John Heasley)
2022-11-30
01 John Heasley Uploaded new revision
2022-08-06
00 Joe Clarke This document now replaces draft-dahm-tacacs-tls13 instead of None
2022-08-06
00 John Heasley New version available: draft-ietf-opsawg-tacacs-tls13-00.txt
2022-08-06
00 Joe Clarke WG -00 approved
2022-08-05
00 John Heasley Set submitter to "John Heasley ", replaces to draft-dahm-tacacs-tls13 and sent approval email to group chairs: opsawg-chairs@ietf.org
2022-08-05
00 John Heasley Uploaded new revision