Skip to main content

Early Review of draft-ietf-opsawg-tacacs-tls13-10
review-ietf-opsawg-tacacs-tls13-10-opsdir-early-qu-2024-08-03-00

Request Review of draft-ietf-opsawg-tacacs-tls13
Requested revision No specific revision (document currently at 20)
Type Early Review
Team Ops Directorate (opsdir)
Deadline 2024-05-03
Requested 2024-04-19
Requested by Joe Clarke
Authors Thorsten Dahm , John Heasley , dcmgash@cisco.com , Andrej Ota
I-D last updated 2025-04-29 (Latest revision 2025-04-13)
Completed reviews Secdir Early review of -07 by Russ Housley (diff)
Tsvart Early review of -07 by Colin Perkins (diff)
Secdir IETF Last Call review of -10 by Russ Housley (diff)
Opsdir Early review of -10 by Yingzhen Qu (diff)
Opsdir IETF Last Call review of -18 by Qin Wu (diff)
Secdir IETF Last Call review of -18 by Russ Housley (diff)
Secdir IETF Last Call review of -19 by Russ Housley (diff)
Genart IETF Last Call review of -20 by Russ Housley
Artart IETF Last Call review of -20 by Rich Salz
Comments
We'd like to get some more security eyes on this given some of the comments we've had from the WG.  Additionally, getting a focused OPS review to see if there are other operational considerations for this given the ubiquity of T+ would be beneficial.
Assignment Reviewer Yingzhen Qu
State Completed
Request Early review on draft-ietf-opsawg-tacacs-tls13 by Ops Directorate Assigned
Posted at https://mailarchive.ietf.org/arch/msg/ops-dir/KtymSaAoyAmmF8HdVUQCnZ_LI80
Reviewed revision 10 (document currently at 20)
Result Has issues
Completed 2024-08-03
review-ietf-opsawg-tacacs-tls13-10-opsdir-early-qu-2024-08-03-00
I have reviewed this document as part of the Ops area directorate's ongoing
effort to review all IETF documents being processed by the IESG.  These
comments were written primarily for the benefit of the Ops area directors.
Document editors and WG chairs should treat these comments just like any other
last-call comments.

I have the following questions and nits for the authors to consider:

102      Protocol [RFC8907] provides Device Administration for routers,
nits: s/Device Administration/device administration

106      within the Device Administration use case.
same nits as above.

190      To ensure separation of TACACS+ traffic that uses TLS from that which
191      does not (Section 5.3), they will be deployed on different ports.
Q: This seems to contradict with section 5.1.1, which says "TACACS+ servers that
have TLS support MUST NOT allow Non-TLS connections". If a TACACS+ server uses TLS,
it should not have non-TLS connections.

205      A TACACS+ client initiates a TLS connection by making a TCP
206      connection to a configured server on the TACACS+ TLS port number
207      ([TBD]) (Section 3.1).
Q: should this reference Section 7?

271      support certificate Path verification as described in Section 6 of
nits: s/Path/path

270      The implementation of certificate based mutual authentication MUST
271      support certificate Path verification as described in Section 6 of
272      [RFC5280]
Q: Add RFC 9608 as a reference?

303      For the server-side validation of client identities, Implementations
nits: s/Implementations/implementations

303	   For the server-side validation of client identities, Implementations
304	   must support the ability to configure which fields of a certificate
Should this be MUST?

325	   Section 5.1.5 for securitly related operator considerations.
nits: s/securitly/security

535	   https://www.iana.org/assignments/service-name-port-numbers/
the correct link is: https://www.iana.org/assignments/service-names-port-numbers/