[Last-Call] Re: Secdir last call review of draft-ietf-opsawg-tacacs-tls13-10

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Russ,

 

Many thanks for taking the time to review.

 

Before we dig into the issues raised, I’d like to check to see if your comments spring from the doc misleading due to bad wording, or if you have in mind a deeper issue.

 

What the doc is trying to express (and we will refactor a little to make this clearer), is that:

 

  • Implementations MUST always support the core implementation of mutual Cert based authentication. There is always the core of “compatibility”
  • Implementations MAY support other options as these options mature and are widely accepted, such as PSK, RPK
  • Deployments do not have to use Cert based if implementations support these other options.

 

I suspect that this may not actually address your real concerns though: please let us know if the issues you see are deeper than the implementation/deployment matrix of options.

 

Many Thanks!

 

From: Russ Housley via Datatracker <noreply@xxxxxxxx>
Date: Monday, 1 July 2024 at 19:06
To: secdir@xxxxxxxx <secdir@xxxxxxxx>
Cc: draft-ietf-opsawg-tacacs-tls13.all@xxxxxxxx <draft-ietf-opsawg-tacacs-tls13.all@xxxxxxxx>, last-call@xxxxxxxx <last-call@xxxxxxxx>, opsawg@xxxxxxxx <opsawg@xxxxxxxx>
Subject: Secdir last call review of draft-ietf-opsawg-tacacs-tls13-10

Reviewer: Russ Housley
Review result: Not Ready

I reviewed this document as part of the Security Directorate's ongoing
effort to review all IETF documents being processed by the IESG.  These
comments were written primarily for the benefit of the Security Area
Directors.  Document authors, document editors, and WG chairs should
treat these comments just like any other IETF Last Call comments.

Document: draft-ietf-opsawg-tacacs-tls13-10
Reviewer: Russ Housley
Review Date: 2024-07-01
IETF LC End Date: Unknown
IESG Telechat date: Unknown

Summary: Not Ready


Major Concerns:

Section 3.2.2 says: "Certificate based mutual authentication MUST be
supported."  I assume that this means that it MUST be supported, but
I does not have to be used.  However, the next sentence seems to
require certificates,

Section 3.2.2: With the removal of the reference to [RFC8773], how is
the requirement for certificates accomplished while also using external
PSKs?  I am unaware of any other way to do so.
  
Section 3.2.2 says: "...[RFC7250] must be used in context of [RFC8446]".
How is the requirement for certificates accomplished with raw public
keys?  I am unaware of any way to do so.


Minor Concerns:  None


Nits: None


-- 
last-call mailing list -- last-call@xxxxxxxx
To unsubscribe send an email to last-call-leave@xxxxxxxx

[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux