Hi,

This is my AD review of draft-ietf-opsawg-tacacs-yang-07.  Sorry that it has 
been a little while in coming.

Thank you for this document, I believe that it is in good shape.  I've given my 
slightly more significant comments first, followed by some editorial comments.


COMMENTS:

"Section 3":

   The "statistics" container under the "server list" is to record
   session statistics and usage information during user access which
   include the amount of data a user has sent and/or received during a
   session.

1. Looking at the module, the statistics only seem to cover the number of 
messages rather than the amount of data.  Possibly delete the part of the 
sentence from "which include" ... to the end of the sentence.


"Regarding the YANG module":

2. I suggest changing "tacacsplus" to "tacacs-plus" (e.g., in the module title 
and top level nodes).

3. "shared-secret", should that be put under a choice statement?  Is it likely 
that alternative methods of authenticating the server are likely in future?

4. I'm not sure that the "tacacsplus" feature is required.  Supporting the 
ietf-system-tacacsplus module should be sufficient to indicate that the device 
supports TACACS+ client configuration.

5. Does the tcsplus-server-type indicate what the server is, or how the server 
is used?  E.g., could a server have the authentication bit set, but then not be 
used for user authentication?  Or should that be prevented with a must 
statement?
 
6. Should there be a limit on the length of a server name?

7. I dont' know whether this matters, but the must statement doesn't seem to be 
quite complete, in that it would still allow TACACS+ to be listed as an 
authentication mechanims, but only include an accounting server in the TACACS+ 
server list.

 
"Security section":
   /system/tacacsplus/server:  This list contains the objects used to
      control the TACACS+ servers used by the device.  Unauthorized
      access to this list could cause a user management failure on the
      device.

8. I don't know TACACS+, but I would presume that the risk of accessing this 
list is much greater than just user management failure.  If it was possible to 
modify this configuration to point to a compromised TACACS+ server then would 
it not be possible to obtain complete control over the device?  If, so I think 
then I think that it would be helpful to make this risk clear.  [As a nit, we 
should probably also use 'data nodes' rather than 'objects']


"References":

9. Please can you ensure that your normative references to all RFCs that define 
YANG modules that are imported by the YANG modules defined in this document.  
From a quick scan, it looked like some might be missing.



EDITORIAL COMMENTS:


Abstract:
1. that augment -> that augments
2. in the RFC 7317 with TACACS+ client model. -> in RFC 7317 with a TACACS+ 
client data model.

3. The data model of Terminal Access Controller Access Control
   System Plus (TACACS+) client allows ...->
The Terminal Access Controller Access Control System Plus (TACACS+) client data 
model allows ...

Introduction:

4. This document defines a YANG module that augment the System
   Management data model defined in the [RFC7317] with TACACS+ client
   model.
   
   ->
   
   This document defines a YANG module that augments the System
   Management data model defined in [RFC7317] with a TACACS+ client
   data model.
   
5. TACACS+ provides Device Administration ->
   TACACS+ provides device administration
   
6. TACACS+ provides Device Administration for routers, network access
   servers and other networked computing devices via one or more
   centralized servers which is defined in the TACACS+ Protocol.
   [I-D.ietf-opsawg-tacacs]
   
   ->
   
   TACACS+ [I-D.ietf-opsawg-tacacs] provides Device Administration for
   routers, network access servers and other networked computing devices
   via one or more centralized servers.

7. o  User Authentication Model: Defines a list of usernames and
      passwords and control the order in which local or RADIUS
      authentication is used.
      
   ->
   
   o  User Authentication Model: Defines a list of local usernames and
      passwords.  It also controls the order in which local or RADIUS
      authentication is used.
      
8.  System Management model -> System Management Model?

9.  The YANG model can be used -> The YANG module can be used 
    The YANG data model in this document" => The YANG module in this document

    
"3.  Design of the Data Model"

10. Recommend changing heading to "Design of the TACAS+ Data Model"

11. client on the device -> client on a device

12. user's name and password -> user's username and password?

13. user and accounting -> user, and accounting

14. is intended to augment -> augments

15. A couple of places "e.g." should be replaced with "e.g.,"

Appendix A:

16. In the example, possibly delete the "single-connection" leaf since that is 
a default value.

Regards,
Rob

_______________________________________________
OPSAWG mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/opsawg

Reply via email to