Hi Russ,

Many thanks for taking the time to review.

Before we dig into the issues raised, I’d like to check to see if your comments 
spring from the doc misleading due to bad wording, or if you have in mind a 
deeper issue.

What the doc is trying to express (and we will refactor a little to make this 
clearer), is that:


  *   Implementations MUST always support the core implementation of mutual 
Cert based authentication. There is always the core of “compatibility”
  *   Implementations MAY support other options as these options mature and are 
widely accepted, such as PSK, RPK
  *   Deployments do not have to use Cert based if implementations support 
these other options.

I suspect that this may not actually address your real concerns though: please 
let us know if the issues you see are deeper than the implementation/deployment 
matrix of options.

Many Thanks!

From: Russ Housley via Datatracker <nore...@ietf.org>
Date: Monday, 1 July 2024 at 19:06
To: sec...@ietf.org <sec...@ietf.org>
Cc: draft-ietf-opsawg-tacacs-tls13....@ietf.org 
<draft-ietf-opsawg-tacacs-tls13....@ietf.org>, last-c...@ietf.org 
<last-c...@ietf.org>, opsawg@ietf.org <opsawg@ietf.org>
Subject: Secdir last call review of draft-ietf-opsawg-tacacs-tls13-10
Reviewer: Russ Housley
Review result: Not Ready

I reviewed this document as part of the Security Directorate's ongoing
effort to review all IETF documents being processed by the IESG.  These
comments were written primarily for the benefit of the Security Area
Directors.  Document authors, document editors, and WG chairs should
treat these comments just like any other IETF Last Call comments.

Document: draft-ietf-opsawg-tacacs-tls13-10
Reviewer: Russ Housley
Review Date: 2024-07-01
IETF LC End Date: Unknown
IESG Telechat date: Unknown

Summary: Not Ready


Major Concerns:

Section 3.2.2 says: "Certificate based mutual authentication MUST be
supported."  I assume that this means that it MUST be supported, but
I does not have to be used.  However, the next sentence seems to
require certificates,

Section 3.2.2: With the removal of the reference to [RFC8773], how is
the requirement for certificates accomplished while also using external
PSKs?  I am unaware of any other way to do so.

Section 3.2.2 says: "...[RFC7250] must be used in context of [RFC8446]".
How is the requirement for certificates accomplished with raw public
keys?  I am unaware of any way to do so.


Minor Concerns:  None


Nits: None


_______________________________________________
OPSAWG mailing list -- opsawg@ietf.org
To unsubscribe send an email to opsawg-le...@ietf.org

Reply via email to