Thanks you for your feedback and insights.

We have uploaded a new version to include corrections.

We have deferred ref to RFC9608 at this stage, as we are still checking to 
determine if the provisions would be relevant to the TLS cases used for T+ 
transport.

If we have missed anything or you have concerns regarding our updated for the 
other comments, please advise, we will make any corrections ASAP.

Many thanks.

From: Yingzhen Qu via Datatracker <nore...@ietf.org>
Date: Saturday, 3 August 2024 at 23:44
To: ops-...@ietf.org <ops-...@ietf.org>
Cc: draft-ietf-opsawg-tacacs-tls13....@ietf.org 
<draft-ietf-opsawg-tacacs-tls13....@ietf.org>, opsawg@ietf.org <opsawg@ietf.org>
Subject: Opsdir early review of draft-ietf-opsawg-tacacs-tls13-10
Reviewer: Yingzhen Qu
Review result: Has Issues

I have reviewed this document as part of the Ops area directorate's ongoing
effort to review all IETF documents being processed by the IESG.  These
comments were written primarily for the benefit of the Ops area directors.
Document editors and WG chairs should treat these comments just like any other
last-call comments.

I have the following questions and nits for the authors to consider:

102      Protocol [RFC8907] provides Device Administration for routers,
nits: s/Device Administration/device administration

106      within the Device Administration use case.
same nits as above.

190      To ensure separation of TACACS+ traffic that uses TLS from that which
191      does not (Section 5.3), they will be deployed on different ports.
Q: This seems to contradict with section 5.1.1, which says "TACACS+ servers that
have TLS support MUST NOT allow Non-TLS connections". If a TACACS+ server uses 
TLS,
it should not have non-TLS connections.

205      A TACACS+ client initiates a TLS connection by making a TCP
206      connection to a configured server on the TACACS+ TLS port number
207      ([TBD]) (Section 3.1).
Q: should this reference Section 7?

271      support certificate Path verification as described in Section 6 of
nits: s/Path/path

270      The implementation of certificate based mutual authentication MUST
271      support certificate Path verification as described in Section 6 of
272      [RFC5280]
Q: Add RFC 9608 as a reference?

303      For the server-side validation of client identities, Implementations
nits: s/Implementations/implementations

303        For the server-side validation of client identities, Implementations
304        must support the ability to configure which fields of a certificate
Should this be MUST?

325        Section 5.1.5 for securitly related operator considerations.
nits: s/securitly/security

535        https://www.iana.org/assignments/service-name-port-numbers/
the correct link is: 
https://www.iana.org/assignments/service-names-port-numbers/

_______________________________________________
OPSAWG mailing list -- opsawg@ietf.org
To unsubscribe send an email to opsawg-le...@ietf.org

Reply via email to