On Oct 28, 2024, at 7:51 AM, Douglas Gash (dcmgash) <dcmg...@cisco.com> wrote:
> Rev 11 of the T+ TLS doc had new sections for PSK and resumption, with a 
> slight restructure to accommodate PKI and PSK in regular hierarchy in the 
> contents.
>  
> We are currently preparing another rev of the doc, so would be very grateful 
> for any feedback to ensure the previous paucity of coverage of these subjects 
> was sufficiently remedied. If not, now would be ideal time for us to address 
> any remaining concerns in this (or any other) area.

  From the -14 version:

2.1 nits: 

... The algorithm is categorized as Obfuscation in Section 10.5.2 of [RFC8907]. 
The term should be interpreted to mean "plaintext", it is used to ensure that 
the algorithm is not mistaken for encryption.

  The obfuscation method is not "plaintext".  Perhaps "while there are no known 
attacks on this method, it is not known to be secure."

  Similarly in Section 3:

... Confidentiality and Integrity: The MD5 obfuscation specified in [RFC8907] 
has been shown to be insecure [RFC6151].

  MD5 has been cracked.  But there are no known attacks on the obfuscation 
method used.

3 item (2):

...     • Peer authentication: The authentication capabilities of TLS replace 
the pre-shared keys of obfuscation for mutual authentication.

  Perhaps use "shared secret' for consistency with RFC 8907.  "Pre-shared keys" 
sounds like PSKs used for TLS.

5

  Perhaps add a note that TACACS+ TLS servers and clients SHOUD NOT use 
well-known CAs.  i.e. CAs from the web PKI.  Doing so would allow clients to 
connect to any server, and would allow anyone to issue client certs.

5.1.1

... Non-TLS connections should not be used for new TACACS+ deployments.

  Perhaps make this normative: SHOULD NOT be used

... Further, TLS TACACS+ servers and Non-TLS TACACS+ servers SHOULD NOT be 
deployed on the same host. 

  Why?  There's no justification here.  I'm not sure why this would be an issue.

5.1.4

... Operators should be cognizant of the potential of TLS TACACS+ server and/or 
client isolation from their peer's CA by network failures. Isolation from a 
public key certificate's CA will cause the verification of the certificate to 
fail and thus TLS authentication of the peer to fail.

  I'm not sure why it's an issue if the CA is unreachable.  The TACACS+ TLS 
server has to be configured with the CA cert, and all intermediate certs.  The 
client should ideally also be configured with the CA cert.  There's no need to 
contact the CA, the CA cert is just a file on disk.

  Why does the CA have to be online?


  Overall the changes look reasonable, thanks.

  Alan DeKok.

_______________________________________________
OPSAWG mailing list -- opsawg@ietf.org
To unsubscribe send an email to opsawg-le...@ietf.org

Reply via email to