Hi Joe,

Thanks you the review.

Good points. These are fixed as you can see in this diff: 
https://boucadair.github.io/secure-tacacs-yang/#go.draft-ietf-opsawg-secure-tacacs-yang.diff

Please see inline for more context.

Cheers,
Med

De : Joe Clarke (jclarke) <jclarke=40cisco....@dmarc.ietf.org>
Envoyé : vendredi 7 mars 2025 16:57
À : opsawg@ietf.org
Objet : [OPSAWG]WGLC/Shepherd comments for TACACS+ TLS YANG 
(draft-ietf-opsawg-secure-tacacs-yang)


I have reviewed the latest version of this draft, and I think it's in good 
shape overall.  However, I did find a few typos and I have a few requests for 
clarification and changes.  I like Med's approach to the "track changes", so 
I'm attaching the PDF of that here.  To summarize my more substantive comments:


  *   I'd like to see discontinuity defined more clearly
[Med] Good point. Please see 
https://github.com/boucadair/secure-tacacs-yang/pull/15/files. Let me know if 
we need to say more

  *   The PSK context should have a length reflected in YANG
[Med] Done (+ other nits): 
https://github.com/boucadair/secure-tacacs-yang/pull/14/files

  *   While more for the main TACACS+ TLS draft, the use of Server vs. server 
should probably be normalized
[Med] I prefer to use "server" for consistency with RFC8907. Agree T+TLS should 
fix this.

And while not in my track changes comments, I have a question.  In your 
appendix B, you have examples with SNI enabled where each of the four specified 
servers uses the same domain name.  Is that an approach that is typically done? 
 In my TACACS+ deployments, I generally have primary and secondary servers, but 
each have their own FQDN.  And I imagine when I deploy TACACS+ TLS, I would 
have the same server certificates.  That is, each server would have its own 
FQDN/SNI.  Though I admit v4 and v6 would be two sides of the same server.
[Med] The rationale we following is the last part of your comment. More 
importantly, this example is to illustrate the use of *-reference but with 
multiple IPv4/IPv6 locators:

CURRENT:
Figure 
5<https://boucadair.github.io/secure-tacacs-yang/draft-ietf-opsawg-secure-tacacs-yang.html#ex-ref>
 shows a configuration example with credential references for multiple service 
instances:

Like any other example, these should not be considered as deployment 
recommendations.

Joe
____________________________________________________________________________________________________________
Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.
_______________________________________________
OPSAWG mailing list -- opsawg@ietf.org
To unsubscribe send an email to opsawg-le...@ietf.org

Reply via email to