[OPSAWG]WG LC: draft-ietf-opsawg-tacacs-tls13

2024-06-24 Thread Joe Clarke (jclarke)
With shepherd in hand (thanks, Med), we are kicking off a two-week working 
group last call for the TACACS+ secured with TLS 1.3 draft.  This draft has 
received several reviews, and the authors have addressed all outstanding 
comments.  That said, I have re-requested reviews from SEC DIR and OPS DIR to 
confirm it has resolved previously-raised issues.

The question about port seems to have been addressed with a custom port being 
an appropriate proposal.

The chairs would like all comments and feedback by July 8, 2024.  We will be 
re-running the IPR poll in parallel.

(Copying TLS in Applications [uta] list for more TLS application-layer 
visibility.)

Thanks.

Joe
___
OPSAWG mailing list -- opsawg@ietf.org
To unsubscribe send an email to opsawg-le...@ietf.org


[OPSAWG]IPR POLL: draft-ietf-opsawg-tacacs-tls13

2024-06-24 Thread Joe Clarke (jclarke)
We’re up to WG LC on this draft.  We want to reconfirm any known IPR related to 
this work:
https://datatracker.ietf.org/doc/draft-ietf-opsawg-tacacs-tls13/
Are you aware of any IPR that applies to draft identified above?
Please state either:
"No, I'm not aware of any IPR that applies to this draft”
or
"Yes, I'm aware of IPR that applies to this draft"
If so, has this IPR been disclosed in compliance with IETF IPR rules
(see RFCs 3669, 5378 and 8179 for more details)?
If yes to the above, please state either:
"Yes, the IPR has been disclosed in compliance with IETF IPR rules”
or
"No, the IPR has not been disclosed"
If you answer no, please provide any additional details you think
appropriate.
If you are listed as a document author or contributor please answer the
above by responding to this email regardless of whether or not you are
aware of any relevant IPR. This document will not advance to the next
stage until a response has been received from each author.
Also please send the response to the list above, and not unicast it.
As of this time, no IPR has been disclosed on this draft.

Joe
___
OPSAWG mailing list -- opsawg@ietf.org
To unsubscribe send an email to opsawg-le...@ietf.org


[OPSAWG]Re: WG LC: draft-ietf-opsawg-tacacs-tls13

2024-06-24 Thread Joe Clarke (jclarke)
Grrr, forgot the link for convenience.  Please provide WG LC reviews for the 
following draft:

https://datatracker.ietf.org/doc/draft-ietf-opsawg-tacacs-tls13/

Thanks.

Joe

From: Joe Clarke (jclarke) 
Date: Monday, June 24, 2024 at 08:36
To: opsawg@ietf.org 
Cc: u...@ietf.org 
Subject: [OPSAWG]WG LC: draft-ietf-opsawg-tacacs-tls13
With shepherd in hand (thanks, Med), we are kicking off a two-week working 
group last call for the TACACS+ secured with TLS 1.3 draft.  This draft has 
received several reviews, and the authors have addressed all outstanding 
comments.  That said, I have re-requested reviews from SEC DIR and OPS DIR to 
confirm it has resolved previously-raised issues.

The question about port seems to have been addressed with a custom port being 
an appropriate proposal.

The chairs would like all comments and feedback by July 8, 2024.  We will be 
re-running the IPR poll in parallel.

(Copying TLS in Applications [uta] list for more TLS application-layer 
visibility.)

Thanks.

Joe
___
OPSAWG mailing list -- opsawg@ietf.org
To unsubscribe send an email to opsawg-le...@ietf.org


[OPSAWG]Re: WG LC: draft-ietf-opsawg-tacacs-tls13

2024-06-24 Thread Alan DeKok
On Jun 24, 2024, at 8:38 AM, Joe Clarke (jclarke) 
 wrote:
> 
> Grrr, forgot the link for convenience.  Please provide WG LC reviews for the 
> following draft:
>  
> https://datatracker.ietf.org/doc/draft-ietf-opsawg-tacacs-tls13/

  I have general concerns about the document, which I've raised before.  The 
document is extremely small, and offers little guidance around most 
implementation and operational issues related to OpenSSL.  I've made these 
comments before, and there appears to be few changes which address my concerns.

  For similar issues with there protocols, I would refer the reader to RFC 9190 
for discussions of EAP over TLS, and RFC 6614 / RFC 7360 for discussions of 
RADIUS over TLS.  Both of those documentations contain significantly more 
content which can guide the reader.

  In contrast, this document comes across as "send TACACS over TLS".  Almost 
every operational or implementation consideration is left as an exercise for 
the reader.  Experience shows that this is a way to get non-interoperable 
implementations.

  The document is also Standards Track.  Has anyone implemented it?

  Given the lack of guidance in the draft, and the lack of experience with 
implementations, I'd suggest that "Experimental" is more appropriate.

  Alan DeKok.

___
OPSAWG mailing list -- opsawg@ietf.org
To unsubscribe send an email to opsawg-le...@ietf.org


[OPSAWG]I-D Action: draft-ietf-opsawg-ipfix-tcpo-v6eh-16.txt

2024-06-24 Thread internet-drafts
Internet-Draft draft-ietf-opsawg-ipfix-tcpo-v6eh-16.txt is now available. It
is a work item of the Operations and Management Area Working Group (OPSAWG) WG
of the IETF.

   Title:   Extended TCP Options and IPv6 Extension Headers IPFIX Information 
Elements
   Authors: Mohamed Boucadair
Benoit Claise
   Name:draft-ietf-opsawg-ipfix-tcpo-v6eh-16.txt
   Pages:   26
   Dates:   2024-06-24

Abstract:

   This document specifies new IP Flow Information Export (IPFIX)
   Information Elements (IEs) to solve issues with existing
   ipv6ExtensionHeaders and tcpOptions IPFIX IEs, especially the ability
   to export any observed IPv6 extension headers or TCP options.

The IETF datatracker status page for this Internet-Draft is:
https://datatracker.ietf.org/doc/draft-ietf-opsawg-ipfix-tcpo-v6eh/

There is also an HTML version available at:
https://www.ietf.org/archive/id/draft-ietf-opsawg-ipfix-tcpo-v6eh-16.html

A diff from the previous version is available at:
https://author-tools.ietf.org/iddiff?url2=draft-ietf-opsawg-ipfix-tcpo-v6eh-16

Internet-Drafts are also available by rsync at:
rsync.ietf.org::internet-drafts


___
OPSAWG mailing list -- opsawg@ietf.org
To unsubscribe send an email to opsawg-le...@ietf.org


[OPSAWG]Re: process forward for draft-ietf-opsawg-mud-iot-dns-considerations

2024-06-24 Thread Mahesh Jethanandani
Hi Michael,

Thank you for addressing Paul’s and Roman’s comments. I will wait for Roman to 
confirm whether the changes you have made, mostly deleting the paragraphs that 
he put a DISCUSS on, whether he is ok with removing his DISCUSS on the document.

At the same time, looking at the number of diffs between -13 and the latest 
version of the draft, including a completely new section on “Interactions with 
mDNS and DNSSD”, another WG LC, albeit shorter (1 week), would be in order.

Cheers.

> On Jun 19, 2024, at 2:48 PM, Michael Richardson  wrote:
> 
> 
> Hi, I posted a -15 document that I hope addresses Roman's DISCUSS.
> Paul has changed his Abstain to a No Objection a few weeks ago.
> 
> As Mahesh (the OPSAWG AD) returned the document to the WG in early April, my
> understanding, however, is that the WG may need to do another WGLC on it.
> Perhaps Mahesh will decide to skip that or not.
> 
> --
> Michael Richardson. o O ( IPv6 IøT consulting )
>   Sandelman Software Works Inc, Ottawa and Worldwide
> 
> 
> 
> 


Mahesh Jethanandani
mjethanand...@gmail.com






___
OPSAWG mailing list -- opsawg@ietf.org
To unsubscribe send an email to opsawg-le...@ietf.org


[OPSAWG]Re: process forward for draft-ietf-opsawg-mud-iot-dns-considerations

2024-06-24 Thread Michael Richardson

Mahesh Jethanandani  wrote:
> Thank you for addressing Paul’s and Roman’s comments. I will wait for
> Roman to confirm whether the changes you have made, mostly deleting the
> paragraphs that he put a DISCUSS on, whether he is ok with removing his
> DISCUSS on the document.

Fantastic.
Probably have to poke him directly to get an answer.

> At the same time, looking at the number of diffs between -13 and the
> latest version of the draft, including a completely new section on
> “Interactions with mDNS and DNSSD”, another WG LC, albeit shorter (1
> week), would be in order.

Works for me.

> Cheers.

>> On Jun 19, 2024, at 2:48 PM, Michael Richardson
>>  wrote:
>>
>>
>> Hi, I posted a -15 document that I hope addresses Roman's DISCUSS.
>> Paul has changed his Abstain to a No Objection a few weeks ago.
>>
>> As Mahesh (the OPSAWG AD) returned the document to the WG in early
>> April, my understanding, however, is that the WG may need to do
>> another WGLC on it.  Perhaps Mahesh will decide to skip that or not.
>>
>> --
>> Michael Richardson  . o O ( IPv6 IøT consulting
>> ) Sandelman Software Works Inc, Ottawa and Worldwide
>>
>>
>>
>>


> Mahesh Jethanandani mjethanand...@gmail.com







> 
> Alternatives:

> 

--
Michael Richardson. o O ( IPv6 IøT consulting )
   Sandelman Software Works Inc, Ottawa and Worldwide






signature.asc
Description: PGP signature
___
OPSAWG mailing list -- opsawg@ietf.org
To unsubscribe send an email to opsawg-le...@ietf.org


[OPSAWG]Roman Danyliw's No Objection on draft-ietf-opsawg-mud-iot-dns-considerations-15: (with COMMENT)

2024-06-24 Thread Roman Danyliw via Datatracker
Roman Danyliw has entered the following ballot position for
draft-ietf-opsawg-mud-iot-dns-considerations-15: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-opsawg-mud-iot-dns-considerations/



--
COMMENT:
--

Thank you to Chris Wood for the SECDIR review.

Thank you for addressing my DISCUSS feedback and select COMMENT.

** Section 4.1
   The current firmware model of the device is sometimes provided and
   then the authoritative server provides a determination if a new
   version is required and, if so, what version.

What’s the authoritative server in this model?  Is it the “vendor system”
mentioned in the previous sentence?

** Section 5.  What is the actionable BCP or design guidance from this section?

** Section 6.
   The difficult part is determining what to put into the MUD file
   itself.  There are currently tools that help with the definition and
   analysis of MUD files, see [mudmaker].  The remaining difficulty is
   now the actual list of expected connections to put in the MUD file.
   An IoT manufacturer must now spend some time reviewing the network
   communications by their device.

How is this germane to MUD and DNS?

** Section 7.  I found this Privacy Considerations lacking a basic explanation
of the DNS-focused threat model.  I think the start of that threat assessment
is that “many IoT devices are automatically configured to connect to the public
internet to enable automatic updates, send telemetry to the manufacturers, or
enable integration with manufacturer or third-party services”.

Using the tradeoff template of the security considerations in Section 8, a
privacy consideration trade-off might be that “device owners/operators want to
leak as little onto the internet and to the device manufacturer while still
getting the functionality of the IoT device”.

** Section 7.

   IoT devices that reach out to the manufacturer at regular intervals
   to check for firmware updates are informing passive eavesdroppers of
   the existence of a specific manufacturer's device being present at
   the origin location.

-- Is it common in an enterprise setting for IoT devices to be able to
auto-updated themselves from firmware download off the internet?  In my limited
enterprise experience, other end-points and network device are typically
managed.  Is there some nuance that these devices can only be managed the
manufacturer?

-- In an enterprise setting wouldn’t it be best practice to prevent devices
from beaconing out to the internet with DNS blackholing or IP address filters?

** Section 7.
   IoT device manufacturers are encouraged to find ways to anonymize
   their update queries.  For instance, contracting out the update
   notification service to a third party that deals with a large variety
   of devices would provide a level of defense against passive
   eavesdropping.

This is good advice.

-- Is the DNS footprint of most IoT devices predominately queries for updates? 
To revisit the previous comment about the threat model, don’t some IoT devices
use DNS to initiate traffic for more things than just update queries negating
the benefit of a third-party update infrastructure?

-- Not knowing much about this is done in production, is this realistic
guidance based on current IoT manufacturer practices?  Collecting less data
from device owner/operators seems to be opposite of the trends I have seen.



___
OPSAWG mailing list -- opsawg@ietf.org
To unsubscribe send an email to opsawg-le...@ietf.org