Re: [OPSAWG] TACACS+ New Version with AI extensions for playing Go.

2016-02-10 Thread Alan DeKok
ng a third one is, in my opinion, entirely outside of the purview of OPSAWG. There are a host of procedural problems with how the document was adopted. I suggest that the document be withdrawn, and re-submitted as an individual draft. Alan DeKok. ___

Re: [OPSAWG] TACACS+ New Version with AI extensions for playing Go.

2016-02-10 Thread Alan DeKok
ly new standard protocol, which is in direct competition to existing, and active, working groups. Worse, it's a protocol which the vendor refused to document for 18 years. Now that they're getting bit by interoperability issues, they're seeking the IETF stamp of approval. It&#

[OPSAWG] Procedural issues with the TACACS+ document

2016-02-10 Thread Alan DeKok
On Feb 10, 2016, at 3:31 PM, Alan DeKok wrote: > There are a host of procedural problems with how the document was adopted. > I suggest that the document be withdrawn, and re-submitted as an individual > draft. To be clear: 1. the document never had a WG call for adoption as re

Re: [OPSAWG] Procedural issues with the TACACS+ document

2016-02-10 Thread Alan DeKok
a new working group. " 8. This document is competes directly with two existing working groups, RADEXT and DIME, to create a third AAA protocol. 9. As such, this document should be explicitly outside of the scope of the OPSAWG. > On Feb 10, 2016, at 3:51 PM, Alan DeKok wrote: > >

Re: [OPSAWG] Procedural issues with the TACACS+ document

2016-02-10 Thread Alan DeKok
is to push proprietary protocols behind the scenes, and then present them to the IETF as a fait accompli. It's really a slap in the face for everyone who followed the IETF process for the last 20 years, and did work in RADIUS, AAA, DIME, and RADEXT. Alan DeKok. ___

Re: [OPSAWG] Procedural issues with the TACACS+ document

2016-02-10 Thread Alan DeKok
standardize TACACS+, we might as well disband RADEXT and DIME, because there's no point in following a standards process when people can do an end-run around it. Alan DeKok. ___ OPSAWG mailing list OPSAWG@ietf.org https://www.ietf.org/mailman/listinfo/opsawg

Re: [OPSAWG] Procedural issues with the TACACS+ document

2016-02-10 Thread Alan DeKok
te" item in WG queue. It is not too > late, it is an active protocol, it is not standardised, lack of a standard is > causing issues by itself. This last item I believe can and should be > addressed. That is entirely mischaracterizing my position. The IETF consensus for the last 20 years has been that RADIUS was chosen over TACACS+. There is no *technical* reason to re-visit that decision. Alan DeKok. ___ OPSAWG mailing list OPSAWG@ietf.org https://www.ietf.org/mailman/listinfo/opsawg

Re: [OPSAWG] Procedural issues with the TACACS+ document

2016-02-10 Thread Alan DeKok
AAA protocols. I see no technical reason to re-visit that decision now. > Regarding procedural matters, if we have missed any steps, that is my bad > and I will consult with those more versed in procedure to rectify that. The chairs and ADs are responsible for process

[OPSAWG] APPEAL: re AAA protocols and IETF consensus

2016-02-10 Thread Alan DeKok
I think most people aren't aware of the history of AAA protocols in the iETF. This message summarizes relevant documents in the area, and makes an appeal to the WG to remove the document as a WG document. RADIUS was standardized in 2000 in RFC 2058, after years of WG discussion. The origi

Re: [OPSAWG] Procedural issues with the TACACS+ document

2016-02-11 Thread Alan DeKok
ization, because the vendor refuses to standardize it in RADIUS. Which they could have done any time in the last 20 years. They refused. Well... they refused. I fail to see how refusing to follow the standards process means the we should reward them with an official standards track RFC. Alan DeKok. ___ OPSAWG mailing list OPSAWG@ietf.org https://www.ietf.org/mailman/listinfo/opsawg

Re: [OPSAWG] Procedural issues with the TACACS+ document

2016-02-11 Thread Alan DeKok
On Feb 11, 2016, at 1:14 AM, Mikael Abrahamsson wrote: > > On Wed, 10 Feb 2016, Alan DeKok wrote: > >> My point is that TACACS+ has a 100% overlap in functionality with the RADIUS >> protocol. > > As an operator that has been running TACACS for 15+ years, my an

Re: [OPSAWG] Procedural issues with the TACACS+ document

2016-02-11 Thread Alan DeKok
ly in wide spread use. In your view, how do we get that done? Publish it was an informational document, via an individual submission and AD sponsorship. Alan DeKok. ___ OPSAWG mailing list OPSAWG@ietf.org https://www.ietf.org/mailman/listinfo/opsawg

Re: [OPSAWG] APPEAL: re AAA protocols and IETF consensus

2016-02-11 Thread Alan DeKok
, it's time get a rubber stamp on the protocol. I welcome publishing the document as an information draft. I see no reason why it should be an IETF standard. And so far, I haven't seen a convincing argument from anyone else. The arguments in favour amount to: - just 'cause - it's widely used - it's not an AAA protocol, even though it's explicitly an AAA protocol Alan DeKok. ___ OPSAWG mailing list OPSAWG@ietf.org https://www.ietf.org/mailman/listinfo/opsawg

Re: [OPSAWG] APPEAL: re AAA protocols and IETF consensus

2016-02-11 Thread Alan DeKok
se. Sure, IPX overlaps with IPv4, but heck... it's widely used, so let's make it an IETF standard protocol. If you find those reasons unconvincing, you should find the reasons for TACACS+ adoption unconvincing, too. Alan deKok. ___ OPSAWG mailing list OPSAWG@ietf.org https://www.ietf.org/mailman/listinfo/opsawg

Re: [OPSAWG] Way forward? Re: Procedural issues with the TACACS+ document

2016-02-11 Thread Alan DeKok
standardization process. i.e. the contents of any device management authorization exchange are entirely vendor specific, and due to the way TACACS+ is being used, *must* remain vendor-specific. Alan DeKok. ___ OPSAWG mailing list OPSAWG@ietf.org https://www.ietf.org/mailman/listinfo/opsawg

Re: [OPSAWG] Procedural issues with the TACACS+ document

2016-02-11 Thread Alan DeKok
tandards track protocol, but TACACS+ gets one, because "it's popular"? That's an amazing interpretation of the IETF consensus, and IETF process. Maybe I'm naive, but it looks a while lot to me like one WG has to follow the rules to get a protocol standardized, and anot

Re: [OPSAWG] Procedural issues with the TACACS+ document

2016-02-11 Thread Alan DeKok
On Feb 11, 2016, at 1:00 PM, Christopher Morrow wrote: > > On Wed, Feb 10, 2016 at 10:37 PM, Alan DeKok > wrote: >> TACACS+ has 100% functionality overlap with RADIUS. > > you keep saying this, but I can't get a radius server to authorize my > command on a

Re: [OPSAWG] OPSAWG Digest, Vol 105, Issue 65

2016-02-11 Thread Alan DeKok
uot;obfuscation". The method described is not what would be described in the crypto community as "encryption". IMHO, the packet encryption method should be removed entirely, and TLS transport mandated. Alan DeKok. ___ OPSAWG mailing list OPSAWG@ietf.org https://www.ietf.org/mailman/listinfo/opsawg

Re: [OPSAWG] Way forward? Re: Procedural issues with the TACACS+document

2016-02-12 Thread Alan DeKok
ng it a WG document... Why, exactly, are is the WG full-steam ahead in making it a standards track document? It looks like the IETF ideal of "individuals" is failing here. There are large forces behind the scenes pushing for standardization, and that is winning over petty things like in

Re: [OPSAWG] Way forward? Re: Procedural issues with the TACACS+ document

2016-02-12 Thread Alan DeKok
r widespread use in the industry. I've been explaining in detail. > To me, it's like you would be saying that IS-IS shouldn't be in the IETF > because it was originally an ISO protocol. It's equally absurd. To me, it's like you're not even reading

Re: [OPSAWG] APPEAL: re AAA protocols and IETF consensus

2016-02-12 Thread Alan DeKok
do so. Which pretty much misses the point of my argument. There are many protocols used on the wider internet which have many more deployments across more vendors than TACACS+. Those protocols are not documented in RFCs. So... why this

Re: [OPSAWG] Procedural issues with the TACACS+ document

2016-02-12 Thread Alan DeKok
intended for "network operations" or "network administration" is false, and has been documented publicly as being false for two decades. The "command authorization" is *explicitly* in scope for RADIUS, and has *always* been in scope for

Re: [OPSAWG] Way forward? Re: Procedural issues with the TACACS+ document

2016-02-12 Thread Alan DeKok
On Feb 12, 2016, at 9:07 AM, Mikael Abrahamsson wrote: > > On Fri, 12 Feb 2016, Alan DeKok wrote: > >> So it *is* a AAA protocol? > > I actually do not know what criteria you put in the AAA term. It might be > different from what I use it for. This is getting silly.

Re: [OPSAWG] Way forward? Re: Procedural issues with the TACACS+ document

2016-02-12 Thread Alan DeKok
please read my messages. Including the one you just replied to. I have *repeatedly* said that I'm OK with it being an informational RFC. This whole conversation began with me requesting that the document be an informational RFC. Just.. enough, already. Please. Alan DeKok. __

Re: [OPSAWG] TACACS+, a suggestion

2016-02-12 Thread Alan DeKok
oject". It's a serious effort which requires more than a review by OPSAWG, which has many other priorities. Alan DeKok. ___ OPSAWG mailing list OPSAWG@ietf.org https://www.ietf.org/mailman/listinfo/opsawg

Re: [OPSAWG] TACACS+, a suggestion

2016-02-12 Thread Alan DeKok
ough that (as you say) the authors have other things to do... and don't have the time to document old work as different from new work. Alan DeKok. ___ OPSAWG mailing list OPSAWG@ietf.org https://www.ietf.org/mailman/listinfo/opsawg

Re: [OPSAWG] Procedural issues with the TACACS+ document

2016-02-12 Thread Alan DeKok
of the TACACS+ servers, combined, world-wide. Simple "it's popular" is no argument. I say this as the author of the most popular RADIUS server on the planet. Heck, it supports DHCP, BFD, and we're working on Diameter support. Again.. so? Alan DeKok.

Re: [OPSAWG] OPSAWG Digest, Vol 105, Issue 92

2016-02-12 Thread Alan DeKok
the > crypto issue in a backwards-compatible way. I believe that would be a positive way forward. Alan DeKok. ___ OPSAWG mailing list OPSAWG@ietf.org https://www.ietf.org/mailman/listinfo/opsawg

Re: [OPSAWG] Procedural issues with the TACACS+ document

2016-02-12 Thread Alan DeKok
r them to use TACACS+. I'm happy to see the protocol documented as an informational RFC. I'm *not* happy with pretty much everything else around the subject. Alan DeKok. ___ OPSAWG mailing list OPSAWG@ietf.org https://www.ietf.org/mailman/listinfo/opsawg

Re: [OPSAWG] APPEAL: re AAA protocols and IETF consensus

2016-02-14 Thread Alan DeKok
to that use-case. The thing which is amazing for me is that there is enormous push-back to my request for consistently applying logic, the IETF process, and IETF consensus. Alan DeKok. ___ OPSAWG mailing list OPSAWG@ietf.org https://www.ietf.org/mailman/listinfo/opsawg

Re: [OPSAWG] TACACS+, a suggestion

2016-02-15 Thread Alan DeKok
On Feb 15, 2016, at 5:07 AM, heasley wrote: > > Seems that in the time bikeshedding, this could have already been in WGLC. > Outstanding work! Following process and achieving consensus is not "bike shedding". It's entirely inappropriate to describe i

Re: [OPSAWG] TACACS+, a suggestion

2016-02-15 Thread Alan DeKok
ck (as here) with comments that are, quite frankly, irrelevant to the position I hold. If the best counter-argument to me is a straw man, I have a nice torch handy. It's called "reality". Alan DeKok. ___ OPSAWG mailing list OPSAWG@ietf.org https://www.ietf.org/mailman/listinfo/opsawg

Re: [OPSAWG] appeal on adoption of draft-ietf-opsawg-tacacs-00.txt as an opsawg topic

2016-02-15 Thread Alan DeKok
session was held. The TACACS+ slides used > during the session are at: > https://www.ietf.org/proceedings/93/slides/slides-93-opsarea-2.pdf > > Minutes of the session are quite sparse. They note that the presentation > occurred and that Alan DeKok objected to the proposal. I don

Re: [OPSAWG] Detangling - Q2: Publish TACACS+ as a RFC?

2016-02-16 Thread Alan DeKok
protocol as it exists today? We don't know. It would be good to get feedback from implementors as to whether or not the document is correct on it's technical content. I see that information as critical to have. Alan DeKok. ___ OPSAWG mai

Re: [OPSAWG] Detangling - Q3: Publish TACACS+ as a standards track RFC?

2016-02-16 Thread Alan DeKok
ter. But defining a new (to the IETF and the world) network management protocol is entirely outside of the scope of OPSAWG. Or, if (as many people say) the protocol isn't new, then OPSAWG won't be making any changes to TACACS+. It can't both be under IETF change control, and at

Re: [OPSAWG] Detangling - Q3: Publish TACACS+ as a standards track RFC?

2016-02-16 Thread Alan DeKok
I find such "arguments" entirely unconvincing. Alan DeKok. ___ OPSAWG mailing list OPSAWG@ietf.org https://www.ietf.org/mailman/listinfo/opsawg

Re: [OPSAWG] Detangling - Q3: Publish TACACS+ as a standards track RFC?

2016-02-22 Thread Alan DeKok
we don't have WG consensus on the document(s), but that the people *proposing* the document(s) can't even reach consensus among themselves as to what they're proposing. Alan DeKok. ___ OPSAWG mailing list OPSAWG@ietf.org https://www.ietf.org/mailman/listinfo/opsawg

Re: [OPSAWG] Detangling - Q3: Publish TACACS+ as a standards track RFC?

2016-02-22 Thread Alan DeKok
s waited 20+ years for standardization, it's worth waiting a few more months to be sure we get it right. And since TACACS+ is largely used *within* the enterprise, the issue of securing it is less relevant than (say) RADIUS, which is used across the wider internet. Alan DeKok.

Re: [OPSAWG] leaf device network configuration format (was draft-winter-opsawg-eap-metadata)

2016-03-21 Thread Alan DeKok
ready. In short, there is no practical way to onboard users securely via the method of "connect to an SSID, and click through the prompts". The configuration MUST be provided to the user signed, and/or via an out of band method. Alan DeKok.

Re: [OPSAWG] Detangling - Q3: Publish TACACS+ as a standards track RFC?

2016-04-06 Thread Alan DeKok
> On Apr 6, 2016, at 12:46 PM, Christopher Morrow > wrote: > > ​(I hate to resurrect an old thread. but)​ > > On Mon, Feb 22, 2016 at 10:37 AM, Alan DeKok > wrote: > And since TACACS+ is largely used *within* the enterprise, the issue of > securing it is less

Re: [OPSAWG] TACACS+ informational document.

2016-04-21 Thread Alan DeKok
... user The username. It is encoded in [UTF-8]. It is optional in this packet, depending upon the class of authentication. What does it mean to be "optional"? Perhaps the "user_len" field is equal to zero, which means that the "user" field does not e

Re: [OPSAWG] TACACS+ informational document.

2016-04-21 Thread Alan DeKok
too. The temptation for naive implementors would be to encode an actual string "NULL". There should be a separate "Security Considerations" section as Section 9. It should explain all of the issues with the protocol, such as the use of "encryption", etc. Alan DeKok. ___ OPSAWG mailing list OPSAWG@ietf.org https://www.ietf.org/mailman/listinfo/opsawg

Re: [OPSAWG] TACACS+ informational document.

2016-04-22 Thread Alan DeKok
r-site deployment have on security? As an implementor, I would have to guess at large portions of the protocol, or I would have to read the source to existing implementations. The draft as is stands today can get me ~90% of the way to implementing the protocol, but critical portions are n

Re: [OPSAWG] New Version of T+ informational note has been uploaded

2016-07-15 Thread Alan DeKok
, makes the checks normative, and adds a suggestion to close the TCP connection. After all, if they key is wrong and packets can't be decrypted, there's no reason to keep the TCP connection open. You can't decrypt any data in the connection, so it will all be garbage. Alan De

Re: [OPSAWG] New Version of T+ informational note has been uploaded

2016-07-15 Thread Alan DeKok
On Jul 15, 2016, at 11:24 AM, Alan DeKok wrote: > The Security Considerations section is in the middle of the document, where > it's typically at the end. That's a minor nit. The larger one is that the > Security Considerations section is pretty minimal. It should desc

Re: [OPSAWG] Start of WGLC for TACACS+ document.

2016-10-05 Thread Alan DeKok
Some comments. Mostly little nits and clarifications. The major points for me are related to security. The "Security Considerations" section is almost empty, and will certainly not pass a review from the security area. They will in all likelihood block publication until substantive comme

Re: [OPSAWG] Start of WGLC for TACACS+ document.

2016-10-05 Thread Alan DeKok
Continuing... Summary: the spec is still fairly descriptive / philosophical instead of prescriptive. Many optional parts of the protocol are described, "A and B are allowed", but there is often no description of what to *do* when either A or B is present. I've suggested descriptive text,

Re: [OPSAWG] Start of WGLC for TACACS+ document.

2016-10-06 Thread Alan DeKok
ch text, I'll withdraw all of my review comments. But I predict that the document won't pass security area review. And they'll make all of the same comments as I've made here, with a recommendation that the document not be published until it's fixed. Alan DeKok. ___ OPSAWG mailing list OPSAWG@ietf.org https://www.ietf.org/mailman/listinfo/opsawg

Re: [OPSAWG] Start of WGLC for TACACS+ document.

2016-10-06 Thread Alan DeKok
we don't need to document the protocol then put a huge disclaimer at the top of the draft saying so. Giving lip service to "document the protocol", while opposing attempts to do so is unproductive. Alan DeKok. ___ OPSAWG mailing list OPSAWG@ietf.org https://www.ietf.org/mailman/listinfo/opsawg

Re: [OPSAWG] Start of WGLC for TACACS+ document.

2016-10-06 Thread Alan DeKok
d should not be used by anyone to implement anything. Please wait for the Standards track document to get the actual TACACS+ specification that people can implement". It shouldn't be a contentious issue. Either document the protocol, or admit we're not going to d

Re: [OPSAWG] Start of WGLC for TACACS+ document.

2016-10-11 Thread Alan DeKok
Continuing with 4.4.3 While the order of hosts in this packet indicates a preference, but the client is not obliged to use that ordering. * the use of "obliged" is unusual here. Perhaps "the order used by the client is implementation specific, and does not have to follow the order s

Re: [OPSAWG] Start of WGLC for TACACS+ document.

2016-10-12 Thread Alan DeKok
Continuing with Section 8 ... Privilege Levels are ordered values from 0 to 15 with each level representing a privilege level that is a superset of the next lower value. * nit: perhaps this could be "each level is defined to be a superset of the next lower value", instead of "repres

Re: [OPSAWG] Start of WGLC for TACACS+ document.

2016-10-12 Thread Alan DeKok
My $0.02 on the contents of the Security Considerations section. I'm sure I've missed things. Please also comment if the suggestions here are wrong or unworkable. 9. Security Considerations The protocol described in this document has been in widespread use since specified in "The Dra

[OPSAWG] Serious concerns with draft-ietf-opsawg-tacacs-06

2017-05-09 Thread Alan DeKok
While I appreciate that the document is improving, blatant copying of my text without attribution is entirely inappropriate. What are the chairs recommendations? Alan DeKok. ___ OPSAWG mailing list OPSAWG@ietf.org https://www.ietf.org/mailma

Re: [OPSAWG] Serious concerns with draft-ietf-opsawg-tacacs-06

2017-05-09 Thread Alan DeKok
ll be followed. I would suggest that it's too early to have a WGLC, as the authors simply haven't responded to reviews of the draft. i.e. I have no idea what state the draft is in. After doing multiple detailed reviews that largely get ignored,

Re: [OPSAWG] Serious concerns with draft-ietf-opsawg-tacacs-06

2017-05-09 Thread Alan DeKok
do more. >> It's up to the authors to demonstrate that the comments have been addressed. > > Authors have the next step to do at this time. Let's wait for the new > revision first. It's also possible to respond publicly to my review. Alan DeKok. ___ OPSAWG mailing list OPSAWG@ietf.org https://www.ietf.org/mailman/listinfo/opsawg

Re: [OPSAWG] draft-ietf-opsawg-tacacs-06 Contributions, Status and Plans

2017-05-12 Thread Alan DeKok
On May 12, 2017, at 2:40 PM, Douglas Gash (dcmgash) wrote: > 1) Regarding the use of uncredited text from Alan DeKok: > > It is certainly the case that Alan has spent time actively engaged in the > process of critiquing this document to improve it, and provided numerous > p

Re: [OPSAWG] draft-ietf-opsawg-tacacs-06 Contributions, Status and Plans

2017-05-13 Thread Alan DeKok
ensus, I suggest the chairs replace you with authors who will. Alan DeKok. ___ OPSAWG mailing list OPSAWG@ietf.org https://www.ietf.org/mailman/listinfo/opsawg

Re: [OPSAWG] draft-ietf-opsawg-tacacs-06 Contributions, Status and Plans

2017-05-14 Thread Alan DeKok
the existing implementors haven't reviewed the document. So we have no idea whether or not it describes the protocol they've implemented, or the choices they've made. Alan DeKok. ___ OPSAWG mailing list OPSAWG@ietf.org https://www.ietf.org/mailman/listinfo/opsawg

Re: [OPSAWG] draft-ietf-opsawg-tacacs-06 Contributions, Status and Plans

2017-05-16 Thread Alan DeKok
o make here. The only subjects you addressed were ones I hadn't raised. Alan DeKok. ___ OPSAWG mailing list OPSAWG@ietf.org https://www.ietf.org/mailman/listinfo/opsawg

Re: [OPSAWG] draft-ietf-opsawg-tacacs-06 Contributions, Status and Plans

2017-05-16 Thread Alan DeKok
adopt this, and what status should it be. Part of the problem is that it's hard to have an ongoing conversation around my reviews. The comments are so numerous that discussing each one publicly would require hundreds of messages. Which for me is a sign that the draft is just nowhere n

Re: [OPSAWG] draft-ietf-opsawg-tacacs-06 Contributions, Status and Plans

2017-05-16 Thread Alan DeKok
On May 14, 2017, at 8:11 AM, Douglas Gash (dcmgash) wrote: > We will work through this list, and reply with an item-by item response, > (In place of previous mode of updating the doc to make v6) and then > hopefully move towards a consensus for the content for version 7. Thanks. A

Re: [OPSAWG] draft-ietf-opsawg-tacacs-06 Contributions, Status and Plans

2017-05-16 Thread Alan DeKok
IETF works. I fail to see what else could be commented > here. I'm saying until I complained, that *was* largely the process being used in this WG. Alan DeKok. ___ OPSAWG mailing list OPSAWG@ietf.org https://www.ietf.org/mailman/listinfo/opsawg

Re: [OPSAWG] draft-ietf-opsawg-tacacs-06 Contributions, Status and Plans

2017-05-17 Thread Alan DeKok
task_id? Since values can be omitted, is it OK to have a > zero-length task_id? or 1 octet? > > * are there recommendations for the content of task_id? e.g. incrementing > numbers, strings, etc. > > * is task_id mandatory to occur in accounting packets? > [task_id is best

Re: [OPSAWG] draft-ietf-opsawg-tacacs-06 Contributions, Status and Plans

2017-05-18 Thread Alan DeKok
to speak for everyone, I think the current approach in the draft will be fine. They may ask for some sections to be removed (i.e. servers pushing keys to clients). But everything else is pretty much fine. The idea is that having a documented protocol, with warnings and caveats, i

Re: [OPSAWG] draft-ietf-opsawg-tacacs-06 ASCII

2017-05-19 Thread Alan DeKok
o d). How much of UTF8 is allowed and where; it encompasses > over 65k characters these day:-( IMHO, the draft should just mention 18n, and run away screaming. :( As in, "we know about it, we don't know how to fix it, we don't know what

Re: [OPSAWG] draft-ietf-opsawg-tacacs-06 Contributions, Status and Plans

2017-05-23 Thread Alan DeKok
mplementation defined, the range of T+ devices we >>> see is so diverse and use cases are such that I would not like to >>> constrain.] >> >> It would be good to have recommendations. e.g. "updates more than once >> per second are NOT RECOMMEND, updates more t

Re: [OPSAWG] draft-ietf-opsawg-tacacs-06 ASCII

2017-09-17 Thread Alan DeKok
he previous ad-hoc definitions. > Boolean > > All boolean attributes are encoded with values "true" or "false". Nit: encoded as US-ASCII strings with values... Alan DeKok. ___ OPSAWG mailing list OPSAWG@ietf.org https://www.ietf.org/mailman/listinfo/opsawg

Re: [OPSAWG] TACACS+ SSH Enhancements Document

2022-09-08 Thread Alan DeKok
for it. > > We believe this option will enable an effective encapsulated upgrade approach > for implementors, and welcome feedback. I think it's a good approach. Alan DeKok. ___ OPSAWG mailing list OPSAWG@ietf.org https://www.ietf.org/mailman/listinfo/opsawg

Re: [OPSAWG] πŸ”” CALL FOR ADOPTION: RADIUS Extensions for Encrypted DNS

2022-09-14 Thread Alan DeKok
k. > > Therefore, this kicks off a two-week CfA for > https://datatracker.ietf.org/doc/draft-boucadair-opsawg-add-encrypted-dns/. > Please comment on-list with support and/or discussion of the work. I believe it should be adopted. We can worry about R

Re: [OPSAWG] πŸ”” CALL FOR ADOPTION: RADIUS Extensions for Encrypted DNS

2022-09-15 Thread Alan DeKok
ameter, and does not need to be mentioned in any RADIUS specification. Alan DeKok. ___ OPSAWG mailing list OPSAWG@ietf.org https://www.ietf.org/mailman/listinfo/opsawg

Re: [OPSAWG] πŸ”” CALL FOR ADOPTION: RADIUS Extensions for Encrypted DNS

2022-09-15 Thread Alan DeKok
On Sep 15, 2022, at 10:04 AM, Qin Wu wrote: > > Thank for clarification, so Diameter protocol doesn't need to define any new > attributes with similar functionality as Radius attributes, right? That is what I said. Alan DeKok.

Re: [OPSAWG] RADIUS Attributes Permitted in DHCPv6 RADIUS Option: Encrypted DNS

2022-10-05 Thread Alan DeKok
is copied to DHCPv6 option BAR". There should probably either be an explicit mapping table given, or each attribute definition should be extended with "this attribute is copied to DHCPv6 attribute BAR" Without such direction, an implementor has to gue

Re: [OPSAWG] RADIUS Attributes Permitted in DHCPv6 RADIUS Option: Encrypted DNS

2022-10-05 Thread Alan DeKok
-Lite-Tunnel-Name RADIUS attribute is a string > with opaque encapsulation, according to Section 5 of [RFC2865]. That appears to be an error. I'll file an errata with IANA. Alan DeKok. ___ OPSAWG mailing list OPSAWG@ietf.org https://www.ietf.org/mailman/listinfo/opsawg

Re: [OPSAWG] I-D Action: draft-ietf-opsawg-add-encrypted-dns-02.txt

2022-10-06 Thread Alan DeKok
le documents, and then "read between the lines" to see what's implied. This is hard. Alan DeKok. ___ OPSAWG mailing list OPSAWG@ietf.org https://www.ietf.org/mailman/listinfo/opsawg

Re: [OPSAWG] I-D Action: draft-ietf-opsawg-add-encrypted-dns-02.txt

2022-10-06 Thread Alan DeKok
On Oct 6, 2022, at 9:32 AM, wrote: > I added an appendix for this as you can see at: > https://tinyurl.com/opsawg-add-latest. I missed that, sorry. > Do we need to sway more? No, I think this looks good. Alan DeKok. ___ OPSAW

Re: [OPSAWG] [Add] πŸ”” WG LC: RADIUS Extensions for Encrypted DNS

2022-10-12 Thread Alan DeKok
ts only for "top level" attributes, and cannot be used here. Further, RADIUS packets are generally limited to 4K octets total. So even if the limits on this attribute are removed, then there's still a practical limit of around 4000 octets. Alan DeKok. _

Re: [OPSAWG] [Add] πŸ”” WG LC: RADIUS Extensions for Encrypted DNS

2022-10-12 Thread Alan DeKok
014 i.e. DHCPv4 carries RADIUS attributes. So there's reasonable precedent. Alan DeKok. ___ OPSAWG mailing list OPSAWG@ietf.org https://www.ietf.org/mailman/listinfo/opsawg

Re: [OPSAWG] [Add] πŸ”” WG LC: RADIUS Extensions for Encrypted DNS

2022-10-13 Thread Alan DeKok
th. Each child attribute can then carry a full 253 octets of data. And there are no limits on the number of child attributes which ca be carried. Alan DeKok. ___ OPSAWG mailing list OPSAWG@ietf.org https://www.ietf.org/mailman/listinfo/opsawg

Re: [OPSAWG] [Add] πŸ”” WG LC: RADIUS Extensions for Encrypted DNS

2022-10-13 Thread Alan DeKok
ns could suggest that implementations SHOULD support 64K RADIUS packets. Alan DeKok. ___ OPSAWG mailing list OPSAWG@ietf.org https://www.ietf.org/mailman/listinfo/opsawg

Re: [OPSAWG] [Add] πŸ”” WG LC: RADIUS Extensions for Encrypted DNS

2022-10-13 Thread Alan DeKok
are happy to accept longer packets. i.e. it's 2022, I think that software can easily handle 64K buffers for network protocols. There's also RFC 7499 which supports fragmentation of CoA packets. Perhaps a similar method could be used here, if required? Alan DeKok. _

Re: [OPSAWG] [Add] πŸ”” WG LC: RADIUS Extensions for Encrypted DNS

2022-10-14 Thread Alan DeKok
iguration, the RADIUS server SHOULD expose the DHCP options and allow administrators to configure them, instead of requiring them to be entered as opaque data". That gets the best of both worlds. Alan DeKok. ___ OPSAWG mailing list OPSAWG@ietf.org https://www.ietf.org/mailman/listinfo/opsawg

Re: [OPSAWG] [dhcwg] [Add] πŸ”” WG LC: RADIUS Extensions for Encrypted DNS

2022-10-17 Thread Alan DeKok
S attribute, and separately in a DHCPv6-Options attribute. They can all be added to the packets. i.e. if the administrator of the system configures something weird, the systems should just do what's asked. Anything past basic filtering is complex to define, and complex to

Re: [OPSAWG] IPR POLL: draft-ietf-opsawg-add-encrypted-dns

2022-10-20 Thread Alan DeKok
Having been just added as co-author, No, I'm not aware of any IPR that applies to this draft" > On Oct 12, 2022, at 12:46 PM, Joe Clarke (jclarke) wrote: > > Authors and contributors, please respond on-list as to whether or not you are > aware of any IPR that pertains to this work. > > Ple

Re: [OPSAWG] I-D Action: draft-ietf-opsawg-tacacs-tls13-01.txt

2022-12-01 Thread Alan DeKok
lob/v3.2.x/raddb/mods-available/eap#L177 It's for EAP-TLS, but the requirements for TACACS+ with TLS would be similar. There are a large number of options for configuring certificates, validation methods, CAs, PSKs, etc. Nearly all of these would be required when TACACS+ is used wi

Re: [OPSAWG] AD review of draft-ietf-opsawg-add-encrypted-dns-07

2022-12-19 Thread Alan DeKok
> IANA is requested to create a new sub-registry entitled "DHCPv6 > Options Permitted in the RADIUS DHCPv6-Options Attribute" in the > "Dynamic Host Configuration Protocol for IPv6 (DHCPv6)" registry > [DHCP

Re: [OPSAWG] AD review of draft-ietf-opsawg-add-encrypted-dns-07

2023-02-08 Thread Alan DeKok
; [Rob Wilton (rwilton)] > > Okay. If this will be obvious to everyone implementing/deploying RADIUS then > fine, otherwise it might be worth including an informative reference to the > RFC that increases the limit to 64K. This is RFC 7930. Packet size limitations w

Re: [OPSAWG] Genart last call review of draft-ietf-opsawg-add-encrypted-dns-09

2023-02-17 Thread Alan DeKok
nly be extended by implementing the negotiation discussed in the other specifications. So we would like to suggest 64K packets here, but we can't mandate them, Alan DeKok. ___ OPSAWG mailing list OPSAWG@ietf.org https://www.ietf.org/mailman/listinfo/opsawg

Re: [OPSAWG] [dhcwg] Γ‰ric Vyncke's Discuss on draft-ietf-opsawg-add-encrypted-dns-11: (with DISCUSS and COMMENT)

2023-03-14 Thread Alan DeKok
it should automatically create correctly-formed attributes. Alan DeKok. ___ OPSAWG mailing list OPSAWG@ietf.org https://www.ietf.org/mailman/listinfo/opsawg

Re: [OPSAWG] [dhcwg] Paul Wouters' Yes on draft-ietf-opsawg-add-encrypted-dns-11: (with COMMENT)

2023-03-15 Thread Alan DeKok
be secured by RADIUS, and used in environments where RADIUS is (allegedly) secure. This means IPSec / TLS / management networks. If RADIUS administrators want to send insecure UDP packets over the wider Internet, then there's a lot more information than this which will get le

Re: [OPSAWG] I-D Action: draft-ietf-opsawg-tacacs-tls13-03.txt

2023-07-11 Thread Alan DeKok
TACACS+. As a result, it is useful to have a configuration which can say "allow network FOO, forbid network BAR". This would be in addition to any TLS layer filtering. Alan DeKok. ___ OPSAWG mailing list OPSAWG@ietf.org https://www.ietf.org/mailman/listinfo/opsawg

Re: [OPSAWG] I-D Action: draft-ietf-opsawg-tacacs-tls13-03.txt

2023-07-11 Thread Alan DeKok
a need for that, or would > this rather be an convenience option? A specific port number limits the > attack surface to a single port, and I don't see any need for that. I think a dedicated port for TACACS+TLS would be good. Alan DeKok. ___ OPSAWG mailing list OPSAWG@ietf.org https://www.ietf.org/mailman/listinfo/opsawg

Re: [OPSAWG] [radext] draft-ietf-opsawg-ucl-acl: User Access Control Group ID RADIUS Attribute

2023-09-26 Thread Alan DeKok
or anyone interested in the underlying reasons, there is a long discussion of this topic in https://datatracker.ietf.org/doc/html/draft-dekok-radext-deprecating-radius-03#section-7.3 Alan DeKok. ___ OPSAWG mailing list OPSAWG@ietf.org https://www.ietf.org/mailman/listinfo/opsawg

Re: [OPSAWG] [radext] draft-ietf-opsawg-ucl-acl: User Access Control Group ID RADIUS Attribute

2023-10-09 Thread Alan DeKok
draft-dekok-radext-deprecating-radius) rather than duplicating the reco in > the doc. Sure. That reference should informative, as the deprecation doc may take a while to be published. That way it doesn't block your document. Alan DeKok. ___

Re: [OPSAWG] Submission of new version of TACACS+ TLS Spec (V4)

2023-12-28 Thread Alan DeKok
. I'd suggest reading the RADEXT TLS-PSK and ALPN documents linked above. They go into exhaustive detail about how every little bit is supposed to work. I've found that documenting the protocol in such detail greatly improves the quality of the implementations, and is more likely to result in interoperation between the implementations. Alan DeKok. ___ OPSAWG mailing list OPSAWG@ietf.org https://www.ietf.org/mailman/listinfo/opsawg

Re: [OPSAWG] Submission of new version of TACACS+ TLS Spec (V4)

2023-12-29 Thread Alan DeKok
o > that mis-configured clients can be fixed? Not really. If the authors believe that there is significant operational benefit to re-using the port, then the document should explain that in detail. Alan DeKok. ___ OPSAWG mailing list OPSAWG

Re: [OPSAWG] [Technical Errata Reported] RFC2865 (6915)

2024-01-15 Thread Alan DeKok
rrently permitted to define an attribute which has a zero-length value. As such, "hold for document update" is the reasonable conclusion. Alan DeKok. ___ OPSAWG mailing list OPSAWG@ietf.org https://www.ietf.org/mailman/listinfo/opsawg

Re: [OPSAWG] I-D Action: draft-ietf-opsawg-tacacs-tls13-07.txt

2024-04-23 Thread Alan DeKok
P address filtering? If the client has correct TLS credentials, does it really matter what IP it comes from? i.e. will the move to TLS still have servers identify clients by IP address? Servers could also be configured to limit connections by source IP, as an additional layer of security. Alan DeKok. ___ OPSAWG mailing list OPSAWG@ietf.org https://www.ietf.org/mailman/listinfo/opsawg

[OPSAWG]Re: WG LC: draft-ietf-opsawg-tacacs-tls13

2024-06-24 Thread Alan DeKok
e draft, and the lack of experience with implementations, I'd suggest that "Experimental" is more appropriate. Alan DeKok. ___ OPSAWG mailing list -- opsawg@ietf.org To unsubscribe send an email to opsawg-le...@ietf.org

[OPSAWG]Re: TACACS+ w/ TLS 1.3 implementations

2024-06-27 Thread Alan DeKok
might be late 2024 before this work starts. Alan DeKok. ___ OPSAWG mailing list -- opsawg@ietf.org To unsubscribe send an email to opsawg-le...@ietf.org

  1   2   >