I think that more is needed for security.

Security Considerations does not list any sensitive nodes.  I see 'secret' as 
an obvious candidate with its nacm:deny-all and perhaps the list of servers and 
their addresses.

The model allows for accounting or authorisation or authentication or all three 
but not two out of three; I do not know if this is a use case.

opsawg-tacacs says secret must be 16  preferably 32; YANG can enforce the 
former and recommend the latter

server name is unrestricted in length or character set; is this desirable (YANG 
has a type for identifiers limited to the usual A-Z 0-9 plus some punctuation)?

Overall I was expecting more but that said I cannot think of what to add!

Tom Petch


________________________________________
From: OPSAWG <opsawg-boun...@ietf.org> on behalf of Joe Clarke (jclarke) 
<jclarke=40cisco....@dmarc.ietf.org>
Sent: 20 April 2020 14:23
To: opsawg
Subject: [OPSAWG] WG LC: draft-ietf-opsawg-tacacs-yang-03

Hello, opsawg.  As we stated in the April 7 virtual interim, this draft has 
reached a point where current WG feedback has been incorporated, and the larger 
TACACS+ is progressing through the IESG.  We are opening a two week last call 
for this draft.

Please comment as to whether or not you feel it is ready and what additional 
changes are required by May 3, 2020.

Thanks.

Joe and Tianran

Joe
_______________________________________________
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg

_______________________________________________
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg

Reply via email to