Many thanks for the review, Russ!

Please see below the initial changes based upon your comments, hopefully they 
have met the intent. Please advise if the updates are not addressing what you 
had in mind, or for any concerns.

Best Regards,

The Authors.


From: Russ Housley via Datatracker <nore...@ietf.org>
Date: Thursday, 25 April 2024 at 20:32
To: sec...@ietf.org <sec...@ietf.org>
Cc: draft-ietf-opsawg-tacacs-tls13....@ietf.org 
<draft-ietf-opsawg-tacacs-tls13....@ietf.org>, opsawg@ietf.org <opsawg@ietf.org>
Subject: Secdir early review of draft-ietf-opsawg-tacacs-tls13-07
Reviewer: Russ Housley
Review result: Not Ready

I reviewed this document as part of the Security Directorate's ongoing
effort to review all IETF documents being processed by the IESG.  These
comments were written primarily for the benefit of the Security Area
Directors.  Document authors, document editors, and WG chairs should
treat these comments just like any other IETF Last Call comments.

Document: draft-ietf-opsawg-tacacs-tls13-07
Reviewer: Russ Housley
Review Date: 2024-04-25
IETF LC End Date: Unknown
IESG Telechat date: Unknown

Summary: Has Issues


Major Concerns:

Section 3.2.2 says:

   Implementations MUST support certificate-based TLS authentication and
   certificate revocation bi-directionally for authentication, identity
   verification and policy purposes.  Certificate path verification as
   described in Section 3.2.2.1 MUST be supported.

I do not understand this paragraph.  I suggest that you handle four
topics in separate sentences:

   (1) certificate for the server (for server authentication),
   (2) revocation checking of the server certificate by the client,
   (3) certificate for the client (for client authentication),
   (4) revocation checking of the client certificate by the server.
<Doug> The “Policy” purposes is probably over-prescriptive, as implementations 
are clearly free to apply policy to any attributes such as identity and other 
cert attributes that that bubble up from the transport as they see fit and so 
I’ll remove that.
Otherwise, the intent is that:
“Certificate based mutual TLS authentication MUST be supported by 
implementations along with the provisions of revocation and path verification 
from [RFC5280] as described in 3.2.2.1.”
Does that make sufficient sense?  We do have a canonical version:
“   Certificate based mutual authentication MUST be supported.
   Clients MUST support certificate-based TLS authentication of the Peer 
Server.  Clients MUST support certificate revocation.
   Servers MUST support certificate-based TLS authentication of the Peer 
Client.  Servers MUST support certificate revocation.
   Certificate path verification as described in Section 3.2.2.1 MUST be 
supported.”
If this structure is still preferred, or more info is really required, please 
advise.</Doug>



Section 3.2.2 says: "Pre-Shared Keys (PSKs) [RFC4279] ...".  RFC 4279 is
not appropriate for use with TLS 1.3, so it should not be cited here.
<Doug>Agreed: Removed that citation.</Doug>


Section 5.1.2 says: "... servers MAY abruptly disconnect clients that
do."  I think this ought to make a stronger recommendation about 0-RTT.
Other profiles for the use of TLS with specific protocols (like
draft-ietf-netconf-over-tls13) completely forbid 0-RTT.

<Doug>Agreed: changed to MUST.</Doug>


Section 5.1.4 talks about loading certificate chains.  It might also
talk about loading the information needed to perform revocation checks
or the use of OCSP stapling.
<Doug>Agreed. We have removed the part about loading the certs from 5.1.4 into 
3.2.2.1, which is now augmented with extra requirements for revocation, 
hopefully this should cover:

“Other approaches may be used for loading the intermediate certificates onto 
the client, but MUST include support for revocation.

For example, <xref target="RFC5280"/> details the AIA (Authority Information 
Access) extension to access information about the issuer of the certificate in 
which the extension appears. It can be used to provide the address of the 
Online Certificate Status Protocol (OCSP) responder from where revocation 
status of the certificate can be checked.”
</Doug>


Section 5.1.4 says: "Certificate fingerprints are another option."
More explanation or a reference is needed here,

<Doug>This is removed along with the previous comment.</Doug>


Minor Concerns:

The draft uses RFC 2119 terms, but it lacks a reference to RFC 2119
and the usual RFC 2119 boilerplate.


<Doug>There was a rather hidden reference using the “referencegroup” mechanism, 
so it did appear in the references, Is this sufficient?



   [BCP14]    Best Current Practice 14,

              https://www.rfc-editor.org/bcp/bcp14.txt.

              At the time of writing, this BCP comprises the following:



              Bradner, S., "Key words for use in RFCs to Indicate

              Requirement Levels", BCP 14, RFC 2119,

              DOI 10.17487/RFC2119, March 1997,

              https://www.rfc-editor.org/info/rfc2119.



              Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC

              2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,

</Doug>


Nits:
<Doug>Agreed: updated all</Doug>

Section 3: Please add a reference for FIPS 140.

Section 3.2.2.1: s/Certificate Authority (CA)/Certification Authority (CA)/

Section 3.3: s/Certificate Provisioning/Certificate provisioning/

Section 5.1.3: s/abandoned/abandoned./

Section 5.1.4: s/Certificate Authority (CA)/Certification Authority (CA)/

IDnits complaints about:

 == The 'Updates: ' line in the draft header should list only the numbers
    of the RFCs which will be updated by this document (if approved); it
    should not include the word 'RFC' in the list.


_______________________________________________
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg

Reply via email to