Doug:

> Many thanks for the review, Russ!
>  
> Please see below the initial changes based upon your comments, hopefully they 
> have met the intent. Please advise if the updates are not addressing what you 
> had in mind, or for any concerns.
>  
> Best Regards,
>  
> The Authors.
>  
>  
> From: Russ Housley via Datatracker <nore...@ietf.org 
> <mailto:nore...@ietf.org>>
> Date: Thursday, 25 April 2024 at 20:32
> To: sec...@ietf.org <mailto:sec...@ietf.org> <sec...@ietf.org 
> <mailto:sec...@ietf.org>>
> Cc: draft-ietf-opsawg-tacacs-tls13....@ietf.org 
> <mailto:draft-ietf-opsawg-tacacs-tls13....@ietf.org> 
> <draft-ietf-opsawg-tacacs-tls13....@ietf.org 
> <mailto:draft-ietf-opsawg-tacacs-tls13....@ietf.org>>, opsawg@ietf.org 
> <mailto:opsawg@ietf.org> <opsawg@ietf.org <mailto:opsawg@ietf.org>>
> Subject: Secdir early review of draft-ietf-opsawg-tacacs-tls13-07
> 
> Reviewer: Russ Housley
> Review result: Not Ready
> 
> I reviewed this document as part of the Security Directorate's ongoing
> effort to review all IETF documents being processed by the IESG.  These
> comments were written primarily for the benefit of the Security Area
> Directors.  Document authors, document editors, and WG chairs should
> treat these comments just like any other IETF Last Call comments.
> 
> Document: draft-ietf-opsawg-tacacs-tls13-07
> Reviewer: Russ Housley
> Review Date: 2024-04-25
> IETF LC End Date: Unknown
> IESG Telechat date: Unknown
> 
> Summary: Has Issues
> 
> 
> Major Concerns:
> 
> Section 3.2.2 says:
> 
>    Implementations MUST support certificate-based TLS authentication and
>    certificate revocation bi-directionally for authentication, identity
>    verification and policy purposes.  Certificate path verification as
>    described in Section 3.2.2.1 MUST be supported.
> 
> I do not understand this paragraph.  I suggest that you handle four
> topics in separate sentences:
> 
>    (1) certificate for the server (for server authentication),
>    (2) revocation checking of the server certificate by the client,
>    (3) certificate for the client (for client authentication),
>    (4) revocation checking of the client certificate by the server.
> 
> <Doug> The “Policy” purposes is probably over-prescriptive, as 
> implementations are clearly free to apply policy to any attributes such as 
> identity and other cert attributes that that bubble up from the transport as 
> they see fit and so I’ll remove that.
> 
> Otherwise, the intent is that:
> 
> “Certificate based mutual TLS authentication MUST be supported by 
> implementations along with the provisions of revocation and path verification 
> from [RFC5280] as described in 3.2.2.1.”
> 
> Does that make sufficient sense?  We do have a canonical version:
> 
> “   Certificate based mutual authentication MUST be supported.
> 
>    Clients MUST support certificate-based TLS authentication of the Peer 
> Server.  Clients MUST support certificate revocation.
> 
>    Servers MUST support certificate-based TLS authentication of the Peer 
> Client.  Servers MUST support certificate revocation.
> 
>    Certificate path verification as described in Section 3.2.2.1 MUST be 
> supported.”
> 
> If this structure is still preferred, or more info is really required, please 
> advise.</Doug>
> 

To be a little less verbose, I suggest:

~~~
Certificate based mutual authentication MUST be supported.  Each peer MUST 
validate the certificate path of the remote peer, including revocation 
checking, as described in Section  3.2.2.1.
~~~

> Section 3.2.2 says: "Pre-Shared Keys (PSKs) [RFC4279] ...".  RFC 4279 is
> not appropriate for use with TLS 1.3, so it should not be cited here.
> 
> <Doug>Agreed: Removed that citation.</Doug>
> 

Thanks.
> Section 5.1.2 says: "... servers MAY abruptly disconnect clients that
> do."  I think this ought to make a stronger recommendation about 0-RTT.
> Other profiles for the use of TLS with specific protocols (like
> draft-ietf-netconf-over-tls13) completely forbid 0-RTT.
> 
>  
> 
> <Doug>Agreed: changed to MUST.</Doug>
> 

Thanks.
> Section 5.1.4 talks about loading certificate chains.  It might also
> talk about loading the information needed to perform revocation checks
> or the use of OCSP stapling.
> 
> <Doug>Agreed. We have removed the part about loading the certs from 5.1.4 
> into 3.2.2.1, which is now augmented with extra requirements for revocation, 
> hopefully this should cover:
>  
> “Other approaches may be used for loading the intermediate certificates onto 
> the client, but MUST include support for revocation.
>  
> For example, <xref target="RFC5280"/> details the AIA (Authority Information 
> Access) extension to access information about the issuer of the certificate 
> in which the extension appears. It can be used to provide the address of the 
> Online Certificate Status Protocol (OCSP) responder from where revocation 
> status of the certificate can be checked.”
> </Doug>
> 
s/revocation/revocation checking/

Otherwise this look fine to me.
> Section 5.1.4 says: "Certificate fingerprints are another option."
> More explanation or a reference is needed here,
> 
> 
> <Doug>This is removed along with the previous comment.</Doug>
> 
Okay.
> Minor Concerns:
> 
> The draft uses RFC 2119 terms, but it lacks a reference to RFC 2119
> and the usual RFC 2119 boilerplate.
> 
> 
> <Doug>There was a rather hidden reference using the “referencegroup” 
> mechanism, so it did appear in the references, Is this sufficient?
>  
>    [BCP14]    Best Current Practice 14,
>               https://www.rfc-editor.org/bcp/bcp14.txt.
>               At the time of writing, this BCP comprises the following:
>  
>               Bradner, S., "Key words for use in RFCs to Indicate
>               Requirement Levels", BCP 14, RFC 2119,
>               DOI 10.17487/RFC2119, March 1997,
>               https://www.rfc-editor.org/info/rfc2119.
>  
>               Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
>               2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
> </Doug>

Yes.

> Nits:
> 
> <Doug>Agreed: updated all</Doug>
> 
Okay.

Russ

_______________________________________________
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg

Reply via email to