Hi Paul,

Many thanks for the review.

This section also came up in another recent review, we have clarified that the 
issue is that the client hello is in cleartext.

Of course, this doesn’t address your real point, which is that it doesn’t 
matter that it is in cleartext as the information is available elsewhere, and 
you are correct, however we judged that as we included its configurability in 
deployments, that it’s transmission in plaintext is worth raising. If that irks 
still, please let us know.

From: Paul Wouters via Datatracker <nore...@ietf.org>
Date: Wednesday, 25 June 2025 at 01:59
To: The IESG <i...@ietf.org>
Cc: draft-ietf-opsawg-tacacs-tl...@ietf.org 
<draft-ietf-opsawg-tacacs-tl...@ietf.org>, opsawg-cha...@ietf.org 
<opsawg-cha...@ietf.org>, opsawg@ietf.org <opsawg@ietf.org>, 
mohamed.boucad...@orange.com <mohamed.boucad...@orange.com>, Joe Clarke 
(jclarke) <jcla...@cisco.com>, Joe Clarke (jclarke) <jcla...@cisco.com>
Subject: Paul Wouters' Yes on draft-ietf-opsawg-tacacs-tls13-23: (with COMMENT)
Paul Wouters has entered the following ballot position for
draft-ietf-opsawg-tacacs-tls13-23: Yes

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-opsawg-tacacs-tls13/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

Thanks for a clear document. I just have one comment:

        5.1.5. TLS Server Name Indicator (SNI)

        Operators should be aware that the TLS SNI extension is
        part of the TLS client hello and is, therefore, subject to
        eavesdropping. Also see Section 11.1 of [RFC6066].

I am not sure why this really matters? I presume the name is already in
public DNS and/or reverse DNS and is probably already well known? It
will be using a new tacacss well-known port so the name isn't needed
to leak information that the connection is tacacs.

Also, if it mattered, since the server is likely dedicated to this
purpose, why use SNI? One could just not use it, as the target server
doesn't need to vhost demux the HTTPS request anyway? And finally,
one could use ECH to protect against SNI sniffing, if it really mattered.


_______________________________________________
OPSAWG mailing list -- opsawg@ietf.org
To unsubscribe send an email to opsawg-le...@ietf.org

Reply via email to