On Fri, Jul 4, 2025 at 6:20 AM Douglas Gash (dcmgash) <[email protected]>
wrote:

> Hi Paul,
>
>
>
> Many thanks for the review.
>
>
>
> This section also came up in another recent review, we have clarified that
> the issue is that the client hello is in cleartext.
>
>
>
> Of course, this doesn’t address your real point, which is that it doesn’t
> matter that it is in cleartext as the information is available elsewhere,
> and you are correct, however we judged that as we included its
> configurability in deployments, that it’s transmission in plaintext is
> worth raising. If that irks still, please let us know.
>

It's fine the leave the text as is. Thanks for getting back to me.

Paul




>
>
> *From: *Paul Wouters via Datatracker <[email protected]>
> *Date: *Wednesday, 25 June 2025 at 01:59
> *To: *The IESG <[email protected]>
> *Cc: *[email protected] <
> [email protected]>, [email protected] <
> [email protected]>, [email protected] <[email protected]>,
> [email protected] <[email protected]>, Joe Clarke
> (jclarke) <[email protected]>, Joe Clarke (jclarke) <[email protected]>
> *Subject: *Paul Wouters' Yes on draft-ietf-opsawg-tacacs-tls13-23: (with
> COMMENT)
>
> Paul Wouters has entered the following ballot position for
> draft-ietf-opsawg-tacacs-tls13-23: Yes
>
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut this
> introductory paragraph, however.)
>
>
> Please refer to
> https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/
> for more information about how to handle DISCUSS and COMMENT positions.
>
>
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-opsawg-tacacs-tls13/
>
>
>
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
>
> Thanks for a clear document. I just have one comment:
>
>         5.1.5. TLS Server Name Indicator (SNI)
>
>         Operators should be aware that the TLS SNI extension is
>         part of the TLS client hello and is, therefore, subject to
>         eavesdropping. Also see Section 11.1 of [RFC6066].
>
> I am not sure why this really matters? I presume the name is already in
> public DNS and/or reverse DNS and is probably already well known? It
> will be using a new tacacss well-known port so the name isn't needed
> to leak information that the connection is tacacs.
>
> Also, if it mattered, since the server is likely dedicated to this
> purpose, why use SNI? One could just not use it, as the target server
> doesn't need to vhost demux the HTTPS request anyway? And finally,
> one could use ECH to protect against SNI sniffing, if it really mattered.
>
>
>
_______________________________________________
OPSAWG mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to