Re: [OPSAWG] TACACS+ information Draft Security Recommendations refactor

2018-08-06 Thread Joe Clarke
On 8/2/18 00:23, Douglas Gash (dcmgash) wrote: > Apologies for the interruption in the conversation. > > Attached should incorporate yours and Alan’s latest comments, and some client > side comments have been addressed. > > Please find attached. Thanks, Douglas. I read through these changes,

Re: [OPSAWG] TACACS+ information Draft Security Recommendations refactor

2018-08-01 Thread Douglas Gash (dcmgash)
Apologies for the interruption in the conversation. Attached should incorporate yours and Alan’s latest comments, and some client side comments have been addressed. Please find attached. Many thanks. On 16/07/2018, 6:56, "Douglas Gash (dcmgash)" wrote: Hi Joe, Thanks Joe,

Re: [OPSAWG] TACACS+ information Draft Security Recommendations refactor

2018-07-15 Thread Douglas Gash (dcmgash)
Hi Joe, Thanks Joe, all useful comments. I believe that most of them were caught in the previous upload (in which we responded to Alan’s last mail), I will make sure that any missing are in the next. On 16/07/2018, 0:20, "Joe Clarke" wrote: On 7/14/18 00:57, Douglas Gash (dcmgash) wrote:

Re: [OPSAWG] TACACS+ information Draft Security Recommendations refactor

2018-07-15 Thread Joe Clarke
On 7/14/18 00:57, Douglas Gash (dcmgash) wrote: > 9.5 Deployment Best Practices > > With respect to the observations about the security issues described above, a  > network administrator MUST NOT rely on the obfuscation of the TACACS+ > protocol and TACACS+ MUST be deployed over networks which

Re: [OPSAWG] TACACS+ information Draft Security Recommendations refactor

2018-07-14 Thread Douglas Gash (dcmgash)
Thanks Alan… On 14/07/2018, 15:00, "Alan DeKok" wrote: On Jul 14, 2018, at 12:57 AM, Douglas Gash (dcmgash) wrote: > > Dear Alan, > > Do the changes below clarify the intent sufficiently? (please find diff below) The changes are mainly in first section with a few tweaks

Re: [OPSAWG] TACACS+ information Draft Security Recommendations refactor

2018-07-14 Thread Alan DeKok
On Jul 14, 2018, at 12:57 AM, Douglas Gash (dcmgash) wrote: > > Dear Alan, > > Do the changes below clarify the intent sufficiently? (please find diff > below) The changes are mainly in first section with a few tweaks in later > sections. Let's see... > 9.5 Deployment Best Practices > >

Re: [OPSAWG] TACACS+ information Draft Security Recommendations refactor

2018-07-13 Thread Douglas Gash (dcmgash)
Dear Alan, Do the changes below clarify the intent sufficiently? (please find diff below) The changes are mainly in first section with a few tweaks in later sections. Many thanks. 9.5 Deployment Best Practices With respect to the observations about the security issues described above, a 

Re: [OPSAWG] TACACS+ information Draft Security Recommendations refactor

2018-07-13 Thread joel jaeggli
On 7/13/18 4:30 AM, Alan DeKok wrote: > There have been many, many, historical protocols documented in the IETF. > None that I recall have a statement explicitly blessing existing > implementations. > > The document *should* say that it documents TACACS+ as per existing >

Re: [OPSAWG] TACACS+ information Draft Security Recommendations refactor

2018-07-13 Thread Alan DeKok
On Jul 13, 2018, at 11:39 AM, Randy Bush wrote: >> >> Also, we have *no idea* if the document matches current implementations or >> deployments. The proponents of TACACS+ have been surprisingly silent on >> this topic. > > i am missig the example of where it does not. There are probably

Re: [OPSAWG] TACACS+ information Draft Security Recommendations refactor

2018-07-13 Thread Randy Bush
> There are still unaddressed comments. Do we do WG last calls for > unfinished documents? > > Also, we have *no idea* if the document matches current implementations or > deployments. The proponents of TACACS+ have been surprisingly silent on this > topic. > > So everyone wants the

Re: [OPSAWG] TACACS+ information Draft Security Recommendations refactor

2018-07-13 Thread Alan DeKok
On Jul 13, 2018, at 11:30 AM, Joe Clarke wrote: > > I am hoping to start a WGLC at the Tuesday meeting, and cary it over to > the list to make it official. There are still unaddressed comments. Do we do WG last calls for unfinished documents? Also, we have *no idea* if the document

Re: [OPSAWG] TACACS+ information Draft Security Recommendations refactor

2018-07-13 Thread Randy Bush
>>> I think the current proposals are pretty close, at least from my end. >>> I think it's just word smithing from now on. >> >> good. so it should be fiished by the time the drafts door re-opens on >> monday? > > I am hoping to start a WGLC at the Tuesday meeting, and cary it over to > the

Re: [OPSAWG] TACACS+ information Draft Security Recommendations refactor

2018-07-13 Thread Joe Clarke
On 7/13/18 10:37, Randy Bush wrote: >> I think the current proposals are pretty close, at least from my end. >> I think it's just word smithing from now on. > > good. so it should be fiished by the time the drafts door re-opens on > monday? I am hoping to start a WGLC at the Tuesday meeting,

Re: [OPSAWG] TACACS+ information Draft Security Recommendations refactor

2018-07-13 Thread Randy Bush
> I think the current proposals are pretty close, at least from my end. > I think it's just word smithing from now on. good. so it should be fiished by the time the drafts door re-opens on monday? randy ___ OPSAWG mailing list OPSAWG@ietf.org

Re: [OPSAWG] TACACS+ information Draft Security Recommendations refactor

2018-07-13 Thread Alan DeKok
On Jul 13, 2018, at 10:29 AM, Randy Bush wrote: > i do not think we are gonna 'fix' the security model. this is a widely > deployed antique we are just trying to document so new victims can > interoperate. That has been the goal all along. Along with the goal of documenting security issues.

Re: [OPSAWG] TACACS+ information Draft Security Recommendations refactor

2018-07-13 Thread Randy Bush
as one of the many folk who have been using this protocol since the '90s, i gotta wonder how many angels we can sit on the head of this bikeshed. i do not think we are gonna 'fix' the security model. this is a widely deployed antique we are just trying to document so new victims can

Re: [OPSAWG] TACACS+ information Draft Security Recommendations refactor

2018-07-13 Thread Douglas Gash (dcmgash)
Thanks Alan... > On 13 Jul 2018, at 14:30, Alan DeKok wrote: > >> On Jul 13, 2018, at 1:00 AM, Douglas Gash (dcmgash) >> wrote: >> 9.5 Deployment Best Practices >> >> With respect to the observations about the security issues described above, >> a network administrator MUST NOT rely on the

Re: [OPSAWG] TACACS+ information Draft Security Recommendations refactor

2018-07-13 Thread Alan DeKok
On Jul 13, 2018, at 1:00 AM, Douglas Gash (dcmgash) wrote: > 9.5 Deployment Best Practices > > With respect to the observations about the security issues described above, a > network administrator MUST NOT rely on the obfuscation of the TACACS+ > protocol and TACACS+ MUST be deployed over

Re: [OPSAWG] TACACS+ information Draft Security Recommendations refactor

2018-07-12 Thread Douglas Gash (dcmgash)
Dear OPSAWG, Below is a revised version of the recommendations. I have understood the consensus to be, that we should keep the strength of the recommendations, but explain how these should be applies in the real world with many, potentially very old implementations in place. Consequently,

Re: [OPSAWG] TACACS+ information Draft Security Recommendations refactor

2018-07-12 Thread Douglas Gash (dcmgash)
Hi Joe, Thanks for the comments. We will be sending out a new version of the recommendations section today. It actually intends to clarify in the first section how the guidance should be interpreted, which I think should allow our strong recommendations to be kept, as I hope it will answer

Re: [OPSAWG] TACACS+ information Draft Security Recommendations refactor

2018-07-10 Thread Andrej Ota
On 10/07/2018 01:58, Alan DeKok wrote: On Jul 9, 2018, at 5:51 PM, Andrej Ota wrote: Is it worth asking everyone or even expecting anyone to migrate to new-improved-and-still-insecure revision of T+ that requires exactly same amount of operational solutions to secure deployment? Is

Re: [OPSAWG] TACACS+ information Draft Security Recommendations refactor

2018-07-09 Thread Alan DeKok
On Jul 9, 2018, at 5:36 PM, Joe Clarke wrote: > I hear and understand what you're saying. And if this were a net new > protocol, I'd agree with you 100%. But the mandate for this document is > to describe how T+ is implemented today[1]. So... a) we rubber-stamp existing practices and

Re: [OPSAWG] TACACS+ information Draft Security Recommendations refactor

2018-07-09 Thread Blumenthal, Uri - 0553 - MITLL
>> I think that if the WG punts on security, the security area directorate will punt the document back to the WG. And say "fix it". >> >> This isn't about invalidating current implementations. It's about telling people that *new* implementations, or new *releases*, have to be as

Re: [OPSAWG] TACACS+ information Draft Security Recommendations refactor

2018-07-09 Thread Andrej Ota
> On 9 Jul 2018, at 22:11, Alan DeKok wrote: > > On Jul 9, 2018, at 4:54 PM, Joe Clarke wrote: >> Below are some of my comments. They mainly revolve around the strength >> of the normative language with respect to the fact that this draft is >> supported to document the protocol as it is

Re: [OPSAWG] TACACS+ information Draft Security Recommendations refactor

2018-07-09 Thread Joe Clarke
On 7/9/18 17:11, Alan DeKok wrote: > On Jul 9, 2018, at 4:54 PM, Joe Clarke wrote: >> Below are some of my comments. They mainly revolve around the strength >> of the normative language with respect to the fact that this draft is >> supported to document the protocol as it is today. To me, the

Re: [OPSAWG] TACACS+ information Draft Security Recommendations refactor

2018-07-09 Thread Alan DeKok
On Jul 9, 2018, at 4:54 PM, Joe Clarke wrote: > Below are some of my comments. They mainly revolve around the strength > of the normative language with respect to the fact that this draft is > supported to document the protocol as it is today. To me, the security > considerations should reflect

Re: [OPSAWG] TACACS+ information Draft Security Recommendations refactor

2018-07-06 Thread Douglas Gash (dcmgash)
Hi, Below is revised version of the subsection, based upon Alan’s comments, Many thanks. 9.5 TACACS+ Deployment Best Practices In view of the observations about the security issues described above, a network administrator MUST NOT rely on the obfuscation of the TACACS+ protocol and

Re: [OPSAWG] TACACS+ information Draft Security Recommendations refactor

2018-06-28 Thread Douglas Gash (dcmgash)
Hi Alan, Thank you for the response. Please see responses below. On 28/06/2018, 14:22, "Alan DeKok" wrote: On Jun 28, 2018, at 2:03 AM, Douglas Gash (dcmgash) wrote: > > Dear Opsawg, > > The TACACS+ Draft Version 9 contains a security section, the last three

Re: [OPSAWG] TACACS+ information Draft Security Recommendations refactor

2018-06-28 Thread Alan DeKok
On Jun 28, 2018, at 2:03 AM, Douglas Gash (dcmgash) wrote: > > Dear Opsawg, > > The TACACS+ Draft Version 9 contains a security section, the last three > subsections of which are recommendations. There is some overlap and > repetition between sections where the same issues are covered from

[OPSAWG] TACACS+ information Draft Security Recommendations refactor

2018-06-28 Thread Douglas Gash (dcmgash)
Dear Opsawg, The TACACS+ Draft Version 9 contains a security section, the last three subsections of which are recommendations. There is some overlap and repetition between sections where the same issues are covered from different angles, which we believe may lead to ambiguity. So instead we