<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.6 -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-opsawg-mud-acceptable-urls-04" category="bcp" updates="8520" obsoletes="" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.5.0 -->
  <front>
    <title abbrev="mud-acceptable-urls">Authorized update to MUD URLs</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-mud-acceptable-urls-04"/>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <author initials="W." surname="Pan" fullname="Wei Pan">
      <organization>Huawei Technologies</organization>
      <address>
        <email>william.panwei@huawei.com</email>
      </address>
    </author>
    <author initials="E." surname="Lear" fullname="Eliot Lear">
      <organization>Cisco Systems</organization>
      <address>
        <email>lear@cisco.com</email>
      </address>
    </author>
    <date year="2021" month="October" day="06"/>
    <area>Operations</area>
    <workgroup>OPSAWG Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document provides a way for an RFC8520 Manufacturer Usage Description
(MUD) definitions to declare what are acceptable replacement MUD URLs for a device.</t>
      <t>RFCEDITOR-please-remove: this document is being worked on at: https://github.com/mcr/iot-mud-acceptable-urls</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t><xref target="RFC8520" format="default"/> provides a standardized way to describe how a specific purpose
device makes use of Internet resources and associated suggested network behavior.
The behaviors are described in a MUD file hosted in its manufacturer's server.
The device provides a MUD URL to the network manager, which can locate this MUD file
and determine the required network authorization of the device.</t>
      <t>In some cases, e.g., the firmware update, the network behaviors of the device may change,
and the description in the original MUD file will no longer apply.
To solve this problem, there are two common ways which the manufacturer can use.</t>
      <t>One is to change what is in the MUD file, i.e., update the MUD file in place, whenever the behavior of the firmware changes.
<xref target="updatemudfiles" format="default"/> discusses three scenarios for updating the MUD file and the corresponding potential issues.</t>
      <t>The other is to change which MUD file is processed by changing the MUD URL.
<xref target="updatemudurls" format="default"/> describes the common sources of MUD URLs and the problems and threats faced by each type of source when updating the MUD URL.
This document proposes an enhanced mechanism of how to securely update the MUD URL in <xref target="proposedmechanism" format="default"/>.</t>
      <t>There are also some assumptions and prerequisites in this document.</t>
      <t>While MUD files may include signatures, <xref target="RFC8520" format="default"/> does not mandate checking them, and
there is not a clear way to connect the entity which signed the MUD file to the device itself.
This document limits itself to situations in which the MUD file is signed,
and that the MUD controller has been configured to always check the signatures,
rejecting files whose signatures do not match.</t>
      <t><xref target="RFC8520" format="default"/> does not specify how MUD controllers establish their trust in the manufacturers' signing key:
there are many possible solutions from manual configuration of trust anchors,
some kind of automatic configuration during onboarding, but also including to Trust on First Use (TOFU).
How this initial trust is established is not important for this document,
it is sufficient that some satisfactory initial trust is established.</t>
    </section>
    <section anchor="updatemudfiles" numbered="true" toc="default">
      <name>Updating the MUD files in place</name>
      <t>Three scenarios for updating the MUD file and the corresponding potential issues are discussed below.</t>
      <section anchor="adding-capabilities" numbered="true" toc="default">
        <name>Adding capabilities</name>
        <t>For situations where new capabilities are added to the firmware, the MUD file will detail the new access that the new firmware requires.
This may involve new incoming or outgoing connections that should be authorized.
Devices that have been upgraded to the new firmware will make use of the new features.
Devices that have not been upgraded to the new firmware may have new connections that are authorized, but which the device does not use (outgoing connections), or which the device is not prepared to respond to (new incoming connections).</t>
        <t>It is possible that older versions of the firmware have vulnerabilities that were not easily exploitable due to the MUD file preventing particular kinds of access.
For example, an older firmware could have no credentials required (or default credentials) access via telnet on port 23 or HTTP on port 80.
The MUD file protected the device such that it could either not be accessed at all, or access was restricted to connections from a controller only.</t>
        <t>Useful and needed upgrades to the firmware could add credentials to that service, allowing it to be opened up for more general access.
The new MUD file would provide for such access, but when combined with the weak security of the old firmware, it results in a compromised device.</t>
        <t>While there is an argument that old firmware was insecure and should be replaced, it is often the case that the upgrade process involves downtime, or can introduce risks due to needed evaluations not having been completed yet.
As an example: moving vehicles (cars, airplanes, etc.) should not perform upgrades while in motion!
It is probably undesirable to perform any upgrade to an airplane outside of its service facility.
A vehicle owner may desire only to perform software upgrades when they are at their residence.   Should there be a problem, they could make alternate arrangements for transportation.
This is constrasted with the situation when the vehicle is parked at, for instance, a remote cabin.
The situation for upgrades of medical devices has even more considerations involving regulatory compliance.</t>
      </section>
      <section anchor="removing-capabilities" numbered="true" toc="default">
        <name>Removing capabilities</name>
        <t>For situations where existing capabilities prove to be a problem and are to be turned off or removed in subsequent versions of the firmware, the MUD file will be updated to disallow connections that previously were allowed.</t>
        <t>In this case, the new MUD file will forbid some connections, which the old firmware still expects to do.
As explained in the previous section, upgrades may not always occur immediately upon releasing the new firmware.</t>
        <t>In this case, the old device will be performing unwanted connections, and the MUD controller will be alerting the network owner that the device is misbehaving rather than not upgraded.
This causes a false-positive situation (see <xref target="boycrieswolf" format="default"/>), leading to real security issues being ignored.
This is a serious issue as documented also in <xref target="boywolfinfosec" format="default"/>, and <xref target="falsemalware" format="default"/>.</t>
      </section>
      <section anchor="significant-changes-to-protocols" numbered="true" toc="default">
        <name>Significant changes to protocols</name>
        <t><xref target="I-D.ietf-opsawg-mud-tls" format="default"/> suggests MUD definitions to allow examination of TLS protocol details.
Such a profile may be very specific to the TLS library which is shipped in a device.
Changes to the library (including bug fixes) may cause significant changes to
the profile, requiring changes to the profile described in the MUD file.
Such changes are likely neither forward nor backward compatible with other
versions, and in place updates to MUD files are therefore not advised.</t>
      </section>
      <section anchor="motivation-for-updating-mud-urls" numbered="true" toc="default">
        <name>Motivation for updating MUD URLs</name>
        <t>While many small tweaks to a MUD file can be done in place, the situation
described above, particularly when it comes to removing capabilities will
suggest that changes to the MUD URL are in order.
A strategy for doing this securely is needed, and the rest of this document
provides a mechanism to do this securely.</t>
      </section>
    </section>
    <section anchor="updatemudurls" numbered="true" toc="default">
      <name>Updating the MUD URLs</name>
      <t>MUD URLs can come from a number of sources:</t>
      <ul spacing="normal">
        <li>IDevID Extensions</li>
        <li>DHCP option</li>
        <li>LLDP TLV</li>
        <li>
          <xref target="I-D.richardson-mud-qrcode" format="default"/> proposes to scan them from QRcodes.</li>
      </ul>
      <t>The IDevID mechanism provides a URL that is asserted cryptographically by a manufacturer.
However, it is difficult for manufacturers to update the IDevID of a device which is already in a box.</t>
      <t>The DHCP and LLDP mechanisms are not signed, but are asserted by the device.
A firmware update may update what MUD URL is emitted.
Sufficiently well targeted malware would also be able to change the MUD URL that is emitted.</t>
      <t>The QRcode mechanism is usually done via paper/stickers, and is typically not under the control of the device itself at all.
However, being applied by a human and not easily changed, a MUD URL obtained in this fashion is likely trustworthy.
(It may not, due to mixups in labeling represent the correct device, but this is a human coordination issue, and is out of scope for this document.)</t>
      <t>The manufacturer can use all the four mechanisms above when manufacturing the device.
But when considering updating the firmware, it seems like only the DHCP and LLDP mechanisms
are sufficiently easy to send the new MUD URL.
Because of that sensitivity, they may also be easily changed by malware!</t>
      <t>There are mitigating mechanisms which may be enough to deal with this problem when MUD
files are signed by the manufacturer.</t>
      <t>While <xref target="RFC8520" format="default"/> has established a mechanism for signing of MUD files, the document does not define a way for a MUD controller to determine who should sign the MUD file for a particular device.</t>
      <t><xref target="RFC8520" format="default"/> leaves this for a local policy.
There are a number of processes that could be used, but they require coordination of many players.
It is expected that each industrial vertical will work out supply chain arrangements or other heuristics.</t>
      <section anchor="leveraging-the-manufacturer-signature" numbered="true" toc="default">
        <name>Leveraging the manufacturer signature</name>
        <t>When the first time a signature of the MUD file related to a particular device-type
is verified by the MUD controller, the identity of the signing authority is recorded.
That it, the signing authorith is pinned.
This policy means that subsequent MUD files must be signed by the same entity in order to be accepted.</t>
        <t>The trust and acceptance of the first signer may come from many sources,
for example, it could be manual configured to trust which signer,
or using the IDevID mechanism for the first MUD URL and the signer of the corresponding MUD file is more trustworthy,
or the MUD controller can use a Trust on First Use (TOFU) mechanism and trusts the first signer by default.</t>
        <t>Based upon this process, an update to the MUD URL would be valid if the new
MUD file was signed by the same entity that signed the previous entry.
This mechanism permits a replacement URL to be any URL that the same
manufacturer can provide.</t>
      </section>
      <section anchor="concerns-about-same-signer-mechanism" numbered="true" toc="default">
        <name>Concerns about same-signer mechanism</name>
        <t>There is still a potential threat: a manufacturer which has many products may
have a MUD definition for another product that has the privileges that the
malware desires.</t>
        <t>The malware could simply change the expressed MUD URL to that of the other product, and it will be accepted by the MUD controller as valid.</t>
        <t>This works as long as manufacturers use a single key to sign all products.
Some manufacturers could sign each product with a different key.
Going logically down this path, if all these product keys are collected into a single PKI, signed by a common certification authority.</t>
        <t>In this case, the question then becomes whether the MUD controller should pin the End-Entity (EE) certificate, or the CA certificate.</t>
        <t>Pinning the End-Entity (EE) certificate defends against malware that changes the product type, but prevents the manufacturer from being able to cycle the validity of the End-Entity certificate for cryptographic hygiene reasons.</t>
        <t>Pinning the CA certificate allows the EE certificate to change, but may not defend against product type changes.</t>
        <t>It is possible to invent policy mechanisms that would link the EE certificate to a value that is in the MUD file.
This could be a policy OID, or could involve some content in a subjectAltName.
Future work could go in this direction.
This document proposes a simpler solution.</t>
      </section>
    </section>
    <section anchor="proposedmechanism" numbered="true" toc="default">
      <name>Proposed mechanism</name>
      <t>The document proposes to limit what MUD URLs are considered valid from the device, limiting new MUD URLs to be variations of the initial (presumed to be secure) URL.</t>
      <t>The first MUD file which is defined for a device can come from an IDevID (which is considered more secure),
or via Trust on First Use with DHCP or LLDP or other mechanisms. This first, initially trusted, MUD file will be called the "root" MUD file.</t>
      <t>A MUD file contains a self-referential MUD-URL attribute that points to
the MUD file itself located on the vendor's website.
While the IDevID, DHCP and LLDP mechanisms only transmit a URL, there are
some newer, not yet standardized proposals that would fetch an entire MUD
file from the device, such as <xref target="I-D.jimenez-t2trg-mud-coap" format="default"/>.</t>
      <t>The MUD-URL MUST always be an Absolute URI: see <xref target="RFC3986" format="default"/> section 4.3.</t>
      <t>The URL found in the MUD-URL attribute is to be called the canonical MUD URL for the device.</t>
      <t>The MUD-SIGNATURE attribute in the MUD file SHOULD be a relative URI (see <xref target="RFC3986" format="default"/> section 4.2) with the (hierarchical) base URI for this reference being the MUD-URL attribute.</t>
      <t>When pinning the signature, the MUD controller SHOULD pin the lowest Certification Authority (CA) that was used in the validation of the CMS structure, along with the chain of Subject Names leading to the signature.
The MUD controller may need additional trust anchors (including previously pinned ones) in order to verify that CA certificate.</t>
      <t>Subsequent MUD files are considered valid if:</t>
      <ul spacing="normal">
        <li>they have the same initial Base-URI as the MUD-URL, but may have a different final part</li>
        <li>they are signed by an equivalent End Entity (same trusted CA and same Subject Name) as the "root" MUD file.</li>
      </ul>
      <t>Section 5.2 of <xref target="RFC3986" format="default"/> details many cases for calculating the Base-URI.
The test is simplified to: remove everything to the right of the last (rightmost) "/" in the URL of "root" MUD  file URL, and the proposed new URL.
The resulting two strings MUST be identical.</t>
      <t>For a simple example, if the "root" MUD-URL is http://example.com/hello/there/file.json then
any URL that starts with http://example.com/hello/there/ would be acceptable, such as
http://example.com/hello/there/revision2.json.</t>
      <t>Once the new MUD file is accepted, then it becomes the new "root" MUD file, and
any subsequent updates MUST be relative to the MUD-URL in the new file.</t>
      <section anchor="merger-acquisitions-and-key-changes" numbered="true" toc="default">
        <name>Merger, Acquisitions and Key Changes</name>
        <t>The above process allows for a manufacturer to rework its file structure.
They can change web server host names, so long as they retain the old structure long enough for  all devices to upgrade at least once.</t>
        <t>The process also allows a manufacturer to change the EE certificate and Certification Authority used for signing.</t>
        <section anchor="changing-file-structure" numbered="true" toc="default">
          <name>Changing file structure</name>
          <t>A manufacturer has been hosting a MUD file at https://example.com/household/products/mudfiles/toaster.json
and wishes to move it to https://example.com/mudfiles/toasters/model1945/mud.json</t>
          <t>The manufacturer simply changes the MUD-URL contained with the files at the old location to have a value of https://example.com/mudfiles/toasters/model1945/mud.json.
The manufacturer must continue to serve the files from the old location for some time, or to return an HTTP 301 (Moved Permanently) redirecting to the new location.</t>
        </section>
        <section anchor="changing-hosting-urls" numbered="true" toc="default">
          <name>Changing hosting URLs</name>
          <t>A manufacturer has been hosting a MUD file at https://example.com/household/products/mudfiles/toaster.json
and wishes to move it to https://mud.example/example.com/toasters/model1945/mud.json</t>
          <t>The manufacturer simply changes the MUD-URL contained with the files at the old location to have a value of https://example.com/mudfiles/toasters/model1945/mud.json.
The manufacturer has to continue to host at the old location until such time as it is sure that all MUD controllers have loaded the new data, and that all devices in the field have upgraded their URL.
A 301 Redirect that changed the hostname SHOULD NOT be accepted by MUD controllers.</t>
        </section>
        <section anchor="changing-signing-authority" numbered="true" toc="default">
          <name>Changing Signing Authority</name>
          <t>A manufacturer has been signing MUD files using an EE Certificate with subjectAltName foo.example, issued by an internal Certification Authority BAZ.</t>
          <t>The manufacturer wishes to begin signing with an EE Certificate with subjectAltname foo.example, but now signed by a public CA (call it: Fluffy).</t>
          <t>The manufacturer first creates a new MUD file with a new detached signature file.
Within this signature file, the manufacturer places a certificate chain: Internal-CA BAZ-&gt;Fluffy,
and then the Fluffy Certificate, and then the foo.example certificate issued from Fluffy.</t>
          <t>This supports changing certification authorities, but it does not support changing the Subject Name of the signing entity.</t>
        </section>
      </section>
    </section>
    <section anchor="polling-for-changes-in-mud-files" numbered="true" toc="default">
      <name>Polling for changes in MUD files</name>
      <t>The MUD file update mechanisms described in <xref target="updatemudfiles" format="default"/> requires that the MUD controller poll for updates.
The MUD controller will receive no signal about a change from the device because the URL will not have changed.</t>
      <t>The manufacturer SHOULD serve mud files from a source for which ETag <xref section="2.3" sectionFormat="of" target="RFC7232" format="default"/> may be generated.
Static files on disk satisfy this requirement.
MUD files generated from a database process might not.
The use of ETag allows a MUD controller to more efficiently poll for changes in the file.</t>
      <t>A manufacturer should also serve MUD files with an HTTP Max-Age header as per <xref section="5.2.2.8" sectionFormat="of" target="RFC7234" format="default"/>.</t>
      <t>The MUD controller should take the Max-Age as an indication of when to next poll for updates to the MUD file.
Values of less than 1 hour, or more than 1 month should be considered out of range, and clamped into the range (1 hour, 1 month).</t>
      <t>MUD controllers SHOULD add some random jitter to the timing of their requests.
MUD controllers MAY use a single HTTP(S)/1.1 connection to retrieve all resources at the same destination.</t>
    </section>
    <section anchor="privacy-considerations" numbered="true" toc="default">
      <name>Privacy Considerations</name>
      <t>The MUD URL contains sensitive model and even firmware revision numbers.
Thus the MUD URL identifies the make, model and revision of a device.</t>
      <t><xref target="RFC8520" format="default"/> already identifies this privacy concern, and suggests use of TLS so that the HTTP requests that retrieve the MUD file do not divulge that level of detail.</t>
      <t>The requirement for the MUD controller to poll for changes results in multiple interactions between the MUD controller and the manufacturer.
Even if HTTPS used, an observer of the traffic to that manufacturer will be revealing, and <xref target="RFC8520" format="default"/> goes on to suggest use of a proxy as well.</t>
    </section>
    <section anchor="security-considerations" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>Prior to the standardization of the process in this document, if a device was infiltrated by malware, and said malware wished to make accesses beyond what the current MUD file allowed, the the malware would have to:</t>
      <ol spacing="normal" type="1"><li>arrange for an equivalent MUD file to be visible somewhere on the Internet</li>
        <li>depend upon the MUD controller either not checking signatures, or</li>
        <li>somehow get the manufacturer to sign the alternate MUD</li>
        <li>announce this new URL via DHCP or LLDP, updating the MUD controller with the new permissions.</li>
      </ol>
      <t>One way to accomplish (3) is to leverage the existence of MUD files created by the manufacturer for different classes of devices.
Such files would already be signed by the same manufacturer, eliminating the need to spoof a signature.</t>
      <t>With the standardization of the process in this document, then the attacker can no longer point to arbitrary MUD files in step 4, but can only make use of MUD files that the manufacturer has already provided for this device.</t>
      <t>Manufacturers are advised to maintain an orderly layout of MUD files in their web servers,
with each unique product having its own directory/pathname.</t>
      <t>The process described updates only MUD controllers and the processes that manufacturers use to manage the location of their MUD files.</t>
      <t>A manufacturer which has not managed their MUD files in the the way described here can deploy new directories of per-product MUD files, and then can update the existing MUD files in place to point to the new URLs
using the MUD-URL attribute.</t>
      <t>There is therefore no significant flag day: MUD controllers may implement the new policy without significant concern about backwards compatibility.</t>
      <section anchor="updating-files-vs-updating-mud-urls" numbered="true" toc="default">
        <name>Updating files vs Updating MUD URLs</name>
        <t>Device developers need to consider whether to make a change by updating a MUD file, or updating the MUD URL.</t>
        <t>MUD URLs can only be updated by shipping a new firmware.
It is reasonable to update the MUD URL whenever a new firmware release causes new connectivity to be required.
The updated mechanism defined in this document makes this a secure operation, and there is no practical limitation on the number of files that a web server can hold.</t>
        <t>In place updates to a MUD file should be restricted to cases where it turns out that the description was inaccurate: a missing connection, an inadvertent one authorized, or just incorrect information.</t>
        <t>Developers should be aware that many enterprise web sites use outsourced content distribution networks, and MUD controllers are likely to cache files for some time.
Changes to MUD files will take some time to propagate through the various caches.
An updated MUD URL will however, not experience any cache issues, but can not be deployed with a firmware update.</t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC3986" target="https://www.rfc-editor.org/info/rfc3986" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.3986.xml">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author initials="T." surname="Berners-Lee" fullname="T. Berners-Lee">
              <organization/>
            </author>
            <author initials="R." surname="Fielding" fullname="R. Fielding">
              <organization/>
            </author>
            <author initials="L." surname="Masinter" fullname="L. Masinter">
              <organization/>
            </author>
            <date year="2005" month="January"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource.  This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet.  The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier.  This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC8520" target="https://www.rfc-editor.org/info/rfc8520" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8520.xml">
          <front>
            <title>Manufacturer Usage Description Specification</title>
            <author initials="E." surname="Lear" fullname="E. Lear">
              <organization/>
            </author>
            <author initials="R." surname="Droms" fullname="R. Droms">
              <organization/>
            </author>
            <author initials="D." surname="Romascanu" fullname="D. Romascanu">
              <organization/>
            </author>
            <date year="2019" month="March"/>
            <abstract>
              <t>This memo specifies a component-based architecture for Manufacturer Usage Descriptions (MUDs).  The goal of MUD is to provide a means for end devices to signal to the network what sort of access and network functionality they require to properly function.  The initial focus is on access control.  Later work can delve into other aspects.</t>
              <t>This memo specifies two YANG modules, IPv4 and IPv6 DHCP options, a Link Layer Discovery Protocol (LLDP) TLV, a URL, an X.509 certificate extension, and a means to sign and verify the descriptions.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8520"/>
          <seriesInfo name="DOI" value="10.17487/RFC8520"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="I-D.ietf-opsawg-mud-tls" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-opsawg-mud-tls.xml" target="https://www.ietf.org/archive/id/draft-ietf-opsawg-mud-tls-05.txt">
          <front>
            <title>Manufacturer Usage Description (MUD) (D)TLS Profiles for IoT Devices</title>
            <author fullname="Tirumaleswar Reddy">
              <organization>McAfee, Inc.</organization>
            </author>
            <author fullname="Dan Wing">
              <organization>Citrix Systems, Inc.</organization>
            </author>
            <author fullname="Blake Anderson">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <date month="July" day="27" year="2021"/>
            <abstract>
              <t>   This memo extends the Manufacturer Usage Description (MUD)
   specification to incorporate (D)TLS profile parameters.  This allows
   a network security service to identify unexpected (D)TLS usage, which
   can indicate the presence of unauthorized software or malware on an
   endpoint.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-mud-tls-05"/>
        </reference>
        <reference anchor="I-D.richardson-mud-qrcode" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.richardson-mud-qrcode.xml" target="https://www.ietf.org/archive/id/draft-richardson-mud-qrcode-01.txt">
          <front>
            <title>On loading MUD URLs from QR codes</title>
            <author fullname="Michael Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Jacques Latour">
              <organization>CIRA Labs</organization>
            </author>
            <author fullname="Hassan Habibi Gharakheili">
              <organization>UNSW Sydney</organization>
            </author>
            <date month="May" day="15" year="2021"/>
            <abstract>
              <t>   This informational document details a protocol to load MUD
   definitions for devices which have no integrated MUD (RFC8520)
   support.

   This document is published to inform the Internet community of this
   mechanism to allow interoperability and to serve as a basis of other
   standards work if there is interest.

   RFCEDITOR please remove: Pull requests and edit welcome at:

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-richardson-mud-qrcode-01"/>
        </reference>
        <reference anchor="RFC7232" target="https://www.rfc-editor.org/info/rfc7232" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7232.xml">
          <front>
            <title>Hypertext Transfer Protocol (HTTP/1.1): Conditional Requests</title>
            <author initials="R." surname="Fielding" fullname="R. Fielding" role="editor">
              <organization/>
            </author>
            <author initials="J." surname="Reschke" fullname="J. Reschke" role="editor">
              <organization/>
            </author>
            <date year="2014" month="June"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application- level protocol for distributed, collaborative, hypertext information systems.  This document defines HTTP/1.1 conditional requests, including metadata header fields for indicating state changes, request header fields for making preconditions on such state, and rules for constructing the responses to a conditional request when one or more preconditions evaluate to false.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7232"/>
          <seriesInfo name="DOI" value="10.17487/RFC7232"/>
        </reference>
        <reference anchor="RFC7234" target="https://www.rfc-editor.org/info/rfc7234" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7234.xml">
          <front>
            <title>Hypertext Transfer Protocol (HTTP/1.1): Caching</title>
            <author initials="R." surname="Fielding" fullname="R. Fielding" role="editor">
              <organization/>
            </author>
            <author initials="M." surname="Nottingham" fullname="M. Nottingham" role="editor">
              <organization/>
            </author>
            <author initials="J." surname="Reschke" fullname="J. Reschke" role="editor">
              <organization/>
            </author>
            <date year="2014" month="June"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless \%application- level protocol for distributed, collaborative, hypertext information systems.  This document defines HTTP caches and the associated header fields that control cache behavior or indicate cacheable response messages.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7234"/>
          <seriesInfo name="DOI" value="10.17487/RFC7234"/>
        </reference>
        <reference anchor="boycrieswolf" target="https://fablesofaesop.com/the-boy-who-cried-wolf.html">
          <front>
            <title>The Boy Who Cried Wolf</title>
            <author>
              <organization/>
            </author>
            <date year="2020" month="January" day="18"/>
          </front>
        </reference>
        <reference anchor="boywolfinfosec" target="https://www.infosecurity-magazine.com/opinions/security-alerts-boy-cried-wolf/">
          <front>
            <title>Security Alerts - A Case of the Boy Who Cried Wolf?</title>
            <author>
              <organization/>
            </author>
            <date year="2020" month="January" day="18"/>
          </front>
        </reference>
        <reference anchor="falsemalware" target="https://www.scmagazine.com/home/security-news/false-malware-alerts-cost-organizations-1-27m-annually-report-says/ and http://go.cyphort.com/Ponemon-Report-Page.html">
          <front>
            <title>False malware alerts cost organizations $1.27M annually, report says</title>
            <author>
              <organization/>
            </author>
            <date year="2020" month="January" day="18"/>
          </front>
        </reference>
        <reference anchor="I-D.jimenez-t2trg-mud-coap" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.jimenez-t2trg-mud-coap.xml" target="https://www.ietf.org/archive/id/draft-jimenez-t2trg-mud-coap-00.txt">
          <front>
            <title>Using MUD on CoAP environments</title>
            <author fullname="Jaime Jimenez">
              <organization>Ericsson</organization>
            </author>
            <date month="March" day="9" year="2020"/>
            <abstract>
              <t>   This document provides some guidelines on how to add Manufacturer
   Usage Descriptions (MUD) to CoAP environments.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-jimenez-t2trg-mud-coap-00"/>
        </reference>
      </references>
    </references>
    <section anchor="appendices" numbered="true" toc="default">
      <name>Appendices</name>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="J." surname="Yang" fullname="Jie Yang">
        <organization/>
        <address>
          <email>jay.yang@huawei.com</email>
        </address>
      </contact>
      <contact initials="T." surname="Tang" fullname="Tianqing Tang">
        <organization/>
        <address>
          <email>tangtianqing@huawei.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
