<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.6.4 (Ruby 2.6.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-opsawg-mud-acceptable-urls-08" category="std" consensus="true" updates="8520" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.3 -->
  <front>
    <title abbrev="mud-acceptable-urls">Authorized update to MUD URLs</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-mud-acceptable-urls-08"/>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <author initials="W." surname="Pan" fullname="Wei Pan">
      <organization>Huawei Technologies</organization>
      <address>
        <email>william.panwei@huawei.com</email>
      </address>
    </author>
    <author initials="E." surname="Lear" fullname="Eliot Lear">
      <organization>Cisco Systems</organization>
      <address>
        <email>lear@cisco.com</email>
      </address>
    </author>
    <date year="2024" month="January" day="03"/>
    <area>Operations</area>
    <workgroup>OPSAWG Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document provides a way for an RFC8520 Manufacturer Usage Description
(MUD) definitions to declare what are acceptable replacement MUD URLs for a device.</t>
      <t>RFCEDITOR-please-remove: this document is being worked on at: https://github.com/mcr/iot-mud-acceptable-urls</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="RFC8520"/> provides a standardized way to describe how a specific purpose
device makes use of Internet resources and associated suggested network behavior.
The behaviors are described in a MUD file hosted in its manufacturer's server.
The device provides a MUD URL to the network manager, which can locate this MUD file
and determine the required network authorization of the device.</t>
      <t>In some cases, e.g., the firmware update, the network behaviors of the device may change,
and the description in the original MUD file will no longer apply.
To solve this problem, there are two common ways which the manufacturer can use.</t>
      <t>One is to change what is in the MUD file, i.e., update the MUD file in place, whenever the behavior of the firmware changes.
<xref target="updatemudfiles"/> discusses three scenarios for updating the MUD file and the corresponding potential issues.</t>
      <t>The other is to change which MUD file is processed by changing the MUD URL.
<xref target="updatemudurls"/> describes the common sources of MUD URLs and the problems and threats faced by each type of source when updating the MUD URL.
This document proposes an enhanced mechanism of how to securely update the MUD URL in <xref target="proposedmechanism"/>.</t>
      <t>There are also some assumptions and prerequisites in this document.</t>
      <t>While MUD files may include signatures, <xref target="RFC8520"/> does not mandate checking them, and
there is not a clear way to connect the entity which signed the MUD file to the device itself.
This document limits itself to situations in which the MUD file is signed,
and that the MUD controller has been configured to always check the signatures,
rejecting files whose signatures do not match.</t>
      <t><xref target="RFC8520"/> does not specify how MUD controllers establish their trust in the manufacturers' signing key:
there are many possible solutions from manual configuration of trust anchors,
some kind of automatic configuration during onboarding, but also including to Trust on First Use (TOFU).
How this initial trust is established is not important for this document,
it is sufficient that some satisfactory initial trust is established.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="updatemudfiles">
      <name>Updating the MUD files in place</name>
      <t>Three scenarios for updating the MUD file and the corresponding potential issues are discussed below.</t>
      <section anchor="adding-capabilities">
        <name>Adding capabilities</name>
        <t>For situations where new capabilities are added to the firmware, the MUD file will detail the new access that the new firmware requires.
This may involve new incoming or outgoing connections that should be authorized.
Devices that have been upgraded to the new firmware will make use of the new features.
Devices that have not been upgraded to the new firmware may have new connections that are authorized, but which the device does not use (outgoing connections), or which the device is not prepared to respond to (new incoming connections).</t>
        <t>It is possible that older versions of the firmware have vulnerabilities that were not easily exploitable due to the MUD file preventing particular kinds of access.
For example, an older firmware could have no credentials required (or default credentials) access via telnet on port 23 or HTTP on port 80.
The MUD file protected the device such that it could either not be accessed at all, or access was restricted to connections from a controller only.</t>
        <t>Useful and needed upgrades to the firmware could add credentials to that service, allowing it to be opened up for more general access.
The new MUD file would provide for such access, but when combined with the weak security of the old firmware, it results in a compromised device.</t>
        <t>While there is an argument that old firmware was insecure and should be replaced, it is often the case that the upgrade process involves downtime, or can introduce risks due to needed evaluations not having been completed yet.
As an example: moving vehicles (cars, airplanes, etc.) should not perform upgrades while in motion!
It is probably undesirable to perform any upgrade to an airplane outside of its service facility.
A vehicle owner may desire only to perform software upgrades when they are at their residence.   Should there be a problem, they could make alternate arrangements for transportation.
This is constrasted with the situation when the vehicle is parked at, for instance, a remote cabin.
The situation for upgrades of medical devices has even more considerations involving regulatory compliance.</t>
      </section>
      <section anchor="removing-capabilities">
        <name>Removing capabilities</name>
        <t>For situations where existing capabilities prove to be a problem and are to be turned off or removed in subsequent versions of the firmware, the MUD file will be updated to disallow connections that previously were allowed.</t>
        <t>In this case, the new MUD file will forbid some connections, which the old firmware still expects to do.
As explained in the previous section, upgrades may not always occur immediately upon releasing the new firmware.</t>
        <t>In this case, the old device will be performing unwanted connections, and the MUD controller will be alerting the network owner that the device is misbehaving rather than not upgraded.
This causes a false-positive situation (see <xref target="boycrieswolf"/>), leading to real security issues being ignored.
This is a serious issue as documented also in <xref target="boywolfinfosec"/>, and <xref target="falsemalware"/>.</t>
      </section>
      <section anchor="significant-changes-to-protocols">
        <name>Significant changes to protocols</name>
        <t><xref target="I-D.ietf-opsawg-mud-tls"/> suggests MUD definitions to allow examination of TLS protocol details.
Such a profile may be very specific to the TLS library which is shipped in a device.
Changes to the library (including bug fixes) may cause significant changes to
the profile, requiring changes to the profile described in the MUD file.
Such changes are likely neither forward nor backward compatible with other
versions, and in place updates to MUD files are therefore not advised.</t>
      </section>
      <section anchor="motivation-for-updating-mud-urls">
        <name>Motivation for updating MUD URLs</name>
        <t>While many small tweaks to a MUD file can be done in place, the situation
described above, particularly when it comes to removing capabilities will
suggest that changes to the MUD URL are in order.
A strategy for doing this securely is needed, and the rest of this document
provides a mechanism to do this securely.</t>
      </section>
    </section>
    <section anchor="updatemudurls">
      <name>Updating the MUD URLs</name>
      <t>MUD URLs can come from a number of sources:</t>
      <ul spacing="normal">
        <li>IDevID Extensions</li>
        <li>DHCP option</li>
        <li>LLDP TLV</li>
        <li>
          <xref target="I-D.richardson-mud-qrcode"/> proposes to scan them from QRcodes.</li>
      </ul>
      <t>The IDevID mechanism provides a URL that is asserted cryptographically by a manufacturer.
However, it is difficult for manufacturers to update the IDevID of a device which is already in a box.</t>
      <t>The DHCP and LLDP mechanisms are not signed, but are asserted by the device.
A firmware update may update what MUD URL is emitted.
Sufficiently well targeted malware would also be able to change the MUD URL that is emitted.</t>
      <t>The QRcode mechanism is usually done via paper/stickers, and is typically not under the control of the device itself at all.
However, being applied by a human and not easily changed, a MUD URL obtained in this fashion is likely trustworthy.
(It may not, due to mixups in labeling represent the correct device, but this is a human coordination issue, and is out of scope for this document.)</t>
      <t>The manufacturer can use all the four mechanisms above when manufacturing the device.
But when considering updating the firmware, it seems like only the DHCP and LLDP mechanisms
are sufficiently easy to send the new MUD URL.
Because of that sensitivity, they may also be easily changed by malware!</t>
      <t>There are mitigating mechanisms which may be enough to deal with this problem when MUD
files are signed by the manufacturer.</t>
      <t>While <xref target="RFC8520"/> has established a mechanism for signing of MUD files, the document does not define a way for a MUD controller to determine who should sign the MUD file for a particular device.</t>
      <t><xref target="RFC8520"/> leaves this for a local policy.
There are a number of processes that could be used, but they require coordination of many players.
It is expected that each industrial vertical will work out supply chain arrangements or other heuristics.</t>
      <section anchor="leveraging-the-manufacturer-signature">
        <name>Leveraging the manufacturer signature</name>
        <t>When the first time a signature of the MUD file related to a particular device-type
is verified by the MUD controller, the identity of the signing authority is recorded.
That it, the signing authority is pinned.
This policy means that subsequent MUD files must be signed by the same entity in order to be accepted.</t>
        <t>The trust and acceptance of the first signer may come from many sources,
for example, it could be manual configured to trust which signer,
or using the IDevID mechanism for the first MUD URL and the signer of the corresponding MUD file is more trustworthy,
or the MUD controller can use a Trust on First Use (TOFU) mechanism and trusts the first signer by default.</t>
        <t>Based upon this process, an update to the MUD URL would be valid if the new
MUD file was signed by the same entity that signed the previous entry.
This mechanism permits a replacement URL to be any URL that the same
manufacturer can provide.</t>
      </section>
      <section anchor="concerns-about-same-signer-mechanism">
        <name>Concerns about same-signer mechanism</name>
        <t>There is still a potential threat: a manufacturer which has many products may
have a MUD definition for another product that has the privileges that the
malware desires.</t>
        <t>The malware could simply change the expressed MUD URL to that of the other product, and it will be accepted by the MUD controller as valid.</t>
        <t>This works as long as manufacturers use a single key to sign all products.
Some manufacturers could sign each product with a different key.
Going logically down this path, if all these product keys are collected into a single PKI, signed by a common certification authority.</t>
        <t>In this case, the question then becomes whether the MUD controller should pin the End-Entity (EE) certificate, or the CA certificate.</t>
        <t>Pinning the End-Entity (EE) certificate defends against malware that changes the product type, but prevents the manufacturer from being able to cycle the validity of the End-Entity certificate for cryptographic hygiene reasons.</t>
        <t>Pinning the CA certificate allows the EE certificate to change, but may not defend against product type changes.</t>
        <t>It is possible to invent policy mechanisms that would link the EE certificate to a value that is in the MUD file.
This could be a policy OID, or could involve some content in a subjectAltName.
Future work could go in this direction.
This document proposes a simpler solution.</t>
      </section>
    </section>
    <section anchor="proposedmechanism">
      <name>Proposed mechanism</name>
      <t>The document proposes to limit what MUD URLs are considered valid from the device, limiting new MUD URLs to be variations of the initial (presumed to be secure) URL.</t>
      <t>The first MUD file which is defined for a device can come from an IDevID (which is considered more secure),
or via Trust on First Use with DHCP or LLDP or other mechanisms. This first, initially trusted, MUD file will be called the "root" MUD file.</t>
      <t>A MUD file contains a self-referential MUD-URL attribute that points to
the MUD file itself located on the vendor's website.
While the IDevID, DHCP and LLDP mechanisms only transmit a URL, there are
some newer, not yet standardized proposals that would fetch an entire MUD
file from the device, such as <xref target="I-D.jimenez-t2trg-mud-coap"/>.</t>
      <t>The MUD-URL MUST always be an Absolute URI: see <xref target="RFC3986"/> section 4.3.</t>
      <t>The URL found in the MUD-URL attribute is to be called the canonical MUD URL for the device.</t>
      <t>The MUD-SIGNATURE attribute in the MUD file SHOULD be a relative URI (see <xref target="RFC3986"/> section 4.2) with the (hierarchical) base URI for this reference being the MUD-URL attribute.</t>
      <t>When pinning the signature, the MUD controller SHOULD pin the lowest Certification Authority (CA) that was used in the validation of the CMS structure, along with the chain of Subject Names leading to the signature.
The MUD controller may need additional trust anchors (including previously pinned ones) in order to verify that CA certificate.</t>
      <t>Subsequent MUD files are considered valid if:</t>
      <ul spacing="normal">
        <li>they have the same initial Base-URI as the MUD-URL, but may have a different final part</li>
        <li>they are signed by an equivalent End Entity (same trusted CA and same Subject Name) as the "root" MUD file.</li>
      </ul>
      <t>Section 5.2 of <xref target="RFC3986"/> details many cases for calculating the Base-URI.
The test is simplified to: remove everything to the right of the last (rightmost) "/" in the URL of "root" MUD  file URL, and the proposed new URL.
The resulting two strings MUST be identical.</t>
      <t>For a simple example, if the "root" MUD-URL is http://example.com/hello/there/file.json then
any URL that starts with http://example.com/hello/there/ would be acceptable, such as
http://example.com/hello/there/revision2.json.</t>
      <t>Once the new MUD file is accepted, then it becomes the new "root" MUD file, and
any subsequent updates MUST be relative to the MUD-URL in the new file.</t>
      <section anchor="merger-acquisitions-and-key-changes">
        <name>Merger, Acquisitions and Key Changes</name>
        <t>The above process allows for a manufacturer to rework its file structure.
They can change web server host names, so long as they retain the old structure long enough for  all devices to upgrade at least once.</t>
        <t>The process also allows a manufacturer to change the EE certificate and Certification Authority used for signing.</t>
        <section anchor="changing-file-structure">
          <name>Changing file structure</name>
          <t>A manufacturer has been hosting a MUD file at https://example.com/household/products/mudfiles/toaster.json
and wishes to move it to https://example.com/mudfiles/toasters/model1945/mud.json</t>
          <t>The manufacturer simply changes the MUD-URL contained with the files at the old location to have a value of https://example.com/mudfiles/toasters/model1945/mud.json.
The manufacturer must continue to serve the files from the old location for some time, or to return an HTTP 301 (Moved Permanently) redirecting to the new location.</t>
        </section>
        <section anchor="changing-hosting-urls">
          <name>Changing hosting URLs</name>
          <t>A manufacturer has been hosting a MUD file at https://example.com/household/products/mudfiles/toaster.json
and wishes to move it to https://mud.example/example.com/toasters/model1945/mud.json</t>
          <t>The manufacturer simply changes the MUD-URL contained with the files at the old location to have a value of https://example.com/mudfiles/toasters/model1945/mud.json.
The manufacturer has to continue to host at the old location until such time as it is sure that all MUD controllers have loaded the new data, and that all devices in the field have upgraded their URL.
A 301 Redirect that changed the hostname SHOULD NOT be accepted by MUD controllers.</t>
        </section>
        <section anchor="changing-signing-authority">
          <name>Changing Signing Authority</name>
          <t>A manufacturer has been signing MUD files using an EE Certificate with subjectAltName foo.example, issued by an internal Certification Authority BAZ.</t>
          <t>The manufacturer wishes to begin signing with an EE Certificate with subjectAltname foo.example, but now signed by a public CA (call it: Fluffy).</t>
          <t>The manufacturer first creates a new MUD file with a new detached signature file.
Within this signature file, the manufacturer places a certificate chain: Internal-CA BAZ-&gt;Fluffy,
and then the Fluffy Certificate, and then the foo.example certificate issued from Fluffy.</t>
          <t>This supports changing certification authorities, but it does not support changing the Subject Name of the signing entity.</t>
        </section>
      </section>
    </section>
    <section anchor="polling-for-changes-in-mud-files">
      <name>Polling for changes in MUD files</name>
      <t>The MUD file update mechanisms described in <xref target="updatemudfiles"/> requires that the MUD controller poll for updates.
The MUD controller will receive no signal about a change from the device because the URL will not have changed.</t>
      <t>The manufacturer SHOULD serve mud files from a source for which ETag <xref section="2.3" sectionFormat="of" target="RFC7232"/> may be generated.
Static files on disk satisfy this requirement.
MUD files generated from a database process might not.
The use of ETag allows a MUD controller to more efficiently poll for changes in the file.</t>
      <t>A manufacturer should also serve MUD files with an HTTP Max-Age header as per <xref section="5.2.2.8" sectionFormat="of" target="RFC7234"/>.</t>
      <t>The MUD controller should take the Max-Age as an indication of when to next poll for updates to the MUD file.
Values of less than 1 hour, or more than 1 month should be considered out of range, and clamped into the range (1 hour, 1 month).</t>
      <t>MUD controllers SHOULD add some random jitter to the timing of their requests.
MUD controllers MAY use a single HTTP(S)/1.1 connection to retrieve all resources at the same destination.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>The MUD URL contains sensitive model and even firmware revision numbers.
Thus the MUD URL identifies the make, model and revision of a device.</t>
      <t><xref target="RFC8520"/> already identifies this privacy concern, and suggests use of TLS so that the HTTP requests that retrieve the MUD file do not divulge that level of detail.</t>
      <t>The requirement for the MUD controller to poll for changes results in multiple interactions between the MUD controller and the manufacturer.
Even if HTTPS used, an observer of the traffic to that manufacturer will be revealing, and <xref target="RFC8520"/> goes on to suggest use of a proxy as well.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Prior to the standardization of the process in this document, if a device was infiltrated by malware, and said malware wished to make accesses beyond what the current MUD file allowed, the the malware would have to:</t>
      <ol spacing="normal" type="1"><li>arrange for an equivalent MUD file to be visible somewhere on the Internet</li>
        <li>depend upon the MUD controller either not checking signatures, or</li>
        <li>somehow get the manufacturer to sign the alternate MUD</li>
        <li>announce this new URL via DHCP or LLDP, updating the MUD controller with the new permissions.</li>
      </ol>
      <t>One way to accomplish (3) is to leverage the existence of MUD files created by the manufacturer for different classes of devices.
Such files would already be signed by the same manufacturer, eliminating the need to spoof a signature.</t>
      <t>With the standardization of the process in this document, then the attacker can no longer point to arbitrary MUD files in step 4, but can only make use of MUD files that the manufacturer has already provided for this device.</t>
      <t>Manufacturers are advised to maintain an orderly layout of MUD files in their web servers,
with each unique product having its own directory/pathname.</t>
      <t>The process described updates only MUD controllers and the processes that manufacturers use to manage the location of their MUD files.</t>
      <t>A manufacturer which has not managed their MUD files in the the way described here can deploy new directories of per-product MUD files, and then can update the existing MUD files in place to point to the new URLs
using the MUD-URL attribute.</t>
      <t>There is therefore no significant flag day: MUD controllers may implement the new policy without significant concern about backwards compatibility.</t>
      <section anchor="updating-files-vs-updating-mud-urls">
        <name>Updating files vs Updating MUD URLs</name>
        <t>Device developers need to consider whether to make a change by updating a MUD file, or updating the MUD URL.</t>
        <t>MUD URLs can only be updated by shipping a new firmware.
It is reasonable to update the MUD URL whenever a new firmware release causes new connectivity to be required.
The updated mechanism defined in this document makes this a secure operation, and there is no practical limitation on the number of files that a web server can hold.</t>
        <t>In place updates to a MUD file should be restricted to cases where it turns out that the description was inaccurate: a missing connection, an inadvertent one authorized, or just incorrect information.</t>
        <t>Developers should be aware that many enterprise web sites use outsourced content distribution networks, and MUD controllers are likely to cache files for some time.
Changes to MUD files will take some time to propagate through the various caches.
An updated MUD URL will however, not experience any cache issues, but can not be deployed with a firmware update.</t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC3986" target="https://www.rfc-editor.org/info/rfc3986" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3986.xml">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC8520" target="https://www.rfc-editor.org/info/rfc8520" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8520.xml">
          <front>
            <title>Manufacturer Usage Description Specification</title>
            <author fullname="E. Lear" initials="E." surname="Lear"/>
            <author fullname="R. Droms" initials="R." surname="Droms"/>
            <author fullname="D. Romascanu" initials="D." surname="Romascanu"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>This memo specifies a component-based architecture for Manufacturer Usage Descriptions (MUDs). The goal of MUD is to provide a means for end devices to signal to the network what sort of access and network functionality they require to properly function. The initial focus is on access control. Later work can delve into other aspects.</t>
              <t>This memo specifies two YANG modules, IPv4 and IPv6 DHCP options, a Link Layer Discovery Protocol (LLDP) TLV, a URL, an X.509 certificate extension, and a means to sign and verify the descriptions.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8520"/>
          <seriesInfo name="DOI" value="10.17487/RFC8520"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="I-D.ietf-opsawg-mud-tls" target="https://datatracker.ietf.org/doc/html/draft-ietf-opsawg-mud-tls-12" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-opsawg-mud-tls.xml">
          <front>
            <title>Manufacturer Usage Description (MUD) (D)TLS Profiles for IoT Devices</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dan Wing" initials="D." surname="Wing">
              <organization>Citrix Systems, Inc.</organization>
            </author>
            <author fullname="Blake Anderson" initials="B." surname="Anderson">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <date day="30" month="January" year="2023"/>
            <abstract>
              <t>This memo extends the Manufacturer Usage Description (MUD) specification to incorporate (D)TLS profile parameters. This allows a network security service to identify unexpected (D)TLS usage, which can indicate the presence of unauthorized software or malware on an endpoint.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-mud-tls-12"/>
        </reference>
        <reference anchor="I-D.richardson-mud-qrcode" target="https://datatracker.ietf.org/doc/html/draft-richardson-mud-qrcode-07" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.richardson-mud-qrcode.xml">
          <front>
            <title>Loading Manufacturer Usage Description (MUD) URLs from QR Codes</title>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Jacques Latour" initials="J." surname="Latour">
              <organization>CIRA Labs</organization>
            </author>
            <author fullname="Hassan Habibi Gharakheili" initials="H. H." surname="Gharakheili">
              <organization>UNSW Sydney</organization>
            </author>
            <date day="21" month="March" year="2022"/>
            <abstract>
              <t>This informational document details a protocol to load Manufacturer Usage Description (MUD) definitions from RFC 8520 for devices that do not have them integrated. This document is published to inform the Internet community of this mechanism to allow interoperability and to serve as a basis of other standards work if there is interest.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-richardson-mud-qrcode-07"/>
        </reference>
        <reference anchor="RFC7232" target="https://www.rfc-editor.org/info/rfc7232" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7232.xml">
          <front>
            <title>Hypertext Transfer Protocol (HTTP/1.1): Conditional Requests</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application- level protocol for distributed, collaborative, hypertext information systems. This document defines HTTP/1.1 conditional requests, including metadata header fields for indicating state changes, request header fields for making preconditions on such state, and rules for constructing the responses to a conditional request when one or more preconditions evaluate to false.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7232"/>
          <seriesInfo name="DOI" value="10.17487/RFC7232"/>
        </reference>
        <reference anchor="RFC7234" target="https://www.rfc-editor.org/info/rfc7234" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7234.xml">
          <front>
            <title>Hypertext Transfer Protocol (HTTP/1.1): Caching</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless \%application- level protocol for distributed, collaborative, hypertext information systems. This document defines HTTP caches and the associated header fields that control cache behavior or indicate cacheable response messages.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7234"/>
          <seriesInfo name="DOI" value="10.17487/RFC7234"/>
        </reference>
        <reference anchor="boycrieswolf" target="https://fablesofaesop.com/the-boy-who-cried-wolf.html">
          <front>
            <title>The Boy Who Cried Wolf</title>
            <author>
              <organization/>
            </author>
            <date year="2020" month="January" day="18"/>
          </front>
        </reference>
        <reference anchor="boywolfinfosec" target="https://www.infosecurity-magazine.com/opinions/security-alerts-boy-cried-wolf/">
          <front>
            <title>Security Alerts - A Case of the Boy Who Cried Wolf?</title>
            <author>
              <organization/>
            </author>
            <date year="2020" month="January" day="18"/>
          </front>
        </reference>
        <reference anchor="falsemalware" target="https://www.scmagazine.com/home/security-news/false-malware-alerts-cost-organizations-1-27m-annually-report-says/ and http://go.cyphort.com/Ponemon-Report-Page.html">
          <front>
            <title>False malware alerts cost organizations $1.27M annually, report says</title>
            <author>
              <organization/>
            </author>
            <date year="2020" month="January" day="18"/>
          </front>
        </reference>
        <reference anchor="I-D.jimenez-t2trg-mud-coap" target="https://datatracker.ietf.org/doc/html/draft-jimenez-t2trg-mud-coap-00" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.jimenez-t2trg-mud-coap.xml">
          <front>
            <title>Using MUD on CoAP environments</title>
            <author fullname="Jaime Jimenez" initials="J." surname="Jimenez">
              <organization>Ericsson</organization>
            </author>
            <date day="9" month="March" year="2020"/>
            <abstract>
              <t>This document provides some guidelines on how to add Manufacturer Usage Descriptions (MUD) to CoAP environments.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-jimenez-t2trg-mud-coap-00"/>
        </reference>
      </references>
    </references>
    <section anchor="appendices">
      <name>Appendices</name>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="J." surname="Yang" fullname="Jie Yang">
        <organization/>
        <address>
          <email>jay.yang@huawei.com</email>
        </address>
      </contact>
      <contact initials="T." surname="Tang" fullname="Tianqing Tang">
        <organization/>
        <address>
          <email>tangtianqing@huawei.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
