<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.5 (Ruby 2.6.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-opsawg-mud-acceptable-urls-10" category="std" consensus="true" updates="8520" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.19.1 -->
  <front>
    <title abbrev="mud-acceptable-urls">Authorized update to MUD URLs</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-mud-acceptable-urls-10"/>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <author initials="W." surname="Pan" fullname="Wei Pan">
      <organization>Huawei Technologies</organization>
      <address>
        <email>william.panwei@huawei.com</email>
      </address>
    </author>
    <author initials="E." surname="Lear" fullname="Eliot Lear">
      <organization>Cisco Systems</organization>
      <address>
        <email>lear@cisco.com</email>
      </address>
    </author>
    <date year="2024" month="February" day="06"/>
    <area>Operations</area>
    <workgroup>OPSAWG Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 61?>

<t>This document provides a way for an RFC8520 Manufacturer Usage Description
(MUD) definitions to declare what are acceptable replacement MUD URLs for a device.</t>
      <t>RFCEDITOR-please-remove: this document is being worked on at: https://github.com/mcr/iot-mud-acceptable-urls</t>
    </abstract>
  </front>
  <middle>
    <?line 68?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="RFC8520"/> provides a standardized way to describe how a specific purpose
device makes use of Internet resources and associated suggested network behavior.
The behaviors are described in a MUD file hosted in its manufacturer's server.
The device provides a MUD URL to the network manager, which can locate this MUD file
and determine the required network authorization of the device.</t>
      <t>In some cases, e.g., the firmware update, the network behaviors of the device may change,
and the description in the original MUD file will no longer apply.
To solve this problem, there are two common ways which the manufacturer can use.</t>
      <t>One is to change what is in the MUD file, i.e., update the MUD file in place, whenever the behavior of the firmware changes.
<xref target="updatemudfiles"/> discusses three scenarios for updating the MUD file and the corresponding potential issues.</t>
      <t>The other is to change which MUD file is processed by changing the MUD URL.
<xref target="updatemudurls"/> describes the common sources of MUD URLs and the problems and threats faced by each type of source when updating the MUD URL.
This document proposes an enhanced mechanism of how to securely update the MUD URL in <xref target="proposedmechanism"/>.</t>
      <t>There are also some assumptions and prerequisites in this document.</t>
      <t>While MUD files may include signatures, <xref target="RFC8520"/> does not mandate checking them, and
there is not a clear way to connect the entity which signed the MUD file to the device itself.
This document limits itself to situations in which the MUD file is signed,
and that the MUD controller has been configured to always check the signatures,
rejecting files whose signatures do not match.</t>
      <t><xref target="RFC8520"/> does not specify how MUD controllers establish their trust in the manufacturers' signing key:
there are many possible solutions from manual configuration of trust anchors,
some kind of automatic configuration during onboarding,
or a Trust on First Use (TOFU) mechanism that accepts the signer on first use.
How this initial trust is established is not important for this document,
it is sufficient that some satisfactory initial trust is established.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
      </t>
    </section>
    <section anchor="updatemudfiles">
      <name>Possible issues with updating the MUD files in place</name>
      <t>Three scenarios for updating the MUD file and the corresponding potential issues are discussed below.</t>
      <section anchor="adding-capabilities">
        <name>Adding capabilities</name>
        <t>For situations where new capabilities are added to the firmware, the MUD file will detail the new access that the new firmware requires.
This may involve new incoming or outgoing connections that should be authorized.
Devices that have been upgraded to the new firmware will make use of the new features.
Devices that have not been upgraded to the new firmware may have new connections that are authorized, but which the device does not use (outgoing connections), or which the device is not prepared to respond to (new incoming connections).</t>
        <t>It is possible that older versions of the firmware have vulnerabilities that were not easily exploitable due to the MUD file preventing particular kinds of access.
For example, an older firmware could have no credentials required (or default credentials) access via telnet on port 23 or HTTP on port 80.
The MUD file protected the device such that it could either not be accessed at all, or access was restricted to connections from a controller only.</t>
        <t>Useful and needed upgrades to the firmware could add credentials to that service, allowing it to be opened up for more general access.
The new MUD file would provide for such access, but when combined with the weak security of the old firmware, it results in a compromised device.</t>
        <t>While there is an argument that old firmware was insecure and should be replaced, it is often the case that the upgrade process involves downtime, or can introduce risks due to needed evaluations not having been completed yet.
As an example: moving vehicles (cars, airplanes, etc.) should not perform upgrades while in motion!
It is probably undesirable to perform any upgrade to an airplane outside of its service facility.
A vehicle owner may desire only to perform software upgrades when they are at their residence.   Should there be a problem, they could make alternate arrangements for transportation.
This contrasts with an alternative situation where the vehicle is parked at, for instance, a remote cabin, where an upgrade failure could cause a much greater inconvenience.</t>
        <t>The situation for upgrades of medical devices has even more considerations involving regulatory compliance.</t>
      </section>
      <section anchor="removing-capabilities">
        <name>Removing capabilities</name>
        <t>For situations where existing capabilities prove to be a problem and are to be turned off or removed in subsequent versions of the firmware, the MUD file will be updated to disallow connections that previously were allowed.</t>
        <t>In this case, the new MUD file will forbid some connections, which the old firmware still expects to do.
As explained in the previous section, upgrades may not always occur immediately upon releasing the new firmware.</t>
        <t>In this case, the old device will be performing unwanted connections, and the MUD controller will be alerting the network owner that the device is misbehaving rather than not being upgraded.
This causes a false-positive situation (see <xref target="boycrieswolf"/>), leading to real security issues being ignored.
This is a serious issue as documented also in <xref target="boywolfinfosec"/>, and <xref target="falsemalware"/>.</t>
      </section>
      <section anchor="significant-changes-to-protocols">
        <name>Significant changes to protocols</name>
        <t><xref target="I-D.ietf-opsawg-mud-tls"/> suggests MUD definitions to allow examination of TLS protocol details.
Such a profile may be very specific to the TLS library which is shipped in a device.
Changes to the library (including bug fixes) may cause significant changes to
the profile, requiring changes to the profile described in the MUD file.
Such changes are likely neither forward nor backward compatible with other
versions, and in place updates to MUD files are therefore not advised.</t>
      </section>
      <section anchor="motivation-for-updating-mud-urls">
        <name>Motivation for updating MUD URLs</name>
        <t>While many small tweaks to a MUD file can be done in place, the situation
described above, particularly when it comes to removing capabilities will
suggest that changes to the MUD URL are in order.
A strategy for doing this securely is needed, and the rest of this document
provides a mechanism to do this securely.</t>
      </section>
    </section>
    <section anchor="updatemudurls">
      <name>Updating the MUD URLs</name>
      <t>MUD URLs can come from a number of sources:</t>
      <ul spacing="normal">
        <li>
          <t>IDevID Extensions</t>
        </li>
        <li>
          <t>DHCP option</t>
        </li>
        <li>
          <t>LLDP TLV</t>
        </li>
        <li>
          <t><xref target="I-D.richardson-mud-qrcode"/> proposes to scan them from QRcodes.</t>
        </li>
      </ul>
      <t>The IDevID mechanism provides a URL that is asserted cryptographically by a manufacturer.
However, it is difficult for manufacturers to update the IDevID of a device which is already in a box.</t>
      <t>The DHCP and LLDP mechanisms are not signed, but are asserted by the device.
A firmware update may update what MUD URL is emitted.
Sufficiently well targeted malware would also be able to change the MUD URL that is emitted.</t>
      <t>The QRcode mechanism is usually done via paper/stickers, and is typically not under the control of the device itself at all.
However, being applied by a human and not easily changed, a MUD URL obtained in this fashion is likely as trustworthy as the rest of the vendors packaging.
(It may not, due to mixups in labeling represent the correct device, but this is a human coordination issue, and is out of scope for this document.)</t>
      <t>The manufacturer can use all the four mechanisms above when manufacturing the device.
But when considering updating the firmware, it seems like only the DHCP and LLDP mechanisms
are sufficiently easy to send the new MUD URL.
Because of that sensitivity, they may also be easily changed by malware!</t>
      <t>There are mitigating mechanisms which may be enough to deal with this problem when MUD
files are signed by the manufacturer.</t>
      <t>While <xref target="RFC8520"/> has established a mechanism for signing of MUD files, the document does not define a way for a MUD controller to determine who should sign the MUD file for a particular device.</t>
      <t><xref target="RFC8520"/> leaves this for a local policy.
There are a number of processes that could be used, but they require coordination of many players.
It is expected that each industrial vertical will work out supply chain arrangements or other heuristics.</t>
      <section anchor="leveraging-the-manufacturer-signature">
        <name>Leveraging the manufacturer signature</name>
        <t>The first time a signature of the MUD file related to a particular device-type
is verified by the MUD controller, the identity of the signing authority is recorded.
That it, the signing authority is pinned.
This policy means that subsequent MUD files must be signed by the same entity in order to be accepted.</t>
        <t>The trust and acceptance of the first signer may come from many sources.
The first signature could be from a manually configured trust anchor in the MUD controller.
The first signature be Trust on First Use (TOFU), with the URL coming a trusted IDevID certificate.</t>
        <t>Based upon this process, an update to the MUD URL would be valid if the new
MUD file was signed by the same entity that signed the previous entry.
This mechanism permits a replacement URL to be any URL that the same
manufacturer can provide.</t>
      </section>
      <section anchor="concerns-about-same-signer-mechanism">
        <name>Concerns about same-signer mechanism</name>
        <t>There is still a potential threat: a manufacturer which has many products may
have a MUD definition for another product that has the privileges that the
malware desires.</t>
        <t>The malware could simply change the expressed MUD URL to that of the other product, and it will be accepted by the MUD controller as valid.</t>
        <t>This works as long as manufacturers use a single key to sign all products.
Some manufacturers could sign each product with a different key.
Such manufacturers would probably then collect all the signing keys into a certificate infrastructure (PKI), with a single manufacturer CA key.</t>
        <t>In this case, the question then becomes whether the MUD controller should pin the End-Entity (EE) certificate, or the CA certificate.</t>
        <t>Pinning the End-Entity (EE) certificate defends against malware that changes the product type, but prevents the manufacturer from being able to cycle the validity of the End-Entity certificate for cryptographic hygiene reasons.</t>
        <t>Pinning the CA certificate allows the EE certificate to change, but may not defend against product type changes.</t>
        <t>It is possible to invent policy mechanisms that would link the EE certificate to a value that is in the MUD file.
This could be a policy OID, or could involve some content in a subjectAltName.
Future work could go in that direction.
This document proposes a simpler solution.</t>
      </section>
    </section>
    <section anchor="proposedmechanism">
      <name>Proposed mechanism for updating MUD URLs</name>
      <t>The document proposes to limit what MUD URLs are considered valid from the device, limiting new MUD URLs to be variations of the initial (presumed to be secure) URL.</t>
      <t>The first MUD file which is defined for a device can come from an IDevID (which is considered more secure),
or via Trust on First Use with DHCP or LLDP or other mechanisms. This first, initially trusted, MUD file will be called the "root" MUD file.</t>
      <t>A MUD file contains a self-referential MUD-URL attribute that points to
the MUD file itself located on the vendor's website.
While the IDevID, DHCP and LLDP mechanisms only transmit a URL, there are
some newer, not yet standardized proposals that would fetch an entire MUD
file from the device, such as <xref target="I-D.jimenez-t2trg-mud-coap"/>.</t>
      <t>The MUD-URL MUST always be an Absolute URI: see <xref target="RFC3986"/> section 4.3.</t>
      <t>The URL found in the MUD-URL attribute is to be called the canonical MUD URL for the device.</t>
      <t>The MUD-SIGNATURE attribute in the MUD file SHOULD be a relative URI (see <xref target="RFC3986"/> section 4.2) with the (hierarchical) base URI for this reference being the MUD-URL attribute.</t>
      <t>When pinning the signature, the MUD controller SHOULD pin the lowest Certification Authority (CA) that was used in the validation of the CMS structure, along with the chain of Subject Names leading to the signature.
The MUD controller may need additional trust anchors (including previously pinned ones) in order to verify that CA certificate.</t>
      <t>Subsequent MUD files are considered valid if:</t>
      <ul spacing="normal">
        <li>
          <t>they have the same initial Base-URI as the MUD-URL, but may have a different final part</t>
        </li>
        <li>
          <t>they are signed by an equivalent End Entity (same trusted CA and same Subject Name) as the "root" MUD file.</t>
        </li>
      </ul>
      <t>Section 5.2 of <xref target="RFC3986"/> details many cases for calculating the Base-URI.
The test is simplified to: remove everything to the right of the last (rightmost) "/" in the URL of "root" MUD  file URL, and the proposed new URL.
The resulting two strings MUST be identical.</t>
      <t>For a simple example, if the canonical MUD-URL is http://example.com/hello/there/file.json then
any URL that starts with http://example.com/hello/there/ would be acceptable, such as
http://example.com/hello/there/revision2.json.</t>
      <t>Once this new MUD file is accepted, then the MUD-URL attribute in this file becomes the new canonical MUD file.
As a result, any subsequent updates MUST be relative to the new MUD-URL in this file.
This rule enables the location of the MUD file to change over time based upon the needs of the organization.</t>
      <section anchor="merger-acquisitions-and-key-changes">
        <name>Merger, Acquisitions and Key Changes</name>
        <t>The above process allows for a manufacturer to rework its file structure.
They can change web server host names, so long as they retain the old structure long enough for  all devices to upgrade at least once.</t>
        <t>The process also allows a manufacturer to change the EE certificate and Certification Authority used for signing.</t>
        <section anchor="file-structure-change">
          <name>Changing file structure</name>
          <t>A manufacturer has been hosting a MUD file at https://example.com/household/products/mudfiles/toaster.json
and wishes to move it to https://example.com/mudfiles/toasters/model1945/mud.json</t>
          <t>The manufacturer creates a new MUD file at the new location.</t>
          <t>Then the manufacturer changes the MUD-URL contained with the files at the old location to have a value of https://example.com/mudfiles/toasters/model1945/mud.json.
Note that in order for MUD controllers to reload the old file, it MUST have been served with an appropriate ETag, and appropriate Expires or Cache Control headers <xref section="5.3" sectionFormat="comma" target="RFC9111"/>.
If control over caching is not possible for the manufacturer, then they need to do this in two steps, with the first step creating a new MUD file at an acceptable location (in the above example, perhaps: https://example.com/household/products/mudfiles/toaster0.json ).
The device then will have to do two firmware updates: one to switch to the intermediate URL, and a second one to switch to the desired final URL.</t>
          <t>The manufacturer must continue to serve the files from the old location for some time, or to return an HTTP 301 (Moved Permanently) redirecting to the new location.</t>
        </section>
        <section anchor="changing-hosting-urls">
          <name>Changing hosting URLs</name>
          <t>A manufacturer has been hosting a MUD file at https://example.com/household/products/mudfiles/toaster.json
and wishes to move it to https://mud.example/hosthold/products/mudfiles/toaster.json</t>
          <t>The scenario is much the same as for <xref target="file-structure-change"/>, and can be handled in the same fashion.
This situation is likely to occur when one company acquires another.</t>
          <t>Note, however, that a 301 Redirect that changed the hostname SHOULD NOT be accepted by MUD controllers.</t>
        </section>
        <section anchor="changing-signing-authority">
          <name>Changing Signing Authority</name>
          <t>A manufacturer has been signing MUD files using an EE Certificate with subjectAltName foo.example, issued by an internal Certification Authority BAZ.</t>
          <t>The manufacturer wishes to begin signing with an EE Certificate with subjectAltname foo.example, but now signed by a public CA (call it: Fluffy).</t>
          <t>The manufacturer first creates a new MUD file with a new detached signature file.
Within this signature file, the manufacturer places a certificate chain: Internal-CA BAZ-&gt;Fluffy,
and then the Fluffy Certificate, and then the foo.example certificate issued from Fluffy.</t>
          <t>This supports changing certification authorities, but it does not support changing the Subject Name of the signing entity.</t>
        </section>
      </section>
    </section>
    <section anchor="polling-for-changes-in-mud-files">
      <name>Polling for changes in MUD files</name>
      <t>The MUD file update mechanisms described in <xref target="updatemudfiles"/> requires that the MUD controller poll for updates.
The MUD controller will receive no signal about a change from the device because the URL will not have changed.</t>
      <t>The manufacturer SHOULD serve MUD files from a source for which ETag <xref section="2.3" sectionFormat="of" target="RFC7232"/> may be generated.
Static files on disk satisfy this requirement.
MUD files generated from a database process might not.
The use of ETag allows a MUD controller to more efficiently poll for changes in the file.</t>
      <t>A manufacturer should also serve MUD files with an HTTP Max-Age header as per <xref section="5.2.2.8" sectionFormat="of" target="RFC7234"/>.</t>
      <t>The MUD controller should take the Max-Age as an indication of when to next poll for updates to the MUD file.
Values of less than 1 hour, or more than 1 month should be considered out of range, and clamped into the range (1 hour, 1 month).</t>
      <t>MUD controllers SHOULD add some random jitter to the timing of their requests.
MUD controllers MAY use a single HTTP(S)/1.1 connection to retrieve all resources at the same destination.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>The MUD URL could contain sensitive information such as the model number and even firmware revision numbers.
Thus, the MUD URL may identify the make, model and revision of a device.</t>
      <t><xref target="RFC8520"/> already identifies this privacy concern, and suggests use of TLS so that the HTTP requests that retrieve the MUD file do not divulge that level of detail.</t>
      <t>The requirement for the MUD controller to poll for changes to MUD files results in multiple interactions between the MUD controller and the manufacturer whereas a more naive implementation might only interact once.
Even if HTTPS used, an observer of the traffic to that manufacturer will be revealing, and <xref target="RFC8520"/> goes on to suggest use of a proxy as well.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document makes no requests to IANA.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Prior to the standardization of the process in this document, if a device was infiltrated by malware, and said malware wished to make accesses beyond what the current MUD file allowed, the malware would have to:</t>
      <ol spacing="normal" type="1"><li>
          <t>arrange for an equivalent MUD file to be visible somewhere on the Internet</t>
        </li>
        <li>
          <t>depend upon the MUD controller either not checking signatures, or</t>
        </li>
        <li>
          <t>somehow get the manufacturer to sign the alternate MUD file</t>
        </li>
        <li>
          <t>announce this new URL via DHCP or LLDP, updating the MUD controller with the new permissions.</t>
        </li>
      </ol>
      <t>One way to accomplish (3) is to leverage the existence of MUD files created by the manufacturer for different classes of devices.
Such files would already be signed by the same manufacturer, eliminating the need to spoof a signature.</t>
      <t>With the standardization of the process in this document, then the attacker can no longer point to arbitrary MUD files in step 4, but can only make use of MUD files that the manufacturer has already provided for this device.</t>
      <t>Manufacturers are advised to maintain an orderly layout of MUD files in their web servers,
with each unique product having its own directory/pathname.</t>
      <t>The process described updates only MUD controllers and the processes that manufacturers use to manage the location of their MUD files.</t>
      <t>A manufacturer which has not managed their MUD files in the way described here can deploy new directories of per-product MUD files, and then can update the existing MUD files in place to point to the new URLs
using the MUD-URL attribute.</t>
      <t>There is therefore no significant flag day: MUD controllers may implement the new policy without significant concern about backwards compatibility.</t>
      <section anchor="updating-files-vs-updating-mud-urls">
        <name>Updating files vs Updating MUD URLs</name>
        <t>Device developers need to consider whether to make a change by updating a MUD file, or updating the MUD URL.</t>
        <t>MUD URLs can only be updated by shipping a new firmware.
It is reasonable to update the MUD URL whenever a new firmware release causes new connectivity to be required.
The updated mechanism defined in this document makes this a secure operation, and there is no practical limitation on the number of files that a web server can hold.</t>
        <t>In place updates to a MUD file should be restricted to cases where it turns out that the description was inaccurate: a missing connection, an inadvertent one authorized, or just incorrect information.</t>
        <t>Developers should be aware that many enterprise websites use outsourced content distribution networks, and MUD controllers are likely to cache files for some time.
Changes to MUD files will take some time to propagate through the various caches.
An updated MUD URL will however, not experience any cache issues, but can not be deployed with a firmware update.</t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC3986" target="https://www.rfc-editor.org/info/rfc3986" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3986.xml">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC8520" target="https://www.rfc-editor.org/info/rfc8520" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8520.xml">
          <front>
            <title>Manufacturer Usage Description Specification</title>
            <author fullname="E. Lear" initials="E." surname="Lear"/>
            <author fullname="R. Droms" initials="R." surname="Droms"/>
            <author fullname="D. Romascanu" initials="D." surname="Romascanu"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>This memo specifies a component-based architecture for Manufacturer Usage Descriptions (MUDs). The goal of MUD is to provide a means for end devices to signal to the network what sort of access and network functionality they require to properly function. The initial focus is on access control. Later work can delve into other aspects.</t>
              <t>This memo specifies two YANG modules, IPv4 and IPv6 DHCP options, a Link Layer Discovery Protocol (LLDP) TLV, a URL, an X.509 certificate extension, and a means to sign and verify the descriptions.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8520"/>
          <seriesInfo name="DOI" value="10.17487/RFC8520"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-opsawg-mud-tls" target="https://datatracker.ietf.org/doc/html/draft-ietf-opsawg-mud-tls-13" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-opsawg-mud-tls.xml">
          <front>
            <title>Manufacturer Usage Description (MUD) (D)TLS Profiles for IoT Devices</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dan Wing" initials="D." surname="Wing">
              <organization>Citrix Systems, Inc.</organization>
            </author>
            <author fullname="Blake Anderson" initials="B." surname="Anderson">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <date day="23" month="January" year="2024"/>
            <abstract>
              <t>This memo extends the Manufacturer Usage Description (MUD) specification to incorporate (D)TLS profile parameters. This allows a network security service to identify unexpected (D)TLS usage, which can indicate the presence of unauthorized software or malware on an endpoint.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-mud-tls-13"/>
        </reference>
        <reference anchor="I-D.richardson-mud-qrcode" target="https://datatracker.ietf.org/doc/html/draft-richardson-mud-qrcode-07" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.richardson-mud-qrcode.xml">
          <front>
            <title>Loading Manufacturer Usage Description (MUD) URLs from QR Codes</title>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Jacques Latour" initials="J." surname="Latour">
              <organization>CIRA Labs</organization>
            </author>
            <author fullname="Hassan Habibi Gharakheili" initials="H. H." surname="Gharakheili">
              <organization>UNSW Sydney</organization>
            </author>
            <date day="21" month="March" year="2022"/>
            <abstract>
              <t>This informational document details a protocol to load Manufacturer Usage Description (MUD) definitions from RFC 8520 for devices that do not have them integrated. This document is published to inform the Internet community of this mechanism to allow interoperability and to serve as a basis of other standards work if there is interest.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-richardson-mud-qrcode-07"/>
        </reference>
        <reference anchor="RFC7232" target="https://www.rfc-editor.org/info/rfc7232" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7232.xml">
          <front>
            <title>Hypertext Transfer Protocol (HTTP/1.1): Conditional Requests</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application- level protocol for distributed, collaborative, hypertext information systems. This document defines HTTP/1.1 conditional requests, including metadata header fields for indicating state changes, request header fields for making preconditions on such state, and rules for constructing the responses to a conditional request when one or more preconditions evaluate to false.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7232"/>
          <seriesInfo name="DOI" value="10.17487/RFC7232"/>
        </reference>
        <reference anchor="RFC7234" target="https://www.rfc-editor.org/info/rfc7234" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7234.xml">
          <front>
            <title>Hypertext Transfer Protocol (HTTP/1.1): Caching</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless \%application- level protocol for distributed, collaborative, hypertext information systems. This document defines HTTP caches and the associated header fields that control cache behavior or indicate cacheable response messages.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7234"/>
          <seriesInfo name="DOI" value="10.17487/RFC7234"/>
        </reference>
        <reference anchor="boycrieswolf" target="https://fablesofaesop.com/the-boy-who-cried-wolf.html">
          <front>
            <title>The Boy Who Cried Wolf</title>
            <author>
              <organization/>
            </author>
            <date year="2020" month="January" day="18"/>
          </front>
        </reference>
        <reference anchor="boywolfinfosec" target="https://www.infosecurity-magazine.com/opinions/security-alerts-boy-cried-wolf/">
          <front>
            <title>Security Alerts - A Case of the Boy Who Cried Wolf?</title>
            <author>
              <organization/>
            </author>
            <date year="2020" month="January" day="18"/>
          </front>
        </reference>
        <reference anchor="falsemalware" target="https://www.scmagazine.com/home/security-news/false-malware-alerts-cost-organizations-1-27m-annually-report-says/ and http://go.cyphort.com/Ponemon-Report-Page.html">
          <front>
            <title>False malware alerts cost organizations $1.27M annually, report says</title>
            <author>
              <organization/>
            </author>
            <date year="2020" month="January" day="18"/>
          </front>
        </reference>
        <reference anchor="I-D.jimenez-t2trg-mud-coap" target="https://datatracker.ietf.org/doc/html/draft-jimenez-t2trg-mud-coap-00" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.jimenez-t2trg-mud-coap.xml">
          <front>
            <title>Using MUD on CoAP environments</title>
            <author fullname="Jaime Jimenez" initials="J." surname="Jimenez">
              <organization>Ericsson</organization>
            </author>
            <date day="9" month="March" year="2020"/>
            <abstract>
              <t>This document provides some guidelines on how to add Manufacturer Usage Descriptions (MUD) to CoAP environments.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-jimenez-t2trg-mud-coap-00"/>
        </reference>
        <reference anchor="RFC9111" target="https://www.rfc-editor.org/info/rfc9111" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9111.xml">
          <front>
            <title>HTTP Caching</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document defines HTTP caches and the associated header fields that control cache behavior or indicate cacheable response messages.</t>
              <t>This document obsoletes RFC 7234.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="98"/>
          <seriesInfo name="RFC" value="9111"/>
          <seriesInfo name="DOI" value="10.17487/RFC9111"/>
        </reference>
      </references>
    </references>
    <?line 395?>

<section anchor="appendices">
      <name>Appendices</name>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="J." surname="Yang" fullname="Jie Yang">
        <organization/>
        <address>
          <email>jay.yang@huawei.com</email>
        </address>
      </contact>
      <contact initials="T." surname="Tang" fullname="Tianqing Tang">
        <organization/>
        <address>
          <email>tangtianqing@huawei.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
