<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.6.4 (Ruby 2.6.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-opsawg-mud-acceptable-urls-11" category="std" consensus="true" updates="8520" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.3 -->
  <front>
    <title abbrev="mud-acceptable-urls">Authorized update to MUD URLs</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-mud-acceptable-urls-11"/>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <author initials="W." surname="Pan" fullname="Wei Pan">
      <organization>Huawei Technologies</organization>
      <address>
        <email>william.panwei@huawei.com</email>
      </address>
    </author>
    <author initials="E." surname="Lear" fullname="Eliot Lear">
      <organization>Cisco Systems</organization>
      <address>
        <email>lear@cisco.com</email>
      </address>
    </author>
    <date year="2024" month="March" day="01"/>
    <area>Operations</area>
    <workgroup>OPSAWG Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document provides a way for an RFC8520 Manufacturer Usage Description
(MUD) definitions to declare what are acceptable replacement MUD URLs for a device.</t>
      <t>RFCEDITOR-please-remove: this document is being worked on at: https://github.com/mcr/iot-mud-acceptable-urls</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="RFC8520"/> provides a standardized way to describe how a specific purpose
device makes use of Internet resources and associated suggested network behavior.
The behaviors are described in a MUD file hosted in its manufacturer's server.
The device provides a MUD URL to the MUD controller, which can locate this MUD file
and determine the required network authorization of the device.</t>
      <t>In some cases, e.g., the firmware update, the network behaviors of the device may change,
and the description in the original MUD file will no longer apply.
To solve this problem, there are two common ways which the manufacturer can use.</t>
      <t>One is to change what is in the MUD file, i.e., update the MUD file in place, whenever the behavior of the firmware changes.
<xref target="updatemudfiles"/> discusses three scenarios for updating the MUD file and the corresponding potential issues.</t>
      <t>The other is to change which MUD file is processed by changing the MUD URL.
<xref target="updatemudurls"/> describes the common sources of MUD URLs and the problems and threats faced by each type of source when updating the MUD URL.
This document proposes an enhanced mechanism of how to securely update the MUD URL in <xref target="proposedmechanism"/>.</t>
      <t>There are also some assumptions and prerequisites in this document.</t>
      <t>While MUD files may include signatures, <xref target="RFC8520"/> does not mandate checking them, and
there is not a clear way to connect the entity which signed the MUD file to the device itself.
This document limits itself to situations in which the MUD file is signed,
and that the MUD controller has been configured to always check the signatures,
rejecting files whose signatures do not match.</t>
      <t><xref target="RFC8520"/> does not specify how MUD controllers establish their trust in the manufacturers' signing key:
there are many possible solutions from manual configuration of trust anchors,
some kind of automatic configuration during onboarding,
or a Trust on First Use (TOFU) mechanism that accepts the signer on first use.
How this initial trust is established is not important for this document,
it is sufficient that some satisfactory initial trust is established.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="updatemudfiles">
      <name>Possible issues with updating the MUD files in place</name>
      <t>Three scenarios for updating the MUD file and the corresponding potential issues are discussed below.</t>
      <section anchor="adding-capabilities">
        <name>Adding capabilities</name>
        <t>For situations where new capabilities are added to the firmware, the MUD file will detail the new access that the new firmware requires.
This may involve new incoming or outgoing connections that should be authorized.
Devices that have been upgraded to the new firmware will make use of the new features.
Devices that have not been upgraded to the new firmware may have new connections that are authorized, but which the device does not use (outgoing connections), or which the device is not prepared to respond to (new incoming connections).</t>
        <t>It is possible that older versions of the firmware have vulnerabilities that were not easily exploitable due to the MUD file preventing particular kinds of access.
For example, an older firmware could have no credentials required (or default credentials) access via telnet on port 23 or HTTP on port 80.
The MUD file protected the device such that it could either not be accessed at all, or access was restricted to connections from a controller only.</t>
        <t>Useful and needed upgrades to the firmware could add credentials to that service, allowing it to be opened up for more general access.
The new MUD file would provide for such access, but when combined with the weak security of the old firmware, it results in a compromised device.</t>
        <t>While there is an argument that old firmware was insecure and should be replaced, it is often the case that the upgrade process involves downtime, or can introduce risks due to needed evaluations not having been completed yet.
As an example: moving vehicles (cars, airplanes, etc.) should not perform upgrades while in motion!
It is probably undesirable to perform any upgrade to an airplane outside the service facility.
A vehicle owner may desire only to perform software upgrades when they are at their residence.   Should there be a problem, they could make alternate arrangements for transportation.
This contrasts with an alternative situation where the vehicle is parked at, for instance, a remote cabin, and where an upgrade failure could cause a much greater inconvenience.</t>
        <t>The situation for upgrades of medical devices has even more considerations involving regulatory compliance.</t>
      </section>
      <section anchor="removing-capabilities">
        <name>Removing capabilities</name>
        <t>For situations where existing capabilities prove to be a problem and are to be turned off or removed in subsequent versions of the firmware, the MUD file will be updated to disallow connections that previously were allowed.</t>
        <t>In this case, the new MUD file will forbid some connections, which the old firmware still expects to do.
As explained in the previous section, upgrades may not always occur immediately upon releasing the new firmware.</t>
        <t>In this case, the old device will be performing unwanted connections, and the MUD controller will be alerting the network owner that the device is misbehaving rather than not being upgraded.
This causes a false-positive situation (see <xref target="boycrieswolf"/>), leading to real security issues being ignored.
This is a serious issue as documented also in <xref target="boywolfinfosec"/>, and <xref target="falsemalware"/>.</t>
      </section>
      <section anchor="significant-changes-to-protocols">
        <name>Significant changes to protocols</name>
        <t><xref target="I-D.ietf-opsawg-mud-tls"/> suggests MUD definitions to allow examination of TLS protocol details.
Such a profile may be very specific to the TLS library which is shipped in a device.
Changes to the library (including bug fixes) may cause significant changes to
the profile, requiring changes to the profile described in the MUD file.
Such changes are likely neither forward nor backward compatible with other
versions, and in place updates to MUD files are therefore not advised.</t>
      </section>
      <section anchor="motivation-for-updating-mud-urls">
        <name>Motivation for updating MUD URLs</name>
        <t>While many small tweaks to a MUD file can be done in place, the situation
described above, particularly when it comes to removing capabilities will
suggest that changes to the MUD URL are in order.
A strategy for doing this securely is needed, and the rest of this document
provides a mechanism to do this securely.</t>
      </section>
    </section>
    <section anchor="updatemudurls">
      <name>Updating the MUD URLs</name>
      <t>MUD URLs can come from a number of sources:</t>
      <ul spacing="normal">
        <li>IDevID Extensions</li>
        <li>DHCP option</li>
        <li>LLDP TLV</li>
        <li>
          <xref target="I-D.richardson-mud-qrcode"/> proposes to scan them from QRcodes.</li>
      </ul>
      <t>The IDevID mechanism provides a URL that is asserted cryptographically by a manufacturer.
However, it is difficult for manufacturers to update the IDevID of a device which is already in a box.</t>
      <t>The DHCP and LLDP mechanisms are not signed, but are asserted by the device.
A firmware update may update what MUD URL is emitted.
Sufficiently well targeted malware would also be able to change the MUD URL that is emitted.</t>
      <t>The QRcode mechanism is usually done via paper/stickers, and is typically not under the control of the device itself at all.
However, being applied by a human and not easily changed, a MUD URL obtained in this fashion is likely as trustworthy as the rest of the vendors packaging.
(It may not, due to mixups in labeling represent the correct device, but this is a human coordination issue, and is out of scope for this document.)</t>
      <t>The manufacturer can use all the four mechanisms above when manufacturing the device.
But when considering updating the firmware, it seems like only the DHCP and LLDP mechanisms
are sufficiently easy to send the new MUD URL.
Because of that sensitivity, they may also be easily changed by malware!</t>
      <t>There are mitigating mechanisms which may be enough to deal with this problem when MUD
files are signed by the manufacturer.</t>
      <t><xref section="13.2" sectionFormat="comma" target="RFC8520"/> explains how to verify MUD File Signatures.
That document does not define a way for a MUD controller to determine who should sign the MUD file for a particular device.</t>
      <t><xref target="RFC8520"/> leaves this for a local policy.
This document establishes one such local policy.
There are a number of other processes that could be used, it is expected that
many such industrial vertical will work out supply chain arrangements or other
heuristics to supply appropriate anchors.</t>
      <section anchor="leveraging-the-manufacturer-signature">
        <name>Leveraging the manufacturer signature</name>
        <t>The first time a signature of the MUD file related to a particular device-type
is verified by the MUD controller, the identity of the signing authority is recorded.
That it, the signing authority is pinned.
This policy means that subsequent MUD files must be signed by the same entity in order to be accepted.</t>
        <t>The trust and acceptance of the first signer may come from many sources.
The first signature could be from a manually configured trust anchor in the MUD controller.
The first signature could be Trust on First Use (TOFU), with the URL coming from a trusted IDevID certificate.</t>
        <t>Based upon this process, an update to the MUD URL would be valid if the new
MUD file was signed by the same entity that signed the previous entry.
This mechanism permits a replacement URL to be any URL that the same
manufacturer can provide.</t>
      </section>
      <section anchor="concerns-about-same-signer-mechanism">
        <name>Concerns about same-signer mechanism</name>
        <t>There is still a potential threat: a manufacturer which has many products may
have a MUD definition for another product that has the privileges that the
malware desires.</t>
        <t>The malware could simply change the expressed MUD URL to that of the other product, and it will be accepted by the MUD controller as valid.</t>
        <t>This works as long as manufacturers use a single key to sign all products.
Some manufacturers could sign each product with a different key.
Such manufacturers would probably then collect all the signing keys into a certificate infrastructure (PKI), with a single manufacturer CA key.</t>
        <t>In this case, the question then becomes whether the MUD controller should pin the End-Entity (EE) certificate, or the CA certificate.</t>
        <t>Pinning the End-Entity (EE) certificate defends against malware that changes the product type, but prevents the manufacturer from being able to cycle the validity of the End-Entity certificate for cryptographic hygiene reasons.</t>
        <t>Pinning the CA certificate allows the EE certificate to change, but may not defend against product type changes.</t>
        <t>It is possible to invent policy mechanisms that would link the EE certificate to a value that is in the MUD file.
This could be a policy OID, or could involve some content in a subjectAltName.
Future work could go in that direction.
This document proposes a simpler solution.</t>
      </section>
    </section>
    <section anchor="proposedmechanism">
      <name>Proposed mechanism for updating MUD URLs</name>
      <t>The document proposes to limit what MUD URLs are considered valid from the device, limiting new MUD URLs to be variations of the initial (presumed to be secure) URL.</t>
      <t>The first MUD file which is defined for a device can come from an IDevID (which is considered more secure),
or via Trust on First Use with DHCP or LLDP or other mechanisms. This first, initially trusted, MUD file will be called the "root" MUD file.</t>
      <t>A MUD file contains a self-referential MUD-URL attribute that points to
the MUD file itself located on the vendor's website.
While the IDevID, DHCP and LLDP mechanisms only transmit a URL, there are
some newer, not yet standardized proposals that would fetch an entire MUD
file from the device, such as <xref target="I-D.jimenez-t2trg-mud-coap"/>.</t>
      <t>The MUD-URL MUST always be an Absolute URI: see <xref target="RFC3986"/> section 4.3.</t>
      <t>The URL found in the MUD-URL attribute is to be called the canonical MUD URL for the device.</t>
      <t>The MUD-SIGNATURE attribute in the MUD file SHOULD be a relative URI (see <xref target="RFC3986"/> section 4.2) with the (hierarchical) base URI for this reference being the MUD-URL attribute.</t>
      <t>When pinning the signature, the MUD manager SHOULD pin the lowest Certification Authority (CA) that was used in the validation of the CMS structure, along with the chain of Subject Names leading to the signature.
The MUD manager may need additional trust anchors (including previously
pinned ones) in order to verify that CA certificate.</t>
      <section anchor="small-changes-to-the-mud-url">
        <name>Small Changes to the MUD URL</name>
        <t>Subsequent MUD files are considered valid if:</t>
        <ul spacing="normal">
          <li>they have the same initial Base-URI as the MUD-URL, but may have a different final part</li>
          <li>they are signed by an equivalent End Entity (same trusted CA and same Subject Name) as the "root" MUD file.</li>
        </ul>
        <t>Section 5.2 of <xref target="RFC3986"/> details many cases for calculating the Base-URI.</t>
        <t>Section 3.3 of <xref target="RFC3986"/> explains how the different parts of the URL are
described.
As explained in that section, a <em>path</em> component consists of a series of
<em>segment</em> seperated by slash ("/") characters.
The new URL is considered acceptable if it contains the same series of
segments in its path, excepting that the last segment may be different.</t>
        <t>For a simple example, if the canonical MUD-URL is http://example.com/hello/there/file.json then
any URL that starts with http://example.com/hello/there/ would be acceptable, such as
http://example.com/hello/there/revision2.json.</t>
        <t>One problem with these small changes is that malware could still express a
MUD file that was previously valid, but which should no longer considered
accurate.
This is a rollback attack.
This might result in the malware being able to reach destinations that turned
out to be a mistake; a security fault.
In order to combat this, MUD managers SHOULD keep track of the list of
MUD-URLs that they have successfully retrieved, and if a device ever suggests a URL that was
previously used, then the MUD manager should suspect that is a rollback attack.
MUD managers are not typically resource constrained, and while the
list of URLs could grow without bound, it is unlikely to be a burden.
A site with thousands of similar devices could keep a common list of URLs.</t>
      </section>
      <section anchor="big-changes-to-the-mud-url">
        <name>Big Changes to the MUD URL</name>
        <t>Once a new MUD file is accepted, either by reloading an existing file from
the same URL, or via the Small Changes mechanism described above, then the
MUD-URL attribute in this file becomes the new canonical MUD file.
The contained MUD-URL attribute in the file need not be related in any way to
the existing MUD-URL.</t>
        <t>As a result, any subsequent updates MUST be relative to the new MUD-URL in
this file.</t>
        <t>This rule enables the location of the MUD file to change over time based upon
the needs of the organization.</t>
      </section>
      <section anchor="merger-acquisitions-and-key-changes">
        <name>Merger, Acquisitions and Key Changes</name>
        <t>The above process allows for a manufacturer to rework its file structure.
They can change web server host names, so long as they retain the old structure long enough for  all devices to upgrade at least once.</t>
        <t>The process also allows a manufacturer to change the EE certificate and Certification Authority used for signing.</t>
        <section anchor="file-structure-change">
          <name>Changing file structure</name>
          <t>A manufacturer has been hosting a MUD file at https://example.com/household/products/mudfiles/toaster.json
and wishes to move it to https://example.com/mudfiles/toasters/model1945/mud.json</t>
          <t>The manufacturer creates a new MUD file at the new location.</t>
          <t>Then the manufacturer changes the MUD-URL contained with the files at the old location to have a value of https://example.com/mudfiles/toasters/model1945/mud.json.
Note that in order for MUD controllers to reload the old file, it MUST have been served with an appropriate ETag, and appropriate Expires or Cache Control headers <xref section="5.3" sectionFormat="comma" target="RFC9111"/>.
If control over caching is not possible for the manufacturer, then they need to do this in two steps, with the first step creating a new MUD file at an acceptable location (in the above example, perhaps: https://example.com/household/products/mudfiles/toaster0.json ).
The device then will have to do two firmware updates: one to switch to the intermediate URL, and a second one to switch to the desired final URL.</t>
          <t>The manufacturer must continue to serve the files from the old location for some time, or to return an HTTP 301 (Moved Permanently) redirecting to the new location.</t>
        </section>
        <section anchor="changing-hosting-urls">
          <name>Changing hosting URLs</name>
          <t>A manufacturer has been hosting a MUD file at https://example.com/household/products/mudfiles/toaster.json
and wishes to move it to https://mud.example/hosthold/products/mudfiles/toaster.json</t>
          <t>The scenario is much the same as for <xref target="file-structure-change"/>, and can be handled in the same fashion.
This situation is likely to occur when one company acquires another.</t>
          <t>Note, however, that a 301 Redirect that changed the hostname SHOULD NOT be accepted by MUD controllers.</t>
        </section>
        <section anchor="changing-signing-authority">
          <name>Changing Signing Authority</name>
          <t>A manufacturer has been signing MUD files using an EE Certificate with subjectAltName foo.example, issued by an internal Certification Authority BAZ.</t>
          <t>The manufacturer wishes to begin signing with an EE Certificate with subjectAltname foo.example, but now signed by a public CA (call it: Fluffy).</t>
          <t>The manufacturer first creates a new MUD file with a new detached signature file.
Within this signature file, the manufacturer places a certificate chain: Internal-CA BAZ-&gt;Fluffy,
and then the Fluffy Certificate, and then the foo.example certificate issued from Fluffy.</t>
          <t>This supports changing certification authorities, but it does not support changing the Subject Name of the signing entity.</t>
        </section>
      </section>
    </section>
    <section anchor="polling-for-changes-in-mud-files">
      <name>Polling for changes in MUD files</name>
      <t>The MUD file update mechanisms described in <xref target="updatemudfiles"/> requires that the MUD controller poll for updates.
The MUD controller will receive no signal about a change from the device because the URL will not have changed.</t>
      <t>The manufacturer SHOULD serve MUD files from a source for which ETag <xref section="2.3" sectionFormat="of" target="RFC7232"/> may be generated.
Static files on disk satisfy this requirement.
MUD files generated from a database process might not.
The use of ETag allows a MUD controller to more efficiently poll for changes in the file.</t>
      <t>A manufacturer should also serve MUD files with an HTTP Max-Age header as per <xref section="5.2.2.8" sectionFormat="of" target="RFC7234"/>.</t>
      <t>The MUD controller should take the Max-Age as an indication of when to next poll for updates to the MUD file.
Values of less than 1 hour, or more than 1 month should be considered out of range, and clamped into the range (1 hour, 1 month).</t>
      <t>MUD controllers SHOULD add some random jitter to the timing of their requests.
MUD controllers MAY use a single HTTP(S)/1.1 connection to retrieve all resources at the same destination.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>The MUD URL could contain sensitive information such as the model number and even firmware revision numbers.
Thus, the MUD URL may identify the make, model and revision of a device.</t>
      <t><xref target="RFC8520"/> already identifies this privacy concern, and suggests use of TLS so that the HTTP requests that retrieve the MUD file do not divulge that level of detail.</t>
      <t>The requirement for the MUD controller to poll for changes to MUD files results in multiple interactions between the MUD controller and the manufacturer whereas a more naive implementation might only interact once.
Even if HTTPS used, an observer of the traffic to that manufacturer will be revealing, and <xref target="RFC8520"/> goes on to suggest use of a proxy as well.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document makes no requests to IANA.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Prior to the standardization of the process in this document, if a device was infiltrated by malware, and said malware wished to make accesses beyond what the current MUD file allowed, the malware would have to:</t>
      <ol spacing="normal" type="1"><li>arrange for an equivalent MUD file to be visible somewhere on the Internet</li>
        <li>depend upon the MUD controller either not checking signatures, or</li>
        <li>somehow get the manufacturer to sign the alternate MUD file</li>
        <li>announce this new URL via DHCP or LLDP, updating the MUD controller with the new permissions.</li>
      </ol>
      <t>One way to accomplish (3) is to leverage the existence of MUD files created by the manufacturer for different classes of devices.
Such files would already be signed by the same manufacturer, eliminating the need to spoof a signature.</t>
      <t>With the standardization of the process in this document, then the attacker can no longer point to arbitrary MUD files in step 4, but can only make use of MUD files that the manufacturer has already provided for this device.</t>
      <t>Manufacturers are advised to maintain an orderly layout of MUD files in their web servers,
with each unique product having its own directory/pathname.</t>
      <t>The process described updates only MUD controllers and the processes that manufacturers use to manage the location of their MUD files.</t>
      <t>A manufacturer which has not managed their MUD files in the way described here can deploy new directories of per-product MUD files, and then can update the existing MUD files in place to point to the new URLs
using the MUD-URL attribute.</t>
      <t>There is therefore no significant flag day: MUD controllers may implement the new policy without significant concern about backwards compatibility.</t>
      <section anchor="updating-files-vs-updating-mud-urls">
        <name>Updating files vs Updating MUD URLs</name>
        <t>Device developers need to consider whether to make a change by updating a MUD file, or updating the MUD URL.</t>
        <t>MUD URLs can only be updated by shipping a new firmware.
It is reasonable to update the MUD URL whenever a new firmware release causes new connectivity to be required.
The updated mechanism defined in this document makes this a secure operation, and there is no practical limitation on the number of files that a web server can hold.</t>
        <t>In place updates to a MUD file should be restricted to cases where it turns out that the description was inaccurate: a missing connection, an inadvertent one authorized, or just incorrect information.</t>
        <t>Developers should be aware that many enterprise websites use outsourced content distribution networks, and MUD controllers are likely to cache files for some time.
Changes to MUD files will take some time to propagate through the various caches.
An updated MUD URL will however, not experience any cache issues, but can not be deployed with a firmware update.</t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC3986" target="https://www.rfc-editor.org/info/rfc3986" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3986.xml">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC8520" target="https://www.rfc-editor.org/info/rfc8520" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8520.xml">
          <front>
            <title>Manufacturer Usage Description Specification</title>
            <author fullname="E. Lear" initials="E." surname="Lear"/>
            <author fullname="R. Droms" initials="R." surname="Droms"/>
            <author fullname="D. Romascanu" initials="D." surname="Romascanu"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>This memo specifies a component-based architecture for Manufacturer Usage Descriptions (MUDs). The goal of MUD is to provide a means for end devices to signal to the network what sort of access and network functionality they require to properly function. The initial focus is on access control. Later work can delve into other aspects.</t>
              <t>This memo specifies two YANG modules, IPv4 and IPv6 DHCP options, a Link Layer Discovery Protocol (LLDP) TLV, a URL, an X.509 certificate extension, and a means to sign and verify the descriptions.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8520"/>
          <seriesInfo name="DOI" value="10.17487/RFC8520"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="I-D.ietf-opsawg-mud-tls" target="https://datatracker.ietf.org/doc/html/draft-ietf-opsawg-mud-tls-13" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-opsawg-mud-tls.xml">
          <front>
            <title>Manufacturer Usage Description (MUD) (D)TLS Profiles for IoT Devices</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dan Wing" initials="D." surname="Wing">
              <organization>Citrix Systems, Inc.</organization>
            </author>
            <author fullname="Blake Anderson" initials="B." surname="Anderson">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <date day="23" month="January" year="2024"/>
            <abstract>
              <t>This memo extends the Manufacturer Usage Description (MUD) specification to incorporate (D)TLS profile parameters. This allows a network security service to identify unexpected (D)TLS usage, which can indicate the presence of unauthorized software or malware on an endpoint.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-mud-tls-13"/>
        </reference>
        <reference anchor="I-D.richardson-mud-qrcode" target="https://datatracker.ietf.org/doc/html/draft-richardson-mud-qrcode-07" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.richardson-mud-qrcode.xml">
          <front>
            <title>Loading Manufacturer Usage Description (MUD) URLs from QR Codes</title>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Jacques Latour" initials="J." surname="Latour">
              <organization>CIRA Labs</organization>
            </author>
            <author fullname="Hassan Habibi Gharakheili" initials="H. H." surname="Gharakheili">
              <organization>UNSW Sydney</organization>
            </author>
            <date day="21" month="March" year="2022"/>
            <abstract>
              <t>This informational document details a protocol to load Manufacturer Usage Description (MUD) definitions from RFC 8520 for devices that do not have them integrated. This document is published to inform the Internet community of this mechanism to allow interoperability and to serve as a basis of other standards work if there is interest.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-richardson-mud-qrcode-07"/>
        </reference>
        <reference anchor="RFC7232" target="https://www.rfc-editor.org/info/rfc7232" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7232.xml">
          <front>
            <title>Hypertext Transfer Protocol (HTTP/1.1): Conditional Requests</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application- level protocol for distributed, collaborative, hypertext information systems. This document defines HTTP/1.1 conditional requests, including metadata header fields for indicating state changes, request header fields for making preconditions on such state, and rules for constructing the responses to a conditional request when one or more preconditions evaluate to false.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7232"/>
          <seriesInfo name="DOI" value="10.17487/RFC7232"/>
        </reference>
        <reference anchor="RFC7234" target="https://www.rfc-editor.org/info/rfc7234" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7234.xml">
          <front>
            <title>Hypertext Transfer Protocol (HTTP/1.1): Caching</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless \%application- level protocol for distributed, collaborative, hypertext information systems. This document defines HTTP caches and the associated header fields that control cache behavior or indicate cacheable response messages.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7234"/>
          <seriesInfo name="DOI" value="10.17487/RFC7234"/>
        </reference>
        <reference anchor="boycrieswolf" target="https://fablesofaesop.com/the-boy-who-cried-wolf.html">
          <front>
            <title>The Boy Who Cried Wolf</title>
            <author>
              <organization/>
            </author>
            <date year="2020" month="January" day="18"/>
          </front>
        </reference>
        <reference anchor="boywolfinfosec" target="https://www.infosecurity-magazine.com/opinions/security-alerts-boy-cried-wolf/">
          <front>
            <title>Security Alerts - A Case of the Boy Who Cried Wolf?</title>
            <author>
              <organization/>
            </author>
            <date year="2020" month="January" day="18"/>
          </front>
        </reference>
        <reference anchor="falsemalware" target="https://www.scmagazine.com/home/security-news/false-malware-alerts-cost-organizations-1-27m-annually-report-says/ and http://go.cyphort.com/Ponemon-Report-Page.html">
          <front>
            <title>False malware alerts cost organizations $1.27M annually, report says</title>
            <author>
              <organization/>
            </author>
            <date year="2020" month="January" day="18"/>
          </front>
        </reference>
        <reference anchor="I-D.jimenez-t2trg-mud-coap" target="https://datatracker.ietf.org/doc/html/draft-jimenez-t2trg-mud-coap-00" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.jimenez-t2trg-mud-coap.xml">
          <front>
            <title>Using MUD on CoAP environments</title>
            <author fullname="Jaime Jimenez" initials="J." surname="Jimenez">
              <organization>Ericsson</organization>
            </author>
            <date day="9" month="March" year="2020"/>
            <abstract>
              <t>This document provides some guidelines on how to add Manufacturer Usage Descriptions (MUD) to CoAP environments.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-jimenez-t2trg-mud-coap-00"/>
        </reference>
        <reference anchor="RFC9111" target="https://www.rfc-editor.org/info/rfc9111" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9111.xml">
          <front>
            <title>HTTP Caching</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document defines HTTP caches and the associated header fields that control cache behavior or indicate cacheable response messages.</t>
              <t>This document obsoletes RFC 7234.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="98"/>
          <seriesInfo name="RFC" value="9111"/>
          <seriesInfo name="DOI" value="10.17487/RFC9111"/>
        </reference>
      </references>
    </references>
    <section anchor="appendices">
      <name>Appendices</name>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="J." surname="Yang" fullname="Jie Yang">
        <organization/>
        <address>
          <email>jay.yang@huawei.com</email>
        </address>
      </contact>
      <contact initials="T." surname="Tang" fullname="Tianqing Tang">
        <organization/>
        <address>
          <email>tangtianqing@huawei.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
