<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.24 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-opsawg-sbom-access-05" category="std" consensus="true">
  <front>
    <title abbrev="Discovering SBOMs and Vuln. Info">Discovering and Retrieving Software Transparency and Vulnerability Information</title>

    <author initials="E." surname="Lear" fullname="Eliot Lear">
      <organization>Cisco Systems</organization>
      <address>
        <postal>
          <street>Richtistrasse 7</street>
          <city>Wallisellen</city>
          <code>CH-8304</code>
          <country>Switzerland</country>
        </postal>
        <phone>+41 44 878 9200</phone>
        <email>lear@cisco.com</email>
      </address>
    </author>
    <author initials="S." surname="Rose" fullname="Scott Rose">
      <organization>NIST</organization>
      <address>
        <postal>
          <street>100 Bureau Dr</street>
          <city>Gaithersburg MD</city>
          <code>20899</code>
          <country>USA</country>
        </postal>
        <phone>+1 301-975-8439</phone>
        <email>scott.rose@nist.gov</email>
      </address>
    </author>

    <date year="2022" month="March" day="06"/>

    
    
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>To improve cybersecurity posture, automation is necessary to locate
what software is running on a device, whether that software has known
vulnerabilities, and what, if any recommendations suppliers may have.
This memo specifies a model to provide access to this information.  It
may optionally be discovered through manufacturer usage descriptions.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>A number of activities have been working to improve visibility to what
software is running on a system, and what vulnerabilities that
software may have<xref target="EO2021"/>.</t>

<t>Put simply, we seek to answer two classes of questions <spanx style="strong">at scale</spanx>:</t>

<t><list style="symbols">
  <t>Is this system vulnerable to a particular vulnerability?</t>
  <t>Which devices in a particular environment contain vulnerabilities
that require some action?</t>
</list></t>

<t>This memo doesn’t specify the format of this information, but rather
only how to locate and retrieve these objects.</t>

<t>Software bills of materials (SBOMs) are descriptions of what software,
including versioning and dependencies, a device contains.  There
are different SBOM formats such as Software Package Data Exchange
<xref target="SPDX"/> or CycloneDX<xref target="CycloneDX12"/>.</t>

<t>System vulnerabilities may similarly be described using several data
formats, including the aforementioned CycloneDX, Common Vulnerability
Reporting Framework <xref target="CVRF"/>, the Common Security Advisory Format <xref target="CSAF"/>.
This information is typically used to report to customers the state of
a system.</t>

<t>These two classes of information can be used in concert.  For
instance, a network management tool may discover that a system makes
use of a particular software component that has a known vulnerability,
and a vulnerability report may be used to indicate what if any
versions of software correct that vulnerability, or whether the system
exercises the vulnerable code at all.</t>

<t>Both classes of information elements are optional under the model
specified in this memo.  One can provide only an SBOM, only
vulnerability information, or both an SBOM and vulnerability
information.</t>

<t>Note that SBOM formats may also carry other information, the most
common being any licensing terms.  Because this specification is
neutral regarding content, it is left for format developers such as
the Linux Foundation, OASIS, and ISO to decide what attributes they
will support.</t>

<t>This memo does not specify how vulnerability information may be
retrieved directly from the endpoint.  That’s because vulnerability
information changes occur at different rates to software updates.
However, some SBOM formats may also contain vulnerability information.</t>

<t>SBOMs and vulnerability information are advertised and retrieved
through the use of a YANG augmentation of the Manufacturer User
Description (MUD) model <xref target="RFC8520"/>.  Note that the schema creates a
grouping that can also be used independently of MUD.  Moreover, other
MUD features, such as access controls, needn’t be present.</t>

<t>The mechanisms specified in this document are meant to satisfy several
use cases:</t>

<t><list style="symbols">
  <t>A network-layer management system retrieving information from an IoT
device as part of its ongoing lifecycle. Such devices may or may not
have query interfaces available.</t>
  <t>An application-layer management system retrieving vulnerability or
SBOM information in order to evaluate the posture of an application
server of some form.  These application servers may themselves be
containers or hypervisors.  Discovery of the topology of a server is
beyond the scope of this memo.</t>
</list></t>

<t>To satisfy these two key use cases, objects may be found in one of
three ways:</t>

<t><list style="symbols">
  <t>on devices themselves</t>
  <t>on a web site (e.g., via URI)</t>
  <t>through some form of out-of-band contact with the supplier.</t>
</list></t>

<t>In the first case, devices will have interfaces that permit direct
retrieval.  Examples of these interfaces might be an HTTP, COAP
or <xref target="OpenC2"/> endpoint for retrieval.  There may also be private
interfaces as well.</t>

<t>In the second case, when a device does not have an appropriate
retrieval interface, but one is directly available from the
manufacturer, a URI to that information MUST be discovered.</t>

<t>In the third case, a supplier may wish to make an SBOM or
vulnerability information available under certain circumstances, and
may need to individually evaluate requests.  The result of that
evaluation might be the SBOM or vulnerability itself or a restricted
URL or no access.</t>

<t>To enable application-layer discovery, this memo defines a well-known
URI <xref target="RFC8615"/>.  Management or orchestration tools can query this
well-known URI to retrieve a system’s SBOM or vulnerability
information.  Further queries may be necessary based on the content
and structure of the response.</t>

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL
NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”,
“MAY”, and “OPTIONAL” in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<section anchor="how-this-information-is-retrieved" title="How This Information Is Retrieved">

<t>For devices that can emit a URL or can establish a well-known URI, the
mechanism may be highly automated.  For devices that have a URL in
either their documentation or within a QR code on a box, the mechanism
is semi-automated (someone has to scan the QR code or enter the URL).</t>

<t>Note that vulnerability and SBOM information is likely to  change at
different rates.  The MUD semantics provide a way for manufacturers
to control how often tooling should check for those changes through
the cache-validity node.</t>

</section>
<section anchor="formats" title="Formats">
<t>There are multiple ways to express both SBOMs and vulnerability
information.  When these are retrieved either directly from the device
or directly from a web server, tools will need to observe the
content-type header to determine precisely which format is being
transmitted.  Because IoT devices in particular have limited
capabilities, use of a specific Accept: header in HTTP or the Accept
Option in CoAP is NOT RECOMMENDED.  Instead, backend tooling is
encouraged to support all known formats, and SHOULD silently discard
SBOM information sent with a media type that is not understood.</t>

<t>Some formats may support both vulnerability and software inventory
information.  When both vulnerability and software inventory
information is available from the same location, both sbom and vuln
nodes MUST indicate that.  Network management systems retrieving
this information MUST take note that the identical resource is being
retrieved rather than retrieving it twice.</t>

</section>
<section anchor="discussion-points" title="Discussion points">
<t>The following is discussion to be removed at time of RFC publication.</t>

<t><list style="symbols">
  <t>Is the model structured correctly?</t>
  <t>Are there other retrieval mechanisms that need to be specified?</t>
  <t>Do we need to be more specific in how to authenticate and retrieve
SBOMs?</t>
  <t>What are the implications if the MUD URL is an extension in a certificate
(e.g. an IDevID cert)?</t>
</list></t>

</section>
</section>
<section anchor="the-well-known-transparency-endpoint-set" title="The well-known transparency endpoint set">

<t>Two well known endpoints are defined:</t>

<t><list style="symbols">
  <t>”/.well-known/sbom” retrieves an SBOM.</t>
  <t>”/.well-known/openc2” is the HTTPS binding to OpenC2.</t>
</list></t>

<t>As discussed previously, the precise format of a response is based on
the Content-type provided.</t>

</section>
<section anchor="the-mud-transparency-extension-model-extension" title="The mud-transparency extension model extension">

<t>We now formally define this extension.  This is done in two parts.
First, the extension name “transparency” is listed in the “extensions”
array of the MUD file.  N.B., this schema extension is intended to be
used wherever it might be appropriate (e.g., not just MUD).</t>

<t>Second, the “mud” container is augmented with a list of SBOM sources.</t>

<t>This is done as follows:</t>

<figure><artwork><![CDATA[
module: ietf-mud-transparency

  augment /mud:mud:
    +--rw transparency
       +--rw (sbom-retrieval-method)?
       |  +--:(cloud)
       |  |  +--rw sboms* [version-info]
       |  |     +--rw version-info    string
       |  |     +--rw sbom-url?       inet:uri
       |  +--:(local-well-known)
       |  |  +--rw sbom-local-well-known?   enumeration
       |  +--:(sbom-contact-info)
       |     +--rw sbom-contact-uri         inet:uri
       +--rw (vuln-retrieval-method)?
          +--:(cloud)
          |  +--rw vuln-url?                inet:uri
          +--:(vuln-contact-info)
             +--rw contact-uri              inet:uri
]]></artwork></figure>

</section>
<section anchor="the-mud-sbom-augmentation-to-the-mud-yang-model" title="The mud-sbom augmentation to the MUD YANG model">

<figure><artwork><![CDATA[
<CODE BEGINS>file "ietf-mud-transparency@2021-10-22.yang"
module ietf-mud-transparency {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-mud-transparency";
  prefix mudtx;

  import ietf-inet-types {
    prefix inet;
    reference "RFC 6991";
}
  import ietf-mud {
    prefix mud;
    reference "RFC 8520";
  }

  organization
    "IETF OPSAWG (Ops Area) Working Group";
  contact
    "WG Web: http://tools.ietf.org/wg/opsawg/
     WG List: opsawg@ietf.org

     Editor: Eliot Lear lear@cisco.com
     Editor: Scott Rose scott.rose@nist.gov";
  description
    "This YANG module augments the ietf-mud model to provide for
     reporting of SBOMs and vulnerability information.

     Copyright (c) 2020 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject to
     the license terms contained in, the Simplified BSD License set
     forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC XXXX
     (https://www.rfc-editor.org/info/rfcXXXX); 
     see the RFC itself for full legal notices.

     The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
     NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
     'MAY', and 'OPTIONAL' in this document are to be interpreted as
     described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
     they appear in all capitals, as shown here.  ";

  revision 2021-07-06 {
    description
      "Initial proposed standard.";
    reference
      "RFC XXXX: Discovering and Retrieving Software Transparency
       and Vulnerability Information";
  }

  grouping transparency-extension {
    description
      "Transparency extension grouping";
    container transparency {
      description
        "container of methods to get an SBOM.";
      choice sbom-retrieval-method {
        description
          "How to find SBOM information";
        case cloud {
          list sboms {
            key "version-info";
            description
              "A list of SBOMs tied to different s/w
               or h/w versions.";
            leaf version-info {
              type string;
              description
                "The version to which this SBOM refers.";
            }
            leaf sbom-url {
              type inet:uri;
              description
                "A statically located URI.";
            }
          }
        }
        case local-well-known {
          leaf sbom-local-well-known {
            type enumeration {
              enum http {
                description
                  "Use http (insecure) to retrieve 
                   SBOM information.  This method is NOT RECOMMENDED,
                   but may be unavoidable for certain classes of
                   deployment, where TLS has not or cannot be implemented";
              }
              enum https {
                description
                  "Use https (secure) to retrieve SBOM information.";
              }
              enum coap {
                description
                  "Use COAP (insecure) to retrieve SBOM.  This method
                  is NOT RECOMMENDED, although it may be unavoidable
                  for certain classes of implementations/deployments.";
              }
              enum coaps {
                description
                  "Use COAPS (secure) to retrieve SBOM";
              }
              enum openc2 {
                description
                  "Use OpenC2 endpoint.
                   This is https://{host}/.well-known/openc2";
              }
            }
            description
              "Which communication protocol to choose.";
          }
        }
        case sbom-contact-info {
          leaf sbom-contact-uri {
            type inet:uri;
            mandatory true;
            description
              "This MUST be either a tel, http, https, or
               mailto uri schema that customers can use to
               contact someone for SBOM information.";
          }
        }
      }
      choice vuln-retrieval-method {
        description
          "How to find vulnerability information";
        case cloud {
          leaf vuln-url {
            type inet:uri;
            description
              "A statically located URL.";
          }
        }
        case vuln-contact-info {
          leaf contact-uri {
            type inet:uri;
            mandatory true;
            description
              "This MUST be either a tel, http, https, or
               mailto uri schema that customers can use to
               contact someone for vulnerability information.";
          }
        }
      }
    }
  }

  augment "/mud:mud" {
    description
      "Add extension for software transparency.";
    uses transparency-extension;
  }
}
<CODE ENDS>
]]></artwork></figure>

</section>
<section anchor="examples" title="Examples">

<t>In this example MUD file that uses a cloud service, the modelX
presents a location of the SBOM in a URL.  Note, the ACLs in a MUD
file are NOT required, although they are a very good idea for IP-based
devices.</t>

<section anchor="without-acls" title="Without ACLS">

<t>This first MUD file demonstrates how to get SBOM and
vulnerability information without ACLs.</t>

<figure><artwork><![CDATA[
{
  "ietf-mud:mud": {
    "mud-version": 1,
    "extensions": [
      "ol",
      "transparency"
    ],
    "ol": {
      "owners": [
        "Copyright (c) Example, Inc. 2022. All Rights Reserved"
      ],
      "spdx-tag": "0BSD"
    },
    "mudtx:transparency": {
      "sbom-local-well-known": "https",
      "vuln-url": "https://iot.example.com/info/modelX/csaf.json"
    },
    "mud-url": "https://iot.example.com/modelX.json",
    "mud-signature": "https://iot.example.com/modelX.p7s",
    "last-update": "2022-01-05T13:29:12+00:00",
    "cache-validity": 48,
    "is-supported": true,
    "systeminfo": "retrieving vuln and SBOM info via a cloud service",
    "mfg-name": "Example, Inc.",
    "documentation": "https://iot.example.com/doc/modelX",
    "model-name": "modelX"
  }
}
]]></artwork></figure>

<t>The second example demonstrates that just SBOM information is included.</t>

<figure><artwork><![CDATA[
{
  "ietf-mud:mud": {
    "mud-version": 1,
    "extensions": [
      "ol",
      "transparency"
    ],
    "ol": {
      "owners": [
        "Copyright (c) Example, Inc. 2022. All Rights Reserved"
      ],
      "spdx-tag": "0BSD"
    },
    "mudtx:transparency": {
      "sbom-local-well-known": "https"
    },
    "mud-url": "https://iot.example.com/modelX.json",
    "mud-signature": "https://iot.example.com/modelX.p7s",
    "last-update": "2022-01-05T13:29:47+00:00",
    "cache-validity": 48,
    "is-supported": true,
    "systeminfo": "retrieving vuln and SBOM info via a cloud service",
    "mfg-name": "Example, Inc.",
    "documentation": "https://iot.example.com/doc/modelX",
    "model-name": "modelX"
  }
}
]]></artwork></figure>

</section>
<section anchor="sbom-located-on-the-device" title="SBOM Located on the Device">

<t>In this example, the SBOM is retrieved from the device, while
vulnerability information is available from the cloud.  This is likely
a common case, because vendors may learn of vulnerability information
more frequently than they update software.</t>

<figure><artwork><![CDATA[
{
  "ietf-mud:mud": {
    "mud-version": 1,
    "extensions": [
      "transparency"
    ],
    "mudtx:transparency": {
      "sbom-local-well-known": "https",
      "vuln-url": "https://iot-device.example.com/info/modelX/csaf.json"
    },
    "mud-url": "https://iot-device.example.com/modelX.json",
    "mud-signature": "https://iot-device.example.com/modelX.p7s",
    "last-update": "2022-01-05T13:25:14+00:00",
    "cache-validity": 48,
    "is-supported": true,
    "systeminfo": "retrieving vuln and SBOM info via a cloud service",
    "mfg-name": "Example, Inc.",
    "documentation": "https://iot-device.example.com/doc/modelX",
    "model-name": "modelX"
  }
}
]]></artwork></figure>

</section>
<section anchor="further-contact-required" title="Further contact required.">

<t>In this example, the network manager must take further steps
to retrieve SBOM information.  Vulnerability information is
still available.</t>

<figure><artwork><![CDATA[
{
 "ietf-mud:mud": {
  "mud-version": 1,
  "extensions": [
    "transparency"
  ],
  "ietf-mud-transparency:transparency": {
    "contact-info": "https://iot-device.example.com/contact-info.html",
    "vuln-url": "https://iot-device.example.com/info/modelX/csaf.json"
  },
  "mud-url": "https://iot-device.example.com/modelX.json",
  "mud-signature": "https://iot-device.example.com/modelX.p7s",
  "last-update": "2021-07-09T06:16:42+00:00",
  "cache-validity": 48,
  "is-supported": true,
  "systeminfo": "retrieving vuln and SBOM info via a cloud service",
  "mfg-name": "Example, Inc.",
  "documentation": "https://iot-device.example.com/doc/modelX",
  "model-name": "modelX"
 }
}
]]></artwork></figure>

</section>
<section anchor="with-acls" title="With ACLS">

<t>Finally, here is a complete example where the device provides
SBOM and vulnerability information, as well as access-control
information.</t>

<figure><artwork><![CDATA[
{
  "ietf-mud:mud": {
    "mud-version": 1,
    "extensions": [
      "ol",
      "transparency"
    ],
    "ol": {
      "owners": [
        "Copyright (c) Example, Inc. 2022. All Rights Reserved"
      ],
      "spdx-tag": "0BSD"
    },
    "mudtx:transparency": {
      "sbom-local-well-known": "https",
      "vuln-url": "https://iot.example.com/info/modelX/csaf.json"
    },
    "mud-url": "https://iot.example.com/modelX.json",
    "mud-signature": "https://iot.example.com/modelX.p7s",
    "last-update": "2022-01-05T13:30:31+00:00",
    "cache-validity": 48,
    "is-supported": true,
    "systeminfo": "retrieving vuln and SBOM info via a cloud service",
    "mfg-name": "Example, Inc.",
    "documentation": "https://iot.example.com/doc/modelX",
    "model-name": "modelX",
    "from-device-policy": {
      "access-lists": {
        "access-list": [
          {
            "name": "mud-65443-v4fr"
          }
        ]
      }
    },
    "to-device-policy": {
      "access-lists": {
        "access-list": [
          {
            "name": "mud-65443-v4to"
          }
        ]
      }
    }
  },
  "ietf-access-control-list:acls": {
    "acl": [
      {
        "name": "mud-65443-v4to",
        "type": "ipv4-acl-type",
        "aces": {
          "ace": [
            {
              "name": "cl0-todev",
              "matches": {
                "ipv4": {
                  "ietf-acldns:src-dnsname": "iotserver.example.com"
                }
              },
              "actions": {
                "forwarding": "accept"
              }
            }
          ]
        }
      },
      {
        "name": "mud-65443-v4fr",
        "type": "ipv4-acl-type",
        "aces": {
          "ace": [
            {
              "name": "cl0-frdev",
              "matches": {
                "ipv4": {
                  "ietf-acldns:dst-dnsname": "iotserver.example.com"
                }
              },
              "actions": {
                "forwarding": "accept"
              }
            }
          ]
        }
      }
    ]
  }
}

]]></artwork></figure>
<t>At this point, the management system can attempt to retrieve the SBOM,
and determine which format is in use through the content-type header
on the response to a GET request, independently repeat the process for
vulnerability information, and apply ACLs, as appropriate.</t>

</section>
</section>
<section anchor="security-considerations" title="Security Considerations">

<t>The YANG module specified in this document defines a schema for data
that is designed to be accessed via network management protocols such
as NETCONF <xref target="RFC6241"/> or RESTCONF <xref target="RFC8040"/>. The lowest NETCONF layer
is the secure transport layer, and the mandatory-to-implement secure
transport is Secure Shell (SSH) <xref target="RFC6242"/>. The lowest RESTCONF layer
is HTTPS, and the mandatory-to-implement secure transport is TLS
<xref target="RFC8446"/>.</t>

<t>N.B., for MUD, the mandatory method of retrieval is TLS.</t>

<t>The Network Configuration Access Control Model (NACM) <xref target="RFC8341"/>
provides the means to restrict access for particular NETCONF or
RESTCONF users to a preconfigured subset of all available NETCONF or
RESTCONF protocol operations and content.</t>

<t>There are a number of data nodes defined in this YANG module that are
writable/creatable/deletable (i.e., config true, which is the
default). These data nodes may be considered sensitive or vulnerable
in some network environments. Write operations (e.g., edit-config) to
these data nodes without proper protection can have a negative effect
on network operations. These are the subtrees and data nodes and their
sensitivity/vulnerability:</t>

<t>The ietf-mud-transparency module has no operational impact on the
element itself, and is used to discover state information that may be
available on or off the element.  In as much as the module itself is
made writeable, this only indicates a change in how to retrieve what
read-only elements.  However, that does not mean there are no risks.
These are discussed below, and are applicable to all nodes within
the transparency container.</t>

<t>If an attacker modifies the elements, they may misdirect automation to
retrieve a different set of URLs than was intended by the designer.  This
in turn leads to two specific sets of risks:</t>

<t><list style="symbols">
  <t>the information retrieved would be false.</t>
  <t>the URLs themselves point to malware.</t>
</list></t>

<t>To address either risk, any change in a URL, and in particular to the
authority section, should be treated with some suspicion.  One mitigation
would be to test any cloud-based URL against a reputation service.</t>

<t>Some of the readable data nodes in this YANG module may be considered
sensitive or vulnerable in some network environments. It is thus
important to control read access (e.g., via get, get-config, or
notification) to these data nodes. These are the subtrees and data
nodes and their sensitivity/vulnerability:</t>

<t>SBOMs provide an inventory of software.  If software is available to
an attacker, the attacker may well already be able to derive this very
same software inventory.  Manufacturers MAY restrict access to SBOM
information using appropriate authorization semantics within HTTP.  In
particular, if a system attempts to retrieve an SBOM via HTTP and the
client is not authorized, the server MUST produce an appropriate
error, with instructions on how to register a particular client.  One
example may be to issue a certificate to the client for this purpose
after a registration process has taken place.  Another example would
involve the use of OAUTH in combination with a federations of SBOM
servers.</t>

<t>Another risk is a skew in the SBOM listing and the actual software
inventory of a device/container. For example, a manufacturer may
update the SBOM on its server, but an individual device has not been
upgraded yet.  This may result in an incorrect policy being applied to
a device. A unique mapping of a device’s software version and its SBOM
can minimize this risk.</t>

<t>To further mitigate attacks against a device, manufacturers SHOULD
recommend access controls.</t>

<t>Vulnerability information is generally made available to such databases
as NIST’s National Vulnerability Database.  It is possible that vendor
may wish to release information early to some customers.  We do not
discuss here whether that is a good idea, but if it is employed, then
appropriate access controls and authorization SHOULD be applied to the
vulnerability resource.</t>

</section>
<section anchor="iana-considerations" title="IANA Considerations">

<section anchor="mud-extension" title="MUD Extension">

<t>The IANA is requested to add “transparency” to the MUD
extensions registry as follows:</t>

<figure><artwork><![CDATA[
  Extension Name: transparency
  Standard reference: This document

]]></artwork></figure>

</section>
<section anchor="yang-registration" title="YANG Registration">

<t>The following YANG module should be registered in the “YANG Module
Names” registry:</t>

<figure><artwork><![CDATA[
   Name: ietf-mud
   URN: urn:ietf:params:xml:ns:yang:ietf-mud-transparency
   Prefix: mudtx
   Registrant contact: The IESG
   Reference: This memo
]]></artwork></figure>

</section>
<section anchor="well-known-prefix" title="Well-Known Prefix">

<t>The following well known URIs are requested in accordance with
<xref target="RFC8615"/>:</t>

<figure><artwork><![CDATA[
  URI suffix: "sbom"
  Change controller: "IETF"
  Specification document: This memo
  Related information:  See ISO/IEC 19970-2 and SPDX.org

  URI suffix: "openc2"
  Change controller: "IETF"
  Specification document: This memo
  Related information:  OpenC2 Project

]]></artwork></figure>

</section>
</section>
<section anchor="acknowledgments" title="Acknowledgments">

<t>Thanks to Russ Housley, Dick Brooks, Tom Petch, Nicolas Comstedt, who
provided revew comments.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>



<reference anchor='RFC6991' target='https://www.rfc-editor.org/info/rfc6991'>
<front>
<title>Common YANG Data Types</title>
<author fullname='J. Schoenwaelder' initials='J.' role='editor' surname='Schoenwaelder'><organization/></author>
<date month='July' year='2013'/>
<abstract><t>This document introduces a collection of common data types to be used with the YANG data modeling language.  This document obsoletes RFC 6021.</t></abstract>
</front>
<seriesInfo name='RFC' value='6991'/>
<seriesInfo name='DOI' value='10.17487/RFC6991'/>
</reference>



<reference anchor='RFC6241' target='https://www.rfc-editor.org/info/rfc6241'>
<front>
<title>Network Configuration Protocol (NETCONF)</title>
<author fullname='R. Enns' initials='R.' role='editor' surname='Enns'><organization/></author>
<author fullname='M. Bjorklund' initials='M.' role='editor' surname='Bjorklund'><organization/></author>
<author fullname='J. Schoenwaelder' initials='J.' role='editor' surname='Schoenwaelder'><organization/></author>
<author fullname='A. Bierman' initials='A.' role='editor' surname='Bierman'><organization/></author>
<date month='June' year='2011'/>
<abstract><t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices.  It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages.  The NETCONF protocol operations are realized as remote procedure calls (RPCs).  This document obsoletes RFC 4741.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6241'/>
<seriesInfo name='DOI' value='10.17487/RFC6241'/>
</reference>



<reference anchor='RFC6242' target='https://www.rfc-editor.org/info/rfc6242'>
<front>
<title>Using the NETCONF Protocol over Secure Shell (SSH)</title>
<author fullname='M. Wasserman' initials='M.' surname='Wasserman'><organization/></author>
<date month='June' year='2011'/>
<abstract><t>This document describes a method for invoking and running the Network Configuration Protocol (NETCONF) within a Secure Shell (SSH) session as an SSH subsystem.  This document obsoletes RFC 4742.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6242'/>
<seriesInfo name='DOI' value='10.17487/RFC6242'/>
</reference>



<reference anchor='RFC8040' target='https://www.rfc-editor.org/info/rfc8040'>
<front>
<title>RESTCONF Protocol</title>
<author fullname='A. Bierman' initials='A.' surname='Bierman'><organization/></author>
<author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'><organization/></author>
<author fullname='K. Watsen' initials='K.' surname='Watsen'><organization/></author>
<date month='January' year='2017'/>
<abstract><t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t></abstract>
</front>
<seriesInfo name='RFC' value='8040'/>
<seriesInfo name='DOI' value='10.17487/RFC8040'/>
</reference>



<reference anchor='RFC8341' target='https://www.rfc-editor.org/info/rfc8341'>
<front>
<title>Network Configuration Access Control Model</title>
<author fullname='A. Bierman' initials='A.' surname='Bierman'><organization/></author>
<author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'><organization/></author>
<date month='March' year='2018'/>
<abstract><t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability.  There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content.  This document defines such an access control model.</t><t>This document obsoletes RFC 6536.</t></abstract>
</front>
<seriesInfo name='STD' value='91'/>
<seriesInfo name='RFC' value='8341'/>
<seriesInfo name='DOI' value='10.17487/RFC8341'/>
</reference>



<reference anchor='RFC8446' target='https://www.rfc-editor.org/info/rfc8446'>
<front>
<title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
<author fullname='E. Rescorla' initials='E.' surname='Rescorla'><organization/></author>
<date month='August' year='2018'/>
<abstract><t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t><t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t></abstract>
</front>
<seriesInfo name='RFC' value='8446'/>
<seriesInfo name='DOI' value='10.17487/RFC8446'/>
</reference>



<reference anchor='RFC8520' target='https://www.rfc-editor.org/info/rfc8520'>
<front>
<title>Manufacturer Usage Description Specification</title>
<author fullname='E. Lear' initials='E.' surname='Lear'><organization/></author>
<author fullname='R. Droms' initials='R.' surname='Droms'><organization/></author>
<author fullname='D. Romascanu' initials='D.' surname='Romascanu'><organization/></author>
<date month='March' year='2019'/>
<abstract><t>This memo specifies a component-based architecture for Manufacturer Usage Descriptions (MUDs).  The goal of MUD is to provide a means for end devices to signal to the network what sort of access and network functionality they require to properly function.  The initial focus is on access control.  Later work can delve into other aspects.</t><t>This memo specifies two YANG modules, IPv4 and IPv6 DHCP options, a Link Layer Discovery Protocol (LLDP) TLV, a URL, an X.509 certificate extension, and a means to sign and verify the descriptions.</t></abstract>
</front>
<seriesInfo name='RFC' value='8520'/>
<seriesInfo name='DOI' value='10.17487/RFC8520'/>
</reference>



<reference anchor='RFC8615' target='https://www.rfc-editor.org/info/rfc8615'>
<front>
<title>Well-Known Uniform Resource Identifiers (URIs)</title>
<author fullname='M. Nottingham' initials='M.' surname='Nottingham'><organization/></author>
<date month='May' year='2019'/>
<abstract><t>This memo defines a path prefix for &quot;well-known locations&quot;, &quot;/.well-known/&quot;, in selected Uniform Resource Identifier (URI) schemes.</t><t>In doing so, it obsoletes RFC 5785 and updates the URI schemes defined in RFC 7230 to reserve that space.  It also updates RFC 7595 to track URI schemes that support well-known URIs in their registry.</t></abstract>
</front>
<seriesInfo name='RFC' value='8615'/>
<seriesInfo name='DOI' value='10.17487/RFC8615'/>
</reference>




    </references>

    <references title='Informative References'>

<reference anchor="EO2021" >
  <front>
    <title>Executive Order 14028, Improving the Nations Cybersecurity</title>
    <author initials="J." surname="Biden" fullname="President Joseph Biden">
      <organization>United States Of America</organization>
    </author>
    <date year="2021" month="May"/>
  </front>
</reference>
<reference anchor="SPDX" >
  <front>
    <title>SPDX Specification 2.1</title>
    <author >
      <organization>The Linux Foundation</organization>
    </author>
    <date year="2016"/>
  </front>
</reference>
<reference anchor="CycloneDX12" >
  <front>
    <title>CycloneDX XML Reference v1.2</title>
    <author >
      <organization>cylonedx.org</organization>
    </author>
    <date year="2020" month="May"/>
  </front>
</reference>
<reference anchor="OpenC2" target="https://docs.oasis-open.org/openc2/open-impl-https/v1.0/open-impl-https-v1.0.html">
  <front>
    <title>Specification for Transfer of OpenC2 Messages via HTTPS Version 1.0</title>
    <author initials="D." surname="Lemire" fullname="David Lemire" role="editor">
      <organization>OASIS</organization>
    </author>
    <date year="2019" month="July"/>
  </front>
</reference>
<reference anchor="CSAF" target="https://github.com/oasis-tcs/csaf">
  <front>
    <title>Common Security Advisory Format</title>
    <author >
      <organization>OASIS</organization>
    </author>
    <date year="2021" month="July"/>
  </front>
</reference>
<reference anchor="CVRF" target="https://docs.oasis-open.org/csaf/csaf-cvrf/v1.2/csaf-cvrf-v1.2.pdf">
  <front>
    <title>Common Vulnerability Reporting Framework (CVRF) Version 1.2</title>
    <author initials="O." surname="Santos" fullname="Omar Santos" role="editor">
      <organization>OASIS</organization>
    </author>
    <date year="2017" month="September"/>
  </front>
</reference>


    </references>


<section anchor="changes-from-earlier-versions" title="Changes from Earlier Versions">

<t>Draft -04:
  * Address review comments</t>

<t>Draft -02:</t>

<t><list style="symbols">
  <t>include vulnerability information</t>
</list></t>

<t>Draft -01:</t>

<t><list style="symbols">
  <t>some modest changes</t>
</list></t>

<t>Draft -00:</t>

<t><list style="symbols">
  <t>Initial revision</t>
</list></t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

