<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-ietf-opsawg-sbom-access-16" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="Discovering SBOMs and Vuln. Info">Discovering and Retrieving Software Transparency and Vulnerability Information</title>

    <author initials="E." surname="Lear" fullname="Eliot Lear">
      <organization>Cisco Systems</organization>
      <address>
        <postal>
          <street>Richtistrasse 7</street>
          <city>Wallisellen</city>
          <code>CH-8304</code>
          <country>Switzerland</country>
        </postal>
        <phone>+41 44 878 9200</phone>
        <email>lear@cisco.com</email>
      </address>
    </author>
    <author initials="S." surname="Rose" fullname="Scott Rose">
      <organization>NIST</organization>
      <address>
        <postal>
          <street>100 Bureau Dr</street>
          <city>Gaithersburg MD</city>
          <code>20899</code>
          <country>USA</country>
        </postal>
        <phone>+1 301-975-8439</phone>
        <email>scott.rose@nist.gov</email>
      </address>
    </author>

    <date year="2023" month="April" day="26"/>

    
    
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>To improve cybersecurity posture, automation is necessary to locate
the software a device is using, and whether that software has known
vulnerabilities, and what, if any recommendations suppliers may have.
This memo extends the MUD YANG schema to provide the locations of software
bills of materials (SBOMS) and to vulnerability information by introducing
a transparency schema.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>A number of activities have been working to improve visibility to what
software is running on a system, and what vulnerabilities that
software may have <xref target="EO2021"/>.</t>

<t>Put simply, this memo seeks to answer two classes of questions to the
scale of tens of thousands of devices and a large variety of types of
devices.  Those questions are as the following:</t>

<t><list style="symbols">
  <t>Is this system vulnerable to a particular vulnerability?</t>
  <t>Which devices in a particular environment contain vulnerabilities
that require some action?</t>
</list></t>

<t>This memo doesn't specify the format of this information, but rather
only how to locate and retrieve these objects.  That is, the model is
intended to facilitate discovery, and on its own provides no access to the
underlying data.</t>

<t>Software bills of materials (SBOMs) are descriptions of what software,
including versioning and dependencies, a device contains.  There
are different SBOM formats such as Software Package Data Exchange
<xref target="SPDX"/> or CycloneDX<xref target="CycloneDX12"/>.</t>

<t>System vulnerabilities may similarly be described using several data
formats, including the aforementioned CycloneDX, Common Vulnerability
Reporting Framework <xref target="CVRF"/>, the Common Security Advisory Format
<xref target="CSAF"/>.  This information is typically used to report to
administrators the state of any known vulnerabilities on a system.</t>

<t>SBOM and vulnerability information can be used in concert with other
sources of vulnerability information.  For a network management tool
could discover that a system makes use of a particular set of software
components, searches a national vulnerability database to determine
known vulnerabilities, and then applies information provided the
manufacturer through this mechanism to produce a vulnerability report.
That report may be used to indicate what if any versions of software
correct that vulnerability, or whether the system exercises the
vulnerable code at all.</t>

<t>Both classes of information elements are optional under the model
specified in this memo.  One can provide only an SBOM, only
vulnerability information, or both an SBOM and vulnerability
information.</t>

<t>Note that SBOM formats may also carry other information, the most
common being any licensing terms.  Because this specification is
neutral regarding content, it is left for format developers such as
the Linux Foundation, OASIS, and ISO to decide what attributes they
will support.</t>

<t>This memo does not specify how vulnerability information may be
retrieved directly from the endpoint.  That's because vulnerability
information changes occur at different rates to software updates.
However, some SBOM formats may also contain vulnerability information.</t>

<t>SBOMs and vulnerability information are advertised and retrieved
through the use of a YANG augmentation of the Manufacturer User
Description (MUD) model <xref target="RFC8520"/>.  Note that the schema creates a
grouping that can also be used independently of MUD.  Moreover, other
MUD features, such as access controls, needn't be present.</t>

<t>The mechanisms specified in this document are meant to address two
use cases:</t>

<t><list style="symbols">
  <t>A network-layer management system retrieving information from an IoT
device as part of its ongoing lifecycle. Such devices may or may not
have query interfaces available.</t>
  <t>An application-layer management system retrieving vulnerability or
SBOM information in order to evaluate the posture of an application
server of some form.  These application servers may themselves be
containers or hypervisors.  Discovery of the topology of a server is
beyond the scope of this memo.</t>
</list></t>

<t>To satisfy these two key use cases, objects may be found in one of
three methods:</t>

<t><list style="symbols">
  <t>on devices themselves</t>
  <t>on a website (e.g., via URI)</t>
  <t>through some form of out-of-band contact with the supplier.</t>
</list></t>

<t>Using the first method, devices will have interfaces that permit
direct retrieval.  Examples of these interfaces might be an HTTP
<xref target="RFC9110"/>, or COAP <xref target="RFC7252"/> endpoint for retrieval.
There may also be private interfaces as well.</t>

<t>Using the second method, when a device does not have an appropriate
retrieval interface, but one is directly available from the
manufacturer, a URI to that information is discovered through
interfaces such as MUD via DHCP or bootstrapping and ownership
transfer mechanisms.</t>

<t>Using the third method, a supplier may wish to make an SBOM or
vulnerability information available under certain circumstances, and
may need to individually evaluate requests.  The result of that
evaluation might be the SBOM or vulnerability itself or a restricted
URL or no access.</t>

<t>To enable application-layer discovery, this memo defines a well-known
URI <xref target="RFC8615"/>.  Management or orchestration tools can query this
well-known URI to retrieve a system's SBOM information.  Further
queries may be necessary based on the content and structure of the
response.</t>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<section anchor="how-this-information-is-retrieved"><name>How This Information Is Retrieved</name>

<t>Section 4 describes a data model to extend the MUD file format to carry SBOM
and vulnerability information.  Section 1.5 of RFC8520 describes mechanisms by
which devices can emit a URL to point to this file.  Additionally, devices can
share this URL either through documentation or within a QR code on a box. 
Section 2 describes a well-known URL from which an SBOM could be served from
the local device.</t>

<t>Note that vulnerability and SBOM information are likely to change at
different rates.  MUD's cache-validity node provides a way for
manufacturers to control how often tooling should check for those
changes through the cache-validity node.</t>

</section>
<section anchor="formats"><name>Formats</name>
<t>There are multiple ways to express both SBOMs and vulnerability
information.  When these are retrieved either from the device
or from a remote web server, tools will need to observe the
Content-Type header to determine precisely which format is being
transmitted.  Because IoT devices in particular have limited
capabilities, use of a specific Accept: header in HTTP or the Accept
Option in CoAP is NOT RECOMMENDED.  Instead, backend tooling is
encouraged to support all known formats, and SHOULD silently discard
SBOM information sent with a media type that is not understood.</t>

<t>If multiple SBOMs are intended to be supported in the same file, the
media type should properly reflect that.  For example, one might make
use of application/{someformat}+json-seq.  It is left to those
supporting those formats to make the appropriate registrations in this
case.</t>

<t>Some formats may support both vulnerability and software inventory
information.  When both vulnerability and software inventory
information is available from the same URL, both sbom-url and
vuln-url nodes MUST indicate that.  Network management systems
retrieving this information MUST take note that the identical resource
is being retrieved rather than retrieving it twice.</t>

</section>
</section>
<section anchor="the-well-known-transparency-endpoint-set"><name>The well-known transparency endpoint set</name>

<t>A well-known endpoint is defined:</t>

<t><list style="symbols">
  <t>"/.well-known/sbom" retrieves an SBOM.</t>
</list></t>

<t>As discussed previously, the precise format of a response is based on
the Content-type provided.</t>

</section>
<section anchor="the-mud-transparency-extension-model-extension"><name>The mud-transparency extension model extension</name>

<t>We now formally define this extension.  This is done in two parts.
First, the extension name "transparency" is listed in the "extensions"
array of the MUD file.  N.B., this schema extension is intended to be
used wherever it might be appropriate (e.g., not just MUD).</t>

<t>Second, the "mud" container is augmented with a list of SBOM sources.</t>

<t>This is done as follows:</t>

<figure><artwork><![CDATA[
module: ietf-mud-transparency

  augment /mud:mud:
    +--rw transparency
       +--rw (sbom-retrieval-method)?
       |  +--:(cloud)
       |  |  +--rw sboms* [version-info]
       |  |     +--rw version-info    string
       |  |     +--rw sbom-url?       inet:uri
       |  +--:(local-well-known)
       |  |  +--rw sbom-local-well-known?   identityref
       |  +--:(sbom-contact-info)
       |     +--rw sbom-contact-uri?        inet:uri
       +--rw sbom-archive-list?             inet:uri
       +--rw (vuln-retrieval-method)?
          +--:(cloud)
          |  +--rw vuln-url?                inet:uri
          +--:(vuln-contact-info)
             +--rw vuln-contact-uri?        inet:uri
]]></artwork></figure>

<t>See <xref target="RFC8340"/> for a description of YANG trees.</t>

</section>
<section anchor="the-mud-sbom-augmentation-to-the-mud-yang-model"><name>The mud-sbom augmentation to the MUD YANG model</name>

<figure><artwork><![CDATA[
<CODE BEGINS>file "ietf-mud-transparency@2023-01-12.yang"
module ietf-mud-transparency {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-mud-transparency";
  prefix mudtx;

  import ietf-inet-types {
    prefix inet;
    reference
      "RFC 6991";
  }
  import ietf-mud {
    prefix mud;
    reference
      "RFC 8520";
  }

  organization
    "IETF OPSAWG (Ops Area) Working Group";
  contact
    "WG Web: https://datatracker.ietf.org/wg/opsawg/
     WG List: opsawg@ietf.org

     Editor: Eliot Lear lear@cisco.com
     Editor: Scott Rose scott.rose@nist.gov";
  description
    "This YANG module augments the ietf-mud model to provide for
     reporting of SBOMs and vulnerability information.

     Copyright (c) 2023 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject to
     the license terms contained in, the Revised BSD License set
     forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC XXXX
     (https://www.rfc-editor.org/info/rfcXXXX);
     see the RFC itself for full legal notices.

     The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
     NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
     'MAY', and 'OPTIONAL' in this document are to be interpreted as
     described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
     they appear in all capitals, as shown here.  ";

  revision 2023-01-12 {
    description
      "Initial proposed standard.";
    reference
      "RFC XXXX: Discovering and Retrieving Software Transparency
       and Vulnerability Information";
  }

  identity local-type {
    description
      "Base identity for local-well-known choices";
  }

  identity http {
    base mudtx:local-type;
    description
      "Use http[RFC7231] (insecure) to retrieve SBOM information.
        This method is NOT RECOMMENDED, but may be unavoidable for
        certain classes of deployment, where TLS has not or
        cannot be implemented";
  }

  identity https {
    base mudtx:local-type;
    description
      "Use https (secure) to retrieve SBOM information. See
       RFC 9110.";
  }

  identity coap {
    base mudtx:local-type;
    description
      "Use COAP [RFC7252] (insecure) to retrieve SBOM.  This method
       is NOT RECOMMENDED, although it may be unavoidable
       for certain classes of implementations/deployments.";
  }

  identity coaps {
    base mudtx:local-type;
    description
      "Use COAPS (secure) to retrieve SBOM [RFC7252]";
  }

  grouping transparency-extension {
    description
      "This grouping provides a means to describe the location of
       software bills of material and vulnerability descriptions.";
    container transparency {
      description
        "Container of methods to get SBOMs and vulnerability
         information.";
      choice sbom-retrieval-method {
        description
          "How to find SBOM information";
        case cloud {
          list sboms {
            key "version-info";
            description
              "A list of SBOMs tied to different software
               or hardware versions.";
            leaf version-info {
              type string;
              description
                "The version to which this SBOM refers.";
            }
            leaf sbom-url {
              type inet:uri {
                pattern '((coaps?)|(https?)):.*';
              }
              description
                "A statically located URL.";
            }
          }
        }
        case local-well-known {
          leaf sbom-local-well-known {
            type identityref {
              base mudtx:local-type;
            }
            description
              "Which communication protocol to choose.";
          }
        }
        case sbom-contact-info {
          leaf sbom-contact-uri {
            type inet:uri {
              pattern '((mailto)|(https?)|(tel)):.*';
            }
            description
              "This MUST be either a tel, http, https, or
               mailto uri schema that customers can use to
               contact someone for SBOM information.";
          }
        }
      }
      leaf sbom-archive-list {
        type inet:uri;
        description
          "This URI returns a JSON list of URLs that consist of
           SBOMs that were previously published for this
           device.  Publication dates can be found inside 
           the SBOMs.";
      }
      choice vuln-retrieval-method {
        description
          "How to find vulnerability information";
        case cloud {
          leaf vuln-url {
            type inet:uri;
            description
              "A statically located URL that references
              vulnerability information";
          }
        }
        case vuln-contact-info {
          leaf vuln-contact-uri {
            type inet:uri {
               pattern '((mailto)|(https?)|(tel)):.*';
            }
            description
              "This MUST be either a tel, http, https, or
               mailto uri schema that customers can use to
               contact someone for vulnerability information.";
          }
        }
      }
    }
  }

  augment "/mud:mud" {
    description
      "Add extension for software transparency.";
    uses transparency-extension;
  }
}
<CODE ENDS>
]]></artwork></figure>

</section>
<section anchor="examples"><name>Examples</name>

<t>In this example MUD file that uses a cloud service, the modelX
presents a location of the SBOM in a URL.  Note, the ACLs in a MUD
file are NOT required, although they are a very good idea for IP-based
devices.</t>

<section anchor="without-acls"><name>Without ACLS</name>

<t>This first MUD file demonstrates how to get SBOM and
vulnerability information without ACLs.</t>

<figure><artwork><![CDATA[
{
  "ietf-mud:mud": {
    "mud-version": 1,
    "extensions": [
      "transparency"
    ],
    "mudtx:transparency": {
      "sbom-local-well-known": "https",
      "vuln-url": "https://iot.example.com/info/modelX/csaf.json"
    },
    "mud-url": "https://iot.example.com/modelX.json",
    "mud-signature": "https://iot.example.com/modelX.p7s",
    "last-update": "2022-01-05T13:29:12+00:00",
    "cache-validity": 48,
    "is-supported": true,
    "systeminfo": "retrieving vuln and SBOM info via a cloud service",
    "mfg-name": "Example, Inc.",
    "documentation": "https://iot.example.com/doc/modelX",
    "model-name": "modelX"
  }
}
]]></artwork></figure>

<t>The second example demonstrates that just SBOM information is included.</t>

<figure><artwork><![CDATA[
{
  "ietf-mud:mud": {
    "mud-version": 1,
    "extensions": [
      "transparency"
    ],
    "mudtx:transparency": {
      "sbom-local-well-known": "https"
    },
    "mud-url": "https://iot.example.com/modelX.json",
    "mud-signature": "https://iot.example.com/modelX.p7s",
    "last-update": "2022-01-05T13:29:47+00:00",
    "cache-validity": 48,
    "is-supported": true,
    "systeminfo": "retrieving SBOM info via a cloud service",
    "mfg-name": "Example, Inc.",
    "documentation": "https://iot.example.com/doc/modelX",
    "model-name": "modelX"
  }
}
]]></artwork></figure>

</section>
<section anchor="sbom-located-on-the-device"><name>SBOM Located on the Device</name>

<t>In this example, the SBOM is retrieved from the device, while
vulnerability information is available from the cloud.  This is likely
a common case, because vendors may learn of vulnerability information
more frequently than they update software.</t>

<figure><artwork><![CDATA[
{
  "ietf-mud:mud": {
    "mud-version": 1,
    "extensions": [
      "transparency"
    ],
    "mudtx:transparency": {
      "sbom-local-well-known": "https",
      "vuln-url": "https://iot-device.example.com/info/modelX/csaf.json"
    },
    "mud-url": "https://iot-device.example.com/modelX.json",
    "mud-signature": "https://iot-device.example.com/modelX.p7s",
    "last-update": "2022-01-05T13:25:14+00:00",
    "cache-validity": 48,
    "is-supported": true,
    "systeminfo": "mixed example: SBOM on device, vuln info in cloud",
    "mfg-name": "Example, Inc.",
    "documentation": "https://iot-device.example.com/doc/modelX",
    "model-name": "modelX"
  }
}
]]></artwork></figure>

</section>
<section anchor="further-contact-required"><name>Further contact required.</name>

<t>In this example, the network manager must take further steps
to retrieve SBOM information.  Vulnerability information is
still available.</t>

<figure><artwork><![CDATA[
{
 "ietf-mud:mud": {
  "mud-version": 1,
  "extensions": [
    "transparency"
  ],
  "ietf-mud-transparency:transparency": {
    "contact-info": "https://iot-device.example.com/contact-info.html",
    "vuln-url": "https://iot-device.example.com/info/modelX/csaf.json"
  },
  "mud-url": "https://iot-device.example.com/modelX.json",
  "mud-signature": "https://iot-device.example.com/modelX.p7s",
  "last-update": "2021-07-09T06:16:42+00:00",
  "cache-validity": 48,
  "is-supported": true,
  "systeminfo": "retrieving vuln and SBOM info via a cloud service",
  "mfg-name": "Example, Inc.",
  "documentation": "https://iot-device.example.com/doc/modelX",
  "model-name": "modelX"
 }
}
]]></artwork></figure>

</section>
<section anchor="with-acls"><name>With ACLS</name>

<t>Finally, here is a complete example where the device provides
SBOM and vulnerability information, as well as access-control
information.</t>

<figure><artwork><![CDATA[
{
  "ietf-mud:mud": {
    "mud-version": 1,
    "extensions": [
      "transparency"
    ],
    "mudtx:transparency": {
      "sbom-local-well-known": "https",
      "vuln-url": "https://iot.example.com/info/modelX/csaf.json"
    },
    "mud-url": "https://iot.example.com/modelX.json",
    "mud-signature": "https://iot.example.com/modelX.p7s",
    "last-update": "2022-01-05T13:30:31+00:00",
    "cache-validity": 48,
    "is-supported": true,
    "systeminfo": "retrieving vuln and SBOM info via a cloud service",
    "mfg-name": "Example, Inc.",
    "documentation": "https://iot.example.com/doc/modelX",
    "model-name": "modelX",
    "from-device-policy": {
      "access-lists": {
        "access-list": [
          {
            "name": "mud-65443-v4fr"
          }
        ]
      }
    },
    "to-device-policy": {
      "access-lists": {
        "access-list": [
          {
            "name": "mud-65443-v4to"
          }
        ]
      }
    }
  },
  "ietf-access-control-list:acls": {
    "acl": [
      {
        "name": "mud-65443-v4to",
        "type": "ipv4-acl-type",
        "aces": {
          "ace": [
            {
              "name": "cl0-todev",
              "matches": {
                "ipv4": {
                  "ietf-acldns:src-dnsname": "iotserver.example.com"
                }
              },
              "actions": {
                "forwarding": "accept"
              }
            }
          ]
        }
      },
      {
        "name": "mud-65443-v4fr",
        "type": "ipv4-acl-type",
        "aces": {
          "ace": [
            {
              "name": "cl0-frdev",
              "matches": {
                "ipv4": {
                  "ietf-acldns:dst-dnsname": "iotserver.example.com"
                }
              },
              "actions": {
                "forwarding": "accept"
              }
            }
          ]
        }
      }
    ]
  }
}

]]></artwork></figure>
<t>At this point, the management system can attempt to retrieve the SBOM,
and determine which format is in use through the content-type header
on the response to a GET request, independently repeat the process for
vulnerability information, and apply ACLs, as appropriate.</t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>
<t>This document describes a schema for discovering the location of
information relating to software transparency, and does not specify
the access model for the information itself.  In particular, the YANG
module specified in this document is not necessarily intended to be
accessed via regular network management protocols, such as the NETCONF
<xref target="RFC6241"></xref> or RESTCONF <xref target="RFC8040"></xref>, and hence the regular security
considerations for such usage are not considered here.</t>

<t>We describe below protections relating to both discovery and some
advice on protecting the underlying SBOM/vulnerability information.</t>

<t>The model specifies both encrypted and unencrypted means to retrieve
information.  This is a matter of pragmatism.  Unencrypted
communications allow for manipulation of information being retrieved.
Therefore, it is RECOMMENDED that implementations offer a means to
configure endpoints so that they may make use of TLS or DTLS.</t>

<t>The ietf-mud-transparency module has no operational impact on the
element itself, and is used to discover state information that may be
available on or off the element.  In as much as the module itself is
made writeable, this only indicates a change in how to retrieve
read-only elements.  There is no means, for instance, to upload an
SBOM.  Additional risks are discussed below, and are applicable to all
nodes within the transparency container.</t>

<t>If an attacker modifies the elements, they may misdirect automation to
retrieve a different set of URLs than was intended by the designer.  This
in turn leads to two specific sets of risks:</t>

<t><list style="symbols">
  <t>the information retrieved would be false.</t>
  <t>the URLs themselves point to malware.</t>
</list></t>

<t>To address either risk, any change in a URL, and in particular to the
authority section, two approaches may be used:</t>

<t><list style="symbols">
  <t>test any cloud-based URL against a reputation service.</t>
  <t>provide the administrator an opportunity to approve further procesisng
when the authority changes to one not known to be reputable.</t>
</list></t>

<t>SBOMs provide an inventory of software.  Knowledge of which specific
software is loaded on a system can aid an attacker in identifying an
appropriate exploit for a known vulnerability or guide the development
of novel exploit against this system.  However, if software is
available to an attacker, the attacker may well already be able to
derive this very same software inventory.  When this information
resides on the endpoint itself, the endpoint SHOULD NOT provide
unrestricted access to the well-known URL by default.</t>

<t>Other servers that offer the data MAY restrict access to SBOM
information using appropriate authorization semantics within HTTP.
One way to do this would be to issue a certificate to the client for
this purpose after a registration process has taken place.  Another
approach would involve the use of OAUTH in combination.  In
particular, if a system attempts to retrieve an SBOM via HTTP or COAP
and the client is not authorized, the server MUST produce an
appropriate error, with instructions on how to register a particular
client.</t>

<t>Another risk is a skew in the SBOM listing and the actual software
inventory of a device/container. For example, a manufacturer may
update the SBOM on its server, but an individual device has not been
upgraded yet.  This may result in an incorrect policy being applied to
a device. A unique mapping of a device's software version and its SBOM
can minimize this risk.</t>

<t>To further mitigate attacks against a device, manufacturers SHOULD
recommend network access controls.</t>

<t>Vulnerability information is generally made available to such
databases as NIST's National Vulnerability Database <xref target="NISTNVD"/>.  It
is possible that vendors may wish to release information early to some
customers.  We do not discuss here whether that is a good idea, but if
it is employed, then appropriate access controls and authorization
SHOULD be applied to that information.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<section anchor="mud-extension"><name>MUD Extension</name>

<t>The IANA is requested to add "transparency" to the MUD
extensions registry as follows:</t>

<figure><artwork><![CDATA[
  Extension Name: transparency
  Standard reference: This document

]]></artwork></figure>

</section>
<section anchor="yang-registration"><name>YANG Registration</name>

<t>The following YANG module should be registered in the "YANG Module
Names" registry:</t>

<figure><artwork><![CDATA[
   Name: ietf-mud
   URN: urn:ietf:params:xml:ns:yang:ietf-mud-transparency
   Prefix: mudtx
   Registrant contact: The IESG
   Reference: This memo
]]></artwork></figure>

<t>The following XML registration is requested:</t>

<figure><artwork><![CDATA[
   URI: urn:ietf:params:xml:ns:yang:ietf-mud-transparency
   Registrant Contact: IESG
   XML: None.  Namespace URIs do not represent an XML specification.
]]></artwork></figure>

</section>
<section anchor="well-known-prefix"><name>Well-Known Prefix</name>

<t>The following well known URI is requested in accordance with
<xref target="RFC8615"/>:</t>

<figure><artwork><![CDATA[
  URI suffix: "sbom"
  Change controller: "IETF"
  Specification document: This memo
  Related information:  See ISO/IEC 5962:2021 and SPDX.org

]]></artwork></figure>

</section>
</section>
<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>Thanks to Russ Housley, Dick Brooks, Tom Petch, Nicolas Comstedt, who
provided review comments.</t>

</section>


  </middle>

  <back>


    <references title='Normative References'>





<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC6241' target='https://www.rfc-editor.org/info/rfc6241'>
<front>
<title>Network Configuration Protocol (NETCONF)</title>
<author fullname='R. Enns' initials='R.' role='editor' surname='Enns'><organization/></author>
<author fullname='M. Bjorklund' initials='M.' role='editor' surname='Bjorklund'><organization/></author>
<author fullname='J. Schoenwaelder' initials='J.' role='editor' surname='Schoenwaelder'><organization/></author>
<author fullname='A. Bierman' initials='A.' role='editor' surname='Bierman'><organization/></author>
<date month='June' year='2011'/>
<abstract><t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices.  It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages.  The NETCONF protocol operations are realized as remote procedure calls (RPCs).  This document obsoletes RFC 4741.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6241'/>
<seriesInfo name='DOI' value='10.17487/RFC6241'/>
</reference>



<reference anchor='RFC6991' target='https://www.rfc-editor.org/info/rfc6991'>
<front>
<title>Common YANG Data Types</title>
<author fullname='J. Schoenwaelder' initials='J.' role='editor' surname='Schoenwaelder'><organization/></author>
<date month='July' year='2013'/>
<abstract><t>This document introduces a collection of common data types to be used with the YANG data modeling language.  This document obsoletes RFC 6021.</t></abstract>
</front>
<seriesInfo name='RFC' value='6991'/>
<seriesInfo name='DOI' value='10.17487/RFC6991'/>
</reference>



<reference anchor='RFC7252' target='https://www.rfc-editor.org/info/rfc7252'>
<front>
<title>The Constrained Application Protocol (CoAP)</title>
<author fullname='Z. Shelby' initials='Z.' surname='Shelby'><organization/></author>
<author fullname='K. Hartke' initials='K.' surname='Hartke'><organization/></author>
<author fullname='C. Bormann' initials='C.' surname='Bormann'><organization/></author>
<date month='June' year='2014'/>
<abstract><t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks.  The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s.  The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t><t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types.  CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t></abstract>
</front>
<seriesInfo name='RFC' value='7252'/>
<seriesInfo name='DOI' value='10.17487/RFC7252'/>
</reference>



<reference anchor='RFC8040' target='https://www.rfc-editor.org/info/rfc8040'>
<front>
<title>RESTCONF Protocol</title>
<author fullname='A. Bierman' initials='A.' surname='Bierman'><organization/></author>
<author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'><organization/></author>
<author fullname='K. Watsen' initials='K.' surname='Watsen'><organization/></author>
<date month='January' year='2017'/>
<abstract><t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t></abstract>
</front>
<seriesInfo name='RFC' value='8040'/>
<seriesInfo name='DOI' value='10.17487/RFC8040'/>
</reference>



<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>



<reference anchor='RFC9110' target='https://www.rfc-editor.org/info/rfc9110'>
<front>
<title>HTTP Semantics</title>
<author fullname='R. Fielding' initials='R.' role='editor' surname='Fielding'><organization/></author>
<author fullname='M. Nottingham' initials='M.' role='editor' surname='Nottingham'><organization/></author>
<author fullname='J. Reschke' initials='J.' role='editor' surname='Reschke'><organization/></author>
<date month='June' year='2022'/>
<abstract><t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the &quot;http&quot; and &quot;https&quot; Uniform Resource Identifier (URI) schemes. </t><t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t></abstract>
</front>
<seriesInfo name='STD' value='97'/>
<seriesInfo name='RFC' value='9110'/>
<seriesInfo name='DOI' value='10.17487/RFC9110'/>
</reference>



<reference anchor='RFC8520' target='https://www.rfc-editor.org/info/rfc8520'>
<front>
<title>Manufacturer Usage Description Specification</title>
<author fullname='E. Lear' initials='E.' surname='Lear'><organization/></author>
<author fullname='R. Droms' initials='R.' surname='Droms'><organization/></author>
<author fullname='D. Romascanu' initials='D.' surname='Romascanu'><organization/></author>
<date month='March' year='2019'/>
<abstract><t>This memo specifies a component-based architecture for Manufacturer Usage Descriptions (MUDs).  The goal of MUD is to provide a means for end devices to signal to the network what sort of access and network functionality they require to properly function.  The initial focus is on access control.  Later work can delve into other aspects.</t><t>This memo specifies two YANG modules, IPv4 and IPv6 DHCP options, a Link Layer Discovery Protocol (LLDP) TLV, a URL, an X.509 certificate extension, and a means to sign and verify the descriptions.</t></abstract>
</front>
<seriesInfo name='RFC' value='8520'/>
<seriesInfo name='DOI' value='10.17487/RFC8520'/>
</reference>



<reference anchor='RFC8615' target='https://www.rfc-editor.org/info/rfc8615'>
<front>
<title>Well-Known Uniform Resource Identifiers (URIs)</title>
<author fullname='M. Nottingham' initials='M.' surname='Nottingham'><organization/></author>
<date month='May' year='2019'/>
<abstract><t>This memo defines a path prefix for &quot;well-known locations&quot;, &quot;/.well-known/&quot;, in selected Uniform Resource Identifier (URI) schemes.</t><t>In doing so, it obsoletes RFC 5785 and updates the URI schemes defined in RFC 7230 to reserve that space.  It also updates RFC 7595 to track URI schemes that support well-known URIs in their registry.</t></abstract>
</front>
<seriesInfo name='RFC' value='8615'/>
<seriesInfo name='DOI' value='10.17487/RFC8615'/>
</reference>




    </references>

    <references title='Informative References'>

<reference anchor="EO2021" >
  <front>
    <title>Executive Order 14028, Improving the Nations Cybersecurity</title>
    <author initials="J." surname="Biden" fullname="President Joseph Biden">
      <organization>United States Of America</organization>
    </author>
    <date year="2021" month="May"/>
  </front>
</reference>
<reference anchor="SPDX" target="https://spdx.github.io/spdx-spec/v2.3/">
  <front>
    <title>SPDX Specification V2.3</title>
    <author >
      <organization>The Linux Foundation</organization>
    </author>
    <date year="2022"/>
  </front>
</reference>
<reference anchor="CycloneDX12" >
  <front>
    <title>CycloneDX XML Reference v1.2</title>
    <author >
      <organization>cyclonedx.org</organization>
    </author>
    <date year="2020" month="May"/>
  </front>
</reference>
<reference anchor="CSAF" target="https://docs.oasis-open.org/csaf/csaf/v2.0/csaf-v2.0.html">
  <front>
    <title>Common Security Advisory Framework Version 2.0</title>
    <author initials="L." surname="Rock" fullname="Langley Rock" role="editor">
      <organization>OASIS</organization>
    </author>
    <author initials="S." surname="Hagen" fullname="Stefan Hagen" role="editor">
      <organization>OASIS</organization>
    </author>
    <author initials="T." surname="Schmidt" fullname="Thomas Schmidt" role="editor">
      <organization>OASIS</organization>
    </author>
    <date year="2022" month="November"/>
  </front>
</reference>
<reference anchor="CVRF" target="https://docs.oasis-open.org/csaf/csaf-cvrf/v1.2/csaf-cvrf-v1.2.pdf">
  <front>
    <title>Common Vulnerability Reporting Framework (CVRF) Version 1.2</title>
    <author initials="S." surname="Hagen" fullname="Stefan Hagen" role="editor">
      <organization>OASIS</organization>
    </author>
    <date year="2017" month="September"/>
  </front>
</reference>
<reference anchor="NISTNVD" target="https://nvd.nist.gov">
  <front>
    <title>National Vulnerability Database</title>
    <author >
      <organization>NIST</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>




<reference anchor='RFC8340' target='https://www.rfc-editor.org/info/rfc8340'>
<front>
<title>YANG Tree Diagrams</title>
<author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'><organization/></author>
<author fullname='L. Berger' initials='L.' role='editor' surname='Berger'><organization/></author>
<date month='March' year='2018'/>
<abstract><t>This document captures the current syntax used in YANG module tree diagrams.  The purpose of this document is to provide a single location for this definition.  This syntax may be updated from time to time based on the evolution of the YANG language.</t></abstract>
</front>
<seriesInfo name='BCP' value='215'/>
<seriesInfo name='RFC' value='8340'/>
<seriesInfo name='DOI' value='10.17487/RFC8340'/>
</reference>




    </references>


<section anchor="changes-from-earlier-versions"><name>Changes from Earlier Versions</name>

<t>Draft -04:
  * Address review comments</t>

<t>Draft -02:</t>

<t><list style="symbols">
  <t>include vulnerability information</t>
</list></t>

<t>Draft -01:</t>

<t><list style="symbols">
  <t>some modest changes</t>
</list></t>

<t>Draft -00:</t>

<t><list style="symbols">
  <t>Initial revision</t>
</list></t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

