<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.6.2 (Ruby 2.7.0) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc strict="yes"?>
<?rfc compact="yes"?>

<rfc ipr="trust200902" docName="draft-toutain-schc-access-control-00" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="SCHC AC">SCHC Rule Access Control</title>

    <author initials="A." surname="Minaburo" fullname="Ana Minaburo">
      <organization>Acklio</organization>
      <address>
        <postal>
          <street>1137A avenue des Champs Blancs</street>
          <city>35510 Cesson-Sevigne Cedex</city>
          <country>France</country>
        </postal>
        <email>ana@ackl.io</email>
      </address>
    </author>
    <author initials="L." surname="Toutain" fullname="Laurent Toutain">
      <organization>Institut MINES TELECOM; IMT Atlantique</organization>
      <address>
        <postal>
          <street>2 rue de la Chataigneraie</street> <street>CS 17607</street>
          <city>35576 Cesson-Sevigne Cedex</city>
          <country>France</country>
        </postal>
        <email>Laurent.Toutain@imt-atlantique.fr</email>
      </address>
    </author>
    <author initials="I." surname="Martinez" fullname="Ivan Martinez">
      <organization>Institut MINES TELECOM; IMT Atlantique</organization>
      <address>
        <postal>
          <street>2 rue de la Chataigneraie</street> <street>CS 17607</street>
          <city>35576 Cesson-Sevigne Cedex</city>
          <country>France</country>
        </postal>
        <email>ivan-marino.martinez-bolivar@imt-atlantique.fr</email>
      </address>
    </author>

    <date year="2023" month="March" day="31"/>

    
    <workgroup>lpwan Working Group</workgroup>
    

    <abstract>


<t>The framework for SCHC defines an abstract view of the rules, formalized with through a YANG Data Model. In its original description rules are static and share by 2 entities. The use of YANG authorizes rules to be uploaded or modified in a SCHC instance and leads to some possible attacks, if the changes are not controlled. This document summarizes some possible attacks and define augmentation to the existing Data Mode, to restrict the changes in the rule.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>Figure <xref target="Fig-archi-overview"/> focuses on the management part of the SCHC architecture.</t>

<figure title="Overview of management architecture." anchor="Fig-archi-overview"><artwork><![CDATA[
     .......................................................
     .   .................................                 .
     v   ^                               v                 ^   
   (--------)     +----------+        +-------+    +-------+-------+
   ( Set of )<--->|coreconf  |<=======|Access |<===| other end     |<=== 
   ( Rules  )     |request   |        |Control|    | authentication|
   (--------)     |processing|        +-------+    +---------------+
                  +----------+
]]></artwork></figure>

<t>When a management request arrives on a SCHC instance, the identity of the requester must be 
checked:</t>

<t><list style="symbols">
  <t>this can be implicit, for instance a LPWAN device receives it from the  SCHC core instance. Authentication 
 is done at Layer 2.</t>
  <t>this can be a L2 address. In a LoRaWAN network, the DevEUI allows the SCHC core instance to identify the device.</t>
  <t>IP addresses may also be used as well as cryptographic keys.</t>
</list></t>

<t>The identification of the requester allows to retrieve the associated Set of Rules. This rules are enriched with
 access control information that will be defined in this document. If the Set of Rules do not contains any access control information, the management is not allowed to modify the Rules content.</t>

</section>
<section anchor="attack-scenario"><name>Attack scenario</name>

<t>A LWM2M device, under control of an attacker, sends some management messages to modify the SCHC rules in core in order to direct the traffic to another application. This can be either to participate to a DDoS attack or to send sensible information to another application.</t>

<t>SCHC rules are defined for a specific traffic. An attacker changes en element (for instance, the dev UDP port number) and therefore no rule matches the traffic, the link may be saturated by no-compressed messages.</t>

</section>
<section anchor="yang-access-control"><name>YANG Access Control</name>

<t>YANG language allows to specify read only or read write nodes. NACM <xref target="RFC8341"/> extends this by allowing users or group od users to perform specific actions.</t>

<t>This granularity do not fit this the rule model. For instance, the goal is not to allow all the field-id leaves to be modified. The objective is to allow a specific rule entry to be changed and therefore some of the leaves to be modified. For instance an entry with field-id containing Uri-path may have his target-value modified, as in the same rule, the entry regarding the app-prefix should not be changed.</t>

<t>The SCHC access control augments the YANG module defined in <xref target="RFC9363"/> to allow a remote entity to manipulate the rules. Several levels are defined.</t>

<t><list style="symbols">
  <t>in the set of rules, it authorizes or not a new rule to be added .</t>
  <t>in a compression rule, it allows to add or remove field descriptions.</t>
  <t>in a compression rule, it allows to modify some elements of the rule, such as the target-value, the matching-operator or/and the comp-decomp-action and associated values.</t>
  <t>in a fragmentation rule, it allows to modify some parameters.</t>
</list></t>

</section>
<section anchor="yang-data-model"><name>YANG Data Model</name>

<t>The YANG DM proposed in <xref target="AnnexA"/> extends the SCHC YANG Data Model introduced in <xref target="RFC9363"/>. It adds read-only leaves containing the access rights. If these leaves are not presents, the information cannot be modified.</t>

<section anchor="leaf-ac-modify-set-of-rules"><name>leaf ac-modify-set-of-rules</name>

<t>This leaf controls modifications applied to a set of rules. They are specified with the rule-access-right enumeration:</t>

<t><list style="symbols">
  <t>no-change (0): rules cannot be modified in the Set of Rules. This is the equivalent of having no access control elements in the set of rules.</t>
  <t>modify-existing-element (1): an existing rule may be modified.</t>
  <t>add-remove-element (2): a rule can be added or deleted from the Set of Rules or an existing rule can be modified.</t>
</list></t>

</section>
<section anchor="leaf-ac-modify-compression-rule"><name>leaf ac-modify-compression-rule</name>

<t>This leaf allows to modify a compression element. To be active, leaf ac-modify-set-of-rules MUST be set to modify-existing-element  or add-remove-element. This leaf uses the same enumeration as add-remove-element:</t>

<t><list style="symbols">
  <t>no-change (0): The rule cannot be modified.</t>
  <t>modify-existing-element (1): an existing Field Description may be modified.</t>
  <t>add-remove-element (2): a Field Description can be added or deleted from the Rule or an existing rule can be modified.</t>
</list></t>

</section>
<section anchor="leaf-ac-modify-field"><name>leaf ac-modify-field</name>

<t>This leaf allows to modify a Field Description in a compression rule. To be active, leaves ac-modify-set-of-rules and ac-modify-compression-rule MUST be set to modify-existing-element  or add-remove-element and ac-modifiy-compression-rule and leaf</t>

</section>
</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference anchor='RFC8824' target='https://www.rfc-editor.org/info/rfc8824'>
<front>
<title>Static Context Header Compression (SCHC) for the Constrained Application Protocol (CoAP)</title>
<author fullname='A. Minaburo' initials='A.' surname='Minaburo'><organization/></author>
<author fullname='L. Toutain' initials='L.' surname='Toutain'><organization/></author>
<author fullname='R. Andreasen' initials='R.' surname='Andreasen'><organization/></author>
<date month='June' year='2021'/>
<abstract><t>This document defines how to compress Constrained Application Protocol (CoAP) headers using the Static Context Header Compression and fragmentation (SCHC) framework. SCHC defines a header compression mechanism adapted for Constrained Devices. SCHC uses a static description of the header to reduce the header's redundancy and size. While RFC 8724 describes the SCHC compression and fragmentation framework, and its application for IPv6/UDP headers, this document applies SCHC to CoAP headers. The CoAP header structure differs from IPv6 and UDP, since CoAP uses a flexible header with a variable number of options, themselves of variable length. The CoAP message format is asymmetric: the request messages have a header format different from the format in the response messages. This specification gives guidance on applying SCHC to flexible headers and how to leverage the asymmetry for more efficient compression Rules.</t></abstract>
</front>
<seriesInfo name='RFC' value='8824'/>
<seriesInfo name='DOI' value='10.17487/RFC8824'/>
</reference>



<reference anchor='RFC8341' target='https://www.rfc-editor.org/info/rfc8341'>
<front>
<title>Network Configuration Access Control Model</title>
<author fullname='A. Bierman' initials='A.' surname='Bierman'><organization/></author>
<author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'><organization/></author>
<date month='March' year='2018'/>
<abstract><t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability.  There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content.  This document defines such an access control model.</t><t>This document obsoletes RFC 6536.</t></abstract>
</front>
<seriesInfo name='STD' value='91'/>
<seriesInfo name='RFC' value='8341'/>
<seriesInfo name='DOI' value='10.17487/RFC8341'/>
</reference>



<reference anchor='RFC9363' target='https://www.rfc-editor.org/info/rfc9363'>
<front>
<title>A YANG Data Model for Static Context Header Compression (SCHC)</title>
<author fullname='A. Minaburo' initials='A.' surname='Minaburo'><organization/></author>
<author fullname='L. Toutain' initials='L.' surname='Toutain'><organization/></author>
<date month='March' year='2023'/>
<abstract><t>This document describes a YANG data model for the Static Context Header Compression (SCHC) compression and fragmentation Rules.</t><t>This document formalizes the description of the Rules for better interoperability between SCHC instances either to exchange a set of Rules or to modify the parameters of some Rules.</t></abstract>
</front>
<seriesInfo name='RFC' value='9363'/>
<seriesInfo name='DOI' value='10.17487/RFC9363'/>
</reference>




    </references>



<section anchor="AnnexA"><name>YANG Data Model</name>

<figure><artwork><![CDATA[
<CODE BEGINS> file "ietf-schc-access-control@2023-02-14.yang"
module ietf-schc-access-control {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-schc-access-control";
  prefix schc-ac;

  import ietf-schc {
      prefix schc;
  }

  organization
    "IETF IPv6 over Low Power Wide-Area Networks (lpwan) working group";
  contact
    "WG Web:   <https://datatracker.ietf.org/wg/lpwan/about/>
     WG List:  <mailto:lp-wan@ietf.org>
     Editor:   Juan-Carlos Zuniga
       <mailto:juancarlos.zuniga@sigfox.com>";
  description
     "
     Copyright (c) 2021 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject to
     the license terms contained in, the Simplified BSD License set
     forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC XXXX
     (https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself
     for full legal notices.

     The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
     NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
     'MAY', and 'OPTIONAL' in this document are to be interpreted as
     described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
     they appear in all capitals, as shown here.

     *************************************************************************

     This module extends the ietf-schc module to include the compound-ack 
     behavior for Ack On Error as defined in RFC YYYY. 
     It introduces a new leaf for Ack on Error defining the format of the
     SCHC Ack and add the possibility to send several bitmaps in a single 
     answer.";

  revision 2023-02-14 {
    description
      "Initial version for RFC YYYY ";
    reference
      "RFC YYYY: Compound Ack";
  }

  typedef rule-access-right {
    type enumeration {
      enum no-changes {
        value 0;
        description
          "No change are allowed.";
      }
      enum modify-existing-element {
        value 1;
        description
          "can modify content inside an element.";
      }
      enum add-remove-element {
        value 2;
        description
          "Allows to add or remove or modify an element.";
      }
    }
  }

  typedef field-access-right {
    type enumeration {
      enum no-change {
        value 0;
        description
          "Reserved slot number.";
      }
      enum change-tv {
        value 1;
        description
          "Reserved slot number.";
      }
      enum change-mo-cda-tv {
        value 2;
        description
          "Reserved slot number.";
      }
    }

  }

  augment "/schc:schc/schc:rule" {
    leaf ac-modify-set-of-rules {
          config false;
          type rule-access-right;
        }
  }

  augment "/schc:schc/schc:rule/schc:nature/schc:compression" {
    leaf ac-modify-compression-rule {
          config false;
          type rule-access-right;
        }
  }

  augment "/schc:schc/schc:rule/schc:nature/schc:compression/schc:entry" {
    leaf ac-modify-field {
          config false;
          type field-access-right;
        }
  }

  augment "/schc:schc/schc:rule/schc:nature/schc:fragmentation" {
    leaf ac-modify-timers {
          config false;
          type boolean;
        }
  }


}
<CODE ENDS>
]]></artwork></figure>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>TBD</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>TBD</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

