<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.39 (Ruby 3.0.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc strict="yes"?>
<?rfc compact="yes"?>

<rfc ipr="trust200902" docName="draft-toutain-schc-access-control-02" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="SCHC AC">SCHC Rule Access Control</title>

    <author initials="A." surname="Minaburo" fullname="Ana Minaburo">
      <organization>Consultant</organization>
      <address>
        <postal>
          <street>Rue de Rennes</street>
          <city>35510 Cesson-Sevigne Cedex</city>
          <country>France</country>
        </postal>
        <email>anaminaburo@gmail.com</email>
      </address>
    </author>
    <author initials="L." surname="Toutain" fullname="Laurent Toutain">
      <organization>Institut MINES TELECOM; IMT Atlantique</organization>
      <address>
        <postal>
          <street>2 rue de la Chataigneraie</street> <street>CS 17607</street>
          <city>35576 Cesson-Sevigne Cedex</city>
          <country>France</country>
        </postal>
        <email>Laurent.Toutain@imt-atlantique.fr</email>
      </address>
    </author>
    <author initials="I." surname="Martinez" fullname="Ivan Martinez">
      <organization>Nokia Bell Labs</organization>
      <address>
        <postal>
          <street>12 Rue Jean Bart</street>
          <city>91300 Massy</city>
          <country>France</country>
        </postal>
        <email>ivan.martinez_bolivar@nokia-bell-labs.com</email>
      </address>
    </author>

    <date year="2023" month="July" day="25"/>

    <area>Internet</area>
    <workgroup>SCHC Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 57?>

<t>The framework for SCHC defines an abstract view of the rules, formalized through a YANG Data Model. In its original description, rules are static and shared by two endpoints. The use of YANG authorizes rules to be uploaded or modified in a SCHC instance and leads to some possible attacks if the changes are not controlled. This document defines a threat model, summarizes some possible attacks, and defines augmentation to the existing Data Model in order to restrict the changes in the rule and, therefore, the impact of possible attacks.</t>



    </abstract>



  </front>

  <middle>


<?line 61?>

<section anchor="introduction"><name>Introduction</name>

<t>SCHC is a compression and fragmentation mechanism defined in <xref target="RFC8724"/> while <xref target="RFC9363"/> provides a YANG Data Model for formal representation of SCHC Rules used either for compression/decompression (C/D) or fragmentation/reassembly (F/R). <xref target="I-D.ietf-schc-architecture"/> illustrates the use of several protocols for rule management using the YANG Data Model, such as CORECONF <xref target="I-D.ietf-core-comi"/>, NETCONF<xref target="RFC6241"/>, RESTCONF <xref target="RFC8040"/>. The inappropriate use of any of these protocols leads to some possible attacks. The goal of this document is to define a threat model, summarize some possible attacks, and define augmentation to the existing Data Model in order to restrict the changes in the rules and, therefore, the impact of possible attacks.</t>

</section>
<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="terminology"><name>Terminology</name>

<t>It is expected that the reader will be familiar with the terms and concepts associated with the SCHC framework <xref target="RFC8724"/>, <xref target="I-D.ietf-schc-architecture"/>, and managmente request processing <xref target="I-D.ietf-core-comi"/>, NETCONF<xref target="RFC6241"/>, RESTCONF <xref target="RFC8040"/>.</t>

<t>ToDo
* Access Control. 
* Management request processing: The NETCONF, RESTCONF or CORECONF request is processed and passed to the end-point Rule Manager.
* Rule Manager (RM). 
* Context. SCHC Rules</t>

</section>
<section anchor="schc-management-architecture"><name>SCHC Management Architecture</name>

<t>Figure <xref target="Fig-archi-overview"/> presents the management part of the SCHC architecture.</t>

<figure title="Overview of management architecture." anchor="Fig-archi-overview"><artwork><![CDATA[
  ........................................
  .  ..........................          .
  v  ^    create              v          ^   
(-------)  read  +====+    +==+==+   +===+===+   +=========+
(Context)<------>| RM |<-->|Mgmt.|<==|Access |<==|Other end|<=== 
(-------) update +====+    |req. |   |Control|   |auth.    | Management
          delete           |proc.|   +=======+   +=========+ Request
                           +=====+                           NETCONF,
                                                             RESTCONF
                                                          or CORECONF
]]></artwork></figure>

<t>When a management request arrives on a SCHC endpoint, several processes should be passed before effectively creating or updating a Rule:</t>

<t><list style="numbers">
  <t>Other end authentication: the identity of the requester must be verified:
  <list style="symbols">
      <t>This can be implicit, for example, an LPWAN device that receives it from the SCHC core. Hence, authentication is done at Layer 2.</t>
      <t>This can be an L2 address. In a LoRaWAN network, for example, the DevEUI allows the SCHC core to identify the device.</t>
      <t>IP addresses may also be used, as well as cryptographic keys.</t>
    </list></t>
  <t>Access control: Once authenticated, the associated Set of Rules of the instance is retrieved.
  <list style="symbols">
      <t>These rules are enriched with access control information that will be defined in this document.</t>
      <t>If the Set of Rules does not contain any access control information, the end-point is not allowed to modify the Rules' content.</t>
    </list></t>
  <t>Management request processing: The NETCONF, RESTCONF or CORECONF request is processed and passed to the end-point Rule Manager.</t>
  <t>The Rule Manager (RM) applies the changes (create, read, update, or delete) to the Rule database.</t>
</list></t>

</section>
<section anchor="threat-model"><name>Threat Model</name>

<t>The RM is in charge of applying changes to the context when a management request arrives at a SCHC end-point. It is assumed that these changes should only be effectively applied when it is sure that all end-points of an instance have made the change. This means that in all cases, a peer of peers in an instance always shares the same Set of Rules.</t>

<t>The selection of a rule to be applied in an accurate endpoint when a packet arrives is made by selecting the rule offering the best-performance SCHC packet after compression.</t>

<t>The attack scenarios considered below are limited to the rule management layer and only involve that a single endpoint in a given instance has been compromised.
This means that the authentication is bypassed. Therefore, the compromised endpoint is able to effectively deliver management requests using NETCONF, RESTCONF, or CORECONF to the other endpoint.</t>

</section>
<section anchor="schc-tvmocda-possible-combinations"><name>SCHC TV/MO/CDA possible combinations</name>
<t>SCHC compression behavior uses the TV, MO, and CDA to generate the correct residue. But not all the combinations of this fields descriptors are possible, and then an attack can be detected or avoided. <xref target="Fig-combinations"/> shows all the combinations and those that are enabled. SCHC defines two TV values: set and not set. SCHC MO can be Equal, Ignore, MSB, or Match-mapping. And SCHC CDA can be not-sent, value-sent, mapping-sent, LSB, compute-*, DevIID, or AppIID.</t>

<figure title="SCHC TV, MO, CDA valid combinations" anchor="Fig-combinations"><artwork><![CDATA[
 +-----------------+------------------------------------------------------+
 |                 |                      CDA                             |
 |  TV   /  MO     +--------+---------------+-----+---------+------+------+
 |                 |not-sent| value |mapping| LSB |compute-*|DevIID|AppIID|
 |                 |        | -sent | -sent |     |         |      |      |  
 +-----------------+--------+-------+-------+-----+---------+------+------+
 |  set  /  Equal  |  ok    |absurd |   x   |  x  | absurd  |absurd|absurd|
 +-----------------+--------+-------+-------+-----+---------+------+------+
 | not set / Equal |   x    |   x   |   x   |  x  | absurd  |absurd|absurd|
 +-----------------+--------+-------+-------+-----+---------+------+------+
 |  set  / Ignore  | ok (D) | absurd|    x  |  x  |   ok    |  ok  |  ok  |
 +-----------------+--------+-------+-------+-----+---------+------+------+
 |not set / Ignore |   x    |  ok   |    x  |  x  |   ok    |  ok  |  ok  |
 +-----------------+--------+-------+-------+-----+---------+------+------+
 |  set   /   MSB  | absurd |absurd |    x  |  ok |  absurd |absurd|absurd|
 +-----------------+--------+-------+-------+-----+---------+------+------+
 | not set /  MSB  | absurd | absurd|    x  | ok  |  absurd |absurd|absurd|
 +-----------------+--------+-------+-------+-----+---------+------+------+
 |  set   /  Match |   x    | absurd|   ok  |  x  |  absurd |absurd|absurd|
 |         -mapping|        |       |       |     |         |      |      |
 +-----------------+--------+-------+-------+-----+---------+------+------+
 |not set /  Match |   x    |   x   | absurd|  x  |  absurd |absurd|absurd|
 |         -mapping|        |       |       |     |         |      |      |
 +-----------------+--------+-------+-------+-----+---------+------+------+

]]></artwork></figure>

</section>
<section anchor="attack-scenarios"><name>Attack Scenarios</name>
<t>## Scenario 1: Compromised Device</t>

<t>A Device RM, under the control of an attacker, sends some management messages to modify the SCHC rules in the core in order to direct the traffic to another application. The impact of this attack is different depending on the original rule:</t>

<t><list style="numbers">
  <t>Rules containing exclusively the pair MO -- CDA : (ignore -- not-sent) or rules such as no-compress or no-fragmentation:
  <list style="symbols">
      <t>There is no risk of information lost.</t>
      <t>There is a risk of a DoS-type attack as it can flood empty packets that pass at the core level.</t>
    </list></t>
</list></t>

<t>For example ... TBD</t>

<t>The attack is limited to a single end-point (the device) since it does not have the right to change core-level rules.</t>

<t><list style="numbers">
  <t>Management messages aiming at changing rules where the length of the residue changes:
  <list style="symbols">
      <t>There can be a risk of desynchronizing rules between the core and the compromised device.</t>
      <t>The attack is limited to a single end-point (the device) since it does not have the right to change core-level rules.</t>
    </list></t>
</list></t>

<t>As SCHC rules are defined for specific traffic. An example of this can be an attacker changing an element of the rule (the dev UDP port number, for instance), and therefore no rule matches the traffic. Therefore, the core may be saturated by no-compressed messages.</t>

<section anchor="scenario-2-compromised-core"><name>Scenario 2: Compromised Core</name>

<t>A Core RM, under the control of an attacker, sends some management messages to modify the SCHC rules in the device in order to delete the device's data. 
In such a scenario, the attacker will try to inject destructive rules.</t>

<t>The main characteristic of these rules is that the combination of MA -- CA reduces the size of the residue, which has, in turn, made it more attractive since it increases the rate of compression.</t>

<t>The impact of this attack could be:
  * Lost of devices' information if nothing is done to preempt a compromised core to change such a rule.</t>

<t>An example of this attack could be ... TBD</t>

</section>
</section>
<section anchor="yang-access-control"><name>YANG Access Control</name>

<t>YANG language allows to specify read-only or read write nodes. NACM <xref target="RFC8341"/> extends this by allowing users or groups of users to perform specific actions.</t>

<t>This granularity does not fit this rule model. For instance, the goal is not to allow all the field-id leaves to be modified. The objective is to allow a specific rule entry to be changed and, therefore, some of the leaves to be modified. For instance, an entry with FID containing Uri-path may have its target value modified, as in the same rule, the entry regarding the application prefix should not be changed.</t>

<t>The SCHC access control augments the YANG module defined in <xref target="RFC9363"/> to allow a remote entity to manipulate the rules. Several levels are defined.</t>

<t><list style="symbols">
  <t>in the set of rules, it authorizes or not a new rule to be added.</t>
  <t>in a compression rule, it allows adding or removing field descriptions.</t>
  <t>in a compression rule, it allows modifying some elements of the rule, such as the TV, MO, or/and CDA, and associated values.</t>
  <t>in a fragmentation rule, it allows modifying some parameters.</t>
</list></t>

</section>
<section anchor="yang-data-model"><name>YANG Data Model</name>

<t>The YANG DM proposed in <xref target="AnnexA"/> extends the SCHC YANG Data Model introduced in <xref target="RFC9363"/>. It adds read-only leaves containing access rights. If these leaves are not present, the information cannot be modified.</t>

<section anchor="leaf-ac-modify-set-of-rules"><name>leaf ac-modify-set-of-rules</name>

<t>This leaf controls modifications applied to a set of rules. They are specified with the rule-access-right enumeration:</t>

<t><list style="symbols">
  <t>no-change (0): rules cannot be modified in the Set of Rules. This is the equivalent of having no access control elements in the set of rules.</t>
  <t>modify-existing-element (1): an existing rule may be modified.</t>
  <t>add-remove-element (2): a rule can be added or deleted from the Set of Rules, or an existing rule can be modified.</t>
</list></t>

</section>
<section anchor="leaf-ac-modify-compression-rule"><name>leaf ac-modify-compression-rule</name>

<t>This leaf allows to modify a compression element. To be active, leaf ac-modify-set-of-rules <bcp14>MUST</bcp14> be set to modify-existing-element or add-remove-element. This leaf uses the same enumeration as add-remove-element:</t>

<t><list style="symbols">
  <t>no-change (0): The rule cannot be modified.</t>
  <t>modify-existing-element (1): an existing Field Description may be modified.</t>
  <t>add-remove-element (2): a Field Description can be added or deleted from the Rule or an existing rule can be modified.</t>
</list></t>

</section>
<section anchor="leaf-ac-modify-field"><name>leaf ac-modify-field</name>

<t>This leaf allows to modify a Field Description in a compression rule. To be active, leaves ac-modify-set-of-rules and ac-modify-compression-rule <bcp14>MUST</bcp14> be set to modify-existing-element  or add-remove-element and ac-modify-compression-rule and leaf</t>

</section>
</section>


  </middle>

  <back>


    <references title='Normative References'>



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC6241">
  <front>
    <title>Network Configuration Protocol (NETCONF)</title>
    <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
    <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
    <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
    <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
    <date month="June" year="2011"/>
    <abstract>
      <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6241"/>
  <seriesInfo name="DOI" value="10.17487/RFC6241"/>
</reference>

<reference anchor="RFC8040">
  <front>
    <title>RESTCONF Protocol</title>
    <author fullname="A. Bierman" initials="A." surname="Bierman"/>
    <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
    <author fullname="K. Watsen" initials="K." surname="Watsen"/>
    <date month="January" year="2017"/>
    <abstract>
      <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8040"/>
  <seriesInfo name="DOI" value="10.17487/RFC8040"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>

<reference anchor="RFC8724">
  <front>
    <title>SCHC: Generic Framework for Static Context Header Compression and Fragmentation</title>
    <author fullname="A. Minaburo" initials="A." surname="Minaburo"/>
    <author fullname="L. Toutain" initials="L." surname="Toutain"/>
    <author fullname="C. Gomez" initials="C." surname="Gomez"/>
    <author fullname="D. Barthel" initials="D." surname="Barthel"/>
    <author fullname="JC. Zuniga" initials="JC." surname="Zuniga"/>
    <date month="April" year="2020"/>
    <abstract>
      <t>This document defines the Static Context Header Compression and fragmentation (SCHC) framework, which provides both a header compression mechanism and an optional fragmentation mechanism. SCHC has been designed with Low-Power Wide Area Networks (LPWANs) in mind.</t>
      <t>SCHC compression is based on a common static context stored both in the LPWAN device and in the network infrastructure side. This document defines a generic header compression mechanism and its application to compress IPv6/UDP headers.</t>
      <t>This document also specifies an optional fragmentation and reassembly mechanism. It can be used to support the IPv6 MTU requirement over the LPWAN technologies. Fragmentation is needed for IPv6 datagrams that, after SCHC compression or when such compression was not possible, still exceed the Layer 2 maximum payload size.</t>
      <t>The SCHC header compression and fragmentation mechanisms are independent of the specific LPWAN technology over which they are used. This document defines generic functionalities and offers flexibility with regard to parameter settings and mechanism choices. This document standardizes the exchange over the LPWAN between two SCHC entities. Settings and choices specific to a technology or a product are expected to be grouped into profiles, which are specified in other documents. Data models for the context and profiles are out of scope.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8724"/>
  <seriesInfo name="DOI" value="10.17487/RFC8724"/>
</reference>

<reference anchor="RFC8824">
  <front>
    <title>Static Context Header Compression (SCHC) for the Constrained Application Protocol (CoAP)</title>
    <author fullname="A. Minaburo" initials="A." surname="Minaburo"/>
    <author fullname="L. Toutain" initials="L." surname="Toutain"/>
    <author fullname="R. Andreasen" initials="R." surname="Andreasen"/>
    <date month="June" year="2021"/>
    <abstract>
      <t>This document defines how to compress Constrained Application Protocol (CoAP) headers using the Static Context Header Compression and fragmentation (SCHC) framework. SCHC defines a header compression mechanism adapted for Constrained Devices. SCHC uses a static description of the header to reduce the header's redundancy and size. While RFC 8724 describes the SCHC compression and fragmentation framework, and its application for IPv6/UDP headers, this document applies SCHC to CoAP headers. The CoAP header structure differs from IPv6 and UDP, since CoAP uses a flexible header with a variable number of options, themselves of variable length. The CoAP message format is asymmetric: the request messages have a header format different from the format in the response messages. This specification gives guidance on applying SCHC to flexible headers and how to leverage the asymmetry for more efficient compression Rules.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8824"/>
  <seriesInfo name="DOI" value="10.17487/RFC8824"/>
</reference>

<reference anchor="RFC9363">
  <front>
    <title>A YANG Data Model for Static Context Header Compression (SCHC)</title>
    <author fullname="A. Minaburo" initials="A." surname="Minaburo"/>
    <author fullname="L. Toutain" initials="L." surname="Toutain"/>
    <date month="March" year="2023"/>
    <abstract>
      <t>This document describes a YANG data model for the Static Context Header Compression (SCHC) compression and fragmentation Rules.</t>
      <t>This document formalizes the description of the Rules for better interoperability between SCHC instances either to exchange a set of Rules or to modify the parameters of some Rules.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9363"/>
  <seriesInfo name="DOI" value="10.17487/RFC9363"/>
</reference>

<reference anchor="RFC8341">
  <front>
    <title>Network Configuration Access Control Model</title>
    <author fullname="A. Bierman" initials="A." surname="Bierman"/>
    <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
    <date month="March" year="2018"/>
    <abstract>
      <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
      <t>This document obsoletes RFC 6536.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="91"/>
  <seriesInfo name="RFC" value="8341"/>
  <seriesInfo name="DOI" value="10.17487/RFC8341"/>
</reference>


<reference anchor="I-D.ietf-core-comi">
   <front>
      <title>CoAP Management Interface (CORECONF)</title>
      <author fullname="Michel Veillette" initials="M." surname="Veillette">
         <organization>Trilliant Networks Inc.</organization>
      </author>
      <author fullname="Peter Van der Stok" initials="P." surname="Van der Stok">
         <organization>consultant</organization>
      </author>
      <author fullname="Alexander Pelov" initials="A." surname="Pelov">
         <organization>Acklio</organization>
      </author>
      <author fullname="Andy Bierman" initials="A." surname="Bierman">
         <organization>YumaWorks</organization>
      </author>
      <author fullname="Carsten Bormann" initials="C." surname="Bormann">
         <organization>Universität Bremen TZI</organization>
      </author>
      <date day="23" month="July" year="2023"/>
      <abstract>
	 <t>   This document describes a network management interface for
   constrained devices and networks, called CoAP Management Interface
   (CORECONF).  The Constrained Application Protocol (CoAP) is used to
   access datastore and data node resources specified in YANG, or SMIv2
   converted to YANG.  CORECONF uses the YANG to CBOR mapping and
   converts YANG identifier strings to numeric identifiers for payload
   size reduction.  CORECONF extends the set of YANG based protocols,
   NETCONF and RESTCONF, with the capability to manage constrained
   devices and networks.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-core-comi-15"/>
   
</reference>


<reference anchor="I-D.ietf-schc-architecture">
   <front>
      <title>LPWAN Static Context Header Compression (SCHC) Architecture</title>
      <author fullname="Alexander Pelov" initials="A." surname="Pelov">
         <organization>Acklio</organization>
      </author>
      <author fullname="Pascal Thubert" initials="P." surname="Thubert">
         <organization>Cisco Systems</organization>
      </author>
      <author fullname="Ana Minaburo" initials="A." surname="Minaburo">
         <organization>Acklio</organization>
      </author>
      <date day="29" month="March" year="2023"/>
      <abstract>
	 <t>   This document defines the LPWAN SCHC architecture.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-schc-architecture-00"/>
   
</reference>




    </references>



<?line 249?>

<section anchor="AnnexA"><name>YANG Data Model</name>

<figure><artwork><![CDATA[
<CODE BEGINS> file "ietf-schc-access-control@2023-02-14.yang"
module ietf-schc-access-control {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-schc-access-control";
  prefix schc-ac;

  import ietf-schc {
      prefix schc;
  }

  organization
    "IETF Static Context Header Compression (schc) working group";
  contact
    "WG Web:   <https://datatracker.ietf.org/wg/schc/about/>
     WG List:  <mailto:schc@ietf.org>
     Editor:   Ana Minaburo
       <mailto:anaminaburo@gmail.com>";
  description
     "
     Copyright (c) 2021 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject to
     the license terms contained in, the Simplified BSD License set
     forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC XXXX
     (https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself
     for full legal notices.

     The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
     NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
     'MAY', and 'OPTIONAL' in this document are to be interpreted as
     described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
     they appear in all capitals, as shown here.

     *************************************************************************

     This module extends the ietf-schc module to include the rule access 
     control behaviour in RFC YYYY.";

  revision 2023-02-14 {
    description
      "Initial version for RFC YYYY ";
    reference
      "RFC YYYY: SCHC AC";
  }

  typedef rule-access-right {
    type enumeration {
      enum no-changes {
        value 0;
        description
          "No change are allowed.";
      }
      enum modify-existing-element {
        value 1;
        description
          "can modify content inside an element.";
      }
      enum add-remove-element {
        value 2;
        description
          "Allows to add or remove or modify an element.";
      }
    }
  }

  typedef field-access-right {
    type enumeration {
      enum no-change {
        value 0;
        description
          "Reserved slot number.";
      }
      enum change-tv {
        value 1;
        description
          "Reserved slot number.";
      }
      enum change-mo-cda-tv {
        value 2;
        description
          "Reserved slot number.";
      }
    }

  }

  augment "/schc:schc/schc:rule" {
    leaf ac-modify-set-of-rules {
          config false;
          type rule-access-right;
        }
  }

  augment "/schc:schc/schc:rule/schc:nature/schc:compression" {
    leaf ac-modify-compression-rule {
          config false;
          type rule-access-right;
        }
  }

  augment "/schc:schc/schc:rule/schc:nature/schc:compression/schc:entry" {
    leaf ac-modify-field {
          config false;
          type field-access-right;
        }
  }

  augment "/schc:schc/schc:rule/schc:nature/schc:fragmentation" {
    leaf ac-modify-timers {
          config false;
          type boolean;
        }
  }


}
<CODE ENDS>
]]></artwork></figure>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>TBD</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>TBD</t>

</section>


  </back>

<!-- ##markdown-source:
H4sIAAAAAAAAA9Vb63bbRpL+j6folX9IsgjqYudGXya0KCeao4tXkpPN2bM7
BwSaVI9BgMFFEmNpn2WfZZ9sv6rqBhqkJDuZZLKLoyM2muiq6uq6oxiGYVBW
UZb8LUrzTA9UVdQ6MPOCR2W1t7Pzzc5ekORxFs3wdVJEkyqs8rqKTBaW8WUc
RnGsyzKM86wq8jTE01Gho4E6zCpdZLoKPly3N+GIAARxVA1UWSXB3AwCpcrF
rNCTcqDWF7pcp4m8qJZmqsLEVXsf57N55E9UeexugspUKYg93/9+X53VqVZD
plHtC41BNB4X+so+MNwPrqd2/GNefDDZVH1X5PU8iOrqMi8GQahMBlKGfXVs
smhcFznwCT+GWeRP5gUgAUtZp2BqJXRrDTLPaq0Src50lumS6DfVYqCeffHF
7o7aB215Fp7rKzPNNG4TfcNbrEEunnpbRFmsMaNnkUkHKgJui/PbKU31wQ1H
5VFfXcjxNEQeRXWhs8qbZzoPsxKMqit1fHhycK4uDo4O9k+PX6jD4ws1rFLQ
b36udbsHjEK1pwrZSRqp/csI8EByERnN3+6fq92vvtz5yt/gV1/+6g1agvuW
4G/NrAqjhqL+pHCbPcSRREVlMv1Ls9vDqyjzZ3mvJ/kHE6k3Ok0BfFwubWp3
j8/nrxor32BlQ/43u892dgCsLBeP0WuAsj+zKP82zlNMFN9mhDMcA2eYAicd
kgqyvJhFlbnShPns7f7e7u43dvjl3vNdO/x65/mOG+5+9dwNv9prhl83w2+e
ffnMzT4DBKVwcxiO+kZXE6hlofFvxnrWzIriFvGlqXRcgdmDwGQTnzT84V8Y
hgqkVwVULQguLrWaFGDyNdRE4XFRmkRPsO8SYtk8q66Mvlb5RFVYUkADy55i
8Kn5RSeYhX5NL1WkfhqefKdGECN1nCc67UMolalKHJqZQsRTAC/jwswrk2c9
gaRgXnB6oDQGykSVl5hI1Hihqutc6SyZ5yarSqgBcNelJjIYjagzCCgtoCpX
YzwyT/MoAQTsZ5YnZmIwNtiL7A5yVtFpM65URwmvK/OZVvO8LM0Y5iWqqij+
UCojG44vo2xqCc3ySlnTmOqEiDKlgjmtZ6SRDeuIJTqqiACd9lRZzyBOTOq9
mHpMTbO6nhK0iJhExBEN+sZAu2HKWubSpvIi0QU9U2ixqB2C8YA7MELQozuY
YYgQD5Vhm0sMXSaorwIWlplJklQHwROy+EWe1DERFQTCStooGW4gL4lW2gQE
yqN+pokWU87s5vgkPn60wn93p64vDbDyDAk+ZuZFfmUSZuKSNLGIithhv4S1
wYMtNN6hJClJlDa0W17j0bidaJ/ijf3t0SZJSofsbZxdWerZOF2ojbfbZ5t9
UPiwsoFok6Y1qUpFYtjKaamvYExT2hP8WZ6WTA6fxwxWf6pZauqSDpaWLW2Y
BCeGWsHTnZ7BmJ+89eloTMHdXU+dHFzQ98xIMjw0d3ZwfmEXWRt0dydqBFWc
g6Z5YUCxIzbKFlbFcd9S/LiOCLxpjk3yWl8bDC+Tg39YJT6tEX+IQpS/QSOe
UCxwBUpAB69XIyLQ8L3Y0w96oWBOwbG14/fnF2s9+VQnpzw+O/jX94dnByMa
n38/PDpqBoF94vz70/dHo3bUroQzPz44GclizKrOVLB2PPxpTdi2dvru4vD0
ZHi0Jjv2D4WMmBhKQzEcNKGCskRlIJZ5LCr6Zv/d//z37nNIzr9YpwYhlxty
YKy4OhNseQY1kVuwcBFAtHRUsMmFe46juamilA4Uxu8yv84UsbwfBE//nTjz
HwP1chzPd5+/thO04c6k41lnknm2OrOyWJh4z9Q9aBpuduaXON2ld/hT597x
3Zt8+ZeURDjc/fovr4OAZOhCFwj38jSfLoLgkNVE38xhStiTRiKxUBUS5GsY
FjqrCSLE1EQ0UV3yAzi7mcgg3FGs53CysFl5TBqdtI+xVWydvGd6e5+waXK4
bKZIcIgkBGtlRaaBom/SvX/YGkFp8lEePF2K6KFsTxGmNRZyFfWA7Y7F4wGH
eW1spVsFBtuFJOnY1DziobMkWRJyjCG5haAt+qDAv1cbZ8ebTBfRqG+qvudx
AoqwnsiER/bQY2gQvDVTfGL7GAivwxzugUIrdnvszsR9eM5hjjDURV4M3z8l
8O+/+AL+/mde9OhjT6vmokevlPpPGsdku7XqXFftkJ4JNkK5NhWLr1Jbr3Bt
0fcYbcmQ5rZetWO5toINy9bNlwLk9a06O1a3L2l0PJ1V/duXr17dWjHh8Sn7
d5we3b3y0dfzhIht0d9CFPrqlkZWwnhMESTv99Y7taDdFXyK7mz6luSof+uR
vrQNJIQscx6QlWurWfjQ5cT6MSifvpxO/ANQPG1ygvZxoJ6sCrDiFP3V+qm7
h8R6QtyR2fU7mMEf4S8QE8xWdTwqCuQsSBmakN3lAD0/nmJ1Zo9SpwmZSKvU
Y/bmSk8mQAdA8E0su2SusB0WDRpHrLmDINjtq0aSOKcg/x5zrDGQmCChmWrR
5D9CKFbMEPMRahDFaQYlWuqp5AQx0qcxBxSpQfLJ+RLsfIR7TaZVHb37cXgC
EbsySEbY7hc61rx1U8FkI7tsdJ6Ma199r2Hoe0s0KnbuFCRVSIUXoGqvv0oG
4dtTUZJQ4MtZWaSO8rOISMh0Rb5hiULCPdJXB+8PyY3n12WXGjKewpjJgr+R
jVjUh+8cLuxmFi0AopTkDEfEkcA1pe74jIvFvMqnRTS/RP6H6KnsB3t95w5s
pjVQp5yxtRvXErr5Lu9cs52UDMAeVZPsgRMIdAoD+UHS5vhDgW6bg+oM8eKl
c55RhwLVpNMUgdJhOc/s5TWdQMthObSm26cuyfHPZZIRBUoIvR9G2FtyU0YW
87GIG+M8V86BMawzGKIieNb/0x3pF5IkrHhThUgxNTZjciH6hniaHruQnjXl
PSJHrPGmw8bg8GU0jkot0fmFZBicDEg4DhdiOOwH+GIqaQ6QLsgCOIwWXiz+
hyPZxy0TULSWSXYMlWL2gB84/TaOK9uNWUvF0fK4a6CED4mgNgyopFCBoVAQ
3eApJVFrBfsyuqJwIdEeE21VYqajrBQYTSxeUuUmUnONI6AkB5/MHh9klF5H
i1LqMHI2JcLHjgT3hbslTiR2+Xckea3kFm5HAhqiXVNu3Fhyx2QkWx90y1gi
mrYyXjjQNi9myDk4VriZMQ4knOuClYSo5vNw8CZknb0839IrqZwqY50h9cxZ
2UpYMa43aWgT24HUzEzVSvVytp6ykW0SH5Nd5emVOytFKpV6G+XC0xS765xZ
CXSYYQoRMkOH+sHymbF5WzH144XoHKuUn7l6sDzskMixHIovb1APDIp7ZLy0
xYgVe9DrGATLmtz5TdGBwIXAFz9sH59u74+GbRYN8sYmiyRTtl6kLcOMNeTY
kHsurchd/NBTx6eSgxAgYJxqqkxXVtLzAu6S6MYB1hD5N3XlrKLjR4OwKU3A
SadIzV0RMi/E8jsqBV3Fspk5abEeNNGVpGigMrrKITVJ38byPipE8pTklvfT
IeDz0okLex06oaTfrb1S6fPiB3UVpTiVAbSh4rW0QYztw8enjriDn+so7anD
acbycHz+hs/rOKriy3AGZcSZwqkCAi8khtqVgBhS3tETXHZsl9i7IwJHx1VX
Onzao7Dg8HDEGIbzOYZtGhKorXD5Wp35rGsr4IC9e63O8EUbeuy6ZVhgqFLb
ivhGV0PXMoFbS7Nb3Y976XJ8vBU+qlvLwlvinrptuHcrzLsVxt0+usdbxSC9
zy4Lbpc/HuX+1r2fj++S5I44xvLFKPIPjCsaw0EljPpGcN/Qfzvtvncfvzdd
Vg1AmRDmyPDp+TPocvwSPSTEYNfGaLOhgI/qpqWr4acM3MfvTFfLLkuYzy8m
4M+hy/KLBIxMlndQvnxZikAA/ne//+Pla5mulXO07Pnn0NXyiy27f44tXZai
m0fpao1I2BiqJfPT/XzQ6vxhsrq6R6fTzV7/X+5xuZDSCRBsGcVGURICkXOD
UzFJJ5bgKsoTNZQg5dyFtMGTJ82N2qXmhTYsHHGKHgRDO0J2hAQr4xcmNgGi
zFMyDIl+dEFFlyyx7y29gHGG0C2y6ZOXfjLlklPbly1cLfDfzCSGIzcuYhfR
ZIK8H7NRJtEkZw4S79p3Vc0rGQ7hbFRGmbahhEBeu85BI1d4BGfzurloajyS
eduEmx7VN3GKYJcDYlozj0xBoUEYMscHasOItcSE8+78qlB2597MZXnoIln6
EredV4mDtthQaMncVWHKD7Qfv6aQ5mXVX342ah6N1Cg/D6vFvEliIi4TURQ3
SfMcMf9sXi1sAmQzCMoUlM0k+BRSjd0iWHvbFnqoEKwu3ow6CRJQe0mQn9TY
/H6jrfhs0rdUYanasgYnpZw7mellRTAkMWUqQqZCuAha9jr1iUaqIuCnKl0l
S2ksfL9m5hDwVGfT6rKtynEi4NLtgc9KVwRr2IkEYJHFl0WemV9a0GNdXVNa
1vDLZgOd3KpT5/qTeDYsfT2jLMJVoaiEV851bFirRLso8G+O26lRWxd0it4y
GpPIvvk8vJaPZgPq/egdUqYC+VY9G5OFIKwuu91skijJTlngJYWGObfZXUPZ
ShJbaK4XjqnoUHHRgFtBPC3DhJMSyjg9c7fXNXf7ecHGjj7/OabOFnM7xk5e
IbTfrpdctIKuH2bWiDQFCVvTdAfCJcaqWHCtNfs7Gc2E3mrXnMc30nDBL4xs
jQumUhf0Zjxu3+VbGr26gudI6LHjIVu9IZQoqWNX9KF3813l6lG7Bii+jMoe
77kusp6UbAy92C+YeKKB6GtkHJ/UUGHhcgoPuKvlmfstfWwL/KTRT9UR7KRo
MDGzXO8YUTMhVbokGXZVcbAOWMg4ul4VKx2uiG21zJ4EsYoUbFVhlqhp7eYT
6dpYakkMeDIF7Bqi05TQc6udCy5vhlxBIpdCr8uuC1gPbABn3Fcnw/1j+6b0
Gb0/BT0VCycTM14IRNppXVIND0Cm1OTItQ6Zoq1Lgaw1CRGX60RqAGdaRFmd
QvTgOhpLNDGVYBG1lT6ut56Ki5hyz4ctRZPFS7l+ZqseXGgJDXdYXTWtWa4d
Sxx7Pv67VKRso4iF0BLL+HVmNWDsbHuy0rnBCmtF9QGEXfrJwjFcLvW/PRz5
gcH7woTzCPNkiNgsUwdbRfXjymb3Di6/yrDKz0VSItmV6wl+oadRkbiipRfb
kFROzI2rChMT2w1SNfuied/bfS9ge2HKtl8IxHApfKnByrZTeYwt9CznIiy/
zSJjFmVmjvO3BkoMijq3L9nY53TcSz9gHXQbloKwbQeE0HgNeRwJkcpl+rpT
F06obuagdLvHhHemcsqCZ+1LOyL8isYsVn4PYfmZsMRsEwiWFeveSt+/tc1W
fv0xL7ZtCVL8mvfCSYpzHgHd1rdPkDCPqCkDxpq92HLnl5y/TB7TS5d5Xrqz
HWaZvhl2TIIVleV+OWN79lakgl9XgL+lZ4as4niKYCWPAxJ6aej8iX3StUPa
zgXbQOWZY8QYVq5bPWSPDQBwvHEoLEFkXYX5JCykk4INEz9hRd6yzipO2bxb
kDDLE0I2KwvpJxUb4nfC0COuuV1iLI34hSrKFKYHwVMOMsQbbOxsDqzbXN2E
k//OCxF55WLkMPTPtYF02ACKStvgJuKgJVVupPAehSJOPbUyE7pet9CFZRu7
mwM2Yq4JzkZYiw6zCQIOOWT10e3iPVosS1wYmNiGWQlXEu/1s7dJrviuYLUg
PKyrJ+ypJh+zf8qta7SxVVeTLdXUBc+UssfoPSZCirvIxsLPBuwqE2kzK9yx
B8ngm5cRbNo9aSEjsbr0Phm6cMHz/brwK074LZu+UWv6fuVxr67/5NnzG9bf
euRsqj9xzqs03WvI7zl7tj/3nz5b6Qcl73OF437p+BRw21M+UdTpFyKmHiNm
vMe8q49PrBWXclDwcv90dKDeHHx3eHL+Gm4OsNa8xrzOT3K+3dvZexbu7IW7
z/sLiNpaYCOAhxaoj/BR9GQIx85c3e3vvrA/sCgRcwMZIvkBrR+wXyoHN7N0
kJUDWjV4CO4awXBxjHz9giIExPGUHTbLGD9d3rO09C6Qn3MgCvmF9YofWzs8
uHirzuUHAbYpTH0v7ZD7fus2gdmkZlv+iQ9Hv0wRe7BYWrDWfvxO/ajHAwxf
XlbVvBxsb1P6RUkKUixuXeyDhO3r6TbB247GeV1tvxaCsfgIcoHVL+mHIVU+
oGe+dYvsUweJqfKCUCz9eogvt/LeH/m8ZoK9eEZWrcnHfj5fiKfawEZx6ruK
eXNBv+RqihOI8Utyi7Ybx0g3LwOQgKyJcmKIXh9UIkYXn055nS6ubGCH60wn
htqmx3Xl+vmpORxaWeZ1YX80QZkjQlvy83AJ7F/zQtbTDfjXcdg9bhuhnteK
rMu8Lso6ykj5JKIqa84DcC8wOIhHbpeVrsnVhiTseSXKOOe2Kt7rm/MRDkke
h04LDNAGqkD2ue1PeN53+bDHQqTiR4jPU/WOfnJQ8qtpy4ZUmsRgIPjxkW3q
sd9vOFHi39Rp3YqRJTykMGjTcZVtoFM9l0/6oTsxyLZ5IkRT/4ZrCdH19XW/
mMShZlljVIRiG3P09OYL7F2CeAKAfEWnk4YValKnFM7TVuGEKG9uSfNb1tfJ
OK735JMapGns2q9pzD3WzUBA2Mekq7odtcub1mm6XeqmXrc9juvHw5/WRR7W
XRP1+q9oXmcgyx3save52iB+UP/6pgype33z3ub1Rvq4H+ezOth5xdPf6/Kl
xQqGH+G35tR+yVWhOK2TNntzEaZAcubfdlfUvCNiwk+4+mtsqwstkq9ap2LN
9YpVgmWmnzpAiJwsk2w5eIpNGQHkojz/nI4XuQean2euNbaf6tlILe8JzYUE
rnf7cZdzJDTXhlplM69sfr7zoplY3QZTddJUfkimbCtdf82tu/MRPRQjLGPd
/SRWCpxs9GMb9KgoAcvt1VwfIOKeYGQZ/94n8Q+bGAzgmsxaNz+VWzxCx93y
qUmN57cf2284tTPrr1SZ5q78/AC/BEdYXf2GY/r1aGbYVBLdh+3Th/I52Jjx
/M/Wf9QaxysckMiIlGjNon8sO/ro4YYQTsxUTWDd9Atvnk9wRSvbJ+4+ixoZ
ZVTHt2MvYH6A1JWQ+v8IuTLBRb0HKJfa1GeTu6o9/zi9nQLUA2RWZkbF4c+m
c5zngJCtEBfc2aQFfvz8tWQx1P+n45rLyfu2tTJyP46TWvnh8GR473f/C3FK
1O+6QAAA

-->

</rfc>

