<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.11 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc strict="yes"?>
<?rfc compact="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-schc-access-control-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="SCHC AC">SCHC Access Control</title>

    <author initials="A." surname="Minaburo" fullname="Ana Minaburo">
      <organization>Consultant</organization>
      <address>
        <postal>
          <street>Rue de Rennes</street>
          <city>35510 Cesson-Sevigne Cedex</city>
          <country>France</country>
        </postal>
        <email>anaminaburo@gmail.com</email>
      </address>
    </author>
    <author initials="L." surname="Toutain" fullname="Laurent Toutain">
      <organization>Institut MINES TELECOM; IMT Atlantique</organization>
      <address>
        <postal>
          <street>2 rue de la Chataigneraie</street> <street>CS 17607</street>
          <city>35576 Cesson-Sevigne Cedex</city>
          <country>France</country>
        </postal>
        <email>Laurent.Toutain@imt-atlantique.fr</email>
      </address>
    </author>
    <author initials="I." surname="Martinez" fullname="Ivan Martinez">
      <organization>Nokia Bell Labs</organization>
      <address>
        <postal>
          <street>12 Rue Jean Bart</street>
          <city>91300 Massy</city>
          <country>France</country>
        </postal>
        <email>ivan.martinez_bolivar@nokia-bell-labs.com</email>
      </address>
    </author>

    <date year="2023" month="December" day="12"/>

    <area>Internet</area>
    <workgroup>SCHC Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>The framework for SCHC defines an abstract view of the rules, formalized through a YANG Data Model. In its original description, rules are static and shared by two endpoints. This document defines defines augmentation to the existing Data Model in order to restrict the changes in the rule and, therefore, the impact of possible attacks.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>SCHC is a compression and fragmentation mechanism defined in <xref target="RFC8724"/> while <xref target="RFC9363"/> provides a YANG Data Model for formal representation of SCHC Rules used either for compression/decompression (C/D) or fragmentation/reassembly (F/R). The inappropriate changes to SCHC Rules leads to some possible attacks. The goal of this document is to define a augmentation to the existing Data Model in order to restrict the changes in the rules and, therefore, the impact of possible attacks.</t>

</section>
<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

</section>
<section anchor="terminology"><name>Terminology</name>

<t>It is expected that the reader will be familiar with the terms and concepts associated with the SCHC framework <xref target="RFC8724"/>, <xref target="I-D.ietf-schc-architecture"/>, and managmente request processing <xref target="I-D.ietf-core-comi"/>, NETCONF<xref target="RFC6241"/>, RESTCONF <xref target="RFC8040"/>.</t>

<t>ToDo
* Access Control.
* Management request processing: The NETCONF, RESTCONF or CORECONF request is processed and passed to the end-point Rule Manager.
* Rule Manager (RM).
* Context. SCHC Rules</t>

</section>
<section anchor="schc-tvmocda-possible-combinations"><name>SCHC TV/MO/CDA possible combinations</name>

<t>SCHC compression behavior uses the TV, MO, and CDA to generate the correct residue. But not all the combinations of this fields descriptors are possible, and then an attack can be detected or avoided. <xref target="Fig-combinations"/> shows all the combinations and those that are enabled. SCHC defines two TV values: set and not set. SCHC MO can be Equal, Ignore, MSB, or Match-mapping. And SCHC CDA can be not-sent, value-sent, mapping-sent, LSB, compute-*, DevIID, or AppIID.</t>

<figure title="SCHC TV, MO, CDA valid combinations" anchor="Fig-combinations"><artwork><![CDATA[
+--------------+----------------------------------------------------+
|              |                      CDA                           |
| TV   /  MO   +--------+---------------+---+---------+------+------+
|              |not-sent| value |mapping|LSB|compute-*|DevIID|AppIID|
|              |        | -sent | -sent |   |         |      |      |  
+==============+========+=======+=======+===+=========+======+======+
| set  / Equal |  ok    |absurd |   x   | x | absurd  |absurd|absurd|
+--------------+--------+-------+-------+---+---------+------+------+
|not set /Equal|   x    |   x   |   x   | x | absurd  |absurd|absurd|
+--------------+--------+-------+-------+---+---------+------+------+
| set / Ignore | ok (D) | absurd|    x  | x |   ok    |  ok  |  ok  |
+--------------+--------+-------+-------+---+---------+------+------+
|not set/Ignore|   x    |  ok   |    x  | x |   ok    |  ok  |  ok  |
+--------------+--------+-------+-------+---+---------+------+------+
| set  /   MSB | absurd |absurd |    x  | ok|  absurd |absurd|absurd|
+--------------+--------+-------+-------+---+---------+------+------+
|not set / MSB | absurd | absurd|    x  | ok|  absurd |absurd|absurd|
+--------------+--------+-------+-------+---+---------+------+------+
| set  /  Match|   x    | absurd|   ok  | x |  absurd |absurd|absurd|
|      -mapping|        |       |       |   |         |      |      |
+--------------+--------+-------+-------+---+---------+------+------+
|not set/ Match|   x    |   x   | absurd| x |  absurd |absurd|absurd|
|      -mapping|        |       |       |   |         |      |      |
+--------------+--------+-------+-------+---+---------+------+------+

]]></artwork></figure>

</section>
<section anchor="yang-access-control"><name>YANG Access Control</name>

<t>YANG language allows to specify read-only or read write nodes. NACM <xref target="RFC8341"/> extends this by allowing users or groups of users to perform specific actions.</t>

<t>This granularity does not fit this rule model. For instance, the goal is not to allow all the field-id leaves to be modified. The objective is to allow a specific rule entry to be changed and, therefore, some of the leaves to be modified. For instance, an entry with FID containing Uri-path may have its target value modified, as in the same rule, the entry regarding the application prefix should not be changed.</t>

<t>The SCHC access control augments the YANG module defined in <xref target="RFC9363"/> to allow a remote entity to manipulate the rules. Several levels are defined.</t>

<t><list style="symbols">
  <t>in the set of rules, it authorizes or NOT a new rule to be added.</t>
  <t>in a compression rule, it allows adding or removing field descriptions.</t>
  <t>in a compression rule, it allows modifying some elements of the rule, such as the TV, MO, or/and CDA, and associated values.</t>
  <t>in a fragmentation rule, it allows modifying some parameters.</t>
</list></t>

</section>
<section anchor="yang-data-model"><name>YANG Data Model</name>

<t>The YANG DM proposed in <xref target="AnnexA"/> extends the SCHC YANG Data Model introduced in <xref target="RFC9363"/>. It adds read-only leaves containing access rights. If these leaves are not present, the information cannot be modified.</t>

<section anchor="leaf-ac-modify-set-of-rules"><name>leaf ac-modify-set-of-rules</name>

<t>This leaf controls modifications applied to a set of rules. They are specified with the rule-access-right enumeration:</t>

<t><list style="symbols">
  <t>no-change (0): rules cannot be modified in the Set of Rules. This is the equivalent of having no access control elements in the set of rules.</t>
  <t>modify-existing-element (1): an existing rule may be modified.</t>
  <t>add-remove-element (2): a rule can be added or deleted from the Set of Rules, or an existing rule can be modified.</t>
</list></t>

</section>
<section anchor="leaf-ac-modify-compression-rule"><name>leaf ac-modify-compression-rule</name>

<t>This leaf allows to modify a compression element. To be active, leaf ac-modify-set-of-rules <bcp14>MUST</bcp14> be set to modify-existing-element or add-remove-element. This leaf uses the same enumeration as add-remove-element:</t>

<t><list style="symbols">
  <t>no-change (0): The rule cannot be modified.</t>
  <t>modify-existing-element (1): an existing Field Description may be modified.</t>
  <t>add-remove-element (2): a Field Description can be added or deleted from the Rule or an existing rule can be modified.</t>
</list></t>

</section>
<section anchor="leaf-ac-modify-field"><name>leaf ac-modify-field</name>

<t>This leaf allows to modify a Field Description in a compression rule. To be active, leaves ac-modify-set-of-rules and ac-modify-compression-rule <bcp14>MUST</bcp14> be set to modify-existing-element  or add-remove-element and ac-modify-compression-rule and leaf.</t>

<section anchor="coap-base-header-access-control"><name>CoAP base header Access Control.</name>

<t>CoAP protocol uses a request/reply model with compact messages.
The format of these messages starts with a fixed format of 4-byte length,
followed by a variable Token format with a length between 0 and 8 bytes.
While applying SCHC header compression <xref target="RFC8824"/>, the based header is only readable and <bcp14>MUST NOT</bcp14> be modified.
<xref target="Figure-CoAPHeader"/> shows the access-control for the FID and TV in a Rules.</t>

<figure title="Access Control for the CoAP Header" anchor="Figure-CoAPHeader"><artwork><![CDATA[

+----------+--------------+---+--+--+----------+----------+
|   Access |     FID      | FL|FP|DI| Access   |    TV    |
|  Control |              |   |  |  | Control  | (default |
|    FID   |              |   |  |  |    TV    |  value)  |
+----------+--------------+---+--+--+----------+----------+
| Read Only| CoAP.Version | 2 | 1|Bi|Read Only |     1    |
+----------+--------------+---+--+--+----------+----------+
| Read Only| CoAP.Type    | 2 | 1|Bi|Read Only |CON,NON-C,|
|          |              |   |  |  |          |ACK, RST. |
+----------+--------------+---+--+--+----------+----------+
| Read Only| CoAP.TKL     | 4 | 1|Bi|Read/Write|   none   |
+----------+--------------+---+--+--+----------+----------+
| Read Only| CoAP.Code    | 8 | 1|Bi|Read Only |See CoAP  |
|          |              |   |  |  |          |Code      |
|          |              |   |  |  |          |Registries|
+----------+--------------+---+--+--+----------+----------+
| Read Only|CoAP.MessageID| 16| 1|Bi|Read/Write|   none   |
+----------+--------------+---+--+--+----------+----------+
| Read Only|  CoAP.Token  |0-8| 1|Bi|Read/Write|   none   |
+----------+--------------+---+--+--+----------+----------+


]]></artwork></figure>

</section>
<section anchor="coap-options-access-control"><name>CoAP Options Access Control.</name>

<t>The CoAP options are used by both request and responses messages.
Some of them are defined as repeatable which implies that it <bcp14>MAY</bcp14> be included one or more times in a message.
In this case, a SCHC Rule <bcp14>MAY</bcp14> be able to modify the FID and the TV in order to include the repetition.
The only FID's that have access to be modifiable are those that have been defined as repeatable.
The <xref target="Figure-CoAPOptions"/> give the control access for all the CoAP Options defined in <xref target="RFC7252"/>;
<xref target="RFC8613"/>; <xref target="RFC8768"/>; <xref target="RFC9177"/>; <xref target="RFC7959"/>; and <xref target="RFC9175"/>.</t>

<figure title="CoAP Options access-control" anchor="Figure-CoAPOptions"><artwork><![CDATA[

+-------+----+--------------+------+---+--+-------+--------+
| Access|CoAP|     FID      |  FL  |FP |DI|Access |   TV   |
|Control|Opt.|              |      |   |  |Control|(default|
|  FID  |Num.|              |      |   |  |  TV   | value) |
+-------+----+--------------+------+---+--+-------+--------+
| Read/ | 1  | CoAP.Option. | 0-8  |var|Bi| Read/ |  none  |
| Write |    | If-Match     |      |   |  | Write |        |
+-------+----+--------------+------+---+--+-------+--------+
| Read  | 3  | CoAP.Option. |      |   |  | Read/ |Sect. 5 |
| Only  |    | Uri-Host     |1-255 |var|Bi| Write | RFC7252|
+-------+----+--------------+------+---+--+-------+--------+
| Read/ | 4  | CoAP.Option. |      |   |  | Read/ |  none  |
| Write |    | ETag         | 1-8  |var|Bi| Write |        |
+-------+----+--------------+------+---+--+-------+--------+
| Read  | 5  | CoAP.Option. |      |   |  | Read  | empty  |
| Only  |    |If-None-Match |  0   | 1 |Bi| Only  |        |
+-------+----+--------------+------+---+--+-------+--------+
| Read  | 6  | CoAP.Option. |      |   |  | Read  |  none  |
| Only  |    | Observe      | 0-3  |var|Bi| Only  |        |
+-------+----+--------------+------+---+--+-------+--------+
| Read  | 7  | CoAP.Option. |      |   |  | Read  |Sect. 5 |
| Only  |    | Uri-Port     | 0-2  |var|Bi| Only  |RFC7252 |
+-------+----+--------------+------+---+--+-------+--------+
| Read/ | 8  | CoAP.Option. |      |   |  | Read/ |  none  |
| Write |    |Location-Path | 0-255|var|Bi| Write |        |
+-------+----+--------------+------+---+--+-------+--------+
| Read  | 9  |CoAP.Option.  |      |   |  | Read  |  none  |
| Only  |    | OSCORE       |0-255 |var|Bi| Only  |        |
+-------+----+--------------+------+---+--+-------+--------+
| Read/ | 11 | CoAP.Option. |      |   |  | Read/ |  none  |
| Write |    | Uri-Path     |0-255 |var|Bi| Write |        |
+-------+----+--------------+------+---+--+-------+--------+
| Read  | 12 | CoAP.Option. |      |   |  | Read  |  none  |
| Only  |    |Content-Format| 0-2  |var|Bi| Only  |        |
+-------+----+--------------+------+---+--+-------+--------+
| Read  | 14 | CoAP.Option. |      |   |  | Read  |   60   |
| Only  |    | Max-Age      | 0-4  |var|Bi| Only  |        |
+-------+----+--------------+------+---+--+-------+--------+
| Read/ | 15 | CoAP.Option. |      |   |  | Read/ |  none  |
| Write |    | Uri-Query    |0-255 |var|Bi| Write |        |
+-------+----+--------------+------+---+--+-------+--------+
| Read  | 16 | CoAP.Option. |      |   |  | Read  |   16   |
| Only  |    | Hop-Limit    |  1   | 1 |Bi| Only  |        |
+-------+----+--------------+------+---+--+-------+--------+
| Read  | 17 | CoAP.Option. |      |   |  | Read  |  none  |
| Only  |    | Accept       | 0-2  |var|Bi| Only  |        |
+-------+----+--------------+------+---+--+-------+--------+
| Read  | 19 | CoAP.Option. |      |   |  | Read  |  none  |
| Only  |    | Q-Block1     | 0-3  |var|Bi| Only  |        |
+-------+----+--------------+------+---+--+-------+--------+
| Read/ | 20 | CoAP.Option. |      |   |  | Read/ |  none  |
| Write |    |Location-Query|0-255 |var|Bi| Write |        |
+-------+----+--------------+------+---+--+-------+--------+
| Read  | 23 | CoAP.Option. |      |   |  | Read  |  none  |
| Only  |    | Block2       | 0-3  |var|Bi| Only  |        |
+-------+----+--------------+------+---+--+-------+--------+
| Read  | 27 | CoAP.Option. |      |   |  | Read  |  none  |
| Only  |    | Block1       | 0-3  |var|Bi| Only  |        |
+-------+----+--------------+------+---+--+-------+--------+
| Read  | 28 | CoAP.Option. |      |   |  | Read  |  none  |
| Only  |    | Size2        | 0-4  |var|Bi| Only  |        |
+-------+----+--------------+------+---+--+-------+--------+
| Read/ | 31 | CoAP.Option. |      |   |  | Read/ |  none  |
| Write |    | Q-Block2     | 0-3  |var|Bi| Write |        |
+-------+----+--------------+------+---+--+-------+--------+
| Read  | 35 | CoAP.Option. |      |   |  | Read  |  none  |
| Only  |    | Proxy-Uri    |1-1034|var|Bi| Only  |        |
+-------+----+--------------+------+---+--+-------+--------+
| Read  | 39 | CoAP.Option. |      |   |  | Read  |  none  |
| Only  |    | Proxy-Scheme |1-255 |var|Bi| Only  |        |
+-------+----+--------------+------+---+--+-------+--------+
| Read  | 60 | CoAP.Option. |      |   |  | Read  |  none  |
| Only  |    | Size1        | 0-4  |var|Bi| Only  |        |
+-------+----+--------------+------+---+--+-------+--------+
| Read  |252 | CoAP.Option. |      |   |  | Read  |  none  |
| Only  |    | Echo         | 1-40 |var|Bi| Only  |        |
+-------+----+--------------+------+---+--+-------+--------+
| Read  |258 | CoAP.Option. |      |   |  | Read  |   0    |
| Only  |    | No-Response  | 0-1  | 1 |Up| Only  |        |
+-------+----+--------------+------+---+--+-------+--------+
| Read  |292 | CoAP.Option. |      |   |  | Read  |  none  |
| Only  |    | Request-Tag  | 0-8  |var|Bi| Only  |        |
+-------+----+--------------+------+---+--+-------+--------+


]]></artwork></figure>

</section>
</section>
</section>


  </middle>

  <back>


    <references title='Normative References'>



<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname='S. Bradner' initials='S.' surname='Bradner'/>
    <date month='March' year='1997'/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='14'/>
  <seriesInfo name='RFC' value='2119'/>
  <seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>

<reference anchor='RFC6241' target='https://www.rfc-editor.org/info/rfc6241'>
  <front>
    <title>Network Configuration Protocol (NETCONF)</title>
    <author fullname='R. Enns' initials='R.' role='editor' surname='Enns'/>
    <author fullname='M. Bjorklund' initials='M.' role='editor' surname='Bjorklund'/>
    <author fullname='J. Schoenwaelder' initials='J.' role='editor' surname='Schoenwaelder'/>
    <author fullname='A. Bierman' initials='A.' role='editor' surname='Bierman'/>
    <date month='June' year='2011'/>
    <abstract>
      <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='6241'/>
  <seriesInfo name='DOI' value='10.17487/RFC6241'/>
</reference>

<reference anchor='RFC8040' target='https://www.rfc-editor.org/info/rfc8040'>
  <front>
    <title>RESTCONF Protocol</title>
    <author fullname='A. Bierman' initials='A.' surname='Bierman'/>
    <author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'/>
    <author fullname='K. Watsen' initials='K.' surname='Watsen'/>
    <date month='January' year='2017'/>
    <abstract>
      <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8040'/>
  <seriesInfo name='DOI' value='10.17487/RFC8040'/>
</reference>

<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname='B. Leiba' initials='B.' surname='Leiba'/>
    <date month='May' year='2017'/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='14'/>
  <seriesInfo name='RFC' value='8174'/>
  <seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>

<reference anchor='RFC8724' target='https://www.rfc-editor.org/info/rfc8724'>
  <front>
    <title>SCHC: Generic Framework for Static Context Header Compression and Fragmentation</title>
    <author fullname='A. Minaburo' initials='A.' surname='Minaburo'/>
    <author fullname='L. Toutain' initials='L.' surname='Toutain'/>
    <author fullname='C. Gomez' initials='C.' surname='Gomez'/>
    <author fullname='D. Barthel' initials='D.' surname='Barthel'/>
    <author fullname='JC. Zuniga' initials='JC.' surname='Zuniga'/>
    <date month='April' year='2020'/>
    <abstract>
      <t>This document defines the Static Context Header Compression and fragmentation (SCHC) framework, which provides both a header compression mechanism and an optional fragmentation mechanism. SCHC has been designed with Low-Power Wide Area Networks (LPWANs) in mind.</t>
      <t>SCHC compression is based on a common static context stored both in the LPWAN device and in the network infrastructure side. This document defines a generic header compression mechanism and its application to compress IPv6/UDP headers.</t>
      <t>This document also specifies an optional fragmentation and reassembly mechanism. It can be used to support the IPv6 MTU requirement over the LPWAN technologies. Fragmentation is needed for IPv6 datagrams that, after SCHC compression or when such compression was not possible, still exceed the Layer 2 maximum payload size.</t>
      <t>The SCHC header compression and fragmentation mechanisms are independent of the specific LPWAN technology over which they are used. This document defines generic functionalities and offers flexibility with regard to parameter settings and mechanism choices. This document standardizes the exchange over the LPWAN between two SCHC entities. Settings and choices specific to a technology or a product are expected to be grouped into profiles, which are specified in other documents. Data models for the context and profiles are out of scope.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8724'/>
  <seriesInfo name='DOI' value='10.17487/RFC8724'/>
</reference>

<reference anchor='RFC8824' target='https://www.rfc-editor.org/info/rfc8824'>
  <front>
    <title>Static Context Header Compression (SCHC) for the Constrained Application Protocol (CoAP)</title>
    <author fullname='A. Minaburo' initials='A.' surname='Minaburo'/>
    <author fullname='L. Toutain' initials='L.' surname='Toutain'/>
    <author fullname='R. Andreasen' initials='R.' surname='Andreasen'/>
    <date month='June' year='2021'/>
    <abstract>
      <t>This document defines how to compress Constrained Application Protocol (CoAP) headers using the Static Context Header Compression and fragmentation (SCHC) framework. SCHC defines a header compression mechanism adapted for Constrained Devices. SCHC uses a static description of the header to reduce the header's redundancy and size. While RFC 8724 describes the SCHC compression and fragmentation framework, and its application for IPv6/UDP headers, this document applies SCHC to CoAP headers. The CoAP header structure differs from IPv6 and UDP, since CoAP uses a flexible header with a variable number of options, themselves of variable length. The CoAP message format is asymmetric: the request messages have a header format different from the format in the response messages. This specification gives guidance on applying SCHC to flexible headers and how to leverage the asymmetry for more efficient compression Rules.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8824'/>
  <seriesInfo name='DOI' value='10.17487/RFC8824'/>
</reference>

<reference anchor='RFC9363' target='https://www.rfc-editor.org/info/rfc9363'>
  <front>
    <title>A YANG Data Model for Static Context Header Compression (SCHC)</title>
    <author fullname='A. Minaburo' initials='A.' surname='Minaburo'/>
    <author fullname='L. Toutain' initials='L.' surname='Toutain'/>
    <date month='March' year='2023'/>
    <abstract>
      <t>This document describes a YANG data model for the Static Context Header Compression (SCHC) compression and fragmentation Rules.</t>
      <t>This document formalizes the description of the Rules for better interoperability between SCHC instances either to exchange a set of Rules or to modify the parameters of some Rules.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9363'/>
  <seriesInfo name='DOI' value='10.17487/RFC9363'/>
</reference>

<reference anchor='RFC8341' target='https://www.rfc-editor.org/info/rfc8341'>
  <front>
    <title>Network Configuration Access Control Model</title>
    <author fullname='A. Bierman' initials='A.' surname='Bierman'/>
    <author fullname='M. Bjorklund' initials='M.' surname='Bjorklund'/>
    <date month='March' year='2018'/>
    <abstract>
      <t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability. There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content. This document defines such an access control model.</t>
      <t>This document obsoletes RFC 6536.</t>
    </abstract>
  </front>
  <seriesInfo name='STD' value='91'/>
  <seriesInfo name='RFC' value='8341'/>
  <seriesInfo name='DOI' value='10.17487/RFC8341'/>
</reference>

<reference anchor='RFC7252' target='https://www.rfc-editor.org/info/rfc7252'>
  <front>
    <title>The Constrained Application Protocol (CoAP)</title>
    <author fullname='Z. Shelby' initials='Z.' surname='Shelby'/>
    <author fullname='K. Hartke' initials='K.' surname='Hartke'/>
    <author fullname='C. Bormann' initials='C.' surname='Bormann'/>
    <date month='June' year='2014'/>
    <abstract>
      <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
      <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='7252'/>
  <seriesInfo name='DOI' value='10.17487/RFC7252'/>
</reference>

<reference anchor='RFC8613' target='https://www.rfc-editor.org/info/rfc8613'>
  <front>
    <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
    <author fullname='G. Selander' initials='G.' surname='Selander'/>
    <author fullname='J. Mattsson' initials='J.' surname='Mattsson'/>
    <author fullname='F. Palombini' initials='F.' surname='Palombini'/>
    <author fullname='L. Seitz' initials='L.' surname='Seitz'/>
    <date month='July' year='2019'/>
    <abstract>
      <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE). OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
      <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration. Therefore, this document updates RFC 7252.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8613'/>
  <seriesInfo name='DOI' value='10.17487/RFC8613'/>
</reference>

<reference anchor='RFC8768' target='https://www.rfc-editor.org/info/rfc8768'>
  <front>
    <title>Constrained Application Protocol (CoAP) Hop-Limit Option</title>
    <author fullname='M. Boucadair' initials='M.' surname='Boucadair'/>
    <author fullname='T. Reddy.K' initials='T.' surname='Reddy.K'/>
    <author fullname='J. Shallow' initials='J.' surname='Shallow'/>
    <date month='March' year='2020'/>
    <abstract>
      <t>The presence of Constrained Application Protocol (CoAP) proxies may lead to infinite forwarding loops, which is undesirable. To prevent and detect such loops, this document specifies the Hop-Limit CoAP option.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8768'/>
  <seriesInfo name='DOI' value='10.17487/RFC8768'/>
</reference>

<reference anchor='RFC9177' target='https://www.rfc-editor.org/info/rfc9177'>
  <front>
    <title>Constrained Application Protocol (CoAP) Block-Wise Transfer Options Supporting Robust Transmission</title>
    <author fullname='M. Boucadair' initials='M.' surname='Boucadair'/>
    <author fullname='J. Shallow' initials='J.' surname='Shallow'/>
    <date month='March' year='2022'/>
    <abstract>
      <t>This document specifies alternative Constrained Application Protocol (CoAP) block-wise transfer options: Q-Block1 and Q-Block2.</t>
      <t>These options are similar to, but distinct from, the CoAP Block1 and Block2 options defined in RFC 7959. The Q-Block1 and Q-Block2 options are not intended to replace the Block1 and Block2 options but rather have the goal of supporting Non-confirmable (NON) messages for large amounts of data with fewer packet interchanges. Also, the Q-Block1 and Q-Block2 options support faster recovery should any of the blocks get lost in transmission.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9177'/>
  <seriesInfo name='DOI' value='10.17487/RFC9177'/>
</reference>

<reference anchor='RFC7959' target='https://www.rfc-editor.org/info/rfc7959'>
  <front>
    <title>Block-Wise Transfers in the Constrained Application Protocol (CoAP)</title>
    <author fullname='C. Bormann' initials='C.' surname='Bormann'/>
    <author fullname='Z. Shelby' initials='Z.' role='editor' surname='Shelby'/>
    <date month='August' year='2016'/>
    <abstract>
      <t>The Constrained Application Protocol (CoAP) is a RESTful transfer protocol for constrained nodes and networks. Basic CoAP messages work well for small payloads from sensors and actuators; however, applications will need to transfer larger payloads occasionally -- for instance, for firmware updates. In contrast to HTTP, where TCP does the grunt work of segmenting and resequencing, CoAP is based on datagram transports such as UDP or Datagram Transport Layer Security (DTLS). These transports only offer fragmentation, which is even more problematic in constrained nodes and networks, limiting the maximum size of resource representations that can practically be transferred.</t>
      <t>Instead of relying on IP fragmentation, this specification extends basic CoAP with a pair of "Block" options for transferring multiple blocks of information from a resource representation in multiple request-response pairs. In many important cases, the Block options enable a server to be truly stateless: the server can handle each block transfer separately, with no need for a connection setup or other server-side memory of previous block transfers. Essentially, the Block options provide a minimal way to transfer larger representations in a block-wise fashion.</t>
      <t>A CoAP implementation that does not support these options generally is limited in the size of the representations that can be exchanged, so there is an expectation that the Block options will be widely used in CoAP implementations. Therefore, this specification updates RFC 7252.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='7959'/>
  <seriesInfo name='DOI' value='10.17487/RFC7959'/>
</reference>

<reference anchor='RFC9175' target='https://www.rfc-editor.org/info/rfc9175'>
  <front>
    <title>Constrained Application Protocol (CoAP): Echo, Request-Tag, and Token Processing</title>
    <author fullname='C. Amsüss' initials='C.' surname='Amsüss'/>
    <author fullname='J. Preuß Mattsson' initials='J.' surname='Preuß Mattsson'/>
    <author fullname='G. Selander' initials='G.' surname='Selander'/>
    <date month='February' year='2022'/>
    <abstract>
      <t>This document specifies enhancements to the Constrained Application Protocol (CoAP) that mitigate security issues in particular use cases. The Echo option enables a CoAP server to verify the freshness of a request or to force a client to demonstrate reachability at its claimed network address. The Request-Tag option allows the CoAP server to match block-wise message fragments belonging to the same request. This document updates RFC 7252 with respect to the following: processing requirements for client Tokens, forbidding non-secure reuse of Tokens to ensure response-to-request binding when CoAP is used with a security protocol, and amplification mitigation (where the use of the Echo option is now recommended).</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9175'/>
  <seriesInfo name='DOI' value='10.17487/RFC9175'/>
</reference>


<reference anchor='I-D.ietf-core-comi' target='https://datatracker.ietf.org/doc/html/draft-ietf-core-comi-16'>
   <front>
      <title>CoAP Management Interface (CORECONF)</title>
      <author fullname='Michel Veillette' initials='M.' surname='Veillette'>
         <organization>Trilliant Networks Inc.</organization>
      </author>
      <author fullname='Peter Van der Stok' initials='P.' surname='Van der Stok'>
         <organization>consultant</organization>
      </author>
      <author fullname='Alexander Pelov' initials='A.' surname='Pelov'>
         <organization>Acklio</organization>
      </author>
      <author fullname='Andy Bierman' initials='A.' surname='Bierman'>
         <organization>YumaWorks</organization>
      </author>
      <author fullname='Carsten Bormann' initials='C.' surname='Bormann'>
         <organization>Universität Bremen TZI</organization>
      </author>
      <date day='4' month='September' year='2023'/>
      <abstract>
	 <t>   This document describes a network management interface for
   constrained devices and networks, called CoAP Management Interface
   (CORECONF).  The Constrained Application Protocol (CoAP) is used to
   access datastore and data node resources specified in YANG, or SMIv2
   converted to YANG.  CORECONF uses the YANG to CBOR mapping and
   converts YANG identifier strings to numeric identifiers for payload
   size reduction.  CORECONF extends the set of YANG based protocols,
   NETCONF and RESTCONF, with the capability to manage constrained
   devices and networks.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-core-comi-16'/>
   
</reference>


<reference anchor='I-D.ietf-schc-architecture' target='https://datatracker.ietf.org/doc/html/draft-ietf-schc-architecture-01'>
   <front>
      <title>Static Context Header Compression (SCHC) Architecture</title>
      <author fullname='Alexander Pelov' initials='A.' surname='Pelov'>
         <organization>IMT Atlantique</organization>
      </author>
      <author fullname='Pascal Thubert' initials='P.' surname='Thubert'>
         </author>
      <author fullname='Ana Minaburo' initials='A.' surname='Minaburo'>
         <organization>Consultant</organization>
      </author>
      <date day='6' month='October' year='2023'/>
      <abstract>
	 <t>   This document defines the SCHC architecture.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-schc-architecture-01'/>
   
</reference>




    </references>



<section anchor="AnnexA"><name>YANG Data Model</name>

<figure><artwork><![CDATA[
<CODE BEGINS> file "ietf-schc-access-control@2023-02-14.yang"
module ietf-schc-access-control {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-schc-access-control";
  prefix schc-ac;

  import ietf-schc {
      prefix schc;
  }

  organization
    "IETF IPv6 over Low Power Wide-Area Networks (lpwan) working group";
  contact
    "WG Web:   <https://datatracker.ietf.org/wg/lpwan/about/>
     WG List:  <mailto:lp-wan@ietf.org>
     Editor:   Juan-Carlos Zuniga
       <mailto:juancarlos.zuniga@sigfox.com>";
  description
     "
     Copyright (c) 2021 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject to
     the license terms contained in, the Simplified BSD License set
     forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC XXXX
     (https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself
     for full legal notices.

     The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
     NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
     'MAY', and 'OPTIONAL' in this document are to be interpreted as
     described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
     they appear in all capitals, as shown here.

     *************************************************************************

     This module extends the ietf-schc module to include the compound-ack 
     behavior for Ack On Error as defined in RFC YYYY. 
     It introduces a new leaf for Ack on Error defining the format of the
     SCHC Ack and add the possibility to send several bitmaps in a single 
     answer.";

  revision 2023-02-14 {
    description
      "Initial version for RFC YYYY ";
    reference
      "RFC YYYY: Compound Ack";
  }

  typedef rule-access-right {
    type enumeration {
      enum no-changes {
        value 0;
        description
          "No change are allowed.";
      }
      enum modify-existing-element {
        value 1;
        description
          "can modify content inside an element.";
      }
      enum add-remove-element {
        value 2;
        description
          "Allows to add or remove or modify an element.";
      }
    }
  }

  typedef field-access-right {
    type enumeration {
      enum no-change {
        value 0;
        description
          "Reserved slot number.";
      }
      enum change-tv {
        value 1;
        description
          "Reserved slot number.";
      }
      enum change-mo-cda-tv {
        value 2;
        description
          "Reserved slot number.";
      }
    }

  }

  augment "/schc:schc/schc:rule" {
    leaf ac-modify-set-of-rules {
          config false;
          type rule-access-right;
        }
  }

  augment "/schc:schc/schc:rule/schc:nature/schc:compression" {
    leaf ac-modify-compression-rule {
          config false;
          type rule-access-right;
        }
  }

  augment "/schc:schc/schc:rule/schc:nature/schc:compression/schc:entry" {
    leaf ac-modify-field {
          config false;
          type field-access-right;
        }
  }

  augment "/schc:schc/schc:rule/schc:nature/schc:fragmentation" {
    leaf ac-modify-timers {
          config false;
          type boolean;
        }
  }


}
<CODE ENDS>
]]></artwork></figure>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>TBD</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>TBD</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

