<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.31 (Ruby 3.2.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="-o*+"?>
<?rfc docmapping="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-suit-mud-06" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="SUIT MUD Linkage">Strong Assertions of IoT Network Access Requirements</title>

    <author initials="B." surname="Moran" fullname="Brendan Moran">
      <organization>Arm Limited</organization>
      <address>
        <email>brendan.moran.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization></organization>
      <address>
        <email>hannes.tschofenig@gmx.net</email>
      </address>
    </author>

    <date year="2023" month="October" day="23"/>

    <area>Security</area>
    <workgroup>SUIT</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>The Manufacturer Usage Description (MUD) specification describes the access and network functionality required for a device to properly function. The MUD description has to reflect the software running on the device and its configuration. Because of this, the most appropriate entity for describing device network access requirements is the same as the entity developing the software and its configuration.</t>

<t>A network presented with a MUD file by a device allows detection of misbehavior by the device software and configuration of access control.</t>

<t>This document defines a way to link a SUIT manifest to a MUD file offering a stronger binding between the two.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>Under <xref target="RFC8520"/>, devices report a MUD URL to a MUD Manager in the network, which then interacts with a MUD File Server
to ultimately obtain the MUD file. The following figure shows the MUD architecture.</t>

<figure><artwork><![CDATA[
    .......................................
    .                      ____________   .           _____________
    .                     |            |  .          |             |
    .                     |    MUD     |-->get URL-->|    MUD      |
    .                     |  Manager   |  .(https)   | File Server |
    .  End system network |____________|<-MUD file<-<|_____________|
    .                             .       .
    .                             .       .
    . ________                _________   .
    .|        |              | router  |  .
    .| Device |--->MUD URL-->|   or    |  .
    .|________|              | switch  |  .
    .                        |_________|  .
    .......................................
]]></artwork></figure>

<t>RFC 8520 envisions different approaches for conveying the MUD URL from the device to the network such as:</t>

<t><list style="symbols">
  <t>DHCP,</t>
  <t>IEEE802.1AB Link Layer Discovery Protocol (LLDP), and</t>
  <t>IEEE 802.1X whereby the URL to the MUD file would be contained in the certificate used in an EAP method.</t>
</list></t>

<t>The MUD Manager uses the MUD URL to fetch the MUD file, which contains connectivity-related functionality required for a device to properly function.</t>

<t>The MUD Manager must trust the MUD File Server from which the MUD file is fetched to return an authentic copy of the MUD file. This concern may be mitigated using the optional signature reference in the MUD file. The MUD Manager must also trust the device to report a correct MUD URL. In case of DHCP and LLDP the URL is likely unprotected.</t>

<t>When the MUD URL is included in a certificate then it is authenticated and integrity protected. A certificate created for use with network access authentication is typically not signed by the entity that wrote the software and configured the device, which leads to a conflation of rights.</t>

<t>There is a need to bind the entity that creates the software/configuration to the MUD file because only that entity can attest the connectivity requirements of the device.</t>

<t>This specification defines an extension to the Software Updates for Internet of Things (SUIT) manifest format <xref target="I-D.ietf-suit-manifest"/> to include a MUD URL. When combining a MUD URL with a manifest used for software/firmware updates then a network operator can get more confidence in the description of the connectivity requirements for a device to properly function.</t>

</section>
<section anchor="terminology"><name>Terminology</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in
BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all
capitals, as shown here.</t>

</section>
<section anchor="workflow"><name>Workflow</name>

<t>The intended workflow is as follows, and assumes an attestation mechanism between the device and the MUD Manager:</t>

<t><list style="symbols">
  <t>At the time of onboarding, devices report their manifest in use to the MUD Manager via some form of attestation evidence and a conveyance protocol.  The normative specification of these mechanisms is out of scope for this document. 
.
  <list style="symbols">
      <t>An example of an attestation evidence format is the Entity Attestation Token (EAT) <xref target="I-D.ietf-rats-eat"/>.  Among other claims, the device could report its software digest(s), and the manifest URI in the EAT "manifests" claim to the MUD Manager.  This approach assumes that attestation evidence includes a link to the SUIT manifest via the "manifests" claim (see Section 4.2.15 of <xref target="I-D.ietf-rats-eat"/>) and that this evidence can be carried in either a network access authentication protocol (for eample an EAP method) or some onboarding protocol like FIDO Device Onboard (FDO).</t>
      <t>The MUD Manager can then (with the help of the Verifier) validate the evidence in order to check that the device is operating with the expected version of software and configuration.</t>
      <t>Since a URL to the manifest is contained in the Evidence, the MUD Manager can look up the corresponding manifest.</t>
    </list></t>
  <t>If the SUIT_MUD_container, see <xref target="suit-extension"/>, has been severed, the MUD Manager can use the suit-reference-uri to retrieve the complete SUIT manifest.</t>
  <t>The manifest authenticity is verified by the MUD Manager, which enforces that the MUD file presented is also authentic and as intended by the device software vendor.</t>
  <t>The MUD Manager acquires the MUD file from the MUD URL found in the SUIT manifest.</t>
  <t>The MUD Manager verifies the MUD file signature using the Subject Key Identifier (SKI) provided in the SUIT manifest.</t>
  <t>Then, the MUD Manager can apply any appropriate policy as described by the MUD file.</t>
</list></t>

<t>Each time a device is updated, rebooted, or otherwise substantially changed, it will execute the remote attestation procedures again.</t>

</section>
<section anchor="operational-considerations"><name>Operational Considerations</name>

<section anchor="pros"><name>Pros</name>

<t>The approach described in this document has several advantages over other MUD URL reporting mechanisms:</t>

<t><list style="symbols">
  <t>The MUD URL is tightly coupled to device software/firmware version.</t>
  <t>The device does not report the MUD URL, so the device cannot tamper with the MUD URL.</t>
  <t>The onus is placed on the software/firmware author to provide a MUD file that describes the behavior of the software running on a device.</t>
  <t>The author explicitly authorizes a key to sign MUD files, providing a tight coupling between the party that knows device behavior best (the author of the software/firmware) and the party that declares device behavior (MUD file signer).</t>
  <t>Network operators do not need to know, a priori, which MUD URL to use for each device; this can be harvested from the device's manifest and only replaced if necessary.</t>
  <t>A network operator can still replace a MUD URL in a SUIT manifest:  <list style="symbols">
      <t>By providing a SUIT manifest that overrides the MUD URL.</t>
      <t>By replacing the MUD URL in their network infrastructure.</t>
    </list></t>
  <t>Devices can be quarantined if they do not attest a known software/firmware version.</t>
  <t>Devices cannot lie about which MUD URL to use.</t>
</list></t>

</section>
<section anchor="cons"><name>Cons</name>

<t>This mechanism relies on the use of SUIT manifests to encode the MUD URL. Conceptually, the MUD file is similar to a Software Bill of Material (SBOM) but focuses on the external visible communication behavior, which is essential for network operators, rather than describing the software libraries contained within the device itself. The SUIT manifest must then be conveyed to the network during onboarding or during the network access authentication step. To accomplish the transport of the manifest attestation evidence is used, which needs to be available at the protocol of choice.</t>

</section>
</section>
<section anchor="suit-extension"><name>Extensions to SUIT</name>

<t>To enable strong assertions about the network access requirements that a device should have for a particular software/configuration pair a MUD URL is added to the SUIT manifest along with a subject key identifier (ski).
The subject key identifier MUST be generated according to the process defined in <xref target="I-D.ietf-cose-key-thumbprint"/> and the SUIT_Digest structure MUST be populated with the selected hash algorithm and obtained fingerprint.
The subject key identifier corresponds to the key used in the MUD signature file described in Section 13.2 of <xref target="RFC8520"/>.</t>

<t>The following CDDL describes the extension to the SUIT_Manifest structure:</t>

<figure><sourcecode type="CDDL"><![CDATA[
$$severable-manifest-members-choice-extensions //= (
  suit-manifest-mud => SUIT_Digest / SUIT_MUD_container
)
]]></sourcecode></figure>

<t>The SUIT_Envelope is also amended:</t>

<figure><sourcecode type="CDDL"><![CDATA[
$$SUIT_severable-members-extensions //= (
  suit-manifest-mud => bstr .cbor SUIT_MUD_container
)
]]></sourcecode></figure>

<t>The SUIT_MUD_container structure is defined as follows:</t>

<figure><sourcecode type="CDDL"><![CDATA[
SUIT_MUD_container = {
    suit-mud-url => #6.32(tstr),
    suit-mud-ski => SUIT_Digest,
}
]]></sourcecode></figure>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This specification links MUD files to SUIT manifests for improving security protection and ease of use. By including MUD URLs in SUIT manifests an extra layer of protection has been created and synchronization risks can be minimized. If the MUD file and the software/firmware loaded onto the device gets out-of-sync a device may be firewalled and, with firewalling by networks in place, the device may stop functioning.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>IANA is requested to add a new value to the SUIT manifest elements registry created with <xref target="I-D.ietf-suit-manifest"/>:</t>

<t><list style="symbols">
  <t>Label: TBD1 [[Value allocated from the standards action address range]]</t>
  <t>Name: Manufacturer Usage Description (MUD)</t>
  <t>Reference: [[TBD: This document]]</t>
</list></t>

<t>IANA is requested to add a new value to the SUIT envelope elements registry created with <xref target="I-D.ietf-suit-manifest"/>:</t>

<t><list style="symbols">
  <t>Label: TBD2 [[Value allocated from the standards action address range]]</t>
  <t>Name: Manufacturer Usage Description (MUD)</t>
  <t>Reference: [[TBD: This document]]</t>
</list></t>

</section>


  </middle>

  <back>


    <references title='Normative References'>



<reference anchor='RFC8520'>
  <front>
    <title>Manufacturer Usage Description Specification</title>
    <author fullname='E. Lear' initials='E.' surname='Lear'/>
    <author fullname='R. Droms' initials='R.' surname='Droms'/>
    <author fullname='D. Romascanu' initials='D.' surname='Romascanu'/>
    <date month='March' year='2019'/>
    <abstract>
      <t>This memo specifies a component-based architecture for Manufacturer Usage Descriptions (MUDs). The goal of MUD is to provide a means for end devices to signal to the network what sort of access and network functionality they require to properly function. The initial focus is on access control. Later work can delve into other aspects.</t>
      <t>This memo specifies two YANG modules, IPv4 and IPv6 DHCP options, a Link Layer Discovery Protocol (LLDP) TLV, a URL, an X.509 certificate extension, and a means to sign and verify the descriptions.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8520'/>
  <seriesInfo name='DOI' value='10.17487/RFC8520'/>
</reference>

<reference anchor='RFC2119'>
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname='S. Bradner' initials='S.' surname='Bradner'/>
    <date month='March' year='1997'/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='14'/>
  <seriesInfo name='RFC' value='2119'/>
  <seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>

<reference anchor='RFC8174'>
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname='B. Leiba' initials='B.' surname='Leiba'/>
    <date month='May' year='2017'/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='14'/>
  <seriesInfo name='RFC' value='8174'/>
  <seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>


<reference anchor='I-D.ietf-rats-eat'>
   <front>
      <title>The Entity Attestation Token (EAT)</title>
      <author fullname='Laurence Lundblade' initials='L.' surname='Lundblade'>
         <organization>Security Theory LLC</organization>
      </author>
      <author fullname='Giridhar Mandyam' initials='G.' surname='Mandyam'>
         <organization>Qualcomm Technologies Inc.</organization>
      </author>
      <author fullname='Jeremy O&#x27;Donoghue' initials='J.' surname='O&#x27;Donoghue'>
         <organization>Qualcomm Technologies Inc.</organization>
      </author>
      <author fullname='Carl Wallace' initials='C.' surname='Wallace'>
         <organization>Red Hound Software, Inc.</organization>
      </author>
      <date day='14' month='October' year='2023'/>
      <abstract>
	 <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine the type
   and degree of trust placed in the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-rats-eat-22'/>
   
</reference>


<reference anchor='I-D.ietf-suit-manifest'>
   <front>
      <title>A Concise Binary Object Representation (CBOR)-based Serialization Format for the Software Updates for Internet of Things (SUIT) Manifest</title>
      <author fullname='Brendan Moran' initials='B.' surname='Moran'>
         <organization>Arm Limited</organization>
      </author>
      <author fullname='Hannes Tschofenig' initials='H.' surname='Tschofenig'>
         </author>
      <author fullname='Henk Birkholz' initials='H.' surname='Birkholz'>
         <organization>Fraunhofer SIT</organization>
      </author>
      <author fullname='Koen Zandberg' initials='K.' surname='Zandberg'>
         <organization>Inria</organization>
      </author>
      <author fullname='Øyvind Rønningstad' initials='O.' surname='Rønningstad'>
         <organization>Nordic Semiconductor</organization>
      </author>
      <date day='23' month='October' year='2023'/>
      <abstract>
	 <t>   This specification describes the format of a manifest.  A manifest is
   a bundle of metadata about code/data obtained by a recipient (chiefly
   the firmware for an IoT device), where to find the code/data, the
   devices to which it applies, and cryptographic information protecting
   the manifest.  Software updates and Trusted Invocation both tend to
   use sequences of common operations, so the manifest encodes those
   sequences of operations, rather than declaring the metadata.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-suit-manifest-24'/>
   
</reference>


<reference anchor='I-D.ietf-cose-key-thumbprint'>
   <front>
      <title>CBOR Object Signing and Encryption (COSE) Key Thumbprint</title>
      <author fullname='Kohei Isobe' initials='K.' surname='Isobe'>
         <organization>SECOM CO., LTD.</organization>
      </author>
      <author fullname='Hannes Tschofenig' initials='H.' surname='Tschofenig'>
         </author>
      <author fullname='Orie Steele' initials='O.' surname='Steele'>
         <organization>Transmute</organization>
      </author>
      <date day='23' month='October' year='2023'/>
      <abstract>
	 <t>   This specification defines a method for computing a hash value over a
   COSE Key. It defines which fields in a COSE Key structure are used in
   the hash computation, the method of creating a canonical form of the
   fields, and how to hash the byte sequence.  The resulting hash value
   can be used for identifying or selecting a key that is the subject of
   the thumbprint.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-cose-key-thumbprint-04'/>
   
</reference>




    </references>




  </back>

<!-- ##markdown-source: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-->

</rfc>

