<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.31 (Ruby 3.2.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc text-list-symbols="-o*+"?>
<?rfc docmapping="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-suit-mud-08" category="std" consensus="true" updates="draft-ietf-suit-manifest" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="SUIT MUD Linkage">Strong Assertions of IoT Network Access Requirements</title>

    <author initials="B." surname="Moran" fullname="Brendan Moran">
      <organization>Arm Limited</organization>
      <address>
        <email>brendan.moran.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization></organization>
      <address>
        <email>hannes.tschofenig@gmx.net</email>
      </address>
    </author>

    <date year="2024" month="March" day="04"/>

    <area>Security</area>
    <workgroup>SUIT</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>The Manufacturer Usage Description (MUD) specification describes the access and network functionality required for a device to properly function. This description has to reflect the software running on the device and its configuration. Because of this, the most appropriate entity for describing device network access requirements is the same as the entity developing the software and its configuration.</t>

<t>A network presented with a MUD file by a device allows detection of misbehavior by the device software and configuration of access control.</t>

<t>This document defines a way to link the Software Updates for Internet of Things (SUIT) manifest to a MUD file offering a stronger binding between the two.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>A Manufacturer Usage Description (MUD) file describes what sort of network communication behavior a device is designed to have. For example,
a manufacturer may use a MUD file to describe that a device uses HTTP, DNS and NTP communication but no other protocols. The communication patterns are
described in a JSON-based format in the MUD file.</t>

<t>The MUD files do, however, need to be presented by the device to a MUD manager in the operational network where the device is deployed.
Under <xref target="RFC8520"/>, devices report a MUD URL to a MUD manager in the operational network. The MUD URL is a URL that can be used by the MUD manager to receive the MUD file from a MUD file server to ultimately obtain the MUD file.</t>

<t><xref target="arch-mud-fig"/> shows the MUD architecture, as defined in RFC 8520.</t>

<figure title="MUD Architecture per RFC 8520." anchor="arch-mud-fig"><artwork><![CDATA[
    .......................................
    .                      ____________   .           _____________
    .                     |            |  .          |             |
    .                     |    MUD     |-->get URL-->|    MUD      |
    .                     |  Manager   |  .(https)   | File Server |
    .  End system network |____________|<-MUD file<-<|_____________|
    .                             .       .
    .                             .       .
    . ________                _________   .
    .|        |              | router  |  .
    .| Device |--->MUD URL-->|   or    |  .
    .|________|              | switch  |  .
    .                        |_________|  .
    .......................................
]]></artwork></figure>

<t>RFC 8520 envisions different approaches for conveying the MUD URL from the device to the operational network. Section 4 of <xref target="I-D.ietf-opsawg-mud-acceptable-urls"/> provides additional description of the MUD URLs sources, which include:</t>

<t><list style="symbols">
  <t>DHCP,</t>
  <t>IEEE 802.1AB Link Layer Discovery Protocol (LLDP), and</t>
  <t>IEEE 802.1X whereby the URL to the MUD file would be contained in the certificate used in an EAP method.</t>
</list></t>

<t>The MUD manager must trust the MUD file server from which the MUD file is fetched to return the most up-to-date MUD file.
It must also trust the device to report the correct MUD URL. In case of DHCP and LLDP the URL is unprotected and not bound
to the device itself.</t>

<t>When the MUD URL is included in a certificate then it is authenticated and integrity protected. There is a need to bind the entity that creates the software and configuration to the MUD file. The developer is in the best position to describe
the communication requirements of the software it developed and configured for a device.</t>

<t>This specification defines an extension to the Software Updates for Internet of Things (SUIT) manifest <xref target="I-D.ietf-suit-manifest"/>
to include a MUD URL. A SUIT manifest is
   a bundle of metadata about code/data for an IoT device, where to find the code/data, the
   devices to which it applies, and cryptographic information protecting
   the manifest.</t>

<t>When combining a MUD URL with a manifest used for software/firmware updates then a network operator can gain
more confidence in the description of the communication requirements for a device to properly function.</t>

</section>
<section anchor="terminology"><name>Terminology</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in
BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all
capitals, as shown here.</t>

<t>This document re-uses the terms defined in <xref target="RFC9334"/> related to
remote attestation.  Readers of this document are assumed to be
familiar with the following terms: Evidence, Claim, Attester, Verifier,
and Relying Party (RP).</t>

<t>This document also uses terms defined in <xref target="RFC8520"/>, such as MUD,
MUD file, MUD manager, MUD URL, etc.</t>

</section>
<section anchor="workflow"><name>Workflow</name>

<t><xref target="arch-mud-new-fig"/> shows the architectural extensions introduced by combining
SUIT and MUD. The key elements are that the developer, who produces the
firmware is also generating a manifest and the MUD file. Information
about the MUD file is embedded into the SUIT manifest and provided to the
device via firmware update mechanism. Once this information is available
on the device it can be presented during device onboarding, during
network access authentication, or as part of other interactions that
involve the conveyance of Evidence to the operational network. After
retrieving the manifest, the MUD file can be obtained as well.</t>

<figure title="SUIT-MUD Architecture." anchor="arch-mud-new-fig"><artwork><![CDATA[
                        ____________
                       |            |
                       |  Manifest  |
                       | Repository |
                       |____________|
                  get URL ^      | SUIT manifest
 .........................|......|..........
 .                      __|______v__       .       _____________
 .                     |            |      .      |             |
 .                     |    MUD     |-->get URL-->|    MUD      |
 .                     |  Manager   |  .(https)   | File Server |
 .  End system network |____________|<-MUD file<-<|             |
 .                             ^       +Signature |_____________|
 .                             .           .
 .                             .           .
 .                             .           .
 . ________                _____________   .
 .|        | Attestation  | NAS, AAA or |  .
 .| Device |-->Evidence-->| Onboarding  |  .
 .|________| (+ Manifest  | Server      |  .
 .     ^      Claim)      |_____________|  .
 ......*....................................
       *                                         //-\\
       *                                          \-/
       *                        SUIT Manifest      |
       +************************(+ MUD URL)    ----*-----
                                Firmware          / \
                                                  /  \
                                               Developer
]]></artwork></figure>

<t>The intended workflow is as follows, and assumes an attestation mechanism between the device and the MUD Manager:</t>

<t><list style="symbols">
  <t>At the time of onboarding, devices report their manifest in use to the MUD Manager via some form of attestation Evidence and a conveyance protocol. The device thereby acts as an Attester. The normative specification of these mechanisms is out of scope for this document.</t>
  <t>An example of an Evidence format is the Entity Attestation Token (EAT) <xref target="I-D.ietf-rats-eat"/>, which offers a rich set of claims. This specification assumes that Evidence includes a link to the SUIT manifest via the "manifests" claim (see Section 4.2.15 of <xref target="I-D.ietf-rats-eat"/>) or that the manifest itself is embedded in the Evidence. This Evidence is conveyed to the operational network via some protocol, such as network access authentication protocol (for example using the EAP-TLS 1.3 method <xref target="RFC9190"/> utilizing the attestation extensions <xref target="I-D.fossati-tls-attestation"/>) or an onboarding protocol like FIDO Device Onboard (FDO) <xref target="FDO"/> or Bootstrapping Remote Secure Key Infrastructure (BRSKI) <xref target="RFC8995"/>.</t>
  <t>The MUD Manager, acting as a Relying Party, relays the Evidence to the Verifier and receives an Attestation Result in response. This allows the MUD Manager to check that the device is operating with the expected version of software and configuration.</t>
  <t>Since a URL to the manifest is contained in the Evidence, the MUD Manager can look up the corresponding manifest.</t>
  <t>The MUD Manager acquires the MUD file from the MUD URL found in the SUIT manifest. The SUIT manifest contains the MUD URL and not the MUD file primarily to due the size of the MUD file. This also allows the MUD file to be updated rapidly in response to evolving threats.</t>
  <t>The MUD Manager verifies the MUD file signature using the Subject Key Identifier (SKI) provided in the SUIT manifest.</t>
  <t>Then, the MUD Manager can apply any appropriate policy as described by the MUD file.</t>
</list></t>

<t>Each time a device is updated, rebooted, or otherwise substantially changed, it will execute the remote attestation procedures again.</t>

</section>
<section anchor="operational-considerations"><name>Operational Considerations</name>

<t>This specification assumes that the software/firmware author provides a MUD file that describes the behavior of the software running on a device.</t>

<section anchor="pros"><name>Pros</name>

<t>The approach described in this document has several advantages over the RFC 8520 MUD URL reporting mechanisms:</t>

<t><list style="symbols">
  <t>The MUD URL is tightly coupled to device software/firmware version.</t>
  <t>The device does not report the MUD URL, so the device cannot tamper with the MUD URL.</t>
  <t>The author explicitly authorizes a key to sign MUD files, providing a tight coupling between the party that knows device behavior best (the author of the software/firmware) and the party that declares device behavior (MUD file signer).</t>
  <t>Network operators do not need to know, a priori, which MUD URL to use for each device; this can be harvested from the device's manifest and only replaced if necessary.</t>
  <t>A network operator can still replace a MUD URL in a SUIT manifest:  <list style="symbols">
      <t>By providing a SUIT manifest that overrides the MUD URL.</t>
      <t>By replacing the MUD URL in their network infrastructure.</t>
    </list></t>
  <t>Devices can be quarantined if the Attestation Result indicates that an out-dated or compromised software/firmware version has been used.</t>
  <t>Devices cannot lie about which MUD URL to use.</t>
</list></t>

</section>
<section anchor="cons"><name>Cons</name>

<t>This mechanism relies on the use of SUIT manifests to encode the MUD URL. Conceptually, the MUD file is similar to a Software Bill of Material (SBOM) but focuses on the external visible communication behavior, which is essential for network operators, rather than describing the software libraries contained within the device itself. The SUIT manifest must then be conveyed to the network during onboarding or during the network access authentication step. Attestation Evidence is used to convey the SUIT manifest.</t>

</section>
</section>
<section anchor="suit-extension"><name>Extensions to SUIT</name>

<t>To enable strong assertions about the network access requirements that a device should have for a particular software/configuration pair a MUD URL is added to the SUIT manifest along with a subject key identifier (ski). Note that the subject key identifier refers to a more generic version of SubjectPublicKeyInfo defined in <xref target="RFC5280"/>, which refers to an X.509-based ski.
The subject key identifier MUST be generated according to the process defined in <xref target="I-D.ietf-cose-key-thumbprint"/> and the SUIT_Digest structure MUST be populated with the selected hash algorithm and obtained fingerprint.
The subject key identifier corresponds to the key used in the MUD signature file described in Section 13.2 of <xref target="RFC8520"/>.</t>

<t>Note: A key need not be in COSE Key format to create a COSE Key Thumbprint of it.</t>

<t>The following Concise Data Definition Language (CDDL) <xref target="RFC8610"/> describes the extension to the SUIT_Manifest structure:</t>

<t>The extension to the SUIT_Manifest is described here:</t>

<figure><sourcecode type="CDDL"><![CDATA[
$$unseverable-manifest-member-extensions //= (
  suit-manifest-mud => bstr .cbor SUIT_MUD_container
)
]]></sourcecode></figure>

<t>The SUIT_MUD_container structure is defined as follows:</t>

<figure><sourcecode type="CDDL"><![CDATA[
SUIT_MUD_container = {
    suit-mud-url => #6.32(tstr),
    suit-mud-ski => SUIT_Digest,
}
]]></sourcecode></figure>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This specification links MUD files to SUIT manifests for improving security protection and ease of use. By including MUD URLs in SUIT manifests an extra layer of protection has been created and synchronization risks can be minimized.</t>

<t>If the MUD file and the software/firmware loaded onto the device gets out-of-sync a device may be firewalled and, with firewalling by networks in place, the device may stop functioning. This is, however,
not a concern specific to this specification but rather to the use of MUD in general. Below are two mitigations:</t>

<t><list style="symbols">
  <t>A manufacturer must update the MUD file in advance of network service or product changes so 
that the new services can be supported. Because the MUD file is accessed by a URL means that it can be subsequently updated. This requires a MUD file being retrieved again. This handles the case when the device 
is already deployed and in use.</t>
  <t>There is a possibility that an IoT device has remained on-shelf inventory for an extended period, resulting in its MUD file being inaccessible at its previous location. This necessitates a decision on how to implement a fail-safe tailored to the particular environment.</t>
</list></t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>IANA is requested to add a new value to the SUIT manifest elements registry created with <xref target="I-D.ietf-suit-manifest"/>:</t>

<t><list style="symbols">
  <t>Label: TBD1 [[Value allocated from the standards action address range]]</t>
  <t>Name: Manufacturer Usage Description (MUD)</t>
  <t>Reference: [[TBD: This document]]</t>
</list></t>

</section>


  </middle>

  <back>


    <references title='Normative References'>



<reference anchor='RFC8520'>
  <front>
    <title>Manufacturer Usage Description Specification</title>
    <author fullname='E. Lear' initials='E.' surname='Lear'/>
    <author fullname='R. Droms' initials='R.' surname='Droms'/>
    <author fullname='D. Romascanu' initials='D.' surname='Romascanu'/>
    <date month='March' year='2019'/>
    <abstract>
      <t>This memo specifies a component-based architecture for Manufacturer Usage Descriptions (MUDs). The goal of MUD is to provide a means for end devices to signal to the network what sort of access and network functionality they require to properly function. The initial focus is on access control. Later work can delve into other aspects.</t>
      <t>This memo specifies two YANG modules, IPv4 and IPv6 DHCP options, a Link Layer Discovery Protocol (LLDP) TLV, a URL, an X.509 certificate extension, and a means to sign and verify the descriptions.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8520'/>
  <seriesInfo name='DOI' value='10.17487/RFC8520'/>
</reference>

<reference anchor='RFC2119'>
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname='S. Bradner' initials='S.' surname='Bradner'/>
    <date month='March' year='1997'/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='14'/>
  <seriesInfo name='RFC' value='2119'/>
  <seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>

<reference anchor='RFC8174'>
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname='B. Leiba' initials='B.' surname='Leiba'/>
    <date month='May' year='2017'/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='14'/>
  <seriesInfo name='RFC' value='8174'/>
  <seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>


<reference anchor='I-D.ietf-rats-eat'>
   <front>
      <title>The Entity Attestation Token (EAT)</title>
      <author fullname='Laurence Lundblade' initials='L.' surname='Lundblade'>
         <organization>Security Theory LLC</organization>
      </author>
      <author fullname='Giridhar Mandyam' initials='G.' surname='Mandyam'>
         </author>
      <author fullname='Jeremy O&#x27;Donoghue' initials='J.' surname='O&#x27;Donoghue'>
         <organization>Qualcomm Technologies Inc.</organization>
      </author>
      <author fullname='Carl Wallace' initials='C.' surname='Wallace'>
         <organization>Red Hound Software, Inc.</organization>
      </author>
      <date day='15' month='January' year='2024'/>
      <abstract>
	 <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine the type
   and degree of trust placed in the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-rats-eat-25'/>
   
</reference>


<reference anchor='I-D.ietf-suit-manifest'>
   <front>
      <title>A Concise Binary Object Representation (CBOR)-based Serialization Format for the Software Updates for Internet of Things (SUIT) Manifest</title>
      <author fullname='Brendan Moran' initials='B.' surname='Moran'>
         <organization>Arm Limited</organization>
      </author>
      <author fullname='Hannes Tschofenig' initials='H.' surname='Tschofenig'>
         </author>
      <author fullname='Henk Birkholz' initials='H.' surname='Birkholz'>
         <organization>Fraunhofer SIT</organization>
      </author>
      <author fullname='Koen Zandberg' initials='K.' surname='Zandberg'>
         <organization>Inria</organization>
      </author>
      <author fullname='Øyvind Rønningstad' initials='O.' surname='Rønningstad'>
         <organization>Nordic Semiconductor</organization>
      </author>
      <date day='5' month='February' year='2024'/>
      <abstract>
	 <t>   This specification describes the format of a manifest.  A manifest is
   a bundle of metadata about code/data obtained by a recipient (chiefly
   the firmware for an IoT device), where to find the code/data, the
   devices to which it applies, and cryptographic information protecting
   the manifest.  Software updates and Trusted Invocation both tend to
   use sequences of common operations, so the manifest encodes those
   sequences of operations, rather than declaring the metadata.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-suit-manifest-25'/>
   
</reference>


<reference anchor='I-D.ietf-cose-key-thumbprint'>
   <front>
      <title>CBOR Object Signing and Encryption (COSE) Key Thumbprint</title>
      <author fullname='Kohei Isobe' initials='K.' surname='Isobe'>
         <organization>SECOM CO., LTD.</organization>
      </author>
      <author fullname='Hannes Tschofenig' initials='H.' surname='Tschofenig'>
         </author>
      <author fullname='Orie Steele' initials='O.' surname='Steele'>
         <organization>Transmute</organization>
      </author>
      <date day='23' month='October' year='2023'/>
      <abstract>
	 <t>   This specification defines a method for computing a hash value over a
   COSE Key. It defines which fields in a COSE Key structure are used in
   the hash computation, the method of creating a canonical form of the
   fields, and how to hash the byte sequence.  The resulting hash value
   can be used for identifying or selecting a key that is the subject of
   the thumbprint.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-cose-key-thumbprint-04'/>
   
</reference>

<reference anchor='RFC8610'>
  <front>
    <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
    <author fullname='H. Birkholz' initials='H.' surname='Birkholz'/>
    <author fullname='C. Vigano' initials='C.' surname='Vigano'/>
    <author fullname='C. Bormann' initials='C.' surname='Bormann'/>
    <date month='June' year='2019'/>
    <abstract>
      <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8610'/>
  <seriesInfo name='DOI' value='10.17487/RFC8610'/>
</reference>

<reference anchor='RFC9334'>
  <front>
    <title>Remote ATtestation procedureS (RATS) Architecture</title>
    <author fullname='H. Birkholz' initials='H.' surname='Birkholz'/>
    <author fullname='D. Thaler' initials='D.' surname='Thaler'/>
    <author fullname='M. Richardson' initials='M.' surname='Richardson'/>
    <author fullname='N. Smith' initials='N.' surname='Smith'/>
    <author fullname='W. Pan' initials='W.' surname='Pan'/>
    <date month='January' year='2023'/>
    <abstract>
      <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9334'/>
  <seriesInfo name='DOI' value='10.17487/RFC9334'/>
</reference>




    </references>

    <references title='Informative References'>



<reference anchor='RFC9190'>
  <front>
    <title>EAP-TLS 1.3: Using the Extensible Authentication Protocol with TLS 1.3</title>
    <author fullname='J. Preuß Mattsson' initials='J.' surname='Preuß Mattsson'/>
    <author fullname='M. Sethi' initials='M.' surname='Sethi'/>
    <date month='February' year='2022'/>
    <abstract>
      <t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. This document specifies the use of EAP-TLS with TLS 1.3 while remaining backwards compatible with existing implementations of EAP-TLS. TLS 1.3 provides significantly improved security and privacy, and reduced latency when compared to earlier versions of TLS. EAP-TLS with TLS 1.3 (EAP-TLS 1.3) further improves security and privacy by always providing forward secrecy, never disclosing the peer identity, and by mandating use of revocation checking when compared to EAP-TLS with earlier versions of TLS. This document also provides guidance on authentication, authorization, and resumption for EAP-TLS in general (regardless of the underlying TLS version used). This document updates RFC 5216.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='9190'/>
  <seriesInfo name='DOI' value='10.17487/RFC9190'/>
</reference>


<reference anchor='I-D.fossati-tls-attestation'>
   <front>
      <title>Using Attestation in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
      <author fullname='Hannes Tschofenig' initials='H.' surname='Tschofenig'>
         </author>
      <author fullname='Yaron Sheffer' initials='Y.' surname='Sheffer'>
         <organization>Intuit</organization>
      </author>
      <author fullname='Paul Howard' initials='P.' surname='Howard'>
         <organization>Arm Limited</organization>
      </author>
      <author fullname='Ionuț Mihalcea' initials='I.' surname='Mihalcea'>
         <organization>Arm Limited</organization>
      </author>
      <author fullname='Yogesh Deshpande' initials='Y.' surname='Deshpande'>
         <organization>Arm Limited</organization>
      </author>
      <author fullname='Arto Niemi' initials='A.' surname='Niemi'>
         <organization>Huawei</organization>
      </author>
      <date day='4' month='March' year='2024'/>
      <abstract>
	 <t>   The TLS handshake protocol allows authentication of one or both peers
   using static, long-term credentials.  In some cases, it is also
   desirable to ensure that the peer runtime environment is in a secure
   state.  Such an assurance can be achieved using attestation which is
   a process by which an entity produces evidence about itself that
   another party can use to appraise whether that entity is found in a
   secure state.  This document describes a series of protocol
   extensions to the TLS 1.3 handshake that enables the binding of the
   TLS authentication key to a remote attestation session.  This enables
   an entity capable of producing attestation evidence, such as a
   confidential workload running in a Trusted Execution Environment
   (TEE), or an IoT device that is trying to authenticate itself to a
   network access point, to present a more comprehensive set of security
   metrics to its peer.  These extensions have been designed to allow
   the peers to use any attestation technology, in any remote
   attestation topology, and mutually.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-fossati-tls-attestation-05'/>
   
</reference>


<reference anchor="FDO" target="https://fidoalliance.org/specifications/download-iot-specifications/">
  <front>
    <title>FIDO Device Onboard Specification 1.1</title>
    <author >
      <organization>FIDO Alliance</organization>
    </author>
    <date year="2022" month="April"/>
  </front>
</reference>



<reference anchor='I-D.ietf-opsawg-mud-acceptable-urls'>
   <front>
      <title>Authorized update to MUD URLs</title>
      <author fullname='Michael Richardson' initials='M.' surname='Richardson'>
         <organization>Sandelman Software Works</organization>
      </author>
      <author fullname='Wei Pan' initials='W.' surname='Pan'>
         <organization>Huawei Technologies</organization>
      </author>
      <author fullname='Eliot Lear' initials='E.' surname='Lear'>
         <organization>Cisco Systems</organization>
      </author>
      <date day='1' month='March' year='2024'/>
      <abstract>
	 <t>   This document provides a way for an RFC8520 Manufacturer Usage
   Description (MUD) definitions to declare what are acceptable
   replacement MUD URLs for a device.

   RFCEDITOR-please-remove: this document is being worked on at:
   https://github.com/mcr/iot-mud-acceptable-urls

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-opsawg-mud-acceptable-urls-11'/>
   
</reference>

<reference anchor='RFC8995'>
  <front>
    <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
    <author fullname='M. Pritikin' initials='M.' surname='Pritikin'/>
    <author fullname='M. Richardson' initials='M.' surname='Richardson'/>
    <author fullname='T. Eckert' initials='T.' surname='Eckert'/>
    <author fullname='M. Behringer' initials='M.' surname='Behringer'/>
    <author fullname='K. Watsen' initials='K.' surname='Watsen'/>
    <date month='May' year='2021'/>
    <abstract>
      <t>This document specifies automated bootstrapping of an Autonomic Control Plane. To do this, a Secure Key Infrastructure is bootstrapped. This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline. We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device. The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8995'/>
  <seriesInfo name='DOI' value='10.17487/RFC8995'/>
</reference>

<reference anchor='RFC5280'>
  <front>
    <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
    <author fullname='D. Cooper' initials='D.' surname='Cooper'/>
    <author fullname='S. Santesson' initials='S.' surname='Santesson'/>
    <author fullname='S. Farrell' initials='S.' surname='Farrell'/>
    <author fullname='S. Boeyen' initials='S.' surname='Boeyen'/>
    <author fullname='R. Housley' initials='R.' surname='Housley'/>
    <author fullname='W. Polk' initials='W.' surname='Polk'/>
    <date month='May' year='2008'/>
    <abstract>
      <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='5280'/>
  <seriesInfo name='DOI' value='10.17487/RFC5280'/>
</reference>




    </references>


<section numbered="no" anchor="acknowledgements"><name>Acknowledgements</name>

<t>We would like to thank Roman Danyliw for his excellent review as the responsible security area director, Bahcet Sarikaya for his Genart review, Michael Richardson for his IoT directorate review and Susan Hares for her Opsdir review. During the IESG review Robert Wilton, Eliot Lear, Zaheduzzaman Sarker, Francesca Palombini, John Scudder, Paul Wouters, Éric Vyncke, and Murray Kucherawy.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

