<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.3.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-iotops-mud-acceptable-urls-02" category="std" consensus="true" updates="8520" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.32.0 -->
  <front>
    <title abbrev="mud-acceptable-urls">Authorized update to MUD URLs</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-iotops-mud-acceptable-urls-02"/>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <author initials="W." surname="Pan" fullname="Wei Pan">
      <organization>Huawei Technologies</organization>
      <address>
        <email>william.panwei@huawei.com</email>
      </address>
    </author>
    <author initials="E." surname="Lear" fullname="Eliot Lear">
      <organization>Cisco Systems</organization>
      <address>
        <email>lear@cisco.com</email>
      </address>
    </author>
    <date year="2026" month="May" day="03"/>
    <area>Operations</area>
    <workgroup>IOTOPS Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 71?>

<t>This document provides a way for an RFC8520 Manufacturer Usage Description
(MUD) definitions to declare what are acceptable replacement MUD URLs for a device.</t>
      <t>RFCEDITOR-please-remove: this document is being worked on at: https://github.com/mcr/iot-mud-acceptable-urls</t>
    </abstract>
  </front>
  <middle>
    <?line 78?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="RFC8520"/> provides a standardized way to describe how a specific purpose
device makes use of Internet resources and associated suggested network behavior.
The behaviors are described in a MUD file hosted in its manufacturer's server.
The device provides a MUD URL to the MUD controller, which can locate this MUD file
and determine the required network authorization of the device.</t>
      <t>In some cases, e.g., the firmware update, the network behaviors of the device may change,
and the description in the original MUD file will no longer apply.
To solve this problem, there are two common ways which the manufacturer can use.</t>
      <t>One is to change what is in the MUD file, i.e., update the MUD file in place, whenever the behavior of the firmware changes.
<xref target="updatemudfiles"/> discusses three scenarios for updating the MUD file and the corresponding potential issues.</t>
      <t>The other is to change which MUD file is processed by changing the MUD URL.
<xref target="updatemudurls"/> describes the common sources of MUD URLs and the problems and threats faced by each type of source when updating the MUD URL.
This document proposes an enhanced mechanism of how to securely update the MUD URL in <xref target="proposedmechanism"/>.</t>
      <t>There are also some assumptions and prerequisites in this document.</t>
      <t>While MUD files may include signatures, <xref target="RFC8520"/> does not mandate checking them, and
there is not a clear way to connect the entity which signed the MUD file to the device itself.
This document limits itself to situations in which the MUD file is signed,
and that the MUD controller has been configured to always check the signatures,
rejecting files whose signatures do not validate.</t>
      <t><xref target="RFC8520"/> does not specify how MUD controllers establish their trust in the manufacturers' signing key:
there are many possible solutions from manual configuration of trust anchors,
some kind of automatic configuration during onboarding,
or a Trust on First Use (TOFU) mechanism that accepts the signer on first use.
How this initial trust is established is not important for this document,
it is sufficient that some satisfactory initial trust is established.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
      </t>
    </section>
    <section anchor="updatemudfiles">
      <name>Risk analysis of updating the MUD files in place</name>
      <t>This section explains three scenarios where updating the MUD file in place
could cause security issues for the devices involved.
This section explains why changing the MUD URL to point to a new file is important.</t>
      <section anchor="adding-capabilities">
        <name>Adding capabilities</name>
        <t>For situations where new capabilities are added to the firmware, the MUD file will detail the new access that the new firmware requires.
This may involve new incoming or outgoing connections that should be authorized.
Devices that have been upgraded to the new firmware will make use of the new features.
Devices that have not been upgraded to the new firmware may have new connections that are authorized, but which the device does not use (outgoing connections), or which the device is not prepared to respond to (new incoming connections).</t>
        <t>It is possible that older versions of the firmware have vulnerabilities that were not easily exploitable due to the MUD file preventing particular kinds of access.
For example, an older firmware could have no credentials required (or default credentials) access via telnet on port 23 or HTTP on port 80.
The MUD file protected the device such that it could either not be accessed at all, or access was restricted to connections from a controller only.</t>
        <t>Useful and needed upgrades to the firmware could add credentials to that service, allowing it to be opened up for more general access.
The new MUD file would provide for such access, but when combined with the weak security of the old firmware, it results in a compromised device.</t>
        <t>While there is an argument that old firmware was insecure and should be replaced, it is often the case that the upgrade process involves downtime, or can introduce risks due to needed evaluations not having been completed yet.</t>
      </section>
      <section anchor="removing-capabilities">
        <name>Removing capabilities</name>
        <t>For situations where existing capabilities prove to be a problem and are to be turned off or removed in subsequent versions of the firmware, the MUD file will be updated to disallow connections that previously were allowed.</t>
        <t>In this case, the new MUD file will forbid some connections, which the old firmware still expects to do.
As explained in the previous section, upgrades may not always occur immediately upon releasing the new firmware.</t>
        <t>In this case, the old device will be performing unwanted connections, and the MUD controller will be alerting the network owner that the device is misbehaving rather than not being upgraded.
This causes a false-positive situation (see <xref target="boycrieswolf"/>), leading to real security issues being ignored.
This is a serious issue as documented also in <xref target="boywolfinfosec"/>, and <xref target="falsemalware"/>.</t>
      </section>
      <section anchor="significant-changes-to-protocols">
        <name>Significant changes to protocols</name>
        <t><xref target="I-D.ietf-opsawg-mud-tls"/> suggests MUD definitions to allow examination of TLS protocol details.
Such a profile may be very specific to the TLS library which is shipped in a device.
Changes to the library (including bug fixes) may cause significant changes to
the profile, requiring changes to the profile described in the MUD file.
Such changes are likely neither forward nor backward compatible with other
versions, and in place updates to MUD files are therefore not advised.</t>
      </section>
      <section anchor="motivation-for-updating-mud-urls">
        <name>Motivation for updating MUD URLs</name>
        <t>While many small tweaks to a MUD file can be done in place, the situation
described above, particularly when it comes to removing capabilities will
suggest that changes to the MUD URL are in order.
A strategy for doing this securely is needed, and the rest of this document
provides a mechanism to do this securely.</t>
      </section>
    </section>
    <section anchor="updatemudurls">
      <name>Updating the MUD URLs</name>
      <t>MUD URLs can come from a number of sources:</t>
      <ul spacing="normal">
        <li>
          <t>IDevID Extensions</t>
        </li>
        <li>
          <t>DHCP option</t>
        </li>
        <li>
          <t>LLDP TLV</t>
        </li>
        <li>
          <t><xref target="RFC9238"/> standardizes scanning MUD URLs from QRcodes.</t>
        </li>
      </ul>
      <t>The IDevID mechanism provides a URL that is asserted cryptographically by a manufacturer.
However, it is difficult for manufacturers to update the IDevID of a device which is already in a box.</t>
      <t>The DHCP and LLDP mechanisms are not signed, but are asserted by the device.
A firmware update may update what MUD URL is emitted.
Sufficiently well targeted malware would also be able to change the MUD URL that is emitted.</t>
      <t>The QRcode mechanism is usually done via paper/stickers, and is typically not under the control of the device itself at all.
However, being applied by a human and not easily changed, a MUD URL obtained in this fashion is likely as trustworthy as the rest of the vendors packaging.
(It may not, due to mixups in labeling represent the correct device, but this is a human coordination issue, and is out of scope for this document.)</t>
      <t>The manufacturer can use all the four mechanisms above when manufacturing the device.
But when considering updating the firmware, it seems like only the DHCP and LLDP mechanisms
are sufficiently easy to send the new MUD URL.
Because of that sensitivity, they may also be easily changed by malware!</t>
      <t>There are mitigating mechanisms which may be enough to deal with this problem when MUD
files are signed by the manufacturer.</t>
      <t><xref section="13.2" sectionFormat="comma" target="RFC8520"/> explains how to verify MUD File Signatures.
That document does not define a way for a MUD controller to determine who should sign the MUD file for a particular device.</t>
      <t><xref target="RFC8520"/> leaves this for a local policy.
This document establishes one such local policy.
There are a number of other processes that could be used, it is expected that
many such industrial vertical will work out supply chain arrangements or other
heuristics to supply appropriate anchors.</t>
      <section anchor="leveraging-the-manufacturer-signature">
        <name>Leveraging the manufacturer signature</name>
        <t>The first time a signature of the MUD file related to a particular device-type
is verified by the MUD controller, the identity of the signing authority is recorded.
That it, the signing authority is pinned.
This policy means that subsequent MUD files must be signed by the same entity in order to be accepted.</t>
        <t>The trust and acceptance of the first signer may come from many sources.
The first signature could be from a manually configured trust anchor in the MUD controller.
The first signature could be Trust on First Use (TOFU), with the URL coming from a trusted IDevID certificate.</t>
        <t>Based upon this process, an update to the MUD URL would be valid if the new
MUD file was signed by the same entity that signed the previous entry.
This mechanism permits a replacement URL to be any URL that the same
manufacturer can provide.</t>
      </section>
      <section anchor="concerns-about-same-signer-mechanism">
        <name>Concerns about same-signer mechanism</name>
        <t>There is still a potential threat: a manufacturer which has many products may
have a MUD definition for another product that has the privileges that the
malware desires.</t>
        <t>The malware could simply change the MUD URL expressed by DHCP or LLDP to that
of another product, and it will be accepted by the MUD controller as valid,
since the MUD file is signed by the same manufacturer.
(e.g., The malware in a BrandName refriderator claims to be a BrandName Washing
Machine, and therefore gets the priviledges of the other device)</t>
        <t>This works as long as manufacturers use a single key to sign all products.
Some manufacturers could sign each product with a different key.
Such manufacturers would probably then collect all the signing keys into a certificate infrastructure (PKI), with a single manufacturer CA key.</t>
        <t>In this case, the question then becomes whether the MUD controller should pin the End-Entity (EE) certificate, or the CA certificate.</t>
        <t>Pinning the End-Entity (EE) certificate defends against malware that changes the product type, but prevents the manufacturer from being able to cycle the validity of the End-Entity certificate for cryptographic hygiene reasons.</t>
        <t>Pinning the CA certificate allows the EE certificate to change, but may not defend against product type changes.</t>
        <t>It is possible to invent policy mechanisms that would link the EE certificate to a value that is in the MUD file.
This could be a policy OID, or could involve some content in a subjectAltName.
Future work could go in that direction.
This document proposes a simpler solution.</t>
      </section>
    </section>
    <section anchor="proposedmechanism">
      <name>Proposed mechanism for updating MUD URLs</name>
      <t>The document proposes to limit what MUD URLs are considered valid from the device, limiting new MUD URLs to be variations of the initial (presumed to be secure) URL.</t>
      <t>The first MUD file which is defined for a device can come from an IDevID (which is considered more secure),
or via Trust on First Use with DHCP or LLDP or other mechanisms. This first, initially trusted, MUD file will be called the "root" MUD file.</t>
      <t>A MUD file contains a self-referential MUD-URL attribute that points to
the MUD file itself located on the vendor's website.
While the IDevID, DHCP and LLDP mechanisms only transmit a URL, there are
some newer, not yet standardized proposals that would fetch an entire MUD
file from the device, such as <xref target="I-D.jimenez-t2trg-mud-coap"/>.</t>
      <t>The MUD-URL MUST always be an Absolute URI: see <xref target="RFC3986"/> section 4.3.</t>
      <t>The URL found in the MUD-URL attribute is to be called the canonical MUD URL for the device.</t>
      <t>The MUD-SIGNATURE attribute in the MUD file SHOULD be a relative URI (see <xref target="RFC3986"/> section 4.2) with the (hierarchical) base URI for this reference being the MUD-URL attribute.</t>
      <t>When pinning the signature, the MUD manager SHOULD use the
SubjectKeyIdentifier (SKI) <xref section="4.2.1.2" sectionFormat="comma" target="RFC5280"/> of the Certificate
Authority (CA) when pinning the certificate authority.  With this, the chain of Subject
Names and/or SubjectAltNames leading to the (end entity) signing certificate
needs to be recorded.
The MUD manager may need additional trust anchors (including previously
pinned ones) in order to verify that CA certificate.
This process allows for the manufacturer to generate new end-entity signing
certificates, as the certificates for this key expire.</t>
      <section anchor="small-changes-to-the-mud-url">
        <name>Small Changes to the MUD URL</name>
        <t>Subsequent MUD files are considered valid if:</t>
        <ul spacing="normal">
          <li>
            <t>they have the same initial Base-URI as the MUD-URL, but may have a different final part</t>
          </li>
          <li>
            <t>they are signed by an equivalent End Entity (same trusted CA and same Subject Name) as the "root" MUD file.</t>
          </li>
        </ul>
        <t>Section 5.2 of <xref target="RFC3986"/> details many cases for calculating the Base-URI.</t>
        <t>Section 3.3 of <xref target="RFC3986"/> explains how the different parts of the URL are
described.
As explained in that section, a <em>path</em> component consists of a series of
<em>segment</em> seperated by slash ("/") characters.
The new URL is considered acceptable if it contains the same series of
segments in its path, excepting that the last segment may be different.</t>
        <t>For a simple example, if the canonical MUD-URL is <tt>http://example.com/hello/there/file.json</tt> then
any URL that starts with <tt>http://example.com/hello/there/</tt> would be acceptable, such as
<tt>http://example.com/hello/there/revision2.json</tt></t>
        <t>One problem with these small changes is that malware could still express a
MUD file that was previously valid, but which should no longer considered
accurate.
This is a rollback attack.
This might result in the malware being able to reach destinations that turned
out to be a mistake; a security fault.
In order to combat this, MUD managers SHOULD keep track of the list of
MUD-URLs that they have successfully retrieved, and if a device ever suggests a URL that was
previously used, then the MUD manager should suspect that is a rollback attack.
MUD managers are not typically resource constrained, and while the
list of URLs could grow without bound, it is unlikely to be a burden.
A site with thousands of similar devices could keep a common list of URLs.</t>
      </section>
      <section anchor="big-changes-to-the-mud-url">
        <name>Big Changes to the MUD URL</name>
        <t>Once a new MUD file is accepted, either by reloading an existing file from
the same URL, or via the Small Changes mechanism described above, then the
MUD-URL attribute in this file becomes the new canonical MUD file.
The contained MUD-URL attribute in the file need not be related in any way to
the existing MUD-URL.</t>
        <t>As a result, any subsequent updates MUST be relative to the new MUD-URL in
this file.</t>
        <t>This rule enables the location of the MUD file to change over time based upon
the needs of the organization.</t>
      </section>
      <section anchor="merger-acquisitions-and-key-changes">
        <name>Merger, Acquisitions and Key Changes</name>
        <t>The above process allows for a manufacturer to rework its file structure.
They can change web server host names, so long as they retain the old structure long enough for  all devices to upgrade at least once.</t>
        <t>The process also allows a manufacturer to change the EE certificate and Certification Authority used for signing.</t>
        <section anchor="file-structure-change">
          <name>Changing file structure</name>
          <t>A manufacturer has been hosting a MUD file at <tt>https://example.com/household/products/mudfiles/toaster.json</tt>
and wishes to move it to <tt>https://example.com/mudfiles/toasters/model1945/mud.json</tt></t>
          <t>The manufacturer creates a new MUD file at the new location.</t>
          <t>Then the manufacturer changes the MUD-URL contained with the files at the old location to have a value of <tt>https://example.com/mudfiles/toasters/model1945/mud.json</tt>
Note that in order for MUD controllers to reload the old file, it MUST have been served with an appropriate ETag, and appropriate Expires or Cache Control headers <xref section="5.3" sectionFormat="comma" target="RFC9111"/>.
If control over caching is not possible for the manufacturer, then they need to do this in two steps, with the first step creating a new MUD file at an acceptable location (in the above example, perhaps: <tt>https://example.com/household/products/mudfiles/toaster0.json</tt> ).
The device then will have to do two firmware updates: one to switch to the intermediate URL, and a second one to switch to the desired final URL.</t>
          <t>The manufacturer must continue to serve the files from the old location for some time, or to return an HTTP 301 (Moved Permanently) redirecting to the new location.</t>
        </section>
        <section anchor="changing-hosting-urls">
          <name>Changing hosting URLs</name>
          <t>A manufacturer has been hosting a MUD file at <tt>https://example.com/household/products/mudfiles/toaster.json</tt>
and wishes to move it to <tt>https://mud.example/hosthold/products/mudfiles/toaster.json</tt></t>
          <t>The scenario is much the same as for <xref target="file-structure-change"/>, and can be handled in the same fashion.
This situation is likely to occur when one company acquires another.</t>
          <t>Note, however, that a 301 Redirect that changed the hostname SHOULD NOT be accepted by MUD controllers.</t>
        </section>
        <section anchor="changing-signing-authority">
          <name>Changing Signing Authority</name>
          <t>A manufacturer has been signing MUD files using an EE Certificate with subjectAltName foo.example, issued by an internal Certification Authority BAZ.</t>
          <t>The manufacturer wishes to begin signing with an EE Certificate with subjectAltname foo.example, but now signed by a public CA (call it: Fluffy).</t>
          <t>The manufacturer first creates a new MUD file with a new detached signature file.
Within this signature file, the manufacturer places a certificate chain: Internal-CA BAZ-&gt;Fluffy,
and then the Fluffy Certificate, and then the foo.example certificate issued from Fluffy.</t>
          <t>This supports changing certification authorities, but it does not support changing the Subject Name of the signing entity.</t>
        </section>
      </section>
    </section>
    <section anchor="polling-for-changes-in-mud-files">
      <name>Polling for changes in MUD files</name>
      <t>The MUD file update mechanisms described in <xref target="updatemudfiles"/> requires that the MUD controller poll for updates.
The MUD controller will receive no signal about a change from the device because the URL will not have changed.</t>
      <t>The manufacturer SHOULD serve MUD files from a source for which ETag <xref section="2.3" sectionFormat="of" target="RFC7232"/> may be generated.
Static files on disk satisfy this requirement.
MUD files generated from a database process might not.
The use of ETag allows a MUD controller to more efficiently poll for changes in the file.</t>
      <t>A manufacturer should also serve MUD files with an HTTP Max-Age header as per <xref section="5.2.2.8" sectionFormat="of" target="RFC7234"/>.</t>
      <t>The MUD controller should take the Max-Age as an indication of when to next poll for updates to the MUD file.
Values of less than 1 hour, or more than 1 month should be considered out of range, and clamped into the range (1 hour, 1 month).</t>
      <t>MUD controllers SHOULD add some random jitter to the timing of their requests.
MUD controllers MAY use a single HTTP(S)/1.1 connection to retrieve all resources at the same destination.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>The MUD URL could contain sensitive information such as the model number and even firmware revision numbers.
Thus, the MUD URL may identify the make, model and revision of a device.</t>
      <t><xref target="RFC8520"/> already identifies this privacy concern, and suggests use of TLS so that the HTTP requests that retrieve the MUD file do not divulge that level of detail.</t>
      <t>The requirement for the MUD controller to poll for changes to MUD files results in multiple interactions between the MUD controller and the manufacturer whereas a more naive implementation might only interact once.
Even if HTTPS used, an observer of the traffic to that manufacturer will be revealing, and <xref target="RFC8520"/> goes on to suggest use of a proxy as well.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document makes no requests to IANA.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Prior to the standardization of the process in this document, if a device was infiltrated by malware, and said malware wished to make accesses beyond what the current MUD file allowed, the malware would have to:</t>
      <ol spacing="normal" type="1"><li>
          <t>arrange for an equivalent MUD file to be visible somewhere on the Internet</t>
        </li>
        <li>
          <t>depend upon the MUD controller either not checking signatures, or</t>
        </li>
        <li>
          <t>somehow get the manufacturer to sign the alternate MUD file</t>
        </li>
        <li>
          <t>announce this new URL via DHCP or LLDP, updating the MUD controller with the new permissions.</t>
        </li>
      </ol>
      <t>One way to accomplish (3) is to leverage the existence of MUD files created by the manufacturer for different classes of devices.
Such files would already be signed by the same manufacturer, eliminating the need to spoof a signature.</t>
      <t>With the standardization of the process in this document, then the attacker can no longer point to arbitrary MUD files in step 4, but can only make use of MUD files that the manufacturer has already provided for this device.</t>
      <t>Manufacturers are advised to maintain an orderly layout of MUD files in their web servers,
with each unique product having its own directory/pathname.</t>
      <t>The process described updates only MUD controllers and the processes that manufacturers use to manage the location of their MUD files.</t>
      <t>A manufacturer which has not managed their MUD files in the way described here can deploy new directories of per-product MUD files, and then can update the existing MUD files in place to point to the new URLs
using the MUD-URL attribute.</t>
      <t>There is therefore no significant flag day: MUD controllers may implement the new policy without significant concern about backwards compatibility.</t>
      <section anchor="updating-files-vs-updating-mud-urls">
        <name>Updating files vs Updating MUD URLs</name>
        <t>Device developers need to consider whether to make a change by updating a MUD file, or updating the MUD URL.</t>
        <t>MUD URLs can only be updated by shipping a new firmware.
It is reasonable to update the MUD URL whenever a new firmware release causes new connectivity to be required.
The updated mechanism defined in this document makes this a secure operation, and there is no practical limitation on the number of files that a web server can hold.</t>
        <t>In place updates to a MUD file should be restricted to cases where it turns out that the description was inaccurate: a missing connection, an inadvertent one authorized, or just incorrect information.</t>
        <t>Developers should be aware that many enterprise websites use outsourced content distribution networks, and MUD controllers are likely to cache files for some time.
Changes to MUD files will take some time to propagate through the various caches.
An updated MUD URL will however, not experience any cache issues, but can not be deployed with a firmware update.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC3986" target="https://www.rfc-editor.org/info/rfc3986" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3986.xml">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC8520" target="https://www.rfc-editor.org/info/rfc8520" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8520.xml">
          <front>
            <title>Manufacturer Usage Description Specification</title>
            <author fullname="E. Lear" initials="E." surname="Lear"/>
            <author fullname="R. Droms" initials="R." surname="Droms"/>
            <author fullname="D. Romascanu" initials="D." surname="Romascanu"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>This memo specifies a component-based architecture for Manufacturer Usage Descriptions (MUDs). The goal of MUD is to provide a means for end devices to signal to the network what sort of access and network functionality they require to properly function. The initial focus is on access control. Later work can delve into other aspects.</t>
              <t>This memo specifies two YANG modules, IPv4 and IPv6 DHCP options, a Link Layer Discovery Protocol (LLDP) TLV, a URL, an X.509 certificate extension, and a means to sign and verify the descriptions.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8520"/>
          <seriesInfo name="DOI" value="10.17487/RFC8520"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC5280" target="https://www.rfc-editor.org/info/rfc5280" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5280.xml">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-opsawg-mud-tls" target="https://datatracker.ietf.org/doc/html/draft-ietf-opsawg-mud-tls-18" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-opsawg-mud-tls.xml">
          <front>
            <title>Manufacturer Usage Description (MUD) (D)TLS Profiles for IoT Devices</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Dan Wing" initials="D." surname="Wing">
              <organization>Citrix Systems, Inc.</organization>
            </author>
            <author fullname="Blake Anderson" initials="B." surname="Anderson">
              <organization>Cisco Systems, Inc.</organization>
            </author>
            <date day="23" month="August" year="2024"/>
            <abstract>
              <t>This memo extends the Manufacturer Usage Description (MUD) specification to allow manufacturers to define (D)TLS profile parameters. This allows a network security service to identify unexpected (D)TLS usage, which can indicate the presence of unauthorized software, malware, or security policy-violating traffic on an endpoint.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-mud-tls-18"/>
        </reference>
        <reference anchor="RFC9238" target="https://www.rfc-editor.org/info/rfc9238" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9238.xml">
          <front>
            <title>Loading Manufacturer Usage Description (MUD) URLs from QR Codes</title>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="J. Latour" initials="J." surname="Latour"/>
            <author fullname="H. Habibi Gharakheili" initials="H." surname="Habibi Gharakheili"/>
            <date month="May" year="2022"/>
            <abstract>
              <t>This informational document details a protocol to load Manufacturer Usage Description (MUD) definitions from RFC 8520 for devices that do not have them integrated.</t>
              <t>This document is published to inform the Internet community of this mechanism to allow interoperability and to serve as a basis of other standards work if there is interest.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9238"/>
          <seriesInfo name="DOI" value="10.17487/RFC9238"/>
        </reference>
        <reference anchor="RFC7232" target="https://www.rfc-editor.org/info/rfc7232" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7232.xml">
          <front>
            <title>Hypertext Transfer Protocol (HTTP/1.1): Conditional Requests</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application- level protocol for distributed, collaborative, hypertext information systems. This document defines HTTP/1.1 conditional requests, including metadata header fields for indicating state changes, request header fields for making preconditions on such state, and rules for constructing the responses to a conditional request when one or more preconditions evaluate to false.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7232"/>
          <seriesInfo name="DOI" value="10.17487/RFC7232"/>
        </reference>
        <reference anchor="RFC7234" target="https://www.rfc-editor.org/info/rfc7234" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7234.xml">
          <front>
            <title>Hypertext Transfer Protocol (HTTP/1.1): Caching</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless \%application- level protocol for distributed, collaborative, hypertext information systems. This document defines HTTP caches and the associated header fields that control cache behavior or indicate cacheable response messages.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7234"/>
          <seriesInfo name="DOI" value="10.17487/RFC7234"/>
        </reference>
        <reference anchor="IEEE_802.1AR-2018">
          <front>
            <title>IEEE Standard for Local and Metropolitan Area Networks - Secure Device Identity</title>
            <author>
              <organization>IEEE</organization>
            </author>
            <date year="2018" month="August"/>
          </front>
          <seriesInfo name="IEEE" value="802.1AR-2018"/>
          <seriesInfo name="DOI" value="10.1109/IEEESTD.2018.8423794"/>
        </reference>
        <reference anchor="boycrieswolf" target="https://fablesofaesop.com/the-boy-who-cried-wolf.html">
          <front>
            <title>The Boy Who Cried Wolf</title>
            <author>
              <organization/>
            </author>
            <date year="2020" month="January" day="18"/>
          </front>
        </reference>
        <reference anchor="boywolfinfosec" target="https://www.infosecurity-magazine.com/opinions/security-alerts-boy-cried-wolf/">
          <front>
            <title>Security Alerts - A Case of the Boy Who Cried Wolf?</title>
            <author>
              <organization/>
            </author>
            <date year="2020" month="January" day="18"/>
          </front>
        </reference>
        <reference anchor="falsemalware" target="https://www.scmagazine.com/home/security-news/false-malware-alerts-cost-organizations-1-27m-annually-report-says/">
          <front>
            <title>False malware alerts cost organizations $1.27M annually, report says</title>
            <author>
              <organization/>
            </author>
            <date year="2020" month="January" day="18"/>
          </front>
        </reference>
        <reference anchor="I-D.jimenez-t2trg-mud-coap" target="https://datatracker.ietf.org/doc/html/draft-jimenez-t2trg-mud-coap-00" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.jimenez-t2trg-mud-coap.xml">
          <front>
            <title>Using MUD on CoAP environments</title>
            <author fullname="Jaime Jimenez" initials="J." surname="Jimenez">
              <organization>Ericsson</organization>
            </author>
            <date day="9" month="March" year="2020"/>
            <abstract>
              <t>This document provides some guidelines on how to add Manufacturer Usage Descriptions (MUD) to CoAP environments.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-jimenez-t2trg-mud-coap-00"/>
        </reference>
        <reference anchor="RFC9111" target="https://www.rfc-editor.org/info/rfc9111" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.9111.xml">
          <front>
            <title>HTTP Caching</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document defines HTTP caches and the associated header fields that control cache behavior or indicate cacheable response messages.</t>
              <t>This document obsoletes RFC 7234.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="98"/>
          <seriesInfo name="RFC" value="9111"/>
          <seriesInfo name="DOI" value="10.17487/RFC9111"/>
        </reference>
      </references>
    </references>
    <?line 446?>

<section anchor="appendices">
      <name>Appendices</name>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="J." surname="Yang" fullname="Jie Yang">
        <organization/>
        <address>
          <email>jay.yang@huawei.com</email>
        </address>
      </contact>
      <contact initials="T." surname="Tang" fullname="Tianqing Tang">
        <organization/>
        <address>
          <email>tangtianqing@huawei.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
