<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.6 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!ENTITY RFC3986 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.3986.xml">
<!ENTITY RFC8520 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8520.xml">
<!ENTITY I-D.reddy-opsawg-mud-tls SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.reddy-opsawg-mud-tls.xml">
<!ENTITY I-D.richardson-opsawg-securehomegateway-mud SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.richardson-opsawg-securehomegateway-mud.xml">
<!ENTITY I-D.jimenez-t2trg-mud-coap SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.jimenez-t2trg-mud-coap.xml">
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-richardson-opsawg-mud-acceptable-urls-02" category="bcp" updates="8520">

  <front>
    <title abbrev="mud-acceptable-urls">Authorized update to MUD URLs</title>

    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <author initials="J." surname="Yang" fullname="Jie Yang">
      <organization>Huawei Technologies Co., Ltd.</organization>
      <address>
        <email>jay.yang@huawei.com</email>
      </address>
    </author>
    <author initials="E." surname="Lear" fullname="Eliot Lear">
      <organization>Cisco Systems</organization>
      <address>
        <email>lear@cisco.com</email>
      </address>
    </author>

    <date year="2020" month="September" day="22"/>

    <area>Operations</area>
    <workgroup>OPSAWG Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document provides a way for an RFC8520 Manufacturer Usage Description
(MUD) definitions to declare what are acceptable replacement URLs for a device.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t><xref target="RFC8520"/> provides a standardized way to describe how a specific purpose
device makes use of Internet resources.  Access Control Lists (ACLs) can be
defined in an RFC8520 Manufacturer Usage Description (MUD) file that permit
a device to access Internet resources by DNS name.</t>

<t>MUD URLs can come from a number of sources:</t>

<t><list style="symbols">
  <t>IDevID Extensions</t>
  <t>DHCP</t>
  <t>LLDP</t>
  <t><xref target="I-D.richardson-opsawg-securehomegateway-mud"/> proposes to scan them from QRcodes.</t>
</list></t>

<t>The IDevID mechanism provides a URL that is asserted cryptographically by a manufacturer.
However, it is difficult for manufacturers to update the IDevID of a device which is already in a box.</t>

<t>The DHCP and LLDP mechanisms are not signed, but are asserted by the device.
A firmware update may update what MUD URL is emitted.
Sufficiently well targetted malware could also change the MUD URL.</t>

<t>The QRcode mechanism is usually done via paper/stickers, and is typically not under the control of the device itself at all.</t>

<t>While MUD files may include signatures, it is not mandatory to check them, and there is not a clear way to connect the entity which signed the MUD file to the device itself.
A malicious device does not need to make up a MUD file if there is already an available, and already trusted MUD file which it can use to impersonate the device.</t>

<t>One defense against this is to not trust MUD URLs which are different from the one that was placed in an IDevID.
Or if the initial MUD URL was not taken from an IDevID, it could be trusted on first use.
But, if the MUD controller has locked down the URL, then updates to the URL
are difficult to do.</t>

</section>
<section anchor="updating-mud-urls-vs-updating-mud-files" title="Updating MUD URLs vs Updating MUD files">

<section anchor="updating-the-mud-file-in-place" title="Updating the MUD file in place">

<t>One option is for the manufacturer to never change the MUD URL due to firmware updates.
The published description is updated whenever the behaviour of the firmware changes.</t>

<section anchor="adding-capabilities" title="Adding capabilities">

<t>For situations where new capabilities are added to the firmware, the MUD file will detail the new access that the new firmware requires.
This may involve new incoming or outgoing connections that should be authorized.
Devices which have been upgraded to the new firmware will make use of the new features.
Devices which have not been upgraded to the new firmware may have new connections that are authorized, but which the device does not use (outgoing connections), or for which the device is not prepared to respond to (new incoming connections).</t>

<t>It is possible that older versions of the firmware have vulnerabilities which were not easily exploitable due to the MUD file preventing particular kinds of access.
As an example, an older firmware could have a no credentials required (or default credentials) access via telnet on port 23 or HTTP on port 80.
The MUD file protected the device such that it could either not be accessed at all, or access was restricted to connections from a controller only.</t>

<t>Useful and needed upgrades to the firmware could add credentials to that service, permitting it to be opened up for more general access.
The new MUD file would provide for such access, but when combined with the weak security of the old firmware, results in a compromised device.</t>

<t>While there is an argument that old firmware was insecure and should be replaced, it is often the case that the upgrade process involves downttime, or can introduce risks due to needed evaluations not having been completed yet.
As an example: moving vehicles (cars, airplanes, etc.) should not perform upgrades while in motion!
It is probably undesireable to perform any upgrade to an airplane outside of its service facility.
The owner of a vehicle may desire to only perform software upgrades when they are at home, and could make other arrangements for transporation, rather than when parked at a remote cabin.
The situation for upgrades of medical devices has even more considerations involving regulatory compliance.</t>

</section>
<section anchor="removing-capabilities" title="Removing capabilities">

<t>For situations where existing capabilities prove to be a problem and are to be turned off or removed in subsequent versions of the firmware, the MUD file will be updated to disallow connections that previously were allowed.</t>

<t>In this case, the new MUD file will forbid some connection which the old firmware still expects to do.
As explained in the previous section, upgrades may not always occur immediately upon release of the new firmware.</t>

<t>In this case the old device will be performing unwanted connections, and the MUD controller when be alerting the device owner that the device is mis-behaving.
This causes a false positive situation (see <xref target="boycrieswolf"/>), leading to real security issues being ignored.
This is a serious issue as documented also in <xref target="boywolfinfosec"/>, and <xref target="falsemalware"/>.</t>

</section>
<section anchor="significant-changes-to-protocols" title="Significant changes to protocols">

<t><xref target="I-D.reddy-opsawg-mud-tls"/> suggests MUD definitions to allow examination of TLS protocol details.
Such a profile may be very specific to the TLS library which is shipped in a device.
Changes to the library (including bug fixes) may cause significant changes to
the profile, requiring changes to the profile described in the MUD file.
Such changes are likely neither forward nor backward compatible with other
versions, and in place updates to MUD files are therefore not indicated.</t>

</section>
</section>
<section anchor="motivation-for-updating-mud-urls" title="Motivation for updating MUD URLs">

<t>While many small tweaks to a MUD file can be done in place, the situation
described above, particularly when it comes to removing capabilities will
suggests that changes to the MUD URL.
A strategy is do this securely is needed, and the rest of this document
provides a mechanism to do this securely.</t>

</section>
</section>
<section anchor="threat-model-for-mud-urls" title="Threat model for MUD URLs">

<t>Only the DHCP and LLDP MUD URL mechanisms are sufficiently close to the firmware
version that they can be easily updated when the firmware is updated.
Because of that sensitivity, they may also be easily changed by malware!</t>

<t>There are mitigating mechanisms which may be enough to deal with this problem when MUD
files are signed by the  manufacturer.</t>

<t>It should be noted that <xref target="RFC8520"/> has not established a trust model for MUD controllers to
determine whether a signature from a specific entity is legitimate as a
signature for a particular device.  <xref target="RFC8520"/> leaves this to the industry to work out through supply chain arrangements or other heuristics.</t>

<section anchor="trust-on-first-use-tofu-leveraging-the-manufacturer-signature" title="Trust on First Use (TOFU): leveraging the manufacturer signature">

<t>Many MUD controllers currently use a Trust on First Use (TOFU) mechanism.
The first time a signature from a particular device-type is verified, the identity of the signing authority
is recorded.
It is pinned.
Subsequent updates to that MUD file must be signed by the same entity in order to be accepted.</t>

<t>Based upon this process, an update to the MUD URL would be valid if the new
MUD file was signed by the same entity that signed the previous entry.
This mechanism permits a replacement URL to be any URL that the same
manufacturer can provide.</t>

</section>
<section anchor="concerns-about-same-signer-mechanism" title="Concerns about same-signer mechanism">

<t>There is still a potential threat: a manufacturer which has many products may
have a MUD definition for another product that has the privileges that the
malware desires.</t>

<t>The malware could simply change the expressed MUD URL to that of the other product, and it will be accepted by the MUD controller as valid.</t>

<t>This works as long as manufacturers use a single key to sign all products.
Some manufacturers could sign each product with a different key.
Possibly, all the keys are collected into a single PKI, signed by a common certification authority.
In this case, the question as to whether the MUD controller should pin the end-entity (EE) certificate, or the CA certificate.
Pinning the EE certificate defends against malware that changes the product type, but keeps the manufacturer from being able to cycle the validity of the End-Entity Certificate for cryptographic hygiene reasons.
Pinning the CA certificate allows the EE certificate to change, but may not defend against product type changes.</t>

<t>It is possible to invent policy mechanisms that would link the EE certificate to a value that is in the MUD file.
This could be a policy OID, or could involve some content in a subjectAltName.
Future work could go in this direction.
This document proposes a simpler solution.</t>

</section>
</section>
<section anchor="outline-of-proposed-mechanism" title="Outline of proposed mechanism">

<t>The document proposes to limit what MUD URLs are considered valid from the device, limiting new MUD URLs to be variations of the initial (presumed to be secure) URL.</t>

</section>
<section anchor="changes-to-rfc8520" title="Changes to RFC8520">

<t>The first MUD file which is defined for a device can come from an IDevID (which is considered more secure), or
via Trust on First Use with DHCP or LLDP or another mechanism.</t>

<t>This first, initially trusted, MUD file will be called the “root” MUD file.</t>

<t>MUD files contain a self-referential MUD-URL attribute that point to
a MUD file located on the vendor’s web site.
While the IDevID, DHCP and LLDP mechanisms only transmit a URL, there are
some newer, not yet standardized proposals that would fetch an entire MUD
file from the device, such as <xref target="I-D.jimenez-t2trg-mud-coap"/>.</t>

<t>The MUD-URL MUST always be an Absolute URI: see <xref target="RFC3986"/> section 4.3.</t>

<t>The URL found in the MUD-URL attribute is to be called the canonical MUD URL for the device.</t>

<t>The MUD-SIGNATURE attribute in the MUD file SHOULD be a relative URI (see <xref target="RFC3986"/> section 4.2) with the (hierarchical) base URL for this reference being the MUD-URL attribute.</t>

<t>Subsequent MUD files are considered valid if:</t>

<t><list style="symbols">
  <t>have the same initial Base-URI as the MUD-URL, but may have a different final part</t>
  <t>they are signed by the same End Entity (same trusted CA and same SubjectAltName) as the “root” MUD file.</t>
</list></t>

<t>Section 5.2 of <xref target="RFC3986"/> details many cases for calculating the Base-URI.
The test is simplified to: remove everything to the right of the last (rightmost) “/” in the URL of “root” MUD  file URL, and the proposed new URL.
The resulting two strings MUST be identical.</t>

<t>For as a simple example, if the “root” mud-url is http://example.com/hello/there/file.json then
any URL that starts with http://example.com/hello/there/ would be acceptable, such as
http://example.com/hello/there/revision2.json.</t>

<t>Once the new MUD file is accepted, then it becomes the new “root” MUD file, and
any subsequent updates must be relative to the MUD-URL in the new file.</t>

<t>This process allows a manufacturer to rework their file structure, to change web server hostnames (such as when there is an acquisition or merger), etc. so long as they retain the old structure long enough for all devices to upgrade at least once.</t>

<t>(XXX: how should the trust anchor for the signature be updated when there is Merger&amp;Acquisition)</t>

</section>
<section anchor="privacy-considerations" title="Privacy Considerations">

<t>The MUD URL contains sensitive model and even firmware revision numbers.
Thus the MUD URL identifies the make, model and revision of a device.
<xref target="RFC8520"/> already identifies this privacy concern, and suggests use of TLS so that the HTTP requests that retrieve the MUD file do not divulge that level of detail.
However, it is possible that even observing the traffic to that manufacturer may be revealing, and <xref target="RFC8520"/> goes on to suggest use of a proxy as well.</t>

</section>
<section anchor="security-considerations" title="Security Considerations">

<t>Prior to the standardization of the process in this document, if a device was infiltrated by malware, and said malware wished to make accesses beyond what the current MUD file allowed, the the malware would have to:
1. arrange for an equivalent MUD file to be visible somewhere on the Internet
2. depend upon the MUD-manager either not checking signatures, or
3. somehow get the manufacturer to sign the alternate MUD
4. announce this new URL via DHCP or LLDP, updating the MUD-manager with the new permissions.</t>

<t>One way to accomplish (3) is to leverage the existence of MUD files created by the manufacturer for different classes of devices.
Such files would already be signed by the same manufacturer, eliminating the need to spoof a signature.</t>

<t>With the standardization of the process in this document, then the attacker can no longer point to arbitrary MUD files in step 4, but can only make use of MUD files that the manufacturer has already provided for this device.</t>

<t>Manufacturers are advised to maintain an orderly layout of MUD files in their web servers,
with each unique producting having its own directory/pathname.</t>

<t>The process described updates only MUD-managers and the processes that manufacturers use to manage the location of their MUD files.</t>

<t>A manufacturer which has not managed their MUD files in the the way described here can deploy new directories of per-product MUD files, and then can update the existing MUD files in place to point to the new URLs
using the MUD-URL attribute.</t>

<t>There is therefore no significant flag day: MUD managers may implement the new policy without significant concern about backwards compatibility.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>

&RFC3986;
&RFC8520;


    </references>

    <references title='Informative References'>

&I-D.reddy-opsawg-mud-tls;
&I-D.richardson-opsawg-securehomegateway-mud;
<reference anchor="boycrieswolf" target="https://fablesofaesop.com/the-boy-who-cried-wolf.html">
  <front>
    <title>The Boy Who Cried Wolf</title>
    <author >
      <organization></organization>
    </author>
    <date year="2020" month="January" day="18"/>
  </front>
</reference>
<reference anchor="boywolfinfosec" target="https://www.infosecurity-magazine.com/opinions/security-alerts-boy-cried-wolf/">
  <front>
    <title>Security Alerts - A Case of the Boy Who Cried Wolf?</title>
    <author >
      <organization></organization>
    </author>
    <date year="2020" month="January" day="18"/>
  </front>
</reference>
<reference anchor="falsemalware" target="https://www.scmagazine.com/home/security-news/false-malware-alerts-cost-organizations-1-27m-annually-report-says/ and http://go.cyphort.com/Ponemon-Report-Page.html">
  <front>
    <title>False malware alerts cost organizations $1.27M annually, report says</title>
    <author >
      <organization></organization>
    </author>
    <date year="2020" month="January" day="18"/>
  </front>
</reference>
&I-D.jimenez-t2trg-mud-coap;


    </references>


<section anchor="appendices" title="Appendices">

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

