<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.6 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-opsawg-sbom-access-00" category="std">

  <front>
    <title abbrev="Accessing SBOMs">Discovering And Accessing Software Bills of Materials</title>

    <author initials="E." surname="Lear" fullname="Eliot Lear">
      <organization>Cisco Systems</organization>
      <address>
        <postal>
          <street>Richtistrasse 7</street>
          <city>Wallisellen</city>
          <code>CH-8304</code>
          <country>Switzerland</country>
        </postal>
        <phone>+41 44 878 9200</phone>
        <email>lear@cisco.com</email>
      </address>
    </author>
    <author initials="S." surname="Rose" fullname="Scott Rose">
      <organization>NIST</organization>
      <address>
        <postal>
          <street>100 Bureau Dr</street>
          <city>Gaithersburg MD</city>
          <code>20899</code>
          <country>USA</country>
        </postal>
        <phone>+1 301-975-8439</phone>
        <email>scott.rose@nist.gov</email>
      </address>
    </author>

    <date year="2021" month="January" day="26"/>

    
    
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>Software bills of materials (SBOMs) are formal descriptions of what
pieces of software are included in a product.  This memo specifies a
different means for SBOMs to be retrieved.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>Software bills of material (SBOMs) are descriptions of what software,
including versioning and dependencies, a device contains.  There
are different SBOM formats such as Software Package Data Exchange
<xref target="SPDX"/>, Software Identity Tags <xref target="SWID"/>, or CycloneDX<xref target="CycloneDX12"/>.</t>

<t>This memo specifies means by which SBOMs can be advertised and retrieved.</t>

<t>The mechanisms specified in this document are meant to satisfy several
use cases:</t>

<t><list style="symbols">
  <t>An application-layer management system retrieving an SBOM in
order to evaluate the posture of an application server of some
form.  These application servers may themselves be containers or
hypervisors.  Discovery of the topology of a server is beyond the
scope of this memo.</t>
  <t>A network-layer management system retrieving an SBOM from an IoT
device as part of its ongoing lifecycle. Such devices may or may not
have interfaces available to query SBOM information.</t>
</list></t>

<t>To satisfy these two key use cases, SBOMs may be found in one of three
ways:</t>

<t><list style="symbols">
  <t>on devices themselves</t>
  <t>on a web site (e.g., via URI)</t>
  <t>through some form of out-of-band contact with the supplier.</t>
</list></t>

<t>In the first case, devices will have interfaces that permit direct
SBOM retrieval.  Examples of these interfaces might be an
HTTP or COAP endpoint for retrieval.  There may also be private
interfaces as well.</t>

<t>In the second case, when a device does not have an appropriate
interface to retrieve an SBOM, but one is directly available from the
manufacturer, a URI to that information must be discovered.</t>

<t>In the third case, a supplier may wish to make an SBOM available under
certain circumstances, and may need to individually evaluate requests.
The result of that evaluation might be the SBOM itself or a restricted
URL or no access.</t>

<t>To enable application-layer discovery, this memo defines a well-known
URI <xref target="RFC8615"/>.  Management or orchestration tools can query this
well-known URI to retrieve a system’s SBOM.  Further queries may be
necessary based on the content and structure of a particular SBOM.</t>

<t>To enable network-layer discovery, particularly for IOT-based devices,
an extension to Manufacturer Usage Descriptions (MUD) may be
used<xref target="RFC8520"/>.</t>

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL
NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”,
“MAY”, and “OPTIONAL” in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<section anchor="how-this-information-is-used" title="How This Information Is Used">
<t>SBOMs are used for numerous purposes, including vulnerability
assessment, license management, and inventory management.  This memo
provides means for either automated or semi-automated collection of
that information.  For devices that can output a MUD URL or establish
a well-known URI, the mechanism may be highly automated.  For devices
that have a MUD URL in either their documentation or within a QR code
on a box, the mechanism is semi-automated (someone has to scan the QR
code or enter the URL).</t>

<t>Note that SBOMs may change more frequently than access control
requirements.  A change to software does not necessarily mean a change
to control channels that are used.  Therefore, it is important to
retrieve the MUD file as suggested by the manufacturer in the
cache-validity period.  In many cases, only the SBOM list will have
been updated.</t>

</section>
<section anchor="sbom-formats" title="SBOM formats">
<t>There are multiple ways to express an SBOM.  When these are retrieved
either directly from the device or directly from a web server, tools
will need to observe the content-type header to determine precisely
which format is being transmitted.  Because IoT devices in particular
have limited capabilities, use of a specific Accept: header in HTTP 
or the Accept Option in CoAP is NOT RECOMMENDED.  Instead, backend
tooling MUST silently discard SBOM information sent with a media type
that is not understood.</t>

</section>
<section anchor="discussion-points" title="Discussion points">
<t>The following is discussion to be removed at time of RFC publication.</t>

<t><list style="symbols">
  <t>Is the model structured correctly?</t>
  <t>Are there other retrieval mechanisms that need to be specified?</t>
  <t>Do we need to be more specific in how to authenticate and retrieve
SBOMs?</t>
  <t>What are the implications if the MUD URL is an extension in a certificate
(e.g. an IDevID cert)?</t>
</list></t>

</section>
</section>
<section anchor="the-mud-sbom-extension-model-extension" title="The mud-sbom extension model extension">

<t>We now formally define this extension.  This is done in two parts.
First, the extension name “sbom” is listed in the
“extensions” array of the MUD file.</t>

<t>Second, the “mud” container is augmented with a list of SBOM sources.</t>

<t>This is done as follows:</t>

<figure><artwork><![CDATA[
module: ietf-mud-sbom
  augment /mud:mud:
    +--rw sboms* [version-info]
       +--rw version-info         string
       +--rw (sbom-type)?
          +--:(url)
          |  +--rw sbom-url?      inet:uri
          +--:(local-uri)
          |  +--rw sbom-local*    enumeration
          +--:(contact-info)
             +--rw contact-uri?   inet:uri
]]></artwork></figure>

</section>
<section anchor="the-mud-sbom-augmentation-to-the-mud-yang-model" title="The mud-sbom augmentation to the MUD YANG model">

<figure><artwork><![CDATA[
<CODE BEGINS>file "ietf-mud-sbom@2020-03-06.yang"
module ietf-mud-sbom {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-mud-sbom";
  prefix mud-sbom;

  import ietf-inet-types {
    prefix inet;
  }
  import ietf-mud {
    prefix mud;
  }

  organization
    "IETF OPSAWG (Ops Area) Working Group";
  contact
    "WG
     Web: http://tools.ietf.org/wg/opsawg/
     WG List: opsawg@ietf.org
     Author: Eliot Lear lear@cisco.com ";
  description
    "This YANG module augments the ietf-mud model to provide for
     reporting of SBOMs.

     Copyright (c) 2019 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject to
     the license terms contained in, the Simplified BSD License set
     forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC XXXX
     (https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself for
     full legal notices.

     The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
     NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
     'MAY', and 'OPTIONAL' in this document are to be interpreted as
     described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
     they appear in all capitals, as shown here.  ";

  revision 2020-03-06 {
    description
      "Initial proposed standard.";
    reference
      "RFC XXXX: Extension for MUD Reporting";
  }

  grouping mud-sbom-extension {
    description
      "SBOM extension grouping";
    list sboms {
      key "version-info";
      leaf version-info {
        type string;
        description
          "A version string that is applicable for this SBOM list entry.
           The format of this string is left to the device manufacturer.
           How the network administrator determines the version of
           software running on the device is beyond the scope of this
           memo.";
      }
      choice sbom-type {
        case url {
          leaf sbom-url {
            type inet:uri;
            description
              "A statically located URI.";
          }
        }
        case local-uri {
          leaf-list sbom-local {
            type enumeration {
              enum coap {
                description
                  "Use COAP schema to retrieve SBOM";
              }
              enum coaps {
                description
                  "Use COAPS schema to retrieve SBOM";
              }
              enum http {
                description
                  "Use HTTP schema to retrieve SBOM";
              }
              enum https {
                description
                  "Use HTTPS schema to retrieve SBOM";
              }
            }
            description
              "The choice of sbom-local means that the SBOM resides at
              a location indicated by an indicted scheme for the
              device in question, at well known location
              '/.well-known/sbom'.  For example, if the MUD file
              indicates that coaps is to be used and the host is
              located at address 10.1.2.3, the SBOM could be retrieved
              at 'coaps://10.1.2.3/.well-known/sbom'.  N.B., coap and
              http schemes are NOT RECOMMENDED.";
          }
        }
        case contact-info {
          leaf contact-uri {
            type inet:uri;
            description
              "This MUST be either a tel, http, https, or
               mailto uri schema that customers can use to
               contact someone for SBOM information.";
          }
        }
        description
          "choices for SBOM retrieval.";
      }
      description
        "list of methods to get an SBOM.";
    }
  }

  augment "/mud:mud" {
    description
      "Add extension for SBOMs.";
    uses mud-sbom-extension;
  }
}

<CODE ENDS>
]]></artwork></figure>

</section>
<section anchor="examples" title="Examples">

<t>In this example MUD file that uses a cloud service, the Frobinator
presents a location of the SBOM in a URL.  Note, the ACLs in a MUD
file are NOT required, although they are a very good idea for IP-based
devices.  The first MUD file demonstrates how to get the SBOM without
ACLs, and the second has ACLs.</t>

<section anchor="without-acls" title="Without ACLS">

<figure><artwork><![CDATA[
{
  "ietf-mud:mud": {
    "mud-version": 1,
    "mud-url": "https://iot-device.example.com/dnsname",
    "last-update": "2019-01-15T10:22:47+00:00",
    "cache-validity": 48,
    "is-supported": true,
    "systeminfo": "device that wants to talk to a cloud service",
    "mfg-name": "Example, Inc.",
    "documentation": "https://frobinator.example.com/doc/frob2000",
    "model-name": "Frobinator 2000",
    "extensions" : [ 
       "sbom"
      ],
    "sboms" : [
      {
         "version-info" : "FrobOS Release 1.1",
         "sbom-url" : "https://frobinator.example.com/sboms/f20001.1",
      }
    ]
  }
}
]]></artwork></figure>

</section>
<section anchor="located-on-the-device" title="Located on the Device">

<figure><artwork><![CDATA[
{
  "ietf-mud:mud": {
    "mud-version": 1,
    "mud-url": "https://iot-device.example.com/dnsname",
    "last-update": "2019-01-15T10:22:47+00:00",
    "cache-validity": 48,
    "is-supported": true,
    "systeminfo": "device that wants to talk to a cloud service",
    "mfg-name": "Example, Inc.",
    "documentation": "https://frobinator.example.com/doc/frob2000",
    "model-name": "Frobinator 2000",
    "extensions" : [ 
       "sbom"
      ],
    "sboms" : [
      {
         "version-info" : "FrobOS Release 1.1",
         "sbom-local" : "coaps:///.well-known/sbom",
      }
    ]
  }
}
]]></artwork></figure>

</section>
<section anchor="sbom-obtained-from-contact-information" title="SBOM Obtained from Contact Information">

<figure><artwork><![CDATA[
{
  "ietf-mud:mud": {
    "mud-version": 1,
    "mud-url": "https://iot-device.example.com/dnsname",
    "last-update": "2019-01-15T10:22:47+00:00",
    "cache-validity": 48,
    "is-supported": true,
    "systeminfo": "device that wants to talk to a cloud service",
    "mfg-name": "Example, Inc.",
    "documentation": "https://frobinator.example.com/doc/frob2000",
    "model-name": "Frobinator 2000",
    "extensions" : [ 
       "sbom"
      ],
    "sboms" : [
      {
         "version-info" : "FrobOS Release 1.1",
         "contact-uri" : "mailto:sbom-requst@example.com",
      }
    ]
  }
}
]]></artwork></figure>

</section>
<section anchor="with-acls" title="With ACLS">

<figure><artwork><![CDATA[
{
  "ietf-mud:mud": {
    "mud-version": 1,
    "mud-url": "https://iot-device.example.com/dnsname",
    "last-update": "2019-01-15T10:22:47+00:00",
    "cache-validity": 48,
    "is-supported": true,
    "systeminfo": "device that wants to talk to a cloud service",
    "mfg-name": "Example, Inc.",
    "documentation": "https://frobinator.example.com/doc/frob2000",
    "model-name": "Frobinator 2000",
    "extensions" : [ 
       "sbom"
      ],
    "sboms" : [
      {
         "version-info" : "FrobOS Release 1.1",
         "sbom-url" : "https://frobinator.example.com/sboms/f20001.1",
      }
    ],
    "from-device-policy": {
      "access-lists": {
        "access-list": [
          {
            "name": "mud-96898-v4fr"
          },
          {
            "name": "mud-96898-v6fr"
          }
        ]
      }
    },
    "to-device-policy": {
      "access-lists": {
        "access-list": [
          {
            "name": "mud-96898-v4to"
          },
          {
            "name": "mud-96898-v6to"
          }
        ]
      }
    }
  },
  "ietf-access-control-list:acls": {
    "acl": [
      {
        "name": "mud-96898-v4to",
        "type": "ipv4-acl-type",
        "aces": {
          "ace": [
            {
              "name": "cl0-todev",
              "matches": {
                "ipv4": {
                  "ietf-acldns:src-dnsname": "cloud-service.example.com"
                }
              },
              "actions": {
                "forwarding": "accept"
              }
            }
          ]
        }
      },
      {
        "name": "mud-96898-v4fr",
        "type": "ipv4-acl-type",
        "aces": {
          "ace": [
            {
              "name": "cl0-frdev",
              "matches": {
                "ipv4": {
                  "ietf-acldns:dst-dnsname": "cloud-service.example.com"
                }
              },
              "actions": {
                "forwarding": "accept"
              }
            }
          ]
        }
      },
      {
        "name": "mud-96898-v6to",
        "type": "ipv6-acl-type",
        "aces": {
          "ace": [
            {
              "name": "cl0-todev",
              "matches": {
                "ipv6": {
                  "ietf-acldns:src-dnsname": "cloud-service.example.com"
                }
              },
              "actions": {
                "forwarding": "accept"
              }
            }
          ]
        }
      },
      {
        "name": "mud-96898-v6fr",
        "type": "ipv6-acl-type",
        "aces": {
          "ace": [
            {
              "name": "cl0-frdev",
              "matches": {
                "ipv6": {
                  "ietf-acldns:dst-dnsname": "cloud-service.example.com"
                }
              },
              "actions": {
                "forwarding": "accept"
              }
            }
          ]
        }
      }
    ]
  }
}
]]></artwork></figure>
<t>At this point, the management system can attempt to retrieve the SBOM,
and determine which format is in use through the content-type header
on the response to a GET request.</t>

</section>
</section>
<section anchor="security-considerations" title="Security Considerations">
<t>SBOMs provide an inventory of software.  If firmware is available to
an attacker, the attacker may well already be able to derive this very
same software inventory.  Manufacturers MAY restrict access to SBOM
information using appropriate authorization semantics within HTTP.  In
particular, if a system attempts to retrieve an SBOM via HTTP, if the
client is not authorized, the server MUST produce an appropriate
error, with instructions on how to register a particular client.  One
example may be to issue a certificate to the client for this purpose
after a registration process has taken place.  Another example would
involve the use of OAUTH in combination with a federations of SBOM
servers.</t>

<t>Another risk is a skew in the SBOM listing and the actual software 
inventory of a device/container. For example, a manufactuer may update
the SBOM on its server, but an individual device has not be upgraded yet. 
This may result in an incorrect policy being applied to a device. A unique mapping of a device’s firmware version and its SBOM can 
minimize this risk.</t>

<t>To further mitigate attacks against a device, manufacturers SHOULD
recommend access controls through the normal MUD mechanism.</t>

</section>
<section anchor="iana-considerations" title="IANA Considerations">

<section anchor="mud-extension" title="MUD Extension">

<t>The IANA is requested to add “controller-candidate” to the MUD
extensions registry as follows:</t>

<figure><artwork><![CDATA[
  Extension Name: sbom
  Standard reference: This document

]]></artwork></figure>

</section>
<section anchor="well-known-prefix" title="Well-Known Prefix">

<t>The following well known URI is requested in accordance with
<xref target="RFC8615"/>:</t>

<figure><artwork><![CDATA[
  URI suffix: "sbom"
  Change controller: "IETF"
  Specification document: This memo
  Related information:  See ISO/IEC 19970-2 and SPDX.org

]]></artwork></figure>

</section>
</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference  anchor="RFC6991" target='https://www.rfc-editor.org/info/rfc6991'>
<front>
<title>Common YANG Data Types</title>
<author initials='J.' surname='Schoenwaelder' fullname='J. Schoenwaelder' role='editor'><organization /></author>
<date year='2013' month='July' />
<abstract><t>This document introduces a collection of common data types to be used with the YANG data modeling language.  This document obsoletes RFC 6021.</t></abstract>
</front>
<seriesInfo name='RFC' value='6991'/>
<seriesInfo name='DOI' value='10.17487/RFC6991'/>
</reference>



<reference  anchor="RFC8520" target='https://www.rfc-editor.org/info/rfc8520'>
<front>
<title>Manufacturer Usage Description Specification</title>
<author initials='E.' surname='Lear' fullname='E. Lear'><organization /></author>
<author initials='R.' surname='Droms' fullname='R. Droms'><organization /></author>
<author initials='D.' surname='Romascanu' fullname='D. Romascanu'><organization /></author>
<date year='2019' month='March' />
<abstract><t>This memo specifies a component-based architecture for Manufacturer Usage Descriptions (MUDs).  The goal of MUD is to provide a means for end devices to signal to the network what sort of access and network functionality they require to properly function.  The initial focus is on access control.  Later work can delve into other aspects.</t><t>This memo specifies two YANG modules, IPv4 and IPv6 DHCP options, a Link Layer Discovery Protocol (LLDP) TLV, a URL, an X.509 certificate extension, and a means to sign and verify the descriptions.</t></abstract>
</front>
<seriesInfo name='RFC' value='8520'/>
<seriesInfo name='DOI' value='10.17487/RFC8520'/>
</reference>



<reference  anchor="RFC2119" target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference  anchor="RFC8174" target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author initials='B.' surname='Leiba' fullname='B. Leiba'><organization /></author>
<date year='2017' month='May' />
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>



<reference  anchor="RFC8615" target='https://www.rfc-editor.org/info/rfc8615'>
<front>
<title>Well-Known Uniform Resource Identifiers (URIs)</title>
<author initials='M.' surname='Nottingham' fullname='M. Nottingham'><organization /></author>
<date year='2019' month='May' />
<abstract><t>This memo defines a path prefix for &quot;well-known locations&quot;, &quot;/.well-known/&quot;, in selected Uniform Resource Identifier (URI) schemes.</t><t>In doing so, it obsoletes RFC 5785 and updates the URI schemes defined in RFC 7230 to reserve that space.  It also updates RFC 7595 to track URI schemes that support well-known URIs in their registry.</t></abstract>
</front>
<seriesInfo name='RFC' value='8615'/>
<seriesInfo name='DOI' value='10.17487/RFC8615'/>
</reference>




    </references>

    <references title='Informative References'>

<reference anchor="SPDX" >
  <front>
    <title>SPDX Specification 2.1</title>
    <author >
      <organization>The Linux Foundation</organization>
    </author>
    <date year="2016"/>
  </front>
</reference>
<reference anchor="SWID" >
  <front>
    <title>Information technology — IT asset management — Part 2: Software identification tag</title>
    <author >
      <organization>ISO/IEC</organization>
    </author>
    <date year="2015"/>
  </front>
  <seriesInfo name="ISO" value="19770-2:2015"/>
</reference>
<reference anchor="CycloneDX12" >
  <front>
    <title>CycloneDX XML Reference v1.2</title>
    <author >
      <organization>cylonedx.org</organization>
    </author>
    <date year="2020" month="May"/>
  </front>
</reference>


    </references>


<section anchor="changes-from-earlier-versions" title="Changes from Earlier Versions">

<t>Draft -00:</t>

<t><list style="symbols">
  <t>Initial revision</t>
</list></t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

