<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.0.36 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-lear-network-helps-00.txt" category="info">

  <front>
    <title abbrev="Network Protection Helps">Time To End The War on Network Protection</title>

    <author initials="E." surname="Lear" fullname="Eliot Lear">
      <organization></organization>
      <address>
        <email>lear@ofcourseimright.com</email>
      </address>
    </author>

    <date year="2016" month="October" day="29"/>

    
    
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>Since the Edward Snowden’s release of secret information, some in the
IETF have taken an approach that the network is such a useful tool
that it is also an enemy.  With several high visibility attacks that
have been based on low end systems (Things), it is now clear that not
only is the network not the enemy.  When the network has at least some
information about a device, we get a second chance to limit attacks
against the device and, in some cases, a third chance to limit attacks
from the device.  This memo discusses ways in which network protection
assists in protection of devices, and some caveats around that
protection, and suggests considerations implementers and protocol
developers should consider as connectivity continues to expand to
new applications.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>In June of 2013 Edward Snowden released a vast trove of secret NSA
documents that demonstrated numerous vulnerabilities of the Internet
architecture, that included collection of aggregate information,
tapping of communication lines, hacking of devices in transit, and
other means.  Many of these vulnerabilities were known to be possible
in theory, although the scale of such an attack was unprecedented.</t>

<t>The Internet Architecture Board held a plenary meeting in November
2013 in which we openly discussed these attacks, and what we would do
about them.  The result was <xref target="RFC7258"/>, which states that pervasive
surveillance should be treated formally as a form of attack.</t>

<t>Since that time HTTP2 has been released, and work has begun on QUIC
<xref target="QUIC"/>, a transport protocol that reside atop UDP.</t>

<t>The premise of much of this work has been that if the network has
visibility to ANY meta-information, then it is possible for a
government or other similarly well-funded entity to effect a pervasive
surveillance attack.  The conclusion in some minds has been that the
network has aided and abetted attackers to the point that its
indistinguishable from an attacker. A natural, yet flawed, conclusion
was endpoints alone can and must be responsible for their own
protection.</t>

<t>Since 2013, the Internet of Things has come into its own, as
connection capabilities have developed on everything from dolls to
door bells.  While the ability to connect to the Internet has
developed, ability to maintain a secure device has not kept up.  If
the network cannot be part of the solution, and the device is unable
to secure itself, then the device by definition will be open to
attack.</t>

<t>This document is structured as follows.  First <xref target="whatwhy"/> provides a
general overview of the value and risks of sharing at various layer.
Next <xref target="attacktypes"/> provides an overview of different classes of
devices and the forms of attacks that occur where some amount of
sharing might have provided some useful defense.  We then review the
role of encryption in <xref target="encrypt"/>.  A basic principle is that
information sharing should take place as a matter, and not as an
accident, of design.</t>

<t>Finally we make recommendations for how devices and networks should
collaborate under several different use cases.</t>

<t>This document considers how to address privacy considerations
<xref target="RFC6973"/> in the context of Things.  While we do not pull
terminology from that document, the concepts should be readily
identifiable.</t>

</section>
<section anchor="whatwhy" title="What might be shared (and why)">
<t>Within the Internet architecture it is possible for any piece of
information to be shared.  This includes application-layer
information, TCP/UDP port information, source/destination IP
addresses, intended communication direction, and L2 information.  In
addition to information shared in flight, profile information can also
be shared.  The following discussion motivates why these pieces of
information might be shared.</t>

<section anchor="application-layer-information-sharing-in-flight" title="Application-layer information sharing in flight">
<t>When application information is shared with a firewall or similar
system, that system is in a position to validate application layer
exchanges for correctness.  For example, an end-to-end banking
transaction authorized by a trader may be open to audit in order to
avoid fraud, or the setting of a valve in an oil well should be
validated to be within a set of parameters in order to avoid a spill
or worse. Some content discrimination may be necessary.  For instance,
some parameters may be transparent and others encrypted. The
trader’s order might be clear, but authentication information would be
encrypted.</t>

<t>The challenge with this approach are threefold:</t>

<t><list style="symbols">
  <t>The network access point and the end points must have an
identical and up-to-date semantic understanding of the information
being shared.</t>
  <t>In addition, the level of trust conferred to the network access
point is absolute.  If it is compromised, all information is revealed.</t>
  <t>This level of sharing also presents scaling problems whereby the
network must expend processing power to determine appropriate actions.</t>
</list></t>

<t>When such an approach is used, it must be explicitly configured, and
there must be an automated means to update both end points and network
access points such that transactions are always properly
interpreted by all parties.  In addition, appropriate resources must
be available on the network access points.</t>

</section>
<section anchor="transport-layer-information" title="Transport Layer information">
<t>At this layer service information is revealed.  This might indicate
what applications are running in some instances, but not the content
being exchanged.  Layer 4 is generally considered to be so-called
“meta-information”, although it is information that is exposed,
nonetheless.  Sharing of Layer 4 information generally provides
network access points with a basic understanding of services the
device is using.  Combined with directional information, sharing at
this layer usually is sufficient to indicate which end has initiated a
conversation.  The simplest example is TCP packets that have or lack the
ACK flag.  More advance forms retain flow state.</t>

<t>Directionality is a key ingredient to being able to stop unwanted
traffic, including malware.  Simply put, “if I didn’t ask for it, I
don’t want it.”  Now we apply this axiom in the context of the
firehose we call the Internet.  Directionality can be detected in the
transport layer and as a function of the first packet seen from a
particular interface.  Each of these mechanisms has limitations, but
each provides some level of protection.  Directionality is
particularly important in environments where highly constrained
devices can have their resources overwhelmed or drained, a simple
example being an energy-harvesting light switch.  Only the network can
enforce an approach if an end node listens to any traffic at all.</t>

<t>A common pattern of communication for devices is that they would need
DNS, NTP and perhaps either outbound or inbound web services.  Use of
protocols like Port Control Protocol (PCP) <xref target="RFC6887"/> is predicated
on the assumption that meaningful protection is provided by
restricting access to other ports.</t>

<t>This information is not quite as sensitive as application layer
information, in that usernames, passwords, and other private pieces of
information usually are not available to be exchanged.  Processing
requirements at this layer vary based on the transport protocol used
and the level of protection required.</t>

</section>
<section anchor="ip-layer-information" title="IP Layer Information">
<t>The IP layer consists of source and destination addresses.  This
information can be considerably more revealing than transport layer
information.  Based on this information, an observer may often discern
who the parties of a communication are, based on reverse address
lookups or by examination of the IPv6 Interface Identifier(IID).  IP
addresses are, conversely, the primary discriminators that many
firewalls use to determine whether a communication should be allowed.
A common design pattern is that an system may offer a certain set of
inbound services, perhaps even from anywhere, communicate outbound to
a certain set of devices, and then not require any other
communications.  Many firewall rule sets are built upon this premise.</t>

<t>Cloud-based applications that make use of short TTL values of DNS
records for load distribution have changed the nature of this game
somewhat in that it is no longer sufficient to simply attend to IP
addresses to authorize a service- one must also pay attention to an
ever-changing mapping between address and name.</t>

<t>IP addresses also provide some hint at geographic location. This
function is used today for many purposes, such as determining
timezones or rights to certain content.  That location information may
be abused to track individuals.</t>

</section>
<section anchor="sharing-of-device-profile-information" title="Sharing of Device Profile Information">
<t>A device profile consists of information that describes what a device
does.  That information may be of a general nature shared by a
manufacturer such as Manufacturer Usage Descriptions (MUD)
<xref target="I-D.ietf-opsawg-mud"/> or it may be of a more specific nature unique
to an individual deployment or owner.  The more specific the
information revealed, the more sensitive.  For instance, telling the
network that a device is a printer may reveal very little.  Telling
the network that it is Eliot Lear’s printer reveals ownership, and
that he may have some relationship to the location in which the
printer resides (like perhaps owning the or renting it).</t>

<t>General information along the lines of MUD provides no information
about who owns the device, but does reveal what the device is.
However, with the information, a network access point is in a positon
to apply an appropriate set of access lists to limit the scope of
attack against the end node.</t>

<t>Who has access to this information will depend on the means in which
the profile is communicated.  For instance, if a device inventory
system makes use of TLS, the information is shared only with that
system.  The same can be used if information is shared over EAP-TLS
<xref target="RFC5216"/>.</t>

</section>
</section>
<section anchor="attacktypes" title="How Information Sharing Could Stop Some Attacks">

<section anchor="dvrs" title="DVRs">
<t>One recent attack based on the Mirai code <xref target="Krebs-MIRAI"/> that was made
available on Github address itself to digital video recorders,
cameras, and home Internet routers.  Some of these devices are said to
be old and not upgradable.  Attempts to take over the device occurred
through known telnet, SSH, and HTTP where known passwords were used.
It is also said that these devices, in their normal function, make use
of one or two ports.</t>

<t>Had the device manufacturer made use of Manufacturer Usage
Descriptions (MUD), an access point could have blocked them from
accessing the DVR, even though it had old firmware.  An Example MUD
file is given in <xref target="mudexample"/>.  Note that this file may not have
stopped an already-infected device from attacking, and it requires
that local deployment information be filled in for the class named
“http://dvr264.example.com/controller”.</t>

<t>As <xref target="I-D.ietf-opsawg-mud"/> specifies, there are numerous ways for a
device to indicate the URL by which to retrieve that file.  Some of
those methods might reveal to an observer the type of device.  To
generalize guidance in this space we might say the following of
network devices:</t>

<t><list style="symbols">
  <t>Information about a device should not be volunteered in insecure
environments.</t>
  <t>Where possible, such information should be encrypted to an
authorized recipient.</t>
  <t>Information that is intended for a router, such as DHCP requests,
should only be forwarded to authorized DHCP servers, and not to all
ports on a network.</t>
</list></t>

<t>As we will discuss below, it may not always be possible to encrypt
information.  Thus a risk tradeoff must be made: will the information
cause substantial harm through leakage.  In the case of DHCP, the risk
is that a local device is eavesdropping.  However, in this
circumstance, even if the device emitted a DHCP option that was
broadcast to all local devices, there would have been no additional
damage, because a probe was used to determine that a device was
vulnerable.  As we raise the bar, however, we may wish to consider how
to better protect such information through the use of other mechanisms.</t>

</section>
<section anchor="electrical-grid-attacks" title="Electrical Grid Attacks">
<t>A large country has already seen its electrical grid attacked.  The
attack was multifaceted, but specifically targeted the industrial
control systems (ICSes).  In one attack, breakers were opened to cause
a failure.  If the network between the control system and the circuit
breaker actuator were gatewayed by a firewall observing commands, that
attack may well have been thwarted.  As discussed above, such
protection comes at a high cost.  In particular, the firewall itself
becomes a point of attack.  It also requires that the firewall
understands not only the commands, but how and when it is safe for
them to be executed.  A poorly configured firewall might prevent a
necessary emergency shutdown.</t>

<t>Thus we might derive some general rules of thumb regarding use of
application information:</t>

<t><list style="symbols">
  <t>These mechanisms should, when at all possible, be explicitly
authorized, where encryption is used between all components.</t>
  <t>Where encryption is not possible, substantial additional levels of
security should be placed around the control system so as to
otherwise limit unauthorized access.  This might include, for
instance, a limitation on remote connectivity or use of VPNs, where
access of the physical communication path cannot be controlled.</t>
  <t>There must be clear parameters as to what reasonable values are, and
what to do in exceptional circumstances.</t>
</list></t>

</section>
<section anchor="mobile-medical-devices" title="Mobile Medical Devices">
<t>A number of medical devices that have transceivers may now be
implanted in humans. These devices are as mobile as their patients are.
Such devices may be subject to nearly all classes of attack, such as
unauthorized access to denial of service.  All such attacks could
prove deadly to the patient.  The problem is complicated by the fact
that these devices are generally battery operated where intended
communication is expected to be rare, but responsive when needed.  One
approach used to address this limitation is to only enable near field
communications, so that remote attacks are not possible.  Another is
to require a magnetic field to enable remote access, as is done with
pacemakers.  In these cases, ad hoc connectivity is then established.
Examining the threat model, if someone is going to attack a person with a
magnet, they may well have other ways to effect an attack.  The key is
that the magnet is essentially used as an electrical switch to enable
communication.  Having some local activation mechanism can prevent
resource drain, where no information is gratuitously shared.</t>

<t>Such an approach may not be practicable in all circumstances.  When
that is the case, the network should be used to detect and prevent
denial of service attacks, without the need to reveal identifying
about the patient.</t>

</section>
<section anchor="mobile-phones" title="Mobile Phones">
<t>Mobile phones have been well studied.  Risks associated with these
devices often involve users taking actions not in their best
interests, such as installing malware, or permitting excessive rights
to an app.<xref target="EGEL12"/>.  Mobile Service providers typically already have
information as to devices attached to the network, in part because
they often sell those devices at reduced prices with contracts.</t>

</section>
</section>
<section anchor="encrypt" title="Encryption and Sharing">
<t>When data is obscured via encryption, then it must be shared
explicitly with intended recipients.  When practicable, this is a
preferred approach, but a number of problems often arise:</t>

<t><list style="symbols">
  <t>Trust between parties.  While some ongoing
work is exploring trusted introduction
<xref target="I-D.ietf-anima-bootstrapping-keyinfra"/>, due to memory and
connectivity constraints it is often difficult to establish trust
between two or more parties.</t>
  <t>Even once a trusted introduction has occurred, ongoing key
management and algorithm selection remains a challenge.  The entire
device lifecycle must be taken into account.</t>
</list></t>

<t>Because of poor interactions between network components and devices,
many services now reside on TCP port 443, meaning that when
encryption is possible, it is not possible for a firewall to filter
based on service as it has been in the past.</t>

<t>In order to avoid tracking, a number of mobile devices are now
regularly changing their L2 MAC addresses, where possible.  This makes
filtering based on MAC address impracticable.  Similarly, devices
deploying IPv6 have the ability to make use of different IPv6
Interface Identifier (IID).  <xref target="RFC7721"/> discusses the privacy
implications and threats of using stable IIDs.  As that document
mentions, if the IID is part of an authentication paradigm, its change
means that the device itself must be reauthenticated, and may add to
system fragility.</t>

</section>
<section anchor="conclusions" title="Conclusions">
<t>When networks take on certain functions there are some risks that must
be considered.  The same is true when only devices attempt to provide
for their own security.  An systemic and architectural approach is
needed that makes use of both device and network capabilities in good
measure.  Such an approach must take into account both privacy and
security requirements, where appropriate balances can be made.</t>

</section>
<section anchor="seccon" title="Security Considerations">
<t>This document discusses the security of the Internet.</t>

</section>
<section anchor="iana-considerations" title="IANA Considerations">
<t>This section may be removed upon publication.  There are no IANA
considerations.</t>

</section>
<section anchor="acknowledgments" title="Acknowledgments">

</section>


  </middle>

  <back>


    <references title='Informative References'>





<reference  anchor='RFC6973' target='http://www.rfc-editor.org/info/rfc6973'>
<front>
<title>Privacy Considerations for Internet Protocols</title>
<author initials='A.' surname='Cooper' fullname='A. Cooper'><organization /></author>
<author initials='H.' surname='Tschofenig' fullname='H. Tschofenig'><organization /></author>
<author initials='B.' surname='Aboba' fullname='B. Aboba'><organization /></author>
<author initials='J.' surname='Peterson' fullname='J. Peterson'><organization /></author>
<author initials='J.' surname='Morris' fullname='J. Morris'><organization /></author>
<author initials='M.' surname='Hansen' fullname='M. Hansen'><organization /></author>
<author initials='R.' surname='Smith' fullname='R. Smith'><organization /></author>
<date year='2013' month='July' />
<abstract><t>This document offers guidance for developing privacy considerations for inclusion in protocol specifications.  It aims to make designers, implementers, and users of Internet protocols aware of privacy-related design choices.  It suggests that whether any individual RFC warrants a specific privacy considerations section will depend on the document's content.</t></abstract>
</front>
<seriesInfo name='RFC' value='6973'/>
<seriesInfo name='DOI' value='10.17487/RFC6973'/>
</reference>



<reference  anchor='RFC7258' target='http://www.rfc-editor.org/info/rfc7258'>
<front>
<title>Pervasive Monitoring Is an Attack</title>
<author initials='S.' surname='Farrell' fullname='S. Farrell'><organization /></author>
<author initials='H.' surname='Tschofenig' fullname='H. Tschofenig'><organization /></author>
<date year='2014' month='May' />
<abstract><t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t></abstract>
</front>
<seriesInfo name='BCP' value='188'/>
<seriesInfo name='RFC' value='7258'/>
<seriesInfo name='DOI' value='10.17487/RFC7258'/>
</reference>



<reference anchor='I-D.ietf-anima-bootstrapping-keyinfra'>
<front>
<title>Bootstrapping Remote Secure Key Infrastructures (BRSKI)</title>

<author initials='M' surname='Pritikin' fullname='Max Pritikin'>
    <organization />
</author>

<author initials='M' surname='Richardson' fullname='Michael Richardson'>
    <organization />
</author>

<author initials='M' surname='Behringer' fullname='Michael Behringer'>
    <organization />
</author>

<author initials='S' surname='Bjarnason' fullname='Steinthor Bjarnason'>
    <organization />
</author>

<date month='June' day='30' year='2016' />

<abstract><t>This document specifies automated bootstrapping of a remote secure key infrastructure (BRSKI) using vendor installed IEEE 802.1AR manufacturing installed certificates, in combination with a vendor based service on the Internet.  Before being authenticated, a new device has only link-local connectivity, and does not require a routable address.  When a vendor provides an Internet based service devices can be redirected to a local service.  In limited/ disconnected networks or legacy environments we describe a variety of options that allow bootstrapping to proceed.  Support for lower security models, including devices with minimal identity, is described for legacy reasons but not encouraged.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-anima-bootstrapping-keyinfra-03' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-anima-bootstrapping-keyinfra-03.txt' />
</reference>



<reference  anchor='RFC7721' target='http://www.rfc-editor.org/info/rfc7721'>
<front>
<title>Security and Privacy Considerations for IPv6 Address Generation Mechanisms</title>
<author initials='A.' surname='Cooper' fullname='A. Cooper'><organization /></author>
<author initials='F.' surname='Gont' fullname='F. Gont'><organization /></author>
<author initials='D.' surname='Thaler' fullname='D. Thaler'><organization /></author>
<date year='2016' month='March' />
<abstract><t>This document discusses privacy and security considerations for several IPv6 address generation mechanisms, both standardized and non-standardized.  It evaluates how different mechanisms mitigate different threats and the trade-offs that implementors, developers, and users face in choosing different addresses or address generation mechanisms.</t></abstract>
</front>
<seriesInfo name='RFC' value='7721'/>
<seriesInfo name='DOI' value='10.17487/RFC7721'/>
</reference>



<reference  anchor='RFC6887' target='http://www.rfc-editor.org/info/rfc6887'>
<front>
<title>Port Control Protocol (PCP)</title>
<author initials='D.' surname='Wing' fullname='D. Wing' role='editor'><organization /></author>
<author initials='S.' surname='Cheshire' fullname='S. Cheshire'><organization /></author>
<author initials='M.' surname='Boucadair' fullname='M. Boucadair'><organization /></author>
<author initials='R.' surname='Penno' fullname='R. Penno'><organization /></author>
<author initials='P.' surname='Selkirk' fullname='P. Selkirk'><organization /></author>
<date year='2013' month='April' />
<abstract><t>The Port Control Protocol allows an IPv6 or IPv4 host to control how incoming IPv6 or IPv4 packets are translated and forwarded by a Network Address Translator (NAT) or simple firewall, and also allows a host to optimize its outgoing NAT keepalive messages.</t></abstract>
</front>
<seriesInfo name='RFC' value='6887'/>
<seriesInfo name='DOI' value='10.17487/RFC6887'/>
</reference>



<reference anchor='I-D.ietf-opsawg-mud'>
<front>
<title>Manufacturer Usage Description Specification</title>

<author initials='E' surname='Lear' fullname='Eliot Lear'>
    <organization />
</author>

<author initials='R' surname='Droms' fullname='Ralph Droms'>
    <organization />
</author>

<author initials='D' surname='Romascanu' fullname='Dan Romascanu'>
    <organization />
</author>

<date month='September' day='29' year='2016' />

<abstract><t>This memo specifies the necessary components to implement manufacturer usage descriptions (MUD).  This includes two YANG modules, IPv4 and IPv6 DHCP options, an LLDP TLV, a URL suffix specification, an X.509 certificate extension and a means to sign and verify the descriptions.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-opsawg-mud-01' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-opsawg-mud-01.txt' />
</reference>



<reference  anchor='RFC5216' target='http://www.rfc-editor.org/info/rfc5216'>
<front>
<title>The EAP-TLS Authentication Protocol</title>
<author initials='D.' surname='Simon' fullname='D. Simon'><organization /></author>
<author initials='B.' surname='Aboba' fullname='B. Aboba'><organization /></author>
<author initials='R.' surname='Hurst' fullname='R. Hurst'><organization /></author>
<date year='2008' month='March' />
<abstract><t>The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides support for multiple authentication methods.  Transport Layer Security (TLS) provides for mutual authentication, integrity-protected ciphersuite negotiation, and key exchange between two endpoints.  This document defines EAP-TLS, which includes support for certificate-based mutual authentication and key derivation.</t><t>This document obsoletes RFC 2716.  A summary of the changes between this document and RFC 2716 is available in Appendix A.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5216'/>
<seriesInfo name='DOI' value='10.17487/RFC5216'/>
</reference>


<reference anchor="QUIC" target="https://datatracker.ietf.org/wg/quic/charter/">
  <front>
    <title>QUIC Working Group Charter</title>
    <author >
      <organization></organization>
    </author>
    <date year="2016"/>
  </front>
</reference>
<reference anchor="EGEL12" target="http://www.econinfosec.org/archive/weis2012/papers/Egelman_WEIS2012.pdf">
  <front>
    <title>Choice Architecture and Smartphone Privacy: There’s A Price for That</title>
    <author initials="S." surname="Egelman" fullname="Serge Egelman">
      <organization>University of California, Berkeley</organization>
    </author>
    <author initials="A.P." surname="Felt" fullname="Adrienne Porter Felt">
      <organization>University of California, Berkeley</organization>
    </author>
    <author initials="D." surname="Wagner" fullname="David Wagner">
      <organization>University of California, Berkeley</organization>
    </author>
    <date year="2012"/>
  </front>
</reference>
<reference anchor="Krebs-MIRAI" target="https://krebsonsecurity.com/2016/10/source-code-for-iot-botnet-mirai-released/">
  <front>
    <title>Source Code for IoT Botnet ‘Mirai’ Released</title>
    <author >
      <organization></organization>
    </author>
    <date year="2016" month="October"/>
  </front>
</reference>


    </references>


<section anchor="mudexample" title="Example MUD File for a DVR">

<figure><artwork><![CDATA[
{
  "ietf-mud:meta-info": {
    "lastUpdate": "2016-10-23T14:11:52+02:00",
    "systeminfo": "DVR H.264",
    "cacheValidity": 1440
  },
  "ietf-acl:access-lists": {
    "ietf-acl:access-list": [
      {
        "acl-name": "mud-10387-v4in",
        "acl-type": "ipv4-acl",
        "ietf-mud:packet-direction": "to-device",
        "access-list-entries": {
          "ace": [
            {
              "rule-name": "clout0-in",
              "matches" : {
                 "ietf-mud:direction-initiated" : "from-device"
                 },
              "actions": {
                "permit": [
                  null
                ]
              }
            },
            {
              "rule-name": "entin0-in",
              "matches": {
                "ietf-mud:controller":
                 "http://dvr264.example.com/controller",
                 "ietf-mud:direction-initiated" : "to-device"
              },
              "actions": {
                "permit": [
                  null
                ]
              }
            }
          ]
        }
      },
      {
        "acl-name": "mud-10387-v4out",
        "acl-type": "ipv4-acl",
        "ietf-mud:packet-direction": "from-device",
        "access-list-entries": {
          "ace": [
            {
              "rule-name": "clout0-in",
              "matches": {
                 "ietf-mud:direction-initiated" : "from-device"
              },
              "actions": {
                "permit": [
                  null
                ]
              }
            },
            {
              "rule-name": "entin0-in",
              "matches": {
     "ietf-mud:controller":  "http://dvr264.example.com/controller",
                 "ietf-mud:direction-initiated" : "to-device"
              },
              "actions": {
                "permit": [
                  null
                ]
              }
            }
          ]
        }
      }
    ]
  }
}
]]></artwork></figure>

</section>


  </back>
</rfc>

