<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.21 -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-richardson-mud-qrcode-04" category="info" tocInclude="true" sortRefs="true" symRefs="true" obsoletes="" updates="" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.5.0 -->
  <front>
    <title abbrev="QR-MUD">On loading MUD URLs from QR codes</title>
    <seriesInfo name="Internet-Draft" value="draft-richardson-mud-qrcode-04"/>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <author initials="J." surname="Latour" fullname="Jacques Latour">
      <organization>CIRA Labs</organization>
      <address>
        <email>Jacques.Latour@cira.ca</email>
      </address>
    </author>
    <author initials="H." surname="Habibi Gharakheili" fullname="Hassan Habibi Gharakheili">
      <organization>UNSW Sydney</organization>
      <address>
        <email>h.habibi@unsw.edu.au</email>
      </address>
    </author>
    <date year="2022" month="February" day="11"/>
    <area>Internet</area>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This informational document details a protocol to load MUD definitions
for devices which have no integrated MUD (RFC8520) support.</t>
      <t>This document is published to inform the Internet community of this mechanism to allow
interoperability and to serve as a basis of other standards work if there is interest.</t>
      <t><cref anchor="track">RFC-EDITOR-please-remove: This work is tracked at https://github.com/mcr/mud-qrcode</cref></t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>The Manufacturer Usage Description (MUD) <xref target="RFC8520" format="default"/> defines a YANG data model to express what sort of access a device requires to operate correctly.
That document additionally defines three ways for the device to communicate the URL of the resulting JSON <xref target="RFC8259" format="default"/> format file to a network enforcement point: DHCP, within an X.509 certificate extension, and via LLDP.</t>
      <t>Each of the above mechanism conveys the MUD URL in-band, and requires modifications to the device firmware.
Most small IoT devices do not have LLDP, and often have very restricted DHCP clients.
Adding the LLDP or DHCP options requires at least some minimal configuration change, and possibly entire new subsystems.
Meanwhile, use of the PKIX certification extension only makes sense as part of a larger IDevID based <xref target="ieee802-1AR" format="default"/> deployment such as <xref target="I-D.ietf-anima-bootstrapping-keyinfra" format="default"/>.</t>
      <t>In the above cases these mechanisms can only be implemented by persons with access to modify and update the firmware of the device.</t>
      <t>In the meantime there is a chicken or egg problem (<xref target="chickenegg" format="default"/>): no manufacturers include MUD URLs in their products as there are no gateways that use them.
No gateways include code that processes MUD URLs as no products produce them.</t>
      <t>The protocol described here allows any person with physical access to the device to affix a reference to a MUD URL that can later be scanned by an end user.</t>
      <t>Such an action can be done by</t>
      <ul spacing="normal">
        <li>the marketing department of the Manufacturer,</li>
        <li>an outsourced assembler plant,</li>
        <li>value added resellers (perhaps in response to a local RFP),</li>
        <li>a company importing the product (possibly to comply with a local regulation),</li>
        <li>a network administrator (perhaps before sending devices home with employees, or to remote sites),</li>
        <li>a retailer as a value added service.</li>
      </ul>
      <t>QRcodes are informally described in <xref target="qrcode" format="default"/> and formally defined in <xref target="isoiec18004" format="default"/>.
The protocol described in this document uses a QRcode to encode the MUD URL.  Specifically, the protocol leverages the data format from the Reverse Logistics Association's Standardized Quick Response for Logistics <xref target="SQRL" format="default"/>.</t>
      <t>SQRL codes are being put on devices via sticker or via laser etching into the case in order to deal with many situations, but specifically for end-of-life processing for the device.
An important idea behind the effort is that clearly identifying a product permits appropriate disposal, refurbishment or recycling of the components of the product.</t>
      <t>There are also use cases for SQRL described in which the codes are used as part of regular maintenance for a product.</t>
      <t>SQRL is an application of the 12N Data Identifier system specified by the ANSI MH10.8.2 Committee <xref target="mh10" format="default"/> in a format appropriate for QRcodes as well as other things like NFCs transmissions.</t>
      <t>QRcode generators are available as web services <xref target="qrcodewebservice" format="default"/>,
or as programs such as <xref target="qrencode" format="default"/>.</t>
      <t><xref target="genericfirmware" format="default"/> summarizes the considerations contained in <xref target="I-D.ietf-opsawg-mud-acceptable-urls" format="default"/> section 6.1 ("Updating MUD URLs vs Updating MUD files").
Due to the immutable nature of the QRcode, MUD URLs in this document will need to
non-firmware specific.</t>
    </section>
    <section anchor="Terminology" numbered="true" toc="default">
      <name>Terminology</name>
      <t>Although this document is not an IETF Standards Track publication, it
adopts the conventions for normative language to provide clarity of
instructions to the implementer.
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP&nbsp;14 <xref target="RFC2119" format="default"/> <xref target="RFC8174" format="default"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="protocol" numbered="true" toc="default">
      <name>Protocol</name>
      <t>This QRcode protocol builds upon the work by <xref target="SQRL" format="default"/>.
That protocol is very briefly described in the next section.
Then the list of needed Data Records to be filled in is explained.</t>
      <section anchor="the-sqrl-protocol" numbered="true" toc="default">
        <name>The SQRL Protocol</name>
        <t><xref target="SQRL" format="default"/> documents an octet protocol that can be efficiently encoded into QRcodes using a sequence of ASCII bytes, plus six control codes (see section 3.1 of <xref target="SQRL" format="default"/>):</t>
        <ul spacing="normal">
          <li>&lt;RS&gt; Record Separator (ASCII 30)</li>
          <li>&lt;EoT&gt; End of Transmission (ASCII 4)</li>
          <li>&lt;FS&gt; Field Separator (ASCII 28)</li>
          <li>&lt;GS&gt; Group Separator (ASCII 29)</li>
          <li>&lt;US&gt; Unit Separator (ASCII 31),</li>
          <li>Concatenation Operator (ASCII 43: "+").</li>
        </ul>
        <t>Section 7.2 of <xref target="SQRL" format="default"/> gives the details, which can be summarized as:</t>
        <ol spacing="normal" type="1"><li>The QR code header starts with:</li>
        </ol>
        <artwork name="" type="" align="left" alt=""><![CDATA[
"[)>" <RS> "06" <GS> "12N"
]]></artwork>
        <ol spacing="normal" type="1"><li>Include one or more Data Records. This consists of a four letter Field Identifiers followed by ASCII characters terminated with a &lt;Unit Separator&gt;.</li>
          <li>End with:</li>
        </ol>
        <artwork name="" type="" align="left" alt=""><![CDATA[
<RS><EoT>
]]></artwork>
        <t>There are additionally optional flags that may be present in every Data Record as described in section 7.4 of <xref target="SQRL" format="default"/>.
These flags have no bearing on MUD processing.
A parser which is only collecting MUD URLs will not need to parse those flags.
A general purpose SQRL parser will need more complexity.</t>
        <t>Field Seperator characters are used in SQRL to signify the beginning of a new unit of data.
A MUD specific parser that encounters a Field Seperator and has not yet collected the right MUD information MUST ignore the characters collected so far and then restart.</t>
        <t>Environment records, as described in <xref target="SQRL" format="default"/> section 7.4, look and act exactly as fields, with a special Field Identifier.
They serve no purpose when looking for MUD information, and MAY be ignored.</t>
      </section>
      <section anchor="manufacturer-usage-descriptions-in-sqrl" numbered="true" toc="default">
        <name>Manufacturer Usage Descriptions in SQRL</name>
        <section anchor="b000-company-name" numbered="true" toc="default">
          <name>B000 Company Name</name>
          <t>The B000 Data Record is mandatory in <xref target="SQRL" format="default"/>.
It MUST be in ASCII representation.
It should be a representation of the company or brand name.
It SHOULD match the ietf-mud/mud/mfg-name in the MUD file, however the MUD file can contain arbitrary UTF8 for this name, while the SQRL files are expected to be 7-bit US-ASCII.</t>
        </section>
        <section anchor="b001-product-name" numbered="true" toc="default">
          <name>B001 Product Name</name>
          <t>The B001 Data Record is optional in <xref target="SQRL" format="default"/>.
It's presence is RECOMMENDED.
Some third parties that create QRcode stickers might not know the product name with 100% certainty, and MAY prefer to omit this rather than create further confusion.
It is the Product Name in ASCII.</t>
        </section>
        <section anchor="b002-model-number" numbered="true" toc="default">
          <name>B002 Model Number</name>
          <t>The B002 Data Record is optional in <xref target="SQRL" format="default"/>, but is MANDATORY in this profile.
It is the Model Name in ASCII.
It SHOULD match the optional ietf-mud/mud/model-name in the MUD file if that entry is present in the MUD file.</t>
          <t>If a third party that is creating QRcodes can not locate an official model number when creating their MUD file and QRcode, then the third party SHOULD make one up.</t>
        </section>
        <section anchor="mud-url-data-record" numbered="true" toc="default">
          <name>MUD URL Data Record</name>
          <t>A new Field Identifier has been assigned by the Reverse Logistics Association (RLA), which is "M180"
This record MUST be filled with the MUD URL.</t>
          <t>Short URLs are easier to encode into QRcode because they require fewer pixels of
QRcode.
More content in the QRcode requires a bigger image.</t>
          <t>Use of URL shortening services (see <xref target="URLshorten" format="default"/>) can be useful provided that the service is stable throughout the lifetime of the device and QRcode, and that the privacy stance of the service is well understood.</t>
          <t>Section 8.1 of <xref target="SQRL" format="default"/> also has some good advice on longevity concerns with URLs.</t>
          <t>The URL provided MUST NOT have a query (?) portion present.
If one is present, the query portion MUST be removed before processing.</t>
        </section>
        <section anchor="macaddress" numbered="true" toc="default">
          <name>MUD Device MAC Address</name>
          <t>In order for the MUD controller to associate the above policy with a specific device,
some unique identifier must be provided to the MUD controller.
The most actionable identifier is the Ethernet MAC address.
<xref target="SQRL" format="default"/> section 9.10 defines the Data Record: "M06C" as the MAC address.
No format for the MAC address is provided in that document.</t>
          <t>This document RECOMMENDS 12 (or 16) hex octets are used with no spaces or punctuation.
(16 octets are used in the IEEE OUI-64 format used in 802.15.4, and some next generation Ethernet proposals)</t>
          <t>Parsers that find punctuation (such as colons (":"), dashes ("-"), or white space) MUST
skip over it.</t>
        </section>
      </section>
    </section>
    <section anchor="genericfirmware" numbered="true" toc="default">
      <name>Generic URL or Version Specific URL</name>
      <t>MUD URLs which are communicated in-band by the device, and which are programmed into the device's firmware may provide a firmware specific version of the MUD URL.
This has the advantage that the resulting Access Control Lists (ACLs) implemented are specific to the needs of that version of the firmware.</t>
      <t>A MUD URL which is affixed to the device with a sticker, or etched into the case can not be changed.</t>
      <t>Given the considerations of <xref target="I-D.ietf-opsawg-mud-acceptable-urls" format="default"/> section 6.1 ("Updating MUD URLs vs Updating MUD files"), it is prudent to use a MUD URL which points to a MUD file which will only have new features added over time, and never have features removed.</t>
      <t>When the firmware eventually receives built-in MUD URL support, then a more specific URL may be used.</t>
      <t>Note that in many cases it will be third parties who are generating these QRcodes, so the MUD file may be hosted by the third party.</t>
    </section>
    <section anchor="crowd-supply-of-mud-files" numbered="true" toc="default">
      <name>Crowd Supply of MUD Files</name>
      <t>At the time of writing, the IETF MUD is a new IETF Proposed Standard.
Hence, IoT device manufacturers have not yet provided MUD profiles for their devices.
A research group at the University of New South Wales (UNSW Sydney) has developed an open-source tool, called MUDgee (<xref target="MUDgee" format="default"/>), which automatically generates a MUD file (profile) for an IoT device from its traffic trace in order to make this process faster, easier, and more accurate.
Note that the generated profile completeness solely depends on the completeness of the input traffic traces.
MUDgee assumes that all the activity seen is intended and benign.</t>
      <t>UNSW researchers have applied MUDgee about 30 consumer IoT devices from their lab testbed, and publicly released their MUD files (<xref target="MUDfiles" format="default"/>).
MUDgee can assist IoT manufacturers in developing and verifying MUD profiles, while also  helping adopters of these devices to ensure they are compatible with their organisational policies.</t>
      <t>Similar processes have been done in a number of other public and private labs.
One of the strong motivations for this specification is to allow for this work to leave the lab, to be applied in the field.</t>
    </section>
    <section anchor="privacy-considerations" numbered="true" toc="default">
      <name>Privacy Considerations</name>
      <t>The presence of the MUD URL in the QR code reveals the manufacturer of the device, the type or model of the device, and possibly the firmware version of the device.</t>
      <t>The MAC address of the device will also need to be present, and this is potentially Personally Identifiable Information (PII).
Such QRcodes should not be placed on the outside of the packaging, and only on the device itself, ideally on a non-prominent part of the device. (e.g., the bottom).</t>
      <t>The QR code sticker should not placed on any part of the device that might become visible to machine vision systems in the same area.
This includes security systems, robotic vacuum cleaners, anyone taking a picture with a camera.
Such systems may store the picture(s) in such a way that a future viewer of the image will be able to decode the QR code, possibly through assembly of multiple pictures.
Of course, the QR code is not, however, a certain indicator that the device is present, only that the QR code sticker that came with the device is present.</t>
    </section>
    <section anchor="security-considerations" numbered="true" toc="default">
      <name>Security Considerations</name>
      <section anchor="qr-codes-are-not-assurances" numbered="true" toc="default">
        <name>QR codes are not assurances</name>
        <t>The mere presence of at QRcode on a device does not in itself create any security issues on its own.
Neither an attached paper sticker or a laser etched code in a plastic case will not affect the device operation.
The QRcode is not active, it is not in general able to communicate on nearby networks.
It is conceivable that something more active is concealed in the sticker: an NFC or RFID tag for instance.
But, any sticker could contain such a thing: on some university campuses stickers are often used as part of political campaigns, and can be found attached all over the place.</t>
        <t>Security issues that this protocol create are related to assumptions that the presence of the QRcode might imply.
The presence of the QRcode may imply to some owners or network operators that the behaviour of the device has been vetted by some authority.
It is here that some caution is required.</t>
        <t>A possibly bigger risk from application of MUD file stickers to devices is that they may begin to convey a sense of safety to users of the device.
The presence of the sticker, possibly with the logo of the physical establishment in which the device is located could convey to occupants of the establishment that this device is an official device.
For instance, a university which only deploys sensors on the university campus that have been vetted for compliance against a MUD definition.</t>
        <t>The risk is then of social engineering: any device with a reasonable looking QRcode may become a trusted device.
An attacker that wishes to infiltrate their own devices need only suitably camoflage the device with an appropriate sticker in order to convey legitimacy.</t>
      </section>
      <section anchor="mud-files-can-have-signatures" numbered="true" toc="default">
        <name>MUD files can have signatures</name>
        <t>The network operator who takes the MUD file designated by the QRcode needs to be careful that they are validating the signature on the MUD file.
Not only that the file is intact, but that the signer of the file is authorized to sign MUD files for that vendor, or that the network operator has some trust if the MUD file is a crowd sourced definition.
At the time of writing, <xref target="RFC8520" format="default"/> does not define any infrastructure to authenticate or authorize MUD file signers.</t>
      </section>
      <section anchor="mud-qr-code-stickers-could-be-confused" numbered="true" toc="default">
        <name>MUD QR code stickers could be confused</name>
        <t>Another issue with the stickers is that the wrong sticker could be applied to a device by a reseller or other trusted party, either in error, or via some physical or socially engineered attack against that party.
The network operator now onboards a device, and applies what they think is a legitimate network policy for the device in their hands, only it is in fact a policy for another kind of device.</t>
      </section>
      <section anchor="qr-code-can-include-mac-address" numbered="true" toc="default">
        <name>QR code can include MAC address</name>
        <t>Inclusion of the device specific MAC address (described in <xref target="macaddress" format="default"/>) in the QRcode makes use of the MUD code much easier as it identifies the device specifically.
If the MAC addresss is not included, then a network operator, having the device in their hands, then has to associate the policy with the device through some other interface.</t>
        <t>Despite the significant advantage of having the MAC address include, it is unlikely that third party stickers will include that.
Including the MAC address requires that the QRcode for that device requires that a unique sticker be created for each device.
This is possible if the sticker is applied by a manufacturer: it is already common to have a serial number and MAC address on the outside of the device.
In that case, if the QRcode is part of that sticker, then the customization problem is not that complex.</t>
        <t>For cases where a third party has produced the QRcode, it is likely that every device of a particular model will have the same QRcode applied, omitting the MAC address.
This makes it more likely that a policy will be applied to the wrong device.</t>
      </section>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>This document makes no request for IANA actions.</t>
    </section>
    <section anchor="acknowledgements" numbered="true" toc="default">
      <name>Acknowledgements</name>
      <t>This work was supported by the Canadian Internet Registration Authority (cira.ca).</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8520" target="https://www.rfc-editor.org/info/rfc8520">
          <front>
            <title>Manufacturer Usage Description Specification</title>
            <author fullname="E. Lear" initials="E." surname="Lear">
              <organization/>
            </author>
            <author fullname="R. Droms" initials="R." surname="Droms">
              <organization/>
            </author>
            <author fullname="D. Romascanu" initials="D." surname="Romascanu">
              <organization/>
            </author>
            <date month="March" year="2019"/>
            <abstract>
              <t>This memo specifies a component-based architecture for Manufacturer Usage Descriptions (MUDs).  The goal of MUD is to provide a means for end devices to signal to the network what sort of access and network functionality they require to properly function.  The initial focus is on access control.  Later work can delve into other aspects.</t>
              <t>This memo specifies two YANG modules, IPv4 and IPv6 DHCP options, a Link Layer Discovery Protocol (LLDP) TLV, a URL, an X.509 certificate extension, and a means to sign and verify the descriptions.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8520"/>
          <seriesInfo name="DOI" value="10.17487/RFC8520"/>
        </reference>
        <reference anchor="SQRL" target="https://rla.org/resource/12n-documentation">
          <front>
            <title>SQRL Codes: Standardized Quick Response for Logistics, Using the 12N Data Identifier</title>
            <author>
              <organization>Reverse Logistics Association</organization>
            </author>
            <date year="2017" month="February"/>
          </front>
        </reference>
        <reference anchor="qrcode" target="https://en.wikipedia.org/wiki/QR_code">
          <front>
            <title>QR Code</title>
            <author>
              <organization>Wikipedia</organization>
            </author>
            <date year="2019" month="December"/>
          </front>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC8259" target="https://www.rfc-editor.org/info/rfc8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray">
              <organization/>
            </author>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format.  It was derived from the ECMAScript Programming Language Standard.  JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="I-D.ietf-anima-bootstrapping-keyinfra" target="https://www.ietf.org/archive/id/draft-ietf-anima-bootstrapping-keyinfra-45.txt">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="Max Pritikin">
              <organization>Cisco</organization>
            </author>
            <author fullname="Michael C. Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Toerless Eckert">
              <organization>Futurewei Technologies Inc.  USA</organization>
            </author>
            <author fullname="Michael H. Behringer">
	 </author>
            <author fullname="Kent Watsen">
              <organization>Watsen Networks</organization>
            </author>
            <date day="11" month="November" year="2020"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane.  To do this, a Secure Key Infrastructure is bootstrapped.  This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline.  We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol.  Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks.  Support for deployment models with less stringent security requirements is included.  Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device.  The established secure connection can be used to deploy a locally issued certificate to the device as well.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-bootstrapping-keyinfra-45"/>
        </reference>
        <reference anchor="I-D.ietf-opsawg-mud-acceptable-urls" target="https://www.ietf.org/archive/id/draft-ietf-opsawg-mud-acceptable-urls-04.txt">
          <front>
            <title>Authorized update to MUD URLs</title>
            <author fullname="Michael Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Wei Pan">
              <organization>Huawei Technologies</organization>
            </author>
            <author fullname="Eliot Lear">
              <organization>Cisco Systems</organization>
            </author>
            <date day="6" month="October" year="2021"/>
            <abstract>
              <t>   This document provides a way for an RFC8520 Manufacturer Usage
   Description (MUD) definitions to declare what are acceptable
   replacement MUD URLs for a device.

   RFCEDITOR-please-remove: this document is being worked on at:
   https://github.com/mcr/iot-mud-acceptable-urls

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-mud-acceptable-urls-04"/>
        </reference>
        <reference anchor="ieee802-1AR" target="http://standards.ieee.org/findstds/standard/802.1AR-2009.html">
          <front>
            <title>IEEE 802.1AR Secure Device Identifier</title>
            <author>
              <organization>IEEE Standard</organization>
            </author>
            <date year="2009"/>
          </front>
        </reference>
        <reference anchor="chickenegg" target="https://en.wikipedia.org/wiki/Chicken_or_the_egg">
          <front>
            <title>Chicken or the egg</title>
            <author>
              <organization>Wikipedia</organization>
            </author>
            <date year="2019" month="December"/>
          </front>
        </reference>
        <reference anchor="qrcodewebservice" target="https://duckduckgo.com/?q=QR+code+web+generator">
          <front>
            <title>QR Code Generators</title>
            <author>
              <organization>Internet</organization>
            </author>
            <date year="2019" month="December"/>
          </front>
        </reference>
        <reference anchor="qrencode" target="https://fukuchi.org/works/qrencode/index.html.en">
          <front>
            <title>QR encode</title>
            <author initials="K." surname="Fukuchi">
              <organization/>
            </author>
            <date year="2019" month="December"/>
          </front>
        </reference>
        <reference anchor="mh10" target="https://webstore.ansi.org/Standards/MHIA/ANSIMH102016">
          <front>
            <title>ANSI MH10.8.2 Committee</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="May"/>
          </front>
        </reference>
        <reference anchor="MUDgee" target="https://github.com/ayyoob/mudgee">
          <front>
            <title>MUDgee</title>
            <author initials="A." surname="Hamza">
              <organization/>
            </author>
            <date year="2019" month="July"/>
          </front>
        </reference>
        <reference anchor="MUDfiles" target="https://iotanalytics.unsw.edu.au/mud/">
          <front>
            <title>MUD Profiles</title>
            <author initials="." surname="UNSW Sydney">
              <organization/>
            </author>
            <date year="2019" month="July"/>
          </front>
        </reference>
        <reference anchor="isoiec18004">
          <front>
            <title>Information technology - Automatic identification and data capture techniques - QR Code bar code symbology specification (ISO/IEC 18004)</title>
            <author>
              <organization>ISO/IEC</organization>
            </author>
            <date year="2015" month="February"/>
          </front>
        </reference>
        <reference anchor="URLshorten" target="https://en.wikipedia.org/wiki/URL_shortening">
          <front>
            <title>URL shortening</title>
            <author>
              <organization>Wikipedia</organization>
            </author>
            <date year="2021" month="May"/>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
