<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.8 -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-richardson-opsawg-securehomegateway-mud-04" category="info" obsoletes="" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 2.46.0 -->
  <front>
    <title abbrev="SHG-MUD">On loading MUD URLs from QR codes</title>
    <seriesInfo name="Internet-Draft" value="draft-richardson-opsawg-securehomegateway-mud-04"/>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <author initials="J." surname="Latour" fullname="Jacques Latour">
      <organization>CIRA Labs</organization>
      <address>
        <email>Jacques.Latour@cira.ca</email>
      </address>
    </author>
    <author initials="H." surname="Habibi Gharakheili" fullname="Hassan Habibi Gharakheili">
      <organization>UNSW Sydney</organization>
      <address>
        <email>h.habibi@unsw.edu.au</email>
      </address>
    </author>
    <date year="2020" month="September" day="08"/>
    <area>Internet</area>
    <workgroup>OPS Area Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This informational document details the mechanism used by the CIRA Secure
Home Gateway (SHG) to load MUD definitions for devices which have no
integrated MUD (RFC8520) support.</t>
      <t>The document describes extensions to the WiFi Alliance DPP QR code to support
the use of MUD URLs.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>The Manufacturer Usage Description (MUD) <xref target="RFC8520" format="default"/> defines a YANG data model to express what sort of access a device requires to operate correctly.
The document additionally defines three ways for the device to communicate the URL of the resulting JSON <xref target="RFC8259" format="default"/> format file to a network enforcement point: DHCP, within an X.509 certificate extension, and via LLDP.</t>
      <t>Each of the above mechanism conveys the MUD URL inband, and requires modifications to the device firmware.
Most small IoT devices do not have LLDP, and often have very restricted DHCP clients.
Adding the LLDP or DHCP options requires at least some minimal configuration change, and possibly entire new subsystems.
Meanwhile, use of the PKIX certificateion extension only makes sense as part of a larger IDevID based <xref target="ieee802-1AR" format="default"/> deployment such as <xref target="I-D.ietf-anima-bootstrapping-keyinfra" format="default"/>.</t>
      <t>In the above cases these mechanisms can only be implemented by persons with access to modify and update the firmware of the device.
The MUD system was designed to be implemented by Manufacturers afterall!</t>
      <t>In the meantime there is a chicken or egg problem (<xref target="chickenegg" format="default"/>): no manufacturers include MUD URLs in their products as there are no gateways that use them.
No gateways include code that processes MUD URLs as no products produce them.</t>
      <t>The mechanism described here allows any person with physical access to the device to affix a reference to a MUD URL that can later be scanned by an end user.</t>
      <t>Such an action can be done by
* the marketing department of the Manufacturer,
* an outsourced assembler plant,
* value added resellers (perhaps in response to a local RFP),
* a company importing the product (possibly to comply with a local regulation),
* a network administrator (perhaps before sending devices home with employees, or to remote sites),
* a retailer as a value added service.</t>
      <t>The mechanism described herein uses a QRcode, which is informally described in <xref target="qrcode" format="default"/>, but specifically leverages
the data format from Reverse Logistics Association's <xref target="SQRL" format="default"/> system.
This is an application of the 12N Data Identifier system specified by the ANSI MH10.8.2 Committee in a format appropriate for QRcodes as well as other things like NFCs transmissions.</t>
      <t>QR code generators are available as web services (<xref target="qrcodewebservice" format="default"/>), or as programs such
as <xref target="qrencode" format="default"/>.  They are formally defined in <xref target="isoiec18004" format="default"/>.</t>
      <t>Section {#genericfirmware} summarizes the recommendations <xref target="I-D.richardson-opsawg-mud-acceptable-urls" format="default"/> section 2 ("Updating MUD URLs vs Updating MUD files").
The question as to whether the MUD file should be specific to a specific version of the device firmware is considered in the context of affixed external labels.</t>
      <t>A third issue is that an intermediary (ISP, or third-party security
service) may want to extend or amend a MUD file received from a manufacturer.
In order to maintain an audit trail of changes, a way to encode the previous
MUD URL and signature file (and status) is provided. (FOR DISCUSSION)</t>
    </section>
    <section anchor="Terminology" numbered="true" toc="default">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP&nbsp;14 <xref target="RFC2119" format="default"/> <xref target="RFC8174" format="default"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="protocol" numbered="true" toc="default">
      <name>Protocol</name>
      <t>This QRcode protocol builds upon the work by <xref target="SQRL" format="default"/>.
That protocol is very briefly described in the next section.
Then the list of needed Data Records to be filled in is explained.</t>
      <section anchor="the-sqrl-protocol" numbered="true" toc="default">
        <name>The SQRL protocol</name>
        <t><xref target="SQRL" format="default"/> documents an octet protocol that can be efficiently encoded into QRcodes using a sequence of ASCII bytes, plus five control codes (see section 3.1 of <xref target="SQRL" format="default"/>):
* &lt;RS&gt; Record Separator (ASCII 30)
* &lt;EoT&gt; End of Transmission (ASCII 4)
* &lt;FS&gt; Field Seperator (ASCII 28)
* &lt;GS&gt; Group Seperator (ASCII 29)
* &lt;US&gt; Unit Seperator (ASCII 31),
* Concatenation Operator (ASCII 43: "+").</t>
        <t>Section 7.2 of <xref target="SQRL" format="default"/> gives the details, which can be summarized as:</t>
        <ol spacing="normal" type="1">
          <li>The QR code header starts with:</li>
        </ol>
        <artwork name="" type="" align="left" alt=""><![CDATA[
"[)>" &lt;RS> "06" &lt;GS> "12N"
]]></artwork>
        <ol spacing="normal" type="1">
          <li>Include one or more Data Records. This consists of a four letter Field Identifiers followed by ASCII characters terminated with a &lt;Unit Separator&gt;.</li>
          <li>End with:</li>
        </ol>
        <artwork name="" type="" align="left" alt=""><![CDATA[
&lt;RS>&lt;EoT>
]]></artwork>
        <t>There are, additionally optional flags that may be present in every Data Record as described in section 7.4.
As there is little use for this in the context of MUD URLs, they can likely be ignored by parsers that are not parsing any of the rest of the information.
A parser that sees a Field Separator in the stream SHOULD ignore the characters collected so far and then continue parsing to get the user data.</t>
        <t>Environment records, as described in section 7.4, look and act exactly as fields, with a special Field Identifier. They serve no purpose when looking for MUD information, and MAY be ignored.</t>
      </section>
      <section anchor="manufacturer-usage-descriptions-in-sqrl" numbered="true" toc="default">
        <name>Manufacturer Usage Descriptions in SQRL</name>
        <section anchor="b000-company-name" numbered="true" toc="default">
          <name>B000 Company Name</name>
          <t>The B000 Data Record is mandatory in <xref target="SQRL" format="default"/>.
It should be an ASCII reprensentation of the company or brand name.
It should match the ietf-mud/mud/mfg-name in the MUD file.</t>
        </section>
        <section anchor="b001-product-name" numbered="true" toc="default">
          <name>B001 Product Name</name>
          <t>The B001 Data Record is optional. It is the Product Name in ASCII.
It's presence is strongly RECOMMENDED.</t>
        </section>
        <section anchor="b002-model-number" numbered="true" toc="default">
          <name>B002 Model Number</name>
          <t>The B002 Data Record is optional in <xref target="SQRL" format="default"/>, but is MANDATORY in this profile.
It is the Model Name in ASCII.
It should match the ietf-mud/mud/model-name in the MUD file, if it is present.</t>
        </section>
        <section anchor="mud-url-data-record" numbered="true" toc="default">
          <name>MUD URL Data Record</name>
          <t>A new Field Identifier has been request from the RLA, which is "UXXX" (probably "U087")
This record should be filled with the MUD URL.
Shorter is better.
Section 8.1 of <xref target="SQRL" format="default"/> has some good advice on longevity concerns with URLs.</t>
          <t>The URL provided MUST NOT have a query (?) portion present.</t>
        </section>
        <section anchor="mud-device-mac-address" numbered="true" toc="default">
          <name>MUD device MAC address</name>
          <t>In order for the MUD controller to associate the above policy with a specific device, then some unique identifier must be provided to the MUD controller.
The most actionable identifier is the ethernet MAC address.
<xref target="SQRL" format="default"/> section 9.10 defines the Data Record: "M06C" as the MAC address.
No format for the MAC address is provided in the document.</t>
          <t>The recommended format in order to conserve space is 12 or 16 hex octects.
(16 octets for the newer IEEE OUI-64 format used in 802.15.4, and some next generation ethernet proposals)</t>
          <t>The parser SHOULD be tolerant of extra characters: colons (":"), dashes ("-"), and whitespace.</t>
        </section>
      </section>
    </section>
    <section anchor="genericfirmware" numbered="true" toc="default">
      <name>Generic URL or Version Specific URL</name>
      <t>MUD URLs which are communicated inband by the device, and which are programmed into the device's firmware may provide a firmware specific version of the MUD URL.
This has the advantage that the resulting ACLs implemented are specific to the needs of that version of the firmware.</t>
      <t>A MUD URL which is afixed to the device with a sticker, or etched into the case can not be changed.</t>
      <t>Given the considerations of <xref target="I-D.richardson-opsawg-mud-acceptable-urls" format="default"/> section 2.1 ("Updating the MUD file in place"), it is prudent to use a MUD URL which points to a MUD file which will only have new features added over time, and never removed.</t>
      <t>When the firmware eventually receives built-in MUD URL support, then a more specific URL may be used.</t>
      <t>Note that in many cases it will be third parties who are generating these QRcodes, so the MUD file may be hosted by the third party.</t>
    </section>
    <section anchor="privacy-considerations" numbered="true" toc="default">
      <name>Privacy Considerations</name>
      <t>The presence of the MUD URL in the QR code reveals the manufacturer of the device, the type or model of the device, and possibly the firmware version of the device.</t>
      <t>The MAC address of the device will also need to be present, and this is potentially Personally Identifiable Information (PII).
Such QRcodes should not be placed on the outside of the packaging, and only on the device itself, ideally on a non-prominent part of the device. (e.g., the bottom).</t>
      <t>The QR code sticker should not placed on any part of the device that might become visible to machine vision systems in the same area.
This includes security systems, robotic vacuum cleaners, anyone taking a picture with a camera.
Such systems may store the picture(s) in such a way that a future viewer of the image will be able to decode the QR code, possibly through assembly of multiple pictures.
Of course, the QR code is not, however, a certain indicator that the device is present, only that the QR code sticker that came with the device is present.</t>
    </section>
    <section anchor="security-considerations" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>To Be Determined.</t>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>This document makes no IANA actions.</t>
    </section>
    <section anchor="acknowledgements" numbered="true" toc="default">
      <name>Acknowledgements</name>
      <t>This work was supported by the Canadian Internet Registration Authority (cira.ca).</t>
    </section>
    <section anchor="history" numbered="true" toc="default">
      <name>History</name>
      <t>Previous versions of this work leveraged the QRcode format from the WiFi Alliance DPP specification.
This document no longer uses that.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <seriesInfo name="DOI" value="10.17487/RFC2119"/>
            <seriesInfo name="RFC" value="2119"/>
            <seriesInfo name="BCP" value="14"/>
            <author initials="S." surname="Bradner" fullname="S. Bradner">
              <organization/>
            </author>
            <date year="1997" month="March"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="RFC8520" target="https://www.rfc-editor.org/info/rfc8520">
          <front>
            <title>Manufacturer Usage Description Specification</title>
            <seriesInfo name="DOI" value="10.17487/RFC8520"/>
            <seriesInfo name="RFC" value="8520"/>
            <author initials="E." surname="Lear" fullname="E. Lear">
              <organization/>
            </author>
            <author initials="R." surname="Droms" fullname="R. Droms">
              <organization/>
            </author>
            <author initials="D." surname="Romascanu" fullname="D. Romascanu">
              <organization/>
            </author>
            <date year="2019" month="March"/>
            <abstract>
              <t>This memo specifies a component-based architecture for Manufacturer Usage Descriptions (MUDs).  The goal of MUD is to provide a means for end devices to signal to the network what sort of access and network functionality they require to properly function.  The initial focus is on access control.  Later work can delve into other aspects.</t>
              <t>This memo specifies two YANG modules, IPv4 and IPv6 DHCP options, a Link Layer Discovery Protocol (LLDP) TLV, a URL, an X.509 certificate extension, and a means to sign and verify the descriptions.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="SQRL" target="https://rla.org/resource/12n-documentation">
          <front>
            <title>SQRL Codes: Standardized Quick Response for Logistics, Using the 12N Data Identifier</title>
            <author>
              <organization>Reverse Logistics Association</organization>
            </author>
            <date year="2017" month="February"/>
          </front>
        </reference>
        <reference anchor="qrcode" target="https://en.wikipedia.org/wiki/QR_code">
          <front>
            <title>QR Code</title>
            <author>
              <organization>Wikipedia</organization>
            </author>
            <date year="2019" month="December"/>
          </front>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <seriesInfo name="DOI" value="10.17487/RFC8174"/>
            <seriesInfo name="RFC" value="8174"/>
            <seriesInfo name="BCP" value="14"/>
            <author initials="B." surname="Leiba" fullname="B. Leiba">
              <organization/>
            </author>
            <date year="2017" month="May"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC8259" target="https://www.rfc-editor.org/info/rfc8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <seriesInfo name="DOI" value="10.17487/RFC8259"/>
            <seriesInfo name="RFC" value="8259"/>
            <seriesInfo name="STD" value="90"/>
            <author initials="T." surname="Bray" fullname="T. Bray" role="editor">
              <organization/>
            </author>
            <date year="2017" month="December"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format.  It was derived from the ECMAScript Programming Language Standard.  JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.ietf-anima-bootstrapping-keyinfra" target="http://www.ietf.org/internet-drafts/draft-ietf-anima-bootstrapping-keyinfra-43.txt">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructures (BRSKI)</title>
            <seriesInfo name="Internet-Draft" value="draft-ietf-anima-bootstrapping-keyinfra-43"/>
            <author initials="M" surname="Pritikin" fullname="Max Pritikin">
              <organization/>
            </author>
            <author initials="M" surname="Richardson" fullname="Michael Richardson">
              <organization/>
            </author>
            <author initials="T" surname="Eckert" fullname="Toerless Eckert">
              <organization/>
            </author>
            <author initials="M" surname="Behringer" fullname="Michael Behringer">
              <organization/>
            </author>
            <author initials="K" surname="Watsen" fullname="Kent Watsen">
              <organization/>
            </author>
            <date month="August" day="7" year="2020"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane.  To do this a Secure Key Infrastructure is bootstrapped.  This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline.  We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur using a routable address and a cloud service, or using only link-local connectivity, or on limited/ disconnected networks.  Support for deployment models with less stringent security requirements is included.  Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device.  The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="I-D.richardson-opsawg-mud-acceptable-urls" target="http://www.ietf.org/internet-drafts/draft-richardson-opsawg-mud-acceptable-urls-01.txt">
          <front>
            <title>Authorized update to MUD URLs</title>
            <seriesInfo name="Internet-Draft" value="draft-richardson-opsawg-mud-acceptable-urls-01"/>
            <author initials="M" surname="Richardson" fullname="Michael Richardson">
              <organization/>
            </author>
            <author initials="W" surname="Pan" fullname="Wei Pan">
              <organization/>
            </author>
            <author initials="E" surname="Lear" fullname="Eliot Lear">
              <organization/>
            </author>
            <date month="June" day="16" year="2020"/>
            <abstract>
              <t>This document provides a way for an RFC8520 Manufacturer Usage Description (MUD) definitions to declare what are acceptable replacement URLs for a device.</t>
            </abstract>
          </front>
        </reference>
        <reference anchor="ieee802-1AR" target="http://standards.ieee.org/findstds/standard/802.1AR-2009.html">
          <front>
            <title>IEEE 802.1AR Secure Device Identifier</title>
            <author>
              <organization>IEEE Standard</organization>
            </author>
            <date year="2009"/>
          </front>
        </reference>
        <reference anchor="chickenegg" target="https://en.wikipedia.org/wiki/Chicken_or_the_egg">
          <front>
            <title>Chicken or the egg</title>
            <author>
              <organization>Wikipedia</organization>
            </author>
            <date year="2019" month="December"/>
          </front>
        </reference>
        <reference anchor="qrcodewebservice" target="https://duckduckgo.com/?q=QR+code+web+generator">
          <front>
            <title>QR Code Generators</title>
            <author>
              <organization>Internet</organization>
            </author>
            <date year="2019" month="December"/>
          </front>
        </reference>
        <reference anchor="qrencode" target="https://fukuchi.org/works/qrencode/index.html.en">
          <front>
            <title>QR encode</title>
            <author initials="K." surname="Fukuchi">
              <organization/>
            </author>
            <date year="2019" month="December"/>
          </front>
        </reference>
        <reference anchor="isoiec18004">
          <front>
            <title>Information technology - Automatic identification and data capture techniques - QR Code bar code symbology specification (ISO/IEC 18004)</title>
            <author>
              <organization>ISO/IEC</organization>
            </author>
            <date year="2015" month="February"/>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
