<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.6 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!ENTITY RFC2119 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC8520 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8520.xml">
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-richardson-shg-mud-quarantined-access-02" category="std">

  <front>
    <title abbrev="MUD-Quarantine">Manufacturer Usage Description for quarantined access to firmware</title>

    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <author initials="M." surname="Ranganathan" fullname="M. Ranganathan">
      <organization>NIST</organization>
      <address>
        <email>mranga@gmail.com</email>
      </address>
    </author>

    <date year="2020" month="November" day="02"/>

    <area>Internet</area>
    <workgroup>opsawg Working Group (if adopted)</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>The Manufacturer Usage Description is a tool to describe the limited access
that a single function device such as an Internet of Things device might
need.</t>



    </abstract>


  </front>

  <middle>


<section anchor="problems" title="Introduction">

<t>The document details an extension to the Manufacturer Usage Description (MUD)
mechanism to be able to mark one or more ACLs as being enabled even though
the device has been quaranteed.</t>

</section>
<section anchor="rfc2119" title="Requirements Language">

<t>In this document, the key words “MUST”, “MUST NOT”, “REQUIRED”,
“SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “MAY”,
and “OPTIONAL” are to be interpreted as described in BCP 14, RFC 2119
<xref target="RFC2119"/> and indicate requirement levels for compliant STuPiD
implementations.</t>

</section>
<section anchor="mud-file-extensions" title="MUD file extensions">

<section anchor="tree-diagram" title="Tree Diagram">

<t>module: cira-shg-mud
  augment /m:mud:
    +–rw quaranteed-device-policy
       +–rw enabled-ace-names* [ace-name]
          +–rw ace-name    -&gt; /acl:acls/acl/aces/ace/name</t>

</section>
<section anchor="yang-file" title="YANG FILE">

<t><figure>
<artwork><![CDATA[
<CODE BEGINS> file "ietf-mud-quarantine@2019-12-27.yang"
module ietf-mud-quarantine {
  yang-version 1.1;

  namespace
    "urn:ietf:params:xml:ns:yang:ietf-mud-quarantine";
  prefix "q";

  import ietf-mud {
    prefix m;
    description "This module defines an extension to MUD to mark entries as being needed during quarantine";
    reference "RFC YYYY: MUD YANG";
  }

  organization "IETF OPSAWG Working group.";

  contact
    "WG Web: <https://datatracker.ietf.org/wg/opsawg/>
     WG List: opsawg@ietf.org
    Author:   Michael Richardson
              <mailto:mcr+ietf@sandelman.ca>

    Author:   M. Ranganathan
              <mailto:mranga@gmail.com>";

  description
   "This module extends the RFC8520 MUD format to two
    facilities: definition of an Access Control List appropriate
    to enable device upgrade only, and provide for a history of
    modifications by third-parties to the MUD file";

  revision "2019-12-27" {
    description
     "Initial version";
    reference
     "RFC XXXX: MUD profile with quarantined access";
  }

  augment "/m:mud" {
    description
       "Adds leaf nodes for marking ACLs that should be enabled during quarantine";

    container quaranteed-device-policy {
      description
        "The policies that should be enforced on traffic
         coming from the device when it is under quarantine.
         These policies are usually a subset of operational policies
         and are intended to permit firmware updates only.
         They are intended to keep the device safe (and the network safe
         from the device) when the device is suspected of being
         out-of-date, but still considered sufficiently intact to be
         able to do a firmware update";
      list enabled-ace-names {
        key ace-name;
        leaf ace-name {
          type leafref {
            path "/acl:acls/acl:acl/acl:aces/acl:ace/acl:name";
          }
        }
      }
    }
  }
}

<CODE ENDS>
]]></artwork>
</figure></t>

</section>
</section>
<section anchor="security-considerations" title="Security Considerations">

<t>TBD</t>

</section>
<section anchor="privacy-considerations" title="Privacy Considerations">

<t>TBD</t>

</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>The following YANG modules need to be registered in the “YANG Module Names” registry:</t>

<figure><artwork><![CDATA[
      Name: ietf-mud
      URN: urn:ietf:params:xml:ns:yang:ietf-mud
      Prefix: ietf-mud
      Registrant contact: The IESG
      Reference: [THIS DOCUMENT]
]]></artwork></figure>

</section>
<section anchor="acknowledgements" title="Acknowledgements">

</section>


  </middle>

  <back>

    <references title='Normative References'>

&RFC2119;
&RFC8520;


    </references>





  </back>

<!-- ##markdown-source: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-->

</rfc>

