[OPSAWG] AD review of draft-ietf-opsawg-sbom-access-12

"Rob Wilton (rwilton)" <rwilton@cisco.com> Mon, 19 December 2022 16:25 UTC

Return-Path: <rwilton@cisco.com>
X-Original-To: opsawg@ietfa.amsl.com
Delivered-To: opsawg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1FAD3C1526F7; Mon, 19 Dec 2022 08:25:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -11.896
X-Spam-Level:
X-Spam-Status: No, score=-11.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=K1NmHCKl; dkim=pass (1024-bit key) header.d=cisco.com header.b=eyWf3bVM
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3VAaTrrN80ii; Mon, 19 Dec 2022 08:25:09 -0800 (PST)
Received: from rcdn-iport-3.cisco.com (rcdn-iport-3.cisco.com [173.37.86.74]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E9D71C1524D1; Mon, 19 Dec 2022 08:25:08 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=10710; q=dns/txt; s=iport; t=1671467109; x=1672676709; h=from:to:cc:subject:date:message-id: content-transfer-encoding:mime-version; bh=wz3FpyvBvEO0IUZTmfZXSgKwvj2dnnYlzic/hS2LM5U=; b=K1NmHCKln43G6TNDMD6pXGfZ6NRcz9UsV7G2SBS1YEoLU4EqsU1lKnkt aJVdCwLiLe1SVhaGgrakMTxv7zIjvvtq2vfoqDpl2itIc0Vx3QPAzRA7V p9hzgMikb+quQDTqVj9MNQvLmqEGWes3HEXszxpYYgDAsPaZKGTSCOfWE 4=;
X-IPAS-Result: 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
IronPort-PHdr: A9a23:jJBRZhNk/ehKYYK8OHIl6ncDWUAX0o4cdiYZ6Zsi3rRJdKnrv5HvJ 1fW6vgliljVFZ7a5PRJh6uz0ejgVGUM7IzHvCUEd5pBBBMAgN8dygonBsPNAEbnLfnsOio9G skKVFJs83yhd0ZPH8OrbFzJqXr05jkXSX3C
IronPort-Data: A9a23:BdkX8KoHqYfOTSBo128O6qgispdeBmIHZRIvgKrLsJaIsI4StFCzt garIBmOb/qOM2D9ct8jOYm38RsH65fRx4BjS1dppH1hFStH9uPIVI+TRqvS04x+DSFioGZPt Zh2hgzodZhsJpPkjk7xdOCn9xGQ7InQLlbGILas1htZGEk1Fk/NtTo5w7Rj29Qx0IDga++wk YqaT/P3aQfNNwFcagr424rbwP+4lK2v0N+wlgVWicFj5DcypVFMZH4sDf3Zw0/Df2VhNrXSq 9AvY12O1jixEx8FUrtJm1tgG6EAaua60QOm0hK6V0U+6/RPjnRa70o1CBYTQUNGigXOuIh48 Y0Ts5+ITSQWNaDFmN1IBnG0EwkmVUFH0KXMLX76usuJwgifKz3nwu5lCwc9OohwFuRfWD4Vs 6dHbmFWKEnf2Ypaw5rjIgVort48Lc33O4U3sXB7xjafBvEjKXzGa/yWtYQCg29h7ixINe2PY tgmWDxsV03jeQd+F3sZDbUEsej90xETdBUB+A7K+sLb+VP7yxRq2afiGNvYZtLMQt9a9m6Uv GvI4yH4Dw0UcduH0jOa/Te3jOjK2CrwU48JD/ux8vpCgVCPyCoUEhJ+aLegieOyhkj7UNVFJ glNomwlrLM58wqgSdyVswCETGCsug8da513S+QDsF+LyZLQwDmSC2EEd2sUADA5j/MeSTsv3 16PutrmAz1zrbGYIU6gGqeoQSCaYnJEcTBYDcMQZU5UvYa7+t5bYgfnFI4LLUKjsjHi9dgcK RiwrSM+jq8flskNv0lQ1Q+a22L1znQlo/Jc2+k6dniu4gU8b4m/asnxsR7Q7O1LK8CSSVzpU Jk4dyq2srtm4XKlzXzlrAAx8FeBvajt3Nr02gUHInXZ327xk0NPhKgJiN2EGG9nM9wfZRjia 1LJtAVa6fd7ZSX1NPQnM9jrVJR0kMAM8OgJsNiJMrKihbAsK2e6EN1GOSZ8Iki0yhF3yPFjU XtlWZ/2XSxy5VtbIMqeHrdBjuBDKtEWzmLITpez1AW8zbebfxaopUQtbjOzghQCxPrc+m39q o8HX+PTkkk3eLOlOEH/r9VMRW3m2FBmX/gaXeQNKL7aSuencUl8Y8LsLUQJINc0wvsLyrqVp hlQmCZwkTLCuJEOEi3SAlgLVV8ldcwXQa4TVcD0AWuV5g==
IronPort-HdrOrdr: A9a23:5MG1M69/DaXJvaiTA6tuk+Fgdb1zdoMgy1knxilNoENuHPBwxv rAoB1E73PJYW4qKQsdcdDpAtjlfZquz+8J3WB3B8bpYOCGghriEGgG1+rfKlLbalXDH4JmpM VdmstFeZDN5DpB/L3HCWCDer5KqrTmgcOVbIzlvhBQpHRRGthdBnBCe2Cm+yNNNWx7LKt8MK DZyttMpjKmd3hSRN+8HGM5U+/KoMCOvI76YDYdbiRXpDWmvHeN0vrXAhKY1hARX3dk2rE561 XIlAT/++GKr+y78BnBzGXehq4m1+cJi+EzSvBkuPJlagkEuTzYJ7iJnIfy/gzdldvfqWrCVu O85ivIcf4Dr085NVvF3ScFkzOQrwrGrUWSjmNxRRDY0JXErPVQMbsGuWsRSGqm12Mw+N57y6 5FxGSfqt5eCg7Bhj3045zSWwhtjVfcmwtVrQc/tQ0qbWIlUs4nkaUPuEdOVJsQFiPz744qVO FoEcHH/f5TNVeXdWrQsGVjyMGlGi1bJGbPfmES/siOlzRGlnFwyEUVgMQZg3cb7Zo4D51J/f 7NPKhknKxHCsUWcaV+DuEcRtbfMB2FfTvcdGaJZVj3HqAOPHzA75bx/bUu/emvPIcFyZMj8a 6xJW+wdVRCCX4GJff+r6GjqCq9MVlVdQ6duv1j2w==
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.96,255,1665446400"; d="scan'208";a="14832709"
Received: from rcdn-core-10.cisco.com ([173.37.93.146]) by rcdn-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 19 Dec 2022 16:25:07 +0000
Received: from mail.cisco.com (xfe-rcd-003.cisco.com [173.37.227.251]) by rcdn-core-10.cisco.com (8.15.2/8.15.2) with ESMTPS id 2BJGP4lQ012993 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Mon, 19 Dec 2022 16:25:05 GMT
Received: from xfe-rtp-003.cisco.com (64.101.210.233) by xfe-rcd-003.cisco.com (173.37.227.251) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.9; Mon, 19 Dec 2022 10:25:03 -0600
Received: from NAM11-DM6-obe.outbound.protection.outlook.com (64.101.32.56) by xfe-rtp-003.cisco.com (64.101.210.233) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.9 via Frontend Transport; Mon, 19 Dec 2022 11:25:02 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=WfECAUxso3wXw5JvKfngkz+zCnf/X0qFXoeAE6FihJYzMwitOUrOlwqR1UY6Bi18Gok3mbF/rsjrFWmGqPZ5AmPJ2Z0LNd979ryk+8utB2fSYnUyvIofq6PtUatHNX7xtLXVoww49LoXIJq/EF601pbjH+wg9azK+Y8MyZyf+iNzdf2PmI+fSJuHeJUXlgf5lRWHAaCibs37urD+gbAUlL/nsV47A04FFNEgmi6gE4S8FovMog0VwuNim96PjgbyVKGKomMdrQ0xFbtB1dAU9ZPylxiT2RSLUMTlQASdDy1b5id4TyI6wgeVbRFtMowPuYEm5sIFOV866jLMXbv8XA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=CI1K0+0AuT5gW6LK0Uc26v6/uQqEcQroyLsdg86gnB8=; b=FTUOT5PkNlV22lRei8DdXuNAvNgBH5twe5CK3dCMRYIpetbQ2FpAAJhDPGlOvv6ZAzkpWUCkcOfCh6OJ1Vv7oPzu/WRyBdn9lO0QtIL/vzES+PJJVf8CNl5sTo/VGy578aYUR8f5pCebRu3c/98UFmGodR0AawRE9KmfB3GCl5l4JjjyG3sOteA6yX7s+1NAlJHDEii5hu+RuOTJfu344cyJJeCfBWApf04rVeCuSvsmeTiLzdUnBI17e2MWdQlK1PHz30ZBq6nz5WSioFC9In6fxI1aMXN97iQFa7mBWIcEAfRXNmN8op9eZl1Uu2d3seWiH5YajXZK9wPpZoV2pg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=CI1K0+0AuT5gW6LK0Uc26v6/uQqEcQroyLsdg86gnB8=; b=eyWf3bVMVEDmT9kXE5xA8EUeizea6lGY0cGMHGgpa6ElymZw0l+kScjDdp37muGtDZSi9iFuIrwj45VHoS6JMIW2vnBjC+lCoqCR6Dioccns078h7Ddh9huONpQ0L7kiZAtvqnnOIX3li38sR/rfQzy2j8GMj2t8Bz8+SdOFyys=
Received: from BY5PR11MB4196.namprd11.prod.outlook.com (2603:10b6:a03:1ce::13) by IA1PR11MB6371.namprd11.prod.outlook.com (2603:10b6:208:3ad::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5880.11; Mon, 19 Dec 2022 16:25:00 +0000
Received: from BY5PR11MB4196.namprd11.prod.outlook.com ([fe80::39ca:2d87:558d:9c17]) by BY5PR11MB4196.namprd11.prod.outlook.com ([fe80::39ca:2d87:558d:9c17%4]) with mapi id 15.20.5924.016; Mon, 19 Dec 2022 16:25:00 +0000
From: "Rob Wilton (rwilton)" <rwilton@cisco.com>
To: "draft-ietf-opsawg-sbom-access.all@ietf.org" <draft-ietf-opsawg-sbom-access.all@ietf.org>
CC: "opsawg@ietf.org" <opsawg@ietf.org>
Thread-Topic: AD review of draft-ietf-opsawg-sbom-access-12
Thread-Index: AdkTxY2thq2SEj1EQJ2LOn4VifdRRg==
Date: Mon, 19 Dec 2022 16:25:00 +0000
Message-ID: <BY5PR11MB419614F289F9AEB659983029B5E59@BY5PR11MB4196.namprd11.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BY5PR11MB4196:EE_|IA1PR11MB6371:EE_
x-ms-office365-filtering-correlation-id: bdf29489-ea74-41a7-5bd3-08dae1dd936a
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BY5PR11MB4196.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230022)(4636009)(396003)(39860400002)(136003)(346002)(366004)(376002)(451199015)(83380400001)(55016003)(122000001)(33656002)(2906002)(5660300002)(6506007)(316002)(86362001)(186003)(4326008)(7696005)(66946007)(38070700005)(76116006)(9686003)(52536014)(478600001)(41300700001)(8936002)(450100002)(8676002)(66446008)(71200400001)(6916009)(66556008)(64756008)(38100700002)(66899015)(66476007); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BY5PR11MB4196.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: bdf29489-ea74-41a7-5bd3-08dae1dd936a
X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Dec 2022 16:25:00.2964 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: p7hCg1eLXfd1QyLXyrt8JHT5BU1CtpUUciiQgqqOvYlrnhQuthwBBAN9erBDQJpXnVuMZZs7knfjtcgzlyx1Xg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: IA1PR11MB6371
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.227.251, xfe-rcd-003.cisco.com
X-Outbound-Node: rcdn-core-10.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsawg/AQHuCpyJv7oxB3M0o1QirFFUhbo>
Subject: [OPSAWG] AD review of draft-ietf-opsawg-sbom-access-12
X-BeenThere: opsawg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: OPSA Working Group Mail List <opsawg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsawg>, <mailto:opsawg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsawg/>
List-Post: <mailto:opsawg@ietf.org>
List-Help: <mailto:opsawg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsawg>, <mailto:opsawg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 19 Dec 2022 16:25:13 -0000

Hi Eliot, Scott,

Thanks for this document.  Here is my AD review for draft-ietf-opsawg-sbom-access-12.


Moderate level comments:

(1) p 3, sec 1.  Introduction

   To enable application-layer discovery, this memo defines a well-known
   URI [RFC8615].  Management or orchestration tools can query this
   well-known URI to retrieve a system's SBOM or vulnerability
   information.  Further queries may be necessary based on the content
   and structure of the response.

It looks like the .wellknown URI can only be used to retrieve SBOM information and not vulnerability information (unless I am missing something).


(2) p 15, sec 6.  Security Considerations

   The YANG module specified in this document defines a schema for data
   that is designed to be accessed via network management protocols such
   as NETCONF [RFC6241] or RESTCONF [RFC8040].  The lowest NETCONF layer
   is the secure transport layer, and the mandatory-to-implement secure
   transport is Secure Shell (SSH) [RFC6242].  The lowest RESTCONF layer
   is HTTPS, and the mandatory-to-implement secure transport is TLS
   [RFC8446].

This text looks to be inconsistent with earlier parts of the document, specifically, I didn't think that the intent was to fetch this information using NETCONF or RESTCONF, but the early part of this document states that it contains groupings, which presumably could be used in any YANG model, and hence security considerations would apply.

I would suggest that you split the security considerations into two separate sub-sections:

i. The security considerations as this document applies to documenting SBOMs as part of the MUD file.  Which I think is most of the text that you have below.  As per above I think that it is this section that should be updated to comment on the use of the insecure version of http and coap.

ii. A separate sub-section that only applies if the groupings are being used in regular YANG modules accessed via NETCONF/RESTCONF and that follows the standard YANG security template.



Minor level comments:

(3) p 0, sec 

   Discovering and Retrieving Software Transparency and Vulnerability
                              Information
                    draft-ietf-opsawg-sbom-access-12

It wasn't obvious to me why this is called "transparency", is this is a standard term of art for SBOMs?


(4) p 4, sec 1.1.  How This Information Is Retrieved

   Note that vulnerability and SBOM information is likely to change at
   different rates.  MUD's cache-validity node provides a way for
   manufacturers to control how often tooling should check for those
   changes through the cache-validity node.

Just for my understanding: Is there any mechanism for clients to register for notification of changes rather than polling?


(5) p 4, sec 2.  The well-known transparency endpoint set

   Two well known endpoint is defined:

"Two" => "a", and well known => well-known?


(6) p 7, sec 4.  The mud-sbom augmentation to the MUD YANG model

     identity http {
       base mudtx:local-type;
       description
         "Use http (insecure) to retrieve SBOM information.  This
           method is NOT RECOMMENDED, but may be unavoidable for
           certain classes of deployment, where TLS has not or
           cannot be implemented";
     }

I'm okay with this and coap (from a pragmatism POV).  But I think that the security section should talk about this: I.e., emphasize that secure versions MUST be used in preference, if available, and highlight the risks if insecure protocols are used.


(7) p 7, sec 4.  The mud-sbom augmentation to the MUD YANG model

     identity coaps {
       base mudtx:local-type;
       description
         "Use COAPS (secure) to retrieve SBOM";
     }

Possibly add YANG reference statements to point to the latest http, https, coap, and coaps specifications?


(8) p 8, sec 4.  The mud-sbom augmentation to the MUD YANG model

         choice sbom-retrieval-method {
           description
             "How to find SBOM information";
           case cloud {
             list sboms {
               key "version-info";
               description
                 "A list of SBOMs tied to different software
                  or hardware versions.";
               leaf version-info {
                 type string;
                 description
                   "The version to which this SBOM refers.";
               }
               leaf sbom-url {
                 type inet:uri;
                 description
                   "A statically located URL.";
               }

Should any URI be allowed here, or should it be pattern restricted to http(s) or coap(s)?


(9) p 8, sec 4.  The mud-sbom augmentation to the MUD YANG model

         leaf archive-list {
           type inet:uri;
           description
             "This URI returns a JSON list of URLs that consist of
                     SBOMs that were previously published for this
                     device.  Publication dates can found inside
                     the SBOMs.";

i.  Why not "sbom-archive-list"?

ii. Please also reformat the description.


(10) p 8, sec 4.  The mud-sbom augmentation to the MUD YANG model

         }
         choice vuln-retrieval-method {
           description
             "How to find vulnerability information";
           case cloud {

Is cloud a slightly colloquial term?  Would 'remote' or 'online' be more general?


(11) p 8, sec 4.  The mud-sbom augmentation to the MUD YANG model

             leaf vuln-url {
               type inet:uri;
               description
                 "A statically located URL.";

Perhaps "A statically located URL that references the vulnerability information"?


(12) p 9, sec 4.  The mud-sbom augmentation to the MUD YANG model

             }
           }
           case vuln-contact-info {
             leaf contact-uri {
               type inet:uri;
               description
                 "This MUST be either a tel, http, https, or
                  mailto uri schema that customers can use to
                  contact someone for vulnerability information.";

i. Should this be "vuln-conctact-uri" (since the case statement doesn't appear in the instance data).  The alternative solution would be to introduce "sbom" and "vuln" containers which would then force those containing identifiers into the instance data.

ii. Should you not also have the same pattern statement that you also have for sbom-contact-uri?


(13) p 10, sec 5.1.  Without ACLS

   This first MUD file demonstrates how to get SBOM and vulnerability
   information without ACLs.
  {
    "ietf-mud:mud": {
      "mud-version": 1,
      "extensions": [
        "ol",
        "transparency"
      ],
      "ol": {
        "owners": [
          "Copyright (c) Example, Inc. 2022. All Rights Reserved"
        ],
        "spdx-tag": "0BSD"
      },

Where is the "ol" extension defined.  I would have thought that the top node would need a prefix and name?


(14) p 16, sec 6.  Security Considerations

   SBOMs provide an inventory of software.  If software is available to
   an attacker, the attacker may well already be able to derive this
   very same software inventory.  When this information resides on the
   endpoint itself, the endpoint SHOULD NOT provide unrestricted access
   by default.  Other servers that offer the data MAY restrict access to
   SBOM information using appropriate authorization semantics within
   HTTP.  One way to do this would be to issue a certificate to the
   client for this purpose after a registration process has taken place.
   Another approach would involve the use of OAUTH in combination with a
   In particular, if a system attempts to retrieve an SBOM via HTTP and
   the client is not authorized, the server MUST produce an appropriate
   error, with instructions on how to register a particular client.
   federations of SBOM servers.

Editing error?  "with a ... " and "federations of SBOM servers".



Nit level comments:

(15) p 0, sec 

   To improve cybersecurity posture, automation is necessary to locate
   what software is running on a device, whether that software has known
   vulnerabilities, and what, if any recommendations suppliers may have.
   This memo extends the MUD YANG model to provide the locations of
   software bills of materials and to vulnerability information.

I find the last sentence hard to read, e.g., the "to vulnerability ..."


(16) p 7, sec 4.  The mud-sbom augmentation to the MUD YANG model

     grouping transparency-extension {
       description
         "This grouping provides a means to describe the location of
          software bills of material and vulnerability descriptions.";
       container transparency {
         description
           "container of methods to get an SBOM.";

Please capitalize the first letter.  Also, this container holds data other than just how to get SBOMs, should the description reflect that?


Other grammar warnings generated by an automated tool (some may already be flagged above):

Grammar Warnings:
Section: 1, draft text:
- on devices themselves - on a web site (e.g., via URI) - through some form of out-of-band contact with the supplier. 
Warning:  Nowadays it's more common to write this as one word.
Suggested change:  "website"

Section: 2, draft text:
Two well known endpoint is defined:
Warning:  Possible agreement error. The noun 'endpoint' seems to be countable, so consider using: endpoints.
Suggested change:  "endpoints"

Section: 6, draft text:
Some of the readable data nodes in this YANG module may be considered sensitive or vulnerable in some network environments. 
Warning:  If the text is a generality, 'of the' is not necessary.
Suggested change:  "Some"

Section: 6, draft text:
Another approach would involve the use of OAUTH in combination with a In particular, if a system attempts to retrieve an SBOM via HTTP and the client is not authorized, the server MUST produce an appropriate error, with instructions on how to register a particular client. 
Warning:  Use an instead of 'a' if the following word starts with a vowel sound, e.g. 'an article', 'an hour'
Suggested change:  "an"

Section: 6, draft text:
federations of SBOM servers.
Warning:  This sentence does not start with an uppercase letter.
Suggested change:  "Federations"

Regards,
Rob