Re: [OPSAWG] AD review of draft-ietf-opsawg-mud-acceptable-urls-09

"Rob Wilton (rwilton)" <rwilton@cisco.com> Mon, 12 February 2024 11:43 UTC

Return-Path: <rwilton@cisco.com>
X-Original-To: opsawg@ietfa.amsl.com
Delivered-To: opsawg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AFDB6C15170B; Mon, 12 Feb 2024 03:43:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.604
X-Spam-Level:
X-Spam-Status: No, score=-9.604 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b="Sqw73nq7"; dkim=pass (1024-bit key) header.d=cisco.com header.b="cIe4iiCs"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YW34mX3kyioQ; Mon, 12 Feb 2024 03:43:45 -0800 (PST)
Received: from rcdn-iport-7.cisco.com (rcdn-iport-7.cisco.com [173.37.86.78]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1C9FBC15152C; Mon, 12 Feb 2024 03:43:45 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; i=@cisco.com; l=50009; q=dns/txt; s=iport; t=1707738225; x=1708947825; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=3ucAJxzi7gz4ajSzPLL9ciGW1g84UzXRTIw7pW3YJTc=; b=Sqw73nq7KI4jhAqhxnVbAW7RT89Y0xEJ0o5u5XPNDxOMjgI8uRf6reIJ 23DiwGyvEBLhK+Dx/Z9mYgFp3VosOo+M95qdmXS6upijnVnZyXpTHz2d9 aFFUvoQwHCQBhVzM42XRSHr1AkjciMhJSPW7E+cs6P/9M5kmlmqOsgvZC c=;
X-CSE-ConnectionGUID: k8CaXFVGQDmaVEdVl+3oPA==
X-CSE-MsgGUID: qh3DH+yKTzGyzgsTLIlbqA==
X-IPAS-Result: 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
IronPort-PHdr: A9a23:UduH2BIcqqWK9EzA3Nmcua4yDhhOgF28FgcR7pxijKpBbeH4uZ/jJ 0fYo/5qiQyBUYba7qdcgvHN++D7WGMG6Iqcqn1KbpFWVhEEhMlX1wwtCcKIEwv6edbhbjcxG 4JJU1o2t2qjPx1tEd3lL0bXvmX06DcTHhvlMg8gPPv0HpLViey81vu5/NvYZAAbzDa4aKl5e Q2/th6Z9tFDm4ZgJ60tghfIuS5OfOJbhCtkcFmShB37oMy3+fZe
IronPort-Data: A9a23:o1uHVKvWNJrJjVQaNNrWU9hj1efnVGVeMUV32f8akzHdYApBsoF/q tZmKTqAPP3YN2CnKN1/Otix9BgBvcXVmoBlQFdvrH8zEXhGgMeUXt7xwmUckM+xwmwvaGo9s q3yv/GZdJhcokf0/0rrav656yAkiclkf5KkYMbcICd9WAR4fykojBNnioYRj5Vh6TSDK1vlV eja/YuHZjdJ5xYuajhIs/ja8ks01BjPkGpwUmIWNKgjUGD2zxH5PLpHTYmtIn3xRJVjH+LSb 44vG5ngows1Vz90Yj+Uuu6Tnn8iG9Y+DiDS4pZiYJVOtzAZzsAEPgnXA9JHAatfo23hc9mcU 7yhv7ToIesiFvWkdOjwz3C0HgkmVZCq9oMrLlC84eea/2P4XELAxvxQIU0IOc5D/d5eVDQmG fwwcFjhbziZjO6whbm8UOQp2IIoLdLgO8UUvXQIITPxVKl9B8ucBfSRo4YFg1/chegWdRraT 9AGaD5zaxLoaBxUMVBRA5U79AutriCvI2UB9Q3K/8Lb5UDKzFdd8Pv8E+bHVc2YSt5pumecr HvvqjGR7hYyb4HHlmHfrRpAnNTnmjvgUZ0dPLy16vAsh0ecrkQfEhQYSR66rOW3z0mmQNtAJ AkR5yZrpKM5+VS3R9P5Ulilunqf+BcYX/JRHvE0rgaXxcLpDx2xHGMISHtKb8Yr8ZFwTj0x3 VjPlNTsbdByjFGLYXHN3b6kgw2dAAQQJFEvaREADlAC2/C29enfkSnzZtpkFae0iPj8Fjfx3 y2GoUACa1M70JJjO0KToACvvt68mqUlWDLZ8ek+Y45IxhlyaIjgbIuy5B2Fq/1BN42eCFKGu RDoevRyDshRVflhdwTUHI3h+Y1FAd7fbVUwZnY0T/EcG8yFoSLLQGyq3BlwJV1yLuEPciLzb UnYtGt5vcALYyX1M/UmM93gVqzGKJQM8/y4Cpg4ifITM/BMmPOvo0mCmGbJhj+9zhJw+U3BE cnKLK5A8kr2+Yw8kWLpHL1CuVPa7is/3mjUDYvq1Aiq1KHWZXieD9843KimMIgEAFe/iFyNq b53bpLSoz0GCbGWSneMq+Y7cwtVRUXX8Lir8aR/bPCYGAN6FQkJUrmJqV/XU9Y7z/09eyah1 izVZ3K0P3Kk2SKYdF7XNSszAF4tNL4mxU8G0eUXFQ/A81AoYJ2k6+EUcJ5fQFXt3LULISJcJ xXdR/i9Pw==
IronPort-HdrOrdr: A9a23:tR9w+6s4Zh4G1w8eOVK3AFiZ7skCOYAji2hC6mlwRA09TyXGrb HMoB1L73/JYWgqOU3IwerwSZVoIUmxyXZ0ibNhRItKLzOWyFdATbsSorcKpgeQeREWmdQtqJ uIH5IOb+EYSGIK8/oSgzPIXerIouP3jJxA7N22pxwCPGQaD52IrT0JdTpzeXcGPDWucKBJbq Z0kfA33AZIF05nCPiTNz0uZcSGjdvNk57tfB4BADAayCTmt1mVwY+/OSK1mjMFXR1y4ZpKyw X4egrCiZmLgrWe8FvxxmXT55NZlJ/K0d1YHvGBjcATN3HFlhuoTJ4JYczDgBkF5MWUrHo6mt jFpBkte+5p7WnKQ22zqRzxnyH9zTcV7WP4w1PwuwqhnSW5fkN5NyNyv/McTvLr0TtmgDi66t MM44utjesTMfoHplWl2zGHbWAzqqP+mwtQrQdatQ0sbWJZUs4RkWTal3klSqvp20nBmdsaOf grA8fG6PlMd1SGK3jfo2l02dSpGm8+BxGcXyE5y4aoOhVt7ThEJnEjtYcit2ZF8Ih4R4hP5u zCPKgtnLZSTtUOZaY4AOsaW8O4BmHEXBqJaQupUBjaPbBCP2iIp4/84b0z6u3vcJsUzIEqkJ CEVF9Dr2Y9d0/nFMXL1pxW9RLGRnm7QF3Wu4xjzok8vqe5SKvgMCWFRlxrm8y8o+8HCsmeQP q3MII+OY6rEYIvI/c+4+TTYegkFZBFarxhhj8SYSP7nv72
X-Talos-CUID: 9a23:lm5BuWNmD/aMtO5DW3lM/X46JO8cXnjU8lrcHUv7UmFRYejA
X-Talos-MUID: 9a23:AxWU0Qayz2xHweBTrj+3qBEhJeRU8Yu/Gk8WrbEnv8OdHHkl
X-IronPort-Anti-Spam-Filtered: true
Received: from rcdn-core-6.cisco.com ([173.37.93.157]) by rcdn-iport-7.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 12 Feb 2024 11:43:43 +0000
Received: from alln-opgw-3.cisco.com (alln-opgw-3.cisco.com [173.37.147.251]) by rcdn-core-6.cisco.com (8.15.2/8.15.2) with ESMTPS id 41CBhhXH027704 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 12 Feb 2024 11:43:43 GMT
X-CSE-ConnectionGUID: cU4n5hoqRoGeHUKfP+VGUw==
X-CSE-MsgGUID: 29Ro7tRDSai8X9p/DuLtXg==
Authentication-Results: alln-opgw-3.cisco.com; dkim=pass (signature verified) header.i=@cisco.com; spf=Pass smtp.mailfrom=rwilton@cisco.com; dmarc=pass (p=reject dis=none) d=cisco.com
X-IronPort-AV: E=Sophos;i="6.06,263,1705363200"; d="scan'208,217";a="2142390"
Received: from mail-dm6nam12lp2168.outbound.protection.outlook.com (HELO NAM12-DM6-obe.outbound.protection.outlook.com) ([104.47.59.168]) by alln-opgw-3.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 12 Feb 2024 11:43:43 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=irmKaG81bX8HYjhfdQmeb72QS5ApAPOaOsT+ZXsXRWK03lE4/L/x4p3py6m42bO7Wa45tnadKd2PLIHsxpILapaXcDh0JP4i6X+gcQSRr815nEmfk4iQZP4nzwOgpk7RSNtdCKno1sZpAOMES4a1OLwnglOIu9gwI05m5OM0H1H1d+9r9Y+a1bPnA6xfqY5kvztIigAjR6CGyZGdo8t7g1/OJmAoI3/fDb3WciCjCQ92colluGHIhUuM3T/tP14nlgnPiPOPWIWrLHmJ3fb0dpP2BWYmGaNMp7VOLWxj9zHCJz9HUo3ZL97EFOcAmATAcFTCHUJOpeqEGfZ3wgBLQw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=3ucAJxzi7gz4ajSzPLL9ciGW1g84UzXRTIw7pW3YJTc=; b=HfCc9tDQfyYnmiQvr1bMMuEDu89EwJS9mts00IGwTSUOvY3n/jGvJFy3iPRV8+suD8AqBBU7yjTyH2qafNXxgFaCxLuhni+a0cKcoQvTfG77yKVlUqj8+ASU0T9GWS/2B8naeDOBLwwbdw6iC5mrkMJRmlzTSwl/QbmDdaGcbjN22pugrTxdkUCAUozs8SJh6yLI6w8TS9afyH3GY9kjYIIMikW6M2rfNc3uuP1Q4veW1ipAQLYl3PvE4ebIJru+azFySsNH34Az+LTC/oc2iXg6WdRL1STComOvyQl9NSSqS5bV2KXpV3ENhPVVFBWpwA4400UctSxMUPxSAeCOng==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=3ucAJxzi7gz4ajSzPLL9ciGW1g84UzXRTIw7pW3YJTc=; b=cIe4iiCsb8yN7qB4iWuZ/k1YfhNDTwNo6XjGCfTUnikqQc36bdq7va5UD8MSc09BADxfNK/qMDdkJS4a4ttIufLeZ+kex3kfaSTqdaB3CwBO3UECr8e4hhNN42MuJaSs48SeUhCAdliGFtB/+XvNFG9cfsfieSd5vHVX5/niExk=
Received: from LV8PR11MB8536.namprd11.prod.outlook.com (2603:10b6:408:1ec::19) by DS0PR11MB7802.namprd11.prod.outlook.com (2603:10b6:8:de::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7270.39; Mon, 12 Feb 2024 11:43:41 +0000
Received: from LV8PR11MB8536.namprd11.prod.outlook.com ([fe80::f662:b8bc:6176:256d]) by LV8PR11MB8536.namprd11.prod.outlook.com ([fe80::f662:b8bc:6176:256d%2]) with mapi id 15.20.7270.033; Mon, 12 Feb 2024 11:43:41 +0000
From: "Rob Wilton (rwilton)" <rwilton@cisco.com>
To: Michael Richardson <mcr+ietf@sandelman.ca>
CC: "draft-ietf-opsawg-mud-acceptable-urls.all@ietf.org" <draft-ietf-opsawg-mud-acceptable-urls.all@ietf.org>, "opsawg@ietf.org" <opsawg@ietf.org>, Mahesh Jethanandani <mjethanandani@gmail.com>
Thread-Topic: [OPSAWG] AD review of draft-ietf-opsawg-mud-acceptable-urls-09
Thread-Index: AQHaWElL98Ho1PrVZ0+Yzb+MpVSn17D+GJoAgAiByEU=
Date: Mon, 12 Feb 2024 11:43:41 +0000
Message-ID: <LV8PR11MB85364284DFB7DA9DEE64A8E5B5482@LV8PR11MB8536.namprd11.prod.outlook.com>
References: <LV8PR11MB8536F7B2D68E55E8B1A6AFAFB5472@LV8PR11MB8536.namprd11.prod.outlook.com> <18330.1707269152@obiwan.sandelman.ca>
In-Reply-To: <18330.1707269152@obiwan.sandelman.ca>
Accept-Language: en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: LV8PR11MB8536:EE_|DS0PR11MB7802:EE_
x-ms-office365-filtering-correlation-id: 9f2f4f18-6795-4110-3743-08dc2bbfdc3b
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: QXnBZEr0Rqqvw9InvrQr772PyAuUdnjzAbXibXuTp+11aKLXyaI8jYWaO9UEEI7r5OINlgVxQ4ifQMf98afO0fRcHu0hdJ+QiWCPRgsW63xhjYvVMLJdjjNcNFDGvsfUkttQ3WHE8OUb3riZFFItyM+BTKETAW0flnF1VH6C1zoJjlh62N33Zh7poqwka1VWPxO2HMrXeLf5SJLIFzra/BYZpU5p4NnwYmazrI2uYIBXo2FprF74kF3pxRaNwKDFzSWvJ08f7C8y3IZO6CYyJxAkuxAccu8ZzH3qcCB8wcplTqqnPVK9cXHAljA26Kr11BHW8QuWk34hdhKKemOYclTeYj10Xk3KMGk7FIJLrNxcq/qFeYsv0Dcrirq1zKrBrK4xWtkS4MlDNagKv7/jwrpQYR0WW5gqBRux9qFyGPl4r+KUSfxXkLHmDE4JHE4taWYPpAvajIoiwy0oQMda2SC+4OJuL8QGJ84+ouLfG9vfBiEVk4+jsaFte0O3J3w6csrEVzDASG7iF6aYkRtEgaSMGA0+r7uJ9NXlpb3M/HkZUfUKEPLPrTGjv9+jffIAwN3mYCwxeH5QSNqzrg2EYXUoIF/5yY5VgKa9+HDT73U2ZLzlbIlAv1C86N+kcBZfXF4j8NQlSP3hcfsxs8lI7w==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:LV8PR11MB8536.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(396003)(39860400002)(376002)(366004)(346002)(136003)(230922051799003)(230273577357003)(64100799003)(451199024)(1800799012)(186009)(2906002)(55016003)(478600001)(41300700001)(30864003)(4326008)(5660300002)(9686003)(54906003)(71200400001)(7696005)(53546011)(52536014)(8936002)(66476007)(66556008)(66946007)(8676002)(64756008)(9326002)(66446008)(66574015)(76116006)(83380400001)(966005)(33656002)(38070700009)(66899024)(86362001)(316002)(6506007)(38100700002)(122000001)(166002); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_LV8PR11MB85364284DFB7DA9DEE64A8E5B5482LV8PR11MB8536namp_"
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: LV8PR11MB8536.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 9f2f4f18-6795-4110-3743-08dc2bbfdc3b
X-MS-Exchange-CrossTenant-originalarrivaltime: 12 Feb 2024 11:43:41.2877 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: t8TizziBlVw/Zcc2saYojPdCrT0AzmFqmF+5ES0sM4gBBoQm1tOwPnDgsPjGD9uX/MwhoHmtjYIpW0b9GUFmwQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS0PR11MB7802
X-Outbound-SMTP-Client: 173.37.147.251, alln-opgw-3.cisco.com
X-Outbound-Node: rcdn-core-6.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsawg/Nsw5Y39FZg_esZ6qsXqOMCEfXV4>
Subject: Re: [OPSAWG] AD review of draft-ietf-opsawg-mud-acceptable-urls-09
X-BeenThere: opsawg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: OPSA Working Group Mail List <opsawg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsawg>, <mailto:opsawg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsawg/>
List-Post: <mailto:opsawg@ietf.org>
List-Help: <mailto:opsawg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsawg>, <mailto:opsawg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 12 Feb 2024 11:43:49 -0000

Hi Michael,

Thanks for the updates.

Changes look good, and I’ll initiated IETF LC on -09, but there are a couple of remaining nits, please see inline. below.  You can either just fix them in your editors copy or post a new revision if you prefer, either works.

Anyway, this completes my AD review.  I may be able to get this on the 2024-03-07 telechat, but it may end up with too many pages, in which case it will end up on the first one after IETF 119 with Mahesh progressing it.

Regards,
Rob


From: OPSAWG <opsawg-bounces@ietf.org> on behalf of Michael Richardson <mcr+ietf@sandelman.ca>
Date: Wednesday, 7 February 2024 at 01:26
To: Rob Wilton (rwilton) <rwilton=40cisco.com@dmarc.ietf.org>
Cc: draft-ietf-opsawg-mud-acceptable-urls.all@ietf.org <draft-ietf-opsawg-mud-acceptable-urls.all@ietf.org>, opsawg@ietf.org <opsawg@ietf.org>, Mahesh Jethanandani <mjethanandani@gmail.com>
Subject: Re: [OPSAWG] AD review of draft-ietf-opsawg-mud-acceptable-urls-09

version -10 is posted, diff is at:

https://author-tools.ietf.org/iddiff?url1=draft-ietf-opsawg-mud-acceptable-urls-09&url2=draft-ietf-opsawg-mud-acceptable-urls-10&difftype=--html


Rob Wilton \(rwilton\) <rwilton=40cisco.com@dmarc.ietf.org> wrote:
    > I think that the document is fine and reasonably clear but could do
    > with a bit of language clean up and clarity in a few places.  I’ve
    > included my review comments below and also some grammar nits from a
    > grammar tool at the end.

    > Moderate level comments:

    > (1) p 2, sec 3.  Updating the MUD files in place

    > Would it a better title for this section be: "Possible issues with
    > updating MUD files in place"?

okay.

    > Minor level comments:
    > (2) p 1, sec 1.  Introduction


    >    [RFC8520] provides a standardized way to describe how a specific
    >    purpose device makes use of Internet resources and associated
    >    suggested network behavior.  The behaviors are described in a MUD
    >    file hosted in its manufacturer's server.  The device provides a MUD
    >    URL to the network manager, which can locate this MUD file and
    >    determine the required network authorization of the device.

    > "specific purpose device" sounds like slight strange phrasing to me.

RFC8520 says:
        These devices, which this memo refers to as Things, have a
        specific purpose.

the key point is that they are not, "general purpose devices" (like laptops,
and smartphones).  I'm not sure what to do with your comment; I'd like to
keep this connection to 8520, but maybe the phrase can be changed in some
useful way.
Okay.  Leave it as is.  I don’t think that it is wrong, it just sounds strange to me.  Perhaps other reviews or the RFC editor will have a better suggestion.


    > (3) p 2, sec 1.  Introduction

    >    [RFC8520] does not specify how MUD controllers establish their trust
    >    in the manufacturers' signing key: there are many possible solutions
    >    from manual configuration of trust anchors, some kind of automatic
    >    configuration during onboarding, but also including to Trust on
    > First
    >    Use (TOFU).  How this initial trust is established is not important
    >    for this document, it is sufficient that some satisfactory initial
    >    trust is established.

    > "but also including to" doesn't scan well to me.

Changed to:
  or a Trust on First Use (TOFU) mechanism that accepts the signer on first use.

Okay.

    > (4) p 3, sec 3.1.  Adding capabilities

    >    While there is an argument that old firmware was insecure and should
    >    be replaced, it is often the case that the upgrade process involves
    >    downtime, or can introduce risks due to needed evaluations not
    > having
    >    been completed yet.  As an example: moving vehicles (cars,
    > airplanes,
    >    etc.) should not perform upgrades while in motion!  It is probably
    >    undesirable to perform any upgrade to an airplane outside of its
    >    service facility.  A vehicle owner may desire only to perform
    >    software upgrades when they are at their residence.  Should there be
    >    a problem, they could make alternate arrangements for
    > transportation.
    >    This is constrasted with the situation when the vehicle is parked
    > at,
    >    for instance, a remote cabin.  The situation for upgrades of medical
    >    devices has even more considerations involving regulatory
    > compliance.



    > Perhaps change: This is contrasted with ... => This contrasts this with
    > an alternative situation where the vehicle is parked at, for instance,
    > a remote cabin, where an upgrade failure could cause a much greater
    > inconvenience.

Changed to:

} A vehicle owner may desire only to perform software upgrades when they are
} at their residence.   Should there be a problem, they could make alternate
} arrangements for transportation.
} This contrasts with an alternative situation where the vehicle is parked
} at, for instance, a remote cabin, where an upgrade failure could cause a much
} greater inconvenience.

It's sad that this is no longer a hypothetical situation :-(

Thanks.  I’ve noticed that I proposed text uses where … where.  I hence, I suggest changing the second one to “and where”.


    > (5) p 5, sec 4.  Updating the MUD URLs


    >    The QRcode mechanism is usually done via paper/stickers, and is
    >    typically not under the control of the device itself at all.
    >    However, being applied by a human and not easily changed, a MUD URL
    >    obtained in this fashion is likely trustworthy.  (It may not, due to
    >    mixups in labeling represent the correct device, but this is a human
    >    coordination issue, and is out of scope for this document.)


    > Is this definitely trustworthy?  E.g., we have a spate of scams in the
    > UK where folks put new QR codes on the parking machines directly folks
    > to pay at fraudulent websites instead.  This scenario is obviously
    > different, but would presunably still allow a supply-chain attack to
    > occur?

} However, being applied by a human and not easily changed, a MUD URL
} obtained in this fashion is likely as trustworthy as the rest of the vendors
} packaging.

It's hard to come up with a hack similiar to the parking machine attack.
The MUD QRcode is not for general consumption.  To be useful, an attacker
would have to:
a) find a device accessible.
b) disable or break the device such that it requires human intervention.
c) affix a phony QRcode to the device.
(d) affix a phony MAC address QRcode/barcode to device)
e) wait for human to come, fix the device, realize that it's not properly
   enrolled in their MUD controller, and scan it again.

What are the goals of the attacker?
If it's to enable attacks against the device from the outside, then replacing
the MUD file might work... if it's signed with a key that they enterprise
already trusts.  So this probably means changing the URL to be that of
another device that is trusted, and has the additional policy needed.
They also have to break the device sufficiently that it needs to go through
enrollment again, and be onboarded, but so much that it gets replaced, and/or
detached from it's location to be serviced in workshop.

If it's to enable another device (with a different MAC address) to become
accessible with the new policy, then (d) is required.  That is basically
doing a kind of social engineering attack, getting the admin person to
install some new policy.  Again, requires the signature to be valid.
And that the target MAC address isn't already in the MUD controller.

Perhaps someone else can come up with a different attack?
I think that most of the QRcodes will be scanned by the person who takes the
device out of the vendor's box.  Perhaps slipping extra QRcodes into boxes at
HomeDepot might work here.
Okay.  Thanks for the explanation.


    > (6) p 6, sec 4.2.  Concerns about same-signer mechanism

    >    This works as long as manufacturers use a single key to sign all
    >    products.  Some manufacturers could sign each product with a
    >    different key.  Going logically down this path, if all these product
    >    keys are collected into a single PKI, signed by a common
    >    certification authority.

    > The second sentence doesn't make sense to me.  Or otherwise, as a
    > paragraph it is incomplete.

Rewritten as:
} This works as long as manufacturers use a single key to sign all products.
} Some manufacturers could sign each product with a different key.
} Such manufacturers would probably then collect all the signing keys into a
} certificate infrastructure (PKI), with a single manufacturer CA key.
Okay.

    > (7) p 6, sec 5.  Proposed mechanism

    > Perhaps rename this section to "Proposed mechanism for updating MUD
    > URLs"?

done.

    > (8) p 7, sec 5.  Proposed mechanism

    >    Once the new MUD file is accepted, then it becomes the new "root"
    > MUD
    >    file, and any subsequent updates MUST be relative to the MUD-URL in
    >    the new file.


    > When could this actually change?  I.e., if it only accepts MUD files
    > with the same base URL then, by definition, they must all be peers of
    > each other, right?  Ah, the MUD-URL in the new MUD file can be used to
    > give a new canonical path of where the MUD file should be found.  I
    > think that this text would benefit from being a lot clearer.

Yes, they would all be in the same "directory"

I've rewritten a few parts in that section to use "canonical" rather than "root"
commit: 181d35c
https://github.com/IETF-OPSAWG-WG/draft-ietf-opsawg-mud-acceptable-urls/commit/181d35ce6d7db672135bee1ade432f24b75eabe0

Looks good.  Thanks.

    > (9) p 8, sec 5.1.1.  Changing file structure


    >    The manufacturer simply changes the MUD-URL contained with the files
    >    at the old location to have a value of
    >    https://example.com/mudfiles/toasters/model1945/mud.json.  The
    >    manufacturer must continue to serve the files from the old location
    >    for some time, or to return an HTTP 301 (Moved Permanently)
    >    redirecting to the new location.


    > Possibly it would be cleared to also indicate that the file must also
    > be served at the new location at the same time.  I.e., for a period of
    > time, the same mud file is served up at two different locations, only
    > one of which is regarded as being tbe canonical path.

https://github.com/IETF-OPSAWG-WG/draft-ietf-opsawg-mud-acceptable-urls/commit/13ad7e6

Okay.


    > (10) p 8, sec 5.1.2.  Changing hosting URLs


    >    The manufacturer simply changes the MUD-URL contained with the files
    >    at the old location to have a value of
    >    https://example.com/mudfiles/toasters/model1945/mud.json.  The
    >    manufacturer has to continue to host at the old location until such
    >    time as it is sure that all MUD controllers have loaded the new
    > data,
    >    and that all devices in the field have upgraded their URL.  A 301
    >    Redirect that changed the hostname SHOULD NOT be accepted by MUD
    >    controllers.

    > I'm not really convinced that this example is materially different from
    > the one above.

Yes, it's not materially different.
I included both examples because it's exactly these two scenarios that
technical people are likely to argue with marketing people (who think they
run the web sites) about.  I think that it will be easier for the technical
people to get their point across if both cases are explicitely spelt out.

Okay.


    > (11) p 9, sec 7.  Privacy Considerations


    >    The MUD URL contains sensitive model and even firmware revision
    >    numbers.  Thus the MUD URL identifies the make, model and revision
    > of
    >    a device.


    > Should this be "The MUD URL could contain sensitive model and ...,
    > thus, the MUD URL ..."?

fixed.

    > Nit level comments:


    > (12) p 4, sec 3.2.  Removing capabilities

    >    In this case, the old device will be performing unwanted
    > connections,
    >    and the MUD controller will be alerting the network owner that the
    >    device is misbehaving rather than not upgraded.  This causes a
    > false-
    >    positive situation (see [boycrieswolf]), leading to real security
    >    issues being ignored.  This is a serious issue as documented also in
    >    [boywolfinfosec], and [falsemalware].
    > "not upgraded" => "not being upgraded"

fixed.


    > (13) p 5, sec 4.1.  Leveraging the manufacturer signature

    >    When the first time a signature of the MUD file related to a
    >    particular device-type is verified by the MUD controller, the
    >    identity of the signing authority is recorded.  That it, the signing
    >    authority is pinned.  This policy means that subsequent MUD files
    >    must be signed by the same entity in order to be accepted.

    > "When the first time" => "The first time".

fixed.

    > (14) p 5, sec 4.1.  Leveraging the manufacturer signature
    >    The trust and acceptance of the first signer may come from many
    >    sources, for example, it could be manual configured to trust which
    >    signer, or using the IDevID mechanism for the first MUD URL and the
    >    signer of the corresponding MUD file is more trustworthy, or the MUD
    >    controller can use a Trust on First Use (TOFU) mechanism and trusts
    >    the first signer by default.

    > "... manual configured to trust which signer" doesn't scan well.
    > Perhaps something like "... manually configured to trust particular
    > signers, or, as a more trustworthy approach, use the IDevID mechanism
    > for the first MUD URL and as the signed of the corresponding MUD file,
    > "?

I've rewritten it slightly.
I think that the signer can only be TOFU if the URL came from a trusted
source, such as IDevID.
But, a URL that came from an untrusted source could be acceptable if the
signer is from a configured trust anchor.
https://github.com/IETF-OPSAWG-WG/draft-ietf-opsawg-mud-acceptable-urls/commit/7841c7c

Okay, but please tweak “The first signature be Trust” to “The first signature could be Trust” in the last changed sentence.

    > (15) p 6, sec 4.2.  Concerns about same-signer mechanism
    >    It is possible to invent policy mechanisms that would link the EE
    >    certificate to a value that is in the MUD file.  This could be a
    >    policy OID, or could involve some content in a subjectAltName.
    >    Future work could go in this direction.  This document proposes a
    >    simpler solution.

    > Probably "that direction" is better than "this direction".

fixed.



    > (16) p 9, sec 6.  Polling for changes in MUD files
    >    The manufacturer SHOULD serve mud files from a source for which ETag
    >    Section 2.3 of [RFC7232] may be generated.  Static files on disk
    >    satisfy this requirement.  MUD files generated from a database
    >    process might not.  The use of ETag allows a MUD controller to more
    >    efficiently poll for changes in the file.

    > s/mud/MUD/

fixed.

    > (17) p 10, sec 9.  Security Considerations
    >    3.  somehow get the manufacturer to sign the alternate MUD

    > ... alternative MUD file.


    > Grammar warnings from tooling:

    > Grammar Warnings: Section: 3.1, draft text: It is probably undesirable
    > to perform any upgrade to an airplane outside of its service facility.
    > Warning: This phrase is redundant. Consider using outside.  Suggested
    > change: "outside"

I don't get this suggestion.
The suggestion is to use “outside the service facility” rather than “outside of …”
Thanks,
Rob


    > Section: 5.1.2, draft text: The manufacturer has to continue to host at
    > the old location until such time as it is sure that all MUD controllers
    > have loaded the new data, and that all devices in the field have
    > upgraded their URL.  Warning: "It is sure" is uncommon. Consider using
    > certain.  Suggested change: "certain"

whole sentence got edited out.

    > Section: 7, draft text: Thus the MUD URL identifies the make, model and
    > revision of a device.  Warning: A comma may be missing after the
    > conjunctive/linking adverb 'Thus'.  Suggested change: "Thus,"

fixed.

    > Section: 9, draft text: Prior to the standardization of the process in
    > this document, if a device was infiltrated by malware, and said malware
    > wished to make accesses beyond what the current MUD file allowed, the
    > the malware would have to: Warning: Possible typo: you repeated a word
    > Suggested change: "the"

fixed.

    > Section: 9, draft text: A manufacturer which has not managed their MUD
    > files in the the way described here can deploy new directories of
    > per-product MUD files, and then can update the existing MUD files in
    > place to point to the new URLs using the MUD-URL attribute.  Warning:
    > Possible typo: you repeated a word Suggested change: "the"

fixed.

    > Section: 9.1, draft text: Developers should be aware that many
    > enterprise web sites use outsourced content distribution networks, and
    > MUD controllers are likely to cache files for some time.  Warning:
    > Nowadays, it's more common to write this as one word.  Suggested
    > change: "websites"

oh. okay. fixed.


--
Michael Richardson <mcr+IETF@sandelman.ca>   . o O ( IPv6 IøT consulting )
           Sandelman Software Works Inc, Ottawa and Worldwide