[OPSAWG] AD review of draft-ietf-opsawg-mud-acceptable-urls-09

"Rob Wilton (rwilton)" <rwilton@cisco.com> Mon, 05 February 2024 15:50 UTC

Return-Path: <rwilton@cisco.com>
X-Original-To: opsawg@ietfa.amsl.com
Delivered-To: opsawg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 226CCC14F614; Mon, 5 Feb 2024 07:50:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.595
X-Spam-Level:
X-Spam-Status: No, score=-14.595 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_KAM_HTML_FONT_INVALID=0.01, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CmcAYNk8iOpj; Mon, 5 Feb 2024 07:50:25 -0800 (PST)
Received: from rcdn-iport-5.cisco.com (rcdn-iport-5.cisco.com [173.37.86.76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2D6F6C14CE5D; Mon, 5 Feb 2024 07:50:25 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; i=@cisco.com; l=51668; q=dns/txt; s=iport; t=1707148225; x=1708357825; h=from:to:cc:subject:date:message-id:mime-version; bh=M6EvSEg6AM3O2y6X8kLXP5hCNBzdihn5I1J7EhFWN0c=; b=ASF+Eyif4C3RoO/myIkxRKtnujd5kIY0LnlFVVDP90lS0fFTdYkjQ8jp Eqv8CCs7JHorsR46KKoQ10pD0q451Kls24zeyJ9Hv98/b39EMm2eMVDb4 mMFle5GHEqQpjOimIOqFD/yyXiQjb0WixPNqtiGCfOlMfy+DkttOvKk0B c=;
X-CSE-ConnectionGUID: nFpIW8XmRzChh7xkJqLY+g==
X-CSE-MsgGUID: e9etXwdOTCusg6X8I2lOUQ==
X-IPAS-Result: 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
IronPort-PHdr: A9a23:zi9/2RAa8fJ2caAYMYmGUyQVpxdPi9zP1kY98JErjfdJaqu8us+kN 03E7vIrh1jMDs3X6PNB3vLfqLuoGXcB7pCIrG0YfdRSWgUEh8Qbk01oAMOMBUDhav+/Ryc7B 89FElRi+iLzKlBbTf73fEaauXiu9XgXExT7OxByI7HvBY/Wk8Ox/+uz4JbUJQ5PgWn1bbZ7N h7jtQzKrYFWmd54J6Q8wQeBrnpTLuJRw24pbV7GlBfn7cD295lmmxk=
IronPort-Data: A9a23:qRkJFqJ5x/B/w8J8FE+R+ZUlxSXFcZb7ZxGr2PjKsXjdYENSgWQGn WIYCzvVMvfZZTakeoh+O9zj/BtS6J7UndJmTVAd+CA2RRqmiyZq6fd1j6vUF3nPRiEWZBs/t 63yUvGZcYZsCCea/0/xWlTYhSEU/bmSQbbhA/LzNCl0RAt1IA8skhsLd9QR2uaEuvDnRVvQ0 T/Oi5eHYgP9gWYpajt8B5+r8XuDgtyj4Fv0gXRmDRx7lAe2v2UYCpsZOZawIxPQKmWDNrfnL wpr5OjRElLxp3/BOPv8+lrIWhFirorpAOS7oiE+t55OLfR1jndaPq4TbJLwYKrM4tmDt4gZJ N5l7fRcReq1V0HBsLx1bvVWL81xFato4J74cUi6i964z02ZY3jO2tFfT05jaOX0+s4vaY1P3 eYTJDZIZReZiqfqhrm6UeJrwM8kKaEHPqtG5Somlm6fXK1gGM2eK0nJzYcwMDMYnN9PGerZY eISaCFka1LLZBgn1lI/UcJixb/52yOuG9FegF/EqLYH/GT08Cdsy7ezAIr0INitePwAyy50o UqdojymWUtFXDCF8hKC6mmlmeDnnC7nVsQVDrLQ3vJwiVOPg20eFBNTUkOgqOa2z0ujV5dWI EcZ4jYnp6w/sVGxSsK7Vhm8iH+JohBaXMBfe9DW8ymXwabSpg2eHGVBEnhKaccts4k9QjlCO kK1c83BAxJ3kYLFeXen5JyUrWyiOgoMCV5BanpRJeca2OXLrIY2hxPJa99sFq+pk9H4cQ0cJ RjX80DSYJ1O3aY2O7WHwLzRv967SnH0ouMd/A7bWCeu6Rl0IdLjbI2z4l+d5vFFRGp4crVjl CZV8yR9xLlSZX1oqMBraL5VdF1Oz63VWAAweXY1Q/EcG82FohZPh7x47jBkP1tOOc0ZYzLva 0K7kVoOvMALYyD1NvQpM9jZ5yEWIU7ISISNuhf8M4smX3SNXFHvENxGPBfPjz63zCDAb4lvY 8bznTmQ4YYyUvk/k2HsGI/xIJcgxzs1wivIVIvnwhG8mbuYbzj9dFv2GAXmUwzN14vd+F+92 48Gb6OikkwDOMWgOXO/2dBIcjg3wY0TWMqeRzp/LLDTe2KL2QgJVpfs/F/WU9c4wf0IyruQo i/Vt40x4AOXuEAr4D6iMxhLQLjuRp1463k8OEQR0ZyAgBDPva7HAH8jSqYK
IronPort-HdrOrdr: A9a23:QIzk/KACtEFDC7flHejxsseALOsnbusQ8zAXPh9KOH9om52j9/ xGws576fatskdsZJhBo7y90KnpewK7yXcH2/hvAV7CZnithILGFvAZ0WKP+UyFJ8SczJ8R6U 4DSdkCNDSYNzET5qiKgnjcLz9K+qj/zEncv5ak854bd3ATV0gP1XYfNi+rVmdNaE1tA50/GJ CA5sxBiQaBVB0sBPiTNz0uZcSGg8fEuq7HTHc9aiLP7jPgsRqYrJrBVzSI1BYXVD1ChZ0493 LergD/7qK/99mm1x71zQbonttrseqk7uEGKN2Hi8ATJDmpoB2vfp5dV7qLuy1wiP2z6WwtjM LHr34bTopOAjLqDyCISCnWqkrdOQUVmj3fIJij8D7eSPnCNXIH4gx69MZkm1Ximg0dVZpHod x2Niqixutq5FX77WjADxyibWAyqqJyykBS19I7njhRV5ATZ6RWqpFa9ERJEI0YFCa/84w/Fv JyZfusrcq+XGnqGEwxhFMftuCETzA2BFOLU0ICssua33xfm2141VIRwIgakm0b/JwwRpFY76 CcW54Y341mX4sTd+ZwFe0BScy4BijERg/NKnubJRDiGLscM3zAppbr6PE+5f2sepYP0Jwu8a 6xGG9wpCo3YQbjGMeO1JpE/lTER3i8Ry3kzoVE651wqtTHNc7W2O24OSUTeueb0oci65fgKo aO0bptcozeEVc=
X-Talos-CUID: 9a23:stea12oiXo4Bj1Cj4wmZPoTmUcYLalzinEfVGV2TCWY2WL63UHuhu6wxxg==
X-Talos-MUID: 9a23:LOcLJw0RJCu+Xu8v7mM6+Op9STUj7vWjFHASnbI6kNSfOnJAaxbHiBOKe9py
X-IronPort-Anti-Spam-Filtered: true
Received: from rcdn-core-4.cisco.com ([173.37.93.155]) by rcdn-iport-5.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 05 Feb 2024 15:50:24 +0000
Received: from rcdn-opgw-3.cisco.com (rcdn-opgw-3.cisco.com [72.163.7.164]) by rcdn-core-4.cisco.com (8.15.2/8.15.2) with ESMTPS id 415FoO8b011771 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 5 Feb 2024 15:50:24 GMT
X-CSE-ConnectionGUID: 7OmXZj9CT4KX09KERD2gng==
X-CSE-MsgGUID: JTm7c4AVRUmfz/lA1sgRGw==
Authentication-Results: rcdn-opgw-3.cisco.com; dkim=pass (signature verified) header.i=@cisco.com; spf=Pass smtp.mailfrom=rwilton@cisco.com; dmarc=pass (p=reject dis=none) d=cisco.com
X-IronPort-AV: E=Sophos;i="6.05,245,1701129600"; d="scan'208,217";a="12267075"
Received: from mail-dm6nam12lp2168.outbound.protection.outlook.com (HELO NAM12-DM6-obe.outbound.protection.outlook.com) ([104.47.59.168]) by rcdn-opgw-3.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 05 Feb 2024 15:50:23 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=jq+Ya+sc/JfsIhfvI/Epwv0FbugHCP7opumGYP/BCt4nTwm6/UOrW3dTHoZwN+89bth7JlCzYX+VncX53TFEhPn4CG8EtjZ3827EjNODKJlgmKCaATS9FWP/pUimR52XtDH8rR4WGDoUhI8AmhpyTAOswzUSCF/q4TpqN08ymwh2vpnNLldV9Mu7ohK9jWHZYK4UgAZb5SlC7ZnyctvUxsHKpoMXSo0GDdB0ilUMAW1hYeLmN15h/Xby/WSUMBH1TgvOLn1s3gl9EP8jTFO6F07WoP9O5dimi7sLDZdJ84PBBKggfzwSMGp1jl/dNmphP0ZizuwkGLRGlFXVTsZZEA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=M6EvSEg6AM3O2y6X8kLXP5hCNBzdihn5I1J7EhFWN0c=; b=IxAk07V5WTnFgBPrm4Z+J6OAvqsv8lvflcCNAsxAP1CdkeJ0Ez3t8H2ri6CmPeo6aksIEL+87qbtXBQKRBRGxV0Pb1vDZlG7o8pxN4VBGFBpK5CLKHysNwoaot6e5npms1CZBgWaoSGkQA99xExNy7QzISYxGOU0Zeqmy20h+0MlxwN0lP2nEGC1np/ox5Nbt3WauWKRYs+Ovo0+Q0VdDxskyIgJDMq8k4ol1vQMnL5HoRvCLFTmrng5ILflPi64H8AAZspexmYHMVRFn7dJxec7Lff1ESAd1gVFkUK3akYJ73XnEFCZa9FnxI4m7VbbBU7l1L0DtLw5eG+ttY8VUQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
Received: from LV8PR11MB8536.namprd11.prod.outlook.com (2603:10b6:408:1ec::19) by SA2PR11MB4955.namprd11.prod.outlook.com (2603:10b6:806:fa::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7249.34; Mon, 5 Feb 2024 15:50:21 +0000
Received: from LV8PR11MB8536.namprd11.prod.outlook.com ([fe80::f662:b8bc:6176:256d]) by LV8PR11MB8536.namprd11.prod.outlook.com ([fe80::f662:b8bc:6176:256d%2]) with mapi id 15.20.7249.035; Mon, 5 Feb 2024 15:50:21 +0000
From: "Rob Wilton (rwilton)" <rwilton@cisco.com>
To: "draft-ietf-opsawg-mud-acceptable-urls.all@ietf.org" <draft-ietf-opsawg-mud-acceptable-urls.all@ietf.org>
CC: "opsawg@ietf.org" <opsawg@ietf.org>, Mahesh Jethanandani <mjethanandani@gmail.com>
Thread-Topic: AD review of draft-ietf-opsawg-mud-acceptable-urls-09
Thread-Index: AQHaWElL98Ho1PrVZ0+Yzb+MpVSn1w==
Date: Mon, 05 Feb 2024 15:50:21 +0000
Message-ID: <LV8PR11MB8536F7B2D68E55E8B1A6AFAFB5472@LV8PR11MB8536.namprd11.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: LV8PR11MB8536:EE_|SA2PR11MB4955:EE_
x-ms-office365-filtering-correlation-id: 4292ce9e-c931-4deb-c8bd-08dc266228e1
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:LV8PR11MB8536.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(366004)(346002)(396003)(376002)(136003)(39860400002)(230273577357003)(230922051799003)(1800799012)(64100799003)(451199024)(186009)(55016003)(41300700001)(2906002)(30864003)(66574015)(83380400001)(6506007)(7696005)(71200400001)(166002)(38100700002)(122000001)(9686003)(316002)(66556008)(66446008)(966005)(64756008)(6916009)(86362001)(478600001)(54906003)(66476007)(91956017)(38070700009)(66946007)(4326008)(8676002)(8936002)(76116006)(66899024)(52536014)(33656002)(5660300002); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_LV8PR11MB8536F7B2D68E55E8B1A6AFAFB5472LV8PR11MB8536namp_"
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: LV8PR11MB8536.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 4292ce9e-c931-4deb-c8bd-08dc266228e1
X-MS-Exchange-CrossTenant-originalarrivaltime: 05 Feb 2024 15:50:21.4236 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: g6sRIL37z/0jNafMZA+fKVa3uqe3O0l/qcz+MnN0Ak8AWSHWQPl9o+Xw8dWpBsK2EJQo1eSVkbtJswOGEHSBXg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA2PR11MB4955
X-Outbound-SMTP-Client: 72.163.7.164, rcdn-opgw-3.cisco.com
X-Outbound-Node: rcdn-core-4.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsawg/Pb_Hm3X3cz8tdwEDoo2eUFflrZM>
Subject: [OPSAWG] AD review of draft-ietf-opsawg-mud-acceptable-urls-09
X-BeenThere: opsawg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: OPSA Working Group Mail List <opsawg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsawg>, <mailto:opsawg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsawg/>
List-Post: <mailto:opsawg@ietf.org>
List-Help: <mailto:opsawg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsawg>, <mailto:opsawg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 05 Feb 2024 15:50:29 -0000

Hi authors, WG,

Here is my AD review of draft-ietf-opsawg-mud-acceptable-urls-09.

I reviewed this doc slightly out of sequence because it was related to other MUD files that I was reviewing and also my recent discuss on draft-ietf-suit-mud-07<https://datatracker.ietf.org/doc/draft-ietf-suit-mud/>.

I think that the document is fine and reasonably clear but could do with a bit of language clean up and clarity in a few places.  I’ve included my review comments below and also some grammar nits from a grammar tool at the end.


I think that these updates should be pretty easy to do, so if you are able to act on them and preferably get a revised ID by this Thursday, then it increases the chance that I can get this processed through the IESG evaluation before Mahesh takes over.



Moderate level comments:



(1) p 2, sec 3.  Updating the MUD files in place



Would it a better title for this section be: "Possible issues with updating MUD files in place"?







Minor level comments:



(2) p 1, sec 1.  Introduction



   [RFC8520] provides a standardized way to describe how a specific

   purpose device makes use of Internet resources and associated

   suggested network behavior.  The behaviors are described in a MUD

   file hosted in its manufacturer's server.  The device provides a MUD

   URL to the network manager, which can locate this MUD file and

   determine the required network authorization of the device.



"specific purpose device" sounds like slight strange phrasing to me.





(3) p 2, sec 1.  Introduction



   [RFC8520] does not specify how MUD controllers establish their trust

   in the manufacturers' signing key: there are many possible solutions

   from manual configuration of trust anchors, some kind of automatic

   configuration during onboarding, but also including to Trust on First

   Use (TOFU).  How this initial trust is established is not important

   for this document, it is sufficient that some satisfactory initial

   trust is established.



"but also including to" doesn't scan well to me.





(4) p 3, sec 3.1.  Adding capabilities



   While there is an argument that old firmware was insecure and should

   be replaced, it is often the case that the upgrade process involves

   downtime, or can introduce risks due to needed evaluations not having

   been completed yet.  As an example: moving vehicles (cars, airplanes,

   etc.) should not perform upgrades while in motion!  It is probably

   undesirable to perform any upgrade to an airplane outside of its

   service facility.  A vehicle owner may desire only to perform

   software upgrades when they are at their residence.  Should there be

   a problem, they could make alternate arrangements for transportation.

   This is constrasted with the situation when the vehicle is parked at,

   for instance, a remote cabin.  The situation for upgrades of medical

   devices has even more considerations involving regulatory compliance.



Perhaps change: This is contrasted with ... => This contrasts this with an alternative situation where the vehicle is parked at, for instance, a remote cabin, where an upgrade failure could cause a much greater inconvenience.





(5) p 5, sec 4.  Updating the MUD URLs



   The QRcode mechanism is usually done via paper/stickers, and is

   typically not under the control of the device itself at all.

   However, being applied by a human and not easily changed, a MUD URL

   obtained in this fashion is likely trustworthy.  (It may not, due to

   mixups in labeling represent the correct device, but this is a human

   coordination issue, and is out of scope for this document.)



Is this definitely trustworthy?  E.g., we have a spate of scams in the UK where folks put new QR codes on the parking machines directly folks to pay at fraudulent websites instead.  This scenario is obviously different, but would presunably still allow a supply-chain attack to occur?





(6) p 6, sec 4.2.  Concerns about same-signer mechanism



   This works as long as manufacturers use a single key to sign all

   products.  Some manufacturers could sign each product with a

   different key.  Going logically down this path, if all these product

   keys are collected into a single PKI, signed by a common

   certification authority.



The second sentence doesn't make sense to me.  Or otherwise, as a paragraph it is incomplete.





(7) p 6, sec 5.  Proposed mechanism



Perhaps rename this section to "Proposed mechanism for updating MUD URLs"?





(8) p 7, sec 5.  Proposed mechanism



   Once the new MUD file is accepted, then it becomes the new "root" MUD

   file, and any subsequent updates MUST be relative to the MUD-URL in

   the new file.



When could this actually change?  I.e., if it only accepts MUD files with the same base URL then, by definition, they must all be peers of each other, right?  Ah, the MUD-URL in the new MUD file can be used to give a new canonical path of where the MUD file should be found.  I think that this text would benefit from being a lot clearer.





(9) p 8, sec 5.1.1.  Changing file structure



   The manufacturer simply changes the MUD-URL contained with the files

   at the old location to have a value of

   https://example.com/mudfiles/toasters/model1945/mud.json.  The

   manufacturer must continue to serve the files from the old location

   for some time, or to return an HTTP 301 (Moved Permanently)

   redirecting to the new location.



Possibly it would be cleared to also indicate that the file must also be served at the new location at the same time.  I.e., for a period of time, the same mud file is served up at two different locations, only one of which is regarded as being tbe canonical path.





(10) p 8, sec 5.1.2.  Changing hosting URLs



   The manufacturer simply changes the MUD-URL contained with the files

   at the old location to have a value of

   https://example.com/mudfiles/toasters/model1945/mud.json.  The

   manufacturer has to continue to host at the old location until such

   time as it is sure that all MUD controllers have loaded the new data,

   and that all devices in the field have upgraded their URL.  A 301

   Redirect that changed the hostname SHOULD NOT be accepted by MUD

   controllers.



I'm not really convinced that this example is materially different from the one above.





(11) p 9, sec 7.  Privacy Considerations



   The MUD URL contains sensitive model and even firmware revision

   numbers.  Thus the MUD URL identifies the make, model and revision of

   a device.



Should this be "The MUD URL could contain sensitive model and ..., thus, the MUD URL ..."?







Nit level comments:



(12) p 4, sec 3.2.  Removing capabilities



   In this case, the old device will be performing unwanted connections,

   and the MUD controller will be alerting the network owner that the

   device is misbehaving rather than not upgraded.  This causes a false-

   positive situation (see [boycrieswolf]), leading to real security

   issues being ignored.  This is a serious issue as documented also in

   [boywolfinfosec], and [falsemalware].



"not upgraded" => "not being upgraded"





(13) p 5, sec 4.1.  Leveraging the manufacturer signature



   When the first time a signature of the MUD file related to a

   particular device-type is verified by the MUD controller, the

   identity of the signing authority is recorded.  That it, the signing

   authority is pinned.  This policy means that subsequent MUD files

   must be signed by the same entity in order to be accepted.



"When the first time" => "The first time".





(14) p 5, sec 4.1.  Leveraging the manufacturer signature



   The trust and acceptance of the first signer may come from many

   sources, for example, it could be manual configured to trust which

   signer, or using the IDevID mechanism for the first MUD URL and the

   signer of the corresponding MUD file is more trustworthy, or the MUD

   controller can use a Trust on First Use (TOFU) mechanism and trusts

   the first signer by default.



"... manual configured to trust which signer" doesn't scan well.  Perhaps something like "... manually configured to trust particular signers, or, as a more trustworthy approach, use the IDevID mechanism for the first MUD URL and as the signed of the corresponding MUD file, "?





(15) p 6, sec 4.2.  Concerns about same-signer mechanism



   It is possible to invent policy mechanisms that would link the EE

   certificate to a value that is in the MUD file.  This could be a

   policy OID, or could involve some content in a subjectAltName.

   Future work could go in this direction.  This document proposes a

   simpler solution.



Probably "that direction" is better than "this direction".





(16) p 9, sec 6.  Polling for changes in MUD files



   The manufacturer SHOULD serve mud files from a source for which ETag

   Section 2.3 of [RFC7232] may be generated.  Static files on disk

   satisfy this requirement.  MUD files generated from a database

   process might not.  The use of ETag allows a MUD controller to more

   efficiently poll for changes in the file.



s/mud/MUD/





(17) p 10, sec 9.  Security Considerations



   3.  somehow get the manufacturer to sign the alternate MUD



... alternative MUD file.



Grammar warnings from tooling:

Grammar Warnings:
Section: 3.1, draft text:
It is probably undesirable to perform any upgrade to an airplane outside of its service facility.
Warning:  This phrase is redundant. Consider using outside.
Suggested change:  "outside"

Section: 5.1.2, draft text:
The manufacturer has to continue to host at the old location until such time as it is sure that all MUD controllers have loaded the new data, and that all devices in the field have upgraded their URL.
Warning:  "It is sure" is uncommon. Consider using certain.
Suggested change:  "certain"

Section: 7, draft text:
Thus the MUD URL identifies the make, model and revision of a device.
Warning:  A comma may be missing after the conjunctive/linking adverb 'Thus'.
Suggested change:  "Thus,"

Section: 9, draft text:
Prior to the standardization of the process in this document, if a device was infiltrated by malware, and said malware wished to make accesses beyond what the current MUD file allowed, the the malware would have to:
Warning:  Possible typo: you repeated a word
Suggested change:  "the"

Section: 9, draft text:
A manufacturer which has not managed their MUD files in the the way described here can deploy new directories of per-product MUD files, and then can update the existing MUD files in place to point to the new URLs using the MUD-URL attribute.
Warning:  Possible typo: you repeated a word
Suggested change:  "the"

Section: 9.1, draft text:
Developers should be aware that many enterprise web sites use outsourced content distribution networks, and MUD controllers are likely to cache files for some time.
Warning:  Nowadays, it's more common to write this as one word.
Suggested change:  "websites"


Thanks,
Rob