
From nobody Sun Nov  1 15:30:05 2020
Return-Path: <mcr+ietf@sandelman.ca>
X-Original-To: mud@ietfa.amsl.com
Delivered-To: mud@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 614653A0948 for <mud@ietfa.amsl.com>; Sun,  1 Nov 2020 15:30:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level: 
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0-ZRZBkOmy7P for <mud@ietfa.amsl.com>; Sun,  1 Nov 2020 15:30:01 -0800 (PST)
Received: from tuna.sandelman.ca (tuna.sandelman.ca [IPv6:2607:f0b0:f:3:216:3eff:fe7c:d1f3]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 66E4E3A0962 for <mud@ietf.org>; Sun,  1 Nov 2020 15:30:01 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by tuna.sandelman.ca (Postfix) with ESMTP id 9CB283899E for <mud@ietf.org>; Sun,  1 Nov 2020 18:36:58 -0500 (EST)
Received: from tuna.sandelman.ca ([127.0.0.1]) by localhost (localhost [127.0.0.1]) (amavisd-new, port 10024) with LMTP id nZtrBGsNw0B4 for <mud@ietf.org>; Sun,  1 Nov 2020 18:36:56 -0500 (EST)
Received: from sandelman.ca (obiwan.sandelman.ca [IPv6:2607:f0b0:f:2::247]) by tuna.sandelman.ca (Postfix) with ESMTP id 8B2053899D for <mud@ietf.org>; Sun,  1 Nov 2020 18:36:56 -0500 (EST)
Received: from localhost (localhost [IPv6:::1]) by sandelman.ca (Postfix) with ESMTP id CAFED1D2 for <mud@ietf.org>; Sun,  1 Nov 2020 18:29:57 -0500 (EST)
From: Michael Richardson <mcr+ietf@sandelman.ca>
To: mud@ietf.org
X-Mailer: MH-E 8.6+git; nmh 1.7+dev; GNU Emacs 26.1
X-Face: $\n1pF)h^`}$H>Hk{L"x@)JS7<%Az}5RyS@k9X%29-lHB$Ti.V>2bi.~ehC0; <'$9xN5Ub# z!G,p`nR&p7Fz@^UXIn156S8.~^@MJ*mMsD7=QFeq%AL4m<nPbLgmtKK-5dC@#:k
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="==-=-="; micalg=pgp-sha512; protocol="application/pgp-signature"
Date: Sun, 01 Nov 2020 18:29:57 -0500
Message-ID: <24161.1604273397@localhost>
Archived-At: <https://mailarchive.ietf.org/arch/msg/mud/s4nMfFct66jQgft0-y1unR-hy0w>
Subject: [Mud] MAC Address Device Identification for Network and Application Services
X-BeenThere: mud@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussion of Manufacturer Ussage Descriptions <mud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mud>, <mailto:mud-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mud/>
List-Post: <mailto:mud@ietf.org>
List-Help: <mailto:mud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mud>, <mailto:mud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 01 Nov 2020 23:30:04 -0000

--==-=-=
Content-Type: multipart/mixed; boundary="=-=-="

--=-=-=
Content-Type: text/plain


I think that this is particularly relevant to RFC8520 implementations.

Ultimately, what I see is that we need stronger device identities with
increased used of 802.1X, and devices will need to re-authenticate when they
change address.


--=-=-=
Content-Type: message/rfc822
Content-Disposition: inline; filename=1002
Content-Description: forwarded message

Return-Path: <dhcwg-bounces@ietf.org>
Received: from tuna.sandelman.ca [2607:f0b0:f:3::184]
	by localhost with IMAP (fetchmail-6.4.0.beta4)
	for <mcr@sandelman.ca> (single-drop); Sun, 01 Nov 2020 18:19:00 -0500 (EST)
Received: from tuna.sandelman.ca ([unix socket])
	 by tuna (Cyrus git2.4.17+0-Debian-2.4.17+nocaldav-0+deb8u2) with LMTPA;
	 Sun, 01 Nov 2020 17:04:06 -0500
X-Sieve: CMU Sieve 2.4
Received: from localhost (localhost [127.0.0.1])
	by tuna.sandelman.ca (Postfix) with ESMTP id 17A073899F
	for <mcr@sandelman.ca>; Sun,  1 Nov 2020 17:04:06 -0500 (EST)
Received: from tuna.sandelman.ca ([127.0.0.1])
	by localhost (localhost [127.0.0.1]) (amavisd-new, port 10024)
	with LMTP id WDncFkHUHUH2 for <mcr@sandelman.ca>;
	Sun,  1 Nov 2020 17:04:03 -0500 (EST)
Received: from mail.ietf.org (mail.ietf.org [4.31.198.44])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by tuna.sandelman.ca (Postfix) with ESMTPS id 943EC389A0
	for <mcr+ietf@sandelman.ca>; Sun,  1 Nov 2020 17:04:02 -0500 (EST)
Received: from ietfa.amsl.com (localhost [IPv6:::1])
	by ietfa.amsl.com (Postfix) with ESMTP id A4ADC3A09B5
	for <mcr+ietf@sandelman.ca>; Sun,  1 Nov 2020 13:57:02 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ietf.org; s=ietf1;
	t=1604267822; bh=u6SWui9usX+vNTARQMnzgy0G5J8gk7IhXwl8mGVKYp4=;
	h=References:In-Reply-To:From:Date:To:Subject:List-Id:
	 List-Unsubscribe:List-Archive:List-Post:List-Help:List-Subscribe;
	b=v/ub4epZ9GsqjoEqOc8+nKdeY9cK47IVJkQnrnkzfT3HqyQkWIodOm5Tk0IXD9gQJ
	 akNnVzHxCbvOifdkxN6qPTzdGFgiozl3geFHTL8RTe6fGr78t8JQGJD4bZum9te2Pt
	 wc4BOrALHD//AiB4mpe82UI31kqNfJxW6CwOz+9E=
X-Mailbox-Line: From dhcwg-bounces@ietf.org  Sun Nov  1 13:57:01 2020
Received: from ietfa.amsl.com (localhost [IPv6:::1])
	by ietfa.amsl.com (Postfix) with ESMTP id C06F93A0983;
	Sun,  1 Nov 2020 13:57:01 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ietf.org; s=ietf1;
	t=1604267821; bh=u6SWui9usX+vNTARQMnzgy0G5J8gk7IhXwl8mGVKYp4=;
	h=References:In-Reply-To:From:Date:To:Subject:List-Id:
	 List-Unsubscribe:List-Archive:List-Post:List-Help:List-Subscribe;
	b=l8RjXzS7UMDT75SWtVT7SuUemQyBa+Denq4u4w3qu8FppFxuOup16DrZZ4NNixrUu
	 EMWXQIo4P50T393tsaanjZ9MMSCc1Cu2bk2V9uZPWGwt8lKM+72A1rTwEbqTJn9ryr
	 nUiJNBY22iUYpz8BXvUOutXT9XgqUB65Fa6VEn+c=
X-Original-To: dhcwg@ietfa.amsl.com
Delivered-To: dhcwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1])
 by ietfa.amsl.com (Postfix) with ESMTP id 707973A0994
 for <dhcwg@ietfa.amsl.com>; Sun,  1 Nov 2020 13:56:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key)
 header.d=ieee.org
Received: from mail.ietf.org ([4.31.198.44])
 by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id c6Dcz2D0nSz8 for <dhcwg@ietfa.amsl.com>;
 Sun,  1 Nov 2020 13:56:57 -0800 (PST)
Received: from mail-il1-x129.google.com (mail-il1-x129.google.com
 [IPv6:2607:f8b0:4864:20::129])
 (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
 (No client certificate requested)
 by ietfa.amsl.com (Postfix) with ESMTPS id 715C53A0990
 for <dhcwg@ietf.org>; Sun,  1 Nov 2020 13:56:32 -0800 (PST)
Received: by mail-il1-x129.google.com with SMTP id a20so11249502ilk.13
 for <dhcwg@ietf.org>; Sun, 01 Nov 2020 13:56:32 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ieee.org; s=google;
 h=mime-version:references:in-reply-to:from:date:message-id:subject:to;
 bh=EbZ5+8CDBRUfDLGTpqiblsCdSrsOoXOVZriwuoqasFM=;
 b=PwEegNzqRSPSDdU+jP1PNmu+tzDUmPhUklaGPSisOp/TViua4y/3hyJ9Bldo11ceQz
 xSJuel04aT+gqa0QM8+vBD24vqUI6E5luDghV5BaeICBKmncrS0+H25eSw9dD6q+oGxj
 1NT6F5+kLJKHcNcMLrBcpclmx5boMnsPgE8UM=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:references:in-reply-to:from:date
 :message-id:subject:to;
 bh=EbZ5+8CDBRUfDLGTpqiblsCdSrsOoXOVZriwuoqasFM=;
 b=ThfRgjER4aRB/ETxwPmXQQMiyrHEhuplNBq+Omn2uqvtZOKXXjQr9o4QzTzcM6XqGg
 3j230MObWxC9jD3F/2IAYl0I1MPDQGrAjrRXA903+ZXoC3aKxbFwCY5Z1GcJBl8Wi0mY
 d2WZpiDJC064dpz3T7FDt7kPay+nlXRWz/4Asjz4HugaXBH/svdQpb0ozX946s1j5z3U
 p+8gszdHKcVinbxSdZ8uGpMY+BRRFt80KlnEJO/Ue+3xKv8nhFQPM5sVXoJAdxFQO4kR
 5Q5Ka/RHDrZ3UthZJ+B3T0sW75aWTJpct1OXIiZ5Kc1A5L79wvGx2bdIsLteHFB8pDCC
 kffA==
X-Gm-Message-State: AOAM530vP6BkJJqUc44jC6SG0PR65MaC8Tvl+3X5HU4ShWrTd3byOjAd
 xopK7nXvw5soSFyRk6q6srK9c7xXZW8paIhjOpP6p26nACPZYg==
X-Google-Smtp-Source: ABdhPJypPtzPfBTvKijznidh9i5sIHsdTGjrFp8Y96HNN4F3TSFzTCXh9GADa4cV32r6qjwms7GiNHIUCKKuL8DRnMQ=
X-Received: by 2002:a05:6e02:1252:: with SMTP id
 j18mr8477851ilq.119.1604267791537;
 Sun, 01 Nov 2020 13:56:31 -0800 (PST)
MIME-Version: 1.0
References: <160407478723.4708.16590139659517606146@ietfa.amsl.com>
In-Reply-To: <160407478723.4708.16590139659517606146@ietfa.amsl.com>
From: Juan Carlos Zuniga <j.c.zuniga@ieee.org>
Date: Sun, 1 Nov 2020 16:56:20 -0500
Message-ID: <CAHLBt83DN3OxhXbkFKPBh7KbPFvKJKjgdf5UfoGVSsTJh6+H=Q@mail.gmail.com>
To: int-area@ietf.org, dhcwg@ietf.org
Archived-At: <https://mailarchive.ietf.org/arch/msg/dhcwg/eZGtvYBVAd3CwWUc5A8wn63H0IY>
Subject: [dhcwg] BoF and Non-WG Mailing List: madinas -- MAC Address Device
 Identification for Network and Application Services
X-BeenThere: dhcwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <dhcwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dhcwg>,
 <mailto:dhcwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dhcwg/>
List-Post: <mailto:dhcwg@ietf.org>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dhcwg>,
 <mailto:dhcwg-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============2067224279029139267=="
Errors-To: dhcwg-bounces@ietf.org
Sender: "dhcwg" <dhcwg-bounces@ietf.org>

--===============2067224279029139267==
Content-Type: multipart/alternative; boundary="000000000000d706ff05b312b35b"

--000000000000d706ff05b312b35b
Content-Type: text/plain; charset="UTF-8"

Hello all,

At IETF109 there will be a BoF to discuss MAC address randomization and
implications on network and application services.

If you are interested in the topic please join the mailing list.

A draft agenda of the BoF can be found here:
https://github.com/jlivingood/IETF109BoF/blob/master/109-Agenda.md

Best,

Juan-Carlos


---------- Forwarded message ---------
From: IETF Secretariat <ietf-secretariat@ietf.org>
Date: Fri, Oct 30, 2020 at 12:19 PM
Subject: New Non-WG Mailing List: madinas -- MAC Address Device
Identification for Network and Application Services
To: IETF Announcement List <ietf-announce@ietf.org>
Cc: <madinas@ietf.org>, <j.c.zuniga@ieee.org>, <evyncke@cisco.com>


A new IETF non-working group email list has been created.

List address: madinas@ietf.org
Archive: https://mailarchive.ietf.org/arch/browse/madinas/
To subscribe: https://www.ietf.org/mailman/listinfo/madinas

Purpose:
This list is for discussion of the MAC Address Device Identification for
Network and Application Services (MADINAS) BOF at IETF 109.

Major operating systems have implemented and deployed MAC Address
randomization features to enhance device and user privacy, as randomization
can help avoid device identification. Device identification by MAC address
is often used in ways that do not invade privacy, but that provides useful
services to the device user. These services include network optimization,
access control, usage counting, and security and user protection services.
Some examples are LAN forwarding policy, sticky DHCP IP assignments, static
NAT policy and MAC address ACL for blocking malicious or unwanted devices.
In those situations, the deployment of MAC address randomization results in
unintended and likely unforeseen impacts to the network, systems and
applications external to the device implementing randomization.

This illustrates a potential need for the networking community (OS vendors,
device manufacturers, application developers and network operators) to work
more closely together to solve the needs of the end users. In some cases, a
greater awareness by Network and Application Services to current MAC
address usage may be enough. For other cases, a new solution may need to be
developed and standardized to reach the desired outcome. The proponents of
this BoF are interested in determining if there is sufficient support in
the IETF community to define best practices, update any existing documents
if needed, or potentially develop new protocols or mechanisms for service
continuity in the presence of MAC Address randomization.
This list belongs to IETF area: INT

For additional information, please contact the list administrators.

--000000000000d706ff05b312b35b
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hello all,<div><br></div><div>At IETF109 there will be a B=
oF to discuss MAC address randomization and implications on network and app=
lication services.</div><div><br></div><div>If you are interested in the to=
pic please join the mailing list.</div><div><br></div><div>A draft agenda o=
f the BoF can be found here:</div><div><a href=3D"https://github.com/jlivin=
good/IETF109BoF/blob/master/109-Agenda.md">https://github.com/jlivingood/IE=
TF109BoF/blob/master/109-Agenda.md</a><br></div><div><br></div><div>Best,</=
div><div><br></div><div>Juan-Carlos=C2=A0</div><div><br><br><div class=3D"g=
mail_quote"><div dir=3D"ltr" class=3D"gmail_attr">---------- Forwarded mess=
age ---------<br>From: <strong class=3D"gmail_sendername" dir=3D"auto">IETF=
 Secretariat</strong> <span dir=3D"auto">&lt;<a href=3D"mailto:ietf-secreta=
riat@ietf.org">ietf-secretariat@ietf.org</a>&gt;</span><br>Date: Fri, Oct 3=
0, 2020 at 12:19 PM<br>Subject: New Non-WG Mailing List: madinas -- MAC Add=
ress Device Identification for Network and Application Services<br>To: IETF=
 Announcement List &lt;<a href=3D"mailto:ietf-announce@ietf.org">ietf-annou=
nce@ietf.org</a>&gt;<br>Cc:  &lt;<a href=3D"mailto:madinas@ietf.org">madina=
s@ietf.org</a>&gt;,  &lt;<a href=3D"mailto:j.c.zuniga@ieee.org">j.c.zuniga@=
ieee.org</a>&gt;,  &lt;<a href=3D"mailto:evyncke@cisco.com">evyncke@cisco.c=
om</a>&gt;<br></div><br><br>A new IETF non-working group email list has bee=
n created.<br>
<br>
List address: <a href=3D"mailto:madinas@ietf.org" target=3D"_blank">madinas=
@ietf.org</a><br>
Archive: <a href=3D"https://mailarchive.ietf.org/arch/browse/madinas/" rel=
=3D"noreferrer" target=3D"_blank">https://mailarchive.ietf.org/arch/browse/=
madinas/</a><br>
To subscribe: <a href=3D"https://www.ietf.org/mailman/listinfo/madinas" rel=
=3D"noreferrer" target=3D"_blank">https://www.ietf.org/mailman/listinfo/mad=
inas</a><br>
<br>
Purpose:<br>This list is for discussion of the MAC Address Device Identific=
ation for Network and Application Services (MADINAS) BOF at IETF 109.<br><b=
r>Major operating systems have implemented and deployed MAC Address randomi=
zation features to enhance device and user privacy, as randomization can he=
lp avoid device identification. Device identification by MAC address is oft=
en used in ways that do not invade privacy, but that provides useful servic=
es to the device user. These services include network optimization, access =
control, usage counting, and security and user protection services. Some ex=
amples are LAN forwarding policy, sticky DHCP IP assignments, static NAT po=
licy and MAC address ACL for blocking malicious or unwanted devices. In tho=
se situations, the deployment of MAC address randomization results in unint=
ended and likely unforeseen impacts to the network, systems and application=
s external to the device implementing randomization.<br><br>This illustrate=
s a potential need for the networking community (OS vendors, device manufac=
turers, application developers and network operators) to work more closely =
together to solve the needs of the end users. In some cases, a greater awar=
eness by Network and Application Services to current MAC address usage may =
be enough. For other cases, a new solution may need to be developed and sta=
ndardized to reach the desired outcome. The proponents of this BoF are inte=
rested in determining if there is sufficient support in the IETF community =
to define best practices, update any existing documents if needed, or poten=
tially develop new protocols or mechanisms for service continuity in the pr=
esence of MAC Address randomization.=C2=A0<br>
This list belongs to IETF area: INT<br>
<br>
For additional information, please contact the list administrators.<br>
</div></div></div>

--000000000000d706ff05b312b35b--


--===============2067224279029139267==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
dhcwg mailing list
dhcwg@ietf.org
https://www.ietf.org/mailman/listinfo/dhcwg

--===============2067224279029139267==--


--=-=-=
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable


=2D-
Michael Richardson <mcr+IETF@sandelman.ca>   . o O ( IPv6 I=C3=B8T consulti=
ng )
           Sandelman Software Works Inc, Ottawa and Worldwide





--=-=-=--

--==-=-=
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----

iQEzBAEBCgAdFiEEbsyLEzg/qUTA43uogItw+93Q3WUFAl+fRPUACgkQgItw+93Q
3WWzSQgAwqVsO30PPQ4ZS1DhPghKkaDHH50vavrw6CYJ4Emh0N3Stv9FeMEzLNm2
hCn5G9/kO8FnK+4qg2mo7gEVdmCIbsg/+0m/dYZX35aFsI3H9vzYYWC2JnavGwPS
29L2bj3HzJ1pFE3Ld2BIA6Vh+8px+GjvvZROKFPTxzYLPb2ma8e2cLt+5geNqtwg
iWYXqkXWtWZdlHQob3Mu6HdnD+UFEvifcbCP2Uf3F2HmfZLTEbjxUc6aVnoWVU5W
/xRbRMZBUxaI8xQ2AFVybm7Bj3SFcqNpPdLd/DxJm2/Xm8UT15V361Ztdihksg56
SGIt/bHpJnUwUDkfxJ/g25kJykOANg==
=vnzi
-----END PGP SIGNATURE-----
--==-=-=--


From nobody Mon Nov  2 11:45:01 2020
Return-Path: <paul.watrobski@nist.gov>
X-Original-To: mud@ietfa.amsl.com
Delivered-To: mud@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 50F723A0CCE for <mud@ietfa.amsl.com>; Mon,  2 Nov 2020 09:08:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.101
X-Spam-Level: 
X-Spam-Status: No, score=-2.101 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FROM_GOV_DKIM_AU=-0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nist.gov
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bLnOvDGHt0oG for <mud@ietfa.amsl.com>; Mon,  2 Nov 2020 09:08:12 -0800 (PST)
Received: from GCC02-DM3-obe.outbound.protection.outlook.com (mail-dm3gcc02on2093.outbound.protection.outlook.com [40.107.91.93]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7015D3A0CF2 for <mud@ietf.org>; Mon,  2 Nov 2020 09:08:11 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=KSLQCrLU1d3Cj+MD5dr3ofzrH2IR+Oxcl9EYTcESzu2rpUaOrgZAMWL/o2BvHn/+8MkZU8udBmLrzoj6+AUX0vQ0yVXJ0SrFspvu7cIc/O5JBCWLUQhQN3skQ1KJGpEsf0RGQ4m0Bt3BTm//sP1uHhQ3QMSKduidshVhq0/YDkcZ8+YhHUSX5QFRf+nw0/vFykevb5StsS5LcZHZ+rAP7VTahXj3oPpOL0Bi489j6+yrSVrD1Ta/G4VrsEgHcEZqOTPiGPgjmQ7sRosV3FSJCioUyITFRZ5TPQNk06ZolFKSaQWI4RIhgEGUQDMsH7gyd9fvvVnWweiosaPmHnpZlw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=IiFYRcUKwel4d8qHCz7ICkd+HV9LGcDm3pM4lduC1kg=; b=QL4HQf6PfAH5BbW14VJ6wbhAPwWREThXEysga36ncsNFOBEY5ouL1oIEdHcRJ7YwnRxy53xGvgjD/anWyLGOLspKVJ6KMmzRu7OpiienVku/wF3Bf4UCekXxrvIm69wU2ArDROTE3brnaqjR+syJFVwKFfTuDWHu+J++1XaK8/O9s0eCu8to1Uiq7R8zZlIrOhitWuK+urcMhEB4QE8VLkSpnJXZiKNB/CQVmoAcaZPLbUF1tARM6Pvoo7yEE7h6/44efpalQh+aC8Gfh8uxagOK9gffSk/JfY/hGtwbxGAuRYzowXizK3asFSVebRerCnOitZvREtPF7oxKpE8+fw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nist.gov; dmarc=pass action=none header.from=nist.gov; dkim=pass header.d=nist.gov; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nist.gov; s=selector2;  h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=IiFYRcUKwel4d8qHCz7ICkd+HV9LGcDm3pM4lduC1kg=; b=Rcfluiq2dTDGZr0gpLB6rgGMtlO7KPie4oy/VZIF8V2Eg6FzguGxNOjCPZ1mql/rlaxv/3hMKDoRAgyPagBPBFUs9A8V1sNTWzcVsDTbCOZPG4YSnAvrFiPk39uA57/Q/cZzqWciacj/xo/YfaFDeMpfcjKblRX+ojB6wkbQAdY=
Received: from DM6PR09MB5462.namprd09.prod.outlook.com (2603:10b6:5:272::16) by DM6PR09MB5845.namprd09.prod.outlook.com (2603:10b6:5:266::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3499.24; Mon, 2 Nov 2020 17:08:10 +0000
Received: from DM6PR09MB5462.namprd09.prod.outlook.com ([fe80::78fb:6614:38a7:7353]) by DM6PR09MB5462.namprd09.prod.outlook.com ([fe80::78fb:6614:38a7:7353%4]) with mapi id 15.20.3477.028; Mon, 2 Nov 2020 17:08:10 +0000
From: "Watrobski, Paul T. (Ctr)" <paul.watrobski@nist.gov>
To: "mud@ietf.org" <mud@ietf.org>
Thread-Topic: MUD at IETF 109 Hackathon
Thread-Index: AQHWsTq9Yrp9C+qVYUGlCnRYnY66UQ==
Date: Mon, 2 Nov 2020 17:08:10 +0000
Message-ID: <AAD77982-45E9-4B09-BE9B-5C733E18019A@nist.gov>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
authentication-results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=nist.gov;
x-originating-ip: [2610:20:6b01:253::a1]
x-ms-publictraffictype: Email
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: 1f365b62-7494-4b9d-269a-08d87f51e065
x-ms-traffictypediagnostic: DM6PR09MB5845:
x-microsoft-antispam-prvs: <DM6PR09MB58452D52F65C8FED6C4737E8E0100@DM6PR09MB5845.namprd09.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:5236;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: vDwSXMiu6L7+zU0IqakHiqJJXn4Xb0l9E2BSsToXrkP6V2ChXaTxNghqcf9nKr2BFV0/695wWZCY+/IZOLgdhE4Ftwi93PWmzr3W8DRMGH9XDA9U10F5yBcksW9SlpDwnESh1cBUDTveNiVuib5ZGfYW1828io+AYWVe8XJA7n+oCIcpyvmi0euhBo1W1n6GozNN6YOGpYPrZEQM4iGKZ/xEptxz4PFWVsNGmot6aS8s4lGzjeLjU5D5We3/QaCIOQUrW8lCgcj2s3Yfaa/LQ7C7/HGm8VdDMTrzz0yW9s2p2VDaFRJkhIbZFHdlDHFER+TY/3f8ya5vvbkX1ZaTsyBdyXD3H319Ng2K96sHrCTgG9Dvv9hIC1MS9YU/ZMvszxf3j0kWD9bs4kt8ZP55XA==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;  IPV:NLI; SFV:NSPM; H:DM6PR09MB5462.namprd09.prod.outlook.com; PTR:; CAT:NONE;  SFS:(4636009)(39850400004)(376002)(396003)(346002)(366004)(136003)(2616005)(316002)(6512007)(5660300002)(8936002)(6506007)(166002)(86362001)(99936003)(6916009)(76116006)(91956017)(966005)(66446008)(71200400001)(36756003)(2906002)(6486002)(186003)(64756008)(66946007)(478600001)(66556008)(66476007)(66616009)(8676002)(33656002); DIR:OUT; SFP:1102; 
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/signed; boundary="Apple-Mail=_6B9A2AEF-B97D-4E7E-BBC7-AFA8164EFEAA"; protocol="application/pkcs7-signature"; micalg=sha-256
MIME-Version: 1.0
X-OriginatorOrg: nist.gov
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM6PR09MB5462.namprd09.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 1f365b62-7494-4b9d-269a-08d87f51e065
X-MS-Exchange-CrossTenant-originalarrivaltime: 02 Nov 2020 17:08:10.6221 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 2ab5d82f-d8fa-4797-a93e-054655c61dec
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: RmxoHl77X7lgggG8ihylUuCim37AAXPUJxnhtDXaluBQMKbsxe1VHyRt8us+BJZS
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR09MB5845
Archived-At: <https://mailarchive.ietf.org/arch/msg/mud/xW6LfXNQCwBXlNS9Aw3FPhkgJHE>
X-Mailman-Approved-At: Mon, 02 Nov 2020 11:45:00 -0800
Subject: [Mud] MUD at IETF 109 Hackathon
X-BeenThere: mud@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussion of Manufacturer Ussage Descriptions <mud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mud>, <mailto:mud-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mud/>
List-Post: <mailto:mud@ietf.org>
List-Help: <mailto:mud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mud>, <mailto:mud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 02 Nov 2020 17:08:14 -0000

--Apple-Mail=_6B9A2AEF-B97D-4E7E-BBC7-AFA8164EFEAA
Content-Type: multipart/alternative;
	boundary="Apple-Mail=_9AB026E0-B3AD-42D9-9E14-CE33E5BE7CF9"


--Apple-Mail=_9AB026E0-B3AD-42D9-9E14-CE33E5BE7CF9
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

Hi MUD Members!

The MUD group will be hosing a table on Gather.town at the IETF 109 =
Hackathon next week, Nov 9-13. The table is to-be-announced. Up-to-date =
information regarding the project =E2=80=9CMUD, MUD-PD, and such=E2=80=9D =
can be found here =
<https://trac.ietf.org/trac/ietf/meeting/wiki/109hackathon> and the =
up-to-date schedule can be found here =
<https://trac.ietf.org/trac/ietf/meeting/wiki/109hackathon/teamschedule>. =
The projects surround evaluating and improving the MUD-PD tool =
<https://github.com/usnistgov/MUD-PD>, for characterizing IoT device =
behavior and generating MUD files.

To assist with scheduling, please fill out this Doodle Poll =
<https://doodle.com/poll/78gv9qupd8u36x3f?utm_source=3Dpoll&utm_medium=3Dl=
ink> to provide your availability and/or when you=E2=80=99ll be able to =
dedicate time on the project(s). We will be hosting two sets of =
=E2=80=9Coffice hours=E2=80=9D each day (currently planned for 9a-12p =
and 9p-12a EDT (2-5 UTC)) when we will be available to answer questions =
and can check in with the participants on progress. In addition to these =
times, we strongly encourage all participants to join the table to =
collaborate outside those hours as we will be doing so; filling out the =
Doodle Poll will help with this planning.

Looking forward to seeing you virtually at the Hackathon!


Regards,

Paul Watrobski
"MUD, MUD-PD, and such" Champion

Hackathon Project(s) Page: =
https://trac.ietf.org/trac/ietf/meeting/wiki/109hackathon =
<https://trac.ietf.org/trac/ietf/meeting/wiki/109hackathon>
Hackathon Team Schedule: =
https://trac.ietf.org/trac/ietf/meeting/wiki/109hackathon/teamschedule =
<https://trac.ietf.org/trac/ietf/meeting/wiki/109hackathon/teamschedule>
Hackathon Availability Doodle Poll: =
https://doodle.com/poll/78gv9qupd8u36x3f?utm_source=3Dpoll&utm_medium=3Dli=
nk =
<https://doodle.com/poll/78gv9qupd8u36x3f?utm_source=3Dpoll&utm_medium=3Dl=
ink>
MUD-PD GitHub: https://github.com/usnistgov/MUD-PD =
<https://github.com/usnistgov/MUD-PD>=

--Apple-Mail=_9AB026E0-B3AD-42D9-9E14-CE33E5BE7CF9
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D""><div =
class=3D"" style=3D"caret-color: rgb(0, 0, 0); color: rgb(0, 0, 0);">Hi =
MUD Members!</div><div class=3D"" style=3D"caret-color: rgb(0, 0, 0); =
color: rgb(0, 0, 0);"><br class=3D""></div><div class=3D"" =
style=3D"caret-color: rgb(0, 0, 0); color: rgb(0, 0, 0);">The MUD group =
will be hosing a table on Gather.town at the IETF 109 Hackathon next =
week, Nov 9-13. The table is to-be-announced. Up-to-date information =
regarding the project =E2=80=9CMUD, MUD-PD, and such=E2=80=9D can be =
found&nbsp;<a =
href=3D"https://trac.ietf.org/trac/ietf/meeting/wiki/109hackathon" =
class=3D"">here</a>&nbsp;and the up-to-date schedule can be =
found&nbsp;<a =
href=3D"https://trac.ietf.org/trac/ietf/meeting/wiki/109hackathon/teamsche=
dule" class=3D"">here</a>.&nbsp;The projects surround evaluating and =
improving the&nbsp;<a href=3D"https://github.com/usnistgov/MUD-PD" =
class=3D"">MUD-PD tool</a>, for characterizing IoT device behavior and =
generating MUD files.</div><div class=3D"" style=3D"caret-color: rgb(0, =
0, 0); color: rgb(0, 0, 0);"><br class=3D""></div><div class=3D"" =
style=3D"caret-color: rgb(0, 0, 0); color: rgb(0, 0, 0);">To assist with =
scheduling, please fill out this&nbsp;<a =
href=3D"https://doodle.com/poll/78gv9qupd8u36x3f?utm_source=3Dpoll&amp;utm=
_medium=3Dlink" class=3D"">Doodle Poll</a>&nbsp;to provide your =
availability and/or when you=E2=80=99ll be able to dedicate time on the =
project(s). We will be hosting two sets of =E2=80=9Coffice hours=E2=80=9D =
each day (currently planned for 9a-12p and 9p-12a EDT (2-5 UTC)) when we =
will be available to answer questions and can check in with the =
participants on progress. In addition to these times, we strongly =
encourage all participants to join the table to collaborate outside =
those hours as we will be doing so; filling out the Doodle Poll will =
help with this planning.</div><div class=3D"" style=3D"caret-color: =
rgb(0, 0, 0); color: rgb(0, 0, 0);"><br class=3D""></div><div class=3D"" =
style=3D"caret-color: rgb(0, 0, 0); color: rgb(0, 0, 0);">Looking =
forward to seeing you virtually at the Hackathon!</div><div class=3D"" =
style=3D"caret-color: rgb(0, 0, 0); color: rgb(0, 0, 0);"><br =
class=3D""></div><div class=3D"" style=3D"caret-color: rgb(0, 0, 0); =
color: rgb(0, 0, 0);"><br class=3D""></div><div class=3D"" =
style=3D"caret-color: rgb(0, 0, 0); color: rgb(0, 0, =
0);">Regards,</div><div class=3D"" style=3D"caret-color: rgb(0, 0, 0); =
color: rgb(0, 0, 0);"><br class=3D""></div><div class=3D"" =
style=3D"caret-color: rgb(0, 0, 0); color: rgb(0, 0, 0);">Paul =
Watrobski</div><div class=3D"" style=3D"caret-color: rgb(0, 0, 0); =
color: rgb(0, 0, 0);">"MUD, MUD-PD, and such" Champion</div><div =
class=3D"" style=3D"caret-color: rgb(0, 0, 0); color: rgb(0, 0, 0);"><br =
class=3D""></div><div class=3D"" style=3D"caret-color: rgb(0, 0, 0); =
color: rgb(0, 0, 0);">Hackathon Project(s) Page:&nbsp;<a =
href=3D"https://trac.ietf.org/trac/ietf/meeting/wiki/109hackathon" =
class=3D"">https://trac.ietf.org/trac/ietf/meeting/wiki/109hackathon</a></=
div><div class=3D"" style=3D"caret-color: rgb(0, 0, 0); color: rgb(0, 0, =
0);">Hackathon Team Schedule:&nbsp;<a =
href=3D"https://trac.ietf.org/trac/ietf/meeting/wiki/109hackathon/teamsche=
dule" =
class=3D"">https://trac.ietf.org/trac/ietf/meeting/wiki/109hackathon/teams=
chedule</a></div><div class=3D"" style=3D"caret-color: rgb(0, 0, 0); =
color: rgb(0, 0, 0);">Hackathon Availability Doodle Poll:&nbsp;<a =
href=3D"https://doodle.com/poll/78gv9qupd8u36x3f?utm_source=3Dpoll&amp;utm=
_medium=3Dlink" =
class=3D"">https://doodle.com/poll/78gv9qupd8u36x3f?utm_source=3Dpoll&amp;=
utm_medium=3Dlink</a></div><div class=3D"" style=3D"caret-color: rgb(0, =
0, 0); color: rgb(0, 0, 0);">MUD-PD GitHub:&nbsp;<a =
href=3D"https://github.com/usnistgov/MUD-PD" =
class=3D"">https://github.com/usnistgov/MUD-PD</a></div></body></html>=

--Apple-Mail=_9AB026E0-B3AD-42D9-9E14-CE33E5BE7CF9--

--Apple-Mail=_6B9A2AEF-B97D-4E7E-BBC7-AFA8164EFEAA
Content-Disposition: attachment;
	filename=smime.p7s
Content-Type: application/pkcs7-signature;
	name=smime.p7s
Content-Transfer-Encoding: base64
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--Apple-Mail=_6B9A2AEF-B97D-4E7E-BBC7-AFA8164EFEAA--


From nobody Mon Nov  2 15:39:34 2020
Return-Path: <mcr+ietf@sandelman.ca>
X-Original-To: mud@ietfa.amsl.com
Delivered-To: mud@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 258123A12EB; Mon,  2 Nov 2020 15:39:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WFk9qcMQTwBh; Mon,  2 Nov 2020 15:39:30 -0800 (PST)
Received: from tuna.sandelman.ca (tuna.sandelman.ca [IPv6:2607:f0b0:f:3:216:3eff:fe7c:d1f3]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CB0743A14D9; Mon,  2 Nov 2020 15:38:13 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by tuna.sandelman.ca (Postfix) with ESMTP id 208C6389A3; Mon,  2 Nov 2020 18:45:15 -0500 (EST)
Received: from tuna.sandelman.ca ([127.0.0.1]) by localhost (localhost [127.0.0.1]) (amavisd-new, port 10024) with LMTP id iId0BP4_ly2X; Mon,  2 Nov 2020 18:45:14 -0500 (EST)
Received: from sandelman.ca (obiwan.sandelman.ca [IPv6:2607:f0b0:f:2::247]) by tuna.sandelman.ca (Postfix) with ESMTP id 36655389A2; Mon,  2 Nov 2020 18:45:14 -0500 (EST)
Received: from localhost (localhost [IPv6:::1]) by sandelman.ca (Postfix) with ESMTP id A876D1F9; Mon,  2 Nov 2020 18:38:11 -0500 (EST)
From: Michael Richardson <mcr+ietf@sandelman.ca>
To: opsawg@ietf.org, Qin Wu <bill.wu@huawei.com>, mud@ietf.org
Reply-To: mud@ietf.org
CC: iotops@ietf.org
In-Reply-To: <B8F9A780D330094D99AF023C5877DABAADAA2D2A@dggeml511-mbs.china.huawei.com>
References: <B8F9A780D330094D99AF023C5877DABAADAA2D2A@dggeml511-mbs.china.huawei.com>
X-Mailer: MH-E 8.6+git; nmh 1.7+dev; GNU Emacs 26.1
X-Face: $\n1pF)h^`}$H>Hk{L"x@)JS7<%Az}5RyS@k9X%29-lHB$Ti.V>2bi.~ehC0; <'$9xN5Ub# z!G,p`nR&p7Fz@^UXIn156S8.~^@MJ*mMsD7=QFeq%AL4m<nPbLgmtKK-5dC@#:k
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg=pgp-sha512; protocol="application/pgp-signature"
Date: Mon, 02 Nov 2020 18:38:11 -0500
Message-ID: <27112.1604360291@localhost>
Archived-At: <https://mailarchive.ietf.org/arch/msg/mud/FDHsN93x1zwDP4MVpZzKJw66caI>
Subject: Re: [Mud] Review comments on draft-richardson-opsawg-mud-acceptable-urls-02
X-BeenThere: mud@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussion of Manufacturer Ussage Descriptions <mud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mud>, <mailto:mud-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mud/>
List-Post: <mailto:mud@ietf.org>
List-Help: <mailto:mud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mud>, <mailto:mud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 02 Nov 2020 23:39:33 -0000

--=-=-=
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable


A new version of I-D, draft-richardson-opsawg-mud-acceptable-urls-03.txt
has been successfully submitted by Michael Richardson and posted to the
IETF repository.

Name:		draft-richardson-opsawg-mud-acceptable-urls
Revision:	03
Title:		Authorized update to MUD URLs
Document date:	2020-11-02
Group:		Individual Submission
Pages:		11
URL:            https://www.ietf.org/archive/id/draft-richardson-opsawg-mud=
-acceptable-urls-03.txt
Status:         https://datatracker.ietf.org/doc/draft-richardson-opsawg-mu=
d-acceptable-urls/
Html:           https://www.ietf.org/archive/id/draft-richardson-opsawg-mud=
-acceptable-urls-03.html
Htmlized:       https://tools.ietf.org/html/draft-richardson-opsawg-mud-acc=
eptable-urls-03
Diff:           https://www.ietf.org/rfcdiff?url2=3Ddraft-richardson-opsawg=
-mud-acceptable-urls-03

Based upon unicast comments I received, I have posted a -03 version that ha=
s the
following changes:

    > Suggest to add a paragraph to summarize MUD URL updating and MULD file
    > updating are two options, also explain why MUD URL or files need to be
    > updated?

How about?

 # Updating MUD URLs vs Updating MUD files

+There are two ways in which a manufacturer can change what the is processe=
d by the MUD controller: they can change what is in the MUD file (update-in=
-place), and or they change which file is processed by the MUD controller b=
y changing the URL (updated-url).
+

    > 2.       Section 2.1

    > How does the end device know the capabilities need to be added or
    > removed? Is there signaling exchange between end device and firmware
    > server? If yes, please add reference or clarification text.

No, the end device has no knowledge in the device of its capabilities.
This is knowledge in the device.
The knowledge resides in the manufacturer who creates the MUD file by human=
 action.

    > If the device detected the firmware update, does it use the same MUD
    > URL to retrieve the MUD file? When?

The MUD controller (which is not the device, but some role in the network
orchestration), is the thing that retrieves the MUD file.
Whether or not it uses the same MUD URL or not, is the topic of this sectio=
n.

    > 3.       Section 2.1.3

    > I see section 2.1.3 are special example of adding capabilities and
    > removing capabilities? Consolidated into section 2.1.1, 2.1.2?

I split out section 2.1.3 so that it could be referred to.
In this case, it is unclear if it is adding or removing capabilities.
It seems a special, and interesting case.

    > Is there any software or firmware update in the firewall device or
    > middlebox when TLS profile is retrieved?

This is definitely an issue.  There could be, and there has much discussion
during the adoption process for I-D.reddy-opsawg-mud-tls about this.
Not in scope for this document.

    > 4.       Section 3 said:

    > "
    > It should be noted that [RFC8520<https://tools.ietf.org/html/rfc8520>]
    > has not established a trust model for MUD controllers to determine wh=
ether a signature from a specific
    > entity is legitimate as a signature for a particular device.

    > "

    > Don't understand this sentence, can you give an example to explain
    > this?

I've rewritten like this:

=2DIt should be noted that {{RFC8520}} has not established a trust model fo=
r MUD controllers to
=2Ddetermine whether a signature from a specific entity is legitimate as a
=2Dsignature for a particular device.  {{RFC8520}} leaves this to the indus=
try to work out through supply chain arrangements or other heuristics.
+While {{RFC8520}} has established a mechanism for signing of MUD files, th=
e document does not define a way for a MUD controller to determine who shou=
ld sign the MUD file for a particular device.
+
+{{RFC8520}} leaves this for a local policy.
+There are any number of processes that could be used, but they require coo=
rdination of many players.
+It is expected that each industrial vertical will work out supply chain ar=
rangements or other heuristics.


I think that a lot could be said, but I don't want to go down a rathole her=
e.
Maybe I should?

    > 5.       Section 7

    > Is MUD File updating more related to RFC8520 while MUD URL update is
    > something proposed by this document?

    > What's your recommendation to the implementers or developer when they
    > face the choice of MUD URL updating or MUD file updating?

Assuming that this document is adopted and MUD controllers implement it, th=
en
I would set a new MUD URL whenever there was a firmware update that created
any change to the behaviour.
I would reserve MUD file changes (which also involves signature updates) to
fixing bugs in the MUD file only.

I have updated:

## Updating files vs Updating MUD URLs
+
+Device developers need to consider whether to make a change by updating a =
MUD file, or updating the MUD URL.
+
+MUD URLs can only be updated by shipping a new firmware.
+It is reasonable to update the MUD URL whenever a new firmware release cau=
ses new connectivity to be required.
+The updated mechanism defined in this document makes this a secure operati=
on, and there is no practical limitation on the number of files that a web =
server can hold.
+
+In place updates to a MUD file should be restricted to cases where it turn=
s out that the description was inaccurate: a missing connection, an inadver=
tent one authorized, or just incorrect information.
+
+Developers should be aware that many enterprise web sites use outsourced c=
ontent distribution networks, and MUD controllers are likely to cache files=
 for some time.
+Changes to MUD files will take some time to propogate through the various =
caches.
+An updated MUD URL will however, not experience any cache issues, but can =
not be deployed with a firmware update.
+
+

=2D-
Michael Richardson <mcr+IETF@sandelman.ca>   . o O ( IPv6 I=C3=B8T consulti=
ng )
           Sandelman Software Works Inc, Ottawa and Worldwide





--=-=-=
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----

iQEzBAEBCgAdFiEEbsyLEzg/qUTA43uogItw+93Q3WUFAl+gmGMACgkQgItw+93Q
3WV0jQgAi4V6lsBQBLmzD5K/UQh6K90pzvP/ANp9/eLXSm3uvH+LnzFiIEnsUkFm
gEWKF+yJb/QxsgLKl8PYyhHvpzl4CMIXqMMVVbRNEBuIxTRRVuunfv8REjUyyV2E
RKIqglxZ1XQJceCxd8hm1EwZMugxD6Uxi+k6vuPSkBkHqG4iWwzTkVB0Ab/1xmMc
IOniOhm9jeUMq4cHyhqzOD8QhnQv0haw6imPo82mDtjKCn3so9JFHeAGjvSuxxzS
63fuIHMnQYzhe9eiHQfm8sRuwActQ/1yk5qFHnaVkSL+scJ49kBJ9qmMskTyoT88
M56PCUkJa5ivX8tXA2/qHcmxarYvGg==
=HeU7
-----END PGP SIGNATURE-----
--=-=-=--


From nobody Mon Nov  9 06:58:55 2020
Return-Path: <lear@cisco.com>
X-Original-To: mud@ietfa.amsl.com
Delivered-To: mud@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F00193A0E08 for <mud@ietfa.amsl.com>; Mon,  9 Nov 2020 06:58:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.601
X-Spam-Level: 
X-Spam-Status: No, score=-9.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 846XwtoHyxZe for <mud@ietfa.amsl.com>; Mon,  9 Nov 2020 06:58:52 -0800 (PST)
Received: from aer-iport-3.cisco.com (aer-iport-3.cisco.com [173.38.203.53]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2FC843A0ECB for <mud@ietf.org>; Mon,  9 Nov 2020 06:58:52 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=84; q=dns/txt; s=iport; t=1604933932; x=1606143532; h=from:content-transfer-encoding:mime-version:subject: message-id:date:to; bh=OYfe+c78PINeIK4Gb39z+q1oCnC75ZyHu4br6P+iv8I=; b=aXfsQ6SIASqhEooc6hQrYCVvEfcmQ99ssKBGI33OkDtNoQxQNjZNb+De EaF36OoBnegYnhv05ddiUEbTxsOC1rTb+61e7NHs/wpOjnTylYqCZYI1O Jz90ZRkL/eKw03HUQsZoPfN0HTIJRkApmeCIZYAesufqpe+ID8ymROZzs g=;
X-IPAS-Result: =?us-ascii?q?A0DQBADhV6lf/xbLJq1ihXZVATKNcKRHCwEBAQ0BASMMB?= =?us-ascii?q?AEBg0uDFCY4EwIDAQEBAwIDAQEBAQUBAQECAQYEcYVhDIYzhTYBgwYPnniOG?= =?us-ascii?q?XSBNIQ+AYEYhG8GgTiIP4UbggCBOByCIYNJAoIsgn2CLAScPopMkRyCdwSDF?= =?us-ascii?q?oVzkgADH4MGAZ5pnkeRa4NiAgQGBQIVgWsjgVczGggbFWUBgj89EhkNlySFR?= =?us-ascii?q?UADfwmOSAEB?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.77,463,1596499200"; d="scan'208";a="28544119"
Received: from aer-iport-nat.cisco.com (HELO aer-core-3.cisco.com) ([173.38.203.22]) by aer-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 09 Nov 2020 14:58:48 +0000
Received: from ams3-vpn-dhcp5299.cisco.com (ams3-vpn-dhcp5299.cisco.com [10.61.84.178]) by aer-core-3.cisco.com (8.15.2/8.15.2) with ESMTPS id 0A9EwlxX007927 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO) for <mud@ietf.org>; Mon, 9 Nov 2020 14:58:48 GMT
From: Eliot Lear <lear@cisco.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.120.23.2.4\))
Message-Id: <B8E61E83-ADE9-4E82-A18A-366431D7CA7D@cisco.com>
Date: Mon, 9 Nov 2020 15:58:47 +0100
To: mud@ietf.org
X-Mailer: Apple Mail (2.3608.120.23.2.4)
X-Outbound-SMTP-Client: 10.61.84.178, ams3-vpn-dhcp5299.cisco.com
X-Outbound-Node: aer-core-3.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/mud/ERTIKeW2s_iNYbx3sv66yLU8nDc>
Subject: [Mud] Hangin out at the MUD table in the Hackathon
X-BeenThere: mud@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussion of Manufacturer Ussage Descriptions <mud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mud>, <mailto:mud-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mud/>
List-Post: <mailto:mud@ietf.org>
List-Help: <mailto:mud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mud>, <mailto:mud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Nov 2020 14:58:54 -0000

Stop by when you can.

https://trac.ietf.org/trac/ietf/meeting/wiki/109hackathon

