Hi Ben,

Much of this relitigates RFC 8520, but IMHO it is worth reviewing assumptions 
from time to time.  Remember, the purpose of MUD is to identify an 
authorization profile for a device to a network so that either access can be 
granted based on that profile or an anomaly can be detected.  The primary, but 
not exclusive, focus is on IOT.

Please see below.

> 
> This design treats the MUD file as a "widely shared secret", which is a 
> fragile arrangement.  It does not appear to match the main conceptual model 
> of MUD, which describes MUD files as being "published", i.e. generally public.


We should separate the MUD URL from the MUD file.  The MUD file is absolutely 
100% public, and consists of information that is observable – or should be 
observable – from the device.  So if you are a Meddler In The Middle (;-) 
(MITM) you get this information anyway.

The MUD URL gives up device type information.  This is different in character, 
but often but not always easily gotten.  I would say that if a manufacturer is 
taking steps to prevent fingerprinting, then they should take steps to protect 
the MUD URL.  That’s an active area of interest for some.


> I also think this proposal is likely to seriously impede the ability of IoT 
> vendors to adopt new versions of TLS, or new protocols such as QUIC.  Such 
> updates would be delayed by (1) the need to add entries to this YANG model, 
> and then (2) the time for MUD gateways to develop and deploy the new entries. 
>  Delaying protocol upgrades reduces security, contrary to the goals of this 
> draft.

One can deploy a MUD file update in advance of a code update.  The latter takes 
a whole lot longer than the former.  No IoT manufacturer is going to put out 
something in less than the default time of 48 hours, lest they brick millions 
of devices.  Is this more work for an IoT manufacturer?  Sure.  One thing the 
draft might do is discuss how to incorporate something into unit testing to 
write out the change.

Eliot


Attachment: signature.asc
Description: Message signed with OpenPGP

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to