<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.14 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<?rfc toc="yes"?>

<rfc ipr="trust200902" docName="draft-toutain-lpwan-access-control-01" category="std">

  <front>
    <title abbrev="SCHC AC">SCHC Rule Access Control</title>

    <author initials="A." surname="Minaburo" fullname="Ana Minaburo">
      <organization>Acklio</organization>
      <address>
        <postal>
          <street>1137A avenue des Champs Blancs</street>
          <city>35510 Cesson-Sevigne Cedex</city>
          <country>France</country>
        </postal>
        <email>ana@ackl.io</email>
      </address>
    </author>
    <author initials="L." surname="Toutain" fullname="Laurent Toutain">
      <organization>Institut MINES TELECOM; IMT Atlantique</organization>
      <address>
        <postal>
          <street>2 rue de la Chataigneraie</street> <street>CS 17607</street>
          <city>35576 Cesson-Sevigne Cedex</city>
          <country>France</country>
        </postal>
        <email>Laurent.Toutain@imt-atlantique.fr</email>
      </address>
    </author>
    <author initials="I." surname="Martinez" fullname="Ivan Martinez">
      <organization>Institut MINES TELECOM; IMT Atlantique</organization>
      <address>
        <postal>
          <street>2 rue de la Chataigneraie</street> <street>CS 17607</street>
          <city>35576 Cesson-Sevigne Cedex</city>
          <country>France</country>
        </postal>
        <email>ivan-marino.martinez-bolivar@imt-atlantique.fr</email>
      </address>
    </author>

    <date year="2023" month="February" day="20"/>

    
    <workgroup>lpwan Working Group</workgroup>
    

    <abstract>


<t>The framework for SCHC defines an abstract view of the rules, formalized with through a YANG Data Model. In its original description rules are static and share by 2 entities. The use of YANG authorizes rules to be uploaded or modified in a SCHC instance and leads to some possible attacks, if the changes are not controlled. This document summarizes some possible attacks and define augmentation to the existing Data Mode, to restrict the changes in the rule.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>Figure <xref target="Fig-archi-overview"/> focuses on the management part of the SCHC architecture.</t>

<figure title="Overview of management architecture." anchor="Fig-archi-overview"><artwork><![CDATA[
     .......................................................
     .   .................................                 .
     v   ^                               v                 ^   
   (--------)     +----------+        +-------+    +-------+-------+
   ( Set of )<--->|coreconf  |<=======|Access |<===| other end     |<=== 
   ( Rules  )     |request   |        |Control|    | authentication|
   (--------)     |processing|        +-------+    +---------------+
                  +----------+
]]></artwork></figure>

<t>When a management request arrives on a SCHC instance, the identity of the requester must be 
checked:</t>

<t><list style="symbols">
  <t>this can be implicit, for instance a LPWAN device receives it from the  SCHC core instance. Authentication 
 is done at Layer 2.</t>
  <t>this can be a L2 address. In a LoRaWAN network, the DevEUI allows the SCHC core instance to identify the device.</t>
  <t>IP addresses may also be used as well as cryptographic keys.</t>
</list></t>

<t>The identification of the requester allows to retrieve the associated Set of Rules. This rules are enriched with
 access control information that will be defined in this document. If the Set of Rules do not contains any access control information, the management is not allowed to modify the Rules content.</t>

</section>
<section anchor="attack-scenario" title="Attack scenario">

<t>A LWM2M device, under control of an attacker, sends some management messages to modify the SCHC rules in core in order to direct the traffic to another application. This can be either to participate to a DDoS attack or to send sensible information to another application.</t>

<t>SCHC rules are defined for a specific traffic. An attacker changes en element (for instance, the dev UDP port number) and therefore no rule matches the traffic, the link may be saturated by no-compressed messages.</t>

</section>
<section anchor="yang-access-control" title="YANG Access Control">

<t>YANG language allows to specify read only or read write nodes. NACM <xref target="RFC8341"/> extends this by allowing users or group od users to perform specific actions.</t>

<t>This granularity do not fit this the rule model. For instance, the goal is not to allow all the field-id leaves to be modified. The objective is to allow a specific rule entry to be changed and therefore some of the leaves to be modified. For instance an entry with field-id containing Uri-path may have his target-value modified, as in the same rule, the entry regarding the app-prefix should not be changed.</t>

<t>The SCHC access control augments the YANG module defined in <xref target="I-D.ietf-lpwan-schc-yang-data-model"/> to allow a remote entity to manipulate the rules. Several levels are defined.</t>

<t><list style="symbols">
  <t>in the set of rules, it authorizes or not a new rule to be added .</t>
  <t>in a compression rule, it allows to add or remove field descriptions.</t>
  <t>in a compression rule, it allows to modify some elements of the rule, such as the target-value, the matching-operator or/and the comp-decomp-action and associated values.</t>
  <t>in a fragmentation rule, it allows to modify some parameters.</t>
</list></t>

</section>
<section anchor="yang-data-model" title="YANG Data Model">

<t>The YANG DM proposed in <xref target="AnnexA"/> extends the SCHC YANG Data Model introduced in <xref target="I-D.ietf-lpwan-schc-yang-data-model"/>. It adds read-only leaves containing the access rights. If these leaves are not presents, the information cannot be modified.</t>

<section anchor="leaf-ac-modify-set-of-rules" title="leaf ac-modify-set-of-rules">

<t>This leaf controls modifications applied to a set of rules. They are specified with the rule-access-right enumeration:</t>

<t><list style="symbols">
  <t>no-change (0): rules cannot be modified in the Set of Rules. This is the equivalent of having no access control elements in the set of rules.</t>
  <t>modify-existing-element (1): an existing rule may be modified.</t>
  <t>add-remove-element (2): a rule can be added or deleted from the Set of Rules or an existing rule can be modified.</t>
</list></t>

</section>
<section anchor="leaf-ac-modify-compression-rule" title="leaf ac-modify-compression-rule">

<t>This leaf allows to modify a compression element. To be active, leaf ac-modify-set-of-rules MUST be set to modify-existing-element  or add-remove-element. This leaf uses the same enumeration as add-remove-element:</t>

<t><list style="symbols">
  <t>no-change (0): The rule cannot be modified.</t>
  <t>modify-existing-element (1): an existing Field Description may be modified.</t>
  <t>add-remove-element (2): a Field Description can be added or deleted from the Rule or an existing rule can be modified.</t>
</list></t>

</section>
<section anchor="leaf-ac-modify-field" title="leaf ac-modify-field">

<t>This leaf allows to modify a Field Description in a compression rule. To be active, leaves ac-modify-set-of-rules and ac-modify-compression-rule MUST be set to modify-existing-element  or add-remove-element and ac-modifiy-compression-rule and leaf</t>

</section>
</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference  anchor="RFC8824" target='https://www.rfc-editor.org/info/rfc8824'>
<front>
<title>Static Context Header Compression (SCHC) for the Constrained Application Protocol (CoAP)</title>
<author initials='A.' surname='Minaburo' fullname='A. Minaburo'><organization /></author>
<author initials='L.' surname='Toutain' fullname='L. Toutain'><organization /></author>
<author initials='R.' surname='Andreasen' fullname='R. Andreasen'><organization /></author>
<date year='2021' month='June' />
<abstract><t>This document defines how to compress Constrained Application Protocol (CoAP) headers using the Static Context Header Compression and fragmentation (SCHC) framework. SCHC defines a header compression mechanism adapted for Constrained Devices. SCHC uses a static description of the header to reduce the header's redundancy and size. While RFC 8724 describes the SCHC compression and fragmentation framework, and its application for IPv6/UDP headers, this document applies SCHC to CoAP headers. The CoAP header structure differs from IPv6 and UDP, since CoAP uses a flexible header with a variable number of options, themselves of variable length. The CoAP message format is asymmetric: the request messages have a header format different from the format in the response messages. This specification gives guidance on applying SCHC to flexible headers and how to leverage the asymmetry for more efficient compression Rules.</t></abstract>
</front>
<seriesInfo name='RFC' value='8824'/>
<seriesInfo name='DOI' value='10.17487/RFC8824'/>
</reference>



<reference  anchor="RFC8341" target='https://www.rfc-editor.org/info/rfc8341'>
<front>
<title>Network Configuration Access Control Model</title>
<author initials='A.' surname='Bierman' fullname='A. Bierman'><organization /></author>
<author initials='M.' surname='Bjorklund' fullname='M. Bjorklund'><organization /></author>
<date year='2018' month='March' />
<abstract><t>The standardization of network configuration interfaces for use with the Network Configuration Protocol (NETCONF) or the RESTCONF protocol requires a structured and secure operating environment that promotes human usability and multi-vendor interoperability.  There is a need for standard mechanisms to restrict NETCONF or RESTCONF protocol access for particular users to a preconfigured subset of all available NETCONF or RESTCONF protocol operations and content.  This document defines such an access control model.</t><t>This document obsoletes RFC 6536.</t></abstract>
</front>
<seriesInfo name='STD' value='91'/>
<seriesInfo name='RFC' value='8341'/>
<seriesInfo name='DOI' value='10.17487/RFC8341'/>
</reference>

<reference anchor="I-D.ietf-lpwan-schc-yang-data-model" target="https://www.ietf.org/archive/id/draft-ietf-lpwan-schc-yang-data-model-21.txt">
  <front>
    <title>Data Model for Static Context Header Compression (SCHC)</title>
    <author fullname="Ana Minaburo" initials="A." surname="Minaburo">
      <organization>Acklio</organization>
    </author>
    <author fullname="Laurent Toutain" initials="L." surname="Toutain">
      <organization>Institut MINES TELECOM; IMT Atlantique</organization>
    </author>
    <date day="9" month="October" year="2022"/>
    <abstract>
      <t>This document describes a YANG data model for the SCHC (Static Context Header Compression) compression and fragmentation rules. This document formalizes the description of the rules for better interoperability between SCHC instances either to exchange a set of rules or to modify some rules parameters.</t>
    </abstract>
  </front>
  <seriesInfo name="Internet-Draft" value="draft-ietf-lpwan-schc-yang-data-model-21"/>
</reference>




    </references>



<section anchor="AnnexA" title="YANG Data Model">

<figure><artwork><![CDATA[
<CODE BEGINS> file "ietf-schc-access-control@2023-02-14.yang"
module ietf-schc-access-control {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-schc-access-control";
  prefix schc-ac;

  import ietf-schc {
      prefix schc;
  }

  organization
    "IETF IPv6 over Low Power Wide-Area Networks (lpwan) working group";
  contact
    "WG Web:   <https://datatracker.ietf.org/wg/lpwan/about/>
     WG List:  <mailto:lp-wan@ietf.org>
     Editor:   Juan-Carlos Zuniga
       <mailto:juancarlos.zuniga@sigfox.com>";
  description
     "
     Copyright (c) 2021 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject to
     the license terms contained in, the Simplified BSD License set
     forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC XXXX
     (https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself
     for full legal notices.

     The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
     NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
     'MAY', and 'OPTIONAL' in this document are to be interpreted as
     described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
     they appear in all capitals, as shown here.

     *************************************************************************

     This module extends the ietf-schc module to include the compound-ack 
     behavior for Ack On Error as defined in RFC YYYY. 
     It introduces a new leaf for Ack on Error defining the format of the
     SCHC Ack and add the possibility to send several bitmaps in a single 
     answer.";

  revision 2023-02-14 {
    description
      "Initial version for RFC YYYY ";
    reference
      "RFC YYYY: Compound Ack";
  }

  typedef rule-access-right {
    type enumeration {
      enum no-changes {
        value 0;
        description
          "No change are allowed.";
      }
      enum modify-existing-element {
        value 1;
        description
          "can modify content inside an element.";
      }
      enum add-remove-element {
        value 2;
        description
          "Allows to add or remove or modify an element.";
      }
    }
  }

  typedef field-access-right {
    type enumeration {
      enum no-change {
        value 0;
        description
          "Reserved slot number.";
      }
      enum change-tv {
        value 1;
        description
          "Reserved slot number.";
      }
      enum change-mo-cda-tv {
        value 2;
        description
          "Reserved slot number.";
      }
    }

  }

  augment "/schc:schc/schc:rule" {
    leaf ac-modify-set-of-rules {
          config false;
          type rule-access-right;
        }
  }

  augment "/schc:schc/schc:rule/schc:nature/schc:compression" {
    leaf ac-modify-compression-rule {
          config false;
          type rule-access-right;
        }
  }

  augment "/schc:schc/schc:rule/schc:nature/schc:compression/schc:entry" {
    leaf ac-modify-field {
          config false;
          type field-access-right;
        }
  }

  augment "/schc:schc/schc:rule/schc:nature/schc:fragmentation" {
    leaf ac-modify-timers {
          config false;
          type boolean;
        }
  }


}
<CODE ENDS>
]]></artwork></figure>

</section>
<section anchor="security-considerations" title="Security Considerations">

<t>TBD</t>

</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>TBD</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

