Editing MUD

Jump to: navigation, search

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision Your text
Line 1: Line 1:
Manufacturer Usage Description (MUD) is a draft IETF Specification. MUDS is a  
+
Manufacturer Usage Description (MUD) IETF Specification (MUDS) is a
framework under RFC development that aims to automate Internet access control rules for IoT devices . The intention is to specify normal and abnormal usage of a device outside the device and allow an installation to derive security controls (Access list ) and apply it. For example the ports and servers which should be allowed to do remote service or change configuration or initiate firmware update of the device. It is also intended to provide methods for devices no longer supported by the manufacturer.
+
framework under RFC development that aims to automate Internet access control rules for IoT devices . The intention is to specify normal and abnormal usage of a device outside the device and allow an installation to derive security controls (Access list ) and apply it. For example the posrts and servers which should be allowed to do remote service or change configuration or initiate firmware update of the device
 
==IETF [https://tools.ietf.org/html/draft-lear-mud-framework-00 Abstract]==
 
==IETF [https://tools.ietf.org/html/draft-lear-mud-framework-00 Abstract]==
  
Line 23: Line 23:
 
A schematic form an implementation at Indiana University illustrates.
 
A schematic form an implementation at Indiana University illustrates.
 
[[File:IoTSecurity MUD Arvind.png| link=https://figshare.com/articles/Manufacturer_Usage_Description_Specification_Implementation/5552923]]
 
[[File:IoTSecurity MUD Arvind.png| link=https://figshare.com/articles/Manufacturer_Usage_Description_Specification_Implementation/5552923]]
ASCII art from [https://tools.ietf.org/html/draft-lear-mud-framework-00 IETF]
 
 
    .........................................
 
    .                      ____________    .          __________
 
    .                    |  Network  |    .          |          |
 
    .                    | Management |----->get URI->|  MFG    |
 
    .                    |  System    |    .          | Web Site |
 
    .  End system network |____________|<--MUD file<--<|__________|
 
    .                            .        .
 
    .                            .        .
 
    . _______                _________    .
 
    .|      |              | router  |    .
 
    .| Thing |---->MUD URI-->|  or    |    .
 
    .|_______|              | switch  |    .
 
    .                        |_________|    .
 
    .........................................
 
 
                        Figure 1: MUD Architecture
 
 
== Use cases from Standard proposals==
 
===Light Bulb===
 
 
  A light bulb is intended to light a room.  It may be remotely
 
  controlled through the network; and it may make use of a rendezvous
 
  service of some form that an app on smart phone accesses.  What we
 
  can say about that light bulb, then, is that all other network access
 
  is unwanted.  It will not contact a news service, nor speak to the
 
  refrigerator, and it has no need of a printer or other devices.  It
 
  has no Facebook friends.  Therefore, an access list applied to it
 
  that states that it will only connect to the single rendezvous
 
  service will not impede the light bulb in performing its function,
 
  while at the same time allowing the network to provide both it and
 
  other devices an additional layer of protection.
 
===Advanced Policies===
 
The manufacturer may specify either specific hosts or certain classes.  An example of a class might be
 
  "devices of a specified manufacturer type", where the manufacturer
 
  type itself is indicated simply by the authority of the MUD-URI.
 
  Another example might to allow or disallow local access.  Just like
 
  other policies, these may be combined.  For example:
 
 
      Allow access to host controller.example.com with QoS AF11
 
      Allow access to devices of the same manufacturer
 
      Allow access to and from controllers who need to speak COAP
 
      Allow access to local DNS/DHCP
 
      Deny all other access
 
==Also See==
 
*[https://tools.ietf.org/html/draft-ietf-opsawg-mud-05 IETF]
 
*[http://www.ieee802.org/1/files/public/docs2017/new-lear-iot-mud-0217-v01.pdf IEEE]
 
 
[[Category:IoTStack]][[Category:Security]]
 

Please note that all contributions to IoTWiki may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see Itrontest:Copyrights for details). Do not submit copyrighted work without permission!

Cancel | Editing help (opens in new window)