<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.13 (Ruby 3.0.2) -->
<?rfc compact="yes"?>
<?rfc iprnotified="no"?>
<?rfc strict="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-anima-brski-ae-11" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="BRSKI-AE">BRSKI-AE: Alternative Enrollment Protocols in BRSKI</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-anima-brski-ae-11"/>
    <author initials="D." surname="von Oheimb" fullname="David von Oheimb" role="editor">
      <organization abbrev="Siemens">Siemens AG</organization>
      <address>
        <postal>
          <street>Otto-Hahn-Ring 6</street>
          <city>Munich</city>
          <code>81739</code>
          <country>Germany</country>
        </postal>
        <email>david.von.oheimb@siemens.com</email>
        <uri>https://www.siemens.com/</uri>
      </address>
    </author>
    <author initials="S." surname="Fries" fullname="Steffen Fries">
      <organization abbrev="Siemens">Siemens AG</organization>
      <address>
        <postal>
          <street>Otto-Hahn-Ring 6</street>
          <city>Munich</city>
          <code>81739</code>
          <country>Germany</country>
        </postal>
        <email>steffen.fries@siemens.com</email>
        <uri>https://www.siemens.com/</uri>
      </address>
    </author>
    <author initials="H." surname="Brockhaus" fullname="Hendrik Brockhaus">
      <organization abbrev="Siemens">Siemens AG</organization>
      <address>
        <postal>
          <street>Otto-Hahn-Ring 6</street>
          <city>Munich</city>
          <code>81739</code>
          <country>Germany</country>
        </postal>
        <email>hendrik.brockhaus@siemens.com</email>
        <uri>https://www.siemens.com/</uri>
      </address>
    </author>
    <date year="2024"/>
    <area>Operations and Management</area>
    <workgroup>ANIMA WG</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 149?>

<t>This document defines an enhancement of
Bootstrapping Remote Secure Key Infrastructure (BRSKI, RFC 8995).
It supports alternative certificate enrollment protocols, such as CMP, that
use authenticated self-contained signed objects for certification messages.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-anima-brski-ae/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/anima-wg/anima-brski-ae"/>.</t>
    </note>
  </front>
  <middle>
    <?line 156?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>BRSKI <xref target="RFC8995"/> is typically used with Enrollment over Secure Transport
(EST, <xref target="RFC7030"/>) as the enrollment protocol
for device certificates employing HTTP over TLS for its message transfer.
BRSKI-AE is a variant using alternative enrollment protocols with
authenticated self-contained objects for the device certificate enrollment.
<!--
This enhancement of BRSKI is named BRSKI-AE, where AE stands for
**A**lternative **E**nrollment.
(while originally it was used to abbreviate **A**synchronous **E**nrollment)
-->
      </t>
      <t>This approach provides the following advantages.
The origin of requests and responses
can be authenticated independent of message transfer.
This supports end-to-end authentication (proof of origin) also over
multiple hops, as well as asynchronous operation of certificate enrollment.
This in turn provides architectural flexibility where and when to
ultimately authenticate and authorize certification requests while retaining
full-strength integrity and authenticity of certification requests.</t>
      <t>This specification carries over the main characteristics of BRSKI, namely:</t>
      <ul spacing="normal">
        <li>
          <t>The pledge is assumed to have received its Initial Device IDentifier
(IDevID, <xref target="IEEE_802.1AR-2018"/>) credentials during its production.
It uses them to authenticate itself to the
Manufacturer Authorized Signing Authority (MASA, <xref target="RFC8995"/>),
and to the registrar, which is the access point of the target domain,
and to possibly further components of the domain where it will be operated.</t>
        </li>
        <li>
          <t>The pledge first obtains via the voucher <xref target="RFC8366"/> exchange a trust anchor
for authenticating entities in the domain such as the domain registrar.</t>
        </li>
        <li>
          <t>The pledge then obtains its
Locally significant Device IDentifier (IDevID, <xref target="IEEE_802.1AR-2018"/>).
To this end, the pledge generates a private key, called LDevID secret,
and requests via the domain registrar from the PKI of its new domain
a domain-specific device certificate, called LDevID certificate.
On success, it receives the LDevID certificate along with its certificate chain.</t>
        </li>
      </ul>
      <t>The goals of BRSKI-AE are to provide an enhancement of BRSKI for
LDevID certificate enrollment using, alternatively to EST, a protocol that</t>
      <ul spacing="normal">
        <li>
          <t>supports end-to-end authentication over multiple hops</t>
        </li>
        <li>
          <t>enables secure message exchange over any kind of transfer,
including asynchronous delivery.</t>
        </li>
      </ul>
      <t>Note that the BRSKI voucher exchange of the pledge with the registrar and MASA
uses authenticated self-contained objects,
so the voucher exchange already has these properties.</t>
      <t>The well-known URI approach of BRSKI and EST messages is extended
with an additional path element indicating the enrollment protocol being used.
<!--- not really: and
* defining a certificate waiting indication and handling, for the case that the
  certifying component is (temporarily) not available.
-->
      </t>
      <t>Based on the definition of the overall approach and specific endpoints,
this specification enables the registrar to offer multiple enrollment protocols,
from which pledges and their developers can then pick the most suitable one.</t>
      <t>It may be noted that BRSKI (RFC 8995) specifies how to use HTTP over TLS,
but further variants are known, such as
Constrained BRSKI <xref target="I-D.ietf-anima-constrained-voucher"/> using CoAP over DTLS.
In the sequel, 'HTTP' and 'TLS' are just references to the most common case,
where variants such as using CoAP and/or DTLS are meant to be subsumed -
the differences are not relevant here.</t>
      <t>This specification is sufficient together with its references to
support BRSKI with the Certificate Management Protocol (CMP, <xref target="RFC9480"/>)
profiled in the Lightweight CMP Profile (LCMPP, <xref target="RFC9483"/>).
Combining BRSKI with a protocol or profile other than LCMPP will require
additional IANA registrations based on the rules specified in this document.
It may also require additional specifications for details of the protocol or
profile (similar to <xref target="RFC9483"/>), which are outside the scope of this document.</t>
      <section anchor="sup-env">
        <name>Supported Scenarios</name>
        <t>BRSKI-AE is intended to be used in situations like the following.</t>
        <ul spacing="normal">
          <li>
            <t>Pledges and/or the target domain reuse an already established
certificate enrollment protocol different from EST, such as CMP.</t>
          </li>
          <li>
            <t>The application scenario indirectly excludes the use of EST
for certificate enrollment, for reasons like these:
            </t>
            <ul spacing="normal">
              <li>
                <t>The Registration Authority (RA) is not co-located with the registrar
while it requires end-to-end authentication of requesters.
Yet EST does not support end-to-end authentication over multiple hops.</t>
              </li>
              <li>
                <t>The RA or certification authority (CA) operator requires
auditable proof of origin for Certificate Signing Requests (CSRs). This is not
possible with TLS because it provides only transient source authentication.</t>
              </li>
              <li>
                <t>Certificates are requested for types of keys, such as Key Encapsulation
Mechanism (KEM) keys, that do not support signing (nor alternative forms
of single-shot proof of possession like those described in <xref target="RFC6955"/>).
This is not supported by EST because it uses CSRs in PKCS #10 <xref target="RFC2986"/>
format, which can only use proof-of-possession methods that
need just a single message, while proof of possession for KEM keys,
for instance, requires receiving a fresh challenge value beforehand.</t>
              </li>
              <li>
                <t>The Pledge implementation uses security libraries not providing EST support
or uses a TLS library that does not support providing
the so-called tls-unique value <xref target="RFC5929"/>,
which is needed by EST for strong binding of the source authentication.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>No full RA functionality is available on-site in the target domain, while
connectivity to an off-site RA may be intermittent or entirely offline.
<!-- in the latter case a message store-and-forward mechanism is needed. -->
            </t>
          </li>
          <li>
            <t>Authoritative actions of a local RA at the registrar is not sufficient
for fully and reliably authorizing pledge certification requests. This
may be due to missing data access or due to an insufficient level of security,
for instance regarding the local storage of private keys.
<!-- Final authorization then is done by a RA residing in the backend. -->
            </t>
          </li>
        </ul>
        <t>Bootstrapping can be handled in various ways,
depending on the application domains.
The informative <xref target="app-examples"/> provides illustrative examples from
various industrial control system environments and operational setups
motivating the support of alternative enrollment protocols.</t>
      </section>
    </section>
    <section anchor="terminology">
      <name>Terminology and abbreviations</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document relies on the terminology defined in <xref target="RFC8995"/>, <xref target="RFC5280"/>,
and <xref target="IEEE_802.1AR-2018"/>.
The following terms are described partly in addition.</t>
      <dl>
        <dt>asynchronous communication:</dt>
        <dd>
          <t>time-wise interrupted delivery of messages,
here between a pledge and the registrar or an RA</t>
        </dd>
        <dt>authenticated self-contained object:</dt>
        <dd>
          <t>a data structure that is cryptographically bound to the identity of
its originator by an attached digital signature on the actual object,
using a private key of the originator such as the IDevID secret.</t>
        </dd>
        <dt>backend:</dt>
        <dd>
          <t>placement of a domain component separately from the domain registrar;
may be on-site or off-site</t>
        </dd>
        <dt>BRSKI:</dt>
        <dd>
          <t>Bootstrapping Remote Secure Key Infrastructure <xref target="RFC8995"/></t>
        </dd>
        <dt>BRSKI-AE:</dt>
        <dd>
          <t>BRSKI with <strong>A</strong>lternative <strong>E</strong>nrollment, a variation of BRSKI <xref target="RFC8995"/>
in which BRSKI-EST, the enrollment protocol between pledge and the registrar,
is replaced by enrollment protocols that support end-to-end authentication
of the pledge to the RA, such as Lightweight CMP (see LCMPP).</t>
        </dd>
        <dt>CMP:</dt>
        <dd>
          <t>Certificate Management Protocol <xref target="RFC9480"/></t>
        </dd>
        <dt>CSR:</dt>
        <dd>
          <t>Certificate Signing Request</t>
        </dd>
        <dt>EST:</dt>
        <dd>
          <t>Enrollment over Secure Transport <xref target="RFC7030"/></t>
        </dd>
        <dt>IDevID:</dt>
        <dd>
          <t>Initial Device IDentifier of a pledge, provided by the manufacturer
and comprising a private key and the related X.509 certificate with its chain</t>
        </dd>
        <dt>LDevID:</dt>
        <dd>
          <t>Locally significant Device IDentifier of a pledge, provided by its target domain
and comprising a private key and the related X.509 certificate with its chain</t>
        </dd>
        <dt>local RA (LRA):</dt>
        <dd>
          <t>a subordinate RA that is close to entities being enrolled and separate from
a subsequent RA.  In BRSKI-AE it is needed if a backend RA is used,
and in this case, the LRA is co-located with the registrar.</t>
        </dd>
        <dt>LCMPP:</dt>
        <dd>
          <t>Lightweight CMP Profile <xref target="RFC9483"/></t>
        </dd>
        <dt>MASA:</dt>
        <dd>
          <t>Manufacturer Authorized Signing Authority</t>
        </dd>
        <dt>on-site:</dt>
        <dd>
          <t>locality of a component or service or functionality
at the site of the registrar</t>
        </dd>
        <dt>off-site:</dt>
        <dd>
          <t>locality of component or service or functionality, such as RA or CA,
not at the site of the registrar.
This may be a central site or a cloud service,
to which connection may be intermittent.</t>
        </dd>
        <dt>pledge:</dt>
        <dd>
          <t>device that is to be bootstrapped into a target domain.
It requests an LDevID using IDevID credentials installed by its manufacturer.</t>
        </dd>
        <dt>RA:</dt>
        <dd>
          <t>Registration Authority, the PKI component to which
a CA typically delegates certificate management functions
such as authenticating pledges and performing authorization checks
on certification requests</t>
        </dd>
        <dt>registrar:</dt>
        <dd>
          <t>short for domain registrar</t>
        </dd>
        <dt>site:</dt>
        <dd>
          <t>the locality where an entity, such as a pledge, registrar, or PKI component
is deployed.  The target domain may have multiple sites.</t>
        </dd>
        <dt>synchronous communication:</dt>
        <dd>
          <t>time-wise uninterrupted delivery of messages,
here between a pledge and a registrar or PKI component</t>
        </dd>
        <dt>target domain:</dt>
        <dd>
          <t>the domain that a pledge is going to be bootstrapped into</t>
        </dd>
        <dt>Note that this document utilizes a more generic terminology regarding PKI management operations to be independent of a specific enrollment protocol terminology</dt>
        <dd>
          <t/>
        </dd>
        <dt>certification request:</dt>
        <dd>
          <t>describes the request of a certificate with proof of identity</t>
        </dd>
      </dl>
      <t>certification response:
:describes the answer to the certification request</t>
      <dl>
        <dt>attribute request:</dt>
        <dd>
          <t>describes the request of content to be included in the certification request</t>
        </dd>
        <dt>attribute response:</dt>
        <dd>
          <t>describes the describes the answer to the attribute request</t>
        </dd>
        <dt>CA Certs request:</dt>
        <dd>
          <t>describes the request of CA certificates.</t>
        </dd>
        <dt>CA Certs response:</dt>
        <dd>
          <t>describes the describes the answer to the CA Certs request</t>
        </dd>
        <dt>certificate confirm:</dt>
        <dd>
          <t>describes a confirmation message to be used if a backend PKI requires a confirmation of the certificate acceptance by a pledge.</t>
        </dd>
        <dt>PKI/registrar confirm:</dt>
        <dd>
          <t>describes an acknowledgement of the PKI to the certificate confirm</t>
        </dd>
      </dl>
    </section>
    <section anchor="req-sol">
      <name>Basic Requirements and Mapping to Solutions</name>
      <t>Based on the intended target scenarios described in <xref target="sup-env"/> and
the application examples described in <xref target="app-examples"/>, the following
requirements are derived to support authenticated self-contained objects
as containers carrying certification requests.</t>
      <t>The following properties are required for a certification request:</t>
      <ul spacing="normal">
        <li>
          <t>Proof of possession: demonstrates access to the private
key corresponding to the public key contained in a certification request.
This is typically achieved by a self-signature using the corresponding
private key but can also be achieved indirectly, see <xref section="4.3" sectionFormat="comma" target="RFC4210"/>.</t>
        </li>
        <li>
          <t>Proof of identity, also called proof of origin:
provides data origin authentication of the certification request.
Typically, this is achieved by a signature using the pledge IDevID secret
over some data, which needs to include a sufficiently strong identifier
of the pledge, such as the device serial number
typically included in the subject of the IDevID certificate.</t>
        </li>
      </ul>
      <t>The remainder of this section gives a non-exhaustive list of solution examples,
based on existing technology described in IETF documents.</t>
      <section anchor="solutions-PoP">
        <name>Solution Options for Proof of Possession</name>
        <t>Certificate signing request (CSR) objects: CSRs are
  data structures protecting only the integrity of the contained data
  and providing proof of possession for a (locally generated) private key.
  Important types of CSR data structures are:</t>
        <ul spacing="normal">
          <li>
            <t>PKCS #10 <xref target="RFC2986"/>. This very common form of CSR is
self-signed to protect its integrity and to prove possession of
the private key that corresponds to the public key included in the request.</t>
          </li>
          <li>
            <t>Certificate Request Message Format (CRMF, <xref target="RFC4211"/>).
This less common but more general CSR format
supports several ways of integrity protection and proof of possession.
Typically a self-signature is used, which is generated over (part of) the
structure with the private key corresponding to the included public key.
CRMF also supports further proof-of-possession methods for types of keys
that do not have signing capability. For details see <xref section="4" sectionFormat="comma" target="RFC4211"/>.</t>
          </li>
        </ul>
        <t>It should be noted that the integrity protection of CSRs includes the public key
  because it is part of the data signed by the corresponding private key.
  Yet this signature does not provide data origin authentication, i.e.,
  proof of identity of the requester because the key pair involved is new
  and therefore does not yet have a confirmed identity associated with it.
  <!-- already covered by the next paragraph:
  This extra property can be
  achieved by an additional binding to the IDevID of the pledge.
  This binding to the source authentication supports the
  authorization decision of the certification request.
  -->
        </t>
      </section>
      <section anchor="solutions-PoI">
        <name>Solution Options for Proof of Identity</name>
        <t>Binding a certificate signing request (CSR) to an existing authenticated
  credential (the BRSKI context, the IDevID certificate) enables
  proof of origin, which in turn supports an authorization decision on the CSR.</t>
        <t>The binding of data origin authentication to the CSR
  is typically delegated to the protocol used for certificate management.
  This binding may be achieved through security options in an
  underlying transport protocol such as TLS if the authorization of the
  certification request is (sufficiently) done at the next communication hop.
  Depending on the key type, the binding can also be done in a stronger,
  transport-independent way by wrapping the CSR with a signature.</t>
        <t>This requirement is addressed by existing enrollment protocols
  in various ways, such as:</t>
        <ul spacing="normal">
          <li>
            <t>EST <xref target="RFC7030"/>, also its variant EST-coaps <xref target="RFC9148"/>,
utilizes PKCS #10 to encode Certificate Signing Requests (CSRs).
While such a CSR has not been designed
to include proof of origin, there is a limited, indirect way of
binding it to the source authentication of the underlying TLS session.
This is achieved by including in the CSR the tls-unique value <xref target="RFC5929"/>
resulting from the TLS handshake.  As this is optionally supported
by the EST <tt>"/simpleenroll"</tt> endpoint used in BRSKI
and the TLS handshake employed in BRSKI includes certificate-based client
authentication of the pledge with its IDevID credentials, the proof of
pledge identity being an authenticated TLS client can be bound to the CSR.  </t>
            <t>
Yet this binding is only valid in the context of the TLS session
established with the registrar acting as the EST server and typically also
as an RA.  So even such a cryptographic binding of the authenticated
pledge identity to the CSR is not visible nor verifiable to authorization
points outside the registrar, such as a (second) RA in the backend.
What the registrar needs to do is to authenticate and pre-authorize
the pledge and to indicate this to the (second) RA
by signing the forwarded certification request with its private key and
a related certificate that has the id-kp-cmcRA extended key usage attribute.  </t>
            <t><xref section="2.5" sectionFormat="comma" target="RFC7030"/> sketches wrapping PKCS #10-formatted CSRs
with a Full PKI Request message sent to the <tt>"/fullcmc"</tt> endpoint.
This would allow for source authentication at the message level, such that
the registrar could forward it to external RAs in a meaningful way.
This approach is so far not sufficiently described
and likely has not been implemented.</t>
          </li>
        </ul>
        <!--
Note that, besides the existing enrollment protocols, there is
ongoing work in the ACE WG to define an encapsulation of EST messages
in OSCORE, which will result in a TLS-independent way of protecting EST.
This approach {{draft.selander-ace-coap-est-oscore}}
may be considered as a further variant.
-->

<ul spacing="normal">
          <li>
            <t>SCEP <xref target="RFC8894"/> supports using a shared secret (passphrase) or
an existing certificate to protect CSRs based on
SCEP Secure Message Objects using CMS wrapping
(<xref target="RFC5652"/>). Note that the wrapping using
an existing IDevID in SCEP is referred to as 'renewal'.
This way
SCEP does not rely on the security of the underlying message transfer.</t>
          </li>
          <li>
            <t>CMP <xref target="RFC4210"/> <xref target="RFC9480"/> supports using a shared secret (passphrase)
or an existing
certificate, which may be an IDevID credential, to authenticate
certification requests via the PKIProtection structure in a PKIMessage.
The certification request is typically encoded utilizing CRMF,
while PKCS #10 is supported as an alternative.
Thus, CMP does not rely on the security of the underlying message transfer.</t>
          </li>
          <li>
            <t>CMC <xref target="RFC5272"/> also supports utilizing a shared secret (passphrase) or
an existing certificate to protect certification requests,
which can be either in CRMF or PKCS #10 structure.
The proof of identity can be provided as part of a FullCMCRequest,
based on CMS <xref target="RFC5652"/> and signed with an existing IDevID secret.
Thus, CMC does not rely on the security of the underlying message transfer.</t>
          </li>
        </ul>
        <t>To sum up, EST does not meet the requirements for authenticated self-contained
objects, but SCEP, CMP, and CMC do. This document primarily focuses on CMP as
it has more industry adoption than CMC and SCEP has issues not detailed here.</t>
      </section>
    </section>
    <section anchor="uc1">
      <name>Adaptations to BRSKI</name>
      <t>To enable using alternative certificate enrollment protocols supporting end-to-end
authentication, asynchronous enrollment, and more general system architectures,
BRSKI-AE provides some generalizations on BRSKI <xref target="RFC8995"/>.
This way, authenticated self-contained objects such as those described in
<xref target="req-sol"/> above can be used for certificate enrollment,
and RA functionality can be deployed freely in the target domain.
Parts of the RA functionality can even be distributed over several nodes.</t>
      <t>The enhancements needed are kept to a minimum to ensure
the reuse of already defined architecture elements and interactions.
In general, the communication follows the BRSKI model and utilizes the existing
BRSKI architecture elements.
In particular, the pledge initiates communication with the domain registrar and
interacts with the MASA as usual for voucher request and response processing.</t>
      <section anchor="architecture">
        <name>Architecture</name>
        <t>The key element of BRSKI-AE is that the authorization of a certification request
<bcp14>MUST</bcp14> be performed based on an authenticated self-contained object.
The certification request is bound in a self-contained way
to a proof of origin based on the IDevID credentials.
Consequently, the certification request <bcp14>MAY</bcp14> be transferred using any mechanism
or protocol. Authentication and authorization of the certification request
can be done by the domain registrar and/or by backend domain components.
As mentioned in <xref target="sup-env"/>, these components may be offline or off-site.
The registrar and other on-site domain components
may have no or only temporary (intermittent) connectivity to them.</t>
        <t>This leads to generalizations in the
placement and enhancements of the logical elements as shown in <xref target="uc1figure"/>.</t>
        <figure anchor="uc1figure">
          <name>Architecture Overview Using Backend PKI Components</name>
          <artset>
            <artwork type="svg" align="left"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="560" width="544" viewBox="0 0 544 560" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,208 L 8,336" fill="none" stroke="black"/>
                <path d="M 32,48 L 32,200" fill="none" stroke="black"/>
                <path d="M 32,464 L 32,512" fill="none" stroke="black"/>
                <path d="M 80,208 L 80,336" fill="none" stroke="black"/>
                <path d="M 112,464 L 112,512" fill="none" stroke="black"/>
                <path d="M 152,240 L 152,304" fill="none" stroke="black"/>
                <path d="M 160,464 L 160,512" fill="none" stroke="black"/>
                <path d="M 216,240 L 216,304" fill="none" stroke="black"/>
                <path d="M 304,240 L 304,304" fill="none" stroke="black"/>
                <path d="M 336,32 L 336,144" fill="none" stroke="black"/>
                <path d="M 376,352 L 376,456" fill="none" stroke="black"/>
                <path d="M 424,240 L 424,304" fill="none" stroke="black"/>
                <path d="M 456,72 L 456,144" fill="none" stroke="black"/>
                <path d="M 472,152 L 472,256" fill="none" stroke="black"/>
                <path d="M 504,464 L 504,512" fill="none" stroke="black"/>
                <path d="M 536,32 L 536,144" fill="none" stroke="black"/>
                <path d="M 336,32 L 536,32" fill="none" stroke="black"/>
                <path d="M 32,48 L 144,48" fill="none" stroke="black"/>
                <path d="M 224,48 L 328,48" fill="none" stroke="black"/>
                <path d="M 336,64 L 536,64" fill="none" stroke="black"/>
                <path d="M 336,144 L 536,144" fill="none" stroke="black"/>
                <path d="M 8,208 L 80,208" fill="none" stroke="black"/>
                <path d="M 152,240 L 216,240" fill="none" stroke="black"/>
                <path d="M 304,240 L 424,240" fill="none" stroke="black"/>
                <path d="M 432,256 L 472,256" fill="none" stroke="black"/>
                <path d="M 88,272 L 144,272" fill="none" stroke="black"/>
                <path d="M 224,272 L 296,272" fill="none" stroke="black"/>
                <path d="M 152,304 L 216,304" fill="none" stroke="black"/>
                <path d="M 304,304 L 424,304" fill="none" stroke="black"/>
                <path d="M 8,336 L 80,336" fill="none" stroke="black"/>
                <path d="M 32,464 L 112,464" fill="none" stroke="black"/>
                <path d="M 160,464 L 504,464" fill="none" stroke="black"/>
                <path d="M 120,480 L 160,480" fill="none" stroke="black"/>
                <path d="M 112,496 L 152,496" fill="none" stroke="black"/>
                <path d="M 32,512 L 112,512" fill="none" stroke="black"/>
                <path d="M 160,512 L 504,512" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="480,152 468,146.4 468,157.6" fill="black" transform="rotate(270,472,152)"/>
                <polygon class="arrowhead" points="440,256 428,250.4 428,261.6" fill="black" transform="rotate(180,432,256)"/>
                <polygon class="arrowhead" points="384,456 372,450.4 372,461.6" fill="black" transform="rotate(90,376,456)"/>
                <polygon class="arrowhead" points="304,272 292,266.4 292,277.6" fill="black" transform="rotate(0,296,272)"/>
                <polygon class="arrowhead" points="232,272 220,266.4 220,277.6" fill="black" transform="rotate(180,224,272)"/>
                <polygon class="arrowhead" points="160,496 148,490.4 148,501.6" fill="black" transform="rotate(0,152,496)"/>
                <polygon class="arrowhead" points="152,272 140,266.4 140,277.6" fill="black" transform="rotate(0,144,272)"/>
                <polygon class="arrowhead" points="128,480 116,474.4 116,485.6" fill="black" transform="rotate(180,120,480)"/>
                <polygon class="arrowhead" points="96,272 84,266.4 84,277.6" fill="black" transform="rotate(180,88,272)"/>
                <polygon class="arrowhead" points="40,200 28,194.4 28,205.6" fill="black" transform="rotate(90,32,200)"/>
                <g class="text">
                  <text x="184" y="52">Drop-Ship</text>
                  <text x="372" y="52">Vendor</text>
                  <text x="432" y="52">Service</text>
                  <text x="352" y="84">M</text>
                  <text x="408" y="84">anufacturer</text>
                  <text x="352" y="100">A</text>
                  <text x="400" y="100">uthorized</text>
                  <text x="496" y="100">Ownership</text>
                  <text x="352" y="116">S</text>
                  <text x="388" y="116">igning</text>
                  <text x="488" y="116">Tracker</text>
                  <text x="352" y="132">A</text>
                  <text x="396" y="132">uthority</text>
                  <text x="288" y="212">.........................................</text>
                  <text x="128" y="228">.</text>
                  <text x="448" y="228">.</text>
                  <text x="508" y="228">BRSKI-</text>
                  <text x="128" y="244">.</text>
                  <text x="448" y="244">.</text>
                  <text x="500" y="244">MASA</text>
                  <text x="44" y="260">Pledge</text>
                  <text x="128" y="260">.</text>
                  <text x="180" y="260">Join</text>
                  <text x="340" y="260">Domain</text>
                  <text x="184" y="276">Proxy</text>
                  <text x="352" y="276">Registrar</text>
                  <text x="404" y="276">w/</text>
                  <text x="448" y="276">.</text>
                  <text x="128" y="292">.</text>
                  <text x="184" y="292">.......</text>
                  <text x="328" y="292">LRA</text>
                  <text x="356" y="292">or</text>
                  <text x="380" y="292">RA</text>
                  <text x="448" y="292">.</text>
                  <text x="44" y="308">IDevID</text>
                  <text x="128" y="308">.</text>
                  <text x="448" y="308">.</text>
                  <text x="140" y="324">BRSKI-AE</text>
                  <text x="196" y="324">over</text>
                  <text x="232" y="324">TLS</text>
                  <text x="376" y="324">^</text>
                  <text x="448" y="324">.</text>
                  <text x="132" y="340">using,</text>
                  <text x="184" y="340">e.g.,</text>
                  <text x="232" y="340">LCMPP</text>
                  <text x="360" y="340">|</text>
                  <text x="432" y="340">.</text>
                  <text x="128" y="356">.</text>
                  <text x="448" y="356">.</text>
                  <text x="248" y="372">...............................</text>
                  <text x="416" y="372">.........</text>
                  <text x="128" y="388">on-site</text>
                  <text x="192" y="388">(local)</text>
                  <text x="252" y="388">domain</text>
                  <text x="324" y="388">components</text>
                  <text x="408" y="404">e.g.,</text>
                  <text x="456" y="404">LCMPP</text>
                  <text x="192" y="436">.............................................</text>
                  <text x="452" y="436">..................</text>
                  <text x="16" y="452">.</text>
                  <text x="68" y="452">Public-Key</text>
                  <text x="172" y="452">Infrastructure</text>
                  <text x="520" y="452">.</text>
                  <text x="16" y="468">.</text>
                  <text x="520" y="468">.</text>
                  <text x="16" y="484">.</text>
                  <text x="236" y="484">Registration</text>
                  <text x="328" y="484">Authority</text>
                  <text x="520" y="484">.</text>
                  <text x="16" y="500">.</text>
                  <text x="76" y="500">CA</text>
                  <text x="196" y="500">RA</text>
                  <text x="240" y="500">(unless</text>
                  <text x="292" y="500">part</text>
                  <text x="324" y="500">of</text>
                  <text x="364" y="500">Domain</text>
                  <text x="436" y="500">Registrar)</text>
                  <text x="520" y="500">.</text>
                  <text x="16" y="516">.</text>
                  <text x="520" y="516">.</text>
                  <text x="268" y="532">................................................................</text>
                  <text x="104" y="548">backend</text>
                  <text x="172" y="548">(central</text>
                  <text x="220" y="548">or</text>
                  <text x="272" y="548">off-site)</text>
                  <text x="340" y="548">domain</text>
                  <text x="412" y="548">components</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art" align="left"><![CDATA[
                                         +------------------------+
   +--------------Drop-Ship--------------| Vendor Service         |
   |                                     +------------------------+
   |                                     | M anufacturer|         |
   |                                     | A uthorized  |Ownership|
   |                                     | S igning     |Tracker  |
   |                                     | A uthority   |         |
   |                                     +--------------+---------+
   |                                                      ^
   |                                                      |
   V                                                      |
+--------+     .........................................  |
|        |     .                                       .  | BRSKI-
|        |     .  +-------+          +--------------+  .  | MASA
| Pledge |     .  | Join  |          | Domain       |<----+
|        |<------>| Proxy |<-------->| Registrar w/ |  .
|        |     .  |.......|          | LRA or RA    |  .
| IDevID |     .  +-------+          +--------------+  .
|        |   BRSKI-AE over TLS                ^        .
+--------+   using, e.g., LCMPP             |        .
               .                              |        .
               ...............................|.........
            on-site (local) domain components |
                                              | e.g., LCMPP
                                              |
 .............................................|..................
 . Public-Key Infrastructure                  v                 .
 . +---------+     +------------------------------------------+ .
 . |         |<----+   Registration Authority                 | .
 . |    CA   +---->|   RA (unless part of Domain Registrar)   | .
 . +---------+     +------------------------------------------+ .
 ................................................................
         backend (central or off-site) domain components
]]></artwork>
          </artset>
        </figure>
        <t>The architecture overview in <xref target="uc1figure"/>
has the same logical elements as BRSKI, but with a more flexible placement
of the authentication and authorization checks on certification requests.
Depending on the application scenario, the registrar <bcp14>MAY</bcp14> still do all of these
checks (as is the case in BRSKI), or part of them.</t>
        <t>The following list describes the on-site components in the target domain
of the pledge shown in <xref target="uc1figure"/>.</t>
        <ul spacing="normal">
          <li>
            <t>Join Proxy: same requirements as in BRSKI, see <xref section="4" sectionFormat="comma" target="RFC8995"/></t>
          </li>
          <li>
            <t>Domain Registrar including LRA or RA functionality: in BRSKI-AE,
the domain registrar has mostly the same functionality as in BRSKI, namely
to act as the gatekeeper of the domain for onboarding new devices and
facilitating the communication of pledges with their MASA and the domain PKI.
Yet there are some generalizations and specific requirements:  </t>
            <ol spacing="normal" type="1"><li>
                <t>The registrar <bcp14>MUST</bcp14> support at least one certificate enrollment protocol
with authenticated self-contained objects for certification requests.
To this end, the URI scheme for addressing endpoints at the registrar
is generalized (see <xref target="addressing"/>).</t>
              </li>
              <li>
                <t>Rather than having full RA functionality, the registrar <bcp14>MAY</bcp14> act as
a local registration authority (LRA) and delegate part of its involvement
in certificate enrollment to a backend RA.
In such scenarios, the registrar optionally checks certification requests
it receives from pledges and forwards them to the backend RA, which performs
the remaining parts of the enrollment request validation and authorization.
Note that to this end the backend RA may need information regarding
the authorization of pledges from the registrar or from other sources.
On the way back, the registrar forwards responses by the PKI
to the pledge on the same channel.      </t>
                <t>
To support end-to-end authentication of the pledge across the
registrar to the backend RA, the certification request signed by
the pledge needs to be upheld and forwarded by the registrar.
    Therefore, the registrar can not use an enrollment protocol, which is
    different from the enrollment protocol used between the pledge and the
    registrar, for its communication with the backend PKI.</t>
              </li>
              <li>
                <t>The use of a certificate enrollment protocol with
authenticated self-contained objects gives freedom how to transfer
enrollment messages between the pledge and an RA.
BRSKI demands that the RA accept  certification requests for LDevIDs
only with the consent of the registrar.
BRSKI-AE guarantees this also in case that the RA is not part of
the registrar, even if the further message transfer is unprotected
and involves further transport hops.
See <xref target="sec-consider"/> for details on how this can be achieved.</t>
              </li>
            </ol>
          </li>
        </ul>
        <!-- is already covered by paragraph a little further below:
     Note:
     As far as (at least part of) the certificate enrollment traffic is routed
     via the registrar, BRSKI-AE re-uses during the certificate enrollment phase
     the channel that has been established in the BRSKI steps before between the
     pledge and the registrar.  Consequently, tunneling via this channel needs
     to be supported by the certificate enrollment protocol.
     By default, this channel is based on HTTP over TLS,
     but it may also be based on, for instance, CoAP over DTLS
     in the context of Constrained BRSKI {{I-D.ietf-anima-constrained-voucher}}.
-->
<!--
     In the latter scenario,
     the EST-specific parts of that specification do not apply.
-->

<t>Despite the above generalizations to the enrollment phase, the final
step of BRSKI, namely the enrollment status telemetry, is kept as it is.</t>
        <t>The following list describes the components provided by
the vendor or manufacturer outside the target domain.</t>
        <ul spacing="normal">
          <li>
            <t>MASA: functionality as described in BRSKI <xref target="RFC8995"/>.
The voucher exchange with the MASA via the domain registrar
is performed as described in BRSKI.  </t>
            <t>
Note: From the definition of the interaction with the MASA in
<xref section="5" sectionFormat="comma" target="RFC8995"/> follows that it may be synchronous (using voucher
request with nonces) or asynchronous (using nonceless voucher requests).</t>
          </li>
          <li>
            <t>Ownership tracker: as defined in BRSKI.</t>
          </li>
        </ul>
        <t>The following list describes backend target domain components,
which maybe located on-site or off-site in the target domain.</t>
        <ul spacing="normal">
          <li>
            <t>RA: performs centralized certificate management functions
as a public-key infrastructure for the domain operator.
As far as not already done by the domain registrar, it performs the final
validation and authorization of certification requests.  Otherwise,
the RA co-located with the domain registrar directly connects to the CA.</t>
          </li>
          <li>
            <t>CA, also called domain CA: generates domain-specific certificates
according to certification requests that have been
authenticated and authorized by the registrar and/or an extra RA.</t>
          </li>
        </ul>
        <t>Based on the diagram in BRSKI <xref section="2.1" sectionFormat="comma" target="RFC8995"/> and the architectural
changes, the original protocol flow is divided into several phases
showing commonalities and differences to the original approach as follows.</t>
        <ul spacing="normal">
          <li>
            <t>Discovery phase: mostly as in BRSKI step (1). For details see <xref target="discovery"/>.</t>
          </li>
          <li>
            <t>Identification phase: same as in BRSKI step (2).</t>
          </li>
          <li>
            <t>Voucher exchange phase: same as in BRSKI steps (3) and (4).</t>
          </li>
          <li>
            <t>Voucher status telemetry: same as in BRSKI directly after step (4).</t>
          </li>
          <li>
            <t>Certificate enrollment phase: the use of EST in step (5) is changed
to employing a certificate enrollment protocol that uses
an authenticated self-contained object for requesting the LDevID certificate.</t>
          </li>
        </ul>
        <t>For transporting the certificate enrollment request and response messages, the (D)TLS channel established between pledge and registrar is MANDATORY to use.
To this end, the enrollment protocol, the pledge, and the registrar <bcp14>MUST</bcp14> support the usage of the existing channel for certificate enrollment.
Due to this architecture, the pledge <bcp14>SHOULD NOT</bcp14> establish additional connections for certificate enrollment and the registrar <bcp14>MUST</bcp14> retain full control over the certificate enrollment traffic.</t>
        <ul spacing="normal">
          <li>
            <t>Enrollment status telemetry: the final exchange of BRSKI step (5).</t>
          </li>
        </ul>
      </section>
      <section anchor="message_ex">
        <name>Message Exchange</name>
        <t>The behavior of a pledge described in BRSKI <xref section="2.1" sectionFormat="comma" target="RFC8995"/>
is kept, with one major exception.
After finishing the Imprint step (4), the Enroll step (5) <bcp14>MUST</bcp14> be performed
with an enrollment protocol utilizing authenticated self-contained objects,
as explained in <xref target="req-sol"/>.
<!--
the certification request MUST be performed using an
authenticated self-contained object providing not only proof of possession
but also proof of identity (source authentication).
-->
<xref target="exist_prot"/> discusses selected suitable enrollment protocols
and options applicable.</t>
        <t>An abstract overview of the BRSKI-AE protocol
can be found at <xref target="BRSKI-AE-overview"/>.</t>
        <section anchor="discovery">
          <name>Pledge - Registrar Discovery</name>
          <t>Discovery as specified in BRSKI <xref section="4" sectionFormat="comma" target="RFC8995"/> does not support
the discovery of registrars with enhanced feature sets.
A pledge can not find out in this way whether discovered registrars
support the certificate enrollment protocol it expects, such as CMP.</t>
          <t>As a more general solution, the BRSKI discovery mechanism can be extended
to provide up-front information on the capabilities of registrars.
Future work such as <xref target="I-D.eckert-anima-brski-discovery"/> may provide this.</t>
          <t>In the absence of such a generally applicable solution,
BRSKI-AE deployments may use their particular way of doing discovery.
<xref target="brski-cmp-instance"/> defines a minimalist approach that <bcp14>MAY</bcp14> be used for CMP.</t>
        </section>
        <section anchor="pledge-registrar-masa-voucher-exchange">
          <name>Pledge - Registrar - MASA Voucher Exchange</name>
          <t>The voucher exchange is performed as specified in <xref target="RFC8995"/>.</t>
        </section>
        <section anchor="pledge-registrar-masa-voucher-status-telemetry">
          <name>Pledge - Registrar - MASA Voucher Status Telemetry</name>
          <t>The voucher status telemetry is performed
as specified in <xref section="5.7" sectionFormat="comma" target="RFC8995"/>.</t>
        </section>
        <section anchor="pledge-registrar-raca-certificate-enrollment">
          <name>Pledge - Registrar - RA/CA Certificate Enrollment</name>
          <t>This replaces the EST integration for PKI bootstrapping described in
<xref section="5.9" sectionFormat="comma" target="RFC8995"/>
(while <xref section="5.9.4" sectionFormat="comma" target="RFC8995"/> remains as the final phase, see below).</t>
          <t>The certificate enrollment phase may involve the transmission of several messages.
Details can depend on the application scenario,
the employed enrollment protocol, and other factors.
<!-- <br>
In line with the generalizations described in {{architecture}},
It is RECOMMENDED to transfer these messages
via the channel established between the pledge and the registrar.
-->
          </t>
          <t>The only message exchange <bcp14>REQUIRED</bcp14> is for
the actual certification request and response.
Further message exchanges <bcp14>MAY</bcp14> be performed as needed.</t>
          <t>Note:
The message exchanges marked <bcp14>OPTIONAL</bcp14> in the below <xref target="enrollfigure"/>
cover all those supported by the use of EST in BRSKI.
The last <bcp14>OPTIONAL</bcp14> one, namely certificate confirmation,
is not supported by EST, but by CMP and other enrollment protocols.</t>
          <figure anchor="enrollfigure">
            <name>Certificate Enrollment</name>
            <artset>
              <artwork type="svg" align="left"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="576" width="688" viewBox="0 0 688 576" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                  <path d="M 8,32 L 8,96" fill="none" stroke="black"/>
                  <path d="M 48,104 L 48,560" fill="none" stroke="black"/>
                  <path d="M 80,32 L 80,96" fill="none" stroke="black"/>
                  <path d="M 328,32 L 328,96" fill="none" stroke="black"/>
                  <path d="M 384,104 L 384,560" fill="none" stroke="black"/>
                  <path d="M 432,32 L 432,96" fill="none" stroke="black"/>
                  <path d="M 576,32 L 576,96" fill="none" stroke="black"/>
                  <path d="M 640,104 L 640,560" fill="none" stroke="black"/>
                  <path d="M 680,32 L 680,96" fill="none" stroke="black"/>
                  <path d="M 8,32 L 80,32" fill="none" stroke="black"/>
                  <path d="M 328,32 L 432,32" fill="none" stroke="black"/>
                  <path d="M 576,32 L 680,32" fill="none" stroke="black"/>
                  <path d="M 8,96 L 80,96" fill="none" stroke="black"/>
                  <path d="M 328,96 L 432,96" fill="none" stroke="black"/>
                  <path d="M 576,96 L 680,96" fill="none" stroke="black"/>
                  <path d="M 56,144 L 120,144" fill="none" stroke="black"/>
                  <path d="M 304,144 L 376,144" fill="none" stroke="black"/>
                  <path d="M 392,176 L 424,176" fill="none" stroke="black"/>
                  <path d="M 576,176 L 632,176" fill="none" stroke="black"/>
                  <path d="M 392,192 L 424,192" fill="none" stroke="black"/>
                  <path d="M 584,192 L 632,192" fill="none" stroke="black"/>
                  <path d="M 56,208 L 120,208" fill="none" stroke="black"/>
                  <path d="M 312,208 L 376,208" fill="none" stroke="black"/>
                  <path d="M 56,272 L 120,272" fill="none" stroke="black"/>
                  <path d="M 312,272 L 376,272" fill="none" stroke="black"/>
                  <path d="M 392,304 L 424,304" fill="none" stroke="black"/>
                  <path d="M 584,304 L 632,304" fill="none" stroke="black"/>
                  <path d="M 392,320 L 424,320" fill="none" stroke="black"/>
                  <path d="M 592,320 L 632,320" fill="none" stroke="black"/>
                  <path d="M 56,336 L 120,336" fill="none" stroke="black"/>
                  <path d="M 320,336 L 376,336" fill="none" stroke="black"/>
                  <path d="M 56,384 L 120,384" fill="none" stroke="black"/>
                  <path d="M 344,384 L 376,384" fill="none" stroke="black"/>
                  <path d="M 392,416 L 416,416" fill="none" stroke="black"/>
                  <path d="M 608,416 L 632,416" fill="none" stroke="black"/>
                  <path d="M 392,432 L 416,432" fill="none" stroke="black"/>
                  <path d="M 616,432 L 632,432" fill="none" stroke="black"/>
                  <path d="M 56,448 L 120,448" fill="none" stroke="black"/>
                  <path d="M 352,448 L 376,448" fill="none" stroke="black"/>
                  <path d="M 56,496 L 120,496" fill="none" stroke="black"/>
                  <path d="M 328,496 L 376,496" fill="none" stroke="black"/>
                  <path d="M 392,528 L 424,528" fill="none" stroke="black"/>
                  <path d="M 600,528 L 632,528" fill="none" stroke="black"/>
                  <path d="M 392,544 L 424,544" fill="none" stroke="black"/>
                  <path d="M 536,544 L 632,544" fill="none" stroke="black"/>
                  <path d="M 56,560 L 120,560" fill="none" stroke="black"/>
                  <path d="M 344,560 L 376,560" fill="none" stroke="black"/>
                  <polygon class="arrowhead" points="640,528 628,522.4 628,533.6" fill="black" transform="rotate(0,632,528)"/>
                  <polygon class="arrowhead" points="640,416 628,410.4 628,421.6" fill="black" transform="rotate(0,632,416)"/>
                  <polygon class="arrowhead" points="640,304 628,298.4 628,309.6" fill="black" transform="rotate(0,632,304)"/>
                  <polygon class="arrowhead" points="640,176 628,170.4 628,181.6" fill="black" transform="rotate(0,632,176)"/>
                  <polygon class="arrowhead" points="400,544 388,538.4 388,549.6" fill="black" transform="rotate(180,392,544)"/>
                  <polygon class="arrowhead" points="400,432 388,426.4 388,437.6" fill="black" transform="rotate(180,392,432)"/>
                  <polygon class="arrowhead" points="400,320 388,314.4 388,325.6" fill="black" transform="rotate(180,392,320)"/>
                  <polygon class="arrowhead" points="400,192 388,186.4 388,197.6" fill="black" transform="rotate(180,392,192)"/>
                  <polygon class="arrowhead" points="384,496 372,490.4 372,501.6" fill="black" transform="rotate(0,376,496)"/>
                  <polygon class="arrowhead" points="384,384 372,378.4 372,389.6" fill="black" transform="rotate(0,376,384)"/>
                  <polygon class="arrowhead" points="384,272 372,266.4 372,277.6" fill="black" transform="rotate(0,376,272)"/>
                  <polygon class="arrowhead" points="384,144 372,138.4 372,149.6" fill="black" transform="rotate(0,376,144)"/>
                  <polygon class="arrowhead" points="64,560 52,554.4 52,565.6" fill="black" transform="rotate(180,56,560)"/>
                  <polygon class="arrowhead" points="64,448 52,442.4 52,453.6" fill="black" transform="rotate(180,56,448)"/>
                  <polygon class="arrowhead" points="64,336 52,330.4 52,341.6" fill="black" transform="rotate(180,56,336)"/>
                  <polygon class="arrowhead" points="64,208 52,202.4 52,213.6" fill="black" transform="rotate(180,56,208)"/>
                  <g class="text">
                    <text x="44" y="52">Pledge</text>
                    <text x="364" y="52">Domain</text>
                    <text x="620" y="52">Operator</text>
                    <text x="376" y="68">Registrar</text>
                    <text x="608" y="68">RA/CA</text>
                    <text x="368" y="84">(JRC)</text>
                    <text x="608" y="84">(PKI)</text>
                    <text x="104" y="132">[OPTIONAL</text>
                    <text x="176" y="132">request</text>
                    <text x="220" y="132">of</text>
                    <text x="244" y="132">CA</text>
                    <text x="312" y="132">certificates]</text>
                    <text x="140" y="148">CA</text>
                    <text x="176" y="148">Certs</text>
                    <text x="232" y="148">Request</text>
                    <text x="280" y="148">(1)</text>
                    <text x="440" y="164">[OPTIONAL</text>
                    <text x="528" y="164">forwarding]</text>
                    <text x="444" y="180">CA</text>
                    <text x="480" y="180">Certs</text>
                    <text x="536" y="180">Request</text>
                    <text x="444" y="196">CA</text>
                    <text x="480" y="196">Certs</text>
                    <text x="540" y="196">Response</text>
                    <text x="140" y="212">CA</text>
                    <text x="176" y="212">Certs</text>
                    <text x="236" y="212">Response</text>
                    <text x="288" y="212">(2)</text>
                    <text x="104" y="244">[OPTIONAL</text>
                    <text x="176" y="244">request</text>
                    <text x="220" y="244">of</text>
                    <text x="276" y="244">attributes</text>
                    <text x="84" y="260">to</text>
                    <text x="128" y="260">include</text>
                    <text x="172" y="260">in</text>
                    <text x="240" y="260">Certification</text>
                    <text x="332" y="260">Request]</text>
                    <text x="168" y="276">Attribute</text>
                    <text x="240" y="276">Request</text>
                    <text x="288" y="276">(3)</text>
                    <text x="440" y="292">[OPTIONAL</text>
                    <text x="528" y="292">forwarding]</text>
                    <text x="472" y="308">Attribute</text>
                    <text x="544" y="308">Request</text>
                    <text x="472" y="324">Attribute</text>
                    <text x="548" y="324">Response</text>
                    <text x="168" y="340">Attribute</text>
                    <text x="244" y="340">Response</text>
                    <text x="296" y="340">(4)</text>
                    <text x="104" y="372">[REQUIRED</text>
                    <text x="200" y="372">certification</text>
                    <text x="292" y="372">request]</text>
                    <text x="184" y="388">Certification</text>
                    <text x="272" y="388">Request</text>
                    <text x="320" y="388">(5)</text>
                    <text x="440" y="404">[OPTIONAL</text>
                    <text x="528" y="404">forwarding]</text>
                    <text x="480" y="420">Certification</text>
                    <text x="568" y="420">Request</text>
                    <text x="480" y="436">Certification</text>
                    <text x="572" y="436">Response</text>
                    <text x="184" y="452">Certification</text>
                    <text x="276" y="452">Response</text>
                    <text x="328" y="452">(6)</text>
                    <text x="104" y="484">[OPTIONAL</text>
                    <text x="192" y="484">certificate</text>
                    <text x="296" y="484">confirmation]</text>
                    <text x="176" y="500">Certificate</text>
                    <text x="256" y="500">Confirm</text>
                    <text x="304" y="500">(7)</text>
                    <text x="440" y="516">[OPTIONAL</text>
                    <text x="528" y="516">forwarding]</text>
                    <text x="480" y="532">Certificate</text>
                    <text x="560" y="532">Confirm</text>
                    <text x="448" y="548">PKI</text>
                    <text x="496" y="548">Confirm</text>
                    <text x="184" y="564">PKI/Registrar</text>
                    <text x="272" y="564">Confirm</text>
                    <text x="320" y="564">(8)</text>
                  </g>
                </svg>
              </artwork>
              <artwork type="ascii-art" align="left"><![CDATA[
+--------+                              +------------+                 +------------+
| Pledge |                              | Domain     |                 | Operator   |
|        |                              | Registrar  |                 | RA/CA      |
|        |                              |  (JRC)     |                 | (PKI)      |
+--------+                              +------------+                 +------------+
     |                                         |                               |
     |  [OPTIONAL request of CA certificates]  |                               |
     |--------- CA Certs Request (1) --------->|                               |
     |                                         |  [OPTIONAL forwarding]        |
     |                                         |----- CA Certs Request ------->|
     |                                         |<---- CA Certs Response -------|
     |<-------- CA Certs Response (2) ---------|                               |
     |                                         |                               |
     |  [OPTIONAL request of attributes        |                               |
     |   to include in Certification Request]  |                               |
     |--------- Attribute Request (3) -------->|                               |
     |                                         |  [OPTIONAL forwarding]        |
     |                                         |----- Attribute Request ------>|
     |                                         |<---- Attribute Response ------|
     |<-------- Attribute Response (4) --------|                               |
     |                                         |                               |
     |  [REQUIRED certification request]       |                               |
     |--------- Certification Request (5) ---->|                               |
     |                                         |  [OPTIONAL forwarding]        |
     |                                         |---- Certification Request --->|
     |                                         |<--- Certification Response ---|
     |<-------- Certification Response (6) ----|                               |
     |                                         |                               |
     |  [OPTIONAL certificate confirmation]    |                               |
     |--------- Certificate Confirm (7) ------>|                               |
     |                                         |  [OPTIONAL forwarding]        |
     |                                         |----- Certificate Confirm ---->|
     |                                         |<---- PKI Confirm -------------|
     |<-------- PKI/Registrar Confirm (8) -----|                               |
]]></artwork>
            </artset>
          </figure>
          <t>It may be noted that connections between the registrar and the PKI components
of the operator (RA, CA, etc.) may be intermittent or off-line.
Messages should be sent as soon as sufficient transfer capacity is available.</t>
          <t>The label <tt>[OPTIONAL forwarding]</tt> in <xref target="enrollfigure"/>
means that on receiving from a pledge a request message of the given type,
the registrar <bcp14>MAY</bcp14> answer the request directly.
In this case, it <bcp14>MUST</bcp14> authenticate its responses with the same credentials
as used for authenticating itself at the TLS level for the voucher exchange.
Otherwise, the registrar <bcp14>MUST</bcp14> forward the request to the RA
and forward any resulting response back to the pledge.</t>
          <t>The decision of whether to forward a request or to answer it directly can depend
on various static and dynamic factors. They include the application scenario,
the capabilities of the registrar and of the local RA possibly co-located
with the registrar, the enrollment protocol being used, and the specific
contents of the request.</t>
          <t>Note that
there are several options for how the registrar could be able to directly answer
requests for CA certificates or for certification request attributes.
It could cache responses obtained from the domain PKI and
later use their contents for responding to requests asking for the same data.
The contents could also be explicitly provisioned at the registrar.</t>
          <t>Further note that
certification requests typically need to be handled by the backend PKI,
but the registrar can answer them directly with an error response
in case it determines that such a request should be rejected,
for instance, because is not properly authenticated or not authorized.<!--br-->
Also, certificate confirmation messages
will usually be forwarded to the backend PKI,
but if the registrar knows that they are not needed or wanted there
it can acknowledge such messages directly.</t>
          <t>The following list provides an abstract description of the flow
depicted in <xref target="enrollfigure"/>.</t>
          <ul spacing="normal">
            <li>
              <t>CA Certs Request (1): The pledge optionally requests the latest relevant
CA certificates. This ensures that the pledge has the
complete set of current CA certificates beyond the
pinned-domain-cert (which is contained in the voucher
and which may be just the domain registrar certificate).</t>
            </li>
            <li>
              <t>CA Certs Response (2): This <bcp14>MUST</bcp14> contain any intermediate CA certificates
that the pledge may need to validate certificates
and <bcp14>MAY</bcp14> contain the LDevID trust anchor.</t>
            </li>
            <li>
              <t>Attribute Request (3): Typically, the automated bootstrapping occurs
without local administrative configuration of the pledge.
Nevertheless, there are cases in which the pledge may also
include in the Certification Request (5) additional attributes that are
specific to the target domain. To get these attributes in
advance, the attribute request may be used.</t>
            </li>
            <li>
              <t>Attribute Response (4): This <bcp14>MUST</bcp14> contain the attributes requested in (3)
to be included in the subsequent Certification Request (5).  </t>
              <t>
For example, <xref section="6.11.7.2" sectionFormat="comma" target="RFC8994"/> specifies
how the attribute request is used to signal to the pledge
the acp-node-name field required for enrollment into an ACP domain.</t>
            </li>
            <li>
              <t>Certification Request (5): This <bcp14>MUST</bcp14> contain the
authenticated self-contained object ensuring both the proof of possession of
the corresponding private key and the proof of identity of the requester.</t>
            </li>
            <li>
              <t>Certification Response (6): This <bcp14>MUST</bcp14> contain on success
the requested certificate and <bcp14>MAY</bcp14> include further information,
like certificates of intermediate CAs and any additional trust anchors.</t>
            </li>
            <li>
              <t>Certificate Confirm (7): An optional confirmation sent
after the requested certificate has been received and validated.
If sent, it <bcp14>MUST</bcp14> contain a positive or negative confirmation by the pledge to
the PKI whether the certificate was successfully enrolled and fits its needs.</t>
            </li>
            <li>
              <t>PKI/Registrar Confirm (8): An acknowledgment by the PKI
that <bcp14>MUST</bcp14> be sent on reception of the Certificate Confirm.</t>
            </li>
          </ul>
          <t>The generic messages described above may be implemented using any certificate
enrollment protocol that supports authenticated self-contained objects for the
certification request as described in <xref target="req-sol"/>.
Examples are available in <xref target="exist_prot"/>.</t>
          <t>Note that the optional certificate confirmation by the pledge to the PKI
described above is independent of the mandatory enrollment status telemetry
done between the pledge and the registrar in the final phase of BRSKI-AE,
described next.</t>
        </section>
        <section anchor="pledge-registrar-enrollment-status-telemetry">
          <name>Pledge - Registrar Enrollment Status Telemetry</name>
          <t>The enrollment status telemetry is performed
as specified in <xref section="5.9.4" sectionFormat="comma" target="RFC8995"/>.</t>
          <t>In BRSKI this is described as part of the certificate enrollment step, but
due to the generalization on the enrollment protocol described in this document
it is regarded as a separate phase here.</t>
        </section>
      </section>
      <section anchor="addressing">
        <name>Enhancements to the Endpoint Addressing Scheme of BRSKI</name>
        <t>BRSKI-AE provides generalizations to the addressing scheme defined in
BRSKI <xref section="5" sectionFormat="comma" target="RFC8995"/> to accommodate alternative enrollment protocols
that use authenticated self-contained objects for certification requests.
In existing RAs/CAs supporting such an enrollment protocol (see also
<xref target="exist_prot"/>), these generalizations can be employed without modifications.</t>
        <t>The addressing scheme in BRSKI for certification requests and
the related CA certificates and CSR attributes retrieval functions
uses the definition from EST <xref target="RFC7030"/>.
Here is the example of simple enrollment: <tt>"/.well-known/est/simpleenroll"</tt>.
This approach is generalized to the following notation:
<tt>"/.well-known/&lt;enrollment-protocol&gt;/&lt;request&gt;"</tt>
in which <tt>&lt;enrollment-protocol&gt;</tt> refers to a certificate enrollment protocol.
Note that enrollment is considered here a message sequence
that contains at least a certification request and a certification response.
The following conventions are used to provide maximal compatibility with BRSKI:</t>
        <ul spacing="normal">
          <li>
            <t><tt>&lt;enrollment-protocol&gt;</tt>: <bcp14>MUST</bcp14> reference the protocol being used.
Existing values include '<tt>est</tt>' <xref target="RFC7030"/> as in BRSKI and '<tt>cmp</tt>' as in
<xref target="RFC9483"/> and <xref target="brski-cmp-instance"/> below.
Values for other existing protocols such as CMC and SCEP,
as well as for newly defined protocols are outside the scope of this document.
For use of the <tt>&lt;enrollment-protocol&gt;</tt> and <tt>&lt;request&gt;</tt> URI components,
they would need to be specified in a suitable RFC and
placed into the Well-Known URIs registry, just as EST in <xref target="RFC7030"/>.</t>
          </li>
          <li>
            <t><tt>&lt;request&gt;</tt>: if present, this path component <bcp14>MUST</bcp14> describe,
depending on the enrollment protocol being used, the operation requested.
Enrollment protocols are expected to define their request endpoints,
as done by existing protocols (see also <xref target="exist_prot"/>).</t>
          </li>
        </ul>
        <!-- ## Domain Registrar Support of Alternative Enrollment Protocols -->

<t>Well-known URIs for various endpoints on the domain registrar are
already defined as part of the base BRSKI specification or indirectly by EST.
In addition, alternative enrollment endpoints <bcp14>MAY</bcp14> be supported by the registrar.</t>
        <t>A pledge <bcp14>SHOULD</bcp14> use the endpoints defined for the enrollment protocol(s)
that it can use.
It will recognize whether the protocol it uses and the specific request it wants
to perform is understood and supported by the domain registrar
by sending the request to the respective endpoint according to the above
addressing scheme and then evaluating the HTTP status code of the response.
If the pledge uses endpoints that are not standardized,
it risks that the registrar does not recognize a request and thus may reject it,
even if the registrar supports the intended protocol and operation.</t>
        <t>The following list of endpoints provides an illustrative example of
a domain registrar supporting several options for EST as well as for
CMP to be used in BRSKI-AE. The listing contains the supported
endpoints to which the pledge may connect for bootstrapping. This
includes the voucher handling as well as the enrollment endpoints.
The CMP-related enrollment endpoints are defined as well-known URIs
in CMP Updates <xref target="RFC9480"/> and the Lightweight CMP Profile <xref target="RFC9483"/>.</t>
        <artwork align="left"><![CDATA[
  /.well-known/brski/voucherrequest
  /.well-known/brski/voucher_status
  /.well-known/brski/enrollstatus
  /.well-known/est/cacerts
  /.well-known/est/csrattrs
  /.well-known/est/fullcmc
  /.well-known/cmp/getcacerts
  /.well-known/cmp/getcertreqtemplate
  /.well-known/cmp/initialization
  /.well-known/cmp/pkcs10
]]></artwork>
      </section>
    </section>
    <section anchor="exist_prot">
      <name>Instantiation with Existing Enrollment Protocols</name>
      <t>This section maps the generic requirements to support proof of possession
and proof of identity to selected existing certificate enrollment protocols
and specifies further aspects of using such enrollment protocols in BRSKI-AE.</t>
      <section anchor="brski-cmp-instance">
        <name>BRSKI-CMP: BRSKI-AE instantiated with CMP</name>
        <t>Instead of referring to CMP
as specified in <xref target="RFC4210"/> and <xref target="RFC9480"/>,
this document refers to the Lightweight CMP Profile (LCMPP)
<xref target="RFC9483"/> because
the subset of CMP defined there is sufficient for the functionality needed here.</t>
        <t>When using CMP, adherence to
the LCMPP <xref target="RFC9483"/> is <bcp14>REQUIRED</bcp14>.
In particular, the following specific requirements apply (cf. <xref target="enrollfigure"/>).</t>
        <ul spacing="normal">
          <li>
            <t>CA Certs Request (1) and Response (2):<br/>
Requesting CA certificates is <bcp14>OPTIONAL</bcp14>.<br/>
If supported, it <bcp14>SHALL</bcp14> be implemented as specified in
<xref section="4.3.1" sectionFormat="comma" target="RFC9483"/>.</t>
          </li>
          <li>
            <t>Attribute Request (3) and Response (4):<br/>
Requesting certification request attributes is <bcp14>OPTIONAL</bcp14>.<br/>
If supported, it <bcp14>SHALL</bcp14> be implemented as specified in
<xref section="4.3.3" sectionFormat="comma" target="RFC9483"/>.  </t>
            <t>
Alternatively, the registrar <bcp14>MAY</bcp14> modify
the contents of the requested certificate contents
as specified in <xref section="5.2.3.2" sectionFormat="comma" target="RFC9483"/>.</t>
          </li>
          <li>
            <t>Certification Request (5) and Response (6):<br/>
Certificates <bcp14>SHALL</bcp14> be requested and provided
as specified in the LCMPP
<xref section="4.1.1" sectionFormat="comma" target="RFC9483"/> (based on CRMF) or
<xref section="4.1.4" sectionFormat="comma" target="RFC9483"/> (based on PKCS #10).  </t>
            <t>
Proof of possession <bcp14>SHALL</bcp14> be provided in a way suitable for the key type.
Proof of identity <bcp14>SHALL</bcp14> be provided by signature-based
protection of the certification request message
as outlined in <xref section="3.2" sectionFormat="comma" target="RFC9483"/>
using the IDevID secret.  </t>
            <t>
When the registrar forwards a certification request by the pledge to
a backend RA, the registrar is <bcp14>RECOMMENDED</bcp14> to wrap the original
certification request in a nested message signed with its own credentials
as described in <xref section="5.2.2.1" sectionFormat="comma" target="RFC9483"/>.
This explicitly conveys the consent by the registrar to the RA
while retaining the certification request
with its proof of origin provided by the pledge signature.  </t>
            <t>
In case additional trust anchors (besides the pinned-domain-cert)
need to be conveyed to the pledge,
this <bcp14>SHOULD</bcp14> be done in the <tt>caPubs</tt> field of the certification response
rather than in a CA Certs Response.</t>
          </li>
          <li>
            <t>Certificate Confirm (7) and PKI/Registrar Confirm (8):<br/>
Explicit confirmation of new certificates to the RA/CA
<bcp14>MAY</bcp14> be used as specified in
<xref section="4.1.1" sectionFormat="comma" target="RFC9483"/>.  </t>
            <t>
Note that independently of certificate confirmation
enrollment status telemetry with the registrar will be performed
as described in BRSKI <xref section="5.9.4" sectionFormat="comma" target="RFC8995"/>.</t>
          </li>
          <li>
            <t>If delayed delivery of responses is needed
(for instance, to support enrollment over an asynchronous channel),
it <bcp14>SHALL</bcp14> be performed as specified in
Section <xref target="RFC9483" section="4.4" sectionFormat="bare"/> and Section <xref target="RFC9483" section="5.1.2" sectionFormat="bare"/> of <xref target="RFC9483"/>.</t>
          </li>
        </ul>
        <t>Since CMP is independent of message transfer, the transfer mechanism
can be freely chosen according to the needs of the application scenario.</t>
        <!--
CMP Updates {{RFC9480}} and
the LCMPP {{RFC9483}}
provide requirements for interoperability.
-->

<t>BRSKI-AE with CMP can also be combined with
Constrained BRSKI <xref target="I-D.ietf-anima-constrained-voucher"/>,
using CoAP for enrollment message transport as described by
CoAP Transport for CMP <xref target="RFC9482"/>.
In this scenario, the EST-specific parts
of <xref target="I-D.ietf-anima-constrained-voucher"/> do not apply.</t>
        <t>For BRSKI-AE scenarios where a general solution (cf. <xref target="discovery"/>)
for discovering registrars with CMP support is not available,
the following minimalist approach <bcp14>MAY</bcp14> be used.
Perform discovery as defined in BRSKI <xref section="B" sectionFormat="comma" target="RFC8995"/> but using
the service name <tt>"brski-registrar-cmp"</tt> (defined in <xref target="iana-consider"/>)
instead of <tt>"brski-registrar"</tt> (defined in <xref section="8.6" sectionFormat="comma" target="RFC8995"/>).
Note that this approach does not support join proxies.</t>
      </section>
      <section anchor="support-of-other-enrollment-protocols">
        <name>Support of Other Enrollment Protocols</name>
        <t>Further instantiations of BRSKI-AE can be done.  They are left for future work.</t>
        <t>In particular, CMC <xref target="RFC5272"/> (using its in-band source authentication options)
and SCEP <xref target="RFC8894"/> (using its 'renewal' option) could be used.</t>
        <t>The fullCMC variant of EST sketched in <xref section="2.5" sectionFormat="comma" target="RFC7030"/>
might also be used here. For EST-fullCMC further specification is necessary.
<!--
Yet most likely it will not be followed up
because, by now, no implementations of this EST variant are known,
and no reasons are known why it could be preferable over using BRSKI-CMP.
-->
        </t>
        <!--
 ## BRSKI-EST-fullCMC: Application to EST

When using EST {{RFC7030}}, the following aspects and constraints
need to be considered and the given extra requirements need to be fulfilled,
which adapt BRSKI {{RFC8995, Section 5.9.3}}:

* Proof of possession is provided typically by using the specified PKCS #10
  structure in the request.
  Together with Full PKI requests, also CRMF can be used.

* Proof of identity needs to be achieved by signing the certification request
  object using the Full PKI Request option (including the /fullcmc endpoint).
  This provides sufficient information for the RA to authenticate the pledge
  as the origin of the request and to make an authorization decision on the
  received certification request.
  Note:
  EST references CMC {{RFC5272}} for the definition of the Full PKI Request.
  For proof of identity, the signature of the SignedData of the Full PKI Request
  is performed using the IDevID secret of the pledge.  The data signed
  must include include a sufficiently strong identifier of the pledge,
  e.g, the subject of its IDevID certificate.

  Note:
  In this case the binding to the underlying TLS channel is not necessary.

* When the RA is temporarily not available, as per {{RFC7030, Section 4.2.3}},
  an HTTP status code 202 should be returned by the registrar,
  and the pledge will repeat the initial Full PKI Request later.
-->

<!--
Note that the work in the ACE WG described in
{{draft-selander-ace-coap-est-oscore}} may be considered here as well,
as it also addresses the encapsulation of EST in a way that
makes it independent of the underlying TLS channel using OSCORE,
which also entails that authenticated self-contained objects are used.
-->

</section>
    </section>
    <section anchor="iana-consider">
      <name>IANA Considerations</name>
      <t>This document requires one IANA action: register in the
<eref target="https://www.iana.org/assignments/service-names-port-numbers/service-names-port-numbers.xhtml">Service Name and Transport Protocol Port Number Registry</eref>
the following service name.</t>
      <t><strong>Service Name:</strong> brski-registrar-cmp<br/>
        <strong>Transport Protocol(s):</strong> tcp<br/>
        <strong>Assignee:</strong> IESG <eref target="mailto:iesg@ietf.org">iesg@ietf.org</eref><br/>
        <strong>Contact:</strong> IESG <eref target="mailto:iesg@ietf.org">iesg@ietf.org</eref><br/>
        <strong>Description:</strong> Bootstrapping Remote Secure Key Infrastructure registrar with
CMP capabilities according to the Lightweight CMP Profile (LCMPP, <xref target="RFC9483"/>)<br/>
        <strong>Reference:</strong> [THISRFC]</t>
      <t>Note:
We chose here the suffix "cmp" rather than some other abbreviation like "lcmpp"
mainly because this document defines the normative CMP instantiation of
BRSKI-AE, which implies adherence to LCMPP is necessary and sufficient.</t>
    </section>
    <section anchor="sec-consider">
      <name>Security Considerations</name>
      <t>The security considerations  laid out in BRSKI <xref target="RFC8995"/> apply to the
discovery and voucher exchange as well as for the status exchange information.</t>
      <t>In particular,
even if the registrar delegates part or all of its RA role
during certificate enrollment to a separate system,
it still must be made sure that the registrar takes part in the decision
on accepting or declining a request to join the domain,
as required in <xref section="5.3" sectionFormat="comma" target="RFC8995"/>.
As this pertains also to obtaining a valid domain-specific certificate,
it must be made sure that a pledge can not circumvent the registrar
in the decision of whether it is granted an LDevID certificate by the CA.
There are various ways how to fulfill this, including:</t>
      <ul spacing="normal">
        <li>
          <t>implicit consent</t>
        </li>
        <li>
          <t>the registrar signals its consent to the RA out-of-band before or during
the enrollment phase, for instance by entering the pledge identity in a database.</t>
        </li>
        <li>
          <t>the registrar provides its consent using an extra message that is transferred
on the same channel as the enrollment messages, possibly in a TLS tunnel.</t>
        </li>
        <li>
          <t>the registrar explicitly states its consent by signing, in addition to the pledge,
the authenticated self-contained certificate enrollment request message.</t>
        </li>
      </ul>
      <t>Note: If EST was used, the registrar could give implicit consent on a
certification request by forwarding the request to a PKI entity using a
connection authenticated with a certificate containing an id-kp-cmcRA extension.</t>
      <t>When CMP is used, the security considerations laid out in the
LCMPP <xref target="RFC9483"/> apply.</t>
      <t>Note that CMP messages are not encrypted.
This may give eavesdroppers insight into which devices are bootstrapped into the
domain, and this in turn might also be used to selectively block the enrollment
of certain devices.
To prevent this, the underlying message transport channel can be encrypted,
for instance by employing TLS.
For the communication between the pledge and the registrar, the use of TLS is already provided
but needs to be obeyed for the further transport from the registrar to a backend RA.</t>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We thank Eliot Lear
for his contributions as a co-author at an earlier draft stage.</t>
      <t>We thank Brian E. Carpenter, Michael Richardson, and Giorgio Romanenghi
for their input and discussion on use cases and call flows.</t>
      <t>Moreover,
we thank Toerless Eckert (document shepherd),
Barry Leiba (SECdir review),
Mahesh Jethanandani  (IETF area director),
Michael Richardson (ANIMA design team member),
as well as Rajeev Ranjan, Rufus Buschart,
Andreas Reiter, and Szofia Fazekas-Zisch (Siemens colleagues)
for their reviews with suggestions for improvements.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC8995">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="T. Eckert" initials="T." surname="Eckert"/>
            <author fullname="M. Behringer" initials="M." surname="Behringer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane. To do this, a Secure Key Infrastructure is bootstrapped. This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline. We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device. The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="RFC9483">
          <front>
            <title>Lightweight Certificate Management Protocol (CMP) Profile</title>
            <author fullname="H. Brockhaus" initials="H." surname="Brockhaus"/>
            <author fullname="D. von Oheimb" initials="D." surname="von Oheimb"/>
            <author fullname="S. Fries" initials="S." surname="Fries"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document aims at simple, interoperable, and automated PKI management operations covering typical use cases of industrial and Internet of Things (IoT) scenarios. This is achieved by profiling the Certificate Management Protocol (CMP), the related Certificate Request Message Format (CRMF), and transfer based on HTTP or Constrained Application Protocol (CoAP) in a succinct but sufficiently detailed and self-contained way. To make secure certificate management for simple scenarios and constrained devices as lightweight as possible, only the most crucial types of operations and options are specified as mandatory. More specialized or complex use cases are supported with optional features.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9483"/>
          <seriesInfo name="DOI" value="10.17487/RFC9483"/>
        </reference>
        <reference anchor="IEEE_802.1AR-2018" target="https://ieeexplore.ieee.org/document/8423794">
          <front>
            <title>IEEE Standard for Local and Metropolitan Area Networks - Secure Device Identity</title>
            <author>
              <organization>IEEE</organization>
            </author>
            <date year="2018" month="August"/>
          </front>
          <seriesInfo name="IEEE" value="802.1AR-2018"/>
          <seriesInfo name="DOI" value="10.1109/IEEESTD.2018.8423794"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-anima-constrained-voucher">
          <front>
            <title>Constrained Bootstrapping Remote Secure Key Infrastructure (cBRSKI)</title>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Peter Van der Stok" initials="P." surname="Van der Stok">
              <organization>vanderstok consultancy</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Esko Dijk" initials="E." surname="Dijk">
              <organization>IoTconsultancy.nl</organization>
            </author>
            <date day="3" month="March" year="2024"/>
            <abstract>
              <t>   This document defines the Constrained Bootstrapping Remote Secure Key
   Infrastructure (cBRSKI) protocol, which provides a solution for
   secure zero-touch onboarding of resource-constrained (IoT) devices
   into the network of a domain owner.  This protocol is designed for
   constrained networks, which may have limited data throughput or may
   experience frequent packet loss. cBRSKI is a variant of the BRSKI
   protocol, which uses an artifact signed by the device manufacturer
   called the "voucher" which enables a new device and the owner's
   network to mutually authenticate.  While the BRSKI voucher data is
   encoded in JSON, cBRSKI uses a compact CBOR-encoded voucher.  The
   BRSKI voucher data definition is extended with new data types that
   allow for smaller voucher sizes.  The Enrollment over Secure
   Transport (EST) protocol, used in BRSKI, is replaced with EST-over-
   CoAPS; and HTTPS used in BRSKI is replaced with DTLS-secured CoAP
   (CoAPS).  This document Updates RFC 8995 and RFC 9148.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-constrained-voucher-24"/>
        </reference>
        <reference anchor="BRSKI-AE-overview" target="https://datatracker.ietf.org/meeting/116/materials/slides-116-anima-update-on-brski-ae-alternative-enrollment-protocols-in-brski-00">
          <front>
            <title>BRSKI-AE Protocol Overview</title>
            <author initials="" surname="S. Fries" fullname="S. Fries">
              <organization/>
            </author>
            <author initials="D." surname="von Oheimb">
              <organization/>
            </author>
            <date year="2023" month="March"/>
          </front>
          <annotation>Graphics on slide 4 of the status update on the BRSKI-AE draft 04 at IETF 116.</annotation>
        </reference>
        <reference anchor="RFC2986">
          <front>
            <title>PKCS #10: Certification Request Syntax Specification Version 1.7</title>
            <author fullname="M. Nystrom" initials="M." surname="Nystrom"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <date month="November" year="2000"/>
            <abstract>
              <t>This memo represents a republication of PKCS #10 v1.7 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process. The body of this document, except for the security considerations section, is taken directly from the PKCS #9 v2.0 or the PKCS #10 v1.7 document. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2986"/>
          <seriesInfo name="DOI" value="10.17487/RFC2986"/>
        </reference>
        <reference anchor="RFC4210">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate Management Protocol (CMP)</title>
            <author fullname="C. Adams" initials="C." surname="Adams"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="T. Kause" initials="T." surname="Kause"/>
            <author fullname="T. Mononen" initials="T." surname="Mononen"/>
            <date month="September" year="2005"/>
            <abstract>
              <t>This document describes the Internet X.509 Public Key Infrastructure (PKI) Certificate Management Protocol (CMP). Protocol messages are defined for X.509v3 certificate creation and management. CMP provides on-line interactions between PKI components, including an exchange between a Certification Authority (CA) and a client system. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4210"/>
          <seriesInfo name="DOI" value="10.17487/RFC4210"/>
        </reference>
        <reference anchor="RFC4211">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate Request Message Format (CRMF)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="September" year="2005"/>
            <abstract>
              <t>This document describes the Certificate Request Message Format (CRMF) syntax and semantics. This syntax is used to convey a request for a certificate to a Certification Authority (CA), possibly via a Registration Authority (RA), for the purposes of X.509 certificate production. The request will typically include a public key and the associated registration information. This document does not define a certificate request protocol. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4211"/>
          <seriesInfo name="DOI" value="10.17487/RFC4211"/>
        </reference>
        <reference anchor="RFC5272">
          <front>
            <title>Certificate Management over CMS (CMC)</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <author fullname="M. Myers" initials="M." surname="Myers"/>
            <date month="June" year="2008"/>
            <abstract>
              <t>This document defines the base syntax for CMC, a Certificate Management protocol using the Cryptographic Message Syntax (CMS). This protocol addresses two immediate needs within the Internet Public Key Infrastructure (PKI) community:</t>
              <t>1. The need for an interface to public key certification products and services based on CMS and PKCS #10 (Public Key Cryptography Standard), and</t>
              <t>2. The need for a PKI enrollment protocol for encryption only keys due to algorithm or hardware design.</t>
              <t>CMC also requires the use of the transport document and the requirements usage document along with this document for a full definition. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5272"/>
          <seriesInfo name="DOI" value="10.17487/RFC5272"/>
        </reference>
        <reference anchor="RFC5652">
          <front>
            <title>Cryptographic Message Syntax (CMS)</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="70"/>
          <seriesInfo name="RFC" value="5652"/>
          <seriesInfo name="DOI" value="10.17487/RFC5652"/>
        </reference>
        <reference anchor="RFC5929">
          <front>
            <title>Channel Bindings for TLS</title>
            <author fullname="J. Altman" initials="J." surname="Altman"/>
            <author fullname="N. Williams" initials="N." surname="Williams"/>
            <author fullname="L. Zhu" initials="L." surname="Zhu"/>
            <date month="July" year="2010"/>
            <abstract>
              <t>This document defines three channel binding types for Transport Layer Security (TLS), tls-unique, tls-server-end-point, and tls-unique-for-telnet, in accordance with RFC 5056 (On Channel Binding).</t>
              <t>Note that based on implementation experience, this document changes the original definition of 'tls-unique' channel binding type in the channel binding type IANA registry. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5929"/>
          <seriesInfo name="DOI" value="10.17487/RFC5929"/>
        </reference>
        <reference anchor="RFC6955">
          <front>
            <title>Diffie-Hellman Proof-of-Possession Algorithms</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <author fullname="H. Prafullchandra" initials="H." surname="Prafullchandra"/>
            <date month="May" year="2013"/>
            <abstract>
              <t>This document describes two methods for producing an integrity check value from a Diffie-Hellman key pair and one method for producing an integrity check value from an Elliptic Curve key pair. This behavior is needed for such operations as creating the signature of a Public-Key Cryptography Standards (PKCS) #10 Certification Request. These algorithms are designed to provide a Proof-of-Possession of the private key and not to be a general purpose signing algorithm.</t>
              <t>This document obsoletes RFC 2875.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6955"/>
          <seriesInfo name="DOI" value="10.17487/RFC6955"/>
        </reference>
        <reference anchor="RFC7030">
          <front>
            <title>Enrollment over Secure Transport</title>
            <author fullname="M. Pritikin" initials="M." role="editor" surname="Pritikin"/>
            <author fullname="P. Yee" initials="P." role="editor" surname="Yee"/>
            <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport. This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates. It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7030"/>
          <seriesInfo name="DOI" value="10.17487/RFC7030"/>
        </reference>
        <reference anchor="RFC8366">
          <front>
            <title>A Voucher Artifact for Bootstrapping Protocols</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
            <author fullname="T. Eckert" initials="T." surname="Eckert"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>This document defines a strategy to securely assign a pledge to an owner using an artifact signed, directly or indirectly, by the pledge's manufacturer. This artifact is known as a "voucher".</t>
              <t>This document defines an artifact format as a YANG-defined JSON document that has been signed using a Cryptographic Message Syntax (CMS) structure. Other YANG-derived formats are possible. The voucher artifact is normally generated by the pledge's manufacturer (i.e., the Manufacturer Authorized Signing Authority (MASA)).</t>
              <t>This document only defines the voucher artifact, leaving it to other documents to describe specialized protocols for accessing it.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8366"/>
          <seriesInfo name="DOI" value="10.17487/RFC8366"/>
        </reference>
        <reference anchor="RFC8894">
          <front>
            <title>Simple Certificate Enrolment Protocol</title>
            <author fullname="P. Gutmann" initials="P." surname="Gutmann"/>
            <date month="September" year="2020"/>
            <abstract>
              <t>This document specifies the Simple Certificate Enrolment Protocol (SCEP), a PKI protocol that leverages existing technology by using Cryptographic Message Syntax (CMS, formerly known as PKCS #7) and PKCS #10 over HTTP. SCEP is the evolution of the enrolment protocol sponsored by Cisco Systems, which enjoys wide support in both client and server implementations, as well as being relied upon by numerous other industry standards that work with certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8894"/>
          <seriesInfo name="DOI" value="10.17487/RFC8894"/>
        </reference>
        <reference anchor="RFC8994">
          <front>
            <title>An Autonomic Control Plane (ACP)</title>
            <author fullname="T. Eckert" initials="T." role="editor" surname="Eckert"/>
            <author fullname="M. Behringer" initials="M." role="editor" surname="Behringer"/>
            <author fullname="S. Bjarnason" initials="S." surname="Bjarnason"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>Autonomic functions need a control plane to communicate, which depends on some addressing and routing. This Autonomic Control Plane should ideally be self-managing and be as independent as possible of configuration. This document defines such a plane and calls it the "Autonomic Control Plane", with the primary use as a control plane for autonomic functions. It also serves as a "virtual out-of-band channel" for Operations, Administration, and Management (OAM) communications over a network that provides automatically configured, hop-by-hop authenticated and encrypted communications via automatically configured IPv6 even when the network is not configured or is misconfigured.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8994"/>
          <seriesInfo name="DOI" value="10.17487/RFC8994"/>
        </reference>
        <reference anchor="RFC9148">
          <front>
            <title>EST-coaps: Enrollment over Secure Transport with the Secure Constrained Application Protocol</title>
            <author fullname="P. van der Stok" initials="P." surname="van der Stok"/>
            <author fullname="P. Kampanakis" initials="P." surname="Kampanakis"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="S. Raza" initials="S." surname="Raza"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>Enrollment over Secure Transport (EST) is used as a certificate provisioning protocol over HTTPS. Low-resource devices often use the lightweight Constrained Application Protocol (CoAP) for message exchanges. This document defines how to transport EST payloads over secure CoAP (EST-coaps), which allows constrained devices to use existing EST functionality for provisioning certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9148"/>
          <seriesInfo name="DOI" value="10.17487/RFC9148"/>
        </reference>
        <reference anchor="RFC9480">
          <front>
            <title>Certificate Management Protocol (CMP) Updates</title>
            <author fullname="H. Brockhaus" initials="H." surname="Brockhaus"/>
            <author fullname="D. von Oheimb" initials="D." surname="von Oheimb"/>
            <author fullname="J. Gray" initials="J." surname="Gray"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document contains a set of updates to the syntax of Certificate Management Protocol (CMP) version 2 and its HTTP transfer mechanism. This document updates RFCs 4210, 5912, and 6712.</t>
              <t>The aspects of CMP updated in this document are using EnvelopedData instead of EncryptedValue, clarifying the handling of p10cr messages, improving the crypto agility, as well as adding new general message types, extended key usages to identify certificates for use with CMP, and well-known URI path segments.</t>
              <t>CMP version 3 is introduced to enable signaling support of EnvelopedData instead of EncryptedValue and signal the use of an explicit hash AlgorithmIdentifier in certConf messages, as far as needed.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9480"/>
          <seriesInfo name="DOI" value="10.17487/RFC9480"/>
        </reference>
        <reference anchor="RFC9482">
          <front>
            <title>Constrained Application Protocol (CoAP) Transfer for the Certificate Management Protocol</title>
            <author fullname="M. Sahni" initials="M." role="editor" surname="Sahni"/>
            <author fullname="S. Tripathi" initials="S." role="editor" surname="Tripathi"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>This document specifies the use of the Constrained Application Protocol (CoAP) as a transfer mechanism for the Certificate Management Protocol (CMP). CMP defines the interaction between various PKI entities for the purpose of certificate creation and management. CoAP is an HTTP-like client-server protocol used by various constrained devices in the Internet of Things space.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9482"/>
          <seriesInfo name="DOI" value="10.17487/RFC9482"/>
        </reference>
        <reference anchor="IEC-62351-9">
          <front>
            <title>IEC 62351 - Power systems management and associated information exchange - Data and communications security - Part 9: Cyber security key management for power system equipment</title>
            <author>
              <organization>International Electrotechnical Commission</organization>
            </author>
            <date year="2017" month="May"/>
          </front>
          <seriesInfo name="IEC" value="62351-9 "/>
        </reference>
        <reference anchor="NERC-CIP-005-5">
          <front>
            <title>Cyber Security - Electronic Security Perimeter</title>
            <author>
              <organization>North American Reliability Council</organization>
            </author>
            <date year="2013" month="December"/>
          </front>
          <seriesInfo name="CIP" value="005-5"/>
        </reference>
        <reference anchor="ISO-IEC-15118-2">
          <front>
            <title>ISO/IEC 15118-2 Road vehicles - Vehicle-to-Grid Communication Interface - Part 2: Network and application protocol requirements</title>
            <author>
              <organization>International Standardization Organization / International Electrotechnical Commission</organization>
            </author>
            <date year="2014" month="April"/>
          </front>
          <seriesInfo name="ISO/IEC" value="15118-2 "/>
        </reference>
        <reference anchor="UNISIG-Subset-137" target="https://www.era.europa.eu/sites/default/files/filesystem/ertms/ccs_tsi_annex_a_-_mandatory_specifications/set_of_specifications_3_etcs_b3_r2_gsm-r_b1/index083_-_subset-137_v100.pdf">
          <front>
            <title>Subset-137; ERTMS/ETCS On-line Key Management FFFIS; V1.0.0</title>
            <author>
              <organization>UNISIG</organization>
            </author>
            <date year="2015" month="December"/>
          </front>
          <annotation>http://www.kmc-subset137.eu/index.php/download/</annotation>
        </reference>
        <reference anchor="OCPP">
          <front>
            <title>Open Charge Point Protocol 2.0.1 (Draft)</title>
            <author>
              <organization>Open Charge Alliance</organization>
            </author>
            <date year="2019" month="December"/>
          </front>
        </reference>
        <reference anchor="I-D.eckert-anima-brski-discovery">
          <front>
            <title>Discovery for BRSKI variations</title>
            <author fullname="Toerless Eckert" initials="T. T." surname="Eckert">
              <organization>Futurewei USA</organization>
            </author>
            <author fullname="David von Oheimb" initials="D." surname="von Oheimb">
              <organization>Siemens AG</organization>
            </author>
            <author fullname="Esko Dijk" initials="E." surname="Dijk">
              <organization>IoTconsultancy.nl</organization>
            </author>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>   This document specifies how BRSKI entities, such as registrars,
   proxies, pledges or others that are acting as responders, can be
   discovered and selected by BRSKI entities acting as initiators.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-eckert-anima-brski-discovery-01"/>
        </reference>
      </references>
    </references>
    <?line 1253?>

<section anchor="app-examples">
      <name>Application Examples</name>
      <t>This informative annex provides some detail about application examples.</t>
      <section anchor="rolling-stock">
        <name>Rolling Stock</name>
        <t>Rolling stock or railroad cars contain a variety of sensors,
actuators, and controllers, which communicate within the railroad car
but also exchange information between railroad cars forming a train,
with track-side equipment, and/or possibly with backend systems.
These devices are typically unaware of backend system connectivity.
Enrolling certificates may be done during maintenance cycles
of the railroad car, but can already be prepared during operation.
Such asynchronous enrollment will include generating certification requests,
which are collected and later forwarded for processing whenever
the railroad car gets connectivity with the backend PKI of the operator.
The authorization of the certification request is then done based on
the operator's asset/inventory information in the backend.</t>
        <t>UNISIG has included a CMP profile for the enrollment of TLS client and
server X.509 certificates of on-board and track-side components
in the Subset-137 specifying the ETRAM/ETCS
online key management for train control systems <xref target="UNISIG-Subset-137"/>.</t>
      </section>
      <section anchor="building-automation">
        <name>Building Automation</name>
        <t>In building automation scenarios, a detached
building or the basement of a building may be equipped with sensors, actuators,
and controllers that are connected to each other in a local network but
with only limited or no connectivity to a central building management system.
This problem may occur during installation time but also during operation.
In such a situation a service technician collects the necessary data
and transfers it between the local network and the central building management
system, e.g., using a laptop or a mobile phone.
This data may comprise parameters and settings
required in the operational phase of the sensors/actuators, like a
component certificate issued by the operator to authenticate against other
components and services.</t>
        <t>The collected data may be provided by a domain registrar
already existing in the local network. In this case
connectivity to the backend PKI may be facilitated by the service
technician's laptop.
Alternatively, the data can also be collected from the
pledges directly and provided to a domain registrar deployed in a
different network in preparation for the operational phase.
In this case, connectivity to the domain registrar
may also be facilitated by the service technician's laptop.</t>
      </section>
      <section anchor="substation-automation">
        <name>Substation Automation</name>
        <t>In electrical substation automation scenarios, a control center typically hosts
PKI services to issue certificates for Intelligent Electronic Devices operated
in a substation. Communication between the substation and control center
is performed through a proxy/gateway/DMZ, which terminates protocol flows.
Note that <xref target="NERC-CIP-005-5"/> requires inspection of protocols
at the boundary of a security perimeter (the substation in this case).
In addition, security management in substation automation assumes
central support of several enrollment protocols to support
the various capabilities of IEDs from different vendors.
The IEC standard IEC62351-9 <xref target="IEC-62351-9"/>
specifies for the infrastructure side mandatory support of
two enrollment protocols: SCEP <xref target="RFC8894"/> and EST <xref target="RFC7030"/>,
while an Intelligent Electronic Device may support only one of them.</t>
      </section>
      <section anchor="electric-vehicle-charging-infrastructure">
        <name>Electric Vehicle Charging Infrastructure</name>
        <t>For electric vehicle charging infrastructure, protocols have been
defined for the interaction between the electric vehicle and the
charging point (e.g., ISO 15118-2 <xref target="ISO-IEC-15118-2"/>)
as well as between the charging point and the charging point operator
(e.g. OCPP <xref target="OCPP"/>). Depending on the authentication
model, unilateral or mutual authentication is required. In both cases,
the charging point uses an X.509 certificate to authenticate itself
in TLS channels between the electric vehicle and
the charging point. The management of this certificate depends,
among others, on the selected backend connectivity protocol.
In the case of OCPP, this protocol is meant to be the only communication
protocol between the charging point and the backend, carrying all
information to control the charging operations and maintain the
charging point itself. This means that the certificate management
needs to be handled in-band of OCPP. This requires the ability to
encapsulate the certificate management messages in a transport-independent way.
Authenticated self-containment will support this by
allowing the transport without a separate enrollment protocol,
binding the messages to the identity of the communicating endpoints.</t>
      </section>
      <section anchor="infrastructure-isolation">
        <name>Infrastructure Isolation Policy</name>
        <t>This refers to any case in which network infrastructure is normally
isolated from the Internet as a matter of policy, most likely for
security reasons. In such a case, limited access to external PKI
services will be allowed in carefully controlled short periods of
time, for example when a batch of new devices is deployed, and
forbidden or prevented at other times.</t>
      </section>
      <section anchor="sites-with-insufficient-level-of-operational-security">
        <name>Sites with Insufficient Level of Operational Security</name>
        <t>The RA performing (at least part of) the authorization of a
certification request is a critical PKI component and therefore requires higher
operational security than components utilizing the issued
certificates for their security features. CAs may also demand higher
security in the registration procedures from RAs, which domain registrars
with co-located RAs may not be able to fulfill.
Especially the CA/Browser forum currently increases the security requirements
in the certificate issuance procedures for publicly trusted certificates,
i.e., those placed in trust stores of browsers,
which may be used to connect with devices in the domain.
In case the on-site components of the target domain can not be operated securely
enough for the needs of an RA, this service should be transferred to
an off-site backend component that has a sufficient level of security.</t>
      </section>
    </section>
    <section anchor="app_history">
      <name>History of Changes TBD RFC Editor: please delete</name>
      <t>List of reviewers:</t>
      <ul spacing="normal">
        <li>
          <t>Toerless Eckert (document shepherd)</t>
        </li>
        <li>
          <t>Barry Leiba (SECdir)</t>
        </li>
        <li>
          <t>Mahesh Jethanandani  (IETF area director)</t>
        </li>
        <li>
          <t>Michael Richardson (ANIMA design team)</t>
        </li>
        <li>
          <t>Rajeev Ranjan, Rufus Buschart, Szofia Fazekas-Zisch, etc. (Siemens)</t>
        </li>
        <li>
          <t><eref target="https://datatracker.ietf.org/doc/review-ietf-anima-brski-async-enroll-03-yangdoctors-early-rahman-2021-08-15/">YANGDOCTORS Early review of 2021-08-15</eref>
referred to the PRM aspect of <eref target="https://datatracker.ietf.org/doc/draft-ietf-anima-brski-async-enroll/03/">draft-ietf-anima-brski-async-enroll-03</eref>.
This has been carved out of the draft to a different one and thus is no more
applicable here.</t>
        </li>
      </ul>
      <t>IETF draft ae-10 -&gt; ae-11:</t>
      <ul spacing="normal">
        <li>
          <t>In response to AD review by Mahesh Jethanandani,
          </t>
          <ul spacing="normal">
            <li>
              <t>replace most occurrences of 'Note:' by 'Note that' or the like</t>
            </li>
            <li>
              <t>move 2nd paragraph of abstract to the introduction</t>
            </li>
            <li>
              <t>remove section 1.2 and merge its first paragraph with the preceding section</t>
            </li>
            <li>
              <t>reconsider normative language, replacing one 'may' by '<bcp14>MAY</bcp14>' in section 4.1</t>
            </li>
            <li>
              <t>fix several ambiguities and hard-to-read sentences by re-phrasing them</t>
            </li>
            <li>
              <t>make wording more consistent, in particular: 'certification request'</t>
            </li>
            <li>
              <t>fix a number of (mostly grammar) nits</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Improve item on limitations of PKCS#10 regarding keys that cannot sign</t>
        </li>
      </ul>
      <t>IETF draft ae-09 -&gt; ae-10:</t>
      <ul spacing="normal">
        <li>
          <t>Add reference to RFC 8633 at first occurrence of 'voucher' (fixes #37)</t>
        </li>
        <li>
          <t>Update reference of CoAP Transfer for CMP from I-D to RFC 9482</t>
        </li>
        <li>
          <t>Move RFC 4210 and RFC 9480 references from normative to informative</t>
        </li>
        <li>
          <t>Fix <tt>p10</tt> vs. <tt>pkcs10</tt> entry in list of example endpoints in <xref target="addressing"/></t>
        </li>
        <li>
          <t>Minor fix in <xref target="uc1figure"/> and few text tweaks due to Siemens-internal review</t>
        </li>
        <li>
          <t>Extend the list of reviewers and acknowledgments by two Siemens colleagues</t>
        </li>
      </ul>
      <t>IETF draft ae-08 -&gt; ae-09:</t>
      <ul spacing="normal">
        <li>
          <t>In response to review by Toerless,
          </t>
          <ul spacing="normal">
            <li>
              <t>tweak abstract to make meaning of 'alternative enrollment' more clear</t>
            </li>
            <li>
              <t>expand on first use not "well-known" abbreviations, such as 'EST',<br/>
adding also a references on their first use</t>
            </li>
            <li>
              <t>add summary and reason for choosing CMP at end of <xref target="solutions-PoI"/></t>
            </li>
            <li>
              <t>remove paragraph on optimistic discovery in controlled environments</t>
            </li>
            <li>
              <t>mention role of reviewers also in acknowledgments section</t>
            </li>
          </ul>
        </li>
        <li>
          <t>A couple of grammar and spelling fixes</t>
        </li>
      </ul>
      <t>IETF draft ae-07 -&gt; ae-08:</t>
      <ul spacing="normal">
        <li>
          <t>Update references to service names in <xref target="brski-cmp-instance"/></t>
        </li>
      </ul>
      <t>IETF draft ae-06 -&gt; ae-07:</t>
      <ul spacing="normal">
        <li>
          <t>Update subsections on discovery according to discussion in the design team</t>
        </li>
        <li>
          <t>In <xref target="brski-cmp-instance"/>,
replace 'mandatory' by '<bcp14>REQUIRED</bcp14>' regarding adherence to LCMPP,<br/>
in response to SECDIR Last Call Review of ae-06 by Barry Leiba</t>
        </li>
      </ul>
      <t>IETF draft ae-05 -&gt; ae-06:</t>
      <ul spacing="normal">
        <li>
          <t>Extend section on discovery according to discussion in the design team</t>
        </li>
        <li>
          <t>Make explicit that MASA voucher status telemetry is as in BRSKI</t>
        </li>
        <li>
          <t>Add note that on delegation, RA may need info on pledge authorization</t>
        </li>
      </ul>
      <t>IETF draft ae-04 -&gt; ae-05:</t>
      <ul spacing="normal">
        <li>
          <t>Remove entries from the terminology section that should be clear from BRSKI</t>
        </li>
        <li>
          <t>Tweak use of the terms IDevID and LDevID and replace PKI RA/CA by RA/CA</t>
        </li>
        <li>
          <t>Add the abbreviation 'LCMPP' for Lightweight CMP Profile to the terminology section</t>
        </li>
        <li>
          <t>State clearly in <xref target="brski-cmp-instance"/> that LCMPP is mandatory when using CMP</t>
        </li>
        <li>
          <t>Change URL of BRSKI-AE-overview graphics to slide on IETF 116 meeting material</t>
        </li>
      </ul>
      <t>IETF draft ae-03 -&gt; ae-04:</t>
      <ul spacing="normal">
        <li>
          <t>In response to SECDIR Early Review of ae-03 by Barry Leiba,
          </t>
          <ul spacing="normal">
            <li>
              <t>replace 'end-to-end security' by the more clear 'end-to-end authentication'</t>
            </li>
            <li>
              <t>restrict the meaning of the abbreviation 'AE' to 'Alternative Enrollment'</t>
            </li>
            <li>
              <t>replace '<bcp14>MAY</bcp14>' by 'may' in requirement on delegated registrar actions</t>
            </li>
            <li>
              <t>re-phrase requirement on certification request exchange, avoiding MANDATORY</t>
            </li>
            <li>
              <t>mention that further protocol names need be put in Well-Known URIs registry</t>
            </li>
            <li>
              <t>explain consequence of using non-standard endpoints, not following <bcp14>SHOULD</bcp14></t>
            </li>
            <li>
              <t>remove requirement that 'caPubs' field in CMP responses <bcp14>SHOULD NOT</bcp14> be used</t>
            </li>
            <li>
              <t>add paragraph in security considerations on additional use of TLS for CMP</t>
            </li>
          </ul>
        </li>
        <li>
          <t>In response to further internal reviews and suggestions for generalization,
          </t>
          <ul spacing="normal">
            <li>
              <t>significantly cut down the introduction because the original motivations and
most explanations are no more needed and would just make it lengthy to read</t>
            </li>
            <li>
              <t>sort out asynchronous vs. offline transfer, off-site vs. backend components</t>
            </li>
            <li>
              <t>improve description of CSRs and proof of possession vs. proof of origin</t>
            </li>
            <li>
              <t>clarify that the channel between pledge and registrar is not restricted
to TLS, but in connection with constrained BRSKI may also be DTLS.
Also move the references to Constrained BRSKI and CoAPS to better contexts.</t>
            </li>
            <li>
              <t>clarify that the registrar must not be circumvented in the decision to grant
and LDevID, and give hints and recommendations how to make sure this</t>
            </li>
            <li>
              <t>clarify that the cert enrollment phase may involve additional messages
and that BRSKI-AE replaces <xref section="5.9" sectionFormat="comma" target="RFC8995"/> (except Section 5.9.4)
<!--
clarify that messages of the cert enrollment phase are RECOMMENDED to be
transmitted on the existing channel between the pledge and the registrar
-->
              </t>
            </li>
            <li>
              <t>the certificate enrollment protocol needs to support transport over (D)TLS
only as far as its messages are transported between pledge and registrar.</t>
            </li>
            <li>
              <t>the certificate enrollment protocol chosen between pledge and registrar
needs to be used also for the upstream enrollment exchange with the PKI only
if end-to-end authentication shall be achieved across the registrar to the PKI.</t>
            </li>
            <li>
              <t>add that with CMP, further trust anchors <bcp14>SHOULD</bcp14> be transported via <tt>caPubs</tt></t>
            </li>
            <li>
              <t>remove the former Appendix A: "Using EST for Certificate Enrollment",
moving relevant points to the list of scenarios in
<xref target="sup-env"/>: "Supported Scenarios",</t>
            </li>
            <li>
              <t>streamline the item on EST in
<xref target="solutions-PoI"/>: "Solution Options for Proof of Identity",</t>
            </li>
            <li>
              <t>various minor editorial improvements like making the wording more consistent</t>
            </li>
          </ul>
        </li>
      </ul>
      <t>IETF draft ae-02 -&gt; ae-03:</t>
      <ul spacing="normal">
        <li>
          <t>In response to review by Toerless Eckert,
          </t>
          <ul spacing="normal">
            <li>
              <t>many editorial improvements and clarifications as suggested, such as
the comparison to plain BRSKI, the description of offline vs. synchronous
message transfer and enrollment, and better differentiation of RA flavors.</t>
            </li>
            <li>
              <t>clarify that for transporting certificate enrollment messages between
pledge and registrar, the TLS channel established between these two
(via the join proxy) is used and the enrollment protocol <bcp14>MUST</bcp14> support this.</t>
            </li>
            <li>
              <t>clarify that the enrollment protocol chosen between pledge and registrar
<bcp14>MUST</bcp14> also be used for the upstream enrollment exchange with the PKI.</t>
            </li>
            <li>
              <t>extend the description and requirements on how during the certificate
enrollment phase the registrar <bcp14>MAY</bcp14> handle requests by the pledge itself and
otherwise <bcp14>MUST</bcp14> forward them to the PKI and forward responses to the pledge.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Change "The registrar <bcp14>MAY</bcp14> offer different enrollment protocols" to
"The registrar <bcp14>MUST</bcp14> support at least one certificate enrollment protocol ..."</t>
        </li>
        <li>
          <t>In response to review by Michael Richardson,
          </t>
          <ul spacing="normal">
            <li>
              <t>slightly improve the structuring of the Message Exchange <xref target="message_ex"/> and
add some detail on the request/response exchanges for the enrollment phase</t>
            </li>
            <li>
              <t>merge the 'Enhancements to the Addressing Scheme' <xref target="addressing"/>
with the subsequent one:
'Domain Registrar Support of Alternative Enrollment Protocols'</t>
            </li>
            <li>
              <t>add reference to SZTP (RFC 8572)</t>
            </li>
            <li>
              <t>extend venue information</t>
            </li>
            <li>
              <t>convert output of ASCII-art figures to SVG format</t>
            </li>
            <li>
              <t>various small other text improvements as suggested/provided</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Remove the tentative informative application to EST-fullCMC</t>
        </li>
        <li>
          <t>Move Eliot Lear from co-author to contributor, add Eliot to the acknowledgments</t>
        </li>
        <li>
          <t>Add explanations for terms such as 'target domain' and 'caPubs'</t>
        </li>
        <li>
          <t>Fix minor editorial issues and update some external references</t>
        </li>
      </ul>
      <t>IETF draft ae-01 -&gt; ae-02:</t>
      <ul spacing="normal">
        <li>
          <t>Architecture: clarify registrar role including RA/LRA/enrollment proxy</t>
        </li>
        <li>
          <t>CMP: add reference to CoAP Transport for CMPV2 and Constrained BRSKI</t>
        </li>
        <li>
          <t>Include venue information</t>
        </li>
      </ul>
      <t>From IETF draft 05 -&gt; IETF draft ae-01:</t>
      <ul spacing="normal">
        <li>
          <t>Renamed the repo and files from 'anima-brski-async-enroll' to 'anima-brski-ae'</t>
        </li>
        <li>
          <t>Added graphics for abstract protocol overview as suggested by Toerless Eckert</t>
        </li>
        <li>
          <t>Balanced (sub-)sections and their headers</t>
        </li>
        <li>
          <t>Added details on CMP instance, now called BRSKI-CMP</t>
        </li>
      </ul>
      <t>From IETF draft 04 -&gt; IETF draft 05:</t>
      <ul spacing="normal">
        <li>
          <t>David von Oheimb became the editor.</t>
        </li>
        <li>
          <t>Streamline wording, consolidate terminology, improve grammar, etc.</t>
        </li>
        <li>
          <t>Shift the emphasis towards supporting alternative enrollment protocols.</t>
        </li>
        <li>
          <t>Update the title accordingly - preliminary change to be approved.</t>
        </li>
        <li>
          <t>Move comments on EST and detailed application examples to informative annex.</t>
        </li>
        <li>
          <t>Move the remaining text of section 3 as two new sub-sections of section 1.</t>
        </li>
      </ul>
      <t>From IETF draft 03 -&gt; IETF draft 04:</t>
      <ul spacing="normal">
        <li>
          <t>Moved UC2-related parts defining the pledge in responder mode to a
separate document. This required changes and adaptations in several
sections. Main changes concerned the removal of the subsection for UC2
as well as the removal of the YANG model related text as it is not
applicable in UC1.</t>
        </li>
        <li>
          <t>Updated references to the Lightweight CMP Profile (LCMPP).</t>
        </li>
        <li>
          <t>Added David von Oheimb as co-author.</t>
        </li>
      </ul>
      <t>From IETF draft 02 -&gt; IETF draft 03:</t>
      <ul spacing="normal">
        <li>
          <t>Housekeeping, deleted open issue regarding YANG voucher-request
in UC2 as voucher-request was enhanced with additional leaf.</t>
        </li>
        <li>
          <t>Included open issues in YANG model in UC2 regarding assertion
value agent-proximity and CSR encapsulation using SZTP sub module).</t>
        </li>
      </ul>
      <t>From IETF draft 01 -&gt; IETF draft 02:</t>
      <ul spacing="normal">
        <li>
          <t>Defined call flow and objects for interactions in UC2. Object format
based on draft for JOSE signed voucher artifacts and aligned the
remaining objects with this approach in UC2 .</t>
        </li>
        <li>
          <t>Terminology change: issue #2 pledge-agent -&gt; registrar-agent to
better underline agent relation.</t>
        </li>
        <li>
          <t>Terminology change: issue #3 PULL/PUSH -&gt; pledge-initiator-mode
and pledge-responder-mode to better address the pledge operation.</t>
        </li>
        <li>
          <t>Communication approach between pledge and registrar-agent
changed by removing TLS-PSK (former section TLS establishment)
and associated references to other drafts in favor of relying on
higher layer exchange of signed data objects. These data objects
are included also in the pledge-voucher-request and lead to an
extension of the YANG module for the voucher-request (issue #12).</t>
        </li>
        <li>
          <t>Details on trust relationship between registrar-agent and
registrar (issue #4, #5, #9) included in UC2.</t>
        </li>
        <li>
          <t>Recommendation regarding short-lived certificates for
registrar-agent authentication towards registrar (issue #7) in
the security considerations.</t>
        </li>
        <li>
          <t>Introduction of reference to agent signing certificate using SKID
in agent signed data (issue #11).</t>
        </li>
        <li>
          <t>Enhanced objects in exchanges between pledge and registrar-agent
to allow the registrar to verify agent-proximity to the pledge
(issue #1) in UC2.</t>
        </li>
        <li>
          <t>Details on trust relationship between registrar-agent and
pledge (issue #5) included in UC2.</t>
        </li>
        <li>
          <t>Split of use case 2 call flow into sub sections in UC2.</t>
        </li>
      </ul>
      <t>From IETF draft 00 -&gt; IETF draft 01:</t>
      <ul spacing="normal">
        <li>
          <t>Update of scope in <xref target="sup-env"/> to include in
which the pledge acts as a server. This is one main motivation
for use case 2.</t>
        </li>
        <li>
          <t>Rework of use case 2 to consider the
transport between the pledge and the pledge-agent. Addressed is
the TLS channel establishment between the pledge-agent and the
pledge as well as the endpoint definition on the pledge.</t>
        </li>
        <li>
          <t>First description of exchanged object types (needs more work)</t>
        </li>
        <li>
          <t>Clarification in discovery options for enrollment endpoints at
the domain registrar based on well-known endpoints in <xref target="addressing"/>
do not result in additional /.well-known URIs.
Update of the illustrative example.
Note that the change to /brski for the voucher-related endpoints
has been taken over in the BRSKI main document.</t>
        </li>
        <li>
          <t>Updated references.</t>
        </li>
        <li>
          <t>Included Thomas Werner as additional author for the document.</t>
        </li>
      </ul>
      <t>From individual version 03 -&gt; IETF draft 00:</t>
      <ul spacing="normal">
        <li>
          <t>Inclusion of discovery options of enrollment endpoints at
the domain registrar based on well-known endpoints in
<xref target="addressing"/> as replacement of section 5.1.3
in the individual draft. This is intended to support both use
cases in the document. An illustrative example is provided.</t>
        </li>
        <li>
          <t>Missing details provided for the description and call flow in
pledge-agent use case UC2, e.g. to
accommodate distribution of CA certificates.</t>
        </li>
        <li>
          <t>Updated CMP example in <xref target="exist_prot"/> to use
Lightweight CMP instead of CMP, as the draft already provides
the necessary /.well-known endpoints.</t>
        </li>
        <li>
          <t>Requirements discussion moved to separate section in
<xref target="req-sol"/>. Shortened description of proof-of-identity binding
and mapping to existing protocols.</t>
        </li>
        <li>
          <t>Removal of copied call flows for voucher exchange and registrar
discovery flow from <xref target="RFC8995"/> in <xref target="uc1"/> to avoid doubling or text or
inconsistencies.</t>
        </li>
        <li>
          <t>Reworked abstract and introduction to be more crisp regarding
the targeted solution. Several structural changes in the document
to have a better distinction between requirements, use case
description, and solution description as separate sections.
History moved to appendix.</t>
        </li>
      </ul>
      <t>From individual version 02 -&gt; 03:</t>
      <ul spacing="normal">
        <li>
          <t>Update of terminology from self-contained to authenticated
self-contained object to be consistent in the wording and to
underline the protection of the object with an existing
credential. Note that the naming of this object may be discussed.
An alternative name may be attestation object.</t>
        </li>
        <li>
          <t>Simplification of the architecture approach for the initial use
case having an off-site PKI.</t>
        </li>
        <li>
          <t>Introduction of a new use case utilizing authenticated
self-contain objects to onboard a pledge using a commissioning
tool containing a pledge-agent. This requires additional changes
in the BRSKI call flow sequence and led to changes in the
introduction, the application example,and also in the
related BRSKI-AE call flow.</t>
        </li>
        <li>
          <t>Update of provided examples of the addressing approach used in
BRSKI to allow for support of multiple enrollment protocols in
<xref target="addressing"/>.</t>
        </li>
      </ul>
      <t>From individual version 01 -&gt; 02:</t>
      <ul spacing="normal">
        <li>
          <t>Update of introduction text to clearly relate to the usage of
IDevID and LDevID.</t>
        </li>
        <li>
          <t>Definition of the addressing approach used in BRSKI to allow for
support of multiple enrollment protocols in <xref target="addressing"/>.  This
section also contains a first
discussion of an optional discovery mechanism to address
situations in which the registrar supports more than one enrollment
approach. Discovery should avoid that the pledge performs a trial
and error of enrollment protocols.</t>
        </li>
        <li>
          <t>Update of description of architecture elements and
changes to BRSKI in <xref target="architecture"/>.</t>
        </li>
        <li>
          <t>Enhanced consideration of existing enrollment protocols in the
context of mapping the requirements to existing solutions in
<xref target="req-sol"/> and in <xref target="exist_prot"/>.</t>
        </li>
      </ul>
      <t>From individual version 00 -&gt; 01:</t>
      <ul spacing="normal">
        <li>
          <t>Update of examples, specifically for building automation as
well as two new application use cases in <xref target="app-examples"/>.</t>
        </li>
        <li>
          <t>Deletion of asynchronous interaction with MASA to not
complicate the use case. Note that the voucher exchange can
already be handled in an asynchronous manner and is therefore
not considered further. This resulted in removal of the
alternative path the MASA in Figure 1 and the associated
description in <xref target="architecture"/>.</t>
        </li>
        <li>
          <t>Enhancement of description of architecture elements and
changes to BRSKI in <xref target="architecture"/>.</t>
        </li>
        <li>
          <t>Consideration of existing enrollment protocols in the context
of mapping the requirements to existing solutions in <xref target="req-sol"/>.</t>
        </li>
        <li>
          <t>New section starting <xref target="exist_prot"/> with the
mapping to existing enrollment protocols by collecting
boundary conditions.</t>
        </li>
      </ul>
      <!--
Local IspellDict: american
LocalWords: bcp uc prot vexchange enrollfigure req eo selander coap br iana tcp
LocalWords: oscore fullcmc simpleenroll tls env brski UC seriesinfo IDevID Resp
LocalWords: Attrib lt docname ipr toc anima async wg symrefs ann ae pkcs cert
LocalWords: sortrefs iprnotified Instantiation caPubs raVerified repo reqs Conf
LocalWords: IDentity IDentifier coaps aasvg acp cms json pkixcmp kp DOI abbrev
LocalWords: PoP PoI anufacturer uthorized igning uthority SECDIR nbsp passphrase
LocalWords: ietf cmp lcmpp submissionType kw std org uri cmpv app sol est Certs
LocalWords: github eckert lternative nrollment sec Mahesh Jethanandani
-->

</section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="E." surname="Lear" fullname="Eliot Lear">
        <organization>Cisco Systems</organization>
        <address>
          <postal>
            <street>Richtistrasse 7</street>
            <city>Wallisellen</city>
            <code>8304</code>
            <country>Switzerland</country>
          </postal>
          <phone>+41 44 878 9200</phone>
          <email>lear@cisco.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
