<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.16 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-anima-jws-voucher-03" category="std" updates="RFC8366">

  <front>
    <title abbrev="JWS-voucher">JWS signed Voucher Artifacts for Bootstrapping Protocols</title>

    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <author initials="T." surname="Werner" fullname="Thomas Werner">
      <organization>Siemens AG</organization>
      <address>
        <email>thomas-werner@siemens.com</email>
      </address>
    </author>

    <date year="2022" month="March" day="07"/>

    <area>Internet</area>
    <workgroup>anima Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>RFC8366 defines a digital artifact called voucher as a YANG-defined JSON
document that has been signed using a Cryptographic Message Syntax (CMS) structure.
This memo introduces a variant of the voucher structure in which CMS is
replaced by the JSON Object Signing and Encryption (JOSE) mechanism described in RFC7515 to better support use-cases in which JOSE is preferred over CMS.</t>

<t>In addition to explaining how the format is created, MIME types are registered and examples are provided.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>“A Voucher Artifact for Bootstrapping Protocols”, <xref target="RFC8366"/> describes a voucher artifact used in “Bootstrapping Remote Secure Key Infrastructure” <xref target="BRSKI"/> and
“Secure Zero Touch Provisioning” <xref target="SZTP"/> to transfer ownership of a device from a manufacturer to an owner.
That document defines the base YANG module, and also the initial serialization to JSON <xref target="RFC8259"/>, with a signature provided by <xref target="RFC5652"/>.</t>

<t>Other work, <xref target="I-D.ietf-anima-constrained-voucher"/> provides a mapping of the YANG to CBOR <xref target="RFC8949"/> with a signature format of COSE <xref target="RFC8812"/>.</t>

<t>This document provides an equivalent mapping of JSON format with the signature format as JSON Web Signature (JWS) <xref target="RFC7515"/>.
The encoding specified in this document is required for <xref target="I-D.ietf-anima-brski-prm"/>
and may be required and/or preferred in other use cases, for example when JWS is already used in other parts of the use case, but CMS is not.</t>

<t>This document does not extend the YANG definition of <xref target="RFC8366"/> at all, but accepts that other efforts such as <xref target="I-D.richardson-anima-voucher-delegation"/>, <xref target="I-D.friel-anima-brski-cloud"/>, and <xref target="I-D.ietf-anima-brski-prm"/> do.
This document supports signing any of the extended schemas defined in those documents and any new documents that may appear after this one.</t>

<t>With the availability of different encoded vouchers, it is up to an industry specific application statement to indicate/decide which voucher signature format is to be used.
There is no provision across the different voucher signature formats that a receiver could safely recognize which format it uses unless additional context is provided.
For example, <xref target="BRSKI"/> provides this context via the MIME-Type for the voucher payload.</t>

<t>This document should be considered an Update to <xref target="RFC8366"/> in the category of “See Also”
as per <xref target="I-D.kuehlewind-update-tag"/>.</t>

</section>
<section anchor="terminology" title="Terminology">

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL
NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”,
“MAY”, and “OPTIONAL” in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

</section>
<section anchor="json-web-signatures-general-jws-json-serialization-syntax" title="JSON Web Signatures - General JWS JSON Serialization Syntax">

<t>[RFC Editor: please delete] /*
TODO: …
*/</t>

<t><xref target="RFC7515"/> defines two serializations: the “JWS Compact Serialization” and the “JWS JSON Serialization”.</t>

<t>The <xref target="RFC8366"/> JSON structure consists of a nested map, the outer part of which is:</t>

<figure><artwork><![CDATA[
{ "ietf-voucher:voucher" : { some inner items }}
]]></artwork></figure>

<t>this is considered the JSON payload as described in <xref target="RFC7515"/> section 3.</t>

<t>A JWS JSON Serialization Overview is given by <xref target="RFC7515"/> in section 3.2 and section 7.2.1 provides more details.
It works out to:</t>

<figure><artwork><![CDATA[
[RFC Editor: please delete] /*
TODO: ...
*/
]]></artwork></figure>

<t>There are a number of attributes.
They are:</t>

<section anchor="unprotected-header" title="Unprotected Header">

<t>[RFC Editor: please delete] /*
TODO: …
*/</t>

</section>
<section anchor="protected-header" title="Protected Header">

<t>The standard “typ” and “alg” values described in <xref target="RFC7515"/> are expected in the protected headers.</t>

<t>It remains to be determined (XXX), what values, if any, should go into the “typ” header, as in the <xref target="BRSKI"/> use cases, there are additional HTTP MIME type headers to indicate content types.</t>

<t>The “alg” should contain the algorithm type such as “ES256”.</t>

<t>If PKIX <xref target="RFC5280"/> format certificates are used then the <xref target="RFC7515"/> section 4.1.6 “x5c”
certificate chain SHOULD be used to contain the certificate and chain.
Vouchers will often need all certificates in the chain, including what would be considered the trust anchor certificate because intermediate devices (such as the Registrar) may need to audit the artifact,
or end systems may need to pin a trust anchor for future operations.
This is consistent with <xref target="BRSKI"/> section 5.5.2.</t>

</section>
<section anchor="voucher-representation-in-general-jws-json-serialization-syntax" title="Voucher Representation in General JWS JSON Serialization Syntax">
<figure title="Voucher Representation in General JWS JSON Serialization Syntax" anchor="VoucherGeneralJWSfigure"><artwork align="left"><![CDATA[
{
  "payload": {
    "ietf-voucher:voucher": {
      "assertion": "logged",
      "serial-number": "0123456789",
      "nonce": "5742698422680472",
      "created-on": "2022-03-02T03:01:24.618Z",
      "pinned-domain-cert": "base64encodedvalue=="
    }
  },
  "signatures": [
    {
      "protected": {
        "x5c": [
          "base64encodedvalue=="
        ],
        "alg": "ES256"
      },
      "signature": "base64encodedvalue=="
    }
  ]
}
]]></artwork></figure>

</section>
</section>
<section anchor="privacy-considerations" title="Privacy Considerations">

<t>The Voucher Request reveals the IDevID of the component (Pledge) that is on-boarding.</t>

<t>This request occurs over HTTP-over-TLS, however the Pledge to Registrar transaction is over a provisional TLS session, and it is subject to disclosure via by a Dolev-Yao attacker (a “malicious messenger”)<xref target="onpath"/>.
This is explained in <xref target="BRSKI"/> section 10.2.</t>

<t>The use of a JWS header brings no new privacy considerations.</t>

</section>
<section anchor="security-considerations" title="Security Considerations">

<t>The issues of how <xref target="RFC8366"/> vouchers are used in a <xref target="BRSKI"/> system is addressed in section 11 of that document.
This document does not change any of those issues, it just changes the signature technology used for vouchers and voucher requests.</t>

<t><xref target="SZTP"/> section 9 deals with voucher use in Secure Zero Touch Provisioning, and this document also makes no changes to security.</t>

</section>
<section anchor="iana-considerations" title="IANA Considerations">

<section anchor="media-type-registry" title="Media-Type Registry">

<t>This section registers the ‘application/voucher-jws+json’ in the “Media Types” registry.</t>

<section anchor="applicationvoucher-jwsjson" title="application/voucher-jws+json">

<figure><artwork><![CDATA[
Type name:  application
Subtype name:  voucher-jws+json
Required parameters:  none
Optional parameters:  none
Encoding considerations:  JWS+JSON vouchers are JOSE objects
                          signed with one signer.
Security considerations:  See Security Considerations, Section
Interoperability considerations:  The format is designed to be
  broadly interoperable.
Published specification:  THIS RFC.
Applications that use this media type:  ANIMA, 6tisch, and other
  zero-touch imprinting systems
Additional information:
  Magic number(s):  None
  File extension(s):  .vjj
  Macintosh file type code(s):  none
Person & email address to contact for further information:  IETF
  ANIMA WG
Intended usage:  LIMITED
Restrictions on usage:  NONE
Author:  ANIMA WG
Change controller:  IETF
Provisional registration? (standards tree only):  NO
]]></artwork></figure>

</section>
</section>
</section>
<section anchor="changelog" title="Changelog">

<t><list style="symbols">
  <t>Added adoption call comments from Toerless.  Changed from [RFCxxxx] to [THING] style for some key references.</t>
  <t>Updated references “I-D.ietf-anima-brski-async-enroll” switched to “I-D.ietf-anima-brski-prm”</t>
  <t>Switch from “JWS Compact Serialization” to “General JWS JSON Serialization”, as focus is now on “General JWS JSON Serialization”</t>
  <t>Include Voucher representation in “General JWS JSON Serialization” syntax</t>
  <t>Include examples A1, A2, A3 using “General JWS JSON Serialization”</t>
</list></t>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference anchor='BRSKI' target='https://www.rfc-editor.org/info/rfc8995'>
<front>
<title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
<author fullname='M. Pritikin' initials='M.' surname='Pritikin'><organization/></author>
<author fullname='M. Richardson' initials='M.' surname='Richardson'><organization/></author>
<author fullname='T. Eckert' initials='T.' surname='Eckert'><organization/></author>
<author fullname='M. Behringer' initials='M.' surname='Behringer'><organization/></author>
<author fullname='K. Watsen' initials='K.' surname='Watsen'><organization/></author>
<date month='May' year='2021'/>
<abstract><t>This document specifies automated bootstrapping of an Autonomic Control Plane.  To do this, a Secure Key Infrastructure is bootstrapped.  This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline.  We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device.  The established secure connection can be used to deploy a locally issued certificate to the device as well.</t></abstract>
</front>
<seriesInfo name='RFC' value='8995'/>
<seriesInfo name='DOI' value='10.17487/RFC8995'/>
</reference>



<reference anchor='SZTP' target='https://www.rfc-editor.org/info/rfc8572'>
<front>
<title>Secure Zero Touch Provisioning (SZTP)</title>
<author fullname='K. Watsen' initials='K.' surname='Watsen'><organization/></author>
<author fullname='I. Farrer' initials='I.' surname='Farrer'><organization/></author>
<author fullname='M. Abrahamsson' initials='M.' surname='Abrahamsson'><organization/></author>
<date month='April' year='2019'/>
<abstract><t>This document presents a technique to securely provision a networking device when it is booting in a factory-default state.  Variations in the solution enable it to be used on both public and private networks.  The provisioning steps are able to update the boot image, commit an initial configuration, and execute arbitrary scripts to address auxiliary needs.  The updated device is subsequently able to establish secure connections with other systems.  For instance, a device may establish NETCONF (RFC 6241) and/or RESTCONF (RFC 8040) connections with deployment-specific network management systems.</t></abstract>
</front>
<seriesInfo name='RFC' value='8572'/>
<seriesInfo name='DOI' value='10.17487/RFC8572'/>
</reference>



<reference anchor='RFC8366' target='https://www.rfc-editor.org/info/rfc8366'>
<front>
<title>A Voucher Artifact for Bootstrapping Protocols</title>
<author fullname='K. Watsen' initials='K.' surname='Watsen'><organization/></author>
<author fullname='M. Richardson' initials='M.' surname='Richardson'><organization/></author>
<author fullname='M. Pritikin' initials='M.' surname='Pritikin'><organization/></author>
<author fullname='T. Eckert' initials='T.' surname='Eckert'><organization/></author>
<date month='May' year='2018'/>
<abstract><t>This document defines a strategy to securely assign a pledge to an owner using an artifact signed, directly or indirectly, by the pledge's manufacturer.  This artifact is known as a &quot;voucher&quot;.</t><t>This document defines an artifact format as a YANG-defined JSON document that has been signed using a Cryptographic Message Syntax (CMS) structure.  Other YANG-derived formats are possible.  The voucher artifact is normally generated by the pledge's manufacturer (i.e., the Manufacturer Authorized Signing Authority (MASA)).</t><t>This document only defines the voucher artifact, leaving it to other documents to describe specialized protocols for accessing it.</t></abstract>
</front>
<seriesInfo name='RFC' value='8366'/>
<seriesInfo name='DOI' value='10.17487/RFC8366'/>
</reference>



<reference anchor='RFC7515' target='https://www.rfc-editor.org/info/rfc7515'>
<front>
<title>JSON Web Signature (JWS)</title>
<author fullname='M. Jones' initials='M.' surname='Jones'><organization/></author>
<author fullname='J. Bradley' initials='J.' surname='Bradley'><organization/></author>
<author fullname='N. Sakimura' initials='N.' surname='Sakimura'><organization/></author>
<date month='May' year='2015'/>
<abstract><t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures.  Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification.  Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t></abstract>
</front>
<seriesInfo name='RFC' value='7515'/>
<seriesInfo name='DOI' value='10.17487/RFC7515'/>
</reference>



<reference anchor='RFC8259' target='https://www.rfc-editor.org/info/rfc8259'>
<front>
<title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
<author fullname='T. Bray' initials='T.' role='editor' surname='Bray'><organization/></author>
<date month='December' year='2017'/>
<abstract><t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format.  It was derived from the ECMAScript Programming Language Standard.  JSON defines a small set of formatting rules for the portable representation of structured data.</t><t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t></abstract>
</front>
<seriesInfo name='STD' value='90'/>
<seriesInfo name='RFC' value='8259'/>
<seriesInfo name='DOI' value='10.17487/RFC8259'/>
</reference>



<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>




    </references>

    <references title='Informative References'>





<reference anchor='RFC5280' target='https://www.rfc-editor.org/info/rfc5280'>
<front>
<title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
<author fullname='D. Cooper' initials='D.' surname='Cooper'><organization/></author>
<author fullname='S. Santesson' initials='S.' surname='Santesson'><organization/></author>
<author fullname='S. Farrell' initials='S.' surname='Farrell'><organization/></author>
<author fullname='S. Boeyen' initials='S.' surname='Boeyen'><organization/></author>
<author fullname='R. Housley' initials='R.' surname='Housley'><organization/></author>
<author fullname='W. Polk' initials='W.' surname='Polk'><organization/></author>
<date month='May' year='2008'/>
<abstract><t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5280'/>
<seriesInfo name='DOI' value='10.17487/RFC5280'/>
</reference>



<reference anchor='RFC5652' target='https://www.rfc-editor.org/info/rfc5652'>
<front>
<title>Cryptographic Message Syntax (CMS)</title>
<author fullname='R. Housley' initials='R.' surname='Housley'><organization/></author>
<date month='September' year='2009'/>
<abstract><t>This document describes the Cryptographic Message Syntax (CMS).  This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='70'/>
<seriesInfo name='RFC' value='5652'/>
<seriesInfo name='DOI' value='10.17487/RFC5652'/>
</reference>



<reference anchor='RFC8949' target='https://www.rfc-editor.org/info/rfc8949'>
<front>
<title>Concise Binary Object Representation (CBOR)</title>
<author fullname='C. Bormann' initials='C.' surname='Bormann'><organization/></author>
<author fullname='P. Hoffman' initials='P.' surname='Hoffman'><organization/></author>
<date month='December' year='2020'/>
<abstract><t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t><t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049.  It does not create a new version of the format.</t></abstract>
</front>
<seriesInfo name='STD' value='94'/>
<seriesInfo name='RFC' value='8949'/>
<seriesInfo name='DOI' value='10.17487/RFC8949'/>
</reference>



<reference anchor='RFC8792' target='https://www.rfc-editor.org/info/rfc8792'>
<front>
<title>Handling Long Lines in Content of Internet-Drafts and RFCs</title>
<author fullname='K. Watsen' initials='K.' surname='Watsen'><organization/></author>
<author fullname='E. Auerswald' initials='E.' surname='Auerswald'><organization/></author>
<author fullname='A. Farrel' initials='A.' surname='Farrel'><organization/></author>
<author fullname='Q. Wu' initials='Q.' surname='Wu'><organization/></author>
<date month='June' year='2020'/>
<abstract><t>This document defines two strategies for handling long lines in width-bounded text content.  One strategy, called the &quot;single backslash&quot; strategy, is based on the historical use of a single backslash ('\') character to indicate where line-folding has occurred, with the continuation occurring with the first character that is not a space character (' ') on the next line.  The second strategy, called the &quot;double backslash&quot; strategy, extends the first strategy by adding a second backslash character to identify where the continuation begins and is thereby able to handle cases not supported by the first strategy.  Both strategies use a self-describing header enabling automated reconstitution of the original content.</t></abstract>
</front>
<seriesInfo name='RFC' value='8792'/>
<seriesInfo name='DOI' value='10.17487/RFC8792'/>
</reference>



<reference anchor='RFC8812' target='https://www.rfc-editor.org/info/rfc8812'>
<front>
<title>CBOR Object Signing and Encryption (COSE) and JSON Object Signing and Encryption (JOSE) Registrations for Web Authentication (WebAuthn) Algorithms</title>
<author fullname='M. Jones' initials='M.' surname='Jones'><organization/></author>
<date month='August' year='2020'/>
<abstract><t>The W3C Web Authentication (WebAuthn) specification and the FIDO Alliance FIDO2 Client to Authenticator Protocol (CTAP) specification use CBOR Object Signing and Encryption (COSE) algorithm identifiers.  This specification registers the following algorithms (which are used by WebAuthn and CTAP implementations) in the IANA &quot;COSE Algorithms&quot; registry: RSASSA-PKCS1-v1_5 using SHA-256, SHA-384, SHA-512, and SHA-1; and Elliptic Curve Digital Signature Algorithm (ECDSA) using the secp256k1 curve and SHA-256.  It registers the secp256k1 elliptic curve in the IANA &quot;COSE Elliptic Curves&quot; registry.  Also, for use with JSON Object Signing and Encryption (JOSE), it registers the algorithm ECDSA using the secp256k1 curve and SHA-256 in the IANA &quot;JSON Web Signature and Encryption Algorithms&quot; registry and the secp256k1 elliptic curve in the IANA &quot;JSON Web Key Elliptic Curve&quot; registry.</t></abstract>
</front>
<seriesInfo name='RFC' value='8812'/>
<seriesInfo name='DOI' value='10.17487/RFC8812'/>
</reference>


<reference anchor="onpath" target="https://mailarchive.ietf.org/arch/msg/saag/m1r9uo4xYznOcf85Eyk0Rhut598/">
  <front>
    <title>can an on-path attacker drop traffic?</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>



<reference anchor='I-D.ietf-anima-constrained-voucher'>
   <front>
      <title>Constrained Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
      <author fullname='Michael Richardson'>
	 <organization>Sandelman Software Works</organization>
      </author>
      <author fullname='Peter van der Stok'>
	 <organization>vanderstok consultancy</organization>
      </author>
      <author fullname='Panos Kampanakis'>
	 <organization>Cisco Systems</organization>
      </author>
      <author fullname='Esko Dijk'>
	 <organization>IoTconsultancy.nl</organization>
      </author>
      <date day='14' month='February' year='2022'/>
      <abstract>
	 <t>   This document defines the Constrained Bootstrapping Remote Secure Key
   Infrastructure (Constrained BRSKI) protocol, which provides a
   solution for secure zero-touch bootstrapping of resource-constrained
   (IoT) devices into the network of a domain owner.  This protocol is
   designed for constrained networks, which may have limited data
   throughput or may experience frequent packet loss.  Constrained BRSKI
   is a variant of the BRSKI protocol, which uses an artifact signed by
   the device manufacturer called the &quot;voucher&quot; which enables a new
   device and the owner&#39;s network to mutually authenticate.  While the
   BRSKI voucher is typically encoded in JSON, Constrained BRSKI defines
   a compact CBOR-encoded voucher.  The BRSKI voucher is extended with
   new data types that allow for smaller voucher sizes.  The Enrollment
   over Secure Transport (EST) protocol, used in BRSKI, is replaced with
   EST-over-CoAPS; and HTTPS used in BRSKI is replaced with CoAPS.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-anima-constrained-voucher-16'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-anima-constrained-voucher-16.txt' type='TXT'/>
</reference>


<reference anchor='I-D.ietf-anima-brski-prm'>
   <front>
      <title>BRSKI with Pledge in Responder Mode (BRSKI-PRM)</title>
      <author fullname='Steffen Fries'>
	 <organization>Siemens AG</organization>
      </author>
      <author fullname='Thomas Werner'>
	 <organization>Siemens AG</organization>
      </author>
      <author fullname='Eliot Lear'>
	 <organization>Cisco Systems</organization>
      </author>
      <author fullname='Michael C. Richardson'>
	 <organization>Sandelman Software Works</organization>
      </author>
      <date day='4' month='March' year='2022'/>
      <abstract>
	 <t>   This document defines enhancements to bootstrapping a remote secure
   key infrastructure (BRSKI, [RFC8995]) to facilitate bootstrapping in
   domains featuring no or only timely limited connectivity between a
   pledge and the domain registrar.  It specifically targets situations,
   in which the interaction model changes from a pledge-initiator-mode,
   as used in BRSKI, to a pledge-responder-mode as described in this
   document.  To support both, BRSKI-PRM introduces a new registrar-
   agent component, which facilitates the communication between pledge
   and registrar during the bootstrapping phase.  For the establishment
   of a trust relation between pledge and domain registrar, BRSKI-PRM
   relies on the exchange of authenticated self-contained objects
   (signature-wrapped objects).  The defined approach is agnostic
   regarding the utilized enrollment protocol, deployed by the domain
   registrar to communicate with the Domain CA.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-anima-brski-prm-02'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-anima-brski-prm-02.txt' type='TXT'/>
</reference>


<reference anchor='I-D.richardson-anima-voucher-delegation'>
   <front>
      <title>Delegated Authority for Bootstrap Voucher Artifacts</title>
      <author fullname='Michael Richardson'>
	 <organization>Sandelman Software Works</organization>
      </author>
      <author fullname='Wei Pan'>
	 <organization>Huawei Technologies</organization>
      </author>
      <date day='22' month='March' year='2021'/>
      <abstract>
	 <t>   This document describes an extension of the RFC8366 Voucher Artifact
   in order to support delegation of signing authority.  The initial
   voucher pins a public identity, and that public indentity can then
   issue additional vouchers.  This chain of authorization can support
   permission-less resale of devices, as well as guarding against
   business failure of the BRSKI [I-D.ietf-anima-bootstrapping-keyinfra]
   Manufacturer Authorized Signing Authority (MASA).

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-richardson-anima-voucher-delegation-03'/>
   <format target='https://www.ietf.org/archive/id/draft-richardson-anima-voucher-delegation-03.txt' type='TXT'/>
</reference>


<reference anchor='I-D.friel-anima-brski-cloud'>
   <front>
      <title>BRSKI Cloud Registrar</title>
      <author fullname='Owen Friel'>
	 <organization>Cisco</organization>
      </author>
      <author fullname='Rifaat Shekh-Yusef'>
	 <organization>Auth0</organization>
      </author>
      <author fullname='Michael Richardson'>
	 <organization>Sandelman Software Works</organization>
      </author>
      <date day='6' month='April' year='2021'/>
      <abstract>
	 <t>   This document specifies the behaviour of a BRSKI Cloud Registrar, and
   how a pledge can interact with a BRSKI Cloud Registrar when
   bootstrapping.

   RFCED REMOVE: It is being actively worked on at https://github.com/
   anima-wg/brski-cloud

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-friel-anima-brski-cloud-04'/>
   <format target='https://www.ietf.org/archive/id/draft-friel-anima-brski-cloud-04.txt' type='TXT'/>
</reference>


<reference anchor='I-D.kuehlewind-update-tag'>
   <front>
      <title>Definition of new tags for relations between RFCs</title>
      <author fullname='Mirja Kuehlewind'>
	 <organization>Ericsson</organization>
      </author>
      <author fullname='Suresh Krishnan'>
	 <organization>Kaloom</organization>
      </author>
      <date day='12' month='July' year='2021'/>
      <abstract>
	 <t>   An RFC can include a tag called &quot;Updates&quot; which can be used to link a
   new RFC to an existing RFC.  On publication of such an RFC, the
   existing RFC will include an additional metadata tag called &quot;Updated
   by&quot; which provides a link to the new RFC.  However, this tag pair is
   not well-defined and therefore it is currently used for multiple
   different purposes, which leads to confusion about the actual meaning
   of this tag and inconsistency in its use.

   This document recommends the discontinuation of the use of the
   updates/updated by tag pair, and instead proposes three new tag pairs
   that have well-defined meanings and use cases.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-kuehlewind-update-tag-04'/>
   <format target='https://www.ietf.org/archive/id/draft-kuehlewind-update-tag-04.txt' type='TXT'/>
</reference>




    </references>


<section anchor="examples" title="Examples">

<t>These examples are folded according to <xref target="RFC8792"/> Single Backslash rule.</t>

<section anchor="example-pledge-voucher-request-pvr-from-pledge-to-registrar" title="Example Pledge Voucher Request - PVR (from Pledge to Registrar)">
<t>The following is an example request sent from a Pledge to the Registrar, in “General JWS JSON Serialization”.</t>

<figure title="Example Pledge Voucher Request - PVR" anchor="ExamplePledgeVoucherRequestfigure"><artwork align="left"><![CDATA[
{
   "payload":
     "eyJpZXRmLXZvdWNoZXItcmVxdWVzdDp2b3VjaGVyIjp7ImNyZWF0ZWQ
     tb24iOiIyMDE5LTAyLTE4VDA3OjM5OjAzLjAwMFoiLCJub25jZSI6IjU
     3NDI2OTg0MjI2ODA0NzIifX0",
   "signatures":[
      {
         "protected":
           "eyJhbGciOiJFUzI1NiIsIng1YyI6WyJNSUlCMmpDQ0FZQ2dBd0lCQWd
           JR0FXZWdkY1NMTUFvR0NDcUdTTTQ5QkFNQ01EMHhDekFKQmdOVkJBWVR
           Ba0ZSTVJVd0V3WURWUVFLREF4S2FXNW5TbWx1WjBOdmNuQXhGekFWQmd
           OVkJBTU1Ea3BwYm1kS2FXNW5WR1Z6ZEVOQk1DQVhEVEU0TVRJeE1qQXp
           NamcxTVZvWUR6azVPVGt4TWpNeE1qTTFPVFU1V2pCU01Rc3dDUVlEVlF
           RR0V3SkJVVEVWTUJNR0ExVUVDZ3dNU21sdVowcHBibWREYjNKd01STXd
           FUVlEVlFRRkV3b3dNVEl6TkRVMk56ZzVNUmN3RlFZRFZRUUREQTVLYVc
           1blNtbHVaMFJsZG1salpUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDl
           Bd0VIQTBJQUJNVkdHOFo1cGpmNWpYbnlyVXJYeVoxa1BncUJlM05YdTF
           kVEFEZStyL3Y2SnpJSGwzNTVJZ2NIQzNheHBpYnFKTS9iV1JhRXlqcWN
           DSmo0akprb3dDdWpWVEJUTUN3R0NTc0dBUVFCZ3U1U0FnUWZEQjF0WVh
           OaExYUmxjM1F1YzJsbGJXVnVjeTFpZEM1dVpYUTZPVFEwTXpBVEJnTlZ
           IU1VFRERBS0JnZ3JCZ0VGQlFjREFqQU9CZ05WSFE4QkFmOEVCQU1DQjR
           Bd0NnWUlLb1pJemowRUF3SURTQUF3UlFJZ1d0UHpJSVhZMml4UlhKdEV
           4S0VoaFpkYTRYK0VwbFpvbUVJMnpBMGRzam9DSVFDM0pwUW1SWE1Hbi9
           wNEJ1OWl6aWk5MmVjbFR4NC9PNHJsbTdNeUxxa2hkQT09Il19",
         "signature":
           "xURZmcWSFaBD2cNkr37azT9osWfzTZ_veCsVho3fwdD6NR4ghL61VJm
           Y_ra0a42SvoW2Tu4XlldzzD8VDtCCDg"
      }
   ]
}
]]></artwork></figure>

</section>
<section anchor="example-parboiled-registrar-voucher-request-rvr-from-registrar-to-masa" title="Example Parboiled Registrar Voucher Request - RVR (from Registrar to MASA)">
<t>The term parboiled refers to food which is partially cooked.
In <xref target="BRSKI"/>, the term refers to a Pledge voucher-request (PVR) which has been received by the Registrar, and then has been processed by the Registrar (“cooked”), and is now being forwarded to the MASA.</t>

<t>The following is an example Registrar voucher-request (RVR) sent from the Registrar to the MASA, in “General JWS JSON Serialization”.
Note that the previous PVR can be seen in the payload as “prior-signed-voucher-request”.</t>

<figure title="Example Parboiled Registrar Voucher Request - RVR" anchor="ExampleParboiledRegistrarVoucherRequestfigure"><artwork align="left"><![CDATA[
{
   "payload":
     "eyJpZXRmLXZvdWNoZXItcmVxdWVzdDp2b3VjaGVyIjp7InNlcmlhbC1
     udW1iZXIiOiIwMTIzNDU2Nzg5Iiwibm9uY2UiOiI1NzQyNjk4NDIyNjg
     wNDcyIiwicHJpb3Itc2lnbmVkLXZvdWNoZXItcmVxdWVzdCI6ImV5Snd
     ZWGxzYjJGa0lqb2laWGxLY0ZwWVVtMU1XRnAyWkZkT2IxcFlTWFJqYlZ
     aNFpGZFdlbVJFY0RKaU0xWnFZVWRXZVVscWNEZEpiVTU1V2xkR01GcFh
     VWFJpTWpScFQybEplVTFFUlRWTVZFRjVURlJGTkZaRVFUTlBhazAxVDJ
     wQmVreHFRWGROUm05cFRFTktkV0l5TldwYVUwazJTV3BWTTA1RVNUSlB
     WR2N3VFdwSk1rOUVRVEJPZWtscFpsZ3dJaXdpYzJsbmJtRjBkWEpsY3l
     JNlczc2ljSEp2ZEdWamRHVmtJam9pWlhsS2FHSkhZMmxQYVVwR1ZYcEp
     NVTVwU1hOSmJtY3hXWGxKTmxkNVNrNVRWV3hEVFcxd1JGRXdSbHBSTW1
     SQ1pEQnNRMUZYWkVwU01FWllXbGRrYTFreFRrMVVWVVoyVWpCT1JHTlZ
     aRlJVVkZFMVVXdEdUbEV3TVVWTlNHaEVaV3RHUzFGdFpFOVdhMHBDVjF
     aU1FtRXdXbE5VVmtwV1pEQldNMWRWVWxkVlZrWk1Va1ZHTkZNeVJsaE9
     WelZVWWxkNE1WZHFRazlrYlU1MVVWaG9SMlZyUmxkUmJXUlBWbXRLUWx
     SVk1VVmhNMEozV1cweGExTXlSbGhPVnpWWFVqRmFObHBGVms5UmF6RkV
     VVlpvUlZaRlZUQlVWbEpLWlVVeGNWRlljRTVoYldONFZGWmFkbGRWVWp
     aaGVsWlFWa2QwTkZSWGNFNWxSVEZ4VkZSR1VGWkdWVEZXTW5CRFZUQXh
     VbU16WkVSVlZteEZWbXhHVWxJd1ZqTlRhMHBXVmtWV1YxUlZTazVTTUV
     WNFZsVldSRm96WkU1Vk1qRnpaRlp2ZDJOSVFtbGlWMUpGV1dwT1MyUXd
     NVk5VV0dSR1ZWWnNSVlpzUmxKU2ExWXpZak5rVGxaRmJEWlVhMUpXVFd
     zMU5scDZWazVWYlU0elVteEdXbEpHV2xKVlZWSkZVVlJXVEZsV1l6Rml
     iRTUwWWtoV1lVMUdTbk5hUnpGellXeHdWVkZzY0U1UmF6RklVVzVzZUZ
     JeFRrNU9SR3hDV2pCV1NGRXdUbmhTTVU1T1RrUnNRbVF3VmtsUlZFSkt
     VVlZLVGxaclpFaFBSbTh4WTBkd2JVNVhjRmxpYm14NVZsaEtXV1ZXYjN
     oaE1VSnVZMVZLYkUwd05WbGtWRVpyVmtWR1JWcFRkSGxNTTFreVUyNXd
     TbE5IZDNwT1ZGWktXakpPU1ZGNlRtaGxTRUp3V1c1R1MxUlRPV2xXTVV
     wb1VsaHNjV05YVGtSVGJXOHdZV3R3Y21JelpFUmtWM0JYVmtWS1ZWUlZ
     Uak5TTUU1VVl6QmtRbFZXUmtOYU0xVXhWVEJHYmxWWFdrVlJha1l3VjF
     ab1QyRkZlRmxWYlhocVRURkdNVmw2U25OaVIwcFlWbTVXYW1WVVJuQmF
     SVTB4WkZad1dWVlVXbEJXUmtWM1ZGaHdRbFpGU201VWJGcEpWVEZXUmx
     KRlVrSlRNRXB1V2pOS1Exb3dWa2RSYkVacVVrVkdjVkZWT1VOYU1EVlh
     VMFpGTkZGclJtMVBSVlpEVVZVeFJGRnFVa0prTUU1dVYxVnNUR0l4Y0V
     wbGJXOTNVbFZHTTFOVlVsUlJWVVl6Vld4R1Nsb3haREJWU0hCS1UxWm9
     XazF0YkRSVmJHaExaRVZXTkZNd1ZtOWhSbkJyV1ZSU1dVc3dWbmRpUm5
     CMllsVldTazF1Y0VKTlIxSjZZVzA1UkZOV1JrUk5NSEIzVlZjeFUxZEZ
     NVWhpYVRsM1RrVktNVTlYYkRaaFYyczFUVzFXYW1KR1VqUk9RemxRVGt
     oS2MySlVaRTVsVlhoNFlUSm9hMUZVTURsSmJERTVJaXdpYzJsbmJtRjB
     kWEpsSWpvaWVGVlNXbTFqVjFOR1lVSkVNbU5PYTNJek4yRjZWRGx2YzF
     kbWVsUmFYM1psUTNOV2FHOHpabmRrUkRaT1VqUm5hRXcyTVZaS2JWbGZ
     jbUV3WVRReVUzWnZWekpVZFRSWWJHeGtlbnBFT0ZaRWRFTkRSR2NpZlY
     xOSIsImNyZWF0ZWQtb24iOiIyMDIyLTAzLTAyVDAzOjAxOjI0LjQ2Nlo
     ifX0",
   "signatures":[
      {
         "protected":
           "eyJ4NWMiOlsiTUlJQm96Q0NBVXFnQXdJQkFnSUdBVzBlTHVJRk1Bb0d
           DQ3FHU000OUJBTUNNRFV4RXpBUkJnTlZCQW9NQ2sxNVFuVnphVzVsYzN
           NeERUQUxCZ05WQkFjTUJGTnBkR1V4RHpBTkJnTlZCQU1NQmxSbGMzUkR
           RVEFlRncweE9UQTVNVEV3TWpNM016SmFGdzB5T1RBNU1URXdNak0zTXp
           KYU1GUXhFekFSQmdOVkJBb01DazE1UW5WemFXNWxjM014RFRBTEJnTlZ
           CQWNNQkZOcGRHVXhMakFzQmdOVkJBTU1KVkpsWjJsemRISmhjaUJXYjN
           WamFHVnlJRkpsY1hWbGMzUWdVMmxuYm1sdVp5QkxaWGt3V1RBVEJnY3F
           oa2pPUFFJQkJnZ3Foa2pPUFFNQkJ3TkNBQVQ2eFZ2QXZxVHoxWlVpdU5
           XaFhwUXNrYVB5N0FISFFMd1hpSjBpRUx0NnVOUGFuQU4wUW5XTVlPXC8
           wQ0RFaklrQlFvYnc4WUtxanR4SkhWU0dUajlLT295Y3dKVEFUQmdOVkh
           TVUVEREFLQmdnckJnRUZCUWNESERBT0JnTlZIUThCQWY4RUJBTUNCNEF
           3Q2dZSUtvWkl6ajBFQXdJRFJ3QXdSQUlnWXIyTGZxb2FDS0RGNFJBY01
           tSmkrTkNacWRTaXVWdWdJU0E3T2hLUnEzWUNJRHhuUE1NbnBYQU1UclB
           KdVBXeWNlRVIxMVB4SE9uKzBDcFNIaTJxZ3BXWCIsIk1JSUJwRENDQVV
           tZ0F3SUJBZ0lHQVcwZUx1SCtNQW9HQ0NxR1NNNDlCQU1DTURVeEV6QVJ
           CZ05WQkFvTUNrMTVRblZ6YVc1bGMzTXhEVEFMQmdOVkJBY01CRk5wZEd
           VeER6QU5CZ05WQkFNTUJsUmxjM1JEUVRBZUZ3MHhPVEE1TVRFd01qTTN
           NekphRncweU9UQTVNVEV3TWpNM016SmFNRFV4RXpBUkJnTlZCQW9NQ2s
           xNVFuVnphVzVsYzNNeERUQUxCZ05WQkFjTUJGTnBkR1V4RHpBTkJnTlZ
           CQU1NQmxSbGMzUkRRVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXd
           FSEEwSUFCT2t2a1RIdThRbFQzRkhKMVVhSTcrV3NIT2IwVVMzU0FMdEc
           1d3VLUURqaWV4MDZcL1NjWTVQSmlidmdIVEIrRlwvUVRqZ2VsSEd5MVl
           LcHdjTk1jc1N5YWpSVEJETUJJR0ExVWRFd0VCXC93UUlNQVlCQWY4Q0F
           RRXdEZ1lEVlIwUEFRSFwvQkFRREFnSUVNQjBHQTFVZERnUVdCQlRvWkl
           NelFkc0RcL2pcLytnWFwvN2NCSnVjSFwvWG1qQUtCZ2dxaGtqT1BRUUR
           BZ05KQURCR0FpRUF0eFEzK0lMR0JQSXRTaDRiOVdYaFhOdWhxU1A2SCt
           iXC9MQ1wvZlZZRGpRNm9DSVFERzJ1UkNIbFZxM3loQjU4VFhNVWJ6SDg
           rT2xoV1V2T2xSRDNWRXFEZGNRdz09Il0sImFsZyI6IkVTMjU2In0",
         "signature":
           "zvtnaEDpOqL49XnYVRbLxVAaZCMRtDiaLqMeFSH3UsjHdz4FT0lFywV
           7-5inMpafXTnqqxnD2Gpr3ClUXUyAJg"
      }
   ]
}
]]></artwork></figure>

</section>
<section anchor="example-voucher-response-from-masa-to-pledge-via-registrar" title="Example Voucher Response (from MASA to Pledge, via Registrar)">
<t>The following is an example voucher response from MASA to Pledge via Registrar, in “General JWS JSON Serialization”.</t>

<figure title="Example Voucher Response" anchor="ExampleVoucherResponsefigure"><artwork align="left"><![CDATA[
{
    "payload":
      "eyJpZXRmLXZvdWNoZXI6dm91Y2hlciI6eyJhc3NlcnRpb24iOiJsb2
      dnZWQiLCJzZXJpYWwtbnVtYmVyIjoiMDEyMzQ1Njc4OSIsIm5vbmNlI
      joiNTc0MjY5ODQyMjY4MDQ3MiIsImNyZWF0ZWQtb24iOiIyMDIyLTAz
      LTAyVDAzOjAxOjI0LjYxOFoiLCJwaW5uZWQtZG9tYWluLWNlcnQiOiJ
      NSUlCcERDQ0FVbWdBd0lCQWdJR0FXMGVMdUgrTUFvR0NDcUdTTTQ5Qk
      FNQ01EVXhFekFSQmdOVkJBb01DazE1UW5WemFXNWxjM014RFRBTEJnT
      lZCQWNNQkZOcGRHVXhEekFOQmdOVkJBTU1CbFJsYzNSRFFUQWVGdzB4
      T1RBNU1URXdNak0zTXpKYUZ3MHlPVEE1TVRFd01qTTNNekphTURVeEV
      6QVJCZ05WQkFvTUNrMTVRblZ6YVc1bGMzTXhEVEFMQmdOVkJBY01CRk
      5wZEdVeER6QU5CZ05WQkFNTUJsUmxjM1JEUVRCWk1CTUdCeXFHU000O
      UFnRUdDQ3FHU000OUF3RUhBMElBQk9rdmtUSHU4UWxUM0ZISjFVYUk3
      K1dzSE9iMFVTM1NBTHRHNXd1S1FEamlleDA2L1NjWTVQSmlidmdIVEI
      rRi9RVGpnZWxIR3kxWUtwd2NOTWNzU3lhalJUQkRNQklHQTFVZEV3RU
      Ivd1FJTUFZQkFmOENBUUV3RGdZRFZSMFBBUUgvQkFRREFnSUVNQjBHQ
      TFVZERnUVdCQlRvWklNelFkc0Qvai8rZ1gvN2NCSnVjSC9YbWpBS0Jn
      Z3Foa2pPUFFRREFnTkpBREJHQWlFQXR4UTMrSUxHQlBJdFNoNGI5V1h
      oWE51aHFTUDZIK2IvTEMvZlZZRGpRNm9DSVFERzJ1UkNIbFZxM3loQj
      U4VFhNVWJ6SDgrT2xoV1V2T2xSRDNWRXFEZGNRdz09In19",
    "signatures": [
        {
            "protected":
              "eyJ4NWMiOlsiTUlJQmt6Q0NBVGlnQXdJQkFnSUdBV0ZCakNrWU1B
              b0dDQ3FHU000OUJBTUNNRDB4Q3pBSkJnTlZCQVlUQWtGUk1SVXdFd
              1lEVlFRS0RBeEthVzVuU21sdVowTnZjbkF4RnpBVkJnTlZCQU1NRG
              twcGJtZEthVzVuVkdWemRFTkJNQjRYRFRFNE1ERXlPVEV3TlRJME1
              Gb1hEVEk0TURFeU9URXdOVEkwTUZvd1R6RUxNQWtHQTFVRUJoTUNR
              VkV4RlRBVEJnTlZCQW9NREVwcGJtZEthVzVuUTI5eWNERXBNQ2NHQ
              TFVRUF3d2dTbWx1WjBwcGJtZERiM0p3SUZadmRXTm9aWElnVTJsbm
              JtbHVaeUJMWlhrd1dUQVRCZ2NxaGtqT1BRSUJCZ2dxaGtqT1BRTUJ
              Cd05DQUFTQzZiZUxBbWVxMVZ3NmlRclJzOFIwWlcrNGIxR1d5ZG1X
              czJHQU1GV3diaXRmMm5JWEgzT3FIS1Z1OHMyUnZpQkdOaXZPS0dCS
              Eh0QmRpRkVaWnZiN294SXdFREFPQmdOVkhROEJBZjhFQkFNQ0I0QX
              dDZ1lJS29aSXpqMEVBd0lEU1FBd1JnSWhBSTRQWWJ4dHNzSFAyVkh
              4XC90elVvUVwvU3N5ZEwzMERRSU5FdGNOOW1DVFhQQWlFQXZJYjNv
              K0ZPM0JUbmNMRnNhSlpSQWtkN3pPdXNuXC9cL1pLT2FFS2JzVkRpV
              T0iXSwiYWxnIjoiRVMyNTYifQ",
            "signature":
              "vyge3GENm1BNcijXT5VH7A8CJWW7wPzH61u2VCfR8E9v8H8Yr3g9
              irYz4q5sYj2UnOVIh-hG_ogrZR0Tct_Vzw"
        }
    ]
}
]]></artwork></figure>

</section>
</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

