<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.16 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-anima-jws-voucher-04" category="std" updates="RFC8366">

  <front>
    <title abbrev="JWS-voucher">JWS signed Voucher Artifacts for Bootstrapping Protocols</title>

    <author initials="T." surname="Werner" fullname="Thomas Werner">
      <organization>Siemens AG</organization>
      <address>
        <email>thomas-werner@siemens.com</email>
      </address>
    </author>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>

    <date year="2022" month="July" day="11"/>

    <area>Internet</area>
    <workgroup>anima Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t><xref target="RFC8366"/> defines a digital artifact called voucher as a YANG-defined JSON
document that has been signed using a Cryptographic Message Syntax (CMS) structure.
This memo introduces a variant of the voucher structure in which CMS is
replaced by the JSON Object Signing and Encryption (JOSE) mechanism described in RFC7515 to better support use-cases in which JOSE is preferred over CMS.</t>

<t>In addition to explaining how the format is created, MIME types are registered and examples are provided.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>“A Voucher Artifact for Bootstrapping Protocols” <xref target="RFC8366"/> describes a voucher artifact used in “Bootstrapping Remote Secure Key Infrastructure” <xref target="BRSKI"/> and
“Secure Zero Touch Provisioning” <xref target="SZTP"/> to transfer ownership of a device from a manufacturer to an owner.
That document defines the base YANG module and the serialization to JSON <xref target="RFC8259"/> with a CMS signature according to <xref target="RFC5652"/>.
The resulting Voucher artifact has the media type “application/voucher-cms+json”.</t>

<t>Other work, <xref target="I-D.ietf-anima-constrained-voucher"/> provides a mapping of the YANG to CBOR <xref target="RFC8949"/> with a signature format of COSE <xref target="RFC8812"/>.</t>

<t>This document provides an equivalent mapping of JSON format with the signature format JSON Web Signature (JWS) <xref target="RFC7515"/>.
The encoding specified in this document is used by <xref target="I-D.ietf-anima-brski-prm"/>
and may be preferred for use cases requiring signed JSON objects.</t>

<t>This document does not extend the YANG definition of <xref target="RFC8366"/>.</t>

<t>With the availability of different encoded vouchers, it is up to an industry specific application statement to indicate/decide which voucher signature format is to be used.
There is no provision across the different voucher signature formats that a receiver could safely recognize which format it uses unless additional context is provided.
For example, <xref target="BRSKI"/> provides this context via the MIME-Type for the voucher artifact.</t>

<t>This document should be considered an update to <xref target="RFC8366"/> in the category of “See Also”
as per <xref target="I-D.kuehlewind-update-tag"/>.</t>

</section>
<section anchor="terminology" title="Terminology">

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL
NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”,
“MAY”, and “OPTIONAL” in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

</section>
<section anchor="voucher-artifact-with-json-web-signature" title="Voucher Artifact with JSON Web Signature">

<t>The voucher <xref target="RFC8366"/> JSON structure consists of a nested map, the outer part of which is:</t>

<figure><artwork><![CDATA[
{ "ietf-voucher:voucher" : { some inner items }}
]]></artwork></figure>

<t>this is considered the JSON payload as described in <xref target="RFC7515"/> section 3.</t>

<t>A JWS JSON Serialization Overview is given by <xref target="RFC7515"/> in section 3.2 and section 7 provides more details.<vspace />
The following serializations are defined:</t>

<t><list style="numbers">
  <t>“JWS Compact Serialization”, <xref target="RFC7515"/> section 7.1</t>
  <t>“JWS JSON Serialization” in, <xref target="RFC7515"/> section 7.2<vspace />
- “General JWS JSON Serialization Syntax”, <xref target="RFC7515"/> section 7.2.1<vspace />
- “Flattened JWS JSON Serialization Syntax”, <xref target="RFC7515"/> section 7.2.2</t>
</list></t>

<t>This document makes use of the “General JWS JSON Serialization Syntax” to support multi signatures.</t>

<t>[RFC Editor: please delete] /*
TODO: …
*/</t>

<figure><artwork><![CDATA[
[RFC Editor: please delete] /*
TODO: ...
*/
]]></artwork></figure>

<t>There are a number of attributes.
They are:</t>

<section anchor="unprotected-header" title="Unprotected Header">

<t>[RFC Editor: please delete] /*
TODO: …
*/</t>

</section>
<section anchor="protected-header" title="Protected Header">

<t>The standard “typ” and “alg” values described in <xref target="RFC7515"/> are expected in the protected headers.</t>

<t>It remains to be determined (XXX), what values, if any, should go into the “typ” header, as in the <xref target="BRSKI"/> use cases, there are additional HTTP MIME type headers to indicate content types.</t>

<t>The “alg” should contain the algorithm type such as “ES256”.</t>

<t>If PKIX <xref target="RFC5280"/> format certificates are used then the <xref target="RFC7515"/> section 4.1.6 “x5c”
certificate chain SHOULD be used to contain the certificate and chain.
Vouchers will often need all certificates in the chain, including what would be considered the trust anchor certificate because intermediate devices (such as the Registrar) may need to audit the artifact,
or end systems may need to pin a trust anchor for future operations.
This is consistent with <xref target="BRSKI"/> section 5.5.2.</t>

</section>
<section anchor="voucher-representation-in-general-jws-json-serialization-syntax" title="Voucher Representation in General JWS JSON Serialization Syntax">
<figure title="Voucher Representation in General JWS JSON Serialization Syntax" anchor="VoucherGeneralJWSfigure"><artwork align="left"><![CDATA[
{
  "payload": {
    "ietf-voucher:voucher": {
      "assertion": "logged",
      "serial-number": "0123456789",
      "nonce": "5742698422680472",
      "created-on": "2022-07-08T03:01:24.618Z",
      "pinned-domain-cert": "base64encodedvalue=="
    }
  },
  "signatures": [
    {
      "protected": {
        "x5c": [
          "base64encodedvalue=="
        ],
        "alg": "ES256",
        "typ": "voucher-jws+json"
      },
      "signature": "base64encodedvalue=="
    }
  ]
}
]]></artwork></figure>

</section>
</section>
<section anchor="privacy-considerations" title="Privacy Considerations">

<t>The Voucher Request reveals the IDevID of the component (Pledge) that is on-boarding.</t>

<t>This request occurs over HTTP-over-TLS, however the Pledge to Registrar transaction is over a provisional TLS session, and it is subject to disclosure via by a Dolev-Yao attacker (a “malicious messenger”)<xref target="onpath"/>.
This is explained in <xref target="BRSKI"/> section 10.2.</t>

<t>The use of a JWS header brings no new privacy considerations.</t>

</section>
<section anchor="security-considerations" title="Security Considerations">

<t>The issues of how <xref target="RFC8366"/> vouchers are used in a <xref target="BRSKI"/> system is addressed in section 11 of that document.
This document does not change any of those issues, it just changes the signature technology used for vouchers and voucher requests.</t>

<t><xref target="SZTP"/> section 9 deals with voucher use in Secure Zero Touch Provisioning, and this document also makes no changes to security.</t>

</section>
<section anchor="iana-considerations" title="IANA Considerations">

<section anchor="media-type-registry" title="Media-Type Registry">

<t>This section registers the ‘application/voucher-jws+json’ in the “Media Types” registry.</t>

<section anchor="applicationvoucher-jwsjson" title="application/voucher-jws+json">

<figure><artwork><![CDATA[
Type name:  application
Subtype name:  voucher-jws+json
Required parameters:  none
Optional parameters:  none
Encoding considerations:  JWS+JSON vouchers are JOSE objects
                          signed with one signer.
Security considerations:  See Security Considerations, Section
Interoperability considerations:  The format is designed to be
  broadly interoperable.
Published specification:  THIS RFC.
Applications that use this media type:  ANIMA, 6tisch, and other
  zero-touch imprinting systems
Additional information:
  Magic number(s):  None
  File extension(s):  .vjj
  Macintosh file type code(s):  none
Person & email address to contact for further information:  IETF
  ANIMA WG
Intended usage:  LIMITED
Restrictions on usage:  NONE
Author:  ANIMA WG
Change controller:  IETF
Provisional registration? (standards tree only):  NO
]]></artwork></figure>

</section>
</section>
</section>
<section anchor="changelog" title="Changelog">

<t><list style="symbols">
  <t>Added adoption call comments from Toerless.  Changed from [RFCxxxx] to [THING] style for some key references.</t>
  <t>Updated references “I-D.ietf-anima-brski-async-enroll” switched to “I-D.ietf-anima-brski-prm”</t>
  <t>Switch from “JWS Compact Serialization” to “General JWS JSON Serialization”, as focus is now on “General JWS JSON Serialization”</t>
  <t>Include Voucher representation in “General JWS JSON Serialization” syntax</t>
  <t>Include examples A1, A2, A3 using “General JWS JSON Serialization”</t>
  <t>Added optional “typ”: “voucher-jws+json” header parameter to JWS objects</t>
</list></t>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference anchor='BRSKI' target='https://www.rfc-editor.org/info/rfc8995'>
<front>
<title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
<author fullname='M. Pritikin' initials='M.' surname='Pritikin'><organization/></author>
<author fullname='M. Richardson' initials='M.' surname='Richardson'><organization/></author>
<author fullname='T. Eckert' initials='T.' surname='Eckert'><organization/></author>
<author fullname='M. Behringer' initials='M.' surname='Behringer'><organization/></author>
<author fullname='K. Watsen' initials='K.' surname='Watsen'><organization/></author>
<date month='May' year='2021'/>
<abstract><t>This document specifies automated bootstrapping of an Autonomic Control Plane.  To do this, a Secure Key Infrastructure is bootstrapped.  This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline.  We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device.  The established secure connection can be used to deploy a locally issued certificate to the device as well.</t></abstract>
</front>
<seriesInfo name='RFC' value='8995'/>
<seriesInfo name='DOI' value='10.17487/RFC8995'/>
</reference>



<reference anchor='SZTP' target='https://www.rfc-editor.org/info/rfc8572'>
<front>
<title>Secure Zero Touch Provisioning (SZTP)</title>
<author fullname='K. Watsen' initials='K.' surname='Watsen'><organization/></author>
<author fullname='I. Farrer' initials='I.' surname='Farrer'><organization/></author>
<author fullname='M. Abrahamsson' initials='M.' surname='Abrahamsson'><organization/></author>
<date month='April' year='2019'/>
<abstract><t>This document presents a technique to securely provision a networking device when it is booting in a factory-default state.  Variations in the solution enable it to be used on both public and private networks.  The provisioning steps are able to update the boot image, commit an initial configuration, and execute arbitrary scripts to address auxiliary needs.  The updated device is subsequently able to establish secure connections with other systems.  For instance, a device may establish NETCONF (RFC 6241) and/or RESTCONF (RFC 8040) connections with deployment-specific network management systems.</t></abstract>
</front>
<seriesInfo name='RFC' value='8572'/>
<seriesInfo name='DOI' value='10.17487/RFC8572'/>
</reference>



<reference anchor='RFC8366' target='https://www.rfc-editor.org/info/rfc8366'>
<front>
<title>A Voucher Artifact for Bootstrapping Protocols</title>
<author fullname='K. Watsen' initials='K.' surname='Watsen'><organization/></author>
<author fullname='M. Richardson' initials='M.' surname='Richardson'><organization/></author>
<author fullname='M. Pritikin' initials='M.' surname='Pritikin'><organization/></author>
<author fullname='T. Eckert' initials='T.' surname='Eckert'><organization/></author>
<date month='May' year='2018'/>
<abstract><t>This document defines a strategy to securely assign a pledge to an owner using an artifact signed, directly or indirectly, by the pledge's manufacturer.  This artifact is known as a &quot;voucher&quot;.</t><t>This document defines an artifact format as a YANG-defined JSON document that has been signed using a Cryptographic Message Syntax (CMS) structure.  Other YANG-derived formats are possible.  The voucher artifact is normally generated by the pledge's manufacturer (i.e., the Manufacturer Authorized Signing Authority (MASA)).</t><t>This document only defines the voucher artifact, leaving it to other documents to describe specialized protocols for accessing it.</t></abstract>
</front>
<seriesInfo name='RFC' value='8366'/>
<seriesInfo name='DOI' value='10.17487/RFC8366'/>
</reference>



<reference anchor='RFC7515' target='https://www.rfc-editor.org/info/rfc7515'>
<front>
<title>JSON Web Signature (JWS)</title>
<author fullname='M. Jones' initials='M.' surname='Jones'><organization/></author>
<author fullname='J. Bradley' initials='J.' surname='Bradley'><organization/></author>
<author fullname='N. Sakimura' initials='N.' surname='Sakimura'><organization/></author>
<date month='May' year='2015'/>
<abstract><t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures.  Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification.  Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t></abstract>
</front>
<seriesInfo name='RFC' value='7515'/>
<seriesInfo name='DOI' value='10.17487/RFC7515'/>
</reference>



<reference anchor='RFC8259' target='https://www.rfc-editor.org/info/rfc8259'>
<front>
<title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
<author fullname='T. Bray' initials='T.' role='editor' surname='Bray'><organization/></author>
<date month='December' year='2017'/>
<abstract><t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format.  It was derived from the ECMAScript Programming Language Standard.  JSON defines a small set of formatting rules for the portable representation of structured data.</t><t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t></abstract>
</front>
<seriesInfo name='STD' value='90'/>
<seriesInfo name='RFC' value='8259'/>
<seriesInfo name='DOI' value='10.17487/RFC8259'/>
</reference>



<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>




    </references>

    <references title='Informative References'>





<reference anchor='RFC5280' target='https://www.rfc-editor.org/info/rfc5280'>
<front>
<title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
<author fullname='D. Cooper' initials='D.' surname='Cooper'><organization/></author>
<author fullname='S. Santesson' initials='S.' surname='Santesson'><organization/></author>
<author fullname='S. Farrell' initials='S.' surname='Farrell'><organization/></author>
<author fullname='S. Boeyen' initials='S.' surname='Boeyen'><organization/></author>
<author fullname='R. Housley' initials='R.' surname='Housley'><organization/></author>
<author fullname='W. Polk' initials='W.' surname='Polk'><organization/></author>
<date month='May' year='2008'/>
<abstract><t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5280'/>
<seriesInfo name='DOI' value='10.17487/RFC5280'/>
</reference>



<reference anchor='RFC5652' target='https://www.rfc-editor.org/info/rfc5652'>
<front>
<title>Cryptographic Message Syntax (CMS)</title>
<author fullname='R. Housley' initials='R.' surname='Housley'><organization/></author>
<date month='September' year='2009'/>
<abstract><t>This document describes the Cryptographic Message Syntax (CMS).  This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='70'/>
<seriesInfo name='RFC' value='5652'/>
<seriesInfo name='DOI' value='10.17487/RFC5652'/>
</reference>



<reference anchor='RFC8949' target='https://www.rfc-editor.org/info/rfc8949'>
<front>
<title>Concise Binary Object Representation (CBOR)</title>
<author fullname='C. Bormann' initials='C.' surname='Bormann'><organization/></author>
<author fullname='P. Hoffman' initials='P.' surname='Hoffman'><organization/></author>
<date month='December' year='2020'/>
<abstract><t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t><t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049.  It does not create a new version of the format.</t></abstract>
</front>
<seriesInfo name='STD' value='94'/>
<seriesInfo name='RFC' value='8949'/>
<seriesInfo name='DOI' value='10.17487/RFC8949'/>
</reference>



<reference anchor='RFC8792' target='https://www.rfc-editor.org/info/rfc8792'>
<front>
<title>Handling Long Lines in Content of Internet-Drafts and RFCs</title>
<author fullname='K. Watsen' initials='K.' surname='Watsen'><organization/></author>
<author fullname='E. Auerswald' initials='E.' surname='Auerswald'><organization/></author>
<author fullname='A. Farrel' initials='A.' surname='Farrel'><organization/></author>
<author fullname='Q. Wu' initials='Q.' surname='Wu'><organization/></author>
<date month='June' year='2020'/>
<abstract><t>This document defines two strategies for handling long lines in width-bounded text content.  One strategy, called the &quot;single backslash&quot; strategy, is based on the historical use of a single backslash ('\') character to indicate where line-folding has occurred, with the continuation occurring with the first character that is not a space character (' ') on the next line.  The second strategy, called the &quot;double backslash&quot; strategy, extends the first strategy by adding a second backslash character to identify where the continuation begins and is thereby able to handle cases not supported by the first strategy.  Both strategies use a self-describing header enabling automated reconstitution of the original content.</t></abstract>
</front>
<seriesInfo name='RFC' value='8792'/>
<seriesInfo name='DOI' value='10.17487/RFC8792'/>
</reference>



<reference anchor='RFC8812' target='https://www.rfc-editor.org/info/rfc8812'>
<front>
<title>CBOR Object Signing and Encryption (COSE) and JSON Object Signing and Encryption (JOSE) Registrations for Web Authentication (WebAuthn) Algorithms</title>
<author fullname='M. Jones' initials='M.' surname='Jones'><organization/></author>
<date month='August' year='2020'/>
<abstract><t>The W3C Web Authentication (WebAuthn) specification and the FIDO Alliance FIDO2 Client to Authenticator Protocol (CTAP) specification use CBOR Object Signing and Encryption (COSE) algorithm identifiers.  This specification registers the following algorithms (which are used by WebAuthn and CTAP implementations) in the IANA &quot;COSE Algorithms&quot; registry: RSASSA-PKCS1-v1_5 using SHA-256, SHA-384, SHA-512, and SHA-1; and Elliptic Curve Digital Signature Algorithm (ECDSA) using the secp256k1 curve and SHA-256.  It registers the secp256k1 elliptic curve in the IANA &quot;COSE Elliptic Curves&quot; registry.  Also, for use with JSON Object Signing and Encryption (JOSE), it registers the algorithm ECDSA using the secp256k1 curve and SHA-256 in the IANA &quot;JSON Web Signature and Encryption Algorithms&quot; registry and the secp256k1 elliptic curve in the IANA &quot;JSON Web Key Elliptic Curve&quot; registry.</t></abstract>
</front>
<seriesInfo name='RFC' value='8812'/>
<seriesInfo name='DOI' value='10.17487/RFC8812'/>
</reference>


<reference anchor="onpath" target="https://mailarchive.ietf.org/arch/msg/saag/m1r9uo4xYznOcf85Eyk0Rhut598/">
  <front>
    <title>can an on-path attacker drop traffic?</title>
    <author >
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>



<reference anchor='I-D.ietf-anima-constrained-voucher'>
   <front>
      <title>Constrained Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
      <author fullname='Michael Richardson'>
	 <organization>Sandelman Software Works</organization>
      </author>
      <author fullname='Peter van der Stok'>
	 <organization>vanderstok consultancy</organization>
      </author>
      <author fullname='Panos Kampanakis'>
	 <organization>Cisco Systems</organization>
      </author>
      <author fullname='Esko Dijk'>
	 <organization>IoTconsultancy.nl</organization>
      </author>
      <date day='7' month='April' year='2022'/>
      <abstract>
	 <t>   This document defines the Constrained Bootstrapping Remote Secure Key
   Infrastructure (Constrained BRSKI) protocol, which provides a
   solution for secure zero-touch bootstrapping of resource-constrained
   (IoT) devices into the network of a domain owner.  This protocol is
   designed for constrained networks, which may have limited data
   throughput or may experience frequent packet loss.  Constrained BRSKI
   is a variant of the BRSKI protocol, which uses an artifact signed by
   the device manufacturer called the &quot;voucher&quot; which enables a new
   device and the owner&#39;s network to mutually authenticate.  While the
   BRSKI voucher is typically encoded in JSON, Constrained BRSKI defines
   a compact CBOR-encoded voucher.  The BRSKI voucher is extended with
   new data types that allow for smaller voucher sizes.  The Enrollment
   over Secure Transport (EST) protocol, used in BRSKI, is replaced with
   EST-over-CoAPS; and HTTPS used in BRSKI is replaced with CoAPS.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-anima-constrained-voucher-17'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-anima-constrained-voucher-17.txt' type='TXT'/>
</reference>


<reference anchor='I-D.ietf-anima-brski-prm'>
   <front>
      <title>BRSKI with Pledge in Responder Mode (BRSKI-PRM)</title>
      <author fullname='Steffen Fries'>
	 <organization>Siemens AG</organization>
      </author>
      <author fullname='Thomas Werner'>
	 <organization>Siemens AG</organization>
      </author>
      <author fullname='Eliot Lear'>
	 <organization>Cisco Systems</organization>
      </author>
      <author fullname='Michael C. Richardson'>
	 <organization>Sandelman Software Works</organization>
      </author>
      <date day='8' month='July' year='2022'/>
      <abstract>
	 <t>   This document defines enhancements to bootstrapping a remote secure
   key infrastructure (BRSKI, [RFC8995]) to facilitate bootstrapping in
   domains featuring no or only timely limited connectivity between a
   pledge and the domain registrar.  It specifically targets situations,
   in which the interaction model changes from a pledge-initiator-mode,
   as used in BRSKI, to a pledge-responder-mode as described in this
   document.  To support both, BRSKI-PRM introduces a new registrar-
   agent component, which facilitates the communication between pledge
   and registrar during the bootstrapping phase.  For the establishment
   of a trust relation between pledge and domain registrar, BRSKI-PRM
   relies on the exchange of authenticated self-contained objects
   (signature-wrapped objects).  The defined approach is agnostic
   regarding the utilized enrollment protocol, deployed by the domain
   registrar to communicate with the Domain CA.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-anima-brski-prm-04'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-anima-brski-prm-04.txt' type='TXT'/>
</reference>


<reference anchor='I-D.kuehlewind-update-tag'>
   <front>
      <title>Definition of new tags for relations between RFCs</title>
      <author fullname='Mirja Kuehlewind'>
	 <organization>Ericsson</organization>
      </author>
      <author fullname='Suresh Krishnan'>
	 <organization>Kaloom</organization>
      </author>
      <date day='12' month='July' year='2021'/>
      <abstract>
	 <t>   An RFC can include a tag called &quot;Updates&quot; which can be used to link a
   new RFC to an existing RFC.  On publication of such an RFC, the
   existing RFC will include an additional metadata tag called &quot;Updated
   by&quot; which provides a link to the new RFC.  However, this tag pair is
   not well-defined and therefore it is currently used for multiple
   different purposes, which leads to confusion about the actual meaning
   of this tag and inconsistency in its use.

   This document recommends the discontinuation of the use of the
   updates/updated by tag pair, and instead proposes three new tag pairs
   that have well-defined meanings and use cases.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-kuehlewind-update-tag-04'/>
   <format target='https://www.ietf.org/archive/id/draft-kuehlewind-update-tag-04.txt' type='TXT'/>
</reference>




    </references>


<section anchor="examples" title="Examples">

<t>These examples are folded according to <xref target="RFC8792"/> Single Backslash rule.</t>

<section anchor="example-pledge-voucher-request-pvr-from-pledge-to-registrar" title="Example Pledge Voucher Request - PVR (from Pledge to Registrar)">
<t>The following is an example request sent from a Pledge to the Registrar, in “General JWS JSON Serialization”.</t>

<figure title="Example Pledge Voucher Request - PVR" anchor="ExamplePledgeVoucherRequestfigure"><artwork align="left"><![CDATA[
{
   "payload":
     "eyJpZXRmLXZvdWNoZXItcmVxdWVzdDp2b3VjaGVyIjp7InNlcmlhbC1
     udW1iZXIiOiIwMTIzNDU2Nzg5Iiwibm9uY2UiOiI2R3RuK1pRS04ySHF
     ERlZrQkV4WkxRPT0iLCJjcmVhdGVkLW9uIjoiMjAyMi0wNy0wOFQwODo
     0MDo0Mi44MjBaIiwicHJveGltaXR5LXJlZ2lzdHJhci1jZXJ0IjoiTUl
     JQjRqQ0NBWWlnQXdJQkFnSUdBWFk3MmJiWk1Bb0dDQ3FHU000OUJBTUN
     NRFV4RXpBUkJnTlZCQW9NQ2sxNVFuVnphVzVsYzNNeERUQUxCZ05WQkF
     jTUJGTnBkR1V4RHpBTkJnTlZCQU1NQmxSbGMzUkRRVEFlRncweU1ERXl
     NRGN3TmpFNE1USmFGdzB6TURFeU1EY3dOakU0TVRKYU1ENHhFekFSQmd
     OVkJBb01DazE1UW5WemFXNWxjM014RFRBTEJnTlZCQWNNQkZOcGRHVXh
     HREFXQmdOVkJBTU1EMFJ2YldGcGJsSmxaMmx6ZEhKaGNqQlpNQk1HQnl
     xR1NNNDlBZ0VHQ0NxR1NNNDlBd0VIQTBJQUJCazE2Sy9pNzlvUmtLNVl
     iZVBnOFVTUjgvdXMxZFBVaVpITXRva1NkcUtXNWZuV3NCZCtxUkw3V1J
     mZmVXa3lnZWJvSmZJbGx1cmNpMjV3bmhpT1ZDR2plekI1TUIwR0ExVWR
     KUVFXTUJRR0NDc0dBUVVGQndNQkJnZ3JCZ0VGQlFjREhEQU9CZ05WSFE
     4QkFmOEVCQU1DQjRBd1NBWURWUjBSQkVFd1A0SWRjbVZuYVhOMGNtRnl
     MWFJsYzNRdWMybGxiV1Z1Y3kxaWRDNXVaWFNDSG5KbFoybHpkSEpoY2k
     xMFpYTjBOaTV6YVdWdFpXNXpMV0owTG01bGREQUtCZ2dxaGtqT1BRUUR
     BZ05JQURCRkFpQnhsZEJoWnEwRXY1SkwyUHJXQ3R5UzZoRFlXMXlDTy9
     SYXVicEM3TWFJRGdJaEFMU0piZ0xuZ2hiYkFnMGRjV0ZVVm8vZ0dOMC9
     qd3pKWjBTbDJoNHhJWGsxIn19",
   "signatures": [
      {
         "protected":
           "eyJ4NWMiOlsiTUlJQitUQ0NBYUNnQXdJQkFnSUdBWG5WanNVNU1Bb0d
           DQ3FHU000OUJBTUNNRDB4Q3pBSkJnTlZCQVlUQWtGUk1SVXdFd1lEVlF
           RS0RBeEthVzVuU21sdVowTnZjbkF4RnpBVkJnTlZCQU1NRGtwcGJtZEt
           hVzVuVkdWemRFTkJNQ0FYRFRJeE1EWXdOREExTkRZeE5Gb1lEems1T1R
           reE1qTXhNak0xT1RVNVdqQlNNUXN3Q1FZRFZRUUdFd0pCVVRFVk1CTUd
           BMVVFQ2d3TVNtbHVaMHBwYm1kRGIzSndNUk13RVFZRFZRUUZFd293TVR
           Jek5EVTJOemc1TVJjd0ZRWURWUVFEREE1S2FXNW5TbWx1WjBSbGRtbGp
           aVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUFCQzc5bGl
           hUmNCalpjRUVYdzdyVWVhdnRHSkF1SDRwazRJNDJ2YUJNc1UxMWlMREN
           DTGtWaHRVVjIxbXZhS0N2TXgyWStTTWdROGZmd0wyM3ozVElWQldqZFR
           Cek1Dc0dDQ3NHQVFVRkJ3RWdCQjhXSFcxaGMyRXRkR1Z6ZEM1emFXVnR
           aVzV6TFdKMExtNWxkRG81TkRRek1COEdBMVVkSXdRWU1CYUFGRlFMak5
           6UFwvU1wva291alF3amc1RTVmdndjWWJNQk1HQTFVZEpRUU1NQW9HQ0N
           zR0FRVUZCd01DTUE0R0ExVWREd0VCXC93UUVBd0lIZ0RBS0JnZ3Foa2p
           PUFFRREFnTkhBREJFQWlCdTN3UkJMc0pNUDVzTTA3MEgrVUZyeU5VNmd
           LekxPUmNGeVJST2xxcUhpZ0lnWENtSkxUekVsdkQycG9LNmR4NmwxXC9
           1eW1UbmJRRERmSmxhdHVYMlJvT0U9Il0sInR5cCI6InZvdWNoZXItand
           zK2pzb24iLCJhbGciOiJFUzI1NiJ9",
         "signature":
           "abVg4TDGzSTjVHkQlNeIW3ABu5ZXdMl1cEqwcIAlHFW4BrlGbO-DRTK
           fyCOGxSW49-ktJcrVlYgKqC4xmZoy0Q"
      }
   ]
}
]]></artwork></figure>

</section>
<section anchor="example-parboiled-registrar-voucher-request-rvr-from-registrar-to-masa" title="Example Parboiled Registrar Voucher Request - RVR (from Registrar to MASA)">
<t>The term parboiled refers to food which is partially cooked.
In <xref target="BRSKI"/>, the term refers to a Pledge voucher-request (PVR) which has been received by the Registrar, and then has been processed by the Registrar (“cooked”), and is now being forwarded to the MASA.</t>

<t>The following is an example Registrar voucher-request (RVR) sent from the Registrar to the MASA, in “General JWS JSON Serialization”.
Note that the previous PVR can be seen in the payload as “prior-signed-voucher-request”.</t>

<figure title="Example Parboiled Registrar Voucher Request - RVR" anchor="ExampleParboiledRegistrarVoucherRequestfigure"><artwork align="left"><![CDATA[
{
   "payload":
     "eyJpZXRmLXZvdWNoZXItcmVxdWVzdDp2b3VjaGVyIjp7InNlcmlhbC1
     udW1iZXIiOiIwMTIzNDU2Nzg5IiwiaWRldmlkLWlzc3VlciI6IkJCZ3d
     Gb0FVVkF1TTNNLzlMK1NpNk5EQ09Ea1RsKy9CeGhzPSIsIm5vbmNlIjo
     iNkd0bitaUUtOMkhxREZWa0JFeFpMUT09IiwicHJpb3Itc2lnbmVkLXZ
     vdWNoZXItcmVxdWVzdCI6ImV5SndZWGxzYjJGa0lqb2laWGxLY0ZwWVV
     tMU1XRnAyWkZkT2IxcFlTWFJqYlZaNFpGZFdlbVJFY0RKaU0xWnFZVWR
     XZVVscWNEZEpiazVzWTIxc2FHSkRNWFZrVnpGcFdsaEphVTlwU1hkTlZ
     FbDZUa1JWTWs1Nlp6VkphWGRwWW0wNWRWa3lWV2xQYVVreVVqTlNkVXN
     4Y0ZKVE1EUjVVMGhHUlZKc1duSlJhMVkwVjJ0NFVsQlVNR2xNUTBwcVk
     yMVdhR1JIVm10TVZ6bDFTV3B2YVUxcVFYbE5hVEIzVG5rd2QwOUdVWGR
     QUkc4d1RVUnZNRTFwTkRSTmFrSmhTV2wzYVdOSVNuWmxSMngwWVZoU05
     VeFlTbXhhTW14NlpFaEthR05wTVdwYVdFb3dTV3B2YVZSVmJFcFJhbEp
     4VVRCT1FsZFhiRzVSV0dSS1VXdEdibE5WWkVKWFJtc3pUVzFLYVZkck1
     VSmlNR1JFVVROR1NGVXdNREJQVlVwQ1ZGVk9UbEpHVmpSU1dIQkNWV3R
     LYmxSc1drTlJWemxPVVRKemVFNVdSblZXYm5Cb1ZucFdjMWw2VGs1bFJ
     WSlZVVlY0UTFvd05WZFJhMFpxVkZWS1IxUnVRbXRTTVZZMFVraHdRbFJ
     yU201VWJGcERVVlV4VGxGdGVGTmlSMDE2Vld0U1VsWkZSbXhTYm1OM1p
     WVXhSVkpZYkU1U1IwNHpWRzF3Ums1Rk1WVlRiVVpIWkhwQ05sUlZVa1p
     sVlRGRldUTmtUMkZyVlRCVVZsSkxXVlV4UlU1SWFFWmxhMFpUVVcxa1Q
     xWnJTa0ppTURGRVlYcEZNVlZYTlZkbGJVWllUbGQ0YWswd01UUlNSbEp
     DVkVWS2JsUnNXa05SVjA1T1VXdGFUMk5IVWtoV1dHaElVa1ZHV0ZGdFp
     FOVdhMHBDVkZVeFJVMUdTakpaYkdSSFkwZEtjMU50ZUdGTmJYZzJXa1Z
     vUzJGSFRuRlJiSEJPVVdzeFNGRnViSGhTTVU1T1RrUnNRbG93VmtoUk1
     FNTRVakZPVGs1RWJFSmtNRlpKVVZSQ1NsRlZTa05oZWtVeVUzazVjRTU
     2YkhaVmJYUk1UbFpzYVZwV1FtNVBSbFpVVldwbmRtUllUWGhhUmtKV1l
     WWndTVlJZVW5aaE1VNXJZMVYwV0U1WFduVldNMDVEV2tOMGVGVnJkek5
     XTVVwdFdtMVdXR0V6Ykc1YVYwcDJVMjFhU21KSGVERmpiVTV3VFdwV00
     ySnRhSEJVTVZwRVVqSndiR1ZyU1RGVVZVbDNVakJGZUZaWFVrdFZWa1p
     ZVkZWS1VsSXdUa1JqTUdSQ1ZWWldSMUZ1WkU1UmEwcHVXak5LUTFvd1Z
     rZFJiRVpxVWtWb1JWRlZPVU5hTURWWFUwWkZORkZyUm0xUFJWWkRVVlV
     4UkZGcVVrSmtNVTVDVjFWU1YxVnFRbE5SYTFaR1pERkJNRk5YVW1waVZ
     scDFXVlpvVDAxSFRuUlNibXhOVjBaS2MxbDZUbEprVjAxNVlrZDRhVll
     4V2pGWk0ydDRZVmRTUkU1WVZtRlhSazVFVTBjMVMySkdiM2xpU0hCclU
     wVndiMWt5YTNoTlJuQlpWR3BDVDJGVVZqWlpWbVJYWkVad1dFNVljRTF
     XTUc5M1ZFY3dNV0pIVWtWUlZYUkRXakprZUdGSGRIRlVNVUpTVlZWU1F
     sb3dOVXBSVlZKRFVtdEdjRkZ1YUhOYVJVcHZWMjVGZDFKWVdURlRhM2Q
     1VlVoS1dGRXpValZWZWxwdlVrWnNXRTFZYkVSVWVUbFRXVmhXYVdORlR
     UTlVWMFpLVWtka1NtRkZSazFWTUhCcFdqQjRkVm95YUdsWmEwWnVUVWR
     TYWxZd1dsWldiVGgyV2pCa1QwMURPWEZrTTNCTFYycENWR0pFU205T1N
     HaEtWMGR6ZUVsdU1Ua2lMQ0p6YVdkdVlYUjFjbVZ6SWpwYmV5SndjbTk
     wWldOMFpXUWlPaUpsZVVvMFRsZE5hVTlzYzJsVVZXeEtVV2wwVlZFd1R
     rSlpWVTV1VVZoa1NsRnJSbTVUVldSQ1YwYzFWMkZ1VGxaT1ZURkNZakJ
     rUkZFelJraFZNREF3VDFWS1FsUlZUazVTUkVJMFVUTndRbE5yU201VWJ
     GcERVVlpzVlZGWGRFZFZhekZUVmxoa1JtUXhiRVZXYkVaU1V6QlNRbVZ
     GZEdoV2VsWjFWVEl4YzJSV2IzZFVibHBxWW10R05GSnVjRUpXYTBwdVZ
     HeGFRMUZWTVU1U1IzUjNZMGRLZEZwRmRHaFdlbFoxVm10a1YyVnRVa1p
     VYTBwT1VUQkdXVkpHVWtwbFJURkZWMWhrVDFKRlJYaFVhMUphWlVVMVI
     ySXhiRVZsYlhNeFZERlNjbVZGTVhGVVdHaE9ZV3N3ZUZReFVsWk9WbVJ
     4VVd4T1RsVllUak5STVVaYVVrWmFVbFZWWkVaa01IQkRWbFpTUmxack1
     VTlVWV1JDVFZaV1JsRXlaRE5VVms1MFlraFdZVTFJUW5kWmJURnJVa2R
     KZWxOdVpFNVZhekV6VWxaR1dsSkdXbEpWVlZwR1pESTVNMVJXVWtwbGF
     6VkZWbFJLVDJWdFl6RlVWa3BxWkRCYVVsZFZVbGRWVmtaRlVrVkZNVk1
     5UmxoT1Z6VlVZbGQ0TVZkcVFsTmlSMUowWWtkd1lWWkZTbUZVVlVwT1V
     qQktOV05WWkZSVVZGRTFVVmRrUmxJd1RrUmpWV1JVVkZSUk5WRllaRVp
     UUlVWM1UxVkdRMUY2WXpWaVIyeG9WVzFPUTJGc2NHcFNWVlpaWkhwa2V
     WWlhWbWhrYmxKSVUydEdNVk5FVW5kaGVsSktUa1JLTWxsVlNrNWpNVlY
     0VFZkc1RWSkZUa1JVUjNSWFlVaFNWbFpxU1hoaVdGcG9VekJPTWxSWVo
     zbFhVM1JVVkZka1VrOUhXbTFrTUhkNVRUTnZlbFpGYkZkUmJHUnhXa1p
     TUTJWck1VUmpNR1JFVVROT1NGRldSbFpTYTBvelVsZGtRMUZxYUZoVFJ
     tTjRZVWROZVZKWVVtdFNNVm8yV2tWTk1XVnRSbGhXYmxKaFZucFdObFJ
     HWkV0TlJYaDBUbGQ0YTFKSE9ERlVhMUpTWldzeFEwOUZaRUpOVmxaclU
     xaGtVbGRWTVVOWlZVWkhVbXhHVFdGck5UWlZSbmQyVlRGM2RtRXlPVEZ
     oYkVZellXMWpNVkpVVm0xa2JtUnFWMWRLVGxGck1VaFJWRVpXV2tWd1V
     sVlZNVTVSVnpsSVVUQk9lbEl3UmxKV1ZWcERaREF4UkZSVlJUQlNNRVY
     0VmxkU1JXUXdWa05ZUXprelZWVldRbVF3YkVsYU1GSkNVekJLYmxvelJ
     tOWhNbkJRVlVaR1VsSkZSbTVVYTJoQ1VrVktSbEZYYkVOa1ZFNHpWV3R
     LVFdNd2NFNVZSRlo2VkZSQk0wMUZaM0pXVlZwNVpWVTFWazV0WkV4bGE
     zaFFWVzFPUjJWV1NsTlVNbmg0WTFWb2NGb3diRzVYUlU1MFUydDRWV1Z
     yVm5Oa2ExRjVZMGM1VEU1dFVqUk9iWGQ0V0VNNU1XVlhNVlZpYlVwU1V
     rVlNiVk50ZUdoa1NGWlpUV3hLZGxRd1ZUbEpiREJ6U1c1U05XTkRTVFp
     KYmxwMlpGZE9iMXBZU1hSaGJtUjZTekp3ZW1JeU5HbE1RMHBvWWtkamF
     VOXBTa1pWZWtreFRtbEtPU0lzSW5OcFoyNWhkSFZ5WlNJNkltRmlWbWM
     wVkVSSGVsTlVhbFpJYTFGc1RtVkpWek5CUW5VMVdsaGtUV3d4WTBWeGQ
     yTkpRV3hJUmxjMFFuSnNSMkpQTFVSU1ZFdG1lVU5QUjNoVFZ6UTVMV3Q
     wU21OeVZteFpaMHR4UXpSNGJWcHZlVEJSSW4xZGZRPT0iLCJjcmVhdGV
     kLW9uIjoiMjAyMi0wNy0wOFQwODo0MDo0Mi44NDhaIn19",
   "signatures": [
      {
         "protected":
           "eyJ4NWMiOlsiTUlJQm96Q0NBVXFnQXdJQkFnSUdBVzBlTHVJRk1Bb0d
           DQ3FHU000OUJBTUNNRFV4RXpBUkJnTlZCQW9NQ2sxNVFuVnphVzVsYzN
           NeERUQUxCZ05WQkFjTUJGTnBkR1V4RHpBTkJnTlZCQU1NQmxSbGMzUkR
           RVEFlRncweE9UQTVNVEV3TWpNM016SmFGdzB5T1RBNU1URXdNak0zTXp
           KYU1GUXhFekFSQmdOVkJBb01DazE1UW5WemFXNWxjM014RFRBTEJnTlZ
           CQWNNQkZOcGRHVXhMakFzQmdOVkJBTU1KVkpsWjJsemRISmhjaUJXYjN
           WamFHVnlJRkpsY1hWbGMzUWdVMmxuYm1sdVp5QkxaWGt3V1RBVEJnY3F
           oa2pPUFFJQkJnZ3Foa2pPUFFNQkJ3TkNBQVQ2eFZ2QXZxVHoxWlVpdU5
           XaFhwUXNrYVB5N0FISFFMd1hpSjBpRUx0NnVOUGFuQU4wUW5XTVlPXC8
           wQ0RFaklrQlFvYnc4WUtxanR4SkhWU0dUajlLT295Y3dKVEFUQmdOVkh
           TVUVEREFLQmdnckJnRUZCUWNESERBT0JnTlZIUThCQWY4RUJBTUNCNEF
           3Q2dZSUtvWkl6ajBFQXdJRFJ3QXdSQUlnWXIyTGZxb2FDS0RGNFJBY01
           tSmkrTkNacWRTaXVWdWdJU0E3T2hLUnEzWUNJRHhuUE1NbnBYQU1UclB
           KdVBXeWNlRVIxMVB4SE9uKzBDcFNIaTJxZ3BXWCIsIk1JSUJwRENDQVV
           tZ0F3SUJBZ0lHQVcwZUx1SCtNQW9HQ0NxR1NNNDlCQU1DTURVeEV6QVJ
           CZ05WQkFvTUNrMTVRblZ6YVc1bGMzTXhEVEFMQmdOVkJBY01CRk5wZEd
           VeER6QU5CZ05WQkFNTUJsUmxjM1JEUVRBZUZ3MHhPVEE1TVRFd01qTTN
           NekphRncweU9UQTVNVEV3TWpNM016SmFNRFV4RXpBUkJnTlZCQW9NQ2s
           xNVFuVnphVzVsYzNNeERUQUxCZ05WQkFjTUJGTnBkR1V4RHpBTkJnTlZ
           CQU1NQmxSbGMzUkRRVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXd
           FSEEwSUFCT2t2a1RIdThRbFQzRkhKMVVhSTcrV3NIT2IwVVMzU0FMdEc
           1d3VLUURqaWV4MDZcL1NjWTVQSmlidmdIVEIrRlwvUVRqZ2VsSEd5MVl
           LcHdjTk1jc1N5YWpSVEJETUJJR0ExVWRFd0VCXC93UUlNQVlCQWY4Q0F
           RRXdEZ1lEVlIwUEFRSFwvQkFRREFnSUVNQjBHQTFVZERnUVdCQlRvWkl
           NelFkc0RcL2pcLytnWFwvN2NCSnVjSFwvWG1qQUtCZ2dxaGtqT1BRUUR
           BZ05KQURCR0FpRUF0eFEzK0lMR0JQSXRTaDRiOVdYaFhOdWhxU1A2SCt
           iXC9MQ1wvZlZZRGpRNm9DSVFERzJ1UkNIbFZxM3loQjU4VFhNVWJ6SDg
           rT2xoV1V2T2xSRDNWRXFEZGNRdz09Il0sInR5cCI6InZvdWNoZXItand
           zK2pzb24iLCJhbGciOiJFUzI1NiJ9",
         "signature":
           "0fzuqVdyhemWsu_HQeF-CmQwJeLp9IStNf-bWZwz6SojrEOR4aDq6VS
           tyG8eWXjGHNZiRyyLJo7RP1rKatuS2w"
      }
   ]
}
]]></artwork></figure>

</section>
<section anchor="example-voucher-response-from-masa-to-pledge-via-registrar" title="Example Voucher Response (from MASA to Pledge, via Registrar)">
<t>The following is an example voucher response from MASA to Pledge via Registrar, in “General JWS JSON Serialization”.</t>

<figure title="Example Voucher Response" anchor="ExampleVoucherResponsefigure"><artwork align="left"><![CDATA[
{
    "payload": 
      "eyJpZXRmLXZvdWNoZXI6dm91Y2hlciI6eyJhc3NlcnRpb24iOiJsb2
      dnZWQiLCJzZXJpYWwtbnVtYmVyIjoiMDEyMzQ1Njc4OSIsIm5vbmNlI
      joiZGRoSGQ4MlFpUGtzMDBTck1USTlEUT09IiwiY3JlYXRlZC1vbiI6
      IjIwMjItMDctMDdUMTc6NDc6MDEuODkwWiIsInBpbm5lZC1kb21haW4
      tY2VydCI6Ik1JSUJwRENDQVVtZ0F3SUJBZ0lHQVcwZUx1SCtNQW9HQ0
      NxR1NNNDlCQU1DTURVeEV6QVJCZ05WQkFvTUNrMTVRblZ6YVc1bGMzT
      XhEVEFMQmdOVkJBY01CRk5wZEdVeER6QU5CZ05WQkFNTUJsUmxjM1JE
      UVRBZUZ3MHhPVEE1TVRFd01qTTNNekphRncweU9UQTVNVEV3TWpNM01
      6SmFNRFV4RXpBUkJnTlZCQW9NQ2sxNVFuVnphVzVsYzNNeERUQUxCZ0
      5WQkFjTUJGTnBkR1V4RHpBTkJnTlZCQU1NQmxSbGMzUkRRVEJaTUJNR
      0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUFCT2t2a1RIdThRbFQz
      RkhKMVVhSTcrV3NIT2IwVVMzU0FMdEc1d3VLUURqaWV4MDYvU2NZNVB
      KaWJ2Z0hUQitGL1FUamdlbEhHeTFZS3B3Y05NY3NTeWFqUlRCRE1CSU
      dBMVVkRXdFQi93UUlNQVlCQWY4Q0FRRXdEZ1lEVlIwUEFRSC9CQVFEQ
      WdJRU1CMEdBMVVkRGdRV0JCVG9aSU16UWRzRC9qLytnWC83Y0JKdWNI
      L1htakFLQmdncWhrak9QUVFEQWdOSkFEQkdBaUVBdHhRMytJTEdCUEl
      0U2g0YjlXWGhYTnVocVNQNkgrYi9MQy9mVllEalE2b0NJUURHMnVSQ0
      hsVnEzeWhCNThUWE1VYnpIOCtPbGhXVXZPbFJEM1ZFcURkY1F3PT0if
      X0",
    "signatures": [
        {
            "protected": 
              "eyJ4NWMiOlsiTUlJQmt6Q0NBVGlnQXdJQkFnSUdBV0ZCakNrWU1B
              b0dDQ3FHU000OUJBTUNNRDB4Q3pBSkJnTlZCQVlUQWtGUk1SVXdFd
              1lEVlFRS0RBeEthVzVuU21sdVowTnZjbkF4RnpBVkJnTlZCQU1NRG
              twcGJtZEthVzVuVkdWemRFTkJNQjRYRFRFNE1ERXlPVEV3TlRJME1
              Gb1hEVEk0TURFeU9URXdOVEkwTUZvd1R6RUxNQWtHQTFVRUJoTUNR
              VkV4RlRBVEJnTlZCQW9NREVwcGJtZEthVzVuUTI5eWNERXBNQ2NHQ
              TFVRUF3d2dTbWx1WjBwcGJtZERiM0p3SUZadmRXTm9aWElnVTJsbm
              JtbHVaeUJMWlhrd1dUQVRCZ2NxaGtqT1BRSUJCZ2dxaGtqT1BRTUJ
              Cd05DQUFTQzZiZUxBbWVxMVZ3NmlRclJzOFIwWlcrNGIxR1d5ZG1X
              czJHQU1GV3diaXRmMm5JWEgzT3FIS1Z1OHMyUnZpQkdOaXZPS0dCS
              Eh0QmRpRkVaWnZiN294SXdFREFPQmdOVkhROEJBZjhFQkFNQ0I0QX
              dDZ1lJS29aSXpqMEVBd0lEU1FBd1JnSWhBSTRQWWJ4dHNzSFAyVkh
              4XC90elVvUVwvU3N5ZEwzMERRSU5FdGNOOW1DVFhQQWlFQXZJYjNv
              K0ZPM0JUbmNMRnNhSlpSQWtkN3pPdXNuXC9cL1pLT2FFS2JzVkRpV
              T0iXSwidHlwIjoidm91Y2hlci1qd3MranNvbiIsImFsZyI6IkVTMj
              U2In0",
            "signature": 
              "y1HLYBFlwouf42XWSKUWjeYQHnG2Q6A4bjA7hvTkB3z1dPwTUljP
              HtuN2Qex6gDxTfaSiKeoXGsOD4JWOgQJPg"
      }
   ]
}
]]></artwork></figure>

</section>
</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

