<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.0.1) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-anima-jws-voucher-05" category="std" consensus="true" updates="RFC8366" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.14.2 -->
  <front>
    <title abbrev="JWS-voucher">JWS signed Voucher Artifacts for Bootstrapping Protocols</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-anima-jws-voucher-05"/>
    <author initials="T." surname="Werner" fullname="Thomas Werner">
      <organization>Siemens AG</organization>
      <address>
        <email>thomas-werner@siemens.com</email>
      </address>
    </author>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <date year="2022" month="October" day="24"/>
    <area>Internet</area>
    <workgroup>anima Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t><xref target="RFC8366"/> defines a digital artifact called voucher as a YANG-defined JSON
document that has been signed using a Cryptographic Message Syntax (CMS) structure.
This memo introduces a variant of the voucher structure in which CMS is
replaced by the JSON Object Signing and Encryption (JOSE) mechanism described in <xref target="RFC7515"/> to support deployments in which JOSE is preferred over CMS.</t>
      <t>In addition to explaining how the format is created, MIME types are registered and examples are provided.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>"A Voucher Artifact for Bootstrapping Protocols" <xref target="RFC8366"/> describes a voucher artifact used in "Bootstrapping Remote Secure Key Infrastructure" <xref target="BRSKI"/> and
"Secure Zero Touch Provisioning" <xref target="SZTP"/> to transfer ownership of a device from a manufacturer to a new owner (site domain).
That document defines the base YANG module and the serialization to JSON <xref target="RFC8259"/> with a CMS signature according to <xref target="RFC5652"/>.
The resulting Voucher artifact has the media type "application/voucher-cms+json".</t>
      <t><xref target="I-D.ietf-anima-constrained-voucher"/> provides a mapping of the YANG module to CBOR <xref target="RFC8949"/> with a signature format of COSE <xref target="RFC8812"/>.</t>
      <t>This document provides a mapping of the Voucher YANG module to JSON format with the signature in form of JSON Web Signature (JWS) <xref target="RFC7515"/>.
The encoding specified in this document is used by <xref target="I-D.ietf-anima-brski-prm"/>
and may be more handy for use cases requiring signed JSON objects.</t>
      <t>This document does not extend the YANG definition of <xref target="RFC8366"/>.</t>
      <t>With the availability of different encoded vouchers, it is up to an industry specific application statement to indicate/decide which voucher signature format is to be used.
There is no provision across the different voucher signature formats that a receiver could safely recognize which format it uses unless additional context is provided.
For example, <xref target="BRSKI"/> provides this context via the MIME-Type for the voucher artifact.
+++ stf: Is this a reference to the optional usage of "typ" in the voucher? Proposal to include: 
This document utilizes the optional "type" in the signature to provide information about the signed object.</t>
      <t>This document should be considered an update to <xref target="RFC8366"/> in the category of "See Also"
as per <xref target="I-D.kuehlewind-update-tag"/>.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="voucher-artifact-with-json-web-signature">
      <name>Voucher Artifact with JSON Web Signature</name>
      <t>The voucher <xref target="RFC8366"/> JSON structure consists of a nested map, the outer part of which is:</t>
      <artwork><![CDATA[
{ "ietf-voucher:voucher" : { some inner items }}
]]></artwork>
      <t>this is considered the JSON payload as described in <xref target="RFC7515"/> section 3.</t>
      <t><xref target="RFC7515"/> section 3.2 provides "JWS JSON Serialization Overview", find more details in <xref target="RFC7515"/> section 7 "Serializations".<br/>
The following serializations are defined:</t>
      <ol spacing="normal" type="1"><li>"JWS Compact Serialization", <xref target="RFC7515"/> section 7.1</li>
        <li>"JWS JSON Serialization" in, <xref target="RFC7515"/> section 7.2<br/>
- "General JWS JSON Serialization Syntax", <xref target="RFC7515"/> section 7.2.1<br/>
- "Flattened JWS JSON Serialization Syntax", <xref target="RFC7515"/> section 7.2.2</li>
      </ol>
      <t>This document makes use of the "General JWS JSON Serialization Syntax" to support multiple signatures, as already supported by <xref target="RFC8366"/> for vouchers in form of "voucher-cms+json".</t>
      <section anchor="voucher-representation-in-general-jws-json-serialization-syntax">
        <name>Voucher Representation in General JWS JSON Serialization Syntax</name>
        <t>The following figures gives an overview of the Voucher representation in "General JWS JSON Serialization Syntax".</t>
        <figure anchor="VoucherGeneralJWSFigure">
          <name>Voucher Representation in General JWS JSON Serialization Syntax</name>
          <artwork align="left"><![CDATA[
{
  "payload": "BASE64URL(ietf-voucher:voucher)",
  "signatures": [
    {
      "protected": "BASE64URL(UTF8(JWS Protected Header))",
      "signature": "base64encodedvalue=="
    }
  ]
}
]]></artwork>
        </figure>
      </section>
      <section anchor="jws-payload-of-voucher-in-general-jws-json-serialization">
        <name>JWS Payload of Voucher in General JWS JSON Serialization</name>
        <t>The following figures gives the decoded voucher payload representation JSON syntax.</t>
        <figure anchor="VoucherGeneralJWSVoucherPayloadFigure">
          <name>Voucher payload representation JSON Syntax</name>
          <artwork align="left"><![CDATA[
    "ietf-voucher:voucher": {
      "assertion": "logged",
      "serial-number": "0123456789",
      "nonce": "5742698422680472",
      "created-on": "2022-07-08T03:01:24.618Z",
      "pinned-domain-cert": "base64encodedvalue=="
    }
]]></artwork>
        </figure>
      </section>
      <section anchor="jws-protected-header-of-voucher-in-general-jws-json-serialization">
        <name>JWS Protected Header of Voucher in General JWS JSON Serialization</name>
        <t>The standard header parameters "typ" and "alg" as described in <xref target="RFC7515"/> are utilized in the protected header.
The "alg" header MUST contain the algorithm type used to create the signature, such as "ES256".
The "typ" header SHOULD contain the value "TODO: voucher-jws+json", if present.</t>
        <t>If PKIX <xref target="RFC5280"/> format certificates are used then the <xref target="RFC7515"/> section 4.1.6 "x5c"
certificate chain SHOULD be used to contain the certificate and chain.
Vouchers will often need all certificates in the chain,
including what would be considered the trust anchor certificate 
because intermediate devices (such as the Registrar) may need to audit the artifact,
or end systems may need to pin a trust anchor for future operations.<br/>
Note, a trust anchor SHOULD be provided differntly to be trusted.
This is consistent with <xref target="BRSKI"/> section 5.5.2.</t>
        <t>The following figure gives the decoded protected header representation in JSON syntax.</t>
        <figure anchor="VoucherGeneralJWSProtectedHeaderFigure">
          <name>Protected Header Representation in JSON Syntax</name>
          <artwork align="left"><![CDATA[
    { 
      "alg": "ES256",
      "typ": "voucher-jws+json",
      "x5c": [
        "base64encodedvalue=="
      ]
    }  
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>The Voucher Request reveals the IDevID of the component (Pledge) that is in the process of bootstrapping.</t>
      <t>This request occurs via HTTP-over-TLS, however the Pledge to Registrar TLS connection the Pledge is provisinally accepting the Registrar server certificate, and it is subject to disclosure by a Dolev-Yao attacker (a "malicious messenger")<xref target="onpath"/>.
This is explained in <xref target="BRSKI"/> section 10.2.</t>
      <t>The use of a JWS header brings no new privacy considerations.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The issues of how <xref target="RFC8366"/> vouchers are used in a <xref target="BRSKI"/> system is addressed in section 11 of the <xref target="BRSKI"/> specification.
This document does not change any of those issues, it just changes the signature technology used for voucher request and response objects.</t>
      <t><xref target="SZTP"/> section 9 deals with voucher use in Secure Zero Touch Provisioning, and this document also makes no changes to security.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="media-type-registry">
        <name>Media-Type Registry</name>
        <t>This section registers the 'application/voucher-jws+json' in the "Media Types" registry.</t>
        <section anchor="applicationvoucher-jwsjson">
          <name>application/voucher-jws+json</name>
          <artwork><![CDATA[
Type name:  application
Subtype name:  voucher-jws+json
Required parameters:  none
Optional parameters:  none
Encoding considerations:  JWS+JSON vouchers are JOSE objects
                          signed with one or multiple signers.
Security considerations:  See section [Security Considerations]
Interoperability considerations:  The format is designed to be
  broadly interoperable.
Published specification:  [THIS RFC].
Applications that use this media type:  ANIMA, 6tisch, and other
  zero-touch bootstrapping/provisioning solutions
Additional information:
  Magic number(s):  None
  File extension(s):  .vjj
  Macintosh file type code(s):  none
Person & email address to contact for further information:  IETF
  ANIMA WG
Intended usage:  LIMITED
Restrictions on usage:  NONE
Author:  ANIMA WG
Change controller:  IETF
Provisional registration? (standards tree only):  NO
]]></artwork>
        </section>
      </section>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank the various reviewers for their input, in particular Steffen Fries, Ingo Wenda, ...TODO
Support in PoC implementations Hong Rui Li and He Peng Jia, ...TODO</t>
      <t>[RFC Editor: please delete]
TODO: ...</t>
    </section>
    <section anchor="changelog-rfc-editor-please-delete">
      <name>Changelog [RFC Editor: please delete]</name>
      <ul spacing="normal">
        <li>Added adoption call comments from Toerless.  Changed from [RFCxxxx] to [THING] style for some key references.</li>
        <li>Updated references "I-D.ietf-anima-brski-async-enroll" switched to "I-D.ietf-anima-brski-prm"</li>
        <li>Switch from "JWS Compact Serialization" to "General JWS JSON Serialization", as focus is now on "General JWS JSON Serialization"</li>
        <li>Include Voucher representation in "General JWS JSON Serialization" syntax</li>
        <li>Include examples A1, A2, A3 using "General JWS JSON Serialization"</li>
        <li>Added optional "typ": "voucher-jws+json" header parameter to JWS objects</li>
        <li>Examples folded according to RFC8792, Single Backslash rule</li>
        <li>Restructuring and clean-up, preparation for WGLC</li>
      </ul>
      <t>-- back</t>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <t>These examples are folded according to <xref target="RFC8792"/> Single Backslash rule.</t>
      <section anchor="example-pledge-voucher-request-pvr-from-pledge-to-registrar">
        <name>Example Pledge Voucher Request - PVR (from Pledge to Registrar)</name>
        <t>The following is an example request sent from a Pledge to the Registrar, in "General JWS JSON Serialization".</t>
        <figure anchor="ExamplePledgeVoucherRequestfigure">
          <name>Example Pledge Voucher Request - PVR</name>
          <artwork align="left"><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

{
  "payload": "eyJpZXRmLXZvdWNoZXItcmVxdWVzdDp2b3VjaGVyIjp7InNlcmlhbC\
1udW1iZXIiOiIwMTIzNDU2Nzg5Iiwibm9uY2UiOiI2R3RuK1pRS04ySHFERlZrQkV4Wk\
xRPT0iLCJjcmVhdGVkLW9uIjoiMjAyMi0wNy0wOFQwODo0MDo0Mi44MjBaIiwicHJveG\
ltaXR5LXJlZ2lzdHJhci1jZXJ0IjoiTUlJQjRqQ0NBWWlnQXdJQkFnSUdBWFk3MmJiWk\
1Bb0dDQ3FHU000OUJBTUNNRFV4RXpBUkJnTlZCQW9NQ2sxNVFuVnphVzVsYzNNeERUQU\
xCZ05WQkFjTUJGTnBkR1V4RHpBTkJnTlZCQU1NQmxSbGMzUkRRVEFlRncweU1ERXlNRG\
N3TmpFNE1USmFGdzB6TURFeU1EY3dOakU0TVRKYU1ENHhFekFSQmdOVkJBb01DazE1UW\
5WemFXNWxjM014RFRBTEJnTlZCQWNNQkZOcGRHVXhHREFXQmdOVkJBTU1EMFJ2YldGcG\
JsSmxaMmx6ZEhKaGNqQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDlBd0VIQTBJQUJCaz\
E2Sy9pNzlvUmtLNVliZVBnOFVTUjgvdXMxZFBVaVpITXRva1NkcUtXNWZuV3NCZCtxUk\
w3V1JmZmVXa3lnZWJvSmZJbGx1cmNpMjV3bmhpT1ZDR2plekI1TUIwR0ExVWRKUVFXTU\
JRR0NDc0dBUVVGQndNQkJnZ3JCZ0VGQlFjREhEQU9CZ05WSFE4QkFmOEVCQU1DQjRBd1\
NBWURWUjBSQkVFd1A0SWRjbVZuYVhOMGNtRnlMWFJsYzNRdWMybGxiV1Z1Y3kxaWRDNX\
VaWFNDSG5KbFoybHpkSEpoY2kxMFpYTjBOaTV6YVdWdFpXNXpMV0owTG01bGREQUtCZ2\
dxaGtqT1BRUURBZ05JQURCRkFpQnhsZEJoWnEwRXY1SkwyUHJXQ3R5UzZoRFlXMXlDTy\
9SYXVicEM3TWFJRGdJaEFMU0piZ0xuZ2hiYkFnMGRjV0ZVVm8vZ0dOMC9qd3pKWjBTbD\
JoNHhJWGsxIn19",
  "signatures": [{
    "protected": "eyJ4NWMiOlsiTUlJQitUQ0NBYUNnQXdJQkFnSUdBWG5WanNVNU\
1Bb0dDQ3FHU000OUJBTUNNRDB4Q3pBSkJnTlZCQVlUQWtGUk1SVXdFd1lEVlFRS0RBeE\
thVzVuU21sdVowTnZjbkF4RnpBVkJnTlZCQU1NRGtwcGJtZEthVzVuVkdWemRFTkJNQ0\
FYRFRJeE1EWXdOREExTkRZeE5Gb1lEems1T1RreE1qTXhNak0xT1RVNVdqQlNNUXN3Q1\
FZRFZRUUdFd0pCVVRFVk1CTUdBMVVFQ2d3TVNtbHVaMHBwYm1kRGIzSndNUk13RVFZRF\
ZRUUZFd293TVRJek5EVTJOemc1TVJjd0ZRWURWUVFEREE1S2FXNW5TbWx1WjBSbGRtbG\
paVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUFCQzc5bGlhUmNCalpjRU\
VYdzdyVWVhdnRHSkF1SDRwazRJNDJ2YUJNc1UxMWlMRENDTGtWaHRVVjIxbXZhS0N2TX\
gyWStTTWdROGZmd0wyM3ozVElWQldqZFRCek1Dc0dDQ3NHQVFVRkJ3RWdCQjhXSFcxaG\
MyRXRkR1Z6ZEM1emFXVnRaVzV6TFdKMExtNWxkRG81TkRRek1COEdBMVVkSXdRWU1CYU\
FGRlFMak56UFwvU1wva291alF3amc1RTVmdndjWWJNQk1HQTFVZEpRUU1NQW9HQ0NzR0\
FRVUZCd01DTUE0R0ExVWREd0VCXC93UUVBd0lIZ0RBS0JnZ3Foa2pPUFFRREFnTkhBRE\
JFQWlCdTN3UkJMc0pNUDVzTTA3MEgrVUZyeU5VNmdLekxPUmNGeVJST2xxcUhpZ0lnWE\
NtSkxUekVsdkQycG9LNmR4NmwxXC91eW1UbmJRRERmSmxhdHVYMlJvT0U9Il0sInR5cC\
I6InZvdWNoZXItandzK2pzb24iLCJhbGciOiJFUzI1NiJ9",
    "signature": "abVg4TDGzSTjVHkQlNeIW3ABu5ZXdMl1cEqwcIAlHFW4BrlGbO\
-DRTKfyCOGxSW49-ktJcrVlYgKqC4xmZoy0Q"
  }]
}
]]></artwork>
        </figure>
      </section>
      <section anchor="example-parboiled-registrar-voucher-request-rvr-from-registrar-to-masa">
        <name>Example Parboiled Registrar Voucher Request - RVR (from Registrar to MASA)</name>
        <t>The term parboiled refers to food which is partially cooked.
In <xref target="BRSKI"/>, the term refers to a Pledge voucher-request (PVR) which has been received by the Registrar, and then has been processed by the Registrar ("cooked"), and is now being forwarded to the MASA.</t>
        <t>The following is an example Registrar voucher-request (RVR) sent from the Registrar to the MASA, in "General JWS JSON Serialization".
Note that the previous PVR can be seen in the payload as "prior-signed-voucher-request".</t>
        <figure anchor="ExampleParboiledRegistrarVoucherRequestfigure">
          <name>Example Parboiled Registrar Voucher Request - RVR</name>
          <artwork align="left"><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

{
  "payload": "eyJpZXRmLXZvdWNoZXItcmVxdWVzdDp2b3VjaGVyIjp7InNlcmlhbC\
1udW1iZXIiOiIwMTIzNDU2Nzg5IiwiaWRldmlkLWlzc3VlciI6IkJCZ3dGb0FVVkF1TT\
NNLzlMK1NpNk5EQ09Ea1RsKy9CeGhzPSIsIm5vbmNlIjoiNkd0bitaUUtOMkhxREZWa0\
JFeFpMUT09IiwicHJpb3Itc2lnbmVkLXZvdWNoZXItcmVxdWVzdCI6ImV5SndZWGxzYj\
JGa0lqb2laWGxLY0ZwWVVtMU1XRnAyWkZkT2IxcFlTWFJqYlZaNFpGZFdlbVJFY0RKaU\
0xWnFZVWRXZVVscWNEZEpiazVzWTIxc2FHSkRNWFZrVnpGcFdsaEphVTlwU1hkTlZFbD\
ZUa1JWTWs1Nlp6VkphWGRwWW0wNWRWa3lWV2xQYVVreVVqTlNkVXN4Y0ZKVE1EUjVVMG\
hHUlZKc1duSlJhMVkwVjJ0NFVsQlVNR2xNUTBwcVkyMVdhR1JIVm10TVZ6bDFTV3B2YV\
UxcVFYbE5hVEIzVG5rd2QwOUdVWGRQUkc4d1RVUnZNRTFwTkRSTmFrSmhTV2wzYVdOSV\
NuWmxSMngwWVZoU05VeFlTbXhhTW14NlpFaEthR05wTVdwYVdFb3dTV3B2YVZSVmJFcF\
JhbEp4VVRCT1FsZFhiRzVSV0dSS1VXdEdibE5WWkVKWFJtc3pUVzFLYVZkck1VSmlNR1\
JFVVROR1NGVXdNREJQVlVwQ1ZGVk9UbEpHVmpSU1dIQkNWV3RLYmxSc1drTlJWemxPVV\
RKemVFNVdSblZXYm5Cb1ZucFdjMWw2VGs1bFJWSlZVVlY0UTFvd05WZFJhMFpxVkZWS1\
IxUnVRbXRTTVZZMFVraHdRbFJyU201VWJGcERVVlV4VGxGdGVGTmlSMDE2Vld0U1VsWk\
ZSbXhTYm1OM1pWVXhSVkpZYkU1U1IwNHpWRzF3Ums1Rk1WVlRiVVpIWkhwQ05sUlZVa1\
psVlRGRldUTmtUMkZyVlRCVVZsSkxXVlV4UlU1SWFFWmxhMFpUVVcxa1QxWnJTa0ppTU\
RGRVlYcEZNVlZYTlZkbGJVWllUbGQ0YWswd01UUlNSbEpDVkVWS2JsUnNXa05SVjA1T1\
VXdGFUMk5IVWtoV1dHaElVa1ZHV0ZGdFpFOVdhMHBDVkZVeFJVMUdTakpaYkdSSFkwZE\
tjMU50ZUdGTmJYZzJXa1ZvUzJGSFRuRlJiSEJPVVdzeFNGRnViSGhTTVU1T1RrUnNRbG\
93VmtoUk1FNTRVakZPVGs1RWJFSmtNRlpKVVZSQ1NsRlZTa05oZWtVeVUzazVjRTU2Yk\
haVmJYUk1UbFpzYVZwV1FtNVBSbFpVVldwbmRtUllUWGhhUmtKV1lWWndTVlJZVW5aaE\
1VNXJZMVYwV0U1WFduVldNMDVEV2tOMGVGVnJkek5XTVVwdFdtMVdXR0V6Ykc1YVYwcD\
JVMjFhU21KSGVERmpiVTV3VFdwV00ySnRhSEJVTVZwRVVqSndiR1ZyU1RGVVZVbDNVak\
JGZUZaWFVrdFZWa1pZVkZWS1VsSXdUa1JqTUdSQ1ZWWldSMUZ1WkU1UmEwcHVXak5LUT\
Fvd1ZrZFJiRVpxVWtWb1JWRlZPVU5hTURWWFUwWkZORkZyUm0xUFJWWkRVVlV4UkZGcV\
VrSmtNVTVDVjFWU1YxVnFRbE5SYTFaR1pERkJNRk5YVW1waVZscDFXVlpvVDAxSFRuUl\
NibXhOVjBaS2MxbDZUbEprVjAxNVlrZDRhVll4V2pGWk0ydDRZVmRTUkU1WVZtRlhSaz\
VFVTBjMVMySkdiM2xpU0hCclUwVndiMWt5YTNoTlJuQlpWR3BDVDJGVVZqWlpWbVJYWk\
Vad1dFNVljRTFXTUc5M1ZFY3dNV0pIVWtWUlZYUkRXakprZUdGSGRIRlVNVUpTVlZWU1\
Fsb3dOVXBSVlZKRFVtdEdjRkZ1YUhOYVJVcHZWMjVGZDFKWVdURlRhM2Q1VlVoS1dGRX\
pValZWZWxwdlVrWnNXRTFZYkVSVWVUbFRXVmhXYVdORlRUTlVWMFpLVWtka1NtRkZSaz\
FWTUhCcFdqQjRkVm95YUdsWmEwWnVUVWRTYWxZd1dsWldiVGgyV2pCa1QwMURPWEZrTT\
NCTFYycENWR0pFU205T1NHaEtWMGR6ZUVsdU1Ua2lMQ0p6YVdkdVlYUjFjbVZ6SWpwYm\
V5SndjbTkwWldOMFpXUWlPaUpsZVVvMFRsZE5hVTlzYzJsVVZXeEtVV2wwVlZFd1RrSl\
pWVTV1VVZoa1NsRnJSbTVUVldSQ1YwYzFWMkZ1VGxaT1ZURkNZakJrUkZFelJraFZNRE\
F3VDFWS1FsUlZUazVTUkVJMFVUTndRbE5yU201VWJGcERVVlpzVlZGWGRFZFZhekZUVm\
xoa1JtUXhiRVZXYkVaU1V6QlNRbVZGZEdoV2VsWjFWVEl4YzJSV2IzZFVibHBxWW10R0\
5GSnVjRUpXYTBwdVZHeGFRMUZWTVU1U1IzUjNZMGRLZEZwRmRHaFdlbFoxVm10a1YyVn\
RVa1pVYTBwT1VUQkdXVkpHVWtwbFJURkZWMWhrVDFKRlJYaFVhMUphWlVVMVIySXhiRV\
ZsYlhNeFZERlNjbVZGTVhGVVdHaE9ZV3N3ZUZReFVsWk9WbVJ4VVd4T1RsVllUak5STV\
VaYVVrWmFVbFZWWkVaa01IQkRWbFpTUmxack1VTlVWV1JDVFZaV1JsRXlaRE5VVms1MF\
lraFdZVTFJUW5kWmJURnJVa2RKZWxOdVpFNVZhekV6VWxaR1dsSkdXbEpWVlZwR1pEST\
VNMVJXVWtwbGF6VkZWbFJLVDJWdFl6RlVWa3BxWkRCYVVsZFZVbGRWVmtaRlVrVkZNVk\
15UmxoT1Z6VlVZbGQ0TVZkcVFsTmlSMUowWWtkd1lWWkZTbUZVVlVwT1VqQktOV05WWk\
ZSVVZGRTFVVmRrUmxJd1RrUmpWV1JVVkZSUk5WRllaRVpUUlVWM1UxVkdRMUY2WXpWaV\
IyeG9WVzFPUTJGc2NHcFNWVlpaWkhwa2VWWlhWbWhrYmxKSVUydEdNVk5FVW5kaGVsSk\
tUa1JLTWxsVlNrNWpNVlY0VFZkc1RWSkZUa1JVUjNSWFlVaFNWbFpxU1hoaVdGcG9Vek\
JPTWxSWVozbFhVM1JVVkZka1VrOUhXbTFrTUhkNVRUTnZlbFpGYkZkUmJHUnhXa1pTUT\
JWck1VUmpNR1JFVVROT1NGRldSbFpTYTBvelVsZGtRMUZxYUZoVFJtTjRZVWROZVZKWV\
VtdFNNVm8yV2tWTk1XVnRSbGhXYmxKaFZucFdObFJHWkV0TlJYaDBUbGQ0YTFKSE9ERl\
VhMUpTWldzeFEwOUZaRUpOVmxaclUxaGtVbGRWTVVOWlZVWkhVbXhHVFdGck5UWlZSbm\
QyVlRGM2RtRXlPVEZoYkVZellXMWpNVkpVVm0xa2JtUnFWMWRLVGxGck1VaFJWRVpXV2\
tWd1VsVlZNVTVSVnpsSVVUQk9lbEl3UmxKV1ZWcERaREF4UkZSVlJUQlNNRVY0VmxkU1\
JXUXdWa05ZUXprelZWVldRbVF3YkVsYU1GSkNVekJLYmxvelJtOWhNbkJRVlVaR1VsSk\
ZSbTVVYTJoQ1VrVktSbEZYYkVOa1ZFNHpWV3RLVFdNd2NFNVZSRlo2VkZSQk0wMUZaM0\
pXVlZwNVpWVTFWazV0WkV4bGEzaFFWVzFPUjJWV1NsTlVNbmg0WTFWb2NGb3diRzVYUl\
U1MFUydDRWV1ZyVm5Oa2ExRjVZMGM1VEU1dFVqUk9iWGQ0V0VNNU1XVlhNVlZpYlVwU1\
VrVlNiVk50ZUdoa1NGWlpUV3hLZGxRd1ZUbEpiREJ6U1c1U05XTkRTVFpKYmxwMlpGZE\
9iMXBZU1hSaGJtUjZTekp3ZW1JeU5HbE1RMHBvWWtkamFVOXBTa1pWZWtreFRtbEtPU0\
lzSW5OcFoyNWhkSFZ5WlNJNkltRmlWbWMwVkVSSGVsTlVhbFpJYTFGc1RtVkpWek5CUW\
5VMVdsaGtUV3d4WTBWeGQyTkpRV3hJUmxjMFFuSnNSMkpQTFVSU1ZFdG1lVU5QUjNoVF\
Z6UTVMV3QwU21OeVZteFpaMHR4UXpSNGJWcHZlVEJSSW4xZGZRPT0iLCJjcmVhdGVkLW\
9uIjoiMjAyMi0wNy0wOFQwODo0MDo0Mi44NDhaIn19",
  "signatures": [{
    "protected": "eyJ4NWMiOlsiTUlJQm96Q0NBVXFnQXdJQkFnSUdBVzBlTHVJRk\
1Bb0dDQ3FHU000OUJBTUNNRFV4RXpBUkJnTlZCQW9NQ2sxNVFuVnphVzVsYzNNeERUQU\
xCZ05WQkFjTUJGTnBkR1V4RHpBTkJnTlZCQU1NQmxSbGMzUkRRVEFlRncweE9UQTVNVE\
V3TWpNM016SmFGdzB5T1RBNU1URXdNak0zTXpKYU1GUXhFekFSQmdOVkJBb01DazE1UW\
5WemFXNWxjM014RFRBTEJnTlZCQWNNQkZOcGRHVXhMakFzQmdOVkJBTU1KVkpsWjJsem\
RISmhjaUJXYjNWamFHVnlJRkpsY1hWbGMzUWdVMmxuYm1sdVp5QkxaWGt3V1RBVEJnY3\
Foa2pPUFFJQkJnZ3Foa2pPUFFNQkJ3TkNBQVQ2eFZ2QXZxVHoxWlVpdU5XaFhwUXNrYV\
B5N0FISFFMd1hpSjBpRUx0NnVOUGFuQU4wUW5XTVlPXC8wQ0RFaklrQlFvYnc4WUtxan\
R4SkhWU0dUajlLT295Y3dKVEFUQmdOVkhTVUVEREFLQmdnckJnRUZCUWNESERBT0JnTl\
ZIUThCQWY4RUJBTUNCNEF3Q2dZSUtvWkl6ajBFQXdJRFJ3QXdSQUlnWXIyTGZxb2FDS0\
RGNFJBY01tSmkrTkNacWRTaXVWdWdJU0E3T2hLUnEzWUNJRHhuUE1NbnBYQU1UclBKdV\
BXeWNlRVIxMVB4SE9uKzBDcFNIaTJxZ3BXWCIsIk1JSUJwRENDQVVtZ0F3SUJBZ0lHQV\
cwZUx1SCtNQW9HQ0NxR1NNNDlCQU1DTURVeEV6QVJCZ05WQkFvTUNrMTVRblZ6YVc1bG\
MzTXhEVEFMQmdOVkJBY01CRk5wZEdVeER6QU5CZ05WQkFNTUJsUmxjM1JEUVRBZUZ3MH\
hPVEE1TVRFd01qTTNNekphRncweU9UQTVNVEV3TWpNM016SmFNRFV4RXpBUkJnTlZCQW\
9NQ2sxNVFuVnphVzVsYzNNeERUQUxCZ05WQkFjTUJGTnBkR1V4RHpBTkJnTlZCQU1NQm\
xSbGMzUkRRVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUFCT2t2a1RIdT\
hRbFQzRkhKMVVhSTcrV3NIT2IwVVMzU0FMdEc1d3VLUURqaWV4MDZcL1NjWTVQSmlidm\
dIVEIrRlwvUVRqZ2VsSEd5MVlLcHdjTk1jc1N5YWpSVEJETUJJR0ExVWRFd0VCXC93UU\
lNQVlCQWY4Q0FRRXdEZ1lEVlIwUEFRSFwvQkFRREFnSUVNQjBHQTFVZERnUVdCQlRvWk\
lNelFkc0RcL2pcLytnWFwvN2NCSnVjSFwvWG1qQUtCZ2dxaGtqT1BRUURBZ05KQURCR0\
FpRUF0eFEzK0lMR0JQSXRTaDRiOVdYaFhOdWhxU1A2SCtiXC9MQ1wvZlZZRGpRNm9DSV\
FERzJ1UkNIbFZxM3loQjU4VFhNVWJ6SDgrT2xoV1V2T2xSRDNWRXFEZGNRdz09Il0sIn\
R5cCI6InZvdWNoZXItandzK2pzb24iLCJhbGciOiJFUzI1NiJ9",
    "signature": "0fzuqVdyhemWsu_HQeF-CmQwJeLp9IStNf-bWZwz6SojrEOR4a\
Dq6VStyG8eWXjGHNZiRyyLJo7RP1rKatuS2w"
  }]
}
]]></artwork>
        </figure>
      </section>
      <section anchor="example-voucher-response-from-masa-to-pledge-via-registrar">
        <name>Example Voucher Response (from MASA to Pledge, via Registrar)</name>
        <t>The following is an example voucher response from MASA to Pledge via Registrar, in "General JWS JSON Serialization".</t>
        <figure anchor="ExampleVoucherResponsefigure">
          <name>Example Voucher Response</name>
          <artwork align="left"><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

{
  "payload": "eyJpZXRmLXZvdWNoZXI6dm91Y2hlciI6eyJhc3NlcnRpb24iOiJsb2\
dnZWQiLCJzZXJpYWwtbnVtYmVyIjoiMDEyMzQ1Njc4OSIsIm5vbmNlIjoiZGRoSGQ4Ml\
FpUGtzMDBTck1USTlEUT09IiwiY3JlYXRlZC1vbiI6IjIwMjItMDctMDdUMTc6NDc6MD\
EuODkwWiIsInBpbm5lZC1kb21haW4tY2VydCI6Ik1JSUJwRENDQVVtZ0F3SUJBZ0lHQV\
cwZUx1SCtNQW9HQ0NxR1NNNDlCQU1DTURVeEV6QVJCZ05WQkFvTUNrMTVRblZ6YVc1bG\
MzTXhEVEFMQmdOVkJBY01CRk5wZEdVeER6QU5CZ05WQkFNTUJsUmxjM1JEUVRBZUZ3MH\
hPVEE1TVRFd01qTTNNekphRncweU9UQTVNVEV3TWpNM016SmFNRFV4RXpBUkJnTlZCQW\
9NQ2sxNVFuVnphVzVsYzNNeERUQUxCZ05WQkFjTUJGTnBkR1V4RHpBTkJnTlZCQU1NQm\
xSbGMzUkRRVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUFCT2t2a1RIdT\
hRbFQzRkhKMVVhSTcrV3NIT2IwVVMzU0FMdEc1d3VLUURqaWV4MDYvU2NZNVBKaWJ2Z0\
hUQitGL1FUamdlbEhHeTFZS3B3Y05NY3NTeWFqUlRCRE1CSUdBMVVkRXdFQi93UUlNQV\
lCQWY4Q0FRRXdEZ1lEVlIwUEFRSC9CQVFEQWdJRU1CMEdBMVVkRGdRV0JCVG9aSU16UW\
RzRC9qLytnWC83Y0JKdWNIL1htakFLQmdncWhrak9QUVFEQWdOSkFEQkdBaUVBdHhRMy\
tJTEdCUEl0U2g0YjlXWGhYTnVocVNQNkgrYi9MQy9mVllEalE2b0NJUURHMnVSQ0hsVn\
EzeWhCNThUWE1VYnpIOCtPbGhXVXZPbFJEM1ZFcURkY1F3PT0ifX0",
  "signatures": [{
    "protected": "eyJ4NWMiOlsiTUlJQmt6Q0NBVGlnQXdJQkFnSUdBV0ZCakNrWU\
1Bb0dDQ3FHU000OUJBTUNNRDB4Q3pBSkJnTlZCQVlUQWtGUk1SVXdFd1lEVlFRS0RBeE\
thVzVuU21sdVowTnZjbkF4RnpBVkJnTlZCQU1NRGtwcGJtZEthVzVuVkdWemRFTkJNQj\
RYRFRFNE1ERXlPVEV3TlRJME1Gb1hEVEk0TURFeU9URXdOVEkwTUZvd1R6RUxNQWtHQT\
FVRUJoTUNRVkV4RlRBVEJnTlZCQW9NREVwcGJtZEthVzVuUTI5eWNERXBNQ2NHQTFVRU\
F3d2dTbWx1WjBwcGJtZERiM0p3SUZadmRXTm9aWElnVTJsbmJtbHVaeUJMWlhrd1dUQV\
RCZ2NxaGtqT1BRSUJCZ2dxaGtqT1BRTUJCd05DQUFTQzZiZUxBbWVxMVZ3NmlRclJzOF\
IwWlcrNGIxR1d5ZG1XczJHQU1GV3diaXRmMm5JWEgzT3FIS1Z1OHMyUnZpQkdOaXZPS0\
dCSEh0QmRpRkVaWnZiN294SXdFREFPQmdOVkhROEJBZjhFQkFNQ0I0QXdDZ1lJS29aSX\
pqMEVBd0lEU1FBd1JnSWhBSTRQWWJ4dHNzSFAyVkh4XC90elVvUVwvU3N5ZEwzMERRSU\
5FdGNOOW1DVFhQQWlFQXZJYjNvK0ZPM0JUbmNMRnNhSlpSQWtkN3pPdXNuXC9cL1pLT2\
FFS2JzVkRpVT0iXSwidHlwIjoidm91Y2hlci1qd3MranNvbiIsImFsZyI6IkVTMjU2In\
0",
    "signature": "y1HLYBFlwouf42XWSKUWjeYQHnG2Q6A4bjA7hvTkB3z1dPwTUl\
jPHtuN2Qex6gDxTfaSiKeoXGsOD4JWOgQJPg"
  }]
}
]]></artwork>
        </figure>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="BRSKI" target="https://www.rfc-editor.org/info/rfc8995">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin">
              <organization/>
            </author>
            <author fullname="M. Richardson" initials="M." surname="Richardson">
              <organization/>
            </author>
            <author fullname="T. Eckert" initials="T." surname="Eckert">
              <organization/>
            </author>
            <author fullname="M. Behringer" initials="M." surname="Behringer">
              <organization/>
            </author>
            <author fullname="K. Watsen" initials="K." surname="Watsen">
              <organization/>
            </author>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane.  To do this, a Secure Key Infrastructure is bootstrapped.  This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline.  We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device.  The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="SZTP" target="https://www.rfc-editor.org/info/rfc8572">
          <front>
            <title>Secure Zero Touch Provisioning (SZTP)</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen">
              <organization/>
            </author>
            <author fullname="I. Farrer" initials="I." surname="Farrer">
              <organization/>
            </author>
            <author fullname="M. Abrahamsson" initials="M." surname="Abrahamsson">
              <organization/>
            </author>
            <date month="April" year="2019"/>
            <abstract>
              <t>This document presents a technique to securely provision a networking device when it is booting in a factory-default state.  Variations in the solution enable it to be used on both public and private networks.  The provisioning steps are able to update the boot image, commit an initial configuration, and execute arbitrary scripts to address auxiliary needs.  The updated device is subsequently able to establish secure connections with other systems.  For instance, a device may establish NETCONF (RFC 6241) and/or RESTCONF (RFC 8040) connections with deployment-specific network management systems.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8572"/>
          <seriesInfo name="DOI" value="10.17487/RFC8572"/>
        </reference>
        <reference anchor="RFC8366" target="https://www.rfc-editor.org/info/rfc8366">
          <front>
            <title>A Voucher Artifact for Bootstrapping Protocols</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen">
              <organization/>
            </author>
            <author fullname="M. Richardson" initials="M." surname="Richardson">
              <organization/>
            </author>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin">
              <organization/>
            </author>
            <author fullname="T. Eckert" initials="T." surname="Eckert">
              <organization/>
            </author>
            <date month="May" year="2018"/>
            <abstract>
              <t>This document defines a strategy to securely assign a pledge to an owner using an artifact signed, directly or indirectly, by the pledge's manufacturer.  This artifact is known as a "voucher".</t>
              <t>This document defines an artifact format as a YANG-defined JSON document that has been signed using a Cryptographic Message Syntax (CMS) structure.  Other YANG-derived formats are possible.  The voucher artifact is normally generated by the pledge's manufacturer (i.e., the Manufacturer Authorized Signing Authority (MASA)).</t>
              <t>This document only defines the voucher artifact, leaving it to other documents to describe specialized protocols for accessing it.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8366"/>
          <seriesInfo name="DOI" value="10.17487/RFC8366"/>
        </reference>
        <reference anchor="RFC7515" target="https://www.rfc-editor.org/info/rfc7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones">
              <organization/>
            </author>
            <author fullname="J. Bradley" initials="J." surname="Bradley">
              <organization/>
            </author>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura">
              <organization/>
            </author>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures.  Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification.  Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="RFC8259" target="https://www.rfc-editor.org/info/rfc8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray">
              <organization/>
            </author>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format.  It was derived from the ECMAScript Programming Language Standard.  JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC5280" target="https://www.rfc-editor.org/info/rfc5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper">
              <organization/>
            </author>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="W. Polk" initials="W." surname="Polk">
              <organization/>
            </author>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC5652" target="https://www.rfc-editor.org/info/rfc5652">
          <front>
            <title>Cryptographic Message Syntax (CMS)</title>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the Cryptographic Message Syntax (CMS).  This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="70"/>
          <seriesInfo name="RFC" value="5652"/>
          <seriesInfo name="DOI" value="10.17487/RFC5652"/>
        </reference>
        <reference anchor="RFC8949" target="https://www.rfc-editor.org/info/rfc8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049.  It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC8792" target="https://www.rfc-editor.org/info/rfc8792">
          <front>
            <title>Handling Long Lines in Content of Internet-Drafts and RFCs</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen">
              <organization/>
            </author>
            <author fullname="E. Auerswald" initials="E." surname="Auerswald">
              <organization/>
            </author>
            <author fullname="A. Farrel" initials="A." surname="Farrel">
              <organization/>
            </author>
            <author fullname="Q. Wu" initials="Q." surname="Wu">
              <organization/>
            </author>
            <date month="June" year="2020"/>
            <abstract>
              <t>This document defines two strategies for handling long lines in width-bounded text content.  One strategy, called the "single backslash" strategy, is based on the historical use of a single backslash ('\') character to indicate where line-folding has occurred, with the continuation occurring with the first character that is not a space character (' ') on the next line.  The second strategy, called the "double backslash" strategy, extends the first strategy by adding a second backslash character to identify where the continuation begins and is thereby able to handle cases not supported by the first strategy.  Both strategies use a self-describing header enabling automated reconstitution of the original content.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8792"/>
          <seriesInfo name="DOI" value="10.17487/RFC8792"/>
        </reference>
        <reference anchor="RFC8812" target="https://www.rfc-editor.org/info/rfc8812">
          <front>
            <title>CBOR Object Signing and Encryption (COSE) and JSON Object Signing and Encryption (JOSE) Registrations for Web Authentication (WebAuthn) Algorithms</title>
            <author fullname="M. Jones" initials="M." surname="Jones">
              <organization/>
            </author>
            <date month="August" year="2020"/>
            <abstract>
              <t>The W3C Web Authentication (WebAuthn) specification and the FIDO Alliance FIDO2 Client to Authenticator Protocol (CTAP) specification use CBOR Object Signing and Encryption (COSE) algorithm identifiers.  This specification registers the following algorithms (which are used by WebAuthn and CTAP implementations) in the IANA "COSE Algorithms" registry: RSASSA-PKCS1-v1_5 using SHA-256, SHA-384, SHA-512, and SHA-1; and Elliptic Curve Digital Signature Algorithm (ECDSA) using the secp256k1 curve and SHA-256.  It registers the secp256k1 elliptic curve in the IANA "COSE Elliptic Curves" registry.  Also, for use with JSON Object Signing and Encryption (JOSE), it registers the algorithm ECDSA using the secp256k1 curve and SHA-256 in the IANA "JSON Web Signature and Encryption Algorithms" registry and the secp256k1 elliptic curve in the IANA "JSON Web Key Elliptic Curve" registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8812"/>
          <seriesInfo name="DOI" value="10.17487/RFC8812"/>
        </reference>
        <reference anchor="onpath" target="https://mailarchive.ietf.org/arch/msg/saag/m1r9uo4xYznOcf85Eyk0Rhut598/">
          <front>
            <title>can an on-path attacker drop traffic?</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="I-D.ietf-anima-constrained-voucher" target="https://www.ietf.org/archive/id/draft-ietf-anima-constrained-voucher-18.txt">
          <front>
            <title>Constrained Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Peter Van der Stok" initials="P." surname="Van der Stok">
              <organization>vanderstok consultancy</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Esko Dijk" initials="E." surname="Dijk">
              <organization>IoTconsultancy.nl</organization>
            </author>
            <date day="11" month="July" year="2022"/>
            <abstract>
              <t>   This document defines the Constrained Bootstrapping Remote Secure Key
   Infrastructure (Constrained BRSKI) protocol, which provides a
   solution for secure zero-touch bootstrapping of resource-constrained
   (IoT) devices into the network of a domain owner.  This protocol is
   designed for constrained networks, which may have limited data
   throughput or may experience frequent packet loss.  Constrained BRSKI
   is a variant of the BRSKI protocol, which uses an artifact signed by
   the device manufacturer called the "voucher" which enables a new
   device and the owner's network to mutually authenticate.  While the
   BRSKI voucher is typically encoded in JSON, Constrained BRSKI defines
   a compact CBOR-encoded voucher.  The BRSKI voucher is extended with
   new data types that allow for smaller voucher sizes.  The Enrollment
   over Secure Transport (EST) protocol, used in BRSKI, is replaced with
   EST-over-CoAPS; and HTTPS used in BRSKI is replaced with CoAPS.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-constrained-voucher-18"/>
        </reference>
        <reference anchor="I-D.ietf-anima-brski-prm" target="https://www.ietf.org/archive/id/draft-ietf-anima-brski-prm-04.txt">
          <front>
            <title>BRSKI with Pledge in Responder Mode (BRSKI-PRM)</title>
            <author fullname="Steffen Fries" initials="S." surname="Fries">
              <organization>Siemens AG</organization>
            </author>
            <author fullname="Thomas Werner" initials="T." surname="Werner">
              <organization>Siemens AG</organization>
            </author>
            <author fullname="Eliot Lear" initials="E." surname="Lear">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date day="8" month="July" year="2022"/>
            <abstract>
              <t>   This document defines enhancements to bootstrapping a remote secure
   key infrastructure (BRSKI, [RFC8995]) to facilitate bootstrapping in
   domains featuring no or only timely limited connectivity between a
   pledge and the domain registrar.  It specifically targets situations,
   in which the interaction model changes from a pledge-initiator-mode,
   as used in BRSKI, to a pledge-responder-mode as described in this
   document.  To support both, BRSKI-PRM introduces a new registrar-
   agent component, which facilitates the communication between pledge
   and registrar during the bootstrapping phase.  For the establishment
   of a trust relation between pledge and domain registrar, BRSKI-PRM
   relies on the exchange of authenticated self-contained objects
   (signature-wrapped objects).  The defined approach is agnostic
   regarding the utilized enrollment protocol, deployed by the domain
   registrar to communicate with the Domain CA.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-brski-prm-04"/>
        </reference>
        <reference anchor="I-D.kuehlewind-update-tag" target="https://www.ietf.org/archive/id/draft-kuehlewind-update-tag-04.txt">
          <front>
            <title>Definition of new tags for relations between RFCs</title>
            <author fullname="Mirja Kühlewind" initials="M." surname="Kühlewind">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Suresh Krishnan" initials="S." surname="Krishnan">
              <organization>Kaloom</organization>
            </author>
            <date day="12" month="July" year="2021"/>
            <abstract>
              <t>   An RFC can include a tag called "Updates" which can be used to link a
   new RFC to an existing RFC.  On publication of such an RFC, the
   existing RFC will include an additional metadata tag called "Updated
   by" which provides a link to the new RFC.  However, this tag pair is
   not well-defined and therefore it is currently used for multiple
   different purposes, which leads to confusion about the actual meaning
   of this tag and inconsistency in its use.

   This document recommends the discontinuation of the use of the
   updates/updated by tag pair, and instead proposes three new tag pairs
   that have well-defined meanings and use cases.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-kuehlewind-update-tag-04"/>
        </reference>
      </references>
    </references>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="T." surname="Eckert" fullname="Toerless Eckert">
        <organization>Futurewei Technologies Inc.</organization>
        <address>
          <email>tte+ietf@cs.fau.de</email>
        </address>
      </contact>
      <contact initials="E." surname="Dijk" fullname="Esko Dijk">
        <organization/>
        <address>
          <email>esko.dijk@iotconsultancy.nl</email>
        </address>
      </contact>
      <contact initials="S." surname="Fries" fullname="Steffen Fries">
        <organization>Siemens AG</organization>
        <address>
          <email>steffen.fries@siemens.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
