<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.23 (Ruby 2.6.10) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-anima-jws-voucher-06" category="std" consensus="true" updates="RFC8366" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.16.0 -->
  <front>
    <title abbrev="JWS-voucher">JWS signed Voucher Artifacts for Bootstrapping Protocols</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-anima-jws-voucher-06"/>
    <author initials="T." surname="Werner" fullname="Thomas Werner">
      <organization>Siemens AG</organization>
      <address>
        <email>thomas-werner@siemens.com</email>
      </address>
    </author>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <date year="2023" month="February" day="22"/>
    <area>Internet</area>
    <workgroup>anima Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t><xref target="RFC8366"/> defines a digital artifact called voucher as a YANG-defined JSON
document that is signed using a Cryptographic Message Syntax (CMS) structure.
This document introduces a variant of the voucher artifact in which CMS is
replaced by the JSON Object Signing and Encryption (JOSE) mechanism described in <xref target="RFC7515"/> to support deployments in which JOSE is preferred over CMS.</t>
      <t>In addition to explaining how the format is created, the "application/voucher-jws+json" media type is registered and examples are provided.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>"A Voucher Artifact for Bootstrapping Protocols" <xref target="RFC8366"/> defines a YANG-based data structure used in "Bootstrapping Remote Secure Key Infrastructure" <xref target="BRSKI"/> and
"Secure Zero Touch Provisioning" <xref target="SZTP"/> to transfer ownership of a device from a manufacturer to a new owner (site domain).
That document provides a serialization of the voucher to JSON <xref target="RFC8259"/> with a signature according to the Cryptographic Message Syntax (CMS) <xref target="RFC5652"/>.
The resulting voucher artifact has the media type "application/voucher-cms+json".</t>
      <t><xref target="I-D.ietf-anima-constrained-voucher"/> provides a serialization of the voucher to CBOR <xref target="RFC8949"/>
with the signature format of COSE <xref target="RFC8812"/>
and the media type "application/voucher-cose+cbor".</t>
      <t>This document provides a serialization of the voucher to JSON <xref target="RFC8259"/>
with the signature in form of JSON Web Signature (JWS) <xref target="RFC7515"/>
and the media type "application/voucher-jws+json".
The encoding specified in this document is used by <xref target="I-D.ietf-anima-brski-prm"/>
and may be more handy for use cases requiring signed JSON objects.</t>
      <t>This document does not extend the YANG definition of <xref target="RFC8366"/>.</t>
      <t>With the availability of different encoded vouchers, it is up to an industry specific application statement to indicate/decide which voucher signature format is to be used.
There is no provision across the different voucher signature formats that a receiver could safely recognize which format it uses unless additional context is provided.
For example, <xref target="BRSKI"/> provides this context via the media type for the voucher artifact.
This document utilizes the optional "typ" (Type) Header Parameter of JWS <xref target="RFC7515"/> to provide information about the signed object.</t>
      <t>This document should be considered an update to <xref target="RFC8366"/> in the category of "See Also"
as per <xref target="I-D.kuehlewind-update-tag"/>.
TODO: double check with RFC8366bis</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="voucher-artifact-with-json-web-signature">
      <name>Voucher Artifact with JSON Web Signature</name>
      <t><xref target="RFC7515"/> defines the following serializations for JWS:</t>
      <ol spacing="normal" type="1"><li>"JWS Compact Serialization" in <xref section="7.1" sectionFormat="of" target="RFC7515"/></li>
        <li>"JWS JSON Serialization" in <xref section="7.2" sectionFormat="of" target="RFC7515"/>
- "General JWS JSON Serialization Syntax" in <xref section="7.2.1" sectionFormat="of" target="RFC7515"/> <br/>
- "Flattened JWS JSON Serialization Syntax" in <xref section="7.2.2" sectionFormat="of" target="RFC7515"/></li>
      </ol>
      <t>This document makes use of the "General JWS JSON Serialization Syntax" to support multiple signatures,
as already supported by <xref target="RFC8366"/> for CMS-signed vouchers.</t>
      <t>The <xref target="RFC8366"/> voucher data structure consists of a nested map, the outer map of which is:</t>
      <artwork><![CDATA[
    { "ietf-voucher:voucher" : { inner map }}
]]></artwork>
      <t>This outer map is considered the JWS Payload as described in <xref section="3" sectionFormat="of" target="RFC7515"/>.
A "JWS JSON Serialization Overview" is given in <xref section="3.2" sectionFormat="of" target="RFC7515"/> and more details on the JWS serializations in <xref section="7" sectionFormat="of" target="RFC7515"/>.</t>
      <section anchor="voucher-representation-in-general-jws-json-serialization-syntax">
        <name>Voucher Representation in General JWS JSON Serialization Syntax</name>
        <t>The following figure gives an overview of the Voucher representation in "General JWS JSON Serialization Syntax":</t>
        <figure anchor="VoucherGeneralJWSFigure">
          <name>Voucher Representation in General JWS JSON Serialization Syntax</name>
          <artwork align="left"><![CDATA[
    {
      "payload": "BASE64URL(ietf-voucher:voucher)",
      "signatures": [
        {
          "protected": "BASE64URL(UTF8(JWS Protected Header))",
          "signature": "base64encodedvalue=="
        }
      ]
    }
]]></artwork>
        </figure>
      </section>
      <section anchor="jws-payload-of-voucher-in-general-jws-json-serialization">
        <name>JWS Payload of Voucher in General JWS JSON Serialization</name>
        <t>The following figure depicts the decoded JWS Payload in JSON syntax:</t>
        <figure anchor="VoucherGeneralJWSVoucherPayloadFigure">
          <name>Decoded JWS Payload in JSON Syntax</name>
          <artwork align="left"><![CDATA[
    {
      "ietf-voucher:voucher": {
        "assertion": "logged",
        "serial-number": "0123456789",
        "nonce": "5742698422680472",
        "created-on": "2022-07-08T03:01:24.618Z",
        "pinned-domain-cert": "base64encodedvalue=="
      }
    }
]]></artwork>
        </figure>
      </section>
      <section anchor="jws-protected-header-of-voucher-in-general-jws-json-serialization">
        <name>JWS Protected Header of Voucher in General JWS JSON Serialization</name>
        <t>The standard header parameters "typ" and "alg" as described in <xref target="RFC7515"/> are utilized in the protected header.
The "alg" header MUST contain the algorithm type used to create the signature, e.g., "ES256".
The "typ" header SHOULD contain the value "TODO: voucher-jws+json", if present.</t>
        <t>If X.509 (PKIX) certificates <xref target="RFC5280"/> are used,
then the "x5c" parameter defined in <xref section="4.1.6" sectionFormat="of" target="RFC7515"/> SHOULD be used to contain the certificate and chain.
Vouchers will often need all certificates in the chain,
including what would be considered the trust anchor certificate,
because intermediate devices (such as the Registrar) may need to audit the artifact,
or end systems may need to pin a trust anchor for future operations.
Note, a trust anchor SHOULD be provided differently to be trusted.
This is consistent with <xref section="5.5.2" sectionFormat="of" target="BRSKI"/>.</t>
        <t>The following figure gives the decoded JWS Protected Header in JSON syntax:</t>
        <figure anchor="VoucherGeneralJWSProtectedHeaderFigure">
          <name>JWS Protected Header in JSON Syntax</name>
          <artwork align="left"><![CDATA[
    {
      "alg": "ES256",
      "typ": "voucher-jws+json",
      "x5c": [
        "base64encodedvalue1==",
        "base64encodedvalue2=="
      ]
    }  
]]></artwork>
        </figure>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>The Voucher Request reveals the IDevID of the component (Pledge) that is in the process of bootstrapping.</t>
      <t>This request occurs via HTTP-over-TLS, however, for the Pledge-to-Registrar TLS connection, the Pledge is provisinally accepting the Registrar server certificate.
Hence it is subject to disclosure by a Dolev-Yao attacker (a "malicious messenger")<xref target="onpath"/>, as explained in <xref section="10.2" sectionFormat="of" target="BRSKI"/>.</t>
      <t>The use of a JWS header brings no new privacy considerations.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The issues of how <xref target="RFC8366"/> vouchers are used in a <xref target="BRSKI"/> system is addressed in <xref section="11" sectionFormat="of" target="BRSKI"/>.
This document does not change any of those issues, it just changes the signature technology used for voucher request and response artifacts.</t>
      <t><xref section="9" sectionFormat="of" target="SZTP"/> deals with voucher use in Secure Zero Touch Provisioning, for which this document also makes no changes to security.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="media-type-registry">
        <name>Media-Type Registry</name>
        <t>This section registers the "application/voucher-jws+json" in the "Media Types" registry.</t>
        <section anchor="applicationvoucher-jwsjson">
          <name>application/voucher-jws+json</name>
          <artwork><![CDATA[
Type name:  application
Subtype name:  voucher-jws+json
Required parameters:  none
Optional parameters:  none
Encoding considerations:  JWS+JSON vouchers are JOSE objects
                          signed with one or multiple signers.
Security considerations:  See section [Security Considerations]
Interoperability considerations:  The format is designed to be
  broadly interoperable.
Published specification:  [THIS RFC].
Applications that use this media type:  ANIMA, 6tisch, and other
  zero-touch bootstrapping/provisioning solutions
Additional information:
  Magic number(s):  None
  File extension(s):  .vjj
  Macintosh file type code(s):  none
Person & email address to contact for further information:  IETF
  ANIMA WG
Intended usage:  LIMITED
Restrictions on usage:  NONE
Author:  ANIMA WG
Change controller:  IETF
Provisional registration? (standards tree only):  NO
]]></artwork>
        </section>
      </section>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank the various reviewers for their input, in particular Steffen Fries, Ingo Wenda, ...TODO
Support in PoC implementations Hong Rui Li and He Peng Jia, ...TODO</t>
      <t>[RFC Editor: please delete]
TODO: ...</t>
    </section>
    <section anchor="changelog-rfc-editor-please-delete">
      <name>Changelog [RFC Editor: please delete]</name>
      <ul spacing="normal">
        <li>Added adoption call comments from Toerless.  Changed from [RFCxxxx] to [THING] style for some key references.</li>
        <li>Updated references "I-D.ietf-anima-brski-async-enroll" switched to "I-D.ietf-anima-brski-prm"</li>
        <li>Switch from "JWS Compact Serialization" to "General JWS JSON Serialization", as focus is now on "General JWS JSON Serialization"</li>
        <li>Include Voucher representation in "General JWS JSON Serialization" syntax</li>
        <li>Include examples A1, A2, A3 using "General JWS JSON Serialization"</li>
        <li>Added optional "typ": "voucher-jws+json" header parameter to JWS objects</li>
        <li>Examples folded according to RFC8792, Single Backslash rule</li>
        <li>Restructuring and clean-up, preparation for WGLC</li>
        <li>Included feedback from shepherd review</li>
      </ul>
      <t>-- back</t>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <t>These examples are folded according to <xref target="RFC8792"/> Single Backslash rule.</t>
      <section anchor="example-pledge-voucher-request-pvr-from-pledge-to-registrar">
        <name>Example Pledge Voucher Request - PVR (from Pledge to Registrar)</name>
        <t>The following is an example request sent from a Pledge to the Registrar, in "General JWS JSON Serialization".</t>
        <figure anchor="ExamplePledgeVoucherRequestfigure">
          <name>Example Pledge Voucher Request - PVR</name>
          <artwork align="left"><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

{
  "payload": "eyJpZXRmLXZvdWNoZXItcmVxdWVzdDp2b3VjaGVyIjp7InNlcmlhbC\
1udW1iZXIiOiIwMTIzNDU2Nzg5Iiwibm9uY2UiOiI2R3RuK1pRS04ySHFERlZrQkV4Wk\
xRPT0iLCJjcmVhdGVkLW9uIjoiMjAyMi0wNy0wOFQwODo0MDo0Mi44MjBaIiwicHJveG\
ltaXR5LXJlZ2lzdHJhci1jZXJ0IjoiTUlJQjRqQ0NBWWlnQXdJQkFnSUdBWFk3MmJiWk\
1Bb0dDQ3FHU000OUJBTUNNRFV4RXpBUkJnTlZCQW9NQ2sxNVFuVnphVzVsYzNNeERUQU\
xCZ05WQkFjTUJGTnBkR1V4RHpBTkJnTlZCQU1NQmxSbGMzUkRRVEFlRncweU1ERXlNRG\
N3TmpFNE1USmFGdzB6TURFeU1EY3dOakU0TVRKYU1ENHhFekFSQmdOVkJBb01DazE1UW\
5WemFXNWxjM014RFRBTEJnTlZCQWNNQkZOcGRHVXhHREFXQmdOVkJBTU1EMFJ2YldGcG\
JsSmxaMmx6ZEhKaGNqQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDlBd0VIQTBJQUJCaz\
E2Sy9pNzlvUmtLNVliZVBnOFVTUjgvdXMxZFBVaVpITXRva1NkcUtXNWZuV3NCZCtxUk\
w3V1JmZmVXa3lnZWJvSmZJbGx1cmNpMjV3bmhpT1ZDR2plekI1TUIwR0ExVWRKUVFXTU\
JRR0NDc0dBUVVGQndNQkJnZ3JCZ0VGQlFjREhEQU9CZ05WSFE4QkFmOEVCQU1DQjRBd1\
NBWURWUjBSQkVFd1A0SWRjbVZuYVhOMGNtRnlMWFJsYzNRdWMybGxiV1Z1Y3kxaWRDNX\
VaWFNDSG5KbFoybHpkSEpoY2kxMFpYTjBOaTV6YVdWdFpXNXpMV0owTG01bGREQUtCZ2\
dxaGtqT1BRUURBZ05JQURCRkFpQnhsZEJoWnEwRXY1SkwyUHJXQ3R5UzZoRFlXMXlDTy\
9SYXVicEM3TWFJRGdJaEFMU0piZ0xuZ2hiYkFnMGRjV0ZVVm8vZ0dOMC9qd3pKWjBTbD\
JoNHhJWGsxIn19",
  "signatures": [{
    "protected": "eyJ4NWMiOlsiTUlJQitUQ0NBYUNnQXdJQkFnSUdBWG5WanNVNU\
1Bb0dDQ3FHU000OUJBTUNNRDB4Q3pBSkJnTlZCQVlUQWtGUk1SVXdFd1lEVlFRS0RBeE\
thVzVuU21sdVowTnZjbkF4RnpBVkJnTlZCQU1NRGtwcGJtZEthVzVuVkdWemRFTkJNQ0\
FYRFRJeE1EWXdOREExTkRZeE5Gb1lEems1T1RreE1qTXhNak0xT1RVNVdqQlNNUXN3Q1\
FZRFZRUUdFd0pCVVRFVk1CTUdBMVVFQ2d3TVNtbHVaMHBwYm1kRGIzSndNUk13RVFZRF\
ZRUUZFd293TVRJek5EVTJOemc1TVJjd0ZRWURWUVFEREE1S2FXNW5TbWx1WjBSbGRtbG\
paVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUFCQzc5bGlhUmNCalpjRU\
VYdzdyVWVhdnRHSkF1SDRwazRJNDJ2YUJNc1UxMWlMRENDTGtWaHRVVjIxbXZhS0N2TX\
gyWStTTWdROGZmd0wyM3ozVElWQldqZFRCek1Dc0dDQ3NHQVFVRkJ3RWdCQjhXSFcxaG\
MyRXRkR1Z6ZEM1emFXVnRaVzV6TFdKMExtNWxkRG81TkRRek1COEdBMVVkSXdRWU1CYU\
FGRlFMak56UFwvU1wva291alF3amc1RTVmdndjWWJNQk1HQTFVZEpRUU1NQW9HQ0NzR0\
FRVUZCd01DTUE0R0ExVWREd0VCXC93UUVBd0lIZ0RBS0JnZ3Foa2pPUFFRREFnTkhBRE\
JFQWlCdTN3UkJMc0pNUDVzTTA3MEgrVUZyeU5VNmdLekxPUmNGeVJST2xxcUhpZ0lnWE\
NtSkxUekVsdkQycG9LNmR4NmwxXC91eW1UbmJRRERmSmxhdHVYMlJvT0U9Il0sInR5cC\
I6InZvdWNoZXItandzK2pzb24iLCJhbGciOiJFUzI1NiJ9",
    "signature": "abVg4TDGzSTjVHkQlNeIW3ABu5ZXdMl1cEqwcIAlHFW4BrlGbO\
-DRTKfyCOGxSW49-ktJcrVlYgKqC4xmZoy0Q"
  }]
}
]]></artwork>
        </figure>
      </section>
      <section anchor="example-parboiled-registrar-voucher-request-rvr-from-registrar-to-masa">
        <name>Example Parboiled Registrar Voucher Request - RVR (from Registrar to MASA)</name>
        <t>The term parboiled refers to food which is partially cooked.
In <xref target="BRSKI"/>, the term refers to a Pledge voucher-request (PVR) which has been received by the Registrar, and then has been processed by the Registrar ("cooked"), and is now being forwarded to the MASA.</t>
        <t>The following is an example Registrar voucher-request (RVR) sent from the Registrar to the MASA, in "General JWS JSON Serialization".
Note that the previous PVR can be seen in the payload as "prior-signed-voucher-request".</t>
        <figure anchor="ExampleParboiledRegistrarVoucherRequestfigure">
          <name>Example Parboiled Registrar Voucher Request - RVR</name>
          <artwork align="left"><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

{
  "payload": "eyJpZXRmLXZvdWNoZXItcmVxdWVzdDp2b3VjaGVyIjp7InNlcmlhbC\
1udW1iZXIiOiIwMTIzNDU2Nzg5IiwiaWRldmlkLWlzc3VlciI6IkJCZ3dGb0FVVkF1TT\
NNLzlMK1NpNk5EQ09Ea1RsKy9CeGhzPSIsIm5vbmNlIjoiNkd0bitaUUtOMkhxREZWa0\
JFeFpMUT09IiwicHJpb3Itc2lnbmVkLXZvdWNoZXItcmVxdWVzdCI6ImV5SndZWGxzYj\
JGa0lqb2laWGxLY0ZwWVVtMU1XRnAyWkZkT2IxcFlTWFJqYlZaNFpGZFdlbVJFY0RKaU\
0xWnFZVWRXZVVscWNEZEpiazVzWTIxc2FHSkRNWFZrVnpGcFdsaEphVTlwU1hkTlZFbD\
ZUa1JWTWs1Nlp6VkphWGRwWW0wNWRWa3lWV2xQYVVreVVqTlNkVXN4Y0ZKVE1EUjVVMG\
hHUlZKc1duSlJhMVkwVjJ0NFVsQlVNR2xNUTBwcVkyMVdhR1JIVm10TVZ6bDFTV3B2YV\
UxcVFYbE5hVEIzVG5rd2QwOUdVWGRQUkc4d1RVUnZNRTFwTkRSTmFrSmhTV2wzYVdOSV\
NuWmxSMngwWVZoU05VeFlTbXhhTW14NlpFaEthR05wTVdwYVdFb3dTV3B2YVZSVmJFcF\
JhbEp4VVRCT1FsZFhiRzVSV0dSS1VXdEdibE5WWkVKWFJtc3pUVzFLYVZkck1VSmlNR1\
JFVVROR1NGVXdNREJQVlVwQ1ZGVk9UbEpHVmpSU1dIQkNWV3RLYmxSc1drTlJWemxPVV\
RKemVFNVdSblZXYm5Cb1ZucFdjMWw2VGs1bFJWSlZVVlY0UTFvd05WZFJhMFpxVkZWS1\
IxUnVRbXRTTVZZMFVraHdRbFJyU201VWJGcERVVlV4VGxGdGVGTmlSMDE2Vld0U1VsWk\
ZSbXhTYm1OM1pWVXhSVkpZYkU1U1IwNHpWRzF3Ums1Rk1WVlRiVVpIWkhwQ05sUlZVa1\
psVlRGRldUTmtUMkZyVlRCVVZsSkxXVlV4UlU1SWFFWmxhMFpUVVcxa1QxWnJTa0ppTU\
RGRVlYcEZNVlZYTlZkbGJVWllUbGQ0YWswd01UUlNSbEpDVkVWS2JsUnNXa05SVjA1T1\
VXdGFUMk5IVWtoV1dHaElVa1ZHV0ZGdFpFOVdhMHBDVkZVeFJVMUdTakpaYkdSSFkwZE\
tjMU50ZUdGTmJYZzJXa1ZvUzJGSFRuRlJiSEJPVVdzeFNGRnViSGhTTVU1T1RrUnNRbG\
93VmtoUk1FNTRVakZPVGs1RWJFSmtNRlpKVVZSQ1NsRlZTa05oZWtVeVUzazVjRTU2Yk\
haVmJYUk1UbFpzYVZwV1FtNVBSbFpVVldwbmRtUllUWGhhUmtKV1lWWndTVlJZVW5aaE\
1VNXJZMVYwV0U1WFduVldNMDVEV2tOMGVGVnJkek5XTVVwdFdtMVdXR0V6Ykc1YVYwcD\
JVMjFhU21KSGVERmpiVTV3VFdwV00ySnRhSEJVTVZwRVVqSndiR1ZyU1RGVVZVbDNVak\
JGZUZaWFVrdFZWa1pZVkZWS1VsSXdUa1JqTUdSQ1ZWWldSMUZ1WkU1UmEwcHVXak5LUT\
Fvd1ZrZFJiRVpxVWtWb1JWRlZPVU5hTURWWFUwWkZORkZyUm0xUFJWWkRVVlV4UkZGcV\
VrSmtNVTVDVjFWU1YxVnFRbE5SYTFaR1pERkJNRk5YVW1waVZscDFXVlpvVDAxSFRuUl\
NibXhOVjBaS2MxbDZUbEprVjAxNVlrZDRhVll4V2pGWk0ydDRZVmRTUkU1WVZtRlhSaz\
VFVTBjMVMySkdiM2xpU0hCclUwVndiMWt5YTNoTlJuQlpWR3BDVDJGVVZqWlpWbVJYWk\
Vad1dFNVljRTFXTUc5M1ZFY3dNV0pIVWtWUlZYUkRXakprZUdGSGRIRlVNVUpTVlZWU1\
Fsb3dOVXBSVlZKRFVtdEdjRkZ1YUhOYVJVcHZWMjVGZDFKWVdURlRhM2Q1VlVoS1dGRX\
pValZWZWxwdlVrWnNXRTFZYkVSVWVUbFRXVmhXYVdORlRUTlVWMFpLVWtka1NtRkZSaz\
FWTUhCcFdqQjRkVm95YUdsWmEwWnVUVWRTYWxZd1dsWldiVGgyV2pCa1QwMURPWEZrTT\
NCTFYycENWR0pFU205T1NHaEtWMGR6ZUVsdU1Ua2lMQ0p6YVdkdVlYUjFjbVZ6SWpwYm\
V5SndjbTkwWldOMFpXUWlPaUpsZVVvMFRsZE5hVTlzYzJsVVZXeEtVV2wwVlZFd1RrSl\
pWVTV1VVZoa1NsRnJSbTVUVldSQ1YwYzFWMkZ1VGxaT1ZURkNZakJrUkZFelJraFZNRE\
F3VDFWS1FsUlZUazVTUkVJMFVUTndRbE5yU201VWJGcERVVlpzVlZGWGRFZFZhekZUVm\
xoa1JtUXhiRVZXYkVaU1V6QlNRbVZGZEdoV2VsWjFWVEl4YzJSV2IzZFVibHBxWW10R0\
5GSnVjRUpXYTBwdVZHeGFRMUZWTVU1U1IzUjNZMGRLZEZwRmRHaFdlbFoxVm10a1YyVn\
RVa1pVYTBwT1VUQkdXVkpHVWtwbFJURkZWMWhrVDFKRlJYaFVhMUphWlVVMVIySXhiRV\
ZsYlhNeFZERlNjbVZGTVhGVVdHaE9ZV3N3ZUZReFVsWk9WbVJ4VVd4T1RsVllUak5STV\
VaYVVrWmFVbFZWWkVaa01IQkRWbFpTUmxack1VTlVWV1JDVFZaV1JsRXlaRE5VVms1MF\
lraFdZVTFJUW5kWmJURnJVa2RKZWxOdVpFNVZhekV6VWxaR1dsSkdXbEpWVlZwR1pEST\
VNMVJXVWtwbGF6VkZWbFJLVDJWdFl6RlVWa3BxWkRCYVVsZFZVbGRWVmtaRlVrVkZNVk\
15UmxoT1Z6VlVZbGQ0TVZkcVFsTmlSMUowWWtkd1lWWkZTbUZVVlVwT1VqQktOV05WWk\
ZSVVZGRTFVVmRrUmxJd1RrUmpWV1JVVkZSUk5WRllaRVpUUlVWM1UxVkdRMUY2WXpWaV\
IyeG9WVzFPUTJGc2NHcFNWVlpaWkhwa2VWWlhWbWhrYmxKSVUydEdNVk5FVW5kaGVsSk\
tUa1JLTWxsVlNrNWpNVlY0VFZkc1RWSkZUa1JVUjNSWFlVaFNWbFpxU1hoaVdGcG9Vek\
JPTWxSWVozbFhVM1JVVkZka1VrOUhXbTFrTUhkNVRUTnZlbFpGYkZkUmJHUnhXa1pTUT\
JWck1VUmpNR1JFVVROT1NGRldSbFpTYTBvelVsZGtRMUZxYUZoVFJtTjRZVWROZVZKWV\
VtdFNNVm8yV2tWTk1XVnRSbGhXYmxKaFZucFdObFJHWkV0TlJYaDBUbGQ0YTFKSE9ERl\
VhMUpTWldzeFEwOUZaRUpOVmxaclUxaGtVbGRWTVVOWlZVWkhVbXhHVFdGck5UWlZSbm\
QyVlRGM2RtRXlPVEZoYkVZellXMWpNVkpVVm0xa2JtUnFWMWRLVGxGck1VaFJWRVpXV2\
tWd1VsVlZNVTVSVnpsSVVUQk9lbEl3UmxKV1ZWcERaREF4UkZSVlJUQlNNRVY0VmxkU1\
JXUXdWa05ZUXprelZWVldRbVF3YkVsYU1GSkNVekJLYmxvelJtOWhNbkJRVlVaR1VsSk\
ZSbTVVYTJoQ1VrVktSbEZYYkVOa1ZFNHpWV3RLVFdNd2NFNVZSRlo2VkZSQk0wMUZaM0\
pXVlZwNVpWVTFWazV0WkV4bGEzaFFWVzFPUjJWV1NsTlVNbmg0WTFWb2NGb3diRzVYUl\
U1MFUydDRWV1ZyVm5Oa2ExRjVZMGM1VEU1dFVqUk9iWGQ0V0VNNU1XVlhNVlZpYlVwU1\
VrVlNiVk50ZUdoa1NGWlpUV3hLZGxRd1ZUbEpiREJ6U1c1U05XTkRTVFpKYmxwMlpGZE\
9iMXBZU1hSaGJtUjZTekp3ZW1JeU5HbE1RMHBvWWtkamFVOXBTa1pWZWtreFRtbEtPU0\
lzSW5OcFoyNWhkSFZ5WlNJNkltRmlWbWMwVkVSSGVsTlVhbFpJYTFGc1RtVkpWek5CUW\
5VMVdsaGtUV3d4WTBWeGQyTkpRV3hJUmxjMFFuSnNSMkpQTFVSU1ZFdG1lVU5QUjNoVF\
Z6UTVMV3QwU21OeVZteFpaMHR4UXpSNGJWcHZlVEJSSW4xZGZRPT0iLCJjcmVhdGVkLW\
9uIjoiMjAyMi0wNy0wOFQwODo0MDo0Mi44NDhaIn19",
  "signatures": [{
    "protected": "eyJ4NWMiOlsiTUlJQm96Q0NBVXFnQXdJQkFnSUdBVzBlTHVJRk\
1Bb0dDQ3FHU000OUJBTUNNRFV4RXpBUkJnTlZCQW9NQ2sxNVFuVnphVzVsYzNNeERUQU\
xCZ05WQkFjTUJGTnBkR1V4RHpBTkJnTlZCQU1NQmxSbGMzUkRRVEFlRncweE9UQTVNVE\
V3TWpNM016SmFGdzB5T1RBNU1URXdNak0zTXpKYU1GUXhFekFSQmdOVkJBb01DazE1UW\
5WemFXNWxjM014RFRBTEJnTlZCQWNNQkZOcGRHVXhMakFzQmdOVkJBTU1KVkpsWjJsem\
RISmhjaUJXYjNWamFHVnlJRkpsY1hWbGMzUWdVMmxuYm1sdVp5QkxaWGt3V1RBVEJnY3\
Foa2pPUFFJQkJnZ3Foa2pPUFFNQkJ3TkNBQVQ2eFZ2QXZxVHoxWlVpdU5XaFhwUXNrYV\
B5N0FISFFMd1hpSjBpRUx0NnVOUGFuQU4wUW5XTVlPXC8wQ0RFaklrQlFvYnc4WUtxan\
R4SkhWU0dUajlLT295Y3dKVEFUQmdOVkhTVUVEREFLQmdnckJnRUZCUWNESERBT0JnTl\
ZIUThCQWY4RUJBTUNCNEF3Q2dZSUtvWkl6ajBFQXdJRFJ3QXdSQUlnWXIyTGZxb2FDS0\
RGNFJBY01tSmkrTkNacWRTaXVWdWdJU0E3T2hLUnEzWUNJRHhuUE1NbnBYQU1UclBKdV\
BXeWNlRVIxMVB4SE9uKzBDcFNIaTJxZ3BXWCIsIk1JSUJwRENDQVVtZ0F3SUJBZ0lHQV\
cwZUx1SCtNQW9HQ0NxR1NNNDlCQU1DTURVeEV6QVJCZ05WQkFvTUNrMTVRblZ6YVc1bG\
MzTXhEVEFMQmdOVkJBY01CRk5wZEdVeER6QU5CZ05WQkFNTUJsUmxjM1JEUVRBZUZ3MH\
hPVEE1TVRFd01qTTNNekphRncweU9UQTVNVEV3TWpNM016SmFNRFV4RXpBUkJnTlZCQW\
9NQ2sxNVFuVnphVzVsYzNNeERUQUxCZ05WQkFjTUJGTnBkR1V4RHpBTkJnTlZCQU1NQm\
xSbGMzUkRRVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUFCT2t2a1RIdT\
hRbFQzRkhKMVVhSTcrV3NIT2IwVVMzU0FMdEc1d3VLUURqaWV4MDZcL1NjWTVQSmlidm\
dIVEIrRlwvUVRqZ2VsSEd5MVlLcHdjTk1jc1N5YWpSVEJETUJJR0ExVWRFd0VCXC93UU\
lNQVlCQWY4Q0FRRXdEZ1lEVlIwUEFRSFwvQkFRREFnSUVNQjBHQTFVZERnUVdCQlRvWk\
lNelFkc0RcL2pcLytnWFwvN2NCSnVjSFwvWG1qQUtCZ2dxaGtqT1BRUURBZ05KQURCR0\
FpRUF0eFEzK0lMR0JQSXRTaDRiOVdYaFhOdWhxU1A2SCtiXC9MQ1wvZlZZRGpRNm9DSV\
FERzJ1UkNIbFZxM3loQjU4VFhNVWJ6SDgrT2xoV1V2T2xSRDNWRXFEZGNRdz09Il0sIn\
R5cCI6InZvdWNoZXItandzK2pzb24iLCJhbGciOiJFUzI1NiJ9",
    "signature": "0fzuqVdyhemWsu_HQeF-CmQwJeLp9IStNf-bWZwz6SojrEOR4a\
Dq6VStyG8eWXjGHNZiRyyLJo7RP1rKatuS2w"
  }]
}
]]></artwork>
        </figure>
      </section>
      <section anchor="example-voucher-response-from-masa-to-pledge-via-registrar">
        <name>Example Voucher Response (from MASA to Pledge, via Registrar)</name>
        <t>The following is an example voucher response from MASA to Pledge via Registrar, in "General JWS JSON Serialization".</t>
        <figure anchor="ExampleVoucherResponsefigure">
          <name>Example Voucher Response</name>
          <artwork align="left"><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

{
  "payload": "eyJpZXRmLXZvdWNoZXI6dm91Y2hlciI6eyJhc3NlcnRpb24iOiJsb2\
dnZWQiLCJzZXJpYWwtbnVtYmVyIjoiMDEyMzQ1Njc4OSIsIm5vbmNlIjoiZGRoSGQ4Ml\
FpUGtzMDBTck1USTlEUT09IiwiY3JlYXRlZC1vbiI6IjIwMjItMDctMDdUMTc6NDc6MD\
EuODkwWiIsInBpbm5lZC1kb21haW4tY2VydCI6Ik1JSUJwRENDQVVtZ0F3SUJBZ0lHQV\
cwZUx1SCtNQW9HQ0NxR1NNNDlCQU1DTURVeEV6QVJCZ05WQkFvTUNrMTVRblZ6YVc1bG\
MzTXhEVEFMQmdOVkJBY01CRk5wZEdVeER6QU5CZ05WQkFNTUJsUmxjM1JEUVRBZUZ3MH\
hPVEE1TVRFd01qTTNNekphRncweU9UQTVNVEV3TWpNM016SmFNRFV4RXpBUkJnTlZCQW\
9NQ2sxNVFuVnphVzVsYzNNeERUQUxCZ05WQkFjTUJGTnBkR1V4RHpBTkJnTlZCQU1NQm\
xSbGMzUkRRVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUFCT2t2a1RIdT\
hRbFQzRkhKMVVhSTcrV3NIT2IwVVMzU0FMdEc1d3VLUURqaWV4MDYvU2NZNVBKaWJ2Z0\
hUQitGL1FUamdlbEhHeTFZS3B3Y05NY3NTeWFqUlRCRE1CSUdBMVVkRXdFQi93UUlNQV\
lCQWY4Q0FRRXdEZ1lEVlIwUEFRSC9CQVFEQWdJRU1CMEdBMVVkRGdRV0JCVG9aSU16UW\
RzRC9qLytnWC83Y0JKdWNIL1htakFLQmdncWhrak9QUVFEQWdOSkFEQkdBaUVBdHhRMy\
tJTEdCUEl0U2g0YjlXWGhYTnVocVNQNkgrYi9MQy9mVllEalE2b0NJUURHMnVSQ0hsVn\
EzeWhCNThUWE1VYnpIOCtPbGhXVXZPbFJEM1ZFcURkY1F3PT0ifX0",
  "signatures": [{
    "protected": "eyJ4NWMiOlsiTUlJQmt6Q0NBVGlnQXdJQkFnSUdBV0ZCakNrWU\
1Bb0dDQ3FHU000OUJBTUNNRDB4Q3pBSkJnTlZCQVlUQWtGUk1SVXdFd1lEVlFRS0RBeE\
thVzVuU21sdVowTnZjbkF4RnpBVkJnTlZCQU1NRGtwcGJtZEthVzVuVkdWemRFTkJNQj\
RYRFRFNE1ERXlPVEV3TlRJME1Gb1hEVEk0TURFeU9URXdOVEkwTUZvd1R6RUxNQWtHQT\
FVRUJoTUNRVkV4RlRBVEJnTlZCQW9NREVwcGJtZEthVzVuUTI5eWNERXBNQ2NHQTFVRU\
F3d2dTbWx1WjBwcGJtZERiM0p3SUZadmRXTm9aWElnVTJsbmJtbHVaeUJMWlhrd1dUQV\
RCZ2NxaGtqT1BRSUJCZ2dxaGtqT1BRTUJCd05DQUFTQzZiZUxBbWVxMVZ3NmlRclJzOF\
IwWlcrNGIxR1d5ZG1XczJHQU1GV3diaXRmMm5JWEgzT3FIS1Z1OHMyUnZpQkdOaXZPS0\
dCSEh0QmRpRkVaWnZiN294SXdFREFPQmdOVkhROEJBZjhFQkFNQ0I0QXdDZ1lJS29aSX\
pqMEVBd0lEU1FBd1JnSWhBSTRQWWJ4dHNzSFAyVkh4XC90elVvUVwvU3N5ZEwzMERRSU\
5FdGNOOW1DVFhQQWlFQXZJYjNvK0ZPM0JUbmNMRnNhSlpSQWtkN3pPdXNuXC9cL1pLT2\
FFS2JzVkRpVT0iXSwidHlwIjoidm91Y2hlci1qd3MranNvbiIsImFsZyI6IkVTMjU2In\
0",
    "signature": "y1HLYBFlwouf42XWSKUWjeYQHnG2Q6A4bjA7hvTkB3z1dPwTUl\
jPHtuN2Qex6gDxTfaSiKeoXGsOD4JWOgQJPg"
  }]
}
]]></artwork>
        </figure>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="BRSKI">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin">
              <organization/>
            </author>
            <author fullname="M. Richardson" initials="M." surname="Richardson">
              <organization/>
            </author>
            <author fullname="T. Eckert" initials="T." surname="Eckert">
              <organization/>
            </author>
            <author fullname="M. Behringer" initials="M." surname="Behringer">
              <organization/>
            </author>
            <author fullname="K. Watsen" initials="K." surname="Watsen">
              <organization/>
            </author>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane.  To do this, a Secure Key Infrastructure is bootstrapped.  This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline.  We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device.  The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="SZTP">
          <front>
            <title>Secure Zero Touch Provisioning (SZTP)</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen">
              <organization/>
            </author>
            <author fullname="I. Farrer" initials="I." surname="Farrer">
              <organization/>
            </author>
            <author fullname="M. Abrahamsson" initials="M." surname="Abrahamsson">
              <organization/>
            </author>
            <date month="April" year="2019"/>
            <abstract>
              <t>This document presents a technique to securely provision a networking device when it is booting in a factory-default state.  Variations in the solution enable it to be used on both public and private networks.  The provisioning steps are able to update the boot image, commit an initial configuration, and execute arbitrary scripts to address auxiliary needs.  The updated device is subsequently able to establish secure connections with other systems.  For instance, a device may establish NETCONF (RFC 6241) and/or RESTCONF (RFC 8040) connections with deployment-specific network management systems.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8572"/>
          <seriesInfo name="DOI" value="10.17487/RFC8572"/>
        </reference>
        <reference anchor="RFC8366">
          <front>
            <title>A Voucher Artifact for Bootstrapping Protocols</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen">
              <organization/>
            </author>
            <author fullname="M. Richardson" initials="M." surname="Richardson">
              <organization/>
            </author>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin">
              <organization/>
            </author>
            <author fullname="T. Eckert" initials="T." surname="Eckert">
              <organization/>
            </author>
            <date month="May" year="2018"/>
            <abstract>
              <t>This document defines a strategy to securely assign a pledge to an owner using an artifact signed, directly or indirectly, by the pledge's manufacturer.  This artifact is known as a "voucher".</t>
              <t>This document defines an artifact format as a YANG-defined JSON document that has been signed using a Cryptographic Message Syntax (CMS) structure.  Other YANG-derived formats are possible.  The voucher artifact is normally generated by the pledge's manufacturer (i.e., the Manufacturer Authorized Signing Authority (MASA)).</t>
              <t>This document only defines the voucher artifact, leaving it to other documents to describe specialized protocols for accessing it.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8366"/>
          <seriesInfo name="DOI" value="10.17487/RFC8366"/>
        </reference>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones">
              <organization/>
            </author>
            <author fullname="J. Bradley" initials="J." surname="Bradley">
              <organization/>
            </author>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura">
              <organization/>
            </author>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures.  Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification.  Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray">
              <organization/>
            </author>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format.  It was derived from the ECMAScript Programming Language Standard.  JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper">
              <organization/>
            </author>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <author fullname="W. Polk" initials="W." surname="Polk">
              <organization/>
            </author>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC5652">
          <front>
            <title>Cryptographic Message Syntax (CMS)</title>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the Cryptographic Message Syntax (CMS).  This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="70"/>
          <seriesInfo name="RFC" value="5652"/>
          <seriesInfo name="DOI" value="10.17487/RFC5652"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049.  It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC8792">
          <front>
            <title>Handling Long Lines in Content of Internet-Drafts and RFCs</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen">
              <organization/>
            </author>
            <author fullname="E. Auerswald" initials="E." surname="Auerswald">
              <organization/>
            </author>
            <author fullname="A. Farrel" initials="A." surname="Farrel">
              <organization/>
            </author>
            <author fullname="Q. Wu" initials="Q." surname="Wu">
              <organization/>
            </author>
            <date month="June" year="2020"/>
            <abstract>
              <t>This document defines two strategies for handling long lines in width-bounded text content.  One strategy, called the "single backslash" strategy, is based on the historical use of a single backslash ('\') character to indicate where line-folding has occurred, with the continuation occurring with the first character that is not a space character (' ') on the next line.  The second strategy, called the "double backslash" strategy, extends the first strategy by adding a second backslash character to identify where the continuation begins and is thereby able to handle cases not supported by the first strategy.  Both strategies use a self-describing header enabling automated reconstitution of the original content.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8792"/>
          <seriesInfo name="DOI" value="10.17487/RFC8792"/>
        </reference>
        <reference anchor="RFC8812">
          <front>
            <title>CBOR Object Signing and Encryption (COSE) and JSON Object Signing and Encryption (JOSE) Registrations for Web Authentication (WebAuthn) Algorithms</title>
            <author fullname="M. Jones" initials="M." surname="Jones">
              <organization/>
            </author>
            <date month="August" year="2020"/>
            <abstract>
              <t>The W3C Web Authentication (WebAuthn) specification and the FIDO Alliance FIDO2 Client to Authenticator Protocol (CTAP) specification use CBOR Object Signing and Encryption (COSE) algorithm identifiers.  This specification registers the following algorithms (which are used by WebAuthn and CTAP implementations) in the IANA "COSE Algorithms" registry: RSASSA-PKCS1-v1_5 using SHA-256, SHA-384, SHA-512, and SHA-1; and Elliptic Curve Digital Signature Algorithm (ECDSA) using the secp256k1 curve and SHA-256.  It registers the secp256k1 elliptic curve in the IANA "COSE Elliptic Curves" registry.  Also, for use with JSON Object Signing and Encryption (JOSE), it registers the algorithm ECDSA using the secp256k1 curve and SHA-256 in the IANA "JSON Web Signature and Encryption Algorithms" registry and the secp256k1 elliptic curve in the IANA "JSON Web Key Elliptic Curve" registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8812"/>
          <seriesInfo name="DOI" value="10.17487/RFC8812"/>
        </reference>
        <reference anchor="onpath" target="https://mailarchive.ietf.org/arch/msg/saag/m1r9uo4xYznOcf85Eyk0Rhut598/">
          <front>
            <title>can an on-path attacker drop traffic?</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="I-D.ietf-anima-constrained-voucher">
          <front>
            <title>Constrained Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Peter Van der Stok" initials="P." surname="Van der Stok">
              <organization>vanderstok consultancy</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Esko Dijk" initials="E." surname="Dijk">
              <organization>IoTconsultancy.nl</organization>
            </author>
            <date day="2" month="January" year="2023"/>
            <abstract>
              <t>   This document defines the Constrained Bootstrapping Remote Secure Key
   Infrastructure (Constrained BRSKI) protocol, which provides a
   solution for secure zero-touch bootstrapping of resource-constrained
   (IoT) devices into the network of a domain owner.  This protocol is
   designed for constrained networks, which may have limited data
   throughput or may experience frequent packet loss.  Constrained BRSKI
   is a variant of the BRSKI protocol, which uses an artifact signed by
   the device manufacturer called the "voucher" which enables a new
   device and the owner's network to mutually authenticate.  While the
   BRSKI voucher is typically encoded in JSON, Constrained BRSKI defines
   a compact CBOR-encoded voucher.  The BRSKI voucher is extended with
   new data types that allow for smaller voucher sizes.  The Enrollment
   over Secure Transport (EST) protocol, used in BRSKI, is replaced with
   EST-over-CoAPS; and HTTPS used in BRSKI is replaced with CoAPS.  This
   document Updates RFC 8366 and RFC 8995.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-constrained-voucher-19"/>
        </reference>
        <reference anchor="I-D.ietf-anima-brski-prm">
          <front>
            <title>BRSKI with Pledge in Responder Mode (BRSKI-PRM)</title>
            <author fullname="Steffen Fries" initials="S." surname="Fries">
              <organization>Siemens AG</organization>
            </author>
            <author fullname="Thomas Werner" initials="T." surname="Werner">
              <organization>Siemens AG</organization>
            </author>
            <author fullname="Eliot Lear" initials="E." surname="Lear">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date day="21" month="February" year="2023"/>
            <abstract>
              <t>   This document defines enhancements to bootstrapping a remote secure
   key infrastructure (BRSKI, RFC8995) to facilitate bootstrapping in
   domains featuring no or only time limited connectivity between a
   pledge and the domain registrar.  It specifically targets situations
   in which the interaction model changes from a pledge-initiated-mode,
   as used in BRSKI, to a pledge-responding-mode as described in this
   document.  To support the pledge-responding mode, BRSKI-PRM
   introduces a new component, the registrar-agent, which facilitates
   the communication between pledge and registrar during the
   bootstrapping phase.  To establish the trust relation between pledge
   and domain registrar, BRSKI-PRM relies on object security rather than
   transport security.

   The approach defined here is agnostic with respect to the underlying
   enrollment protocol which connects the pledge and the domain
   registrar to the Domain CA.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-brski-prm-07"/>
        </reference>
        <reference anchor="I-D.kuehlewind-update-tag">
          <front>
            <title>Definition of new tags for relations between RFCs</title>
            <author fullname="Mirja Kühlewind" initials="M." surname="Kühlewind">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Suresh Krishnan" initials="S." surname="Krishnan">
              <organization>Kaloom</organization>
            </author>
            <date day="12" month="July" year="2021"/>
            <abstract>
              <t>   An RFC can include a tag called "Updates" which can be used to link a
   new RFC to an existing RFC.  On publication of such an RFC, the
   existing RFC will include an additional metadata tag called "Updated
   by" which provides a link to the new RFC.  However, this tag pair is
   not well-defined and therefore it is currently used for multiple
   different purposes, which leads to confusion about the actual meaning
   of this tag and inconsistency in its use.

   This document recommends the discontinuation of the use of the
   updates/updated by tag pair, and instead proposes three new tag pairs
   that have well-defined meanings and use cases.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-kuehlewind-update-tag-04"/>
        </reference>
      </references>
    </references>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="T." surname="Eckert" fullname="Toerless Eckert">
        <organization>Futurewei Technologies Inc.</organization>
        <address>
          <email>tte+ietf@cs.fau.de</email>
        </address>
      </contact>
      <contact initials="E." surname="Dijk" fullname="Esko Dijk">
        <organization/>
        <address>
          <email>esko.dijk@iotconsultancy.nl</email>
        </address>
      </contact>
      <contact initials="S." surname="Fries" fullname="Steffen Fries">
        <organization>Siemens AG</organization>
        <address>
          <email>steffen.fries@siemens.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
