<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.23 (Ruby 2.6.10) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-anima-jws-voucher-07" category="std" consensus="true" updates="RFC8366" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.16.0 -->
  <front>
    <title abbrev="JWS-voucher">JWS signed Voucher Artifacts for Bootstrapping Protocols</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-anima-jws-voucher-07"/>
    <author initials="T." surname="Werner" fullname="Thomas Werner">
      <organization>Siemens AG</organization>
      <address>
        <email>thomas-werner@siemens.com</email>
      </address>
    </author>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <date year="2023" month="August" day="18"/>
    <area>Internet</area>
    <workgroup>anima Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>RFC8366 defines a digital artifact called voucher as a YANG-defined JSON document that is signed using a Cryptographic Message Syntax (CMS) structure.
This document introduces a variant of the voucher artifact in which CMS is replaced by the JSON Object Signing and Encryption (JOSE) mechanism described in RFC7515 to support deployments in which JOSE is preferred over CMS.</t>
      <t>In addition to explaining how the format is created, the "application/voucher-jws+json" media type is registered and examples are provided.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>"A Voucher Artifact for Bootstrapping Protocols" <xref target="I-D.draft-ietf-anima-rfc8366bis"/> defines a YANG-based data structure used in "Bootstrapping Remote Secure Key Infrastructure" <xref target="BRSKI"/> and
"Secure Zero Touch Provisioning" <xref target="SZTP"/> to transfer ownership of a device from a manufacturer to a new owner (site domain).
That document provides a serialization of the voucher data to JSON <xref target="RFC8259"/> with a signature according to the Cryptographic Message Syntax (CMS) <xref target="RFC5652"/>.
The resulting voucher artifact has the media type "application/voucher-cms+json".</t>
      <t><xref target="I-D.ietf-anima-constrained-voucher"/> provides a serialization of the voucher to CBOR <xref target="RFC8949"/>
with the signature format of COSE <xref target="RFC8812"/>
and the media type "application/voucher-cose+cbor".</t>
      <t>This document provides a serialization of the voucher data to JSON <xref target="RFC8259"/>
with the signature in form of JSON Web Signature (JWS) <xref target="RFC7515"/>
and the media type "application/voucher-jws+json".
The encoding specified in this document is used by <xref target="I-D.ietf-anima-brski-prm"/>
and may be more handy for use cases requiring signed JSON objects.</t>
      <t>This document does not extend the YANG definition of <xref target="I-D.draft-ietf-anima-rfc8366bis"/>.</t>
      <t>With the availability of different encoded vouchers, it is up to an industry specific application statement to indicate/decide which voucher signature format is to be used.
There is no provision across the different voucher signature formats that a receiver could safely recognize which format it uses unless additional context is provided.
For example, <xref target="BRSKI"/> provides this context via the media type for the voucher artifact.
This document utilizes the optional "typ" (Type) Header Parameter of JWS <xref target="RFC7515"/> to provide information about the signed object.</t>
      <t>This document should be considered an update to <xref target="I-D.draft-ietf-anima-rfc8366bis"/> in the category of "See Also" as per <xref target="I-D.kuehlewind-update-tag"/>.
TODO: double check with RFC8366bis</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <dl>
        <dt>Voucher:</dt>
        <dd>
          <t>A signed statement from the MASA service <xref target="I-D.draft-ietf-anima-rfc8366bis"/>.</t>
        </dd>
        <dt>JWS Voucher:</dt>
        <dd>
          <t>A JWS structure signing the JSON Voucher Data.</t>
        </dd>
        <dt>JSON Voucher Data:</dt>
        <dd>
          <t>An unsigned JSON document that conforms with the data model described by the ietf-voucher YANG module.</t>
        </dd>
        <dt>BASE64URL(OCTETS):</dt>
        <dd>
          <t>Denotes the base64url encoding of OCTETS, per <xref section="2" sectionFormat="of" target="RFC7515"/>.</t>
        </dd>
        <dt>UTF8(STRING):</dt>
        <dd>
          <t>Denotes the octets of the UTF-8 <xref target="RFC3629"/> representation of STRING, per <xref section="1" sectionFormat="of" target="RFC7515"/>.</t>
        </dd>
      </dl>
    </section>
    <section anchor="voucher-artifact-with-json-web-signature">
      <name>Voucher Artifact with JSON Web Signature</name>
      <t><xref target="RFC7515"/> defines the following serializations for JWS:</t>
      <ol spacing="normal" type="1"><li>"JWS Compact Serialization" in <xref section="7.1" sectionFormat="of" target="RFC7515"/></li>
        <li>"JWS JSON Serialization" in <xref section="7.2" sectionFormat="of" target="RFC7515"/>
- "General JWS JSON Serialization Syntax" in <xref section="7.2.1" sectionFormat="of" target="RFC7515"/>
- "Flattened JWS JSON Serialization Syntax" in <xref section="7.2.2" sectionFormat="of" target="RFC7515"/></li>
      </ol>
      <t>This document makes use of the "General JWS JSON Serialization Syntax" of <xref target="RFC7515"/> to support multiple signatures,
as already supported by <xref target="RFC8366"/> for CMS-signed vouchers.</t>
      <section anchor="voucher-representation-in-general-jws-json-serialization-syntax">
        <name>Voucher Representation in General JWS JSON Serialization Syntax</name>
        <t>JWS Voucher artifacts MUST use the "General JWS JSON Serialization Syntax" defined in <xref section="7.2.1" sectionFormat="of" target="RFC7515"/>.
A "JWS JSON Serialization Overview" is given in <xref section="3.2" sectionFormat="of" target="RFC7515"/> and more details on the JWS serializations in <xref section="7" sectionFormat="of" target="RFC7515"/>.
The following figure summarizes the serialization of JWS Voucher artifacts:</t>
        <figure anchor="VoucherGeneralJWSFigure">
          <name>Voucher Representation in General JWS JSON Serialization Syntax</name>
          <artwork align="left"><![CDATA[
    {
      "payload": BASE64URL(UTF8(JSON Voucher Data)),
      "signatures": [
        {
          "protected": BASE64URL(UTF8(JWS Protected Header)),
          "signature": BASE64URL(JWS Signature)
        }
      ]
    }
]]></artwork>
        </figure>
      </section>
      <section anchor="json-voucher-data">
        <name>JSON Voucher Data</name>
        <t>The JSON Voucher Data is an unsigned JSON document <xref target="RFC8259"/> that conforms with the data model described by the ietf-voucher YANG module <xref target="RFC7950"/> defined in <xref section="5.3" sectionFormat="of" target="I-D.draft-ietf-anima-rfc8366bis"/> and is encoded using the rules defined in <xref target="RFC7951"/>.
The following figure provides an example of JSON Voucher Data:</t>
        <figure anchor="VoucherGeneralJWSVoucherPayloadFigure">
          <name>Unsigned voucher data in JSON syntax</name>
          <artwork align="left"><![CDATA[
    {
      "ietf-voucher:voucher": {
        "assertion": "logged",
        "serial-number": "0123456789",
        "nonce": "5742698422680472",
        "created-on": "2022-07-08T03:01:24.618Z",
        "pinned-domain-cert": "base64encodedvalue=="
      }
    }
]]></artwork>
        </figure>
        <t>The JSON Voucher Data MUST be UTF-8 encoded to become the octet-based JWS Payload defined in <xref target="RFC7515"/>.
The JWS Payload is further base64url-encoded to become the string value of the "payload" member as described in <xref section="3.2" sectionFormat="of" target="RFC7515"/>.</t>
      </section>
      <section anchor="jws-protected-header">
        <name>JWS Protected Header</name>
        <t>The JWS Protected Header defined in <xref target="RFC7515"/> uses the standard header parameters "alg", "typ", and "x5c".
The octets of the UTF-8 representation of the JWS Protected Header are base64url-encoded to become the string value of the "protected" member as described in <xref section="3.2" sectionFormat="of" target="RFC7515"/>.</t>
        <t>The "alg" parameter MUST contain the algorithm type used to create the signature, e.g., "ES256" as defined in <xref section="4.1.1" sectionFormat="of" target="RFC7515"/>.
If present, the "typ" parameter SHOULD contain the value "TODO: voucher-jws+json" as defined in <xref section="4.1.9" sectionFormat="of" target="RFC7515"/>.</t>
        <t>If X.509 (PKIX) certificates <xref target="RFC5280"/> are used, the "x5c" parameter SHOULD contain the base64-encoded (not base64url-encoded) DER certificate and chain as defined in <xref section="4.1.6" sectionFormat="of" target="RFC7515"/>.
Vouchers will often need all certificates in the chain,
including what would be considered the trust anchor certificate,
because intermediate devices (such as the Registrar) may need to audit the artifact,
or end systems may need to pin a trust anchor for future operations.
Note, a trust anchor SHOULD be provided differently to be trusted.
This is consistent with <xref section="5.5.2" sectionFormat="of" target="BRSKI"/>.</t>
        <t>The following figure gives an example of a JWS Protected Header in JSON syntax:</t>
        <figure anchor="VoucherGeneralJWSProtectedHeaderFigure">
          <name>Decoded JWS Protected Header Example</name>
          <artwork align="left"><![CDATA[
    {
      "alg": "ES256",
      "typ": "voucher-jws+json",
      "x5c": [
        "base64encodedvalue1==",
        "base64encodedvalue2=="
      ]
    }  
]]></artwork>
        </figure>
      </section>
      <section anchor="jws-signature">
        <name>JWS Signature</name>
        <t>The JWS Signature is generated over the JWS Protected Header and the JWS Payload (= UTF-8 encoded JSON Voucher Data) as described in <xref section="5.1" sectionFormat="of" target="RFC7515"/>.
The generated JWS Signature is base64url-encoded to become the string value of the "signature" member.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>The Voucher Request reveals the IDevID of the component (Pledge) that is in the process of bootstrapping.</t>
      <t>This request occurs via HTTP-over-TLS, however, for the Pledge-to-Registrar TLS connection, the Pledge is provisionally accepting the Registrar server certificate.
Hence it is subject to disclosure by a Dolev-Yao attacker (a "malicious messenger") <xref target="ON-PATH"/>, as explained in <xref section="10.2" sectionFormat="of" target="BRSKI"/>.</t>
      <t>The use of a JWS header brings no new privacy considerations.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The issues of how <xref target="I-D.draft-ietf-anima-rfc8366bis"/> vouchers are used in a <xref target="BRSKI"/> system is addressed in <xref section="11" sectionFormat="of" target="BRSKI"/>.
This document does not change any of those issues, it just changes the signature technology used for voucher request and response artifacts.</t>
      <t><xref section="9" sectionFormat="of" target="SZTP"/> deals with voucher use in Secure Zero Touch Provisioning, for which this document also makes no changes to security.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="media-type-registry">
        <name>Media-Type Registry</name>
        <t>This section registers the "application/voucher-jws+json" in the "Media Types" registry.</t>
        <section anchor="applicationvoucher-jwsjson">
          <name>application/voucher-jws+json</name>
          <artwork><![CDATA[
Type name:  application
Subtype name:  voucher-jws+json
Required parameters:  none
Optional parameters:  none
Encoding considerations:  JWS+JSON vouchers are JOSE objects
                          signed with one or multiple signers.
Security considerations:  See section [Security Considerations]
Interoperability considerations:  The format is designed to be
  broadly interoperable.
Published specification:  [THIS RFC].
Applications that use this media type:  ANIMA, 6tisch, and other
  zero-touch bootstrapping/provisioning solutions
Additional information:
  Magic number(s):  None
  File extension(s):  .vjj
  Macintosh file type code(s):  none
Person & email address to contact for further information:  IETF
  ANIMA WG
Intended usage:  LIMITED
Restrictions on usage:  NONE
Author:  ANIMA WG
Change controller:  IETF
Provisional registration? (standards tree only):  NO
]]></artwork>
        </section>
      </section>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank the various reviewers for their input, in particular Steffen Fries, Ingo Wenda, ...TODO
Support in PoC implementations Hong Rui Li and He Peng Jia, ...TODO</t>
      <t>[RFC Editor: please delete]
TODO: ...</t>
    </section>
    <section anchor="changelog-rfc-editor-please-delete">
      <name>Changelog [RFC Editor: please delete]</name>
      <ul spacing="normal">
        <li>Added adoption call comments from Toerless.  Changed from [RFCxxxx] to [THING] style for some key references.</li>
        <li>Updated references "I-D.ietf-anima-brski-async-enroll" switched to "I-D.ietf-anima-brski-prm"</li>
        <li>Switch from "JWS Compact Serialization" to "General JWS JSON Serialization", as focus is now on "General JWS JSON Serialization"</li>
        <li>Include Voucher representation in "General JWS JSON Serialization" syntax</li>
        <li>Include examples A1, A2, A3 using "General JWS JSON Serialization"</li>
        <li>Added optional "typ": "voucher-jws+json" header parameter to JWS objects</li>
        <li>Examples folded according to RFC8792, Single Backslash rule</li>
        <li>Restructuring and clean-up, preparation for WGLC</li>
        <li>Included feedback from shepherd review</li>
      </ul>
      <t>-- back</t>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <t>These examples are folded according to <xref target="RFC8792"/> Single Backslash rule.</t>
      <section anchor="example-pledge-voucher-request-pvr-from-pledge-to-registrar">
        <name>Example Pledge Voucher Request - PVR (from Pledge to Registrar)</name>
        <t>The following is an example request sent from a Pledge to the Registrar, in "General JWS JSON Serialization".</t>
        <figure anchor="ExamplePledgeVoucherRequestfigure">
          <name>Example Pledge Voucher Request - PVR</name>
          <artwork align="left"><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

{
  "payload": "eyJpZXRmLXZvdWNoZXItcmVxdWVzdDp2b3VjaGVyIjp7InNlcmlhbC\
1udW1iZXIiOiIwMTIzNDU2Nzg5Iiwibm9uY2UiOiI2R3RuK1pRS04ySHFERlZrQkV4Wk\
xRPT0iLCJjcmVhdGVkLW9uIjoiMjAyMi0wNy0wOFQwODo0MDo0Mi44MjBaIiwicHJveG\
ltaXR5LXJlZ2lzdHJhci1jZXJ0IjoiTUlJQjRqQ0NBWWlnQXdJQkFnSUdBWFk3MmJiWk\
1Bb0dDQ3FHU000OUJBTUNNRFV4RXpBUkJnTlZCQW9NQ2sxNVFuVnphVzVsYzNNeERUQU\
xCZ05WQkFjTUJGTnBkR1V4RHpBTkJnTlZCQU1NQmxSbGMzUkRRVEFlRncweU1ERXlNRG\
N3TmpFNE1USmFGdzB6TURFeU1EY3dOakU0TVRKYU1ENHhFekFSQmdOVkJBb01DazE1UW\
5WemFXNWxjM014RFRBTEJnTlZCQWNNQkZOcGRHVXhHREFXQmdOVkJBTU1EMFJ2YldGcG\
JsSmxaMmx6ZEhKaGNqQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDlBd0VIQTBJQUJCaz\
E2Sy9pNzlvUmtLNVliZVBnOFVTUjgvdXMxZFBVaVpITXRva1NkcUtXNWZuV3NCZCtxUk\
w3V1JmZmVXa3lnZWJvSmZJbGx1cmNpMjV3bmhpT1ZDR2plekI1TUIwR0ExVWRKUVFXTU\
JRR0NDc0dBUVVGQndNQkJnZ3JCZ0VGQlFjREhEQU9CZ05WSFE4QkFmOEVCQU1DQjRBd1\
NBWURWUjBSQkVFd1A0SWRjbVZuYVhOMGNtRnlMWFJsYzNRdWMybGxiV1Z1Y3kxaWRDNX\
VaWFNDSG5KbFoybHpkSEpoY2kxMFpYTjBOaTV6YVdWdFpXNXpMV0owTG01bGREQUtCZ2\
dxaGtqT1BRUURBZ05JQURCRkFpQnhsZEJoWnEwRXY1SkwyUHJXQ3R5UzZoRFlXMXlDTy\
9SYXVicEM3TWFJRGdJaEFMU0piZ0xuZ2hiYkFnMGRjV0ZVVm8vZ0dOMC9qd3pKWjBTbD\
JoNHhJWGsxIn19",
  "signatures": [{
    "protected": "eyJ4NWMiOlsiTUlJQitUQ0NBYUNnQXdJQkFnSUdBWG5WanNVNU\
1Bb0dDQ3FHU000OUJBTUNNRDB4Q3pBSkJnTlZCQVlUQWtGUk1SVXdFd1lEVlFRS0RBeE\
thVzVuU21sdVowTnZjbkF4RnpBVkJnTlZCQU1NRGtwcGJtZEthVzVuVkdWemRFTkJNQ0\
FYRFRJeE1EWXdOREExTkRZeE5Gb1lEems1T1RreE1qTXhNak0xT1RVNVdqQlNNUXN3Q1\
FZRFZRUUdFd0pCVVRFVk1CTUdBMVVFQ2d3TVNtbHVaMHBwYm1kRGIzSndNUk13RVFZRF\
ZRUUZFd293TVRJek5EVTJOemc1TVJjd0ZRWURWUVFEREE1S2FXNW5TbWx1WjBSbGRtbG\
paVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUFCQzc5bGlhUmNCalpjRU\
VYdzdyVWVhdnRHSkF1SDRwazRJNDJ2YUJNc1UxMWlMRENDTGtWaHRVVjIxbXZhS0N2TX\
gyWStTTWdROGZmd0wyM3ozVElWQldqZFRCek1Dc0dDQ3NHQVFVRkJ3RWdCQjhXSFcxaG\
MyRXRkR1Z6ZEM1emFXVnRaVzV6TFdKMExtNWxkRG81TkRRek1COEdBMVVkSXdRWU1CYU\
FGRlFMak56UFwvU1wva291alF3amc1RTVmdndjWWJNQk1HQTFVZEpRUU1NQW9HQ0NzR0\
FRVUZCd01DTUE0R0ExVWREd0VCXC93UUVBd0lIZ0RBS0JnZ3Foa2pPUFFRREFnTkhBRE\
JFQWlCdTN3UkJMc0pNUDVzTTA3MEgrVUZyeU5VNmdLekxPUmNGeVJST2xxcUhpZ0lnWE\
NtSkxUekVsdkQycG9LNmR4NmwxXC91eW1UbmJRRERmSmxhdHVYMlJvT0U9Il0sInR5cC\
I6InZvdWNoZXItandzK2pzb24iLCJhbGciOiJFUzI1NiJ9",
    "signature": "abVg4TDGzSTjVHkQlNeIW3ABu5ZXdMl1cEqwcIAlHFW4BrlGbO\
-DRTKfyCOGxSW49-ktJcrVlYgKqC4xmZoy0Q"
  }]
}
]]></artwork>
        </figure>
      </section>
      <section anchor="example-parboiled-registrar-voucher-request-rvr-from-registrar-to-masa">
        <name>Example Parboiled Registrar Voucher Request - RVR (from Registrar to MASA)</name>
        <t>The term parboiled refers to food which is partially cooked.
In <xref target="BRSKI"/>, the term refers to a Pledge voucher-request (PVR) which has been received by the Registrar, and then has been processed by the Registrar ("cooked"), and is now being forwarded to the MASA.</t>
        <t>The following is an example Registrar voucher-request (RVR) sent from the Registrar to the MASA, in "General JWS JSON Serialization".
Note that the previous PVR can be seen in the payload as "prior-signed-voucher-request".</t>
        <figure anchor="ExampleParboiledRegistrarVoucherRequestfigure">
          <name>Example Parboiled Registrar Voucher Request - RVR</name>
          <artwork align="left"><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

{
  "payload": "eyJpZXRmLXZvdWNoZXItcmVxdWVzdDp2b3VjaGVyIjp7InNlcmlhbC\
1udW1iZXIiOiIwMTIzNDU2Nzg5IiwiaWRldmlkLWlzc3VlciI6IkJCZ3dGb0FVVkF1TT\
NNLzlMK1NpNk5EQ09Ea1RsKy9CeGhzPSIsIm5vbmNlIjoiNkd0bitaUUtOMkhxREZWa0\
JFeFpMUT09IiwicHJpb3Itc2lnbmVkLXZvdWNoZXItcmVxdWVzdCI6ImV5SndZWGxzYj\
JGa0lqb2laWGxLY0ZwWVVtMU1XRnAyWkZkT2IxcFlTWFJqYlZaNFpGZFdlbVJFY0RKaU\
0xWnFZVWRXZVVscWNEZEpiazVzWTIxc2FHSkRNWFZrVnpGcFdsaEphVTlwU1hkTlZFbD\
ZUa1JWTWs1Nlp6VkphWGRwWW0wNWRWa3lWV2xQYVVreVVqTlNkVXN4Y0ZKVE1EUjVVMG\
hHUlZKc1duSlJhMVkwVjJ0NFVsQlVNR2xNUTBwcVkyMVdhR1JIVm10TVZ6bDFTV3B2YV\
UxcVFYbE5hVEIzVG5rd2QwOUdVWGRQUkc4d1RVUnZNRTFwTkRSTmFrSmhTV2wzYVdOSV\
NuWmxSMngwWVZoU05VeFlTbXhhTW14NlpFaEthR05wTVdwYVdFb3dTV3B2YVZSVmJFcF\
JhbEp4VVRCT1FsZFhiRzVSV0dSS1VXdEdibE5WWkVKWFJtc3pUVzFLYVZkck1VSmlNR1\
JFVVROR1NGVXdNREJQVlVwQ1ZGVk9UbEpHVmpSU1dIQkNWV3RLYmxSc1drTlJWemxPVV\
RKemVFNVdSblZXYm5Cb1ZucFdjMWw2VGs1bFJWSlZVVlY0UTFvd05WZFJhMFpxVkZWS1\
IxUnVRbXRTTVZZMFVraHdRbFJyU201VWJGcERVVlV4VGxGdGVGTmlSMDE2Vld0U1VsWk\
ZSbXhTYm1OM1pWVXhSVkpZYkU1U1IwNHpWRzF3Ums1Rk1WVlRiVVpIWkhwQ05sUlZVa1\
psVlRGRldUTmtUMkZyVlRCVVZsSkxXVlV4UlU1SWFFWmxhMFpUVVcxa1QxWnJTa0ppTU\
RGRVlYcEZNVlZYTlZkbGJVWllUbGQ0YWswd01UUlNSbEpDVkVWS2JsUnNXa05SVjA1T1\
VXdGFUMk5IVWtoV1dHaElVa1ZHV0ZGdFpFOVdhMHBDVkZVeFJVMUdTakpaYkdSSFkwZE\
tjMU50ZUdGTmJYZzJXa1ZvUzJGSFRuRlJiSEJPVVdzeFNGRnViSGhTTVU1T1RrUnNRbG\
93VmtoUk1FNTRVakZPVGs1RWJFSmtNRlpKVVZSQ1NsRlZTa05oZWtVeVUzazVjRTU2Yk\
haVmJYUk1UbFpzYVZwV1FtNVBSbFpVVldwbmRtUllUWGhhUmtKV1lWWndTVlJZVW5aaE\
1VNXJZMVYwV0U1WFduVldNMDVEV2tOMGVGVnJkek5XTVVwdFdtMVdXR0V6Ykc1YVYwcD\
JVMjFhU21KSGVERmpiVTV3VFdwV00ySnRhSEJVTVZwRVVqSndiR1ZyU1RGVVZVbDNVak\
JGZUZaWFVrdFZWa1pZVkZWS1VsSXdUa1JqTUdSQ1ZWWldSMUZ1WkU1UmEwcHVXak5LUT\
Fvd1ZrZFJiRVpxVWtWb1JWRlZPVU5hTURWWFUwWkZORkZyUm0xUFJWWkRVVlV4UkZGcV\
VrSmtNVTVDVjFWU1YxVnFRbE5SYTFaR1pERkJNRk5YVW1waVZscDFXVlpvVDAxSFRuUl\
NibXhOVjBaS2MxbDZUbEprVjAxNVlrZDRhVll4V2pGWk0ydDRZVmRTUkU1WVZtRlhSaz\
VFVTBjMVMySkdiM2xpU0hCclUwVndiMWt5YTNoTlJuQlpWR3BDVDJGVVZqWlpWbVJYWk\
Vad1dFNVljRTFXTUc5M1ZFY3dNV0pIVWtWUlZYUkRXakprZUdGSGRIRlVNVUpTVlZWU1\
Fsb3dOVXBSVlZKRFVtdEdjRkZ1YUhOYVJVcHZWMjVGZDFKWVdURlRhM2Q1VlVoS1dGRX\
pValZWZWxwdlVrWnNXRTFZYkVSVWVUbFRXVmhXYVdORlRUTlVWMFpLVWtka1NtRkZSaz\
FWTUhCcFdqQjRkVm95YUdsWmEwWnVUVWRTYWxZd1dsWldiVGgyV2pCa1QwMURPWEZrTT\
NCTFYycENWR0pFU205T1NHaEtWMGR6ZUVsdU1Ua2lMQ0p6YVdkdVlYUjFjbVZ6SWpwYm\
V5SndjbTkwWldOMFpXUWlPaUpsZVVvMFRsZE5hVTlzYzJsVVZXeEtVV2wwVlZFd1RrSl\
pWVTV1VVZoa1NsRnJSbTVUVldSQ1YwYzFWMkZ1VGxaT1ZURkNZakJrUkZFelJraFZNRE\
F3VDFWS1FsUlZUazVTUkVJMFVUTndRbE5yU201VWJGcERVVlpzVlZGWGRFZFZhekZUVm\
xoa1JtUXhiRVZXYkVaU1V6QlNRbVZGZEdoV2VsWjFWVEl4YzJSV2IzZFVibHBxWW10R0\
5GSnVjRUpXYTBwdVZHeGFRMUZWTVU1U1IzUjNZMGRLZEZwRmRHaFdlbFoxVm10a1YyVn\
RVa1pVYTBwT1VUQkdXVkpHVWtwbFJURkZWMWhrVDFKRlJYaFVhMUphWlVVMVIySXhiRV\
ZsYlhNeFZERlNjbVZGTVhGVVdHaE9ZV3N3ZUZReFVsWk9WbVJ4VVd4T1RsVllUak5STV\
VaYVVrWmFVbFZWWkVaa01IQkRWbFpTUmxack1VTlVWV1JDVFZaV1JsRXlaRE5VVms1MF\
lraFdZVTFJUW5kWmJURnJVa2RKZWxOdVpFNVZhekV6VWxaR1dsSkdXbEpWVlZwR1pEST\
VNMVJXVWtwbGF6VkZWbFJLVDJWdFl6RlVWa3BxWkRCYVVsZFZVbGRWVmtaRlVrVkZNVk\
15UmxoT1Z6VlVZbGQ0TVZkcVFsTmlSMUowWWtkd1lWWkZTbUZVVlVwT1VqQktOV05WWk\
ZSVVZGRTFVVmRrUmxJd1RrUmpWV1JVVkZSUk5WRllaRVpUUlVWM1UxVkdRMUY2WXpWaV\
IyeG9WVzFPUTJGc2NHcFNWVlpaWkhwa2VWWlhWbWhrYmxKSVUydEdNVk5FVW5kaGVsSk\
tUa1JLTWxsVlNrNWpNVlY0VFZkc1RWSkZUa1JVUjNSWFlVaFNWbFpxU1hoaVdGcG9Vek\
JPTWxSWVozbFhVM1JVVkZka1VrOUhXbTFrTUhkNVRUTnZlbFpGYkZkUmJHUnhXa1pTUT\
JWck1VUmpNR1JFVVROT1NGRldSbFpTYTBvelVsZGtRMUZxYUZoVFJtTjRZVWROZVZKWV\
VtdFNNVm8yV2tWTk1XVnRSbGhXYmxKaFZucFdObFJHWkV0TlJYaDBUbGQ0YTFKSE9ERl\
VhMUpTWldzeFEwOUZaRUpOVmxaclUxaGtVbGRWTVVOWlZVWkhVbXhHVFdGck5UWlZSbm\
QyVlRGM2RtRXlPVEZoYkVZellXMWpNVkpVVm0xa2JtUnFWMWRLVGxGck1VaFJWRVpXV2\
tWd1VsVlZNVTVSVnpsSVVUQk9lbEl3UmxKV1ZWcERaREF4UkZSVlJUQlNNRVY0VmxkU1\
JXUXdWa05ZUXprelZWVldRbVF3YkVsYU1GSkNVekJLYmxvelJtOWhNbkJRVlVaR1VsSk\
ZSbTVVYTJoQ1VrVktSbEZYYkVOa1ZFNHpWV3RLVFdNd2NFNVZSRlo2VkZSQk0wMUZaM0\
pXVlZwNVpWVTFWazV0WkV4bGEzaFFWVzFPUjJWV1NsTlVNbmg0WTFWb2NGb3diRzVYUl\
U1MFUydDRWV1ZyVm5Oa2ExRjVZMGM1VEU1dFVqUk9iWGQ0V0VNNU1XVlhNVlZpYlVwU1\
VrVlNiVk50ZUdoa1NGWlpUV3hLZGxRd1ZUbEpiREJ6U1c1U05XTkRTVFpKYmxwMlpGZE\
9iMXBZU1hSaGJtUjZTekp3ZW1JeU5HbE1RMHBvWWtkamFVOXBTa1pWZWtreFRtbEtPU0\
lzSW5OcFoyNWhkSFZ5WlNJNkltRmlWbWMwVkVSSGVsTlVhbFpJYTFGc1RtVkpWek5CUW\
5VMVdsaGtUV3d4WTBWeGQyTkpRV3hJUmxjMFFuSnNSMkpQTFVSU1ZFdG1lVU5QUjNoVF\
Z6UTVMV3QwU21OeVZteFpaMHR4UXpSNGJWcHZlVEJSSW4xZGZRPT0iLCJjcmVhdGVkLW\
9uIjoiMjAyMi0wNy0wOFQwODo0MDo0Mi44NDhaIn19",
  "signatures": [{
    "protected": "eyJ4NWMiOlsiTUlJQm96Q0NBVXFnQXdJQkFnSUdBVzBlTHVJRk\
1Bb0dDQ3FHU000OUJBTUNNRFV4RXpBUkJnTlZCQW9NQ2sxNVFuVnphVzVsYzNNeERUQU\
xCZ05WQkFjTUJGTnBkR1V4RHpBTkJnTlZCQU1NQmxSbGMzUkRRVEFlRncweE9UQTVNVE\
V3TWpNM016SmFGdzB5T1RBNU1URXdNak0zTXpKYU1GUXhFekFSQmdOVkJBb01DazE1UW\
5WemFXNWxjM014RFRBTEJnTlZCQWNNQkZOcGRHVXhMakFzQmdOVkJBTU1KVkpsWjJsem\
RISmhjaUJXYjNWamFHVnlJRkpsY1hWbGMzUWdVMmxuYm1sdVp5QkxaWGt3V1RBVEJnY3\
Foa2pPUFFJQkJnZ3Foa2pPUFFNQkJ3TkNBQVQ2eFZ2QXZxVHoxWlVpdU5XaFhwUXNrYV\
B5N0FISFFMd1hpSjBpRUx0NnVOUGFuQU4wUW5XTVlPXC8wQ0RFaklrQlFvYnc4WUtxan\
R4SkhWU0dUajlLT295Y3dKVEFUQmdOVkhTVUVEREFLQmdnckJnRUZCUWNESERBT0JnTl\
ZIUThCQWY4RUJBTUNCNEF3Q2dZSUtvWkl6ajBFQXdJRFJ3QXdSQUlnWXIyTGZxb2FDS0\
RGNFJBY01tSmkrTkNacWRTaXVWdWdJU0E3T2hLUnEzWUNJRHhuUE1NbnBYQU1UclBKdV\
BXeWNlRVIxMVB4SE9uKzBDcFNIaTJxZ3BXWCIsIk1JSUJwRENDQVVtZ0F3SUJBZ0lHQV\
cwZUx1SCtNQW9HQ0NxR1NNNDlCQU1DTURVeEV6QVJCZ05WQkFvTUNrMTVRblZ6YVc1bG\
MzTXhEVEFMQmdOVkJBY01CRk5wZEdVeER6QU5CZ05WQkFNTUJsUmxjM1JEUVRBZUZ3MH\
hPVEE1TVRFd01qTTNNekphRncweU9UQTVNVEV3TWpNM016SmFNRFV4RXpBUkJnTlZCQW\
9NQ2sxNVFuVnphVzVsYzNNeERUQUxCZ05WQkFjTUJGTnBkR1V4RHpBTkJnTlZCQU1NQm\
xSbGMzUkRRVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUFCT2t2a1RIdT\
hRbFQzRkhKMVVhSTcrV3NIT2IwVVMzU0FMdEc1d3VLUURqaWV4MDZcL1NjWTVQSmlidm\
dIVEIrRlwvUVRqZ2VsSEd5MVlLcHdjTk1jc1N5YWpSVEJETUJJR0ExVWRFd0VCXC93UU\
lNQVlCQWY4Q0FRRXdEZ1lEVlIwUEFRSFwvQkFRREFnSUVNQjBHQTFVZERnUVdCQlRvWk\
lNelFkc0RcL2pcLytnWFwvN2NCSnVjSFwvWG1qQUtCZ2dxaGtqT1BRUURBZ05KQURCR0\
FpRUF0eFEzK0lMR0JQSXRTaDRiOVdYaFhOdWhxU1A2SCtiXC9MQ1wvZlZZRGpRNm9DSV\
FERzJ1UkNIbFZxM3loQjU4VFhNVWJ6SDgrT2xoV1V2T2xSRDNWRXFEZGNRdz09Il0sIn\
R5cCI6InZvdWNoZXItandzK2pzb24iLCJhbGciOiJFUzI1NiJ9",
    "signature": "0fzuqVdyhemWsu_HQeF-CmQwJeLp9IStNf-bWZwz6SojrEOR4a\
Dq6VStyG8eWXjGHNZiRyyLJo7RP1rKatuS2w"
  }]
}
]]></artwork>
        </figure>
      </section>
      <section anchor="example-voucher-response-from-masa-to-pledge-via-registrar">
        <name>Example Voucher Response (from MASA to Pledge, via Registrar)</name>
        <t>The following is an example voucher response from MASA to Pledge via Registrar, in "General JWS JSON Serialization".</t>
        <figure anchor="ExampleVoucherResponsefigure">
          <name>Example Voucher Response</name>
          <artwork align="left"><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

{
  "payload": "eyJpZXRmLXZvdWNoZXI6dm91Y2hlciI6eyJhc3NlcnRpb24iOiJsb2\
dnZWQiLCJzZXJpYWwtbnVtYmVyIjoiMDEyMzQ1Njc4OSIsIm5vbmNlIjoiZGRoSGQ4Ml\
FpUGtzMDBTck1USTlEUT09IiwiY3JlYXRlZC1vbiI6IjIwMjItMDctMDdUMTc6NDc6MD\
EuODkwWiIsInBpbm5lZC1kb21haW4tY2VydCI6Ik1JSUJwRENDQVVtZ0F3SUJBZ0lHQV\
cwZUx1SCtNQW9HQ0NxR1NNNDlCQU1DTURVeEV6QVJCZ05WQkFvTUNrMTVRblZ6YVc1bG\
MzTXhEVEFMQmdOVkJBY01CRk5wZEdVeER6QU5CZ05WQkFNTUJsUmxjM1JEUVRBZUZ3MH\
hPVEE1TVRFd01qTTNNekphRncweU9UQTVNVEV3TWpNM016SmFNRFV4RXpBUkJnTlZCQW\
9NQ2sxNVFuVnphVzVsYzNNeERUQUxCZ05WQkFjTUJGTnBkR1V4RHpBTkJnTlZCQU1NQm\
xSbGMzUkRRVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUFCT2t2a1RIdT\
hRbFQzRkhKMVVhSTcrV3NIT2IwVVMzU0FMdEc1d3VLUURqaWV4MDYvU2NZNVBKaWJ2Z0\
hUQitGL1FUamdlbEhHeTFZS3B3Y05NY3NTeWFqUlRCRE1CSUdBMVVkRXdFQi93UUlNQV\
lCQWY4Q0FRRXdEZ1lEVlIwUEFRSC9CQVFEQWdJRU1CMEdBMVVkRGdRV0JCVG9aSU16UW\
RzRC9qLytnWC83Y0JKdWNIL1htakFLQmdncWhrak9QUVFEQWdOSkFEQkdBaUVBdHhRMy\
tJTEdCUEl0U2g0YjlXWGhYTnVocVNQNkgrYi9MQy9mVllEalE2b0NJUURHMnVSQ0hsVn\
EzeWhCNThUWE1VYnpIOCtPbGhXVXZPbFJEM1ZFcURkY1F3PT0ifX0",
  "signatures": [{
    "protected": "eyJ4NWMiOlsiTUlJQmt6Q0NBVGlnQXdJQkFnSUdBV0ZCakNrWU\
1Bb0dDQ3FHU000OUJBTUNNRDB4Q3pBSkJnTlZCQVlUQWtGUk1SVXdFd1lEVlFRS0RBeE\
thVzVuU21sdVowTnZjbkF4RnpBVkJnTlZCQU1NRGtwcGJtZEthVzVuVkdWemRFTkJNQj\
RYRFRFNE1ERXlPVEV3TlRJME1Gb1hEVEk0TURFeU9URXdOVEkwTUZvd1R6RUxNQWtHQT\
FVRUJoTUNRVkV4RlRBVEJnTlZCQW9NREVwcGJtZEthVzVuUTI5eWNERXBNQ2NHQTFVRU\
F3d2dTbWx1WjBwcGJtZERiM0p3SUZadmRXTm9aWElnVTJsbmJtbHVaeUJMWlhrd1dUQV\
RCZ2NxaGtqT1BRSUJCZ2dxaGtqT1BRTUJCd05DQUFTQzZiZUxBbWVxMVZ3NmlRclJzOF\
IwWlcrNGIxR1d5ZG1XczJHQU1GV3diaXRmMm5JWEgzT3FIS1Z1OHMyUnZpQkdOaXZPS0\
dCSEh0QmRpRkVaWnZiN294SXdFREFPQmdOVkhROEJBZjhFQkFNQ0I0QXdDZ1lJS29aSX\
pqMEVBd0lEU1FBd1JnSWhBSTRQWWJ4dHNzSFAyVkh4XC90elVvUVwvU3N5ZEwzMERRSU\
5FdGNOOW1DVFhQQWlFQXZJYjNvK0ZPM0JUbmNMRnNhSlpSQWtkN3pPdXNuXC9cL1pLT2\
FFS2JzVkRpVT0iXSwidHlwIjoidm91Y2hlci1qd3MranNvbiIsImFsZyI6IkVTMjU2In\
0",
    "signature": "y1HLYBFlwouf42XWSKUWjeYQHnG2Q6A4bjA7hvTkB3z1dPwTUl\
jPHtuN2Qex6gDxTfaSiKeoXGsOD4JWOgQJPg"
  }]
}
]]></artwork>
        </figure>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="BRSKI">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="T. Eckert" initials="T." surname="Eckert"/>
            <author fullname="M. Behringer" initials="M." surname="Behringer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane. To do this, a Secure Key Infrastructure is bootstrapped. This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline. We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device. The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="SZTP">
          <front>
            <title>Secure Zero Touch Provisioning (SZTP)</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="I. Farrer" initials="I." surname="Farrer"/>
            <author fullname="M. Abrahamsson" initials="M." surname="Abrahamsson"/>
            <date month="April" year="2019"/>
            <abstract>
              <t>This document presents a technique to securely provision a networking device when it is booting in a factory-default state. Variations in the solution enable it to be used on both public and private networks. The provisioning steps are able to update the boot image, commit an initial configuration, and execute arbitrary scripts to address auxiliary needs. The updated device is subsequently able to establish secure connections with other systems. For instance, a device may establish NETCONF (RFC 6241) and/or RESTCONF (RFC 8040) connections with deployment-specific network management systems.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8572"/>
          <seriesInfo name="DOI" value="10.17487/RFC8572"/>
        </reference>
        <reference anchor="RFC8366">
          <front>
            <title>A Voucher Artifact for Bootstrapping Protocols</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
            <author fullname="T. Eckert" initials="T." surname="Eckert"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>This document defines a strategy to securely assign a pledge to an owner using an artifact signed, directly or indirectly, by the pledge's manufacturer. This artifact is known as a "voucher".</t>
              <t>This document defines an artifact format as a YANG-defined JSON document that has been signed using a Cryptographic Message Syntax (CMS) structure. Other YANG-derived formats are possible. The voucher artifact is normally generated by the pledge's manufacturer (i.e., the Manufacturer Authorized Signing Authority (MASA)).</t>
              <t>This document only defines the voucher artifact, leaving it to other documents to describe specialized protocols for accessing it.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8366"/>
          <seriesInfo name="DOI" value="10.17487/RFC8366"/>
        </reference>
        <reference anchor="I-D.draft-ietf-anima-rfc8366bis">
          <front>
            <title>A Voucher Artifact for Bootstrapping Protocols</title>
            <author fullname="Kent Watsen" initials="K." surname="Watsen">
              <organization>Watsen Networks</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software</organization>
            </author>
            <author fullname="Max Pritikin" initials="M." surname="Pritikin">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Toerless Eckert" initials="T. T." surname="Eckert">
              <organization>Futurewei Technologies Inc.</organization>
            </author>
            <author fullname="Qiufang Ma" initials="Q." surname="Ma">
              <organization>Huawei</organization>
            </author>
            <date day="17" month="August" year="2023"/>
            <abstract>
              <t>   This document defines a strategy to securely assign a pledge to an
   owner using an artifact signed, directly or indirectly, by the
   pledge's manufacturer.  This artifact is known as a "voucher".

   This document defines an artifact format as a YANG-defined JSON or
   CBOR document that has been signed using a variety of cryptographic
   systems.

   The voucher artifact is normally generated by the pledge's
   manufacturer (i.e., the Manufacturer Authorized Signing Authority
   (MASA)).

   This document updates RFC8366, merging a number of extensions into
   the YANG.  The RFC8995 voucher request is also merged into this
   document.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-rfc8366bis-09"/>
        </reference>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC3629">
          <front>
            <title>UTF-8, a transformation format of ISO 10646</title>
            <author fullname="F. Yergeau" initials="F." surname="Yergeau"/>
            <date month="November" year="2003"/>
            <abstract>
              <t>ISO/IEC 10646-1 defines a large character set called the Universal Character Set (UCS) which encompasses most of the world's writing systems. The originally proposed encodings of the UCS, however, were not compatible with many current applications and protocols, and this has led to the development of UTF-8, the object of this memo. UTF-8 has the characteristic of preserving the full US-ASCII range, providing compatibility with file systems, parsers and other software that rely on US-ASCII values but are transparent to other values. This memo obsoletes and replaces RFC 2279.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="63"/>
          <seriesInfo name="RFC" value="3629"/>
          <seriesInfo name="DOI" value="10.17487/RFC3629"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC5652">
          <front>
            <title>Cryptographic Message Syntax (CMS)</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="70"/>
          <seriesInfo name="RFC" value="5652"/>
          <seriesInfo name="DOI" value="10.17487/RFC5652"/>
        </reference>
        <reference anchor="RFC7951">
          <front>
            <title>JSON Encoding of Data Modeled with YANG</title>
            <author fullname="L. Lhotka" initials="L." surname="Lhotka"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>This document defines encoding rules for representing configuration data, state data, parameters of Remote Procedure Call (RPC) operations or actions, and notifications defined using YANG as JavaScript Object Notation (JSON) text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7951"/>
          <seriesInfo name="DOI" value="10.17487/RFC7951"/>
        </reference>
        <reference anchor="RFC7950">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC8792">
          <front>
            <title>Handling Long Lines in Content of Internet-Drafts and RFCs</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="E. Auerswald" initials="E." surname="Auerswald"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <date month="June" year="2020"/>
            <abstract>
              <t>This document defines two strategies for handling long lines in width-bounded text content. One strategy, called the "single backslash" strategy, is based on the historical use of a single backslash ('\') character to indicate where line-folding has occurred, with the continuation occurring with the first character that is not a space character (' ') on the next line. The second strategy, called the "double backslash" strategy, extends the first strategy by adding a second backslash character to identify where the continuation begins and is thereby able to handle cases not supported by the first strategy. Both strategies use a self-describing header enabling automated reconstitution of the original content.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8792"/>
          <seriesInfo name="DOI" value="10.17487/RFC8792"/>
        </reference>
        <reference anchor="RFC8812">
          <front>
            <title>CBOR Object Signing and Encryption (COSE) and JSON Object Signing and Encryption (JOSE) Registrations for Web Authentication (WebAuthn) Algorithms</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="August" year="2020"/>
            <abstract>
              <t>The W3C Web Authentication (WebAuthn) specification and the FIDO Alliance FIDO2 Client to Authenticator Protocol (CTAP) specification use CBOR Object Signing and Encryption (COSE) algorithm identifiers. This specification registers the following algorithms (which are used by WebAuthn and CTAP implementations) in the IANA "COSE Algorithms" registry: RSASSA-PKCS1-v1_5 using SHA-256, SHA-384, SHA-512, and SHA-1; and Elliptic Curve Digital Signature Algorithm (ECDSA) using the secp256k1 curve and SHA-256. It registers the secp256k1 elliptic curve in the IANA "COSE Elliptic Curves" registry. Also, for use with JSON Object Signing and Encryption (JOSE), it registers the algorithm ECDSA using the secp256k1 curve and SHA-256 in the IANA "JSON Web Signature and Encryption Algorithms" registry and the secp256k1 elliptic curve in the IANA "JSON Web Key Elliptic Curve" registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8812"/>
          <seriesInfo name="DOI" value="10.17487/RFC8812"/>
        </reference>
        <reference anchor="ON-PATH" target="https://mailarchive.ietf.org/arch/msg/saag/m1r9uo4xYznOcf85Eyk0Rhut598/">
          <front>
            <title>can an on-path attacker drop traffic?</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="I-D.ietf-anima-constrained-voucher">
          <front>
            <title>Constrained Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Peter Van der Stok" initials="P." surname="Van der Stok">
              <organization>vanderstok consultancy</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Esko Dijk" initials="E." surname="Dijk">
              <organization>IoTconsultancy.nl</organization>
            </author>
            <date day="7" month="July" year="2023"/>
            <abstract>
              <t>   This document defines the Constrained Bootstrapping Remote Secure Key
   Infrastructure (Constrained BRSKI) protocol, which provides a
   solution for secure zero-touch bootstrapping of resource-constrained
   (IoT) devices into the network of a domain owner.  This protocol is
   designed for constrained networks, which may have limited data
   throughput or may experience frequent packet loss.  Constrained BRSKI
   is a variant of the BRSKI protocol, which uses an artifact signed by
   the device manufacturer called the "voucher" which enables a new
   device and the owner's network to mutually authenticate.  While the
   BRSKI voucher is typically encoded in JSON, Constrained BRSKI uses a
   compact CBOR-encoded voucher.  The BRSKI voucher is extended with new
   data types that allow for smaller voucher sizes.  The Enrollment over
   Secure Transport (EST) protocol, used in BRSKI, is replaced with EST-
   over-CoAPS; and HTTPS used in BRSKI is replaced with CoAPS.  This
   document Updates RFC 8366 and RFC 8995.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-constrained-voucher-21"/>
        </reference>
        <reference anchor="I-D.ietf-anima-brski-prm">
          <front>
            <title>BRSKI with Pledge in Responder Mode (BRSKI-PRM)</title>
            <author fullname="Steffen Fries" initials="S." surname="Fries">
              <organization>Siemens AG</organization>
            </author>
            <author fullname="Thomas Werner" initials="T." surname="Werner">
              <organization>Siemens AG</organization>
            </author>
            <author fullname="Eliot Lear" initials="E." surname="Lear">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date day="10" month="July" year="2023"/>
            <abstract>
              <t>   This document defines enhancements to Bootstrapping a Remote Secure
   Key Infrastructure (BRSKI, RFC8995) to enable bootstrapping in
   domains featuring no or only limited connectivity between a pledge
   and the domain registrar.  It specifically changes the interaction
   model from a pledge-initiated mode, as used in BRSKI, to a pledge-
   responding mode, where the pledge is in server role.  For this, BRSKI
   with Pledge in Responder Mode (BRSKI-PRM) introduces a new component,
   the registrar-agent, which facilitates the communication between
   pledge and registrar during the bootstrapping phase.  To establish
   the trust relation between pledge and registrar, BRSKI-PRM relies on
   object security rather than transport security.  The approach defined
   here is agnostic to the enrollment protocol that connects the domain
   registrar to the domain CA.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-brski-prm-09"/>
        </reference>
        <reference anchor="I-D.kuehlewind-update-tag">
          <front>
            <title>Definition of new tags for relations between RFCs</title>
            <author fullname="Mirja Kühlewind" initials="M." surname="Kühlewind">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Suresh Krishnan" initials="S." surname="Krishnan">
              <organization>Kaloom</organization>
            </author>
            <date day="12" month="July" year="2021"/>
            <abstract>
              <t>   An RFC can include a tag called "Updates" which can be used to link a
   new RFC to an existing RFC.  On publication of such an RFC, the
   existing RFC will include an additional metadata tag called "Updated
   by" which provides a link to the new RFC.  However, this tag pair is
   not well-defined and therefore it is currently used for multiple
   different purposes, which leads to confusion about the actual meaning
   of this tag and inconsistency in its use.

   This document recommends the discontinuation of the use of the
   updates/updated by tag pair, and instead proposes three new tag pairs
   that have well-defined meanings and use cases.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-kuehlewind-update-tag-04"/>
        </reference>
      </references>
    </references>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="T." surname="Eckert" fullname="Toerless Eckert">
        <organization>Futurewei Technologies Inc.</organization>
        <address>
          <email>tte+ietf@cs.fau.de</email>
        </address>
      </contact>
      <contact initials="E." surname="Dijk" fullname="Esko Dijk">
        <organization/>
        <address>
          <email>esko.dijk@iotconsultancy.nl</email>
        </address>
      </contact>
      <contact initials="S." surname="Fries" fullname="Steffen Fries">
        <organization>Siemens AG</organization>
        <address>
          <email>steffen.fries@siemens.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
