<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.23 (Ruby 2.6.10) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-anima-jws-voucher-08" category="std" consensus="true" submissionType="IETF" updates="8366" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.16.0 -->
  <front>
    <title abbrev="JWS-voucher">JWS signed Voucher Artifacts for Bootstrapping Protocols</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-anima-jws-voucher-08"/>
    <author initials="T." surname="Werner" fullname="Thomas Werner">
      <organization>Siemens AG</organization>
      <address>
        <email>thomas-werner@siemens.com</email>
      </address>
    </author>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <date year="2023" month="August" day="25"/>
    <area>Internet</area>
    <workgroup>anima Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>TODO: <xref target="I-D.draft-ietf-anima-rfc8366bis"/> defines a digital artifact called voucher as a YANG-defined JSON document that is signed using a Cryptographic Message Syntax (CMS) structure.
This document introduces a variant of the voucher artifact in which CMS is replaced by the JSON Object Signing and Encryption (JOSE) mechanism described in RFC7515 to support deployments in which JOSE is preferred over CMS.</t>
      <t>In addition to explaining how the format is created, the "application/voucher-jws+json" media type is registered and examples are provided.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>"A Voucher Artifact for Bootstrapping Protocols" <xref target="I-D.draft-ietf-anima-rfc8366bis"/> defines a YANG-based data structure used in "Bootstrapping Remote Secure Key Infrastructure" <xref target="BRSKI"/> and
"Secure Zero Touch Provisioning" <xref target="SZTP"/> to transfer ownership of a device from a manufacturer to a new owner (customer or operational domain).
That document provides a serialization of the voucher data to JSON <xref target="RFC8259"/> (JSON Voucher Data) with cryptographic signing according to the Cryptographic Message Syntax (CMS) <xref target="RFC5652"/>.
The resulting voucher artifact has the media type "application/voucher-cms+json".</t>
      <t><xref target="I-D.ietf-anima-constrained-voucher"/> provides a serialization of the voucher data to CBOR <xref target="RFC8949"/>
with the signature format of COSE <xref target="RFC8812"/>
and the media type "application/voucher-cose+cbor".</t>
      <t>This document provides cryptographic signing of the JSON Voucher Data in form of JSON Web Signature (JWS) <xref target="RFC7515"/>
and the media type "application/voucher-jws+json".
The encoding specified in this document is used by <xref target="I-D.ietf-anima-brski-prm"/>
and may be more handy for use cases already using Javascript Object Signing and Encryption (JOSE).</t>
      <t>With the availability of different encoded vouchers, it is up to an industry specific application statement to indicate/decide which voucher signature format is to be used.
There is no provision across the different voucher signature formats that a receiver could safely recognize which format it uses unless additional context is provided.
For example, <xref target="BRSKI"/> provides this context via the media type for the voucher artifact.
This document utilizes the optional "typ" (Type) Header Parameter of JWS <xref target="RFC7515"/> to provide information about the signed object.</t>
      <t>This document should be considered an update to <xref target="I-D.draft-ietf-anima-rfc8366bis"/> in the category of "See Also" as per <xref target="I-D.kuehlewind-update-tag"/>.
TODO: [Fix "Updates:" header with I-D.draft-ietf-anima-rfc8366bis number.]
It does not extend the YANG definition of <xref target="I-D.draft-ietf-anima-rfc8366bis"/>.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <t>This document uses the following terms:</t>
      <dl>
        <dt>JSON Voucher Data:</dt>
        <dd>
          <t>An unsigned JSON representation of the Voucher Data.</t>
        </dd>
        <dt>JWS Voucher:</dt>
        <dd>
          <t>A JWS structure signing the JSON Voucher Data.</t>
        </dd>
        <dt>Voucher:</dt>
        <dd>
          <t>A short form for Voucher Artifact and refers to the signed statement from the MASA service that indicates to a pledge the cryptographic identity of the domain it should trust, per <xref target="I-D.draft-ietf-anima-rfc8366bis"/>.</t>
        </dd>
        <dt>Voucher Data:</dt>
        <dd>
          <t>The raw (serialized) representation of the ietf-voucher YANG module without any enclosing signature, per <xref target="I-D.draft-ietf-anima-rfc8366bis"/>.</t>
        </dd>
      </dl>
      <t>This document uses the following encoding notations:</t>
      <dl>
        <dt>BASE64URL(OCTETS):</dt>
        <dd>
          <t>Denotes the base64url encoding of OCTETS, per <xref section="2" sectionFormat="of" target="RFC7515"/>.</t>
        </dd>
        <dt>UTF8(STRING):</dt>
        <dd>
          <t>Denotes the octets of the UTF-8 <xref target="RFC3629"/> representation of STRING, per <xref section="1" sectionFormat="of" target="RFC7515"/>.</t>
        </dd>
      </dl>
    </section>
    <section anchor="voucher-artifact-with-json-web-signature">
      <name>Voucher Artifact with JSON Web Signature</name>
      <t><xref target="RFC7515"/> defines the following serializations for JWS:</t>
      <ol spacing="normal" type="1"><li>"JWS Compact Serialization" in <xref section="7.1" sectionFormat="of" target="RFC7515"/></li>
        <li>
          <t>"JWS JSON Serialization" in <xref section="7.2" sectionFormat="of" target="RFC7515"/>
          </t>
          <ul spacing="normal">
            <li>"General JWS JSON Serialization Syntax" in <xref section="7.2.1" sectionFormat="of" target="RFC7515"/></li>
            <li>"Flattened JWS JSON Serialization Syntax" in <xref section="7.2.2" sectionFormat="of" target="RFC7515"/></li>
          </ul>
        </li>
      </ol>
      <t>A "JWS JSON Serialization Overview" is given in <xref section="3.2" sectionFormat="of" target="RFC7515"/> and more details on the JWS serializations in <xref section="7" sectionFormat="of" target="RFC7515"/>.
This document makes use of the "General JWS JSON Serialization Syntax" of <xref target="RFC7515"/> to support multiple signatures,
as already supported by <xref target="RFC8366"/> for CMS-signed vouchers.</t>
      <section anchor="voucher-representation-in-general-jws-json-serialization-syntax">
        <name>Voucher Representation in General JWS JSON Serialization Syntax</name>
        <t>JWS Voucher artifacts MUST use the "General JWS JSON Serialization Syntax" defined in <xref section="7.2.1" sectionFormat="of" target="RFC7515"/>.
The following figure summarizes the serialization of JWS Voucher artifacts:</t>
        <figure anchor="VoucherGeneralJWSFigure">
          <name>Voucher Representation in General JWS JSON Serialization Syntax (JWS Voucher)</name>
          <artwork align="left"><![CDATA[
    {
      "payload": BASE64URL(UTF8(JSON Voucher Data)),
      "signatures": [
        {
          "protected": BASE64URL(UTF8(JWS Protected Header)),
          "signature": BASE64URL(JWS Signature)
        }
      ]
    }
]]></artwork>
        </figure>
        <t>The JSON Voucher Data MUST be UTF-8 encoded to become the octet-based JWS Payload defined in <xref target="RFC7515"/>.
The JWS Payload is further base64url-encoded to become the string value of the "payload" member as described in <xref section="3.2" sectionFormat="of" target="RFC7515"/>.
The octets of the UTF-8 representation of the JWS Protected Header are base64url-encoded to become the string value of the "protected" member.
The generated JWS Signature is base64url-encoded to become the string value of the "signature" member.</t>
      </section>
      <section anchor="json-voucher-data">
        <name>JSON Voucher Data</name>
        <t>The JSON Voucher Data is an unsigned JSON document <xref target="RFC8259"/> that conforms with the data model described by the ietf-voucher YANG module <xref target="RFC7950"/> defined in <xref section="5.3" sectionFormat="of" target="I-D.draft-ietf-anima-rfc8366bis"/> and is encoded using the rules defined in <xref target="RFC7951"/>.
The following figure provides an example of JSON Voucher Data:</t>
        <figure anchor="VoucherGeneralJWSVoucherPayloadFigure">
          <name>JSON Voucher Data Example</name>
          <artwork align="left"><![CDATA[
    {
      "ietf-voucher:voucher": {
        "assertion": "logged",
        "serial-number": "0123456789",
        "nonce": "5742698422680472",
        "created-on": "2022-07-08T03:01:24.618Z",
        "pinned-domain-cert": "base64encodedvalue=="
      }
    }
]]></artwork>
        </figure>
      </section>
      <section anchor="jws-protected-header">
        <name>JWS Protected Header</name>
        <t>The JWS Protected Header defined in <xref target="RFC7515"/> uses the standard header parameters "alg", "typ", and "x5c".
The "alg" parameter MUST contain the algorithm type used to create the signature, e.g., "ES256" as defined in <xref section="4.1.1" sectionFormat="of" target="RFC7515"/>.
If present, the "typ" parameter SHOULD contain the value TODO: [voucher-jws+json] as defined in <xref section="4.1.9" sectionFormat="of" target="RFC7515"/>.
If X.509 (PKIX) certificates <xref target="RFC5280"/> are used, the "x5c" parameter SHOULD contain the base64-encoded (not base64url-encoded) DER certificate and chain as defined in <xref section="4.1.6" sectionFormat="of" target="RFC7515"/>.</t>
        <t>Implementation Note:
base64-encoded values opposed to base64url-encoded values may contain slashes ('/').
JSON <xref target="RFC8259"/> optionally allows to escape these with backslashes ('').
Hence, depending on the JSON parser/serializer implementation used, they may or may not be included.
JWS Voucher parsers must be prepared accordingly to extract certificates correctly.</t>
        <t>Vouchers will often need all certificates in the chain,
including what would be considered the trust anchor certificate,
because intermediate devices (such as the Registrar) may need to audit the artifact,
or end systems may need to pin a trust anchor for future operations.
Note, a trust anchor SHOULD be provided differently to be trusted.
This is consistent with <xref section="5.5.2" sectionFormat="of" target="BRSKI"/>.</t>
        <t>The following figure gives an example of a JWS Protected Header:</t>
        <figure anchor="VoucherGeneralJWSProtectedHeaderFigure">
          <name>JWS Protected Header Example</name>
          <artwork align="left"><![CDATA[
    {
      "alg": "ES256",
      "typ": "TODO: [voucher-jws+json]",
      "x5c": [
        "base64encodedvalue1==",
        "base64encodedvalue2=="
      ]
    }  
]]></artwork>
        </figure>
      </section>
      <section anchor="jws-signature">
        <name>JWS Signature</name>
        <t>The JWS Signature is generated over the JWS Protected Header and the JWS Payload (= UTF-8 encoded JSON Voucher Data) as described in <xref section="5.1" sectionFormat="of" target="RFC7515"/>.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>The Voucher Request reveals the IDevID of the component (Pledge) that is in the process of bootstrapping.</t>
      <t>This request occurs via HTTP-over-TLS, however, for the Pledge-to-Registrar TLS connection, the Pledge is provisionally accepting the Registrar server certificate.
Hence it is subject to disclosure by a Dolev-Yao attacker (a "malicious messenger") <xref target="ON-PATH"/>, as explained in <xref section="10.2" sectionFormat="of" target="BRSKI"/>.</t>
      <t>The use of a JWS header brings no new privacy considerations.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The issues of how <xref target="I-D.draft-ietf-anima-rfc8366bis"/> vouchers are used in a <xref target="BRSKI"/> system is addressed in <xref section="11" sectionFormat="of" target="BRSKI"/>.
This document does not change any of those issues, it just changes the signature technology used for voucher request and response artifacts.</t>
      <t><xref section="9" sectionFormat="of" target="SZTP"/> deals with voucher use in Secure Zero Touch Provisioning, for which this document also makes no changes to security.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="media-type-registry">
        <name>Media-Type Registry</name>
        <t>This section registers the "application/voucher-jws+json" in the "Media Types" registry.</t>
        <section anchor="applicationvoucher-jwsjson">
          <name>application/voucher-jws+json</name>
          <artwork><![CDATA[
Type name:  application
Subtype name:  voucher-jws+json
Required parameters:  none
Optional parameters:  none
Encoding considerations:  JWS+JSON vouchers are JOSE objects
                          signed with one or multiple signers.
Security considerations:  See section [Security Considerations]
Interoperability considerations:  The format is designed to be
  broadly interoperable.
Published specification:  [THIS RFC].
Applications that use this media type:  ANIMA, 6tisch, and other
  zero-touch bootstrapping/provisioning solutions
Additional information:
  Magic number(s):  None
  File extension(s):  .vjj
  Macintosh file type code(s):  none
Person & email address to contact for further information:  IETF
  ANIMA WG
Intended usage:  LIMITED
Restrictions on usage:  NONE
Author:  ANIMA WG
Change controller:  IETF
Provisional registration? (standards tree only):  NO
]]></artwork>
        </section>
      </section>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank the various reviewers for their input,
in particular Steffen Fries, Ingo Wenda, Esko Dijk and Toerless Eckert.
Thanks for the supporting PoC implementations to Hong Rui Li and He Peng Jia.</t>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <t>These examples are folded according to <xref target="RFC8792"/> Single Backslash rule.</t>
      <section anchor="example-pledge-voucher-request-pvr-from-pledge-to-registrar">
        <name>Example Pledge Voucher Request - PVR (from Pledge to Registrar)</name>
        <t>The following is an example request sent from a Pledge to the Registrar, in "General JWS JSON Serialization".</t>
        <figure anchor="ExamplePledgeVoucherRequestfigure">
          <name>Example Pledge Voucher Request - PVR</name>
          <artwork align="left"><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

{
  "payload": "eyJpZXRmLXZvdWNoZXItcmVxdWVzdDp2b3VjaGVyIjp7InNlcmlhbC\
1udW1iZXIiOiIwMTIzNDU2Nzg5Iiwibm9uY2UiOiI2R3RuK1pRS04ySHFERlZrQkV4Wk\
xRPT0iLCJjcmVhdGVkLW9uIjoiMjAyMi0wNy0wOFQwODo0MDo0Mi44MjBaIiwicHJveG\
ltaXR5LXJlZ2lzdHJhci1jZXJ0IjoiTUlJQjRqQ0NBWWlnQXdJQkFnSUdBWFk3MmJiWk\
1Bb0dDQ3FHU000OUJBTUNNRFV4RXpBUkJnTlZCQW9NQ2sxNVFuVnphVzVsYzNNeERUQU\
xCZ05WQkFjTUJGTnBkR1V4RHpBTkJnTlZCQU1NQmxSbGMzUkRRVEFlRncweU1ERXlNRG\
N3TmpFNE1USmFGdzB6TURFeU1EY3dOakU0TVRKYU1ENHhFekFSQmdOVkJBb01DazE1UW\
5WemFXNWxjM014RFRBTEJnTlZCQWNNQkZOcGRHVXhHREFXQmdOVkJBTU1EMFJ2YldGcG\
JsSmxaMmx6ZEhKaGNqQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDlBd0VIQTBJQUJCaz\
E2Sy9pNzlvUmtLNVliZVBnOFVTUjgvdXMxZFBVaVpITXRva1NkcUtXNWZuV3NCZCtxUk\
w3V1JmZmVXa3lnZWJvSmZJbGx1cmNpMjV3bmhpT1ZDR2plekI1TUIwR0ExVWRKUVFXTU\
JRR0NDc0dBUVVGQndNQkJnZ3JCZ0VGQlFjREhEQU9CZ05WSFE4QkFmOEVCQU1DQjRBd1\
NBWURWUjBSQkVFd1A0SWRjbVZuYVhOMGNtRnlMWFJsYzNRdWMybGxiV1Z1Y3kxaWRDNX\
VaWFNDSG5KbFoybHpkSEpoY2kxMFpYTjBOaTV6YVdWdFpXNXpMV0owTG01bGREQUtCZ2\
dxaGtqT1BRUURBZ05JQURCRkFpQnhsZEJoWnEwRXY1SkwyUHJXQ3R5UzZoRFlXMXlDTy\
9SYXVicEM3TWFJRGdJaEFMU0piZ0xuZ2hiYkFnMGRjV0ZVVm8vZ0dOMC9qd3pKWjBTbD\
JoNHhJWGsxIn19",
  "signatures": [{
    "protected": "eyJ4NWMiOlsiTUlJQitUQ0NBYUNnQXdJQkFnSUdBWG5WanNVNU\
1Bb0dDQ3FHU000OUJBTUNNRDB4Q3pBSkJnTlZCQVlUQWtGUk1SVXdFd1lEVlFRS0RBeE\
thVzVuU21sdVowTnZjbkF4RnpBVkJnTlZCQU1NRGtwcGJtZEthVzVuVkdWemRFTkJNQ0\
FYRFRJeE1EWXdOREExTkRZeE5Gb1lEems1T1RreE1qTXhNak0xT1RVNVdqQlNNUXN3Q1\
FZRFZRUUdFd0pCVVRFVk1CTUdBMVVFQ2d3TVNtbHVaMHBwYm1kRGIzSndNUk13RVFZRF\
ZRUUZFd293TVRJek5EVTJOemc1TVJjd0ZRWURWUVFEREE1S2FXNW5TbWx1WjBSbGRtbG\
paVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUFCQzc5bGlhUmNCalpjRU\
VYdzdyVWVhdnRHSkF1SDRwazRJNDJ2YUJNc1UxMWlMRENDTGtWaHRVVjIxbXZhS0N2TX\
gyWStTTWdROGZmd0wyM3ozVElWQldqZFRCek1Dc0dDQ3NHQVFVRkJ3RWdCQjhXSFcxaG\
MyRXRkR1Z6ZEM1emFXVnRaVzV6TFdKMExtNWxkRG81TkRRek1COEdBMVVkSXdRWU1CYU\
FGRlFMak56UFwvU1wva291alF3amc1RTVmdndjWWJNQk1HQTFVZEpRUU1NQW9HQ0NzR0\
FRVUZCd01DTUE0R0ExVWREd0VCXC93UUVBd0lIZ0RBS0JnZ3Foa2pPUFFRREFnTkhBRE\
JFQWlCdTN3UkJMc0pNUDVzTTA3MEgrVUZyeU5VNmdLekxPUmNGeVJST2xxcUhpZ0lnWE\
NtSkxUekVsdkQycG9LNmR4NmwxXC91eW1UbmJRRERmSmxhdHVYMlJvT0U9Il0sInR5cC\
I6InZvdWNoZXItandzK2pzb24iLCJhbGciOiJFUzI1NiJ9",
    "signature": "abVg4TDGzSTjVHkQlNeIW3ABu5ZXdMl1cEqwcIAlHFW4BrlGbO\
-DRTKfyCOGxSW49-ktJcrVlYgKqC4xmZoy0Q"
  }]
}
]]></artwork>
        </figure>
      </section>
      <section anchor="example-parboiled-registrar-voucher-request-rvr-from-registrar-to-masa">
        <name>Example Parboiled Registrar Voucher Request - RVR (from Registrar to MASA)</name>
        <t>The term parboiled refers to food which is partially cooked.
In <xref target="BRSKI"/>, the term refers to a Pledge voucher-request (PVR) which has been received by the Registrar, and then has been processed by the Registrar ("cooked"), and is now being forwarded to the MASA.</t>
        <t>The following is an example Registrar voucher-request (RVR) sent from the Registrar to the MASA, in "General JWS JSON Serialization".
Note that the previous PVR can be seen in the payload as "prior-signed-voucher-request".</t>
        <figure anchor="ExampleParboiledRegistrarVoucherRequestfigure">
          <name>Example Parboiled Registrar Voucher Request - RVR</name>
          <artwork align="left"><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

{
  "payload": "eyJpZXRmLXZvdWNoZXItcmVxdWVzdDp2b3VjaGVyIjp7InNlcmlhbC\
1udW1iZXIiOiIwMTIzNDU2Nzg5IiwiaWRldmlkLWlzc3VlciI6IkJCZ3dGb0FVVkF1TT\
NNLzlMK1NpNk5EQ09Ea1RsKy9CeGhzPSIsIm5vbmNlIjoiNkd0bitaUUtOMkhxREZWa0\
JFeFpMUT09IiwicHJpb3Itc2lnbmVkLXZvdWNoZXItcmVxdWVzdCI6ImV5SndZWGxzYj\
JGa0lqb2laWGxLY0ZwWVVtMU1XRnAyWkZkT2IxcFlTWFJqYlZaNFpGZFdlbVJFY0RKaU\
0xWnFZVWRXZVVscWNEZEpiazVzWTIxc2FHSkRNWFZrVnpGcFdsaEphVTlwU1hkTlZFbD\
ZUa1JWTWs1Nlp6VkphWGRwWW0wNWRWa3lWV2xQYVVreVVqTlNkVXN4Y0ZKVE1EUjVVMG\
hHUlZKc1duSlJhMVkwVjJ0NFVsQlVNR2xNUTBwcVkyMVdhR1JIVm10TVZ6bDFTV3B2YV\
UxcVFYbE5hVEIzVG5rd2QwOUdVWGRQUkc4d1RVUnZNRTFwTkRSTmFrSmhTV2wzYVdOSV\
NuWmxSMngwWVZoU05VeFlTbXhhTW14NlpFaEthR05wTVdwYVdFb3dTV3B2YVZSVmJFcF\
JhbEp4VVRCT1FsZFhiRzVSV0dSS1VXdEdibE5WWkVKWFJtc3pUVzFLYVZkck1VSmlNR1\
JFVVROR1NGVXdNREJQVlVwQ1ZGVk9UbEpHVmpSU1dIQkNWV3RLYmxSc1drTlJWemxPVV\
RKemVFNVdSblZXYm5Cb1ZucFdjMWw2VGs1bFJWSlZVVlY0UTFvd05WZFJhMFpxVkZWS1\
IxUnVRbXRTTVZZMFVraHdRbFJyU201VWJGcERVVlV4VGxGdGVGTmlSMDE2Vld0U1VsWk\
ZSbXhTYm1OM1pWVXhSVkpZYkU1U1IwNHpWRzF3Ums1Rk1WVlRiVVpIWkhwQ05sUlZVa1\
psVlRGRldUTmtUMkZyVlRCVVZsSkxXVlV4UlU1SWFFWmxhMFpUVVcxa1QxWnJTa0ppTU\
RGRVlYcEZNVlZYTlZkbGJVWllUbGQ0YWswd01UUlNSbEpDVkVWS2JsUnNXa05SVjA1T1\
VXdGFUMk5IVWtoV1dHaElVa1ZHV0ZGdFpFOVdhMHBDVkZVeFJVMUdTakpaYkdSSFkwZE\
tjMU50ZUdGTmJYZzJXa1ZvUzJGSFRuRlJiSEJPVVdzeFNGRnViSGhTTVU1T1RrUnNRbG\
93VmtoUk1FNTRVakZPVGs1RWJFSmtNRlpKVVZSQ1NsRlZTa05oZWtVeVUzazVjRTU2Yk\
haVmJYUk1UbFpzYVZwV1FtNVBSbFpVVldwbmRtUllUWGhhUmtKV1lWWndTVlJZVW5aaE\
1VNXJZMVYwV0U1WFduVldNMDVEV2tOMGVGVnJkek5XTVVwdFdtMVdXR0V6Ykc1YVYwcD\
JVMjFhU21KSGVERmpiVTV3VFdwV00ySnRhSEJVTVZwRVVqSndiR1ZyU1RGVVZVbDNVak\
JGZUZaWFVrdFZWa1pZVkZWS1VsSXdUa1JqTUdSQ1ZWWldSMUZ1WkU1UmEwcHVXak5LUT\
Fvd1ZrZFJiRVpxVWtWb1JWRlZPVU5hTURWWFUwWkZORkZyUm0xUFJWWkRVVlV4UkZGcV\
VrSmtNVTVDVjFWU1YxVnFRbE5SYTFaR1pERkJNRk5YVW1waVZscDFXVlpvVDAxSFRuUl\
NibXhOVjBaS2MxbDZUbEprVjAxNVlrZDRhVll4V2pGWk0ydDRZVmRTUkU1WVZtRlhSaz\
VFVTBjMVMySkdiM2xpU0hCclUwVndiMWt5YTNoTlJuQlpWR3BDVDJGVVZqWlpWbVJYWk\
Vad1dFNVljRTFXTUc5M1ZFY3dNV0pIVWtWUlZYUkRXakprZUdGSGRIRlVNVUpTVlZWU1\
Fsb3dOVXBSVlZKRFVtdEdjRkZ1YUhOYVJVcHZWMjVGZDFKWVdURlRhM2Q1VlVoS1dGRX\
pValZWZWxwdlVrWnNXRTFZYkVSVWVUbFRXVmhXYVdORlRUTlVWMFpLVWtka1NtRkZSaz\
FWTUhCcFdqQjRkVm95YUdsWmEwWnVUVWRTYWxZd1dsWldiVGgyV2pCa1QwMURPWEZrTT\
NCTFYycENWR0pFU205T1NHaEtWMGR6ZUVsdU1Ua2lMQ0p6YVdkdVlYUjFjbVZ6SWpwYm\
V5SndjbTkwWldOMFpXUWlPaUpsZVVvMFRsZE5hVTlzYzJsVVZXeEtVV2wwVlZFd1RrSl\
pWVTV1VVZoa1NsRnJSbTVUVldSQ1YwYzFWMkZ1VGxaT1ZURkNZakJrUkZFelJraFZNRE\
F3VDFWS1FsUlZUazVTUkVJMFVUTndRbE5yU201VWJGcERVVlpzVlZGWGRFZFZhekZUVm\
xoa1JtUXhiRVZXYkVaU1V6QlNRbVZGZEdoV2VsWjFWVEl4YzJSV2IzZFVibHBxWW10R0\
5GSnVjRUpXYTBwdVZHeGFRMUZWTVU1U1IzUjNZMGRLZEZwRmRHaFdlbFoxVm10a1YyVn\
RVa1pVYTBwT1VUQkdXVkpHVWtwbFJURkZWMWhrVDFKRlJYaFVhMUphWlVVMVIySXhiRV\
ZsYlhNeFZERlNjbVZGTVhGVVdHaE9ZV3N3ZUZReFVsWk9WbVJ4VVd4T1RsVllUak5STV\
VaYVVrWmFVbFZWWkVaa01IQkRWbFpTUmxack1VTlVWV1JDVFZaV1JsRXlaRE5VVms1MF\
lraFdZVTFJUW5kWmJURnJVa2RKZWxOdVpFNVZhekV6VWxaR1dsSkdXbEpWVlZwR1pEST\
VNMVJXVWtwbGF6VkZWbFJLVDJWdFl6RlVWa3BxWkRCYVVsZFZVbGRWVmtaRlVrVkZNVk\
15UmxoT1Z6VlVZbGQ0TVZkcVFsTmlSMUowWWtkd1lWWkZTbUZVVlVwT1VqQktOV05WWk\
ZSVVZGRTFVVmRrUmxJd1RrUmpWV1JVVkZSUk5WRllaRVpUUlVWM1UxVkdRMUY2WXpWaV\
IyeG9WVzFPUTJGc2NHcFNWVlpaWkhwa2VWWlhWbWhrYmxKSVUydEdNVk5FVW5kaGVsSk\
tUa1JLTWxsVlNrNWpNVlY0VFZkc1RWSkZUa1JVUjNSWFlVaFNWbFpxU1hoaVdGcG9Vek\
JPTWxSWVozbFhVM1JVVkZka1VrOUhXbTFrTUhkNVRUTnZlbFpGYkZkUmJHUnhXa1pTUT\
JWck1VUmpNR1JFVVROT1NGRldSbFpTYTBvelVsZGtRMUZxYUZoVFJtTjRZVWROZVZKWV\
VtdFNNVm8yV2tWTk1XVnRSbGhXYmxKaFZucFdObFJHWkV0TlJYaDBUbGQ0YTFKSE9ERl\
VhMUpTWldzeFEwOUZaRUpOVmxaclUxaGtVbGRWTVVOWlZVWkhVbXhHVFdGck5UWlZSbm\
QyVlRGM2RtRXlPVEZoYkVZellXMWpNVkpVVm0xa2JtUnFWMWRLVGxGck1VaFJWRVpXV2\
tWd1VsVlZNVTVSVnpsSVVUQk9lbEl3UmxKV1ZWcERaREF4UkZSVlJUQlNNRVY0VmxkU1\
JXUXdWa05ZUXprelZWVldRbVF3YkVsYU1GSkNVekJLYmxvelJtOWhNbkJRVlVaR1VsSk\
ZSbTVVYTJoQ1VrVktSbEZYYkVOa1ZFNHpWV3RLVFdNd2NFNVZSRlo2VkZSQk0wMUZaM0\
pXVlZwNVpWVTFWazV0WkV4bGEzaFFWVzFPUjJWV1NsTlVNbmg0WTFWb2NGb3diRzVYUl\
U1MFUydDRWV1ZyVm5Oa2ExRjVZMGM1VEU1dFVqUk9iWGQ0V0VNNU1XVlhNVlZpYlVwU1\
VrVlNiVk50ZUdoa1NGWlpUV3hLZGxRd1ZUbEpiREJ6U1c1U05XTkRTVFpKYmxwMlpGZE\
9iMXBZU1hSaGJtUjZTekp3ZW1JeU5HbE1RMHBvWWtkamFVOXBTa1pWZWtreFRtbEtPU0\
lzSW5OcFoyNWhkSFZ5WlNJNkltRmlWbWMwVkVSSGVsTlVhbFpJYTFGc1RtVkpWek5CUW\
5VMVdsaGtUV3d4WTBWeGQyTkpRV3hJUmxjMFFuSnNSMkpQTFVSU1ZFdG1lVU5QUjNoVF\
Z6UTVMV3QwU21OeVZteFpaMHR4UXpSNGJWcHZlVEJSSW4xZGZRPT0iLCJjcmVhdGVkLW\
9uIjoiMjAyMi0wNy0wOFQwODo0MDo0Mi44NDhaIn19",
  "signatures": [{
    "protected": "eyJ4NWMiOlsiTUlJQm96Q0NBVXFnQXdJQkFnSUdBVzBlTHVJRk\
1Bb0dDQ3FHU000OUJBTUNNRFV4RXpBUkJnTlZCQW9NQ2sxNVFuVnphVzVsYzNNeERUQU\
xCZ05WQkFjTUJGTnBkR1V4RHpBTkJnTlZCQU1NQmxSbGMzUkRRVEFlRncweE9UQTVNVE\
V3TWpNM016SmFGdzB5T1RBNU1URXdNak0zTXpKYU1GUXhFekFSQmdOVkJBb01DazE1UW\
5WemFXNWxjM014RFRBTEJnTlZCQWNNQkZOcGRHVXhMakFzQmdOVkJBTU1KVkpsWjJsem\
RISmhjaUJXYjNWamFHVnlJRkpsY1hWbGMzUWdVMmxuYm1sdVp5QkxaWGt3V1RBVEJnY3\
Foa2pPUFFJQkJnZ3Foa2pPUFFNQkJ3TkNBQVQ2eFZ2QXZxVHoxWlVpdU5XaFhwUXNrYV\
B5N0FISFFMd1hpSjBpRUx0NnVOUGFuQU4wUW5XTVlPXC8wQ0RFaklrQlFvYnc4WUtxan\
R4SkhWU0dUajlLT295Y3dKVEFUQmdOVkhTVUVEREFLQmdnckJnRUZCUWNESERBT0JnTl\
ZIUThCQWY4RUJBTUNCNEF3Q2dZSUtvWkl6ajBFQXdJRFJ3QXdSQUlnWXIyTGZxb2FDS0\
RGNFJBY01tSmkrTkNacWRTaXVWdWdJU0E3T2hLUnEzWUNJRHhuUE1NbnBYQU1UclBKdV\
BXeWNlRVIxMVB4SE9uKzBDcFNIaTJxZ3BXWCIsIk1JSUJwRENDQVVtZ0F3SUJBZ0lHQV\
cwZUx1SCtNQW9HQ0NxR1NNNDlCQU1DTURVeEV6QVJCZ05WQkFvTUNrMTVRblZ6YVc1bG\
MzTXhEVEFMQmdOVkJBY01CRk5wZEdVeER6QU5CZ05WQkFNTUJsUmxjM1JEUVRBZUZ3MH\
hPVEE1TVRFd01qTTNNekphRncweU9UQTVNVEV3TWpNM016SmFNRFV4RXpBUkJnTlZCQW\
9NQ2sxNVFuVnphVzVsYzNNeERUQUxCZ05WQkFjTUJGTnBkR1V4RHpBTkJnTlZCQU1NQm\
xSbGMzUkRRVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUFCT2t2a1RIdT\
hRbFQzRkhKMVVhSTcrV3NIT2IwVVMzU0FMdEc1d3VLUURqaWV4MDZcL1NjWTVQSmlidm\
dIVEIrRlwvUVRqZ2VsSEd5MVlLcHdjTk1jc1N5YWpSVEJETUJJR0ExVWRFd0VCXC93UU\
lNQVlCQWY4Q0FRRXdEZ1lEVlIwUEFRSFwvQkFRREFnSUVNQjBHQTFVZERnUVdCQlRvWk\
lNelFkc0RcL2pcLytnWFwvN2NCSnVjSFwvWG1qQUtCZ2dxaGtqT1BRUURBZ05KQURCR0\
FpRUF0eFEzK0lMR0JQSXRTaDRiOVdYaFhOdWhxU1A2SCtiXC9MQ1wvZlZZRGpRNm9DSV\
FERzJ1UkNIbFZxM3loQjU4VFhNVWJ6SDgrT2xoV1V2T2xSRDNWRXFEZGNRdz09Il0sIn\
R5cCI6InZvdWNoZXItandzK2pzb24iLCJhbGciOiJFUzI1NiJ9",
    "signature": "0fzuqVdyhemWsu_HQeF-CmQwJeLp9IStNf-bWZwz6SojrEOR4a\
Dq6VStyG8eWXjGHNZiRyyLJo7RP1rKatuS2w"
  }]
}
]]></artwork>
        </figure>
      </section>
      <section anchor="example-voucher-response-from-masa-to-pledge-via-registrar">
        <name>Example Voucher Response (from MASA to Pledge, via Registrar)</name>
        <t>The following is an example voucher response from MASA to Pledge via Registrar, in "General JWS JSON Serialization".</t>
        <figure anchor="ExampleVoucherResponsefigure">
          <name>Example Voucher Response</name>
          <artwork align="left"><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

{
  "payload": "eyJpZXRmLXZvdWNoZXI6dm91Y2hlciI6eyJhc3NlcnRpb24iOiJsb2\
dnZWQiLCJzZXJpYWwtbnVtYmVyIjoiMDEyMzQ1Njc4OSIsIm5vbmNlIjoiZGRoSGQ4Ml\
FpUGtzMDBTck1USTlEUT09IiwiY3JlYXRlZC1vbiI6IjIwMjItMDctMDdUMTc6NDc6MD\
EuODkwWiIsInBpbm5lZC1kb21haW4tY2VydCI6Ik1JSUJwRENDQVVtZ0F3SUJBZ0lHQV\
cwZUx1SCtNQW9HQ0NxR1NNNDlCQU1DTURVeEV6QVJCZ05WQkFvTUNrMTVRblZ6YVc1bG\
MzTXhEVEFMQmdOVkJBY01CRk5wZEdVeER6QU5CZ05WQkFNTUJsUmxjM1JEUVRBZUZ3MH\
hPVEE1TVRFd01qTTNNekphRncweU9UQTVNVEV3TWpNM016SmFNRFV4RXpBUkJnTlZCQW\
9NQ2sxNVFuVnphVzVsYzNNeERUQUxCZ05WQkFjTUJGTnBkR1V4RHpBTkJnTlZCQU1NQm\
xSbGMzUkRRVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUFCT2t2a1RIdT\
hRbFQzRkhKMVVhSTcrV3NIT2IwVVMzU0FMdEc1d3VLUURqaWV4MDYvU2NZNVBKaWJ2Z0\
hUQitGL1FUamdlbEhHeTFZS3B3Y05NY3NTeWFqUlRCRE1CSUdBMVVkRXdFQi93UUlNQV\
lCQWY4Q0FRRXdEZ1lEVlIwUEFRSC9CQVFEQWdJRU1CMEdBMVVkRGdRV0JCVG9aSU16UW\
RzRC9qLytnWC83Y0JKdWNIL1htakFLQmdncWhrak9QUVFEQWdOSkFEQkdBaUVBdHhRMy\
tJTEdCUEl0U2g0YjlXWGhYTnVocVNQNkgrYi9MQy9mVllEalE2b0NJUURHMnVSQ0hsVn\
EzeWhCNThUWE1VYnpIOCtPbGhXVXZPbFJEM1ZFcURkY1F3PT0ifX0",
  "signatures": [{
    "protected": "eyJ4NWMiOlsiTUlJQmt6Q0NBVGlnQXdJQkFnSUdBV0ZCakNrWU\
1Bb0dDQ3FHU000OUJBTUNNRDB4Q3pBSkJnTlZCQVlUQWtGUk1SVXdFd1lEVlFRS0RBeE\
thVzVuU21sdVowTnZjbkF4RnpBVkJnTlZCQU1NRGtwcGJtZEthVzVuVkdWemRFTkJNQj\
RYRFRFNE1ERXlPVEV3TlRJME1Gb1hEVEk0TURFeU9URXdOVEkwTUZvd1R6RUxNQWtHQT\
FVRUJoTUNRVkV4RlRBVEJnTlZCQW9NREVwcGJtZEthVzVuUTI5eWNERXBNQ2NHQTFVRU\
F3d2dTbWx1WjBwcGJtZERiM0p3SUZadmRXTm9aWElnVTJsbmJtbHVaeUJMWlhrd1dUQV\
RCZ2NxaGtqT1BRSUJCZ2dxaGtqT1BRTUJCd05DQUFTQzZiZUxBbWVxMVZ3NmlRclJzOF\
IwWlcrNGIxR1d5ZG1XczJHQU1GV3diaXRmMm5JWEgzT3FIS1Z1OHMyUnZpQkdOaXZPS0\
dCSEh0QmRpRkVaWnZiN294SXdFREFPQmdOVkhROEJBZjhFQkFNQ0I0QXdDZ1lJS29aSX\
pqMEVBd0lEU1FBd1JnSWhBSTRQWWJ4dHNzSFAyVkh4XC90elVvUVwvU3N5ZEwzMERRSU\
5FdGNOOW1DVFhQQWlFQXZJYjNvK0ZPM0JUbmNMRnNhSlpSQWtkN3pPdXNuXC9cL1pLT2\
FFS2JzVkRpVT0iXSwidHlwIjoidm91Y2hlci1qd3MranNvbiIsImFsZyI6IkVTMjU2In\
0",
    "signature": "y1HLYBFlwouf42XWSKUWjeYQHnG2Q6A4bjA7hvTkB3z1dPwTUl\
jPHtuN2Qex6gDxTfaSiKeoXGsOD4JWOgQJPg"
  }]
}
]]></artwork>
        </figure>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="BRSKI">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="T. Eckert" initials="T." surname="Eckert"/>
            <author fullname="M. Behringer" initials="M." surname="Behringer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane. To do this, a Secure Key Infrastructure is bootstrapped. This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline. We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device. The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="SZTP">
          <front>
            <title>Secure Zero Touch Provisioning (SZTP)</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="I. Farrer" initials="I." surname="Farrer"/>
            <author fullname="M. Abrahamsson" initials="M." surname="Abrahamsson"/>
            <date month="April" year="2019"/>
            <abstract>
              <t>This document presents a technique to securely provision a networking device when it is booting in a factory-default state. Variations in the solution enable it to be used on both public and private networks. The provisioning steps are able to update the boot image, commit an initial configuration, and execute arbitrary scripts to address auxiliary needs. The updated device is subsequently able to establish secure connections with other systems. For instance, a device may establish NETCONF (RFC 6241) and/or RESTCONF (RFC 8040) connections with deployment-specific network management systems.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8572"/>
          <seriesInfo name="DOI" value="10.17487/RFC8572"/>
        </reference>
        <reference anchor="I-D.draft-ietf-anima-rfc8366bis">
          <front>
            <title>A Voucher Artifact for Bootstrapping Protocols</title>
            <author fullname="Kent Watsen" initials="K." surname="Watsen">
              <organization>Watsen Networks</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software</organization>
            </author>
            <author fullname="Max Pritikin" initials="M." surname="Pritikin">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Toerless Eckert" initials="T. T." surname="Eckert">
              <organization>Futurewei Technologies Inc.</organization>
            </author>
            <author fullname="Qiufang Ma" initials="Q." surname="Ma">
              <organization>Huawei</organization>
            </author>
            <date day="22" month="August" year="2023"/>
            <abstract>
              <t>   This document defines a strategy to securely assign a pledge to an
   owner using an artifact signed, directly or indirectly, by the
   pledge's manufacturer.  This artifact is known as a "voucher".

   This document defines an artifact format as a YANG-defined JSON or
   CBOR document that has been signed using a variety of cryptographic
   systems.

   The voucher artifact is normally generated by the pledge's
   manufacturer (i.e., the Manufacturer Authorized Signing Authority
   (MASA)).

   This document updates RFC8366, merging a number of extensions into
   the YANG.  The RFC8995 voucher request is also merged into this
   document.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-rfc8366bis-10"/>
        </reference>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC3629">
          <front>
            <title>UTF-8, a transformation format of ISO 10646</title>
            <author fullname="F. Yergeau" initials="F." surname="Yergeau"/>
            <date month="November" year="2003"/>
            <abstract>
              <t>ISO/IEC 10646-1 defines a large character set called the Universal Character Set (UCS) which encompasses most of the world's writing systems. The originally proposed encodings of the UCS, however, were not compatible with many current applications and protocols, and this has led to the development of UTF-8, the object of this memo. UTF-8 has the characteristic of preserving the full US-ASCII range, providing compatibility with file systems, parsers and other software that rely on US-ASCII values but are transparent to other values. This memo obsoletes and replaces RFC 2279.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="63"/>
          <seriesInfo name="RFC" value="3629"/>
          <seriesInfo name="DOI" value="10.17487/RFC3629"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC5652">
          <front>
            <title>Cryptographic Message Syntax (CMS)</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="70"/>
          <seriesInfo name="RFC" value="5652"/>
          <seriesInfo name="DOI" value="10.17487/RFC5652"/>
        </reference>
        <reference anchor="RFC7950">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="RFC7951">
          <front>
            <title>JSON Encoding of Data Modeled with YANG</title>
            <author fullname="L. Lhotka" initials="L." surname="Lhotka"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>This document defines encoding rules for representing configuration data, state data, parameters of Remote Procedure Call (RPC) operations or actions, and notifications defined using YANG as JavaScript Object Notation (JSON) text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7951"/>
          <seriesInfo name="DOI" value="10.17487/RFC7951"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC8366">
          <front>
            <title>A Voucher Artifact for Bootstrapping Protocols</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
            <author fullname="T. Eckert" initials="T." surname="Eckert"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>This document defines a strategy to securely assign a pledge to an owner using an artifact signed, directly or indirectly, by the pledge's manufacturer. This artifact is known as a "voucher".</t>
              <t>This document defines an artifact format as a YANG-defined JSON document that has been signed using a Cryptographic Message Syntax (CMS) structure. Other YANG-derived formats are possible. The voucher artifact is normally generated by the pledge's manufacturer (i.e., the Manufacturer Authorized Signing Authority (MASA)).</t>
              <t>This document only defines the voucher artifact, leaving it to other documents to describe specialized protocols for accessing it.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8366"/>
          <seriesInfo name="DOI" value="10.17487/RFC8366"/>
        </reference>
        <reference anchor="RFC8792">
          <front>
            <title>Handling Long Lines in Content of Internet-Drafts and RFCs</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="E. Auerswald" initials="E." surname="Auerswald"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <date month="June" year="2020"/>
            <abstract>
              <t>This document defines two strategies for handling long lines in width-bounded text content. One strategy, called the "single backslash" strategy, is based on the historical use of a single backslash ('\') character to indicate where line-folding has occurred, with the continuation occurring with the first character that is not a space character (' ') on the next line. The second strategy, called the "double backslash" strategy, extends the first strategy by adding a second backslash character to identify where the continuation begins and is thereby able to handle cases not supported by the first strategy. Both strategies use a self-describing header enabling automated reconstitution of the original content.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8792"/>
          <seriesInfo name="DOI" value="10.17487/RFC8792"/>
        </reference>
        <reference anchor="RFC8812">
          <front>
            <title>CBOR Object Signing and Encryption (COSE) and JSON Object Signing and Encryption (JOSE) Registrations for Web Authentication (WebAuthn) Algorithms</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="August" year="2020"/>
            <abstract>
              <t>The W3C Web Authentication (WebAuthn) specification and the FIDO Alliance FIDO2 Client to Authenticator Protocol (CTAP) specification use CBOR Object Signing and Encryption (COSE) algorithm identifiers. This specification registers the following algorithms (which are used by WebAuthn and CTAP implementations) in the IANA "COSE Algorithms" registry: RSASSA-PKCS1-v1_5 using SHA-256, SHA-384, SHA-512, and SHA-1; and Elliptic Curve Digital Signature Algorithm (ECDSA) using the secp256k1 curve and SHA-256. It registers the secp256k1 elliptic curve in the IANA "COSE Elliptic Curves" registry. Also, for use with JSON Object Signing and Encryption (JOSE), it registers the algorithm ECDSA using the secp256k1 curve and SHA-256 in the IANA "JSON Web Signature and Encryption Algorithms" registry and the secp256k1 elliptic curve in the IANA "JSON Web Key Elliptic Curve" registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8812"/>
          <seriesInfo name="DOI" value="10.17487/RFC8812"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="ON-PATH" target="https://mailarchive.ietf.org/arch/msg/saag/m1r9uo4xYznOcf85Eyk0Rhut598/">
          <front>
            <title>can an on-path attacker drop traffic?</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="I-D.ietf-anima-constrained-voucher">
          <front>
            <title>Constrained Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Peter Van der Stok" initials="P." surname="Van der Stok">
              <organization>vanderstok consultancy</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Esko Dijk" initials="E." surname="Dijk">
              <organization>IoTconsultancy.nl</organization>
            </author>
            <date day="7" month="July" year="2023"/>
            <abstract>
              <t>   This document defines the Constrained Bootstrapping Remote Secure Key
   Infrastructure (Constrained BRSKI) protocol, which provides a
   solution for secure zero-touch bootstrapping of resource-constrained
   (IoT) devices into the network of a domain owner.  This protocol is
   designed for constrained networks, which may have limited data
   throughput or may experience frequent packet loss.  Constrained BRSKI
   is a variant of the BRSKI protocol, which uses an artifact signed by
   the device manufacturer called the "voucher" which enables a new
   device and the owner's network to mutually authenticate.  While the
   BRSKI voucher is typically encoded in JSON, Constrained BRSKI uses a
   compact CBOR-encoded voucher.  The BRSKI voucher is extended with new
   data types that allow for smaller voucher sizes.  The Enrollment over
   Secure Transport (EST) protocol, used in BRSKI, is replaced with EST-
   over-CoAPS; and HTTPS used in BRSKI is replaced with CoAPS.  This
   document Updates RFC 8366 and RFC 8995.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-constrained-voucher-21"/>
        </reference>
        <reference anchor="I-D.ietf-anima-brski-prm">
          <front>
            <title>BRSKI with Pledge in Responder Mode (BRSKI-PRM)</title>
            <author fullname="Steffen Fries" initials="S." surname="Fries">
              <organization>Siemens AG</organization>
            </author>
            <author fullname="Thomas Werner" initials="T." surname="Werner">
              <organization>Siemens AG</organization>
            </author>
            <author fullname="Eliot Lear" initials="E." surname="Lear">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date day="10" month="July" year="2023"/>
            <abstract>
              <t>   This document defines enhancements to Bootstrapping a Remote Secure
   Key Infrastructure (BRSKI, RFC8995) to enable bootstrapping in
   domains featuring no or only limited connectivity between a pledge
   and the domain registrar.  It specifically changes the interaction
   model from a pledge-initiated mode, as used in BRSKI, to a pledge-
   responding mode, where the pledge is in server role.  For this, BRSKI
   with Pledge in Responder Mode (BRSKI-PRM) introduces a new component,
   the registrar-agent, which facilitates the communication between
   pledge and registrar during the bootstrapping phase.  To establish
   the trust relation between pledge and registrar, BRSKI-PRM relies on
   object security rather than transport security.  The approach defined
   here is agnostic to the enrollment protocol that connects the domain
   registrar to the domain CA.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-brski-prm-09"/>
        </reference>
        <reference anchor="I-D.kuehlewind-update-tag">
          <front>
            <title>Definition of new tags for relations between RFCs</title>
            <author fullname="Mirja Kühlewind" initials="M." surname="Kühlewind">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Suresh Krishnan" initials="S." surname="Krishnan">
              <organization>Kaloom</organization>
            </author>
            <date day="12" month="July" year="2021"/>
            <abstract>
              <t>   An RFC can include a tag called "Updates" which can be used to link a
   new RFC to an existing RFC.  On publication of such an RFC, the
   existing RFC will include an additional metadata tag called "Updated
   by" which provides a link to the new RFC.  However, this tag pair is
   not well-defined and therefore it is currently used for multiple
   different purposes, which leads to confusion about the actual meaning
   of this tag and inconsistency in its use.

   This document recommends the discontinuation of the use of the
   updates/updated by tag pair, and instead proposes three new tag pairs
   that have well-defined meanings and use cases.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-kuehlewind-update-tag-04"/>
        </reference>
      </references>
    </references>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="T." surname="Eckert" fullname="Toerless Eckert">
        <organization>Futurewei Technologies Inc.</organization>
        <address>
          <email>tte+ietf@cs.fau.de</email>
        </address>
      </contact>
      <contact initials="E." surname="Dijk" fullname="Esko Dijk">
        <organization/>
        <address>
          <email>esko.dijk@iotconsultancy.nl</email>
        </address>
      </contact>
      <contact initials="S." surname="Fries" fullname="Steffen Fries">
        <organization>Siemens AG</organization>
        <address>
          <email>steffen.fries@siemens.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
