<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 2.6.10) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-anima-jws-voucher-11" category="std" consensus="true" submissionType="IETF" updates="8366bis" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.16.0 -->
  <front>
    <title abbrev="JWS-voucher">JWS signed Voucher Artifacts for Bootstrapping Protocols</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-anima-jws-voucher-11"/>
    <author initials="T." surname="Werner" fullname="Thomas Werner">
      <organization>Siemens AG</organization>
      <address>
        <email>thomas-werner@siemens.com</email>
      </address>
    </author>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <date year="2024" month="September" day="10"/>
    <area>Internet</area>
    <workgroup>anima Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 68?>

<t>I-D.draft-ietf-anima-rfc8366bis defines a digital artifact called voucher as a YANG-defined JSON document that is signed using a Cryptographic Message Syntax (CMS) structure.
This document introduces a variant of the voucher artifact in which CMS is replaced by the JSON Object Signing and Encryption (JOSE) mechanism described in RFC7515 to support deployments in which JOSE is preferred over CMS.</t>
      <t>In addition to explaining how the format is created, the "application/voucher-jws+json" media type is registered and examples are provided.</t>
    </abstract>
  </front>
  <middle>
    <?line 75?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>"A Voucher Artifact for Bootstrapping Protocols" <xref target="I-D.draft-ietf-anima-rfc8366bis"/> defines a YANG-based data structure used in "Bootstrapping Remote Secure Key Infrastructure" <xref target="BRSKI"/> and
"Secure Zero Touch Provisioning" <xref target="SZTP"/> to transfer ownership of a device from a manufacturer to a new owner (customer or operational domain).
That document provides a serialization of the voucher data to JSON <xref target="RFC8259"/> with cryptographic signing according to the Cryptographic Message Syntax (CMS) <xref target="RFC5652"/>.
The resulting voucher artifact has the media type "application/voucher-cms+json".</t>
      <t>This document provides cryptographic signing of the JSON Voucher Data in form of JSON Web Signature (JWS) <xref target="RFC7515"/>
and the media type "application/voucher-jws+json".
The encoding specified in this document is used by <xref target="I-D.ietf-anima-brski-prm"/>
and may be more handy for use cases already using Javascript Object Signing and Encryption (JOSE).
This document should be considered as enhancement of <xref target="I-D.draft-ietf-anima-rfc8366bis"/>,<br/>
as it provides a new voucher form with media type "application/voucher-jws+json" and the related serialization.
It does not extend the YANG definition of <xref target="I-D.draft-ietf-anima-rfc8366bis"/>.</t>
      <t>Another example of an enhancement of <xref target="I-D.draft-ietf-anima-rfc8366bis"/> is <xref target="I-D.draft-ietf-anima-constrained-voucher"/>.
It provides the serialization of voucher data to CBOR <xref target="RFC8949"/>,
with the signature in form of COSE <xref target="RFC8812"/> and the media type "application/voucher-cose+cbor".</t>
      <t>With the availability of different encoded vouchers, it is up to an industry specific application statement to indicate/decide which voucher signature format is to be used.
There is no provision across the different voucher signature formats that a receiver could safely recognize which format it uses unless additional context is provided.
For example, <xref target="BRSKI"/> provides this context via the media type for the voucher artifact.
This document utilizes the optional "typ" (Type) Header Parameter of JWS <xref target="RFC7515"/> to provide information about the signed object.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
      </t>
      <t>This document uses the following terms:</t>
      <dl>
        <dt>JSON Voucher Data:</dt>
        <dd>
          <t>An unsigned JSON representation of the voucher data.</t>
        </dd>
        <dt>JWS Voucher:</dt>
        <dd>
          <t>A JWS structure signing the JSON Voucher Data.</t>
        </dd>
        <dt>Voucher:</dt>
        <dd>
          <t>A short form for voucher artifact and refers to the signed statement from Manufacturer Authorized Signing Authority (MASA) service that indicates to a Pledge the cryptographic identity of the domain it should trust, per <xref target="I-D.draft-ietf-anima-rfc8366bis"/>.</t>
        </dd>
        <dt>Voucher Data:</dt>
        <dd>
          <t>The raw (serialized) representation of "ietf-voucher" YANG module without any enclosing signature, per <xref target="I-D.draft-ietf-anima-rfc8366bis"/>.</t>
        </dd>
      </dl>
      <t>MASA (Manufacturer Authorized Signing Authority):
The entity that, for the purpose of this document, issues and signs the vouchers for a manufacturer's pledges. In some onboarding protocols, the MASA may have an Internet presence and be integral to the onboarding process, whereas in other protocols the MASA may be an offline service that has no active role in the onboarding process, per <xref target="I-D.draft-ietf-anima-rfc8366bis"/>.</t>
      <t>Pledge:
The prospective component attempting to find and securely join a domain. When shipped or in factory reset mode, it only trusts authorized representatives of the manufacturer, per <xref target="I-D.draft-ietf-anima-rfc8366bis"/>.</t>
      <t>Registrar:
A representative of the domain that is configured, perhaps autonomically, to decide whether a new device is allowed to join the domain, per <xref target="I-D.draft-ietf-anima-rfc8366bis"/>.</t>
      <t>This document uses the following encoding notations:</t>
      <dl>
        <dt>BASE64URL(OCTETS):</dt>
        <dd>
          <t>Denotes the base64url encoding of OCTETS, per <xref section="2" sectionFormat="of" target="RFC7515"/>.</t>
        </dd>
        <dt>UTF8(STRING):</dt>
        <dd>
          <t>Denotes the octets of the UTF-8 <xref target="RFC3629"/> representation of STRING, per <xref section="1" sectionFormat="of" target="RFC7515"/>.</t>
        </dd>
      </dl>
    </section>
    <section anchor="voucher-artifact-with-json-web-signature">
      <name>Voucher Artifact with JSON Web Signature</name>
      <t><xref target="RFC7515"/> defines the following serializations for JWS:</t>
      <ol spacing="normal" type="1"><li>"JWS Compact Serialization" in <xref section="7.1" sectionFormat="of" target="RFC7515"/></li>
        <li>
          <t>"JWS JSON Serialization" in <xref section="7.2" sectionFormat="of" target="RFC7515"/>
          </t>
          <ul spacing="normal">
            <li>"General JWS JSON Serialization Syntax" in <xref section="7.2.1" sectionFormat="of" target="RFC7515"/></li>
            <li>"Flattened JWS JSON Serialization Syntax" in <xref section="7.2.2" sectionFormat="of" target="RFC7515"/></li>
          </ul>
        </li>
      </ol>
      <t>A "JWS JSON Serialization Overview" is given in <xref section="3.2" sectionFormat="of" target="RFC7515"/> and more details on the JWS serializations in <xref section="7" sectionFormat="of" target="RFC7515"/>.
This document makes use of "General JWS JSON Serialization Syntax" of <xref target="RFC7515"/> to support multiple signatures,
as already supported by <xref target="RFC8366"/> for CMS-signed vouchers.
Note, "JWS Compact Serialization" is limited to one signature.</t>
      <section anchor="voucher-representation-in-general-jws-json-serialization-syntax">
        <name>Voucher Representation in General JWS JSON Serialization Syntax</name>
        <t>JWS voucher artifacts MUST use the "General JWS JSON Serialization Syntax" defined in <xref section="7.2.1" sectionFormat="of" target="RFC7515"/>.
The following figure summarizes the serialization of JWS voucher artifacts:</t>
        <figure anchor="VoucherGeneralJWSFigure">
          <name>Voucher Representation in General JWS JSON Serialization Syntax (JWS Voucher)</name>
          <artwork align="left"><![CDATA[
    {
      "payload": BASE64URL(UTF8(JSON Voucher Data)),
      "signatures": [
        {
          "protected": BASE64URL(UTF8(JWS Protected Header)),
          "signature": BASE64URL(JWS Signature)
        }
      ]
    }
]]></artwork>
        </figure>
        <t>The JSON Voucher Data MUST be UTF-8 encoded to become the octet-based JWS Payload defined in <xref target="RFC7515"/>.
The JWS Payload is further base64url-encoded to become the string value of the "payload" member as described in <xref section="3.2" sectionFormat="of" target="RFC7515"/>.
The octets of the UTF-8 representation of the JWS Protected Header are base64url-encoded to become the string value of the "protected" member.
The generated JWS Signature is base64url-encoded to become the string value of the "signature" member.</t>
      </section>
      <section anchor="json-voucher-data">
        <name>JSON Voucher Data</name>
        <t>The JSON Voucher Data is an unsigned JSON document <xref target="RFC8259"/> that conforms with the data model described by the ietf-voucher YANG module <xref target="RFC7950"/> defined in <xref section="7.3" sectionFormat="of" target="I-D.draft-ietf-anima-rfc8366bis"/> and is encoded using the rules defined in <xref target="RFC7951"/>.
The following figure provides an example of JSON Voucher Data:</t>
        <figure anchor="VoucherGeneralJWSVoucherPayloadFigure">
          <name>JSON Voucher Data Example</name>
          <artwork align="left"><![CDATA[
    {
      "ietf-voucher:voucher": {
        "assertion": "logged",
        "serial-number": "0123456789",
        "nonce": "5742698422680472",
        "created-on": "2022-07-08T03:01:24.618Z",
        "pinned-domain-cert": "base64encodedvalue=="
      }
    }
]]></artwork>
        </figure>
      </section>
      <section anchor="jws-protected-header">
        <name>JWS Protected Header</name>
        <t>The JWS Protected Header defined in <xref target="RFC7515"/> uses the standard header parameters "alg", "typ", and "x5c".
The "alg" parameter MUST contain the algorithm type used to create the signature, e.g., "ES256" as defined in <xref section="4.1.1" sectionFormat="of" target="RFC7515"/>.
If present, the "typ" parameter SHOULD contain the value "voucher-jws+json" as defined in <xref section="4.1.9" sectionFormat="of" target="RFC7515"/>.
If X.509 (PKIX) certificates <xref target="RFC5280"/> are used, the "x5c" parameter SHOULD contain the base64-encoded (not base64url-encoded) X.509 v3 (DER) certificate and chain as defined in <xref section="4.1.6" sectionFormat="of" target="RFC7515"/>.</t>
        <t>Implementation Note:
base64-encoded values opposed to base64url-encoded values may contain slashes ('/').
JSON <xref target="RFC8259"/> optionally allows escaping these with backslashes ('\').
Hence, depending on the JSON parser/serializer implementation used, they may or may not be included.
JWS Voucher parsers must be prepared accordingly to extract certificates correctly.</t>
        <t>To validate voucher signatures all certificates of the certificate chain are required up to the trust anchor.
Note, to establish trust the trust anchor SHOULD be provided out-of-band upfront.
This is consistent with <xref section="5.5.2" sectionFormat="of" target="BRSKI"/>.</t>
        <t>The following figure gives an example of a JWS Protected Header:</t>
        <figure anchor="VoucherGeneralJWSProtectedHeaderFigure">
          <name>JWS Protected Header Example</name>
          <artwork align="left"><![CDATA[
    {
      "alg": "ES256",
      "typ": "voucher-jws+json",
      "x5c": [
        "base64encodedvalue1==",
        "base64encodedvalue2=="
      ]
    }  
]]></artwork>
        </figure>
      </section>
      <section anchor="jws-signature">
        <name>JWS Signature</name>
        <t>The JWS Signature is generated over the JWS Protected Header and the JWS Payload (= UTF-8 encoded JSON Voucher Data) as described in <xref section="5.1" sectionFormat="of" target="RFC7515"/>.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>The Pledge Voucher Request (PVR) reveals the IDevID of the component (Pledge) that is in the process of bootstrapping.</t>
      <t>A PVR is transported via HTTP-over-TLS. However, for the Pledge-to-Registrar TLS connection a Pledge provisionally accepts the Registrar server certificate during the TLS server authentication.
Hence it is subject to disclosure by a Dolev-Yao attacker (a "malicious messenger") <xref target="ON-PATH"/>, as explained in <xref section="10.2" sectionFormat="of" target="BRSKI"/>.</t>
      <t>The use of a JWS header brings no new privacy considerations.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The issues of how <xref target="I-D.draft-ietf-anima-rfc8366bis"/> vouchers are used in a <xref target="BRSKI"/> system is addressed in <xref section="11" sectionFormat="of" target="BRSKI"/>.
This document does not change any of those issues, it just changes the signature technology used for voucher request and response artifacts.</t>
      <t><xref section="9" sectionFormat="of" target="SZTP"/> deals with voucher use in Secure Zero Touch Provisioning, for which this document also makes no changes to security.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="media-type-registry">
        <name>Media-Type Registry</name>
        <t>This section registers the "application/voucher-jws+json" in the "Media Types" registry.</t>
        <section anchor="applicationvoucher-jwsjson">
          <name>application/voucher-jws+json</name>
          <artwork><![CDATA[
Type name:  application
Subtype name:  voucher-jws+json
Required parameters:  none
Optional parameters:  none
Encoding considerations:  JWS+JSON vouchers are JOSE objects
                          signed with one or multiple signers.
Security considerations:  See section [Security Considerations]
Interoperability considerations:  The format is designed to be
  broadly interoperable.
Published specification:  [THIS RFC].
Applications that use this media type:  ANIMA, 6tisch, and other
  zero-touch bootstrapping/provisioning solutions
Additional information:
  Magic number(s):  None
  File extension(s):  .vjj
  Macintosh file type code(s):  none
Person & email address to contact for further information:  IETF
  ANIMA WG
Intended usage:  LIMITED
Restrictions on usage:  NONE
Author:  ANIMA WG
Change controller:  IETF
Provisional registration? (standards tree only):  NO
]]></artwork>
        </section>
      </section>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank the various reviewers for their input,
in particular Steffen Fries, Ingo Wenda, Esko Dijk and Toerless Eckert.
Thanks for the supporting PoC implementations to Hong Rui Li and He Peng Jia.</t>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <t>These examples are folded according to <xref target="RFC8792"/> Single Backslash rule.</t>
      <section anchor="example-pledge-voucher-request-pvr-from-pledge-to-registrar">
        <name>Example Pledge Voucher Request - PVR (from Pledge to Registrar)</name>
        <t>The following is an example request sent from a Pledge to the Registrar, in "General JWS JSON Serialization".</t>
        <figure anchor="ExamplePledgeVoucherRequestfigure">
          <name>Example Pledge Voucher Request - PVR</name>
          <artwork align="left"><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

{
  "payload": "eyJpZXRmLXZvdWNoZXItcmVxdWVzdDp2b3VjaGVyIjp7InNlcmlhbC\
1udW1iZXIiOiIwMTIzNDU2Nzg5Iiwibm9uY2UiOiI2R3RuK1pRS04ySHFERlZrQkV4Wk\
xRPT0iLCJjcmVhdGVkLW9uIjoiMjAyMi0wNy0wOFQwODo0MDo0Mi44MjBaIiwicHJveG\
ltaXR5LXJlZ2lzdHJhci1jZXJ0IjoiTUlJQjRqQ0NBWWlnQXdJQkFnSUdBWFk3MmJiWk\
1Bb0dDQ3FHU000OUJBTUNNRFV4RXpBUkJnTlZCQW9NQ2sxNVFuVnphVzVsYzNNeERUQU\
xCZ05WQkFjTUJGTnBkR1V4RHpBTkJnTlZCQU1NQmxSbGMzUkRRVEFlRncweU1ERXlNRG\
N3TmpFNE1USmFGdzB6TURFeU1EY3dOakU0TVRKYU1ENHhFekFSQmdOVkJBb01DazE1UW\
5WemFXNWxjM014RFRBTEJnTlZCQWNNQkZOcGRHVXhHREFXQmdOVkJBTU1EMFJ2YldGcG\
JsSmxaMmx6ZEhKaGNqQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDlBd0VIQTBJQUJCaz\
E2Sy9pNzlvUmtLNVliZVBnOFVTUjgvdXMxZFBVaVpITXRva1NkcUtXNWZuV3NCZCtxUk\
w3V1JmZmVXa3lnZWJvSmZJbGx1cmNpMjV3bmhpT1ZDR2plekI1TUIwR0ExVWRKUVFXTU\
JRR0NDc0dBUVVGQndNQkJnZ3JCZ0VGQlFjREhEQU9CZ05WSFE4QkFmOEVCQU1DQjRBd1\
NBWURWUjBSQkVFd1A0SWRjbVZuYVhOMGNtRnlMWFJsYzNRdWMybGxiV1Z1Y3kxaWRDNX\
VaWFNDSG5KbFoybHpkSEpoY2kxMFpYTjBOaTV6YVdWdFpXNXpMV0owTG01bGREQUtCZ2\
dxaGtqT1BRUURBZ05JQURCRkFpQnhsZEJoWnEwRXY1SkwyUHJXQ3R5UzZoRFlXMXlDTy\
9SYXVicEM3TWFJRGdJaEFMU0piZ0xuZ2hiYkFnMGRjV0ZVVm8vZ0dOMC9qd3pKWjBTbD\
JoNHhJWGsxIn19",
  "signatures": [{
    "protected": "eyJ4NWMiOlsiTUlJQitUQ0NBYUNnQXdJQkFnSUdBWG5WanNVNU\
1Bb0dDQ3FHU000OUJBTUNNRDB4Q3pBSkJnTlZCQVlUQWtGUk1SVXdFd1lEVlFRS0RBeE\
thVzVuU21sdVowTnZjbkF4RnpBVkJnTlZCQU1NRGtwcGJtZEthVzVuVkdWemRFTkJNQ0\
FYRFRJeE1EWXdOREExTkRZeE5Gb1lEems1T1RreE1qTXhNak0xT1RVNVdqQlNNUXN3Q1\
FZRFZRUUdFd0pCVVRFVk1CTUdBMVVFQ2d3TVNtbHVaMHBwYm1kRGIzSndNUk13RVFZRF\
ZRUUZFd293TVRJek5EVTJOemc1TVJjd0ZRWURWUVFEREE1S2FXNW5TbWx1WjBSbGRtbG\
paVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUFCQzc5bGlhUmNCalpjRU\
VYdzdyVWVhdnRHSkF1SDRwazRJNDJ2YUJNc1UxMWlMRENDTGtWaHRVVjIxbXZhS0N2TX\
gyWStTTWdROGZmd0wyM3ozVElWQldqZFRCek1Dc0dDQ3NHQVFVRkJ3RWdCQjhXSFcxaG\
MyRXRkR1Z6ZEM1emFXVnRaVzV6TFdKMExtNWxkRG81TkRRek1COEdBMVVkSXdRWU1CYU\
FGRlFMak56UFwvU1wva291alF3amc1RTVmdndjWWJNQk1HQTFVZEpRUU1NQW9HQ0NzR0\
FRVUZCd01DTUE0R0ExVWREd0VCXC93UUVBd0lIZ0RBS0JnZ3Foa2pPUFFRREFnTkhBRE\
JFQWlCdTN3UkJMc0pNUDVzTTA3MEgrVUZyeU5VNmdLekxPUmNGeVJST2xxcUhpZ0lnWE\
NtSkxUekVsdkQycG9LNmR4NmwxXC91eW1UbmJRRERmSmxhdHVYMlJvT0U9Il0sInR5cC\
I6InZvdWNoZXItandzK2pzb24iLCJhbGciOiJFUzI1NiJ9",
    "signature": "abVg4TDGzSTjVHkQlNeIW3ABu5ZXdMl1cEqwcIAlHFW4BrlGbO\
-DRTKfyCOGxSW49-ktJcrVlYgKqC4xmZoy0Q"
  }]
}
]]></artwork>
        </figure>
      </section>
      <section anchor="example-parboiled-registrar-voucher-request-rvr-from-registrar-to-masa">
        <name>Example Parboiled Registrar Voucher Request - RVR (from Registrar to MASA)</name>
        <t>The term parboiled refers to food which is partially cooked.
In <xref target="BRSKI"/>, the term refers to a Pledge-Voucher-Request (PVR) which has been received by the Registrar, and then has been processed by the Registrar ("cooked"), and is now being forwarded to the MASA.</t>
        <t>The following is an example Registrar voucher-request (RVR) sent from the Registrar to the MASA, in "General JWS JSON Serialization".
Note that the previous PVR can be seen in the payload as "prior-signed-voucher-request".</t>
        <figure anchor="ExampleParboiledRegistrarVoucherRequestfigure">
          <name>Example Parboiled Registrar Voucher Request - RVR</name>
          <artwork align="left"><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

{
  "payload": "eyJpZXRmLXZvdWNoZXItcmVxdWVzdDp2b3VjaGVyIjp7InNlcmlhbC\
1udW1iZXIiOiIwMTIzNDU2Nzg5IiwiaWRldmlkLWlzc3VlciI6IkJCZ3dGb0FVVkF1TT\
NNLzlMK1NpNk5EQ09Ea1RsKy9CeGhzPSIsIm5vbmNlIjoiNkd0bitaUUtOMkhxREZWa0\
JFeFpMUT09IiwicHJpb3Itc2lnbmVkLXZvdWNoZXItcmVxdWVzdCI6ImV5SndZWGxzYj\
JGa0lqb2laWGxLY0ZwWVVtMU1XRnAyWkZkT2IxcFlTWFJqYlZaNFpGZFdlbVJFY0RKaU\
0xWnFZVWRXZVVscWNEZEpiazVzWTIxc2FHSkRNWFZrVnpGcFdsaEphVTlwU1hkTlZFbD\
ZUa1JWTWs1Nlp6VkphWGRwWW0wNWRWa3lWV2xQYVVreVVqTlNkVXN4Y0ZKVE1EUjVVMG\
hHUlZKc1duSlJhMVkwVjJ0NFVsQlVNR2xNUTBwcVkyMVdhR1JIVm10TVZ6bDFTV3B2YV\
UxcVFYbE5hVEIzVG5rd2QwOUdVWGRQUkc4d1RVUnZNRTFwTkRSTmFrSmhTV2wzYVdOSV\
NuWmxSMngwWVZoU05VeFlTbXhhTW14NlpFaEthR05wTVdwYVdFb3dTV3B2YVZSVmJFcF\
JhbEp4VVRCT1FsZFhiRzVSV0dSS1VXdEdibE5WWkVKWFJtc3pUVzFLYVZkck1VSmlNR1\
JFVVROR1NGVXdNREJQVlVwQ1ZGVk9UbEpHVmpSU1dIQkNWV3RLYmxSc1drTlJWemxPVV\
RKemVFNVdSblZXYm5Cb1ZucFdjMWw2VGs1bFJWSlZVVlY0UTFvd05WZFJhMFpxVkZWS1\
IxUnVRbXRTTVZZMFVraHdRbFJyU201VWJGcERVVlV4VGxGdGVGTmlSMDE2Vld0U1VsWk\
ZSbXhTYm1OM1pWVXhSVkpZYkU1U1IwNHpWRzF3Ums1Rk1WVlRiVVpIWkhwQ05sUlZVa1\
psVlRGRldUTmtUMkZyVlRCVVZsSkxXVlV4UlU1SWFFWmxhMFpUVVcxa1QxWnJTa0ppTU\
RGRVlYcEZNVlZYTlZkbGJVWllUbGQ0YWswd01UUlNSbEpDVkVWS2JsUnNXa05SVjA1T1\
VXdGFUMk5IVWtoV1dHaElVa1ZHV0ZGdFpFOVdhMHBDVkZVeFJVMUdTakpaYkdSSFkwZE\
tjMU50ZUdGTmJYZzJXa1ZvUzJGSFRuRlJiSEJPVVdzeFNGRnViSGhTTVU1T1RrUnNRbG\
93VmtoUk1FNTRVakZPVGs1RWJFSmtNRlpKVVZSQ1NsRlZTa05oZWtVeVUzazVjRTU2Yk\
haVmJYUk1UbFpzYVZwV1FtNVBSbFpVVldwbmRtUllUWGhhUmtKV1lWWndTVlJZVW5aaE\
1VNXJZMVYwV0U1WFduVldNMDVEV2tOMGVGVnJkek5XTVVwdFdtMVdXR0V6Ykc1YVYwcD\
JVMjFhU21KSGVERmpiVTV3VFdwV00ySnRhSEJVTVZwRVVqSndiR1ZyU1RGVVZVbDNVak\
JGZUZaWFVrdFZWa1pZVkZWS1VsSXdUa1JqTUdSQ1ZWWldSMUZ1WkU1UmEwcHVXak5LUT\
Fvd1ZrZFJiRVpxVWtWb1JWRlZPVU5hTURWWFUwWkZORkZyUm0xUFJWWkRVVlV4UkZGcV\
VrSmtNVTVDVjFWU1YxVnFRbE5SYTFaR1pERkJNRk5YVW1waVZscDFXVlpvVDAxSFRuUl\
NibXhOVjBaS2MxbDZUbEprVjAxNVlrZDRhVll4V2pGWk0ydDRZVmRTUkU1WVZtRlhSaz\
VFVTBjMVMySkdiM2xpU0hCclUwVndiMWt5YTNoTlJuQlpWR3BDVDJGVVZqWlpWbVJYWk\
Vad1dFNVljRTFXTUc5M1ZFY3dNV0pIVWtWUlZYUkRXakprZUdGSGRIRlVNVUpTVlZWU1\
Fsb3dOVXBSVlZKRFVtdEdjRkZ1YUhOYVJVcHZWMjVGZDFKWVdURlRhM2Q1VlVoS1dGRX\
pValZWZWxwdlVrWnNXRTFZYkVSVWVUbFRXVmhXYVdORlRUTlVWMFpLVWtka1NtRkZSaz\
FWTUhCcFdqQjRkVm95YUdsWmEwWnVUVWRTYWxZd1dsWldiVGgyV2pCa1QwMURPWEZrTT\
NCTFYycENWR0pFU205T1NHaEtWMGR6ZUVsdU1Ua2lMQ0p6YVdkdVlYUjFjbVZ6SWpwYm\
V5SndjbTkwWldOMFpXUWlPaUpsZVVvMFRsZE5hVTlzYzJsVVZXeEtVV2wwVlZFd1RrSl\
pWVTV1VVZoa1NsRnJSbTVUVldSQ1YwYzFWMkZ1VGxaT1ZURkNZakJrUkZFelJraFZNRE\
F3VDFWS1FsUlZUazVTUkVJMFVUTndRbE5yU201VWJGcERVVlpzVlZGWGRFZFZhekZUVm\
xoa1JtUXhiRVZXYkVaU1V6QlNRbVZGZEdoV2VsWjFWVEl4YzJSV2IzZFVibHBxWW10R0\
5GSnVjRUpXYTBwdVZHeGFRMUZWTVU1U1IzUjNZMGRLZEZwRmRHaFdlbFoxVm10a1YyVn\
RVa1pVYTBwT1VUQkdXVkpHVWtwbFJURkZWMWhrVDFKRlJYaFVhMUphWlVVMVIySXhiRV\
ZsYlhNeFZERlNjbVZGTVhGVVdHaE9ZV3N3ZUZReFVsWk9WbVJ4VVd4T1RsVllUak5STV\
VaYVVrWmFVbFZWWkVaa01IQkRWbFpTUmxack1VTlVWV1JDVFZaV1JsRXlaRE5VVms1MF\
lraFdZVTFJUW5kWmJURnJVa2RKZWxOdVpFNVZhekV6VWxaR1dsSkdXbEpWVlZwR1pEST\
VNMVJXVWtwbGF6VkZWbFJLVDJWdFl6RlVWa3BxWkRCYVVsZFZVbGRWVmtaRlVrVkZNVk\
15UmxoT1Z6VlVZbGQ0TVZkcVFsTmlSMUowWWtkd1lWWkZTbUZVVlVwT1VqQktOV05WWk\
ZSVVZGRTFVVmRrUmxJd1RrUmpWV1JVVkZSUk5WRllaRVpUUlVWM1UxVkdRMUY2WXpWaV\
IyeG9WVzFPUTJGc2NHcFNWVlpaWkhwa2VWWlhWbWhrYmxKSVUydEdNVk5FVW5kaGVsSk\
tUa1JLTWxsVlNrNWpNVlY0VFZkc1RWSkZUa1JVUjNSWFlVaFNWbFpxU1hoaVdGcG9Vek\
JPTWxSWVozbFhVM1JVVkZka1VrOUhXbTFrTUhkNVRUTnZlbFpGYkZkUmJHUnhXa1pTUT\
JWck1VUmpNR1JFVVROT1NGRldSbFpTYTBvelVsZGtRMUZxYUZoVFJtTjRZVWROZVZKWV\
VtdFNNVm8yV2tWTk1XVnRSbGhXYmxKaFZucFdObFJHWkV0TlJYaDBUbGQ0YTFKSE9ERl\
VhMUpTWldzeFEwOUZaRUpOVmxaclUxaGtVbGRWTVVOWlZVWkhVbXhHVFdGck5UWlZSbm\
QyVlRGM2RtRXlPVEZoYkVZellXMWpNVkpVVm0xa2JtUnFWMWRLVGxGck1VaFJWRVpXV2\
tWd1VsVlZNVTVSVnpsSVVUQk9lbEl3UmxKV1ZWcERaREF4UkZSVlJUQlNNRVY0VmxkU1\
JXUXdWa05ZUXprelZWVldRbVF3YkVsYU1GSkNVekJLYmxvelJtOWhNbkJRVlVaR1VsSk\
ZSbTVVYTJoQ1VrVktSbEZYYkVOa1ZFNHpWV3RLVFdNd2NFNVZSRlo2VkZSQk0wMUZaM0\
pXVlZwNVpWVTFWazV0WkV4bGEzaFFWVzFPUjJWV1NsTlVNbmg0WTFWb2NGb3diRzVYUl\
U1MFUydDRWV1ZyVm5Oa2ExRjVZMGM1VEU1dFVqUk9iWGQ0V0VNNU1XVlhNVlZpYlVwU1\
VrVlNiVk50ZUdoa1NGWlpUV3hLZGxRd1ZUbEpiREJ6U1c1U05XTkRTVFpKYmxwMlpGZE\
9iMXBZU1hSaGJtUjZTekp3ZW1JeU5HbE1RMHBvWWtkamFVOXBTa1pWZWtreFRtbEtPU0\
lzSW5OcFoyNWhkSFZ5WlNJNkltRmlWbWMwVkVSSGVsTlVhbFpJYTFGc1RtVkpWek5CUW\
5VMVdsaGtUV3d4WTBWeGQyTkpRV3hJUmxjMFFuSnNSMkpQTFVSU1ZFdG1lVU5QUjNoVF\
Z6UTVMV3QwU21OeVZteFpaMHR4UXpSNGJWcHZlVEJSSW4xZGZRPT0iLCJjcmVhdGVkLW\
9uIjoiMjAyMi0wNy0wOFQwODo0MDo0Mi44NDhaIn19",
  "signatures": [{
    "protected": "eyJ4NWMiOlsiTUlJQm96Q0NBVXFnQXdJQkFnSUdBVzBlTHVJRk\
1Bb0dDQ3FHU000OUJBTUNNRFV4RXpBUkJnTlZCQW9NQ2sxNVFuVnphVzVsYzNNeERUQU\
xCZ05WQkFjTUJGTnBkR1V4RHpBTkJnTlZCQU1NQmxSbGMzUkRRVEFlRncweE9UQTVNVE\
V3TWpNM016SmFGdzB5T1RBNU1URXdNak0zTXpKYU1GUXhFekFSQmdOVkJBb01DazE1UW\
5WemFXNWxjM014RFRBTEJnTlZCQWNNQkZOcGRHVXhMakFzQmdOVkJBTU1KVkpsWjJsem\
RISmhjaUJXYjNWamFHVnlJRkpsY1hWbGMzUWdVMmxuYm1sdVp5QkxaWGt3V1RBVEJnY3\
Foa2pPUFFJQkJnZ3Foa2pPUFFNQkJ3TkNBQVQ2eFZ2QXZxVHoxWlVpdU5XaFhwUXNrYV\
B5N0FISFFMd1hpSjBpRUx0NnVOUGFuQU4wUW5XTVlPXC8wQ0RFaklrQlFvYnc4WUtxan\
R4SkhWU0dUajlLT295Y3dKVEFUQmdOVkhTVUVEREFLQmdnckJnRUZCUWNESERBT0JnTl\
ZIUThCQWY4RUJBTUNCNEF3Q2dZSUtvWkl6ajBFQXdJRFJ3QXdSQUlnWXIyTGZxb2FDS0\
RGNFJBY01tSmkrTkNacWRTaXVWdWdJU0E3T2hLUnEzWUNJRHhuUE1NbnBYQU1UclBKdV\
BXeWNlRVIxMVB4SE9uKzBDcFNIaTJxZ3BXWCIsIk1JSUJwRENDQVVtZ0F3SUJBZ0lHQV\
cwZUx1SCtNQW9HQ0NxR1NNNDlCQU1DTURVeEV6QVJCZ05WQkFvTUNrMTVRblZ6YVc1bG\
MzTXhEVEFMQmdOVkJBY01CRk5wZEdVeER6QU5CZ05WQkFNTUJsUmxjM1JEUVRBZUZ3MH\
hPVEE1TVRFd01qTTNNekphRncweU9UQTVNVEV3TWpNM016SmFNRFV4RXpBUkJnTlZCQW\
9NQ2sxNVFuVnphVzVsYzNNeERUQUxCZ05WQkFjTUJGTnBkR1V4RHpBTkJnTlZCQU1NQm\
xSbGMzUkRRVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUFCT2t2a1RIdT\
hRbFQzRkhKMVVhSTcrV3NIT2IwVVMzU0FMdEc1d3VLUURqaWV4MDZcL1NjWTVQSmlidm\
dIVEIrRlwvUVRqZ2VsSEd5MVlLcHdjTk1jc1N5YWpSVEJETUJJR0ExVWRFd0VCXC93UU\
lNQVlCQWY4Q0FRRXdEZ1lEVlIwUEFRSFwvQkFRREFnSUVNQjBHQTFVZERnUVdCQlRvWk\
lNelFkc0RcL2pcLytnWFwvN2NCSnVjSFwvWG1qQUtCZ2dxaGtqT1BRUURBZ05KQURCR0\
FpRUF0eFEzK0lMR0JQSXRTaDRiOVdYaFhOdWhxU1A2SCtiXC9MQ1wvZlZZRGpRNm9DSV\
FERzJ1UkNIbFZxM3loQjU4VFhNVWJ6SDgrT2xoV1V2T2xSRDNWRXFEZGNRdz09Il0sIn\
R5cCI6InZvdWNoZXItandzK2pzb24iLCJhbGciOiJFUzI1NiJ9",
    "signature": "0fzuqVdyhemWsu_HQeF-CmQwJeLp9IStNf-bWZwz6SojrEOR4a\
Dq6VStyG8eWXjGHNZiRyyLJo7RP1rKatuS2w"
  }]
}
]]></artwork>
        </figure>
      </section>
      <section anchor="example-voucher-response-from-masa-to-pledge-via-registrar">
        <name>Example Voucher Response (from MASA to Pledge, via Registrar)</name>
        <t>The following is an example voucher response from MASA to Pledge via Registrar, in "General JWS JSON Serialization".</t>
        <figure anchor="ExampleVoucherResponsefigure">
          <name>Example Voucher Response</name>
          <artwork align="left"><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

{
  "payload": "eyJpZXRmLXZvdWNoZXI6dm91Y2hlciI6eyJhc3NlcnRpb24iOiJsb2\
dnZWQiLCJzZXJpYWwtbnVtYmVyIjoiMDEyMzQ1Njc4OSIsIm5vbmNlIjoiZGRoSGQ4Ml\
FpUGtzMDBTck1USTlEUT09IiwiY3JlYXRlZC1vbiI6IjIwMjItMDctMDdUMTc6NDc6MD\
EuODkwWiIsInBpbm5lZC1kb21haW4tY2VydCI6Ik1JSUJwRENDQVVtZ0F3SUJBZ0lHQV\
cwZUx1SCtNQW9HQ0NxR1NNNDlCQU1DTURVeEV6QVJCZ05WQkFvTUNrMTVRblZ6YVc1bG\
MzTXhEVEFMQmdOVkJBY01CRk5wZEdVeER6QU5CZ05WQkFNTUJsUmxjM1JEUVRBZUZ3MH\
hPVEE1TVRFd01qTTNNekphRncweU9UQTVNVEV3TWpNM016SmFNRFV4RXpBUkJnTlZCQW\
9NQ2sxNVFuVnphVzVsYzNNeERUQUxCZ05WQkFjTUJGTnBkR1V4RHpBTkJnTlZCQU1NQm\
xSbGMzUkRRVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUFCT2t2a1RIdT\
hRbFQzRkhKMVVhSTcrV3NIT2IwVVMzU0FMdEc1d3VLUURqaWV4MDYvU2NZNVBKaWJ2Z0\
hUQitGL1FUamdlbEhHeTFZS3B3Y05NY3NTeWFqUlRCRE1CSUdBMVVkRXdFQi93UUlNQV\
lCQWY4Q0FRRXdEZ1lEVlIwUEFRSC9CQVFEQWdJRU1CMEdBMVVkRGdRV0JCVG9aSU16UW\
RzRC9qLytnWC83Y0JKdWNIL1htakFLQmdncWhrak9QUVFEQWdOSkFEQkdBaUVBdHhRMy\
tJTEdCUEl0U2g0YjlXWGhYTnVocVNQNkgrYi9MQy9mVllEalE2b0NJUURHMnVSQ0hsVn\
EzeWhCNThUWE1VYnpIOCtPbGhXVXZPbFJEM1ZFcURkY1F3PT0ifX0",
  "signatures": [{
    "protected": "eyJ4NWMiOlsiTUlJQmt6Q0NBVGlnQXdJQkFnSUdBV0ZCakNrWU\
1Bb0dDQ3FHU000OUJBTUNNRDB4Q3pBSkJnTlZCQVlUQWtGUk1SVXdFd1lEVlFRS0RBeE\
thVzVuU21sdVowTnZjbkF4RnpBVkJnTlZCQU1NRGtwcGJtZEthVzVuVkdWemRFTkJNQj\
RYRFRFNE1ERXlPVEV3TlRJME1Gb1hEVEk0TURFeU9URXdOVEkwTUZvd1R6RUxNQWtHQT\
FVRUJoTUNRVkV4RlRBVEJnTlZCQW9NREVwcGJtZEthVzVuUTI5eWNERXBNQ2NHQTFVRU\
F3d2dTbWx1WjBwcGJtZERiM0p3SUZadmRXTm9aWElnVTJsbmJtbHVaeUJMWlhrd1dUQV\
RCZ2NxaGtqT1BRSUJCZ2dxaGtqT1BRTUJCd05DQUFTQzZiZUxBbWVxMVZ3NmlRclJzOF\
IwWlcrNGIxR1d5ZG1XczJHQU1GV3diaXRmMm5JWEgzT3FIS1Z1OHMyUnZpQkdOaXZPS0\
dCSEh0QmRpRkVaWnZiN294SXdFREFPQmdOVkhROEJBZjhFQkFNQ0I0QXdDZ1lJS29aSX\
pqMEVBd0lEU1FBd1JnSWhBSTRQWWJ4dHNzSFAyVkh4XC90elVvUVwvU3N5ZEwzMERRSU\
5FdGNOOW1DVFhQQWlFQXZJYjNvK0ZPM0JUbmNMRnNhSlpSQWtkN3pPdXNuXC9cL1pLT2\
FFS2JzVkRpVT0iXSwidHlwIjoidm91Y2hlci1qd3MranNvbiIsImFsZyI6IkVTMjU2In\
0",
    "signature": "y1HLYBFlwouf42XWSKUWjeYQHnG2Q6A4bjA7hvTkB3z1dPwTUl\
jPHtuN2Qex6gDxTfaSiKeoXGsOD4JWOgQJPg"
  }]
}
]]></artwork>
        </figure>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="BRSKI">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="T. Eckert" initials="T." surname="Eckert"/>
            <author fullname="M. Behringer" initials="M." surname="Behringer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane. To do this, a Secure Key Infrastructure is bootstrapped. This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline. We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device. The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="I-D.draft-ietf-anima-rfc8366bis">
          <front>
            <title>A Voucher Artifact for Bootstrapping Protocols</title>
            <author fullname="Kent Watsen" initials="K." surname="Watsen">
              <organization>Watsen Networks</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software</organization>
            </author>
            <author fullname="Max Pritikin" initials="M." surname="Pritikin">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Toerless Eckert" initials="T. T." surname="Eckert">
              <organization>Futurewei Technologies Inc.</organization>
            </author>
            <author fullname="Qiufang Ma" initials="Q." surname="Ma">
              <organization>Huawei</organization>
            </author>
            <date day="8" month="July" year="2024"/>
            <abstract>
              <t>   This document defines a strategy to securely assign a pledge to an
   owner using an artifact signed, directly or indirectly, by the
   pledge's manufacturer.  This artifact is known as a "voucher".

   This document defines an artifact format as a YANG-defined JSON or
   CBOR document that has been signed using a variety of cryptographic
   systems.

   The voucher artifact is normally generated by the pledge's
   manufacturer (i.e., the Manufacturer Authorized Signing Authority
   (MASA)).

   This document updates RFC8366, merging a number of extensions into
   the YANG.  The RFC8995 voucher request is also merged into this
   document.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-rfc8366bis-12"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="SZTP">
          <front>
            <title>Secure Zero Touch Provisioning (SZTP)</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="I. Farrer" initials="I." surname="Farrer"/>
            <author fullname="M. Abrahamsson" initials="M." surname="Abrahamsson"/>
            <date month="April" year="2019"/>
            <abstract>
              <t>This document presents a technique to securely provision a networking device when it is booting in a factory-default state. Variations in the solution enable it to be used on both public and private networks. The provisioning steps are able to update the boot image, commit an initial configuration, and execute arbitrary scripts to address auxiliary needs. The updated device is subsequently able to establish secure connections with other systems. For instance, a device may establish NETCONF (RFC 6241) and/or RESTCONF (RFC 8040) connections with deployment-specific network management systems.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8572"/>
          <seriesInfo name="DOI" value="10.17487/RFC8572"/>
        </reference>
        <reference anchor="RFC3629">
          <front>
            <title>UTF-8, a transformation format of ISO 10646</title>
            <author fullname="F. Yergeau" initials="F." surname="Yergeau"/>
            <date month="November" year="2003"/>
            <abstract>
              <t>ISO/IEC 10646-1 defines a large character set called the Universal Character Set (UCS) which encompasses most of the world's writing systems. The originally proposed encodings of the UCS, however, were not compatible with many current applications and protocols, and this has led to the development of UTF-8, the object of this memo. UTF-8 has the characteristic of preserving the full US-ASCII range, providing compatibility with file systems, parsers and other software that rely on US-ASCII values but are transparent to other values. This memo obsoletes and replaces RFC 2279.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="63"/>
          <seriesInfo name="RFC" value="3629"/>
          <seriesInfo name="DOI" value="10.17487/RFC3629"/>
        </reference>
        <reference anchor="RFC5652">
          <front>
            <title>Cryptographic Message Syntax (CMS)</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="70"/>
          <seriesInfo name="RFC" value="5652"/>
          <seriesInfo name="DOI" value="10.17487/RFC5652"/>
        </reference>
        <reference anchor="RFC7950">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="RFC7951">
          <front>
            <title>JSON Encoding of Data Modeled with YANG</title>
            <author fullname="L. Lhotka" initials="L." surname="Lhotka"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>This document defines encoding rules for representing configuration data, state data, parameters of Remote Procedure Call (RPC) operations or actions, and notifications defined using YANG as JavaScript Object Notation (JSON) text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7951"/>
          <seriesInfo name="DOI" value="10.17487/RFC7951"/>
        </reference>
        <reference anchor="RFC8366">
          <front>
            <title>A Voucher Artifact for Bootstrapping Protocols</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
            <author fullname="T. Eckert" initials="T." surname="Eckert"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>This document defines a strategy to securely assign a pledge to an owner using an artifact signed, directly or indirectly, by the pledge's manufacturer. This artifact is known as a "voucher".</t>
              <t>This document defines an artifact format as a YANG-defined JSON document that has been signed using a Cryptographic Message Syntax (CMS) structure. Other YANG-derived formats are possible. The voucher artifact is normally generated by the pledge's manufacturer (i.e., the Manufacturer Authorized Signing Authority (MASA)).</t>
              <t>This document only defines the voucher artifact, leaving it to other documents to describe specialized protocols for accessing it.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8366"/>
          <seriesInfo name="DOI" value="10.17487/RFC8366"/>
        </reference>
        <reference anchor="RFC8792">
          <front>
            <title>Handling Long Lines in Content of Internet-Drafts and RFCs</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="E. Auerswald" initials="E." surname="Auerswald"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <date month="June" year="2020"/>
            <abstract>
              <t>This document defines two strategies for handling long lines in width-bounded text content. One strategy, called the "single backslash" strategy, is based on the historical use of a single backslash ('\') character to indicate where line-folding has occurred, with the continuation occurring with the first character that is not a space character (' ') on the next line. The second strategy, called the "double backslash" strategy, extends the first strategy by adding a second backslash character to identify where the continuation begins and is thereby able to handle cases not supported by the first strategy. Both strategies use a self-describing header enabling automated reconstitution of the original content.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8792"/>
          <seriesInfo name="DOI" value="10.17487/RFC8792"/>
        </reference>
        <reference anchor="RFC8812">
          <front>
            <title>CBOR Object Signing and Encryption (COSE) and JSON Object Signing and Encryption (JOSE) Registrations for Web Authentication (WebAuthn) Algorithms</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="August" year="2020"/>
            <abstract>
              <t>The W3C Web Authentication (WebAuthn) specification and the FIDO Alliance FIDO2 Client to Authenticator Protocol (CTAP) specification use CBOR Object Signing and Encryption (COSE) algorithm identifiers. This specification registers the following algorithms (which are used by WebAuthn and CTAP implementations) in the IANA "COSE Algorithms" registry: RSASSA-PKCS1-v1_5 using SHA-256, SHA-384, SHA-512, and SHA-1; and Elliptic Curve Digital Signature Algorithm (ECDSA) using the secp256k1 curve and SHA-256. It registers the secp256k1 elliptic curve in the IANA "COSE Elliptic Curves" registry. Also, for use with JSON Object Signing and Encryption (JOSE), it registers the algorithm ECDSA using the secp256k1 curve and SHA-256 in the IANA "JSON Web Signature and Encryption Algorithms" registry and the secp256k1 elliptic curve in the IANA "JSON Web Key Elliptic Curve" registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8812"/>
          <seriesInfo name="DOI" value="10.17487/RFC8812"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="ON-PATH" target="https://mailarchive.ietf.org/arch/msg/saag/m1r9uo4xYznOcf85Eyk0Rhut598/">
          <front>
            <title>can an on-path attacker drop traffic?</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="I-D.ietf-anima-brski-prm">
          <front>
            <title>BRSKI with Pledge in Responder Mode (BRSKI-PRM)</title>
            <author fullname="Steffen Fries" initials="S." surname="Fries">
              <organization>Siemens AG</organization>
            </author>
            <author fullname="Thomas Werner" initials="T." surname="Werner">
              <organization>Siemens AG</organization>
            </author>
            <author fullname="Eliot Lear" initials="E." surname="Lear">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date day="26" month="August" year="2024"/>
            <abstract>
              <t>   This document defines enhancements to Bootstrapping a Remote Secure
   Key Infrastructure (BRSKI, RFC8995) to enable bootstrapping in
   domains featuring no or only limited connectivity between a pledge
   and the domain registrar.  It specifically changes the interaction
   model from a pledge-initiated mode, as used in BRSKI, to a pledge-
   responding mode, where the pledge is in server role.  For this, BRSKI
   with Pledge in Responder Mode (BRSKI-PRM) introduces new endpoints
   for the Domain Registrar and pledge, and a new component, the
   Registrar-Agent, which facilitates the communication between pledge
   and registrar during the bootstrapping phase.  To establish the trust
   relation between pledge and registrar, BRSKI-PRM relies on object
   security rather than transport security.  The approach defined here
   is agnostic to the enrollment protocol that connects the domain
   registrar to the Key Infrastructure (e.g., domain CA).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-brski-prm-15"/>
        </reference>
        <reference anchor="I-D.draft-ietf-anima-constrained-voucher">
          <front>
            <title>Constrained Bootstrapping Remote Secure Key Infrastructure (cBRSKI)</title>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Peter Van der Stok" initials="P." surname="Van der Stok">
              <organization>vanderstok consultancy</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Esko Dijk" initials="E." surname="Dijk">
              <organization>IoTconsultancy.nl</organization>
            </author>
            <date day="8" month="July" year="2024"/>
            <abstract>
              <t>   This document defines the Constrained Bootstrapping Remote Secure Key
   Infrastructure (cBRSKI) protocol, which provides a solution for
   secure zero-touch onboarding of resource-constrained (IoT) devices
   into the network of a domain owner.  This protocol is designed for
   constrained networks, which may have limited data throughput or may
   experience frequent packet loss. cBRSKI is a variant of the BRSKI
   protocol, which uses an artifact signed by the device manufacturer
   called the "voucher" which enables a new device and the owner's
   network to mutually authenticate.  While the BRSKI voucher data is
   encoded in JSON, cBRSKI uses a compact CBOR-encoded voucher.  The
   BRSKI voucher data definition is extended with new data types that
   allow for smaller voucher sizes.  The Enrollment over Secure
   Transport (EST) protocol, used in BRSKI, is replaced with EST-over-
   CoAPS; and HTTPS used in BRSKI is replaced with DTLS-secured CoAP
   (CoAPS).  This document Updates RFC 8995 and RFC 9148.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-constrained-voucher-25"/>
        </reference>
      </references>
    </references>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="T." surname="Eckert" fullname="Toerless Eckert">
        <organization>Futurewei Technologies Inc.</organization>
        <address>
          <email>tte+ietf@cs.fau.de</email>
        </address>
      </contact>
      <contact initials="E." surname="Dijk" fullname="Esko Dijk">
        <organization/>
        <address>
          <email>esko.dijk@iotconsultancy.nl</email>
        </address>
      </contact>
      <contact initials="S." surname="Fries" fullname="Steffen Fries">
        <organization>Siemens AG</organization>
        <address>
          <email>steffen.fries@siemens.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
