<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.1.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-anima-jws-voucher-13" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.20.1 -->
  <front>
    <title abbrev="JWS-voucher">JWS signed Voucher Artifacts for Bootstrapping Protocols</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-anima-jws-voucher-13"/>
    <author initials="T." surname="Werner" fullname="Thomas Werner">
      <organization>Siemens AG</organization>
      <address>
        <email>thomas-werner@siemens.com</email>
      </address>
    </author>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <date year="2024" month="November" day="05"/>
    <area>Internet</area>
    <workgroup>anima Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 66?>

<t>I-D.ietf-anima-rfc8366bis defines a digital artifact (known as a voucher) as a YANG-defined JSON document that is signed using a Cryptographic Message Syntax (CMS) structure.
This document introduces a variant of the voucher artifact in which CMS is replaced by the JSON Object Signing and Encryption (JOSE) mechanism described in RFC7515 to support deployments in which JOSE is preferred over CMS.
In addition to specifying the format, the "application/voucher-jws+json" media type is registered and examples are provided.</t>
    </abstract>
  </front>
  <middle>
    <?line 72?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>"A Voucher Artifact for Bootstrapping Protocols" <xref target="I-D.ietf-anima-rfc8366bis"/> defines a YANG-based data structure
used in "Bootstrapping Remote Secure Key Infrastructure" (BRSKI) <xref target="RFC8995"/> and "Secure Zero Touch Provisioning" (SZTP) <xref target="RFC8572"/>
to transfer ownership of a device from a manufacturer to a new owner (customer or operational domain).
That document provides a serialization of the voucher data to JSON <xref target="RFC8259"/> with cryptographic signing according to the Cryptographic Message Syntax (CMS) <xref target="RFC5652"/>.
That resulting voucher artifact has the media type <tt>application/voucher-cms+json</tt>.</t>
      <t>This document provides cryptographic signing of voucher data in form of JSON Web Signature (JWS) <xref target="RFC7515"/> and the media type <tt>application/voucher-jws+json</tt> to identify the voucher format.
The encoding specified in this document is used by <xref target="I-D.ietf-anima-brski-prm"/>
and may be more handy for use cases already using Javascript Object Signing and Encryption (JOSE).</t>
      <t>This document should be considered as enhancement of <xref target="I-D.ietf-anima-rfc8366bis"/>, as it provides a new voucher format.
It is similar to <xref target="I-D.ietf-anima-constrained-voucher"/>, which provides cryptographic signing according COSE <xref target="RFC8812"/> and the media type <tt>application/voucher-cose+cbor</tt>.
These documents do not change nor extend the YANG definitions of <xref target="I-D.ietf-anima-rfc8366bis"/>.</t>
      <t>With the availability of different voucher formats, it is up to an industry-specific application statement to decide which format is to be used.
The associated media types are used to distinguish different voucher formats.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
      </t>
      <t>This document uses the following terms:</t>
      <dl>
        <dt>JSON Voucher Data:</dt>
        <dd>
          <t>An unsigned JSON representation of the voucher data.</t>
        </dd>
        <dt>JWS Voucher:</dt>
        <dd>
          <t>A JWS structure signing the JSON Voucher Data.</t>
        </dd>
        <dt>Voucher:</dt>
        <dd>
          <t>A short form for voucher artifact and refers to the signed statement from Manufacturer Authorized Signing Authority (MASA) service that indicates to a Pledge the cryptographic identity of the domain it should trust, per <xref target="I-D.ietf-anima-rfc8366bis"/>.</t>
        </dd>
        <dt>Voucher Data:</dt>
        <dd>
          <t>The raw (serialized) representation of the <tt>ietf-voucher</tt> YANG module without any enclosing signature, per <xref target="I-D.ietf-anima-rfc8366bis"/>.</t>
        </dd>
        <dt>MASA (Manufacturer Authorized Signing Authority):</dt>
        <dd>
          <t>The entity that, for the purpose of this document, issues and signs the vouchers for manufacturer's pledges. In some onboarding protocols, the MASA may have an Internet presence and be integral to the onboarding process, whereas in other protocols the MASA may be an offline service that has no active role in the onboarding process, per <xref target="I-D.ietf-anima-rfc8366bis"/>.</t>
        </dd>
        <dt>Pledge:</dt>
        <dd>
          <t>The prospective component attempting to find and securely join a domain. When shipped or in factory reset mode, it only trusts authorized representatives of the manufacturer, per <xref target="I-D.ietf-anima-rfc8366bis"/>.</t>
        </dd>
        <dt>Registrar:</dt>
        <dd>
          <t>A representative of the domain that is configured, perhaps autonomically, to decide whether a new device is allowed to join the domain, per <xref target="I-D.ietf-anima-rfc8366bis"/>.</t>
        </dd>
      </dl>
      <t>This document uses the following encoding notations:</t>
      <dl>
        <dt>BASE64URL(OCTETS):</dt>
        <dd>
          <t>Denotes the base64url encoding of OCTETS, per <xref section="2" sectionFormat="of" target="RFC7515"/>.</t>
        </dd>
        <dt>UTF8(STRING):</dt>
        <dd>
          <t>Denotes the octets of the UTF-8 <xref target="RFC3629"/> representation of STRING, per <xref section="1" sectionFormat="of" target="RFC7515"/>.</t>
        </dd>
      </dl>
    </section>
    <section anchor="voucher-artifact-with-json-web-signature">
      <name>Voucher Artifact with JSON Web Signature</name>
      <t>JWS voucher artifacts MUST use the "General JWS JSON Serialization Syntax" defined in <xref section="7.2.1" sectionFormat="of" target="RFC7515"/>.
This syntax supports multiple signatures as already supported by <xref target="RFC8366"/> for CMS-signed vouchers.
The following figure summarizes the serialization of JWS voucher artifacts:</t>
      <figure anchor="VoucherGeneralJWSFigure">
        <name>Voucher Representation in General JWS JSON Serialization Syntax (JWS Voucher)</name>
        <artwork align="left"><![CDATA[
    {
      "payload": BASE64URL(UTF8(JSON Voucher Data)),
      "signatures": [
        {
          "protected": BASE64URL(UTF8(JWS Protected Header)),
          "signature": BASE64URL(JWS Signature)
        }
      ]
    }
]]></artwork>
      </figure>
      <t>The JSON Voucher Data MUST be UTF-8 encoded to become the octet-based JWS Payload defined in <xref target="RFC7515"/>.
The JWS Payload is further base64url-encoded to become the string value of the <tt>payload</tt> member as described in <xref section="3.2" sectionFormat="of" target="RFC7515"/>.
The octets of the UTF-8 representation of the JWS Protected Header are base64url-encoded to become the string value of the <tt>protected</tt> member.
The generated JWS Signature is base64url-encoded to become the string value of the <tt>signature</tt> member.</t>
      <section anchor="json-voucher-data">
        <name>JSON Voucher Data</name>
        <t>The JSON Voucher Data is an unsigned JSON document <xref target="RFC8259"/> that conforms with the data model described by the ietf-voucher YANG module <xref target="RFC7950"/> defined in <xref section="7.3" sectionFormat="of" target="I-D.ietf-anima-rfc8366bis"/> and is encoded using the rules defined in <xref target="RFC7951"/>.
The following figure provides an example of JSON Voucher Data:</t>
        <figure anchor="VoucherGeneralJWSVoucherPayloadFigure">
          <name>JSON Voucher Data Example</name>
          <artwork align="left"><![CDATA[
    {
      "ietf-voucher:voucher": {
        "assertion": "logged",
        "serial-number": "0123456789",
        "nonce": "5742698422680472",
        "created-on": "2022-07-08T03:01:24.618Z",
        "pinned-domain-cert": "base64encodedvalue=="
      }
    }
]]></artwork>
        </figure>
      </section>
      <section anchor="jws-protected-header">
        <name>JWS Protected Header</name>
        <t>The JWS Protected Header defined in <xref target="RFC7515"/> uses the standard header parameters <tt>alg</tt>, <tt>typ</tt>, and <tt>x5c</tt>:</t>
        <ul spacing="normal">
          <li>
            <t>The <tt>alg</tt> parameter MUST contain the algorithm type (e.g., <tt>ES256</tt>) used to create the signature as defined in <xref section="4.1.1" sectionFormat="of" target="RFC7515"/>.</t>
          </li>
          <li>
            <t>The <tt>typ</tt> parameter is optional and used when more than one kind of object could be present in an application data structure as described in <xref section="4.1.9" sectionFormat="of" target="RFC7515"/>. If present, the <tt>typ</tt> parameter MUST contain the value <tt>voucher-jws+json</tt>.</t>
          </li>
          <li>
            <t>If X.509 (PKIX) certificates <xref target="RFC5280"/> are used, the <tt>x5c</tt> parameter MUST contain the base64-encoded (not base64url-encoded) X.509 v3 (DER) certificate as defined in <xref section="4.1.6" sectionFormat="of" target="RFC7515"/> and SHOULD also contain the certificate chain.</t>
          </li>
        </ul>
        <dl>
          <dt>Implementation Note:</dt>
          <dd>
            <t>base64-encoded values, in contrast to base64url-encoded values, may contain slashes (<tt>/</tt>).
JSON <xref target="RFC8259"/> optionally allows escaping these with backslashes (<tt>\\</tt>).
Hence, depending on the JSON parser/serializer implementation used, they may or may not be included.
JWS Voucher parsers need to be prepared accordingly to extract certificates correctly.</t>
          </dd>
        </dl>
        <t>To validate voucher signatures, all certificates of the certificate chain are required up to the trust anchor.
Note, to establish trust the trust anchor SHOULD be provided out-of-band up front.</t>
        <t>The following figure gives an example of a JWS Protected Header:</t>
        <figure anchor="VoucherGeneralJWSProtectedHeaderFigure">
          <name>JWS Protected Header Example</name>
          <artwork align="left"><![CDATA[
    {
      "alg": "ES256",
      "typ": "voucher-jws+json",
      "x5c": [
        "base64encodedvalue1==",
        "base64encodedvalue2=="
      ]
    }
]]></artwork>
        </figure>
      </section>
      <section anchor="jws-signature">
        <name>JWS Signature</name>
        <t>The JWS Signature is generated over the JWS Protected Header and the JWS Payload (= UTF-8 encoded JSON Voucher Data) as described in <xref section="5.1" sectionFormat="of" target="RFC7515"/>.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>The Pledge-Voucher-Request (PVR) reveals the IDevID of the component (Pledge) that is in the process of bootstrapping.</t>
      <t>A PVR is transported via HTTP-over-TLS.
However, for the Pledge-to-Registrar TLS connection a Pledge provisionally accepts the Registrar server certificate during the TLS server authentication.
Hence, it is subject to disclosure by a Dolev-Yao attacker (a "malicious messenger") <xref target="ON-PATH"/>, as explained in <xref section="10.2" sectionFormat="of" target="RFC8995"/>.</t>
      <t>The use of a JWS header brings no new privacy considerations.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The issues of how <xref target="I-D.ietf-anima-rfc8366bis"/> vouchers are used in a <xref target="BRSKI"/> system is addressed in <xref section="11" sectionFormat="of" target="RFC8995"/>.
This document does not change any of those issues, it just changes the signature technology used for voucher request and response artifacts.</t>
      <t><xref section="9" sectionFormat="of" target="RFC8572"/> deals with voucher use in Secure Zero Touch Provisioning (SZTP), for which this document also makes no changes to security.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="media-type-registry">
        <name>Media-Type Registry</name>
        <t>This section registers <tt>application/voucher-jws+json</tt> in the "Media Types" registry.</t>
        <section anchor="applicationvoucher-jwsjson">
          <name>application/voucher-jws+json</name>
          <artwork><![CDATA[
Type name:  application
Subtype name:  voucher-jws+json
Required parameters:  none
Optional parameters:  none
Encoding considerations:  JWS+JSON vouchers are JOSE objects
                          signed with one or multiple signers.
Security considerations:  See section [Security Considerations]
Interoperability considerations:  The format is designed to be
  broadly interoperable.
Published specification:  [THIS RFC].
Applications that use this media type:  ANIMA, 6tisch, and other
  zero-touch bootstrapping/provisioning solutions
Additional information:
  Magic number(s):  None
  File extension(s):  .vjj
  Macintosh file type code(s):  none
Person & email address to contact for further information:  IETF
  ANIMA WG
Intended usage:  LIMITED
Restrictions on usage:  NONE
Author:  ANIMA WG
Change controller:  IETF
Provisional registration? (standards tree only):  NO
]]></artwork>
        </section>
      </section>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank the various reviewers for their input,
in particular Steffen Fries, Ingo Wenda, Esko Dijk and Toerless Eckert.
Thanks for the supporting PoC implementations to Hong Rui Li and He Peng Jia.</t>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <t>These examples are folded according to the <xref target="RFC8792"/> Single Backslash rule.</t>
      <section anchor="example-pledge-voucher-request-pvr">
        <name>Example Pledge-Voucher-Request (PVR)</name>
        <t>The following is an example of a Pledge-Voucher-Request (PVR) as JWS Voucher artifact, which would be sent from a Pledge to the Registrar:</t>
        <figure anchor="ExamplePledgeVoucherRequestfigure">
          <name>Example Pledge-Voucher-Request (PVR)</name>
          <artwork align="left"><![CDATA[
{
  "payload": "eyJpZXRmLXZvdWNoZXItcmVxdWVzdDp2b3VjaGVyIjp7InNlcmlhbC\
1udW1iZXIiOiIwMTIzNDU2Nzg5Iiwibm9uY2UiOiI2R3RuK1pRS04ySHFERlZrQkV4Wk\
xRPT0iLCJjcmVhdGVkLW9uIjoiMjAyMi0wNy0wOFQwODo0MDo0Mi44MjBaIiwicHJveG\
ltaXR5LXJlZ2lzdHJhci1jZXJ0IjoiTUlJQjRqQ0NBWWlnQXdJQkFnSUdBWFk3MmJiWk\
1Bb0dDQ3FHU000OUJBTUNNRFV4RXpBUkJnTlZCQW9NQ2sxNVFuVnphVzVsYzNNeERUQU\
xCZ05WQkFjTUJGTnBkR1V4RHpBTkJnTlZCQU1NQmxSbGMzUkRRVEFlRncweU1ERXlNRG\
N3TmpFNE1USmFGdzB6TURFeU1EY3dOakU0TVRKYU1ENHhFekFSQmdOVkJBb01DazE1UW\
5WemFXNWxjM014RFRBTEJnTlZCQWNNQkZOcGRHVXhHREFXQmdOVkJBTU1EMFJ2YldGcG\
JsSmxaMmx6ZEhKaGNqQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDlBd0VIQTBJQUJCaz\
E2Sy9pNzlvUmtLNVliZVBnOFVTUjgvdXMxZFBVaVpITXRva1NkcUtXNWZuV3NCZCtxUk\
w3V1JmZmVXa3lnZWJvSmZJbGx1cmNpMjV3bmhpT1ZDR2plekI1TUIwR0ExVWRKUVFXTU\
JRR0NDc0dBUVVGQndNQkJnZ3JCZ0VGQlFjREhEQU9CZ05WSFE4QkFmOEVCQU1DQjRBd1\
NBWURWUjBSQkVFd1A0SWRjbVZuYVhOMGNtRnlMWFJsYzNRdWMybGxiV1Z1Y3kxaWRDNX\
VaWFNDSG5KbFoybHpkSEpoY2kxMFpYTjBOaTV6YVdWdFpXNXpMV0owTG01bGREQUtCZ2\
dxaGtqT1BRUURBZ05JQURCRkFpQnhsZEJoWnEwRXY1SkwyUHJXQ3R5UzZoRFlXMXlDTy\
9SYXVicEM3TWFJRGdJaEFMU0piZ0xuZ2hiYkFnMGRjV0ZVVm8vZ0dOMC9qd3pKWjBTbD\
JoNHhJWGsxIn19",
  "signatures": [{
    "protected": "eyJ4NWMiOlsiTUlJQitUQ0NBYUNnQXdJQkFnSUdBWG5WanNVNU\
1Bb0dDQ3FHU000OUJBTUNNRDB4Q3pBSkJnTlZCQVlUQWtGUk1SVXdFd1lEVlFRS0RBeE\
thVzVuU21sdVowTnZjbkF4RnpBVkJnTlZCQU1NRGtwcGJtZEthVzVuVkdWemRFTkJNQ0\
FYRFRJeE1EWXdOREExTkRZeE5Gb1lEems1T1RreE1qTXhNak0xT1RVNVdqQlNNUXN3Q1\
FZRFZRUUdFd0pCVVRFVk1CTUdBMVVFQ2d3TVNtbHVaMHBwYm1kRGIzSndNUk13RVFZRF\
ZRUUZFd293TVRJek5EVTJOemc1TVJjd0ZRWURWUVFEREE1S2FXNW5TbWx1WjBSbGRtbG\
paVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUFCQzc5bGlhUmNCalpjRU\
VYdzdyVWVhdnRHSkF1SDRwazRJNDJ2YUJNc1UxMWlMRENDTGtWaHRVVjIxbXZhS0N2TX\
gyWStTTWdROGZmd0wyM3ozVElWQldqZFRCek1Dc0dDQ3NHQVFVRkJ3RWdCQjhXSFcxaG\
MyRXRkR1Z6ZEM1emFXVnRaVzV6TFdKMExtNWxkRG81TkRRek1COEdBMVVkSXdRWU1CYU\
FGRlFMak56UFwvU1wva291alF3amc1RTVmdndjWWJNQk1HQTFVZEpRUU1NQW9HQ0NzR0\
FRVUZCd01DTUE0R0ExVWREd0VCXC93UUVBd0lIZ0RBS0JnZ3Foa2pPUFFRREFnTkhBRE\
JFQWlCdTN3UkJMc0pNUDVzTTA3MEgrVUZyeU5VNmdLekxPUmNGeVJST2xxcUhpZ0lnWE\
NtSkxUekVsdkQycG9LNmR4NmwxXC91eW1UbmJRRERmSmxhdHVYMlJvT0U9Il0sInR5cC\
I6InZvdWNoZXItandzK2pzb24iLCJhbGciOiJFUzI1NiJ9",
    "signature": "abVg4TDGzSTjVHkQlNeIW3ABu5ZXdMl1cEqwcIAlHFW4BrlGbO\
-DRTKfyCOGxSW49-ktJcrVlYgKqC4xmZoy0Q"
  }]
}
]]></artwork>
        </figure>
      </section>
      <section anchor="example-parboiled-registrar-voucher-request-rvr">
        <name>Example Parboiled Registrar-Voucher-Request (RVR)</name>
        <t>The term parboiled refers to food which is partially cooked.
In <xref target="BRSKI"/>, the term refers to a Pledge-Voucher-Request (PVR) that was received by the Registrar,
then has been processed by the Registrar ("cooked"),
and is now being forwarded to the MASA.</t>
        <t>The following is an example Registrar-Voucher-Request (RVR) as JWS Voucher artifact, which would be sent from the Registrar to the MASA.
Note that the previous PVR can be seen in the payload in the field <tt>prior-signed-voucher-request</tt>.</t>
        <figure anchor="ExampleParboiledRegistrarVoucherRequestfigure">
          <name>Example Parboiled Registrar-Voucher-Request (RVR)</name>
          <artwork align="left"><![CDATA[
{
  "payload": "eyJpZXRmLXZvdWNoZXItcmVxdWVzdDp2b3VjaGVyIjp7InNlcmlhbC\
1udW1iZXIiOiIwMTIzNDU2Nzg5IiwiaWRldmlkLWlzc3VlciI6IkJCZ3dGb0FVVkF1TT\
NNLzlMK1NpNk5EQ09Ea1RsKy9CeGhzPSIsIm5vbmNlIjoiNkd0bitaUUtOMkhxREZWa0\
JFeFpMUT09IiwicHJpb3Itc2lnbmVkLXZvdWNoZXItcmVxdWVzdCI6ImV5SndZWGxzYj\
JGa0lqb2laWGxLY0ZwWVVtMU1XRnAyWkZkT2IxcFlTWFJqYlZaNFpGZFdlbVJFY0RKaU\
0xWnFZVWRXZVVscWNEZEpiazVzWTIxc2FHSkRNWFZrVnpGcFdsaEphVTlwU1hkTlZFbD\
ZUa1JWTWs1Nlp6VkphWGRwWW0wNWRWa3lWV2xQYVVreVVqTlNkVXN4Y0ZKVE1EUjVVMG\
hHUlZKc1duSlJhMVkwVjJ0NFVsQlVNR2xNUTBwcVkyMVdhR1JIVm10TVZ6bDFTV3B2YV\
UxcVFYbE5hVEIzVG5rd2QwOUdVWGRQUkc4d1RVUnZNRTFwTkRSTmFrSmhTV2wzYVdOSV\
NuWmxSMngwWVZoU05VeFlTbXhhTW14NlpFaEthR05wTVdwYVdFb3dTV3B2YVZSVmJFcF\
JhbEp4VVRCT1FsZFhiRzVSV0dSS1VXdEdibE5WWkVKWFJtc3pUVzFLYVZkck1VSmlNR1\
JFVVROR1NGVXdNREJQVlVwQ1ZGVk9UbEpHVmpSU1dIQkNWV3RLYmxSc1drTlJWemxPVV\
RKemVFNVdSblZXYm5Cb1ZucFdjMWw2VGs1bFJWSlZVVlY0UTFvd05WZFJhMFpxVkZWS1\
IxUnVRbXRTTVZZMFVraHdRbFJyU201VWJGcERVVlV4VGxGdGVGTmlSMDE2Vld0U1VsWk\
ZSbXhTYm1OM1pWVXhSVkpZYkU1U1IwNHpWRzF3Ums1Rk1WVlRiVVpIWkhwQ05sUlZVa1\
psVlRGRldUTmtUMkZyVlRCVVZsSkxXVlV4UlU1SWFFWmxhMFpUVVcxa1QxWnJTa0ppTU\
RGRVlYcEZNVlZYTlZkbGJVWllUbGQ0YWswd01UUlNSbEpDVkVWS2JsUnNXa05SVjA1T1\
VXdGFUMk5IVWtoV1dHaElVa1ZHV0ZGdFpFOVdhMHBDVkZVeFJVMUdTakpaYkdSSFkwZE\
tjMU50ZUdGTmJYZzJXa1ZvUzJGSFRuRlJiSEJPVVdzeFNGRnViSGhTTVU1T1RrUnNRbG\
93VmtoUk1FNTRVakZPVGs1RWJFSmtNRlpKVVZSQ1NsRlZTa05oZWtVeVUzazVjRTU2Yk\
haVmJYUk1UbFpzYVZwV1FtNVBSbFpVVldwbmRtUllUWGhhUmtKV1lWWndTVlJZVW5aaE\
1VNXJZMVYwV0U1WFduVldNMDVEV2tOMGVGVnJkek5XTVVwdFdtMVdXR0V6Ykc1YVYwcD\
JVMjFhU21KSGVERmpiVTV3VFdwV00ySnRhSEJVTVZwRVVqSndiR1ZyU1RGVVZVbDNVak\
JGZUZaWFVrdFZWa1pZVkZWS1VsSXdUa1JqTUdSQ1ZWWldSMUZ1WkU1UmEwcHVXak5LUT\
Fvd1ZrZFJiRVpxVWtWb1JWRlZPVU5hTURWWFUwWkZORkZyUm0xUFJWWkRVVlV4UkZGcV\
VrSmtNVTVDVjFWU1YxVnFRbE5SYTFaR1pERkJNRk5YVW1waVZscDFXVlpvVDAxSFRuUl\
NibXhOVjBaS2MxbDZUbEprVjAxNVlrZDRhVll4V2pGWk0ydDRZVmRTUkU1WVZtRlhSaz\
VFVTBjMVMySkdiM2xpU0hCclUwVndiMWt5YTNoTlJuQlpWR3BDVDJGVVZqWlpWbVJYWk\
Vad1dFNVljRTFXTUc5M1ZFY3dNV0pIVWtWUlZYUkRXakprZUdGSGRIRlVNVUpTVlZWU1\
Fsb3dOVXBSVlZKRFVtdEdjRkZ1YUhOYVJVcHZWMjVGZDFKWVdURlRhM2Q1VlVoS1dGRX\
pValZWZWxwdlVrWnNXRTFZYkVSVWVUbFRXVmhXYVdORlRUTlVWMFpLVWtka1NtRkZSaz\
FWTUhCcFdqQjRkVm95YUdsWmEwWnVUVWRTYWxZd1dsWldiVGgyV2pCa1QwMURPWEZrTT\
NCTFYycENWR0pFU205T1NHaEtWMGR6ZUVsdU1Ua2lMQ0p6YVdkdVlYUjFjbVZ6SWpwYm\
V5SndjbTkwWldOMFpXUWlPaUpsZVVvMFRsZE5hVTlzYzJsVVZXeEtVV2wwVlZFd1RrSl\
pWVTV1VVZoa1NsRnJSbTVUVldSQ1YwYzFWMkZ1VGxaT1ZURkNZakJrUkZFelJraFZNRE\
F3VDFWS1FsUlZUazVTUkVJMFVUTndRbE5yU201VWJGcERVVlpzVlZGWGRFZFZhekZUVm\
xoa1JtUXhiRVZXYkVaU1V6QlNRbVZGZEdoV2VsWjFWVEl4YzJSV2IzZFVibHBxWW10R0\
5GSnVjRUpXYTBwdVZHeGFRMUZWTVU1U1IzUjNZMGRLZEZwRmRHaFdlbFoxVm10a1YyVn\
RVa1pVYTBwT1VUQkdXVkpHVWtwbFJURkZWMWhrVDFKRlJYaFVhMUphWlVVMVIySXhiRV\
ZsYlhNeFZERlNjbVZGTVhGVVdHaE9ZV3N3ZUZReFVsWk9WbVJ4VVd4T1RsVllUak5STV\
VaYVVrWmFVbFZWWkVaa01IQkRWbFpTUmxack1VTlVWV1JDVFZaV1JsRXlaRE5VVms1MF\
lraFdZVTFJUW5kWmJURnJVa2RKZWxOdVpFNVZhekV6VWxaR1dsSkdXbEpWVlZwR1pEST\
VNMVJXVWtwbGF6VkZWbFJLVDJWdFl6RlVWa3BxWkRCYVVsZFZVbGRWVmtaRlVrVkZNVk\
15UmxoT1Z6VlVZbGQ0TVZkcVFsTmlSMUowWWtkd1lWWkZTbUZVVlVwT1VqQktOV05WWk\
ZSVVZGRTFVVmRrUmxJd1RrUmpWV1JVVkZSUk5WRllaRVpUUlVWM1UxVkdRMUY2WXpWaV\
IyeG9WVzFPUTJGc2NHcFNWVlpaWkhwa2VWWlhWbWhrYmxKSVUydEdNVk5FVW5kaGVsSk\
tUa1JLTWxsVlNrNWpNVlY0VFZkc1RWSkZUa1JVUjNSWFlVaFNWbFpxU1hoaVdGcG9Vek\
JPTWxSWVozbFhVM1JVVkZka1VrOUhXbTFrTUhkNVRUTnZlbFpGYkZkUmJHUnhXa1pTUT\
JWck1VUmpNR1JFVVROT1NGRldSbFpTYTBvelVsZGtRMUZxYUZoVFJtTjRZVWROZVZKWV\
VtdFNNVm8yV2tWTk1XVnRSbGhXYmxKaFZucFdObFJHWkV0TlJYaDBUbGQ0YTFKSE9ERl\
VhMUpTWldzeFEwOUZaRUpOVmxaclUxaGtVbGRWTVVOWlZVWkhVbXhHVFdGck5UWlZSbm\
QyVlRGM2RtRXlPVEZoYkVZellXMWpNVkpVVm0xa2JtUnFWMWRLVGxGck1VaFJWRVpXV2\
tWd1VsVlZNVTVSVnpsSVVUQk9lbEl3UmxKV1ZWcERaREF4UkZSVlJUQlNNRVY0VmxkU1\
JXUXdWa05ZUXprelZWVldRbVF3YkVsYU1GSkNVekJLYmxvelJtOWhNbkJRVlVaR1VsSk\
ZSbTVVYTJoQ1VrVktSbEZYYkVOa1ZFNHpWV3RLVFdNd2NFNVZSRlo2VkZSQk0wMUZaM0\
pXVlZwNVpWVTFWazV0WkV4bGEzaFFWVzFPUjJWV1NsTlVNbmg0WTFWb2NGb3diRzVYUl\
U1MFUydDRWV1ZyVm5Oa2ExRjVZMGM1VEU1dFVqUk9iWGQ0V0VNNU1XVlhNVlZpYlVwU1\
VrVlNiVk50ZUdoa1NGWlpUV3hLZGxRd1ZUbEpiREJ6U1c1U05XTkRTVFpKYmxwMlpGZE\
9iMXBZU1hSaGJtUjZTekp3ZW1JeU5HbE1RMHBvWWtkamFVOXBTa1pWZWtreFRtbEtPU0\
lzSW5OcFoyNWhkSFZ5WlNJNkltRmlWbWMwVkVSSGVsTlVhbFpJYTFGc1RtVkpWek5CUW\
5VMVdsaGtUV3d4WTBWeGQyTkpRV3hJUmxjMFFuSnNSMkpQTFVSU1ZFdG1lVU5QUjNoVF\
Z6UTVMV3QwU21OeVZteFpaMHR4UXpSNGJWcHZlVEJSSW4xZGZRPT0iLCJjcmVhdGVkLW\
9uIjoiMjAyMi0wNy0wOFQwODo0MDo0Mi44NDhaIn19",
  "signatures": [{
    "protected": "eyJ4NWMiOlsiTUlJQm96Q0NBVXFnQXdJQkFnSUdBVzBlTHVJRk\
1Bb0dDQ3FHU000OUJBTUNNRFV4RXpBUkJnTlZCQW9NQ2sxNVFuVnphVzVsYzNNeERUQU\
xCZ05WQkFjTUJGTnBkR1V4RHpBTkJnTlZCQU1NQmxSbGMzUkRRVEFlRncweE9UQTVNVE\
V3TWpNM016SmFGdzB5T1RBNU1URXdNak0zTXpKYU1GUXhFekFSQmdOVkJBb01DazE1UW\
5WemFXNWxjM014RFRBTEJnTlZCQWNNQkZOcGRHVXhMakFzQmdOVkJBTU1KVkpsWjJsem\
RISmhjaUJXYjNWamFHVnlJRkpsY1hWbGMzUWdVMmxuYm1sdVp5QkxaWGt3V1RBVEJnY3\
Foa2pPUFFJQkJnZ3Foa2pPUFFNQkJ3TkNBQVQ2eFZ2QXZxVHoxWlVpdU5XaFhwUXNrYV\
B5N0FISFFMd1hpSjBpRUx0NnVOUGFuQU4wUW5XTVlPXC8wQ0RFaklrQlFvYnc4WUtxan\
R4SkhWU0dUajlLT295Y3dKVEFUQmdOVkhTVUVEREFLQmdnckJnRUZCUWNESERBT0JnTl\
ZIUThCQWY4RUJBTUNCNEF3Q2dZSUtvWkl6ajBFQXdJRFJ3QXdSQUlnWXIyTGZxb2FDS0\
RGNFJBY01tSmkrTkNacWRTaXVWdWdJU0E3T2hLUnEzWUNJRHhuUE1NbnBYQU1UclBKdV\
BXeWNlRVIxMVB4SE9uKzBDcFNIaTJxZ3BXWCIsIk1JSUJwRENDQVVtZ0F3SUJBZ0lHQV\
cwZUx1SCtNQW9HQ0NxR1NNNDlCQU1DTURVeEV6QVJCZ05WQkFvTUNrMTVRblZ6YVc1bG\
MzTXhEVEFMQmdOVkJBY01CRk5wZEdVeER6QU5CZ05WQkFNTUJsUmxjM1JEUVRBZUZ3MH\
hPVEE1TVRFd01qTTNNekphRncweU9UQTVNVEV3TWpNM016SmFNRFV4RXpBUkJnTlZCQW\
9NQ2sxNVFuVnphVzVsYzNNeERUQUxCZ05WQkFjTUJGTnBkR1V4RHpBTkJnTlZCQU1NQm\
xSbGMzUkRRVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUFCT2t2a1RIdT\
hRbFQzRkhKMVVhSTcrV3NIT2IwVVMzU0FMdEc1d3VLUURqaWV4MDZcL1NjWTVQSmlidm\
dIVEIrRlwvUVRqZ2VsSEd5MVlLcHdjTk1jc1N5YWpSVEJETUJJR0ExVWRFd0VCXC93UU\
lNQVlCQWY4Q0FRRXdEZ1lEVlIwUEFRSFwvQkFRREFnSUVNQjBHQTFVZERnUVdCQlRvWk\
lNelFkc0RcL2pcLytnWFwvN2NCSnVjSFwvWG1qQUtCZ2dxaGtqT1BRUURBZ05KQURCR0\
FpRUF0eFEzK0lMR0JQSXRTaDRiOVdYaFhOdWhxU1A2SCtiXC9MQ1wvZlZZRGpRNm9DSV\
FERzJ1UkNIbFZxM3loQjU4VFhNVWJ6SDgrT2xoV1V2T2xSRDNWRXFEZGNRdz09Il0sIn\
R5cCI6InZvdWNoZXItandzK2pzb24iLCJhbGciOiJFUzI1NiJ9",
    "signature": "0fzuqVdyhemWsu_HQeF-CmQwJeLp9IStNf-bWZwz6SojrEOR4a\
Dq6VStyG8eWXjGHNZiRyyLJo7RP1rKatuS2w"
  }]
}
]]></artwork>
        </figure>
      </section>
      <section anchor="example-voucher-response">
        <name>Example Voucher Response</name>
        <t>The following is an example voucher response as JWS Voucher artifact, which would be sent from the MASA to the Pledge via Registrar.</t>
        <figure anchor="ExampleVoucherResponsefigure">
          <name>Example Voucher Response</name>
          <artwork align="left"><![CDATA[
{
  "payload": "eyJpZXRmLXZvdWNoZXI6dm91Y2hlciI6eyJhc3NlcnRpb24iOiJsb2\
dnZWQiLCJzZXJpYWwtbnVtYmVyIjoiMDEyMzQ1Njc4OSIsIm5vbmNlIjoiZGRoSGQ4Ml\
FpUGtzMDBTck1USTlEUT09IiwiY3JlYXRlZC1vbiI6IjIwMjItMDctMDdUMTc6NDc6MD\
EuODkwWiIsInBpbm5lZC1kb21haW4tY2VydCI6Ik1JSUJwRENDQVVtZ0F3SUJBZ0lHQV\
cwZUx1SCtNQW9HQ0NxR1NNNDlCQU1DTURVeEV6QVJCZ05WQkFvTUNrMTVRblZ6YVc1bG\
MzTXhEVEFMQmdOVkJBY01CRk5wZEdVeER6QU5CZ05WQkFNTUJsUmxjM1JEUVRBZUZ3MH\
hPVEE1TVRFd01qTTNNekphRncweU9UQTVNVEV3TWpNM016SmFNRFV4RXpBUkJnTlZCQW\
9NQ2sxNVFuVnphVzVsYzNNeERUQUxCZ05WQkFjTUJGTnBkR1V4RHpBTkJnTlZCQU1NQm\
xSbGMzUkRRVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUFCT2t2a1RIdT\
hRbFQzRkhKMVVhSTcrV3NIT2IwVVMzU0FMdEc1d3VLUURqaWV4MDYvU2NZNVBKaWJ2Z0\
hUQitGL1FUamdlbEhHeTFZS3B3Y05NY3NTeWFqUlRCRE1CSUdBMVVkRXdFQi93UUlNQV\
lCQWY4Q0FRRXdEZ1lEVlIwUEFRSC9CQVFEQWdJRU1CMEdBMVVkRGdRV0JCVG9aSU16UW\
RzRC9qLytnWC83Y0JKdWNIL1htakFLQmdncWhrak9QUVFEQWdOSkFEQkdBaUVBdHhRMy\
tJTEdCUEl0U2g0YjlXWGhYTnVocVNQNkgrYi9MQy9mVllEalE2b0NJUURHMnVSQ0hsVn\
EzeWhCNThUWE1VYnpIOCtPbGhXVXZPbFJEM1ZFcURkY1F3PT0ifX0",
  "signatures": [{
    "protected": "eyJ4NWMiOlsiTUlJQmt6Q0NBVGlnQXdJQkFnSUdBV0ZCakNrWU\
1Bb0dDQ3FHU000OUJBTUNNRDB4Q3pBSkJnTlZCQVlUQWtGUk1SVXdFd1lEVlFRS0RBeE\
thVzVuU21sdVowTnZjbkF4RnpBVkJnTlZCQU1NRGtwcGJtZEthVzVuVkdWemRFTkJNQj\
RYRFRFNE1ERXlPVEV3TlRJME1Gb1hEVEk0TURFeU9URXdOVEkwTUZvd1R6RUxNQWtHQT\
FVRUJoTUNRVkV4RlRBVEJnTlZCQW9NREVwcGJtZEthVzVuUTI5eWNERXBNQ2NHQTFVRU\
F3d2dTbWx1WjBwcGJtZERiM0p3SUZadmRXTm9aWElnVTJsbmJtbHVaeUJMWlhrd1dUQV\
RCZ2NxaGtqT1BRSUJCZ2dxaGtqT1BRTUJCd05DQUFTQzZiZUxBbWVxMVZ3NmlRclJzOF\
IwWlcrNGIxR1d5ZG1XczJHQU1GV3diaXRmMm5JWEgzT3FIS1Z1OHMyUnZpQkdOaXZPS0\
dCSEh0QmRpRkVaWnZiN294SXdFREFPQmdOVkhROEJBZjhFQkFNQ0I0QXdDZ1lJS29aSX\
pqMEVBd0lEU1FBd1JnSWhBSTRQWWJ4dHNzSFAyVkh4XC90elVvUVwvU3N5ZEwzMERRSU\
5FdGNOOW1DVFhQQWlFQXZJYjNvK0ZPM0JUbmNMRnNhSlpSQWtkN3pPdXNuXC9cL1pLT2\
FFS2JzVkRpVT0iXSwidHlwIjoidm91Y2hlci1qd3MranNvbiIsImFsZyI6IkVTMjU2In\
0",
    "signature": "y1HLYBFlwouf42XWSKUWjeYQHnG2Q6A4bjA7hvTkB3z1dPwTUl\
jPHtuN2Qex6gDxTfaSiKeoXGsOD4JWOgQJPg"
  }]
}
]]></artwork>
        </figure>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="BRSKI">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="T. Eckert" initials="T." surname="Eckert"/>
            <author fullname="M. Behringer" initials="M." surname="Behringer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane. To do this, a Secure Key Infrastructure is bootstrapped. This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline. We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device. The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="I-D.ietf-anima-rfc8366bis">
          <front>
            <title>A Voucher Artifact for Bootstrapping Protocols</title>
            <author fullname="Kent Watsen" initials="K." surname="Watsen">
              <organization>Watsen Networks</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software</organization>
            </author>
            <author fullname="Max Pritikin" initials="M." surname="Pritikin">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Toerless Eckert" initials="T. T." surname="Eckert">
              <organization>Futurewei Technologies Inc.</organization>
            </author>
            <author fullname="Qiufang Ma" initials="Q." surname="Ma">
              <organization>Huawei</organization>
            </author>
            <date day="8" month="July" year="2024"/>
            <abstract>
              <t>   This document defines a strategy to securely assign a pledge to an
   owner using an artifact signed, directly or indirectly, by the
   pledge's manufacturer.  This artifact is known as a "voucher".

   This document defines an artifact format as a YANG-defined JSON or
   CBOR document that has been signed using a variety of cryptographic
   systems.

   The voucher artifact is normally generated by the pledge's
   manufacturer (i.e., the Manufacturer Authorized Signing Authority
   (MASA)).

   This document updates RFC8366, merging a number of extensions into
   the YANG.  The RFC8995 voucher request is also merged into this
   document.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-rfc8366bis-12"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC8995">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="T. Eckert" initials="T." surname="Eckert"/>
            <author fullname="M. Behringer" initials="M." surname="Behringer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane. To do this, a Secure Key Infrastructure is bootstrapped. This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline. We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device. The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8572">
          <front>
            <title>Secure Zero Touch Provisioning (SZTP)</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="I. Farrer" initials="I." surname="Farrer"/>
            <author fullname="M. Abrahamsson" initials="M." surname="Abrahamsson"/>
            <date month="April" year="2019"/>
            <abstract>
              <t>This document presents a technique to securely provision a networking device when it is booting in a factory-default state. Variations in the solution enable it to be used on both public and private networks. The provisioning steps are able to update the boot image, commit an initial configuration, and execute arbitrary scripts to address auxiliary needs. The updated device is subsequently able to establish secure connections with other systems. For instance, a device may establish NETCONF (RFC 6241) and/or RESTCONF (RFC 8040) connections with deployment-specific network management systems.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8572"/>
          <seriesInfo name="DOI" value="10.17487/RFC8572"/>
        </reference>
        <reference anchor="RFC3629">
          <front>
            <title>UTF-8, a transformation format of ISO 10646</title>
            <author fullname="F. Yergeau" initials="F." surname="Yergeau"/>
            <date month="November" year="2003"/>
            <abstract>
              <t>ISO/IEC 10646-1 defines a large character set called the Universal Character Set (UCS) which encompasses most of the world's writing systems. The originally proposed encodings of the UCS, however, were not compatible with many current applications and protocols, and this has led to the development of UTF-8, the object of this memo. UTF-8 has the characteristic of preserving the full US-ASCII range, providing compatibility with file systems, parsers and other software that rely on US-ASCII values but are transparent to other values. This memo obsoletes and replaces RFC 2279.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="63"/>
          <seriesInfo name="RFC" value="3629"/>
          <seriesInfo name="DOI" value="10.17487/RFC3629"/>
        </reference>
        <reference anchor="RFC5652">
          <front>
            <title>Cryptographic Message Syntax (CMS)</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="70"/>
          <seriesInfo name="RFC" value="5652"/>
          <seriesInfo name="DOI" value="10.17487/RFC5652"/>
        </reference>
        <reference anchor="RFC7950">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="RFC7951">
          <front>
            <title>JSON Encoding of Data Modeled with YANG</title>
            <author fullname="L. Lhotka" initials="L." surname="Lhotka"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>This document defines encoding rules for representing configuration data, state data, parameters of Remote Procedure Call (RPC) operations or actions, and notifications defined using YANG as JavaScript Object Notation (JSON) text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7951"/>
          <seriesInfo name="DOI" value="10.17487/RFC7951"/>
        </reference>
        <reference anchor="RFC8366">
          <front>
            <title>A Voucher Artifact for Bootstrapping Protocols</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
            <author fullname="T. Eckert" initials="T." surname="Eckert"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>This document defines a strategy to securely assign a pledge to an owner using an artifact signed, directly or indirectly, by the pledge's manufacturer. This artifact is known as a "voucher".</t>
              <t>This document defines an artifact format as a YANG-defined JSON document that has been signed using a Cryptographic Message Syntax (CMS) structure. Other YANG-derived formats are possible. The voucher artifact is normally generated by the pledge's manufacturer (i.e., the Manufacturer Authorized Signing Authority (MASA)).</t>
              <t>This document only defines the voucher artifact, leaving it to other documents to describe specialized protocols for accessing it.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8366"/>
          <seriesInfo name="DOI" value="10.17487/RFC8366"/>
        </reference>
        <reference anchor="RFC8792">
          <front>
            <title>Handling Long Lines in Content of Internet-Drafts and RFCs</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="E. Auerswald" initials="E." surname="Auerswald"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <date month="June" year="2020"/>
            <abstract>
              <t>This document defines two strategies for handling long lines in width-bounded text content. One strategy, called the "single backslash" strategy, is based on the historical use of a single backslash ('\') character to indicate where line-folding has occurred, with the continuation occurring with the first character that is not a space character (' ') on the next line. The second strategy, called the "double backslash" strategy, extends the first strategy by adding a second backslash character to identify where the continuation begins and is thereby able to handle cases not supported by the first strategy. Both strategies use a self-describing header enabling automated reconstitution of the original content.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8792"/>
          <seriesInfo name="DOI" value="10.17487/RFC8792"/>
        </reference>
        <reference anchor="RFC8812">
          <front>
            <title>CBOR Object Signing and Encryption (COSE) and JSON Object Signing and Encryption (JOSE) Registrations for Web Authentication (WebAuthn) Algorithms</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="August" year="2020"/>
            <abstract>
              <t>The W3C Web Authentication (WebAuthn) specification and the FIDO Alliance FIDO2 Client to Authenticator Protocol (CTAP) specification use CBOR Object Signing and Encryption (COSE) algorithm identifiers. This specification registers the following algorithms (which are used by WebAuthn and CTAP implementations) in the IANA "COSE Algorithms" registry: RSASSA-PKCS1-v1_5 using SHA-256, SHA-384, SHA-512, and SHA-1; and Elliptic Curve Digital Signature Algorithm (ECDSA) using the secp256k1 curve and SHA-256. It registers the secp256k1 elliptic curve in the IANA "COSE Elliptic Curves" registry. Also, for use with JSON Object Signing and Encryption (JOSE), it registers the algorithm ECDSA using the secp256k1 curve and SHA-256 in the IANA "JSON Web Signature and Encryption Algorithms" registry and the secp256k1 elliptic curve in the IANA "JSON Web Key Elliptic Curve" registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8812"/>
          <seriesInfo name="DOI" value="10.17487/RFC8812"/>
        </reference>
        <reference anchor="ON-PATH" target="https://mailarchive.ietf.org/arch/msg/saag/m1r9uo4xYznOcf85Eyk0Rhut598/">
          <front>
            <title>can an on-path attacker drop traffic?</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="I-D.ietf-anima-brski-prm">
          <front>
            <title>BRSKI with Pledge in Responder Mode (BRSKI-PRM)</title>
            <author fullname="Steffen Fries" initials="S." surname="Fries">
              <organization>Siemens AG</organization>
            </author>
            <author fullname="Thomas Werner" initials="T." surname="Werner">
              <organization>Siemens AG</organization>
            </author>
            <author fullname="Eliot Lear" initials="E." surname="Lear">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date day="26" month="August" year="2024"/>
            <abstract>
              <t>   This document defines enhancements to Bootstrapping a Remote Secure
   Key Infrastructure (BRSKI, RFC8995) to enable bootstrapping in
   domains featuring no or only limited connectivity between a pledge
   and the domain registrar.  It specifically changes the interaction
   model from a pledge-initiated mode, as used in BRSKI, to a pledge-
   responding mode, where the pledge is in server role.  For this, BRSKI
   with Pledge in Responder Mode (BRSKI-PRM) introduces new endpoints
   for the Domain Registrar and pledge, and a new component, the
   Registrar-Agent, which facilitates the communication between pledge
   and registrar during the bootstrapping phase.  To establish the trust
   relation between pledge and registrar, BRSKI-PRM relies on object
   security rather than transport security.  The approach defined here
   is agnostic to the enrollment protocol that connects the domain
   registrar to the Key Infrastructure (e.g., domain CA).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-brski-prm-15"/>
        </reference>
        <reference anchor="I-D.ietf-anima-constrained-voucher">
          <front>
            <title>Constrained Bootstrapping Remote Secure Key Infrastructure (cBRSKI)</title>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Peter Van der Stok" initials="P." surname="Van der Stok">
              <organization>vanderstok consultancy</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Esko Dijk" initials="E." surname="Dijk">
              <organization>IoTconsultancy.nl</organization>
            </author>
            <date day="8" month="July" year="2024"/>
            <abstract>
              <t>   This document defines the Constrained Bootstrapping Remote Secure Key
   Infrastructure (cBRSKI) protocol, which provides a solution for
   secure zero-touch onboarding of resource-constrained (IoT) devices
   into the network of a domain owner.  This protocol is designed for
   constrained networks, which may have limited data throughput or may
   experience frequent packet loss. cBRSKI is a variant of the BRSKI
   protocol, which uses an artifact signed by the device manufacturer
   called the "voucher" which enables a new device and the owner's
   network to mutually authenticate.  While the BRSKI voucher data is
   encoded in JSON, cBRSKI uses a compact CBOR-encoded voucher.  The
   BRSKI voucher data definition is extended with new data types that
   allow for smaller voucher sizes.  The Enrollment over Secure
   Transport (EST) protocol, used in BRSKI, is replaced with EST-over-
   CoAPS; and HTTPS used in BRSKI is replaced with DTLS-secured CoAP
   (CoAPS).  This document Updates RFC 8995 and RFC 9148.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-constrained-voucher-25"/>
        </reference>
      </references>
    </references>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="T." surname="Eckert" fullname="Toerless Eckert">
        <organization>Futurewei Technologies Inc.</organization>
        <address>
          <email>tte+ietf@cs.fau.de</email>
        </address>
      </contact>
      <contact initials="E." surname="Dijk" fullname="Esko Dijk">
        <organization/>
        <address>
          <email>esko.dijk@iotconsultancy.nl</email>
        </address>
      </contact>
      <contact initials="S." surname="Fries" fullname="Steffen Fries">
        <organization>Siemens AG</organization>
        <address>
          <email>steffen.fries@siemens.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
