<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-anima-jws-voucher-14" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.25.0 -->
  <front>
    <title abbrev="JWS-voucher">JWS signed Voucher Artifacts for Bootstrapping Protocols</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-anima-jws-voucher-14"/>
    <author initials="T." surname="Werner" fullname="Thomas Werner">
      <organization>Siemens AG</organization>
      <address>
        <email>thomas-werner@siemens.com</email>
      </address>
    </author>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <date year="2024" month="November" day="29"/>
    <area>Internet</area>
    <workgroup>anima Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 66?>

<t>I-D.ietf-anima-rfc8366bis defines a digital artifact (known as a voucher) as a YANG-defined JSON document that is signed using a Cryptographic Message Syntax (CMS) structure.
This document introduces a variant of the voucher artifact in which CMS is replaced by the JSON Object Signing and Encryption (JOSE) mechanism described in RFC7515 to support deployments in which JOSE is preferred over CMS.
In addition to specifying the format, the "application/voucher-jws+json" media type is registered and examples are provided.</t>
    </abstract>
  </front>
  <middle>
    <?line 72?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>"A Voucher Artifact for Bootstrapping Protocols" <xref target="I-D.ietf-anima-rfc8366bis"/> defines a YANG data model
used in "Bootstrapping Remote Secure Key Infrastructure" (BRSKI) <xref target="RFC8995"/> and "Secure Zero Touch Provisioning" (SZTP) <xref target="RFC8572"/>
to transfer ownership of a device from a manufacturer to a new owner (customer or operational domain).
That document provides a serialization of the voucher data to JSON <xref target="RFC8259"/> with cryptographic signing according to the Cryptographic Message Syntax (CMS) <xref target="RFC5652"/>.
That resulting voucher artifact has the media type <tt>application/voucher-cms+json</tt>.</t>
      <t>This document provides cryptographic signing of voucher data in form of JSON Web Signature (JWS) <xref target="RFC7515"/> and the media type <tt>application/voucher-jws+json</tt> to identify the voucher format.
The encoding specified in this document is used by <xref target="I-D.ietf-anima-brski-prm"/>
and may be more handy for use cases already using Javascript Object Signing and Encryption (JOSE).</t>
      <t>This document should be considered as enhancement of <xref target="I-D.ietf-anima-rfc8366bis"/>, as it provides a new voucher format.
It is similar to <xref target="I-D.ietf-anima-constrained-voucher"/>, which provides cryptographic signing according COSE <xref target="RFC8812"/> and the media type <tt>application/voucher-cose+cbor</tt>.
These documents do not change nor extend the YANG definitions of <xref target="I-D.ietf-anima-rfc8366bis"/>.</t>
      <t>With the availability of different voucher formats, it is up to an industry-specific application statement to decide which format is to be used.
The associated media types are used to distinguish different voucher formats.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
      </t>
      <t>This document uses the following terms:</t>
      <dl>
        <dt>JSON Voucher Data:</dt>
        <dd>
          <t>An unsigned JSON representation of the voucher data.</t>
        </dd>
        <dt>JWS Voucher:</dt>
        <dd>
          <t>A JWS structure signing the JSON Voucher Data.</t>
        </dd>
        <dt>Voucher:</dt>
        <dd>
          <t>A short form for voucher artifact and refers to the signed statement from Manufacturer Authorized Signing Authority (MASA) service that indicates to a Pledge the cryptographic identity of the domain it should trust, per <xref target="I-D.ietf-anima-rfc8366bis"/>.</t>
        </dd>
        <dt>Voucher Data:</dt>
        <dd>
          <t>The raw (serialized) representation of the <tt>ietf-voucher</tt> YANG module without any enclosing signature, per <xref target="I-D.ietf-anima-rfc8366bis"/>.</t>
        </dd>
        <dt>MASA (Manufacturer Authorized Signing Authority):</dt>
        <dd>
          <t>The entity that, for the purpose of this document, issues and signs the vouchers for manufacturer's pledges. In some onboarding protocols, the MASA may have an Internet presence and be integral to the onboarding process, whereas in other protocols the MASA may be an offline service that has no active role in the onboarding process, per <xref target="I-D.ietf-anima-rfc8366bis"/>.</t>
        </dd>
        <dt>Pledge:</dt>
        <dd>
          <t>The prospective component attempting to find and securely join a domain. When shipped or in factory reset mode, it only trusts authorized representatives of the manufacturer, per <xref target="I-D.ietf-anima-rfc8366bis"/>.</t>
        </dd>
        <dt>Registrar:</dt>
        <dd>
          <t>A representative of the domain that is configured, perhaps autonomically, to decide whether a new device is allowed to join the domain, per <xref target="I-D.ietf-anima-rfc8366bis"/>.</t>
        </dd>
      </dl>
      <t>This document uses the following encoding notations:</t>
      <dl>
        <dt>BASE64URL(OCTETS):</dt>
        <dd>
          <t>Denotes the base64url encoding of OCTETS, per <xref section="2" sectionFormat="of" target="RFC7515"/>.</t>
        </dd>
        <dt>UTF8(STRING):</dt>
        <dd>
          <t>Denotes the octets of the UTF-8 <xref target="RFC3629"/> representation of STRING, per <xref section="1" sectionFormat="of" target="RFC7515"/>.</t>
        </dd>
      </dl>
    </section>
    <section anchor="voucher-artifact-with-json-web-signature">
      <name>Voucher Artifact with JSON Web Signature</name>
      <t>JWS voucher artifacts MUST use the "General JWS JSON Serialization Syntax" defined in <xref section="7.2.1" sectionFormat="of" target="RFC7515"/>.
This syntax supports multiple signatures as already supported by <xref target="RFC8366"/> for CMS-signed vouchers.
The following figure summarizes the serialization of JWS voucher artifacts:</t>
      <figure anchor="VoucherGeneralJWSFigure">
        <name>Voucher Representation in General JWS JSON Serialization Syntax (JWS Voucher)</name>
        <artwork align="left"><![CDATA[
    {
      "payload": BASE64URL(UTF8(JSON Voucher Data)),
      "signatures": [
        {
          "protected": BASE64URL(UTF8(JWS Protected Header)),
          "signature": BASE64URL(JWS Signature)
        }
      ]
    }
]]></artwork>
      </figure>
      <t>The JSON Voucher Data MUST be UTF-8 encoded to become the octet-based JWS Payload defined in <xref target="RFC7515"/>.
The JWS Payload is further base64url-encoded to become the string value of the <tt>payload</tt> member as described in <xref section="3.2" sectionFormat="of" target="RFC7515"/>.
The octets of the UTF-8 representation of the JWS Protected Header are base64url-encoded to become the string value of the <tt>protected</tt> member.
The generated JWS Signature is base64url-encoded to become the string value of the <tt>signature</tt> member.</t>
      <section anchor="json-voucher-data">
        <name>JSON Voucher Data</name>
        <t>The JSON Voucher Data is an unsigned JSON document <xref target="RFC8259"/> that conforms with the data model described by the ietf-voucher YANG module <xref target="RFC7950"/> defined in <xref section="7.3" sectionFormat="of" target="I-D.ietf-anima-rfc8366bis"/> and is encoded using the rules defined in <xref target="RFC7951"/>.
The following figure provides an example of JSON Voucher Data:</t>
        <figure anchor="VoucherGeneralJWSVoucherPayloadFigure">
          <name>JSON Voucher Data Example</name>
          <artwork align="left"><![CDATA[
    {
      "ietf-voucher:voucher": {
        "assertion": "logged",
        "serial-number": "0123456789",
        "nonce": "5742698422680472",
        "created-on": "2022-07-08T03:01:24.618Z",
        "pinned-domain-cert": "base64encodedvalue=="
      }
    }
]]></artwork>
        </figure>
      </section>
      <section anchor="jws-protected-header">
        <name>JWS Protected Header</name>
        <t>The JWS Protected Header defined in <xref target="RFC7515"/> uses the standard header parameters <tt>alg</tt>, <tt>typ</tt>, and <tt>x5c</tt>:</t>
        <ul spacing="normal">
          <li>
            <t>The <tt>alg</tt> parameter MUST contain the algorithm type (e.g., <tt>ES256</tt>) used to create the signature as defined in <xref section="4.1.1" sectionFormat="of" target="RFC7515"/>.</t>
          </li>
          <li>
            <t>The <tt>typ</tt> parameter is optional and used when more than one kind of object could be present in an application data structure as described in <xref section="4.1.9" sectionFormat="of" target="RFC7515"/>. If present, the <tt>typ</tt> parameter MUST contain the value <tt>voucher-jws+json</tt>.</t>
          </li>
          <li>
            <t>If X.509 (PKIX) certificates <xref target="RFC5280"/> are used, the <tt>x5c</tt> parameter MUST contain the base64-encoded (not base64url-encoded) X.509 v3 (DER) certificate as defined in <xref section="4.1.6" sectionFormat="of" target="RFC7515"/> and SHOULD also contain the certificate chain.</t>
          </li>
        </ul>
        <dl>
          <dt>Implementation Note:</dt>
          <dd>
            <t>base64-encoded values, in contrast to base64url-encoded values, may contain slashes (<tt>/</tt>).
JSON <xref target="RFC8259"/> optionally allows escaping these with backslashes (<tt>\\</tt>).
Hence, depending on the JSON parser/serializer implementation used, they may or may not be included.
JWS Voucher parsers MUST be prepared accordingly to extract certificates correctly.</t>
          </dd>
        </dl>
        <t>To validate voucher signatures, all certificates of the certificate chain are required up to the trust anchor.
Note, to establish trust the trust anchor SHOULD be provided out-of-band up front.</t>
        <t>The following figure gives an example of a JWS Protected Header:</t>
        <figure anchor="VoucherGeneralJWSProtectedHeaderFigure">
          <name>JWS Protected Header Example</name>
          <artwork align="left"><![CDATA[
    {
      "alg": "ES256",
      "typ": "voucher-jws+json",
      "x5c": [
        "base64encodedvalue1==",
        "base64encodedvalue2=="
      ]
    }
]]></artwork>
        </figure>
      </section>
      <section anchor="jws-signature">
        <name>JWS Signature</name>
        <t>The JWS Signature is generated over the JWS Protected Header and the JWS Payload (= UTF-8 encoded JSON Voucher Data) as described in <xref section="5.1" sectionFormat="of" target="RFC7515"/>.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>The Pledge-Voucher-Request (PVR) reveals the IDevID of the component (Pledge) that is in the process of bootstrapping.</t>
      <t>A PVR is transported via HTTP-over-TLS.
However, for the Pledge-to-Registrar TLS connection a Pledge provisionally accepts the Registrar server certificate during the TLS server authentication.
Hence, it is subject to disclosure by a Dolev-Yao attacker (a "malicious messenger") <xref target="ON-PATH"/>, as explained in <xref section="10.2" sectionFormat="of" target="RFC8995"/>.</t>
      <t>The use of a JWS header brings no new privacy considerations.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The issues of how <xref target="I-D.ietf-anima-rfc8366bis"/> vouchers are used in a BRSKI system is addressed in <xref section="11" sectionFormat="of" target="RFC8995"/>.
This document does not change any of those issues, it just changes the signature technology used for voucher request and response artifacts.</t>
      <t><xref section="9" sectionFormat="of" target="RFC8572"/> deals with voucher use in Secure Zero Touch Provisioning (SZTP), for which this document also makes no changes to security.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="media-type-registry">
        <name>Media-Type Registry</name>
        <t>This section registers <tt>application/voucher-jws+json</tt> in the "Media Types" registry.</t>
        <section anchor="applicationvoucher-jwsjson">
          <name>application/voucher-jws+json</name>
          <artwork><![CDATA[
Type name:  application
Subtype name:  voucher-jws+json
Required parameters:  none
Optional parameters:  none
Encoding considerations:  JWS+JSON vouchers are JOSE objects
                          signed with one or multiple signers.
Security considerations:  See section [Security Considerations]
Interoperability considerations:  The format is designed to be
  broadly interoperable.
Published specification:  THIS RFC
Applications that use this media type:  ANIMA, 6tisch, and other
  zero-touch bootstrapping/provisioning solutions
Additional information:
  Magic number(s):  None
  File extension(s):  .vjj
  Macintosh file type code(s):  none
Person & email address to contact for further information:  IETF
  ANIMA WG
Intended usage:  LIMITED
Restrictions on usage:  NONE
Author:  ANIMA WG
Change controller:  IETF
Provisional registration? (standards tree only):  NO
]]></artwork>
        </section>
      </section>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank the various reviewers for their input,
in particular Steffen Fries, Ingo Wenda, Esko Dijk and Toerless Eckert.
Thanks for the supporting PoC implementations to Hong Rui Li and He Peng Jia.</t>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <t>These examples are folded according to the <xref target="RFC8792"/> Single Backslash rule.</t>
      <section anchor="example-pledge-voucher-request-pvr">
        <name>Example Pledge-Voucher-Request (PVR)</name>
        <t>The following is an example of a Pledge-Voucher-Request (PVR) as JWS Voucher artifact, which would be sent from a Pledge to the Registrar:</t>
        <figure anchor="ExamplePledgeVoucherRequestfigure">
          <name>Example Pledge-Voucher-Request (PVR)</name>
          <artwork align="left"><![CDATA[
{
  "payload": "eyJpZXRmLXZvdWNoZXItcmVxdWVzdDp2b3VjaGVyIjp7InNlcmlhbC\
1udW1iZXIiOiJraXQtOTg3NjU0MzIxIiwibm9uY2UiOiJUYXV2SytZL2NjMlJmSUZ2cF\
p6ZktRPT0iLCJjcmVhdGVkLW9uIjoiMjAyNC0xMS0yOVQwOTozNDoxNi40MjZaIiwicH\
JveGltaXR5LXJlZ2lzdHJhci1jZXJ0IjoiTUlJQ0RUQ0NBYk9nQXdJQkFnSUdBWk4zTk\
RtUE1Bb0dDQ3FHU000OUJBTUNNRnd4Q3pBSkJnTlZCQVlUQWtGUk1SSXdFQVlEVlFRS0\
RBbE5lVU52YlhCaGJua3hGVEFUQmdOVkJBc01ERTE1VTNWaWMybGthV0Z5ZVRFUE1BME\
dBMVVFQnd3R1RYbFRhWFJsTVJFd0R3WURWUVFEREFoTmVWTnBkR1ZEUVRBZUZ3MHlORE\
V4TWprd09URTFNekZhRncwek5ERXhNamt3T1RFMU16RmFNR0l4Q3pBSkJnTlZCQVlUQW\
tGUk1SSXdFQVlEVlFRS0RBbE5lVU52YlhCaGJua3hGREFTQmdOVkJBc01DMDE1VTNWaW\
MybGtZWEo1TVE4d0RRWURWUVFIREFaTmVWTnBkR1V4R0RBV0JnTlZCQU1NRDAxNVUybD\
BaVkpsWjJsemRISmhjakJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUFCQU\
grTFptbnRncGgralUvc2NUQnhkVHpzd2xmUTZ1Sy9BOWFJYkpaS2U0UGl0VnhraE5HWW\
d0Nm9wMytDaVFLTHdaOWdEMHFXMjIxQUxZNSs3bVFKNnlqV3pCWk1CMEdBMVVkSlFRV0\
1CUUdDQ3NHQVFVRkJ3TUJCZ2dyQmdFRkJRY0RIREFPQmdOVkhROEJBZjhFQkFNQ0I0QX\
dLQVlEVlIwUkJDRXdINElkYlhsemFYUmxjbVZuYVhOMGNtRnlMbTE1WTI5dGNHRnVlUz\
VqYjIwd0NnWUlLb1pJemowRUF3SURTQUF3UlFJZ0Q3a0J4MU82TzJGVFBPUlgwNDdTcF\
N2cGF6dC8rR3YyOXM4N3lyTXU2UE1DSVFEeU90cGJ2bEwvd1c4Zy9ESUx2T0RZZ01PT1\
VrVDE1ZHZZTUVOR1QyQ3V5Zz09In19",
  "signatures": [
    {
      "protected": "eyJ4NWMiOlsiTUlJQ056Q0NBZDJnQXdJQkFnSUdBWk4zTkRt\
S01Bb0dDQ3FHU000OUJBTUNNRmd4Q3pBSkJnTlZCQVlUQWtGUk1Sc3dHUVlEVlFRS0RC\
Sk5ZVzUxWm1GamRIVnlaWEl3TURFZ1FVY3hFekFSQmdOVkJBc01Dazl5WjFnZ1ZXNXBk\
RUV4RnpBVkJnTlZCQU1NRGsxaGJuVm1ZV04wZFhKbGNrTkJNQ0FYRFRJME1URXlPVEE1\
TVRVek1Wb1lEems1T1RreE1qTXhNak0xT1RVNVdqQnZNUXN3Q1FZRFZRUUdFd0pCVVRF\
Yk1Ca0dBMVVFQ2d3U1RXRnVkV1poWTNSMWNtVnlNREF4SUVGSE1STXdFUVlEVlFRTERB\
cFBjbWRZSUZWdWFYUkJNUll3RkFZRFZRUUZFdzFyYVhRdE9UZzNOalUwTXpJeE1SWXdG\
QVlEVlFRRERBMUJRa016TGtVM05TMHhNREJCTUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJ\
emowREFRY0RRZ0FFZ05rMXc2ZlBFRFlyekRJam5ybUV4RjU0WGsrK1psZjJITTRrQ29P\
bkt2VHJPMFY4YUJoMW11enlRVlUwano2VTd6OTFBSjlvNlNSQmxibTJmQlRPYTZONk1I\
Z3dNQVlJS3dZQkJRVUhBU0FFSkJZaWJXRnpZUzEwWlhOMExuaDVlbTFoYm5WbVlXTjBk\
WEpsY2k1amIyMDZPVFEwTXpBZkJnTlZIU01FR0RBV2dCU1ZUdFYrM1FxK2lrdlBLTVpv\
MEhaOXhESUg5VEFUQmdOVkhTVUVEREFLQmdnckJnRUZCUWNEQWpBT0JnTlZIUThCQWY4\
RUJBTUNCNEF3Q2dZSUtvWkl6ajBFQXdJRFNBQXdSUUlnVTJUNkpTOHVqUTAzK1QvdDE2\
dVNoZ2lsOE0vbWFHVnhuSzRxek9OUFVKRUNJUURHTVRxcmkyVzBMSUltajZCS1d0QU95\
WDJmRWdvaFI4RFVyTDNCMjFvRGlnPT0iXSwidHlwIjoidm91Y2hlci1qd3MranNvbiIs\
ImFsZyI6IkVTMjU2In0",
      "signature": "ehYSVTUFgJ890sF5F8ky5nfOXsG9JMfBVBv9POlwHVZGQnFQ\
hP3F0BQj6bj4mGICcfk5FGPD8rJKs7txuBfKgA"
    }
  ]
}
]]></artwork>
        </figure>
        <t>The following private key (of the IDevID) is used to sign a Pledge-Voucher-Request (PVR) by Pledge:</t>
        <artwork><![CDATA[
-----BEGIN PRIVATE KEY-----
MEECAQAwEwYHKoZIzj0CAQYIKoZIzj0DAQcEJzAlAgEBBCA4b574lJvkZZt+ij+D
ughPm8xFg95HMW3BHKCbQEaxUw==
-----END PRIVATE KEY-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
]]></artwork>
      </section>
      <section anchor="example-parboiled-registrar-voucher-request-rvr">
        <name>Example Parboiled Registrar-Voucher-Request (RVR)</name>
        <t>The term parboiled refers to food which is partially cooked.
In BRSKI <xref target="RFC8995"/>, the term refers to a Pledge-Voucher-Request (PVR) that was received by the Registrar,
then has been processed by the Registrar ("cooked"),
and is now being forwarded to the MASA.</t>
        <t>The following is an example Registrar-Voucher-Request (RVR) as JWS Voucher artifact, which would be sent from the Registrar to the MASA.
Note, the previous PVR can be seen in the payload in the field <tt>prior-signed-voucher-request</tt>.</t>
        <figure anchor="ExampleParboiledRegistrarVoucherRequestfigure">
          <name>Example Parboiled Registrar-Voucher-Request (RVR)</name>
          <artwork align="left"><![CDATA[
{
  "payload": "eyJpZXRmLXZvdWNoZXItcmVxdWVzdDp2b3VjaGVyIjp7InNlcmlhbC\
1udW1iZXIiOiJraXQtOTg3NjU0MzIxIiwiaWRldmlkLWlzc3VlciI6IkJCZ3dGb0FVbF\
U3VmZ0MEt2b3BMenlqR2FOQjJmY1F5Qi9VPSIsIm5vbmNlIjoiVGF1dksrWS9jYzJSZk\
lGdnBaemZLUT09IiwicHJpb3Itc2lnbmVkLXZvdWNoZXItcmVxdWVzdCI6ImV5SndZWG\
xzYjJGa0lqb2laWGxLY0ZwWVVtMU1XRnAyWkZkT2IxcFlTWFJqYlZaNFpGZFdlbVJFY0\
RKaU0xWnFZVWRXZVVscWNEZEpiazVzWTIxc2FHSkRNWFZrVnpGcFdsaEphVTlwU25KaF\
dGRjBUMVJuTTA1cVZUQk5la2w0U1dsM2FXSnRPWFZaTWxWcFQybEtWVmxZVmpKVGVYUm\
FUREpPYWsxc1NtMVRWVm95WTBad05scHJkRkpRVkRCcFRFTkthbU50Vm1oa1IxWnJURm\
M1ZFVscWIybE5ha0Y1VGtNd2VFMVRNSGxQVmxGM1QxUnZlazVFYjNoT2FUUXdUV3BhWV\
VscGQybGpTRXAyWlVkc2RHRllValZNV0Vwc1dqSnNlbVJJU21oamFURnFXbGhLTUVscW\
IybFVWV3hLVVRCU1ZWRXdUa0paYXpsdVVWaGtTbEZyUm01VFZXUkNWMnMwZWxSclVuUl\
ZSVEZDWWpCa1JGRXpSa2hWTURBd1QxVktRbFJWVGs1U2JtUTBVVE53UWxOclNtNVViRn\
BEVVZac1ZWRlhkRWRWYXpGVFUxaGtSbEZXYkVWV2JFWlNVekJTUW1KRk5XeFdWVFV5V1\
d4b1EyRkhTblZoTTJoSFZrVkdWVkZ0WkU5V2EwcENZekF4UlZKVVJURldWRTVYWVZkTm\
VXSkhkR2hXTUZvMVdsWlNSbFZGTVVKTlJXUkNUVlpXUmxGdVpETlNNVkpaWWtaU2FGZE\
dTbk5VVmtwR1pEQlNNMWRWVWxkVlZrWkZVa1ZHYjFSdFZsZFVia0pyVWpGYVJWVldVa0\
phVlZvelRVaHNUMUpGVmpSVVYzQnlaREE1VlZKVVJrNWxhMXBvVW01amQyVnJOVVZTV0\
doT1lXMTBNMVF4VWtaTlZURTJVbTFHVGxJd2JEUlJNM0JDVTJ0S2JsUnNXa05SVm14Vl\
VWZDBSMVZyTVZOVFdHUkdVVlpzUlZac1JsSlRNRkpDWWtVMWJGWlZOVEpaYkdoRFlVZE\
tkV0V6YUVkU1JVWlVVVzFrVDFaclNrSmpNREZFVFVSRk1WWlVUbGRoVjAxNVlrZDBXbG\
RGYnpGVVZrVTBaREJTVWxkVlVsZFZWa1pKVWtWR1lWUnRWbGRVYmtKclVqRldORkl3VW\
tKV01FcHVWR3hhUTFGVk1VNVNSRUY0VGxaVmVXSkVRbUZXYTNCelYycEtjMlZ0VWtsVG\
JXaHFZV3RLWVZSVlNrNVNNRW8xWTFWa1ZGUlVVVFZSVjJSR1VqQk9SR05WWkZSVVZGRT\
FVVmhrUmxORlJYZFRWVVpEVVZWbmNsUkdjSFJpYmxKdVkwZG5jbUZzVlhaak1rNVZVVz\
VvYTFaSWNIcGtNbmh0VlZSYU1WTjVPVUpQVjBaS1dXdHdZVk15VlRCVlIyd3dWbTVvY2\
1GRk5VaFhWMlF3VG0wNWQwMTVkRVJoVmtaTVZFaGtZVTlYWkVWTlNFWllUV3BKZUZGVm\
VGcE9VM016WWxaR1MwNXViSEZXTTNCRFYyc3hRMDFGWkVKTlZsWnJVMnhHVWxZd01VTl\
ZWV1JFVVROT1NGRldSbFpTYTBvelZGVktRMW95WkhsUmJXUkdVbXRLVWxrd1VrbFNSVV\
pRVVcxa1QxWnJhRkpQUlVwQ1dtcG9SbEZyUms1Uk1Fa3dVVmhrVEZGV2JFVldiRWwzVl\
d0S1JGSllaRWxPUld4cldXeG9jMlZ0UmxsVmJYaHFZbFphZFZsV2FFOU5SMDUwVW01c1\
RXSlVSVEZYVkVrMVpFZE9TRkp1Vm14VmVsWnhXV3BKZDJRd1RtNVhWV3hNWWpGd1NtVn\
RiM2RTVlVZelUxVlNWRkZWUmpOVmJFWktXakJSTTJFd1NqUk5WVGd5VkhwS1IxWkdRbE\
JWYkdkM1RrUmtWR05HVGpKalIwWTJaRU00Y2xJeldYbFBXRTAwVGpOc2VWUllWVEpWUl\
RGRVUxWkdSV1ZWT1RCalIwb3lZa1YzZG1ReFl6UmFlVGxGVTFWNE1sUXdVbHBhTURGUV\
ZERldjbFpFUlRGYVNGcGFWRlZXVDFJeFVYbFJNMVkxV25vd09VbHVNVGtpTENKemFXZH\
VZWFIxY21WeklqcGJleUp3Y205MFpXTjBaV1FpT2lKbGVVbzBUbGROYVU5c2MybFVWV3\
hLVVRBMU5sRXdUa0phUkVwdVVWaGtTbEZyUm01VFZXUkNWMnMwZWxSclVuUlRNREZDWW\
pCa1JGRXpSa2hWTURBd1QxVktRbFJWVGs1U2JXUTBVVE53UWxOclNtNVViRnBEVVZac1\
ZWRlhkRWRWYXpGVFl6TmtTRlZXYkVWV2JFWlNVekJTUTFOck5WcFdlbFY0VjIweFIyRn\
RVa2xXYm14aFYwVnNNMVJWVWtaYU1VWldXVE5vUm1WclJsTlJiV1JQVm10S1FtTXdNVV\
JoZW13MVYycEdibG94V2xoT1dFSnJVbFZXTkZKdWNFSldhMHB1Vkd4YVExRlZNVTVTUj\
NONFlVZEtkVlp0TVZwV01EUjNXa1pvUzJKSFRuSlVhMHBPVVRCR1dWSkdVa3BOUlRGVl\
VsaHNVRlpGUlRGVVZsSldaV3N4VjJJeGJFVmxiWE14VkRGU2NtVkZNWEZVV0doT1lXc3\
dlRlF4VWxaT1ZtUnhVVzVhVGxWWVRqTlJNVVphVWtaYVVsVlZaRVprTUhCRFZsWlNSbG\
xyTVVOaE1HUkNUVlpXUmxFeVpETlZNVkpZVW01V2ExWXhjRzlYVkU1VFRWZE9kRlp1Yk\
U1U1JVWTBVMVZXUjFORk1WTlVXR1JHVlZac1JWWnNSbEpVUlZKQ1kwWkNhbUpYVWxwVF\
ZWcFhaRmRHV1ZWclNrNVZiR3d6VW10R1dsSkdXbEpWVlZwR1pIcEdlVmxXYUZKa1JUbF\
ZXbnBPVDJGc1ZYZFVXSEJLWlVVeFUxZFlaRWRSVm14RlZteEdVbEpGVWtKTlZVcFNZVE\
F4TmxSSGRGWk5NRFZVVFVob1RsSkZTa05VVlZweVpEQldNMWRWYUV4aU1YQktaVzF2ZD\
FFd1JsSlhWV3hNWWpGd1NtVnRiM2RTUlVaU1dUQlNVbG93UmtaYU1EVnlUVmhqTWxwc1\
FrWlNSbXg1Wld0U1NtRnROWGxpVlZZMFVtcFZNRmRIYzNKTE1YQnpXbXBLU1ZSVVVuSl\
JNamxRWW10ME1sWklTbEJOUmxrMFdWVktiMDFYTVRGbGJteFNWbXhWZDJGdWJ6SldWR1\
EyVDFSR1FsTnFiSFpPYkU1VFVXMTRhV0pVU20xUmJGSlFXVlJhVDA1ck1VbGFNMlJPVV\
Zac1NsTXpaRnBSYTBwU1ZsVm9RbFV3UmtaVGEwcGFZVmRLV0ZKdWNGcFZla1YzVjJ4b1\
QwMUZlSFZoUkZac1lsUkdiMWx0TlZkaVZteFlWR3BDYTFkRmNITlpNbXN4WVcxSmVVMU\
VXbEJXUmtWM1ZGaHdRbHByU201VWJGcEpWVEF4UmxJd1VrSldNbVJEVlRGYVZXUkdXWE\
pOTVVaNFN6SnNjbVJzUWt4VVZuQjJUVVZvWVU5WWFFVlRWV2MxVmtWR1ZWRnRaRTlXYT\
JoVVZsVldSVkpGUmt4UmJXUnVZMnRLYmxKVldrTlZWMDVGVVZkd1FsUXdTbTVVYkZwSl\
ZWUm9RMUZYV1RSU1ZVcENWRlZPUTA1RlJqTlJNbVJhVTFWMGRsZHJiRFpoYWtKR1VWaG\
tTbEpHVGtKUldHUlRWVlZzYmxaVVNsVk9hM0JVVDBoV2NWVlVRWHBMTVZGMlpFUkZNbV\
JXVG05YU1teHpUMFV3ZG1KWFJraFdibWgxVTNwU2VHVnJPVTlWUmxaTFVsVk9TbFZWVW\
toVVZsSjRZMjFyZVZaNlFrMVRWV3gwWVdwYVExTXhaREJSVlRrMVYwUktiVkpYWkhaaF\
JrazBVa1pXZVZSRVRrTk5ha1oyVWtkc2JsQlVNR2xZVTNkcFpFaHNkMGxxYjJsa2JUa3\
hXVEpvYkdOcE1YRmtNMDF5WVc1T2RtSnBTWE5KYlVaeldubEpOa2xyVmxSTmFsVXlTVz\
R3SWl3aWMybG5ibUYwZFhKbElqb2laV2haVTFaVVZVWm5Tamc1TUhOR05VWTRhM2sxYm\
1aUFdITkhPVXBOWmtKV1FuWTVVRTlzZDBoV1drZFJia1pSYUZBelJqQkNVV28yWW1vMG\
JVZEpRMk5tYXpWR1IxQkVPSEpLUzNNM2RIaDFRbVpMWjBFaWZWMTkiLCJjcmVhdGVkLW\
9uIjoiMjAyNC0xMS0yOVQwOTozNDoxNi41ODBaIn19",
  "signatures": [
    {
      "protected": "eyJ4NWMiOlsiTUlJQjhEQ0NBWmFnQXdJQkFnSUdBWk4zTkRt\
Uk1Bb0dDQ3FHU000OUJBTUNNRnd4Q3pBSkJnTlZCQVlUQWtGUk1SSXdFQVlEVlFRS0RB\
bE5lVU52YlhCaGJua3hGVEFUQmdOVkJBc01ERTE1VTNWaWMybGthV0Z5ZVRFUE1BMEdB\
MVVFQnd3R1RYbFRhWFJsTVJFd0R3WURWUVFEREFoTmVWTnBkR1ZEUVRBZUZ3MHlOREV4\
TWprd09URTFNekZhRncwek5ERXhNamt3T1RFMU16RmFNSGt4Q3pBSkJnTlZCQVlUQWtG\
Uk1SSXdFQVlEVlFRS0RBbE5lVU52YlhCaGJua3hGVEFUQmdOVkJBc01ERTE1VTNWaWMy\
bGthV0Z5ZVRFUE1BMEdBMVVFQnd3R1RYbFRhWFJsTVM0d0xBWURWUVFERENWU1pXZHBj\
M1J5WVhJZ1ZtOTFZMmhsY2lCU1pYRjFaWE4wSUZOcFoyNXBibWNnUzJWNU1Ga3dFd1lI\
S29aSXpqMENBUVlJS29aSXpqMERBUWNEUWdBRXh3ejJJQzdNaW16VGhpS1huczMzTkhT\
SitIdzl2ZHRFb1Y4b2lwQWlPazJtclpWK2dGZVBNNmdadWczby84ak9VZ0NGeGRxb0l2\
U1Y3dkxEU2lic2lxTW5NQ1V3RXdZRFZSMGxCQXd3Q2dZSUt3WUJCUVVIQXh3d0RnWURW\
UjBQQVFIL0JBUURBZ2VBTUFvR0NDcUdTTTQ5QkFNQ0EwZ0FNRVVDSVFENDhKeDh2TlJw\
VE9LREtjWmtjR0xTb2V6REFuTktndDNkU25DNFFkTGpBUUlnZmFxYkFvREtTZnpWcS9p\
cy9Cc2duaUpwQ2VUcU1FTUV0SUIwOGJsRDA5az0iXSwidHlwIjoidm91Y2hlci1qd3Mr\
anNvbiIsImFsZyI6IkVTMjU2In0",
      "signature": "4K-jQbrBtzj_YE9zgJoMZYC1QPgEEU3gTKiaLh5TdO5dcgB1\
z_zguJPSvR_QdpIbZmjkEyIyL9GJDZ2jACLKVg"
    }
  ]
}
]]></artwork>
        </figure>
        <t>The following private key is used to sign a Registrar-Voucher-Request (RVR) by Registrar:</t>
        <artwork><![CDATA[
-----BEGIN PRIVATE KEY-----
MEECAQAwEwYHKoZIzj0CAQYIKoZIzj0DAQcEJzAlAgEBBCDU/WkJnGR67oUgP8L1
bmvYpUPt4i6Rc/OUSg0C8SiWdg==
-----END PRIVATE KEY-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
]]></artwork>
      </section>
      <section anchor="example-voucher-response">
        <name>Example Voucher Response</name>
        <t>The following is an example voucher response as JWS Voucher artifact, which would be sent from the MASA to the Pledge via Registrar.</t>
        <figure anchor="ExampleVoucherResponsefigure">
          <name>Example Voucher Response</name>
          <artwork align="left"><![CDATA[
{
  "payload": "eyJpZXRmLXZvdWNoZXI6dm91Y2hlciI6eyJhc3NlcnRpb24iOiJsb2\
dnZWQiLCJzZXJpYWwtbnVtYmVyIjoia2l0LTk4NzY1NDMyMSIsIm5vbmNlIjoiVGF1dk\
srWS9jYzJSZklGdnBaemZLUT09IiwiY3JlYXRlZC1vbiI6IjIwMjQtMTEtMjlUMDk6Mz\
Q6MTcuMDI5WiIsInBpbm5lZC1kb21haW4tY2VydCI6Ik1JSUI4VENDQVplZ0F3SUJBZ0\
lHQVpOM05EbU5NQW9HQ0NxR1NNNDlCQU1DTUZ3eEN6QUpCZ05WQkFZVEFrRlJNUkl3RU\
FZRFZRUUtEQWxOZVVOdmJYQmhibmt4RlRBVEJnTlZCQXNNREUxNVUzVmljMmxrYVdGeW\
VURVBNQTBHQTFVRUJ3d0dUWGxUYVhSbE1SRXdEd1lEVlFRRERBaE5lVk5wZEdWRFFUQW\
VGdzB5TkRFeE1qa3dPVEUxTXpGYUZ3MHpOREV4TWprd09URTFNekZhTUZ3eEN6QUpCZ0\
5WQkFZVEFrRlJNUkl3RUFZRFZRUUtEQWxOZVVOdmJYQmhibmt4RlRBVEJnTlZCQXNNRE\
UxNVUzVmljMmxrYVdGeWVURVBNQTBHQTFVRUJ3d0dUWGxUYVhSbE1SRXdEd1lEVlFRRE\
RBaE5lVk5wZEdWRFFUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDlBd0VIQTBJQUJIOG\
hqUElSdTZjcVBDWmJ3ZDhBQ2NySFZQMHY0Wi9EUjNsbXpISmlZbWtwZjMrckllS2tPRm\
5GSEQ3S3l3cDMxUVFOejV5OFM3UU00K21wcnNaTWZJS2pSVEJETUJJR0ExVWRFd0VCL3\
dRSU1BWUJBZjhDQVFFd0RnWURWUjBQQVFIL0JBUURBZ0lFTUIwR0ExVWREZ1FXQkJScX\
ljMVJTNGQ2ekVnRG1sRFpOWW80aEVzTFZ6QUtCZ2dxaGtqT1BRUURBZ05JQURCRkFpRU\
FnSWUxRXNzc1ZKd0ZyZnpEMVdtK2FCN2trT3IxbGRlOU03RjB6dTNGNitrQ0lDYXRIV0\
VwamkvMFZkYy9sRFkwUk5zeWxacEpCTDN6Vytpa09DdnZhSkV1In19",
  "signatures": [
    {
      "protected": "eyJ4NWMiOlsiTUlJQnh6Q0NBVzZnQXdJQkFnSUdBWk4zTkRs\
L01Bb0dDQ3FHU000OUJBTUNNRmd4Q3pBSkJnTlZCQVlUQWtGUk1Sc3dHUVlEVlFRS0RC\
Sk5ZVzUxWm1GamRIVnlaWEl3TURFZ1FVY3hFekFSQmdOVkJBc01Dazl5WjFnZ1ZXNXBk\
RUV4RnpBVkJnTlZCQU1NRGsxaGJuVm1ZV04wZFhKbGNrTkJNQjRYRFRJME1URXlPVEE1\
TVRVek1Wb1hEVE0wTVRFeU9UQTVNVFV6TVZvd2FqRUxNQWtHQTFVRUJoTUNRVkV4R3pB\
WkJnTlZCQW9NRWsxaGJuVm1ZV04wZFhKbGNqQXdNU0JCUnpFVE1CRUdBMVVFQ3d3S1Qz\
Sm5XQ0JWYm1sMFFURXBNQ2NHQTFVRUF3d2dUV0Z1ZFdaaFkzUjFjbVZ5SUZadmRXTm9a\
WElnVTJsbmJtbHVaeUJMWlhrd1dUQVRCZ2NxaGtqT1BRSUJCZ2dxaGtqT1BRTUJCd05D\
QUFSR0NJM0gwL0xrWnNZNDV1OEZTZ1RLNlpLMUk3d2s1eWZEWk12elo2L3Y5NGJoNFB0\
UG9SU3cwSjBvemhiL2hrRkVGeE5mbkt6WUtvT3dDdU9nUENNUm94SXdFREFPQmdOVkhR\
OEJBZjhFQkFNQ0I0QXdDZ1lJS29aSXpqMEVBd0lEUndBd1JBSWdCcUF3WkYxRm9kRFBB\
Nzhjcnp2bWJqSHBMUlRUM0hGcWI5UHRXTzhwTjYwQ0lBV1l6aUpUQk9xNXcxNXl2Q05V\
S1pYSEVGMSt2TkUxcjMyTnpVWTBQSEY1Il0sInR5cCI6InZvdWNoZXItandzK2pzb24i\
LCJhbGciOiJFUzI1NiJ9",
      "signature": "TYwc3Nzi4l5A_326zr0IFvpqfzt7v7SqidFK_Go4wNFVCnXa\
t5GngoTboMGXOMelfbx0LqxStz5Tq-5nFSvD2w"
    }
  ]
}
]]></artwork>
        </figure>
        <t>The following private key is used to sign a Voucher by MASA:</t>
        <artwork><![CDATA[
-----BEGIN PRIVATE KEY-----
MEECAQAwEwYHKoZIzj0CAQYIKoZIzj0DAQcEJzAlAgEBBCAergZDU0lUzsqylxKs
I0KZZsqgcx+LKJglpD0agoiaWQ==
-----END PRIVATE KEY-----
-----BEGIN CERTIFICATE-----
MIIBxzCCAW6gAwIBAgIGAZN3NDl/MAoGCCqGSM49BAMCMFgxCzAJBgNVBAYTAkFR
MRswGQYDVQQKDBJNYW51ZmFjdHVyZXIwMDEgQUcxEzARBgNVBAsMCk9yZ1ggVW5p
dEExFzAVBgNVBAMMDk1hbnVmYWN0dXJlckNBMB4XDTI0MTEyOTA5MTUzMVoXDTM0
MTEyOTA5MTUzMVowajELMAkGA1UEBhMCQVExGzAZBgNVBAoMEk1hbnVmYWN0dXJl
cjAwMSBBRzETMBEGA1UECwwKT3JnWCBVbml0QTEpMCcGA1UEAwwgTWFudWZhY3R1
cmVyIFZvdWNoZXIgU2lnbmluZyBLZXkwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNC
AARGCI3H0/LkZsY45u8FSgTK6ZK1I7wk5yfDZMvzZ6/v94bh4PtPoRSw0J0ozhb/
hkFEFxNfnKzYKoOwCuOgPCMRoxIwEDAOBgNVHQ8BAf8EBAMCB4AwCgYIKoZIzj0E
AwIDRwAwRAIgBqAwZF1FodDPA78crzvmbjHpLRTT3HFqb9PtWO8pN60CIAWYziJT
BOq5w15yvCNUKZXHEF1+vNE1r32NzUY0PHF5
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
]]></artwork>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8995">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="T. Eckert" initials="T." surname="Eckert"/>
            <author fullname="M. Behringer" initials="M." surname="Behringer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane. To do this, a Secure Key Infrastructure is bootstrapped. This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline. We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device. The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="I-D.ietf-anima-rfc8366bis">
          <front>
            <title>A Voucher Artifact for Bootstrapping Protocols</title>
            <author fullname="Kent Watsen" initials="K." surname="Watsen">
              <organization>Watsen Networks</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software</organization>
            </author>
            <author fullname="Max Pritikin" initials="M." surname="Pritikin">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Toerless Eckert" initials="T. T." surname="Eckert">
              <organization>Futurewei Technologies Inc.</organization>
            </author>
            <author fullname="Qiufang Ma" initials="Q." surname="Ma">
              <organization>Huawei</organization>
            </author>
            <date day="8" month="July" year="2024"/>
            <abstract>
              <t>   This document defines a strategy to securely assign a pledge to an
   owner using an artifact signed, directly or indirectly, by the
   pledge's manufacturer.  This artifact is known as a "voucher".

   This document defines an artifact format as a YANG-defined JSON or
   CBOR document that has been signed using a variety of cryptographic
   systems.

   The voucher artifact is normally generated by the pledge's
   manufacturer (i.e., the Manufacturer Authorized Signing Authority
   (MASA)).

   This document updates RFC8366, merging a number of extensions into
   the YANG.  The RFC8995 voucher request is also merged into this
   document.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-rfc8366bis-12"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8572">
          <front>
            <title>Secure Zero Touch Provisioning (SZTP)</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="I. Farrer" initials="I." surname="Farrer"/>
            <author fullname="M. Abrahamsson" initials="M." surname="Abrahamsson"/>
            <date month="April" year="2019"/>
            <abstract>
              <t>This document presents a technique to securely provision a networking device when it is booting in a factory-default state. Variations in the solution enable it to be used on both public and private networks. The provisioning steps are able to update the boot image, commit an initial configuration, and execute arbitrary scripts to address auxiliary needs. The updated device is subsequently able to establish secure connections with other systems. For instance, a device may establish NETCONF (RFC 6241) and/or RESTCONF (RFC 8040) connections with deployment-specific network management systems.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8572"/>
          <seriesInfo name="DOI" value="10.17487/RFC8572"/>
        </reference>
        <reference anchor="RFC3629">
          <front>
            <title>UTF-8, a transformation format of ISO 10646</title>
            <author fullname="F. Yergeau" initials="F." surname="Yergeau"/>
            <date month="November" year="2003"/>
            <abstract>
              <t>ISO/IEC 10646-1 defines a large character set called the Universal Character Set (UCS) which encompasses most of the world's writing systems. The originally proposed encodings of the UCS, however, were not compatible with many current applications and protocols, and this has led to the development of UTF-8, the object of this memo. UTF-8 has the characteristic of preserving the full US-ASCII range, providing compatibility with file systems, parsers and other software that rely on US-ASCII values but are transparent to other values. This memo obsoletes and replaces RFC 2279.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="63"/>
          <seriesInfo name="RFC" value="3629"/>
          <seriesInfo name="DOI" value="10.17487/RFC3629"/>
        </reference>
        <reference anchor="RFC5652">
          <front>
            <title>Cryptographic Message Syntax (CMS)</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="70"/>
          <seriesInfo name="RFC" value="5652"/>
          <seriesInfo name="DOI" value="10.17487/RFC5652"/>
        </reference>
        <reference anchor="RFC7950">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="RFC7951">
          <front>
            <title>JSON Encoding of Data Modeled with YANG</title>
            <author fullname="L. Lhotka" initials="L." surname="Lhotka"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>This document defines encoding rules for representing configuration data, state data, parameters of Remote Procedure Call (RPC) operations or actions, and notifications defined using YANG as JavaScript Object Notation (JSON) text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7951"/>
          <seriesInfo name="DOI" value="10.17487/RFC7951"/>
        </reference>
        <reference anchor="RFC8366">
          <front>
            <title>A Voucher Artifact for Bootstrapping Protocols</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
            <author fullname="T. Eckert" initials="T." surname="Eckert"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>This document defines a strategy to securely assign a pledge to an owner using an artifact signed, directly or indirectly, by the pledge's manufacturer. This artifact is known as a "voucher".</t>
              <t>This document defines an artifact format as a YANG-defined JSON document that has been signed using a Cryptographic Message Syntax (CMS) structure. Other YANG-derived formats are possible. The voucher artifact is normally generated by the pledge's manufacturer (i.e., the Manufacturer Authorized Signing Authority (MASA)).</t>
              <t>This document only defines the voucher artifact, leaving it to other documents to describe specialized protocols for accessing it.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8366"/>
          <seriesInfo name="DOI" value="10.17487/RFC8366"/>
        </reference>
        <reference anchor="RFC8792">
          <front>
            <title>Handling Long Lines in Content of Internet-Drafts and RFCs</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="E. Auerswald" initials="E." surname="Auerswald"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <date month="June" year="2020"/>
            <abstract>
              <t>This document defines two strategies for handling long lines in width-bounded text content. One strategy, called the "single backslash" strategy, is based on the historical use of a single backslash ('\') character to indicate where line-folding has occurred, with the continuation occurring with the first character that is not a space character (' ') on the next line. The second strategy, called the "double backslash" strategy, extends the first strategy by adding a second backslash character to identify where the continuation begins and is thereby able to handle cases not supported by the first strategy. Both strategies use a self-describing header enabling automated reconstitution of the original content.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8792"/>
          <seriesInfo name="DOI" value="10.17487/RFC8792"/>
        </reference>
        <reference anchor="RFC8812">
          <front>
            <title>CBOR Object Signing and Encryption (COSE) and JSON Object Signing and Encryption (JOSE) Registrations for Web Authentication (WebAuthn) Algorithms</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="August" year="2020"/>
            <abstract>
              <t>The W3C Web Authentication (WebAuthn) specification and the FIDO Alliance FIDO2 Client to Authenticator Protocol (CTAP) specification use CBOR Object Signing and Encryption (COSE) algorithm identifiers. This specification registers the following algorithms (which are used by WebAuthn and CTAP implementations) in the IANA "COSE Algorithms" registry: RSASSA-PKCS1-v1_5 using SHA-256, SHA-384, SHA-512, and SHA-1; and Elliptic Curve Digital Signature Algorithm (ECDSA) using the secp256k1 curve and SHA-256. It registers the secp256k1 elliptic curve in the IANA "COSE Elliptic Curves" registry. Also, for use with JSON Object Signing and Encryption (JOSE), it registers the algorithm ECDSA using the secp256k1 curve and SHA-256 in the IANA "JSON Web Signature and Encryption Algorithms" registry and the secp256k1 elliptic curve in the IANA "JSON Web Key Elliptic Curve" registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8812"/>
          <seriesInfo name="DOI" value="10.17487/RFC8812"/>
        </reference>
        <reference anchor="ON-PATH" target="https://mailarchive.ietf.org/arch/msg/saag/m1r9uo4xYznOcf85Eyk0Rhut598/">
          <front>
            <title>can an on-path attacker drop traffic?</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="I-D.ietf-anima-brski-prm">
          <front>
            <title>BRSKI with Pledge in Responder Mode (BRSKI-PRM)</title>
            <author fullname="Steffen Fries" initials="S." surname="Fries">
              <organization>Siemens AG</organization>
            </author>
            <author fullname="Thomas Werner" initials="T." surname="Werner">
              <organization>Siemens AG</organization>
            </author>
            <author fullname="Eliot Lear" initials="E." surname="Lear">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date day="26" month="August" year="2024"/>
            <abstract>
              <t>   This document defines enhancements to Bootstrapping a Remote Secure
   Key Infrastructure (BRSKI, RFC8995) to enable bootstrapping in
   domains featuring no or only limited connectivity between a pledge
   and the domain registrar.  It specifically changes the interaction
   model from a pledge-initiated mode, as used in BRSKI, to a pledge-
   responding mode, where the pledge is in server role.  For this, BRSKI
   with Pledge in Responder Mode (BRSKI-PRM) introduces new endpoints
   for the Domain Registrar and pledge, and a new component, the
   Registrar-Agent, which facilitates the communication between pledge
   and registrar during the bootstrapping phase.  To establish the trust
   relation between pledge and registrar, BRSKI-PRM relies on object
   security rather than transport security.  The approach defined here
   is agnostic to the enrollment protocol that connects the domain
   registrar to the Key Infrastructure (e.g., domain CA).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-brski-prm-15"/>
        </reference>
        <reference anchor="I-D.ietf-anima-constrained-voucher">
          <front>
            <title>Constrained Bootstrapping Remote Secure Key Infrastructure (cBRSKI)</title>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Peter Van der Stok" initials="P." surname="Van der Stok">
              <organization>vanderstok consultancy</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Esko Dijk" initials="E." surname="Dijk">
              <organization>IoTconsultancy.nl</organization>
            </author>
            <date day="8" month="July" year="2024"/>
            <abstract>
              <t>   This document defines the Constrained Bootstrapping Remote Secure Key
   Infrastructure (cBRSKI) protocol, which provides a solution for
   secure zero-touch onboarding of resource-constrained (IoT) devices
   into the network of a domain owner.  This protocol is designed for
   constrained networks, which may have limited data throughput or may
   experience frequent packet loss. cBRSKI is a variant of the BRSKI
   protocol, which uses an artifact signed by the device manufacturer
   called the "voucher" which enables a new device and the owner's
   network to mutually authenticate.  While the BRSKI voucher data is
   encoded in JSON, cBRSKI uses a compact CBOR-encoded voucher.  The
   BRSKI voucher data definition is extended with new data types that
   allow for smaller voucher sizes.  The Enrollment over Secure
   Transport (EST) protocol, used in BRSKI, is replaced with EST-over-
   CoAPS; and HTTPS used in BRSKI is replaced with DTLS-secured CoAP
   (CoAPS).  This document Updates RFC 8995 and RFC 9148.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-constrained-voucher-25"/>
        </reference>
      </references>
    </references>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="T." surname="Eckert" fullname="Toerless Eckert">
        <organization>Futurewei Technologies Inc.</organization>
        <address>
          <email>tte+ietf@cs.fau.de</email>
        </address>
      </contact>
      <contact initials="E." surname="Dijk" fullname="Esko Dijk">
        <organization/>
        <address>
          <email>esko.dijk@iotconsultancy.nl</email>
        </address>
      </contact>
      <contact initials="S." surname="Fries" fullname="Steffen Fries">
        <organization>Siemens AG</organization>
        <address>
          <email>steffen.fries@siemens.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
