<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-anima-jws-voucher-15" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.25.0 -->
  <front>
    <title abbrev="JWS-voucher">JWS signed Voucher Artifacts for Bootstrapping Protocols</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-anima-jws-voucher-15"/>
    <author initials="T." surname="Werner" fullname="Thomas Werner">
      <organization>Siemens AG</organization>
      <address>
        <email>thomas-werner@siemens.com</email>
      </address>
    </author>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <date year="2025" month="January" day="14"/>
    <area>Internet</area>
    <workgroup>anima Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 67?>

<t>This document introduces a variant of the RFC8366 voucher artifact in which CMS is replaced by the JSON Object Signing and Encryption (JOSE) mechanism described in RFC7515. This supports deployments in which JOSE is preferred over CMS.
In addition to specifying the format, the "application/voucher-jws+json" media type is registered and examples are provided.</t>
    </abstract>
  </front>
  <middle>
    <?line 72?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document provides cryptographic signing of voucher data in form of JSON Web Signature (JWS) <xref target="RFC7515"/> and the media type <tt>application/voucher-jws+json</tt> to identify the voucher format.
The encoding specified in this document is used by <xref target="I-D.ietf-anima-brski-prm"/>
and may be more handy for use cases already using Javascript Object Signing and Encryption (JOSE).</t>
      <t>This is an extension to "A Voucher Artifact for Bootstrapping Protocols" <xref target="I-D.ietf-anima-rfc8366bis"/> in which the YANG data model is
used by "Bootstrapping Remote Secure Key Infrastructure (BRSKI)" <xref target="RFC8995"/> and "Secure Zero Touch Provisioning (SZTP)" <xref target="RFC8572"/>
to transfer ownership of a device from a manufacturer to a new owner (customer or operational domain).
That document provides a serialization of the voucher data to JSON <xref target="RFC8259"/> with cryptographic signing according to the Cryptographic Message Syntax (CMS) <xref target="RFC5652"/>.</t>
      <t>This document is similar to <xref target="I-D.ietf-anima-constrained-voucher"/>, which provides cryptographic signing according COSE <xref target="RFC8812"/>.
These documents do not change nor extend the YANG definitions of <xref target="I-D.ietf-anima-rfc8366bis"/>.</t>
      <t>With the availability of different voucher formats, it is up to an industry-specific application statement to decide which format is to be used.
The associated media types are used to distinguish different voucher formats.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
      </t>
      <t>This document uses the following terms:</t>
      <dl>
        <dt>JSON Voucher Data:</dt>
        <dd>
          <t>An unsigned JSON representation of the voucher data.</t>
        </dd>
        <dt>JWS Voucher:</dt>
        <dd>
          <t>A JWS structure signing the JSON Voucher Data.</t>
        </dd>
        <dt>Voucher:</dt>
        <dd>
          <t>A short form for voucher artifact and refers to the signed statement from a Manufacturer Authorized Signing Authority (MASA) service that indicates to a Pledge the cryptographic identity of the domain it should trust, per <xref target="I-D.ietf-anima-rfc8366bis"/>.</t>
        </dd>
        <dt>Voucher Data:</dt>
        <dd>
          <t>The raw (serialized) representation of the <tt>ietf-voucher</tt> YANG module without any enclosing signature, per <xref target="I-D.ietf-anima-rfc8366bis"/>.</t>
        </dd>
        <dt>MASA (Manufacturer Authorized Signing Authority):</dt>
        <dd>
          <t>The entity that, for the purpose of this document, issues and signs the vouchers for the manufacturer's pledges. In some onboarding protocols, the MASA may have an Internet presence and be integral to the onboarding process, whereas in other protocols the MASA may be an offline service that has no active role in the onboarding process, per <xref target="I-D.ietf-anima-rfc8366bis"/>.</t>
        </dd>
        <dt>Pledge:</dt>
        <dd>
          <t>The prospective component attempting to find and securely join a domain. When shipped or in factory reset mode, it only trusts authorized representatives of the manufacturer, per <xref target="I-D.ietf-anima-rfc8366bis"/>.</t>
        </dd>
        <dt>Registrar:</dt>
        <dd>
          <t>A representative of the domain that is configured, perhaps autonomically, to decide whether a new device is allowed to join the domain, per <xref target="I-D.ietf-anima-rfc8366bis"/>.</t>
        </dd>
      </dl>
      <t>This document uses the following encoding notations:</t>
      <dl>
        <dt>BASE64URL(OCTETS):</dt>
        <dd>
          <t>Denotes the base64url encoding of OCTETS, per <xref section="2" sectionFormat="of" target="RFC7515"/>.</t>
        </dd>
        <dt>UTF8(STRING):</dt>
        <dd>
          <t>Denotes the octets of the UTF-8 <xref target="RFC3629"/> representation of STRING, per <xref section="1" sectionFormat="of" target="RFC7515"/>.</t>
        </dd>
      </dl>
    </section>
    <section anchor="voucher-artifact-with-json-web-signature">
      <name>Voucher Artifact with JSON Web Signature</name>
      <t>JWS voucher artifacts MUST use the "General JWS JSON Serialization Syntax" defined in <xref section="7.2.1" sectionFormat="of" target="RFC7515"/>.
This syntax supports multiple signatures as already supported by <xref target="RFC8366"/> for CMS-signed vouchers.
The following figure summarizes the serialization of JWS voucher artifacts:</t>
      <figure anchor="VoucherGeneralJWSFigure">
        <name>Voucher Representation in General JWS JSON Serialization Syntax (JWS Voucher)</name>
        <artwork align="left"><![CDATA[
    {
      "payload": BASE64URL(UTF8(JSON Voucher Data)),
      "signatures": [
        {
          "protected": BASE64URL(UTF8(JWS Protected Header)),
          "signature": BASE64URL(JWS Signature)
        }
      ]
    }
]]></artwork>
      </figure>
      <t>The JSON Voucher Data MUST be UTF-8 encoded to become the octet-based JWS Payload defined in <xref target="RFC7515"/>.
The JWS Payload is further base64url-encoded to become the string value of the <tt>payload</tt> member as described in <xref section="3.2" sectionFormat="of" target="RFC7515"/>.
The octets of the UTF-8 representation of the JWS Protected Header are base64url-encoded to become the string value of the <tt>protected</tt> member.
The generated JWS Signature is base64url-encoded to become the string value of the <tt>signature</tt> member.</t>
      <section anchor="json-voucher-data">
        <name>JSON Voucher Data</name>
        <t>The JSON Voucher Data is an unsigned JSON document <xref target="RFC8259"/> that conforms with the data model described by the ietf-voucher YANG module <xref target="RFC7950"/> defined in <xref section="7.3" sectionFormat="of" target="I-D.ietf-anima-rfc8366bis"/> and is encoded using the rules defined in <xref target="RFC7951"/>.
The following figure provides an example of JSON Voucher Data:</t>
        <figure anchor="VoucherGeneralJWSVoucherPayloadFigure">
          <name>JSON Voucher Data Example</name>
          <artwork align="left"><![CDATA[
    {
      "ietf-voucher:voucher": {
        "assertion": "logged",
        "serial-number": "0123456789",
        "nonce": "5742698422680472",
        "created-on": "2022-07-08T03:01:24.618Z",
        "pinned-domain-cert": "base64encodedvalue=="
      }
    }
]]></artwork>
        </figure>
      </section>
      <section anchor="jws-protected-header">
        <name>JWS Protected Header</name>
        <t>The JWS Protected Header defined in <xref target="RFC7515"/> uses the standard header parameters <tt>alg</tt>, <tt>typ</tt>, and <tt>x5c</tt>:</t>
        <ul spacing="normal">
          <li>
            <t>The <tt>alg</tt> parameter MUST contain the algorithm type (e.g., <tt>ES256</tt>) used to create the signature as defined in <xref section="4.1.1" sectionFormat="of" target="RFC7515"/>.</t>
          </li>
          <li>
            <t>The <tt>typ</tt> parameter is optional and used when more than one kind of object could be present in an application data structure as described in <xref section="4.1.9" sectionFormat="of" target="RFC7515"/>. If present, the <tt>typ</tt> parameter MUST contain the value <tt>voucher-jws+json</tt>.</t>
          </li>
          <li>
            <t>If X.509 (PKIX) certificates <xref target="RFC5280"/> are used, the <tt>x5c</tt> parameter MUST contain the base64-encoded (not base64url-encoded) X.509 v3 (DER) certificate as defined in <xref section="4.1.6" sectionFormat="of" target="RFC7515"/> and MUST also contain the certificate chain.</t>
          </li>
        </ul>
        <dl>
          <dt>Implementation Note:</dt>
          <dd>
            <t>base64-encoded values, in contrast to base64url-encoded values, may contain slashes (<tt>/</tt>).
JSON <xref target="RFC8259"/> optionally allows escaping these with backslashes (<tt>\\</tt>).
Hence, depending on the JSON parser/serializer implementation used, they may or may not be included.
JWS Voucher parsers MUST be prepared accordingly to extract certificates correctly.</t>
          </dd>
        </dl>
        <t>To validate voucher signatures, all certificates of the certificate chain are required up to the trust anchor.
Note, to establish trust the trust anchor MUST be provided out-of-band up front.</t>
        <t>The following figure gives an example of a JWS Protected Header:</t>
        <figure anchor="VoucherGeneralJWSProtectedHeaderFigure">
          <name>JWS Protected Header Example</name>
          <artwork align="left"><![CDATA[
    {
      "alg": "ES256",
      "typ": "voucher-jws+json",
      "x5c": [
        "base64encodedvalue1==",
        "base64encodedvalue2=="
      ]
    }
]]></artwork>
        </figure>
      </section>
      <section anchor="jws-signature">
        <name>JWS Signature</name>
        <t>The JWS Signature is generated over the JWS Protected Header and the JWS Payload (= UTF-8 encoded JSON Voucher Data) as described in <xref section="5.1" sectionFormat="of" target="RFC7515"/>.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>The Pledge-Voucher-Request (PVR) reveals the IDevID of the component (Pledge) that is in the process of bootstrapping.</t>
      <t>A PVR is transported via HTTP-over-TLS.
However, for the Pledge-to-Registrar TLS connection a Pledge provisionally accepts the Registrar server certificate during the TLS server authentication.
Hence, it is subject to disclosure by a Dolev-Yao attacker (a "malicious messenger") <xref target="ON-PATH"/>, as explained in <xref section="10.2" sectionFormat="of" target="RFC8995"/>.</t>
      <t>The use of a JWS header, with mentioned standard header parameters alg, typ, and x5c, brings no new privacy considerations next to <xref section="10.2" sectionFormat="of" target="RFC8995"/>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The issues of how <xref target="I-D.ietf-anima-rfc8366bis"/> vouchers are used in a BRSKI system is addressed in <xref section="11" sectionFormat="of" target="RFC8995"/>.
This document does not change any of those issues, it just changes the signature technology used for voucher request and response artifacts.</t>
      <t><xref section="9" sectionFormat="of" target="RFC8572"/> deals with voucher use in Secure Zero Touch Provisioning (SZTP), for which this document also makes no changes to security.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="media-type-registry">
        <name>Media-Type Registry</name>
        <t>This section registers <tt>application/voucher-jws+json</tt> in the "Media Types" registry.</t>
        <section anchor="applicationvoucher-jwsjson">
          <name>application/voucher-jws+json</name>
          <artwork><![CDATA[
Type name:  application
Subtype name:  voucher-jws+json
Required parameters:  N/A
Optional parameters:  N/A
Encoding considerations:  JWS+JSON vouchers are JOSE objects
                          signed with one or multiple signers.
Security considerations:  See section [Security Considerations]
Interoperability considerations:  The format is designed to be
  broadly interoperable.
Published specification:  THIS RFC
Applications that use this media type:  ANIMA, 6tisch, and other
  zero-touch bootstrapping/provisioning solutions
Additional information:
  Magic number(s):  N/A
  File extension(s):  .vjj
  Macintosh file type code(s):  N/A
Person & email address to contact for further information:  IETF
  ANIMA WG
Intended usage:  LIMITED
Restrictions on usage:  N/A
Author:  ANIMA WG
Change controller:  IETF
Provisional registration? (standards tree only):  NO
]]></artwork>
        </section>
      </section>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank the various reviewers for their input,
in particular Steffen Fries, Ingo Wenda, Esko Dijk and Toerless Eckert.
Thanks for the supporting PoC implementations to Hong Rui Li and He Peng Jia.</t>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <t>These examples are folded according to the <xref target="RFC8792"/> Single Backslash rule.</t>
      <section anchor="example-pledge-voucher-request-pvr">
        <name>Example Pledge-Voucher-Request (PVR)</name>
        <t>The following is an example of a Pledge-Voucher-Request (PVR) as JWS Voucher artifact, which would be sent from a Pledge to the Registrar:</t>
        <figure anchor="ExamplePledgeVoucherRequestfigure">
          <name>Example Pledge-Voucher-Request (PVR)</name>
          <artwork align="left"><![CDATA[
{
  "payload": "eyJpZXRmLXZvdWNoZXItcmVxdWVzdDp2b3VjaGVyIjp7InNlcmlhbC\
1udW1iZXIiOiJraXQtOTg3NjU0MzIxIiwibm9uY2UiOiJUYXV2SytZL2NjMlJmSUZ2cF\
p6ZktRPT0iLCJjcmVhdGVkLW9uIjoiMjAyNC0xMS0yOVQwOTozNDoxNi40MjZaIiwicH\
JveGltaXR5LXJlZ2lzdHJhci1jZXJ0IjoiTUlJQ0RUQ0NBYk9nQXdJQkFnSUdBWk4zTk\
RtUE1Bb0dDQ3FHU000OUJBTUNNRnd4Q3pBSkJnTlZCQVlUQWtGUk1SSXdFQVlEVlFRS0\
RBbE5lVU52YlhCaGJua3hGVEFUQmdOVkJBc01ERTE1VTNWaWMybGthV0Z5ZVRFUE1BME\
dBMVVFQnd3R1RYbFRhWFJsTVJFd0R3WURWUVFEREFoTmVWTnBkR1ZEUVRBZUZ3MHlORE\
V4TWprd09URTFNekZhRncwek5ERXhNamt3T1RFMU16RmFNR0l4Q3pBSkJnTlZCQVlUQW\
tGUk1SSXdFQVlEVlFRS0RBbE5lVU52YlhCaGJua3hGREFTQmdOVkJBc01DMDE1VTNWaW\
MybGtZWEo1TVE4d0RRWURWUVFIREFaTmVWTnBkR1V4R0RBV0JnTlZCQU1NRDAxNVUybD\
BaVkpsWjJsemRISmhjakJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUFCQU\
grTFptbnRncGgralUvc2NUQnhkVHpzd2xmUTZ1Sy9BOWFJYkpaS2U0UGl0VnhraE5HWW\
d0Nm9wMytDaVFLTHdaOWdEMHFXMjIxQUxZNSs3bVFKNnlqV3pCWk1CMEdBMVVkSlFRV0\
1CUUdDQ3NHQVFVRkJ3TUJCZ2dyQmdFRkJRY0RIREFPQmdOVkhROEJBZjhFQkFNQ0I0QX\
dLQVlEVlIwUkJDRXdINElkYlhsemFYUmxjbVZuYVhOMGNtRnlMbTE1WTI5dGNHRnVlUz\
VqYjIwd0NnWUlLb1pJemowRUF3SURTQUF3UlFJZ0Q3a0J4MU82TzJGVFBPUlgwNDdTcF\
N2cGF6dC8rR3YyOXM4N3lyTXU2UE1DSVFEeU90cGJ2bEwvd1c4Zy9ESUx2T0RZZ01PT1\
VrVDE1ZHZZTUVOR1QyQ3V5Zz09In19",
  "signatures": [
    {
      "protected": "eyJ4NWMiOlsiTUlJQ056Q0NBZDJnQXdJQkFnSUdBWk4zTkRt\
S01Bb0dDQ3FHU000OUJBTUNNRmd4Q3pBSkJnTlZCQVlUQWtGUk1Sc3dHUVlEVlFRS0RC\
Sk5ZVzUxWm1GamRIVnlaWEl3TURFZ1FVY3hFekFSQmdOVkJBc01Dazl5WjFnZ1ZXNXBk\
RUV4RnpBVkJnTlZCQU1NRGsxaGJuVm1ZV04wZFhKbGNrTkJNQ0FYRFRJME1URXlPVEE1\
TVRVek1Wb1lEems1T1RreE1qTXhNak0xT1RVNVdqQnZNUXN3Q1FZRFZRUUdFd0pCVVRF\
Yk1Ca0dBMVVFQ2d3U1RXRnVkV1poWTNSMWNtVnlNREF4SUVGSE1STXdFUVlEVlFRTERB\
cFBjbWRZSUZWdWFYUkJNUll3RkFZRFZRUUZFdzFyYVhRdE9UZzNOalUwTXpJeE1SWXdG\
QVlEVlFRRERBMUJRa016TGtVM05TMHhNREJCTUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJ\
emowREFRY0RRZ0FFZ05rMXc2ZlBFRFlyekRJam5ybUV4RjU0WGsrK1psZjJITTRrQ29P\
bkt2VHJPMFY4YUJoMW11enlRVlUwano2VTd6OTFBSjlvNlNSQmxibTJmQlRPYTZONk1I\
Z3dNQVlJS3dZQkJRVUhBU0FFSkJZaWJXRnpZUzEwWlhOMExuaDVlbTFoYm5WbVlXTjBk\
WEpsY2k1amIyMDZPVFEwTXpBZkJnTlZIU01FR0RBV2dCU1ZUdFYrM1FxK2lrdlBLTVpv\
MEhaOXhESUg5VEFUQmdOVkhTVUVEREFLQmdnckJnRUZCUWNEQWpBT0JnTlZIUThCQWY4\
RUJBTUNCNEF3Q2dZSUtvWkl6ajBFQXdJRFNBQXdSUUlnVTJUNkpTOHVqUTAzK1QvdDE2\
dVNoZ2lsOE0vbWFHVnhuSzRxek9OUFVKRUNJUURHTVRxcmkyVzBMSUltajZCS1d0QU95\
WDJmRWdvaFI4RFVyTDNCMjFvRGlnPT0iXSwidHlwIjoidm91Y2hlci1qd3MranNvbiIs\
ImFsZyI6IkVTMjU2In0",
      "signature": "ehYSVTUFgJ890sF5F8ky5nfOXsG9JMfBVBv9POlwHVZGQnFQ\
hP3F0BQj6bj4mGICcfk5FGPD8rJKs7txuBfKgA"
    }
  ]
}
]]></artwork>
        </figure>
        <t>The following private key (of the IDevID) is used to sign a Pledge-Voucher-Request (PVR) by Pledge:</t>
        <artwork><![CDATA[
-----BEGIN PRIVATE KEY-----
MEECAQAwEwYHKoZIzj0CAQYIKoZIzj0DAQcEJzAlAgEBBCA4b574lJvkZZt+ij+D
ughPm8xFg95HMW3BHKCbQEaxUw==
-----END PRIVATE KEY-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
]]></artwork>
      </section>
      <section anchor="example-registrar-voucher-request-rvr">
        <name>Example Registrar-Voucher-Request (RVR)</name>
        <t>The following is an example Registrar-Voucher-Request (RVR) as JWS Voucher artifact, which would be sent from the Registrar to the MASA.
Note, the previous PVR can be seen in the payload in the field <tt>prior-signed-voucher-request</tt>.</t>
        <figure anchor="ExampleRegistrarVoucherRequestfigure">
          <name>Example Registrar-Voucher-Request (RVR)</name>
          <artwork align="left"><![CDATA[
{
  "payload": "eyJpZXRmLXZvdWNoZXItcmVxdWVzdDp2b3VjaGVyIjp7InNlcmlhbC\
1udW1iZXIiOiJraXQtOTg3NjU0MzIxIiwiaWRldmlkLWlzc3VlciI6IkJCZ3dGb0FVbF\
U3VmZ0MEt2b3BMenlqR2FOQjJmY1F5Qi9VPSIsIm5vbmNlIjoiVGF1dksrWS9jYzJSZk\
lGdnBaemZLUT09IiwicHJpb3Itc2lnbmVkLXZvdWNoZXItcmVxdWVzdCI6ImV5SndZWG\
xzYjJGa0lqb2laWGxLY0ZwWVVtMU1XRnAyWkZkT2IxcFlTWFJqYlZaNFpGZFdlbVJFY0\
RKaU0xWnFZVWRXZVVscWNEZEpiazVzWTIxc2FHSkRNWFZrVnpGcFdsaEphVTlwU25KaF\
dGRjBUMVJuTTA1cVZUQk5la2w0U1dsM2FXSnRPWFZaTWxWcFQybEtWVmxZVmpKVGVYUm\
FUREpPYWsxc1NtMVRWVm95WTBad05scHJkRkpRVkRCcFRFTkthbU50Vm1oa1IxWnJURm\
M1ZFVscWIybE5ha0Y1VGtNd2VFMVRNSGxQVmxGM1QxUnZlazVFYjNoT2FUUXdUV3BhWV\
VscGQybGpTRXAyWlVkc2RHRllValZNV0Vwc1dqSnNlbVJJU21oamFURnFXbGhLTUVscW\
IybFVWV3hLVVRCU1ZWRXdUa0paYXpsdVVWaGtTbEZyUm01VFZXUkNWMnMwZWxSclVuUl\
ZSVEZDWWpCa1JGRXpSa2hWTURBd1QxVktRbFJWVGs1U2JtUTBVVE53UWxOclNtNVViRn\
BEVVZac1ZWRlhkRWRWYXpGVFUxaGtSbEZXYkVWV2JFWlNVekJTUW1KRk5XeFdWVFV5V1\
d4b1EyRkhTblZoTTJoSFZrVkdWVkZ0WkU5V2EwcENZekF4UlZKVVJURldWRTVYWVZkTm\
VXSkhkR2hXTUZvMVdsWlNSbFZGTVVKTlJXUkNUVlpXUmxGdVpETlNNVkpaWWtaU2FGZE\
dTbk5VVmtwR1pEQlNNMWRWVWxkVlZrWkZVa1ZHYjFSdFZsZFVia0pyVWpGYVJWVldVa0\
phVlZvelRVaHNUMUpGVmpSVVYzQnlaREE1VlZKVVJrNWxhMXBvVW01amQyVnJOVVZTV0\
doT1lXMTBNMVF4VWtaTlZURTJVbTFHVGxJd2JEUlJNM0JDVTJ0S2JsUnNXa05SVm14Vl\
VWZDBSMVZyTVZOVFdHUkdVVlpzUlZac1JsSlRNRkpDWWtVMWJGWlZOVEpaYkdoRFlVZE\
tkV0V6YUVkU1JVWlVVVzFrVDFaclNrSmpNREZFVFVSRk1WWlVUbGRoVjAxNVlrZDBXbG\
RGYnpGVVZrVTBaREJTVWxkVlVsZFZWa1pKVWtWR1lWUnRWbGRVYmtKclVqRldORkl3VW\
tKV01FcHVWR3hhUTFGVk1VNVNSRUY0VGxaVmVXSkVRbUZXYTNCelYycEtjMlZ0VWtsVG\
JXaHFZV3RLWVZSVlNrNVNNRW8xWTFWa1ZGUlVVVFZSVjJSR1VqQk9SR05WWkZSVVZGRT\
FVVmhrUmxORlJYZFRWVVpEVVZWbmNsUkdjSFJpYmxKdVkwZG5jbUZzVlhaak1rNVZVVz\
VvYTFaSWNIcGtNbmh0VlZSYU1WTjVPVUpQVjBaS1dXdHdZVk15VlRCVlIyd3dWbTVvY2\
1GRk5VaFhWMlF3VG0wNWQwMTVkRVJoVmtaTVZFaGtZVTlYWkVWTlNFWllUV3BKZUZGVm\
VGcE9VM016WWxaR1MwNXViSEZXTTNCRFYyc3hRMDFGWkVKTlZsWnJVMnhHVWxZd01VTl\
ZWV1JFVVROT1NGRldSbFpTYTBvelZGVktRMW95WkhsUmJXUkdVbXRLVWxrd1VrbFNSVV\
pRVVcxa1QxWnJhRkpQUlVwQ1dtcG9SbEZyUms1Uk1Fa3dVVmhrVEZGV2JFVldiRWwzVl\
d0S1JGSllaRWxPUld4cldXeG9jMlZ0UmxsVmJYaHFZbFphZFZsV2FFOU5SMDUwVW01c1\
RXSlVSVEZYVkVrMVpFZE9TRkp1Vm14VmVsWnhXV3BKZDJRd1RtNVhWV3hNWWpGd1NtVn\
RiM2RTVlVZelUxVlNWRkZWUmpOVmJFWktXakJSTTJFd1NqUk5WVGd5VkhwS1IxWkdRbE\
JWYkdkM1RrUmtWR05HVGpKalIwWTJaRU00Y2xJeldYbFBXRTAwVGpOc2VWUllWVEpWUl\
RGRVUxWkdSV1ZWT1RCalIwb3lZa1YzZG1ReFl6UmFlVGxGVTFWNE1sUXdVbHBhTURGUV\
ZERldjbFpFUlRGYVNGcGFWRlZXVDFJeFVYbFJNMVkxV25vd09VbHVNVGtpTENKemFXZH\
VZWFIxY21WeklqcGJleUp3Y205MFpXTjBaV1FpT2lKbGVVbzBUbGROYVU5c2MybFVWV3\
hLVVRBMU5sRXdUa0phUkVwdVVWaGtTbEZyUm01VFZXUkNWMnMwZWxSclVuUlRNREZDWW\
pCa1JGRXpSa2hWTURBd1QxVktRbFJWVGs1U2JXUTBVVE53UWxOclNtNVViRnBEVVZac1\
ZWRlhkRWRWYXpGVFl6TmtTRlZXYkVWV2JFWlNVekJTUTFOck5WcFdlbFY0VjIweFIyRn\
RVa2xXYm14aFYwVnNNMVJWVWtaYU1VWldXVE5vUm1WclJsTlJiV1JQVm10S1FtTXdNVV\
JoZW13MVYycEdibG94V2xoT1dFSnJVbFZXTkZKdWNFSldhMHB1Vkd4YVExRlZNVTVTUj\
NONFlVZEtkVlp0TVZwV01EUjNXa1pvUzJKSFRuSlVhMHBPVVRCR1dWSkdVa3BOUlRGVl\
VsaHNVRlpGUlRGVVZsSldaV3N4VjJJeGJFVmxiWE14VkRGU2NtVkZNWEZVV0doT1lXc3\
dlRlF4VWxaT1ZtUnhVVzVhVGxWWVRqTlJNVVphVWtaYVVsVlZaRVprTUhCRFZsWlNSbG\
xyTVVOaE1HUkNUVlpXUmxFeVpETlZNVkpZVW01V2ExWXhjRzlYVkU1VFRWZE9kRlp1Yk\
U1U1JVWTBVMVZXUjFORk1WTlVXR1JHVlZac1JWWnNSbEpVUlZKQ1kwWkNhbUpYVWxwVF\
ZWcFhaRmRHV1ZWclNrNVZiR3d6VW10R1dsSkdXbEpWVlZwR1pIcEdlVmxXYUZKa1JUbF\
ZXbnBPVDJGc1ZYZFVXSEJLWlVVeFUxZFlaRWRSVm14RlZteEdVbEpGVWtKTlZVcFNZVE\
F4TmxSSGRGWk5NRFZVVFVob1RsSkZTa05VVlZweVpEQldNMWRWYUV4aU1YQktaVzF2ZD\
FFd1JsSlhWV3hNWWpGd1NtVnRiM2RTUlVaU1dUQlNVbG93UmtaYU1EVnlUVmhqTWxwc1\
FrWlNSbXg1Wld0U1NtRnROWGxpVlZZMFVtcFZNRmRIYzNKTE1YQnpXbXBLU1ZSVVVuSl\
JNamxRWW10ME1sWklTbEJOUmxrMFdWVktiMDFYTVRGbGJteFNWbXhWZDJGdWJ6SldWR1\
EyVDFSR1FsTnFiSFpPYkU1VFVXMTRhV0pVU20xUmJGSlFXVlJhVDA1ck1VbGFNMlJPVV\
Zac1NsTXpaRnBSYTBwU1ZsVm9RbFV3UmtaVGEwcGFZVmRLV0ZKdWNGcFZla1YzVjJ4b1\
QwMUZlSFZoUkZac1lsUkdiMWx0TlZkaVZteFlWR3BDYTFkRmNITlpNbXN4WVcxSmVVMU\
VXbEJXUmtWM1ZGaHdRbHByU201VWJGcEpWVEF4UmxJd1VrSldNbVJEVlRGYVZXUkdXWE\
pOTVVaNFN6SnNjbVJzUWt4VVZuQjJUVVZvWVU5WWFFVlRWV2MxVmtWR1ZWRnRaRTlXYT\
JoVVZsVldSVkpGUmt4UmJXUnVZMnRLYmxKVldrTlZWMDVGVVZkd1FsUXdTbTVVYkZwSl\
ZWUm9RMUZYV1RSU1ZVcENWRlZPUTA1RlJqTlJNbVJhVTFWMGRsZHJiRFpoYWtKR1VWaG\
tTbEpHVGtKUldHUlRWVlZzYmxaVVNsVk9hM0JVVDBoV2NWVlVRWHBMTVZGMlpFUkZNbV\
JXVG05YU1teHpUMFV3ZG1KWFJraFdibWgxVTNwU2VHVnJPVTlWUmxaTFVsVk9TbFZWVW\
toVVZsSjRZMjFyZVZaNlFrMVRWV3gwWVdwYVExTXhaREJSVlRrMVYwUktiVkpYWkhaaF\
JrazBVa1pXZVZSRVRrTk5ha1oyVWtkc2JsQlVNR2xZVTNkcFpFaHNkMGxxYjJsa2JUa3\
hXVEpvYkdOcE1YRmtNMDF5WVc1T2RtSnBTWE5KYlVaeldubEpOa2xyVmxSTmFsVXlTVz\
R3SWl3aWMybG5ibUYwZFhKbElqb2laV2haVTFaVVZVWm5Tamc1TUhOR05VWTRhM2sxYm\
1aUFdITkhPVXBOWmtKV1FuWTVVRTlzZDBoV1drZFJia1pSYUZBelJqQkNVV28yWW1vMG\
JVZEpRMk5tYXpWR1IxQkVPSEpLUzNNM2RIaDFRbVpMWjBFaWZWMTkiLCJjcmVhdGVkLW\
9uIjoiMjAyNC0xMS0yOVQwOTozNDoxNi41ODBaIn19",
  "signatures": [
    {
      "protected": "eyJ4NWMiOlsiTUlJQjhEQ0NBWmFnQXdJQkFnSUdBWk4zTkRt\
Uk1Bb0dDQ3FHU000OUJBTUNNRnd4Q3pBSkJnTlZCQVlUQWtGUk1SSXdFQVlEVlFRS0RB\
bE5lVU52YlhCaGJua3hGVEFUQmdOVkJBc01ERTE1VTNWaWMybGthV0Z5ZVRFUE1BMEdB\
MVVFQnd3R1RYbFRhWFJsTVJFd0R3WURWUVFEREFoTmVWTnBkR1ZEUVRBZUZ3MHlOREV4\
TWprd09URTFNekZhRncwek5ERXhNamt3T1RFMU16RmFNSGt4Q3pBSkJnTlZCQVlUQWtG\
Uk1SSXdFQVlEVlFRS0RBbE5lVU52YlhCaGJua3hGVEFUQmdOVkJBc01ERTE1VTNWaWMy\
bGthV0Z5ZVRFUE1BMEdBMVVFQnd3R1RYbFRhWFJsTVM0d0xBWURWUVFERENWU1pXZHBj\
M1J5WVhJZ1ZtOTFZMmhsY2lCU1pYRjFaWE4wSUZOcFoyNXBibWNnUzJWNU1Ga3dFd1lI\
S29aSXpqMENBUVlJS29aSXpqMERBUWNEUWdBRXh3ejJJQzdNaW16VGhpS1huczMzTkhT\
SitIdzl2ZHRFb1Y4b2lwQWlPazJtclpWK2dGZVBNNmdadWczby84ak9VZ0NGeGRxb0l2\
U1Y3dkxEU2lic2lxTW5NQ1V3RXdZRFZSMGxCQXd3Q2dZSUt3WUJCUVVIQXh3d0RnWURW\
UjBQQVFIL0JBUURBZ2VBTUFvR0NDcUdTTTQ5QkFNQ0EwZ0FNRVVDSVFENDhKeDh2TlJw\
VE9LREtjWmtjR0xTb2V6REFuTktndDNkU25DNFFkTGpBUUlnZmFxYkFvREtTZnpWcS9p\
cy9Cc2duaUpwQ2VUcU1FTUV0SUIwOGJsRDA5az0iXSwidHlwIjoidm91Y2hlci1qd3Mr\
anNvbiIsImFsZyI6IkVTMjU2In0",
      "signature": "4K-jQbrBtzj_YE9zgJoMZYC1QPgEEU3gTKiaLh5TdO5dcgB1\
z_zguJPSvR_QdpIbZmjkEyIyL9GJDZ2jACLKVg"
    }
  ]
}
]]></artwork>
        </figure>
        <t>The following private key is used to sign a Registrar-Voucher-Request (RVR) by Registrar:</t>
        <artwork><![CDATA[
-----BEGIN PRIVATE KEY-----
MEECAQAwEwYHKoZIzj0CAQYIKoZIzj0DAQcEJzAlAgEBBCDU/WkJnGR67oUgP8L1
bmvYpUPt4i6Rc/OUSg0C8SiWdg==
-----END PRIVATE KEY-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
]]></artwork>
      </section>
      <section anchor="example-voucher-response">
        <name>Example Voucher Response</name>
        <t>The following is an example voucher response as JWS Voucher artifact, which would be sent from the MASA to the Pledge via Registrar.</t>
        <figure anchor="ExampleVoucherResponsefigure">
          <name>Example Voucher Response</name>
          <artwork align="left"><![CDATA[
{
  "payload": "eyJpZXRmLXZvdWNoZXI6dm91Y2hlciI6eyJhc3NlcnRpb24iOiJsb2\
dnZWQiLCJzZXJpYWwtbnVtYmVyIjoia2l0LTk4NzY1NDMyMSIsIm5vbmNlIjoiVGF1dk\
srWS9jYzJSZklGdnBaemZLUT09IiwiY3JlYXRlZC1vbiI6IjIwMjQtMTEtMjlUMDk6Mz\
Q6MTcuMDI5WiIsInBpbm5lZC1kb21haW4tY2VydCI6Ik1JSUI4VENDQVplZ0F3SUJBZ0\
lHQVpOM05EbU5NQW9HQ0NxR1NNNDlCQU1DTUZ3eEN6QUpCZ05WQkFZVEFrRlJNUkl3RU\
FZRFZRUUtEQWxOZVVOdmJYQmhibmt4RlRBVEJnTlZCQXNNREUxNVUzVmljMmxrYVdGeW\
VURVBNQTBHQTFVRUJ3d0dUWGxUYVhSbE1SRXdEd1lEVlFRRERBaE5lVk5wZEdWRFFUQW\
VGdzB5TkRFeE1qa3dPVEUxTXpGYUZ3MHpOREV4TWprd09URTFNekZhTUZ3eEN6QUpCZ0\
5WQkFZVEFrRlJNUkl3RUFZRFZRUUtEQWxOZVVOdmJYQmhibmt4RlRBVEJnTlZCQXNNRE\
UxNVUzVmljMmxrYVdGeWVURVBNQTBHQTFVRUJ3d0dUWGxUYVhSbE1SRXdEd1lEVlFRRE\
RBaE5lVk5wZEdWRFFUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDlBd0VIQTBJQUJIOG\
hqUElSdTZjcVBDWmJ3ZDhBQ2NySFZQMHY0Wi9EUjNsbXpISmlZbWtwZjMrckllS2tPRm\
5GSEQ3S3l3cDMxUVFOejV5OFM3UU00K21wcnNaTWZJS2pSVEJETUJJR0ExVWRFd0VCL3\
dRSU1BWUJBZjhDQVFFd0RnWURWUjBQQVFIL0JBUURBZ0lFTUIwR0ExVWREZ1FXQkJScX\
ljMVJTNGQ2ekVnRG1sRFpOWW80aEVzTFZ6QUtCZ2dxaGtqT1BRUURBZ05JQURCRkFpRU\
FnSWUxRXNzc1ZKd0ZyZnpEMVdtK2FCN2trT3IxbGRlOU03RjB6dTNGNitrQ0lDYXRIV0\
VwamkvMFZkYy9sRFkwUk5zeWxacEpCTDN6Vytpa09DdnZhSkV1In19",
  "signatures": [
    {
      "protected": "eyJ4NWMiOlsiTUlJQnh6Q0NBVzZnQXdJQkFnSUdBWk4zTkRs\
L01Bb0dDQ3FHU000OUJBTUNNRmd4Q3pBSkJnTlZCQVlUQWtGUk1Sc3dHUVlEVlFRS0RC\
Sk5ZVzUxWm1GamRIVnlaWEl3TURFZ1FVY3hFekFSQmdOVkJBc01Dazl5WjFnZ1ZXNXBk\
RUV4RnpBVkJnTlZCQU1NRGsxaGJuVm1ZV04wZFhKbGNrTkJNQjRYRFRJME1URXlPVEE1\
TVRVek1Wb1hEVE0wTVRFeU9UQTVNVFV6TVZvd2FqRUxNQWtHQTFVRUJoTUNRVkV4R3pB\
WkJnTlZCQW9NRWsxaGJuVm1ZV04wZFhKbGNqQXdNU0JCUnpFVE1CRUdBMVVFQ3d3S1Qz\
Sm5XQ0JWYm1sMFFURXBNQ2NHQTFVRUF3d2dUV0Z1ZFdaaFkzUjFjbVZ5SUZadmRXTm9a\
WElnVTJsbmJtbHVaeUJMWlhrd1dUQVRCZ2NxaGtqT1BRSUJCZ2dxaGtqT1BRTUJCd05D\
QUFSR0NJM0gwL0xrWnNZNDV1OEZTZ1RLNlpLMUk3d2s1eWZEWk12elo2L3Y5NGJoNFB0\
UG9SU3cwSjBvemhiL2hrRkVGeE5mbkt6WUtvT3dDdU9nUENNUm94SXdFREFPQmdOVkhR\
OEJBZjhFQkFNQ0I0QXdDZ1lJS29aSXpqMEVBd0lEUndBd1JBSWdCcUF3WkYxRm9kRFBB\
Nzhjcnp2bWJqSHBMUlRUM0hGcWI5UHRXTzhwTjYwQ0lBV1l6aUpUQk9xNXcxNXl2Q05V\
S1pYSEVGMSt2TkUxcjMyTnpVWTBQSEY1Il0sInR5cCI6InZvdWNoZXItandzK2pzb24i\
LCJhbGciOiJFUzI1NiJ9",
      "signature": "TYwc3Nzi4l5A_326zr0IFvpqfzt7v7SqidFK_Go4wNFVCnXa\
t5GngoTboMGXOMelfbx0LqxStz5Tq-5nFSvD2w"
    }
  ]
}
]]></artwork>
        </figure>
        <t>The following private key is used to sign a Voucher by MASA:</t>
        <artwork><![CDATA[
-----BEGIN PRIVATE KEY-----
MEECAQAwEwYHKoZIzj0CAQYIKoZIzj0DAQcEJzAlAgEBBCAergZDU0lUzsqylxKs
I0KZZsqgcx+LKJglpD0agoiaWQ==
-----END PRIVATE KEY-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
]]></artwork>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8995">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="T. Eckert" initials="T." surname="Eckert"/>
            <author fullname="M. Behringer" initials="M." surname="Behringer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane. To do this, a Secure Key Infrastructure is bootstrapped. This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline. We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device. The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="I-D.ietf-anima-rfc8366bis">
          <front>
            <title>A Voucher Artifact for Bootstrapping Protocols</title>
            <author fullname="Kent Watsen" initials="K." surname="Watsen">
              <organization>Watsen Networks</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software</organization>
            </author>
            <author fullname="Max Pritikin" initials="M." surname="Pritikin">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Toerless Eckert" initials="T. T." surname="Eckert">
              <organization>Futurewei Technologies Inc.</organization>
            </author>
            <author fullname="Qiufang Ma" initials="Q." surname="Ma">
              <organization>Huawei</organization>
            </author>
            <date day="8" month="July" year="2024"/>
            <abstract>
              <t>   This document defines a strategy to securely assign a pledge to an
   owner using an artifact signed, directly or indirectly, by the
   pledge's manufacturer.  This artifact is known as a "voucher".

   This document defines an artifact format as a YANG-defined JSON or
   CBOR document that has been signed using a variety of cryptographic
   systems.

   The voucher artifact is normally generated by the pledge's
   manufacturer (i.e., the Manufacturer Authorized Signing Authority
   (MASA)).

   This document updates RFC8366, merging a number of extensions into
   the YANG.  The RFC8995 voucher request is also merged into this
   document.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-rfc8366bis-12"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8572">
          <front>
            <title>Secure Zero Touch Provisioning (SZTP)</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="I. Farrer" initials="I." surname="Farrer"/>
            <author fullname="M. Abrahamsson" initials="M." surname="Abrahamsson"/>
            <date month="April" year="2019"/>
            <abstract>
              <t>This document presents a technique to securely provision a networking device when it is booting in a factory-default state. Variations in the solution enable it to be used on both public and private networks. The provisioning steps are able to update the boot image, commit an initial configuration, and execute arbitrary scripts to address auxiliary needs. The updated device is subsequently able to establish secure connections with other systems. For instance, a device may establish NETCONF (RFC 6241) and/or RESTCONF (RFC 8040) connections with deployment-specific network management systems.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8572"/>
          <seriesInfo name="DOI" value="10.17487/RFC8572"/>
        </reference>
        <reference anchor="RFC3629">
          <front>
            <title>UTF-8, a transformation format of ISO 10646</title>
            <author fullname="F. Yergeau" initials="F." surname="Yergeau"/>
            <date month="November" year="2003"/>
            <abstract>
              <t>ISO/IEC 10646-1 defines a large character set called the Universal Character Set (UCS) which encompasses most of the world's writing systems. The originally proposed encodings of the UCS, however, were not compatible with many current applications and protocols, and this has led to the development of UTF-8, the object of this memo. UTF-8 has the characteristic of preserving the full US-ASCII range, providing compatibility with file systems, parsers and other software that rely on US-ASCII values but are transparent to other values. This memo obsoletes and replaces RFC 2279.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="63"/>
          <seriesInfo name="RFC" value="3629"/>
          <seriesInfo name="DOI" value="10.17487/RFC3629"/>
        </reference>
        <reference anchor="RFC5652">
          <front>
            <title>Cryptographic Message Syntax (CMS)</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="70"/>
          <seriesInfo name="RFC" value="5652"/>
          <seriesInfo name="DOI" value="10.17487/RFC5652"/>
        </reference>
        <reference anchor="RFC7950">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="RFC7951">
          <front>
            <title>JSON Encoding of Data Modeled with YANG</title>
            <author fullname="L. Lhotka" initials="L." surname="Lhotka"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>This document defines encoding rules for representing configuration data, state data, parameters of Remote Procedure Call (RPC) operations or actions, and notifications defined using YANG as JavaScript Object Notation (JSON) text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7951"/>
          <seriesInfo name="DOI" value="10.17487/RFC7951"/>
        </reference>
        <reference anchor="RFC8366">
          <front>
            <title>A Voucher Artifact for Bootstrapping Protocols</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
            <author fullname="T. Eckert" initials="T." surname="Eckert"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>This document defines a strategy to securely assign a pledge to an owner using an artifact signed, directly or indirectly, by the pledge's manufacturer. This artifact is known as a "voucher".</t>
              <t>This document defines an artifact format as a YANG-defined JSON document that has been signed using a Cryptographic Message Syntax (CMS) structure. Other YANG-derived formats are possible. The voucher artifact is normally generated by the pledge's manufacturer (i.e., the Manufacturer Authorized Signing Authority (MASA)).</t>
              <t>This document only defines the voucher artifact, leaving it to other documents to describe specialized protocols for accessing it.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8366"/>
          <seriesInfo name="DOI" value="10.17487/RFC8366"/>
        </reference>
        <reference anchor="RFC8792">
          <front>
            <title>Handling Long Lines in Content of Internet-Drafts and RFCs</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="E. Auerswald" initials="E." surname="Auerswald"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <date month="June" year="2020"/>
            <abstract>
              <t>This document defines two strategies for handling long lines in width-bounded text content. One strategy, called the "single backslash" strategy, is based on the historical use of a single backslash ('\') character to indicate where line-folding has occurred, with the continuation occurring with the first character that is not a space character (' ') on the next line. The second strategy, called the "double backslash" strategy, extends the first strategy by adding a second backslash character to identify where the continuation begins and is thereby able to handle cases not supported by the first strategy. Both strategies use a self-describing header enabling automated reconstitution of the original content.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8792"/>
          <seriesInfo name="DOI" value="10.17487/RFC8792"/>
        </reference>
        <reference anchor="RFC8812">
          <front>
            <title>CBOR Object Signing and Encryption (COSE) and JSON Object Signing and Encryption (JOSE) Registrations for Web Authentication (WebAuthn) Algorithms</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="August" year="2020"/>
            <abstract>
              <t>The W3C Web Authentication (WebAuthn) specification and the FIDO Alliance FIDO2 Client to Authenticator Protocol (CTAP) specification use CBOR Object Signing and Encryption (COSE) algorithm identifiers. This specification registers the following algorithms (which are used by WebAuthn and CTAP implementations) in the IANA "COSE Algorithms" registry: RSASSA-PKCS1-v1_5 using SHA-256, SHA-384, SHA-512, and SHA-1; and Elliptic Curve Digital Signature Algorithm (ECDSA) using the secp256k1 curve and SHA-256. It registers the secp256k1 elliptic curve in the IANA "COSE Elliptic Curves" registry. Also, for use with JSON Object Signing and Encryption (JOSE), it registers the algorithm ECDSA using the secp256k1 curve and SHA-256 in the IANA "JSON Web Signature and Encryption Algorithms" registry and the secp256k1 elliptic curve in the IANA "JSON Web Key Elliptic Curve" registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8812"/>
          <seriesInfo name="DOI" value="10.17487/RFC8812"/>
        </reference>
        <reference anchor="ON-PATH" target="https://mailarchive.ietf.org/arch/msg/saag/m1r9uo4xYznOcf85Eyk0Rhut598/">
          <front>
            <title>can an on-path attacker drop traffic?</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="I-D.ietf-anima-brski-prm">
          <front>
            <title>BRSKI with Pledge in Responder Mode (BRSKI-PRM)</title>
            <author fullname="Steffen Fries" initials="S." surname="Fries">
              <organization>Siemens AG</organization>
            </author>
            <author fullname="Thomas Werner" initials="T." surname="Werner">
              <organization>Siemens AG</organization>
            </author>
            <author fullname="Eliot Lear" initials="E." surname="Lear">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date day="7" month="January" year="2025"/>
            <abstract>
              <t>   This document defines enhancements to Bootstrapping a Remote Secure
   Key Infrastructure (BRSKI, RFC8995) to enable bootstrapping in
   domains featuring no or only limited connectivity between a pledge
   and the domain registrar.  It specifically changes the interaction
   model from a pledge-initiated mode, as used in BRSKI, to a pledge-
   responding mode, where the pledge is in server role.  For this, BRSKI
   with Pledge in Responder Mode (BRSKI-PRM) introduces new endpoints
   for the Domain Registrar and pledge, and a new component, the
   Registrar-Agent, which facilitates the communication between pledge
   and registrar during the bootstrapping phase.  To establish the trust
   relation between pledge and registrar, BRSKI-PRM relies on object
   security rather than transport security.  The approach defined here
   is agnostic to the enrollment protocol that connects the domain
   registrar to the Key Infrastructure (e.g., domain CA).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-brski-prm-16"/>
        </reference>
        <reference anchor="I-D.ietf-anima-constrained-voucher">
          <front>
            <title>Constrained Bootstrapping Remote Secure Key Infrastructure (cBRSKI)</title>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Peter Van der Stok" initials="P." surname="Van der Stok">
              <organization>vanderstok consultancy</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Esko Dijk" initials="E." surname="Dijk">
              <organization>IoTconsultancy.nl</organization>
            </author>
            <date day="8" month="January" year="2025"/>
            <abstract>
              <t>   This document defines the Constrained Bootstrapping Remote Secure Key
   Infrastructure (cBRSKI) protocol, which provides a solution for
   secure zero-touch onboarding of resource-constrained (IoT) devices
   into the network of a domain owner.  This protocol is designed for
   constrained networks, which may have limited data throughput or may
   experience frequent packet loss. cBRSKI is a variant of the BRSKI
   protocol, which uses an artifact signed by the device manufacturer
   called the "voucher" which enables a new device and the owner's
   network to mutually authenticate.  While the BRSKI voucher data is
   encoded in JSON, cBRSKI uses a compact CBOR-encoded voucher.  The
   BRSKI voucher data definition is extended with new data types that
   allow for smaller voucher sizes.  The Enrollment over Secure
   Transport (EST) protocol, used in BRSKI, is replaced with EST-over-
   CoAPS; and HTTPS used in BRSKI is replaced with DTLS-secured CoAP
   (CoAPS).  This document Updates RFC 8995 and RFC 9148.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-constrained-voucher-26"/>
        </reference>
      </references>
    </references>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="T." surname="Eckert" fullname="Toerless Eckert">
        <organization>Futurewei Technologies Inc.</organization>
        <address>
          <email>tte+ietf@cs.fau.de</email>
        </address>
      </contact>
      <contact initials="E." surname="Dijk" fullname="Esko Dijk">
        <organization/>
        <address>
          <email>esko.dijk@iotconsultancy.nl</email>
        </address>
      </contact>
      <contact initials="S." surname="Fries" fullname="Steffen Fries">
        <organization>Siemens AG</organization>
        <address>
          <email>steffen.fries@siemens.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
