<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.21 -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<?rfc linkmailto="no"?>
<?rfc editing="no"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc rfcedstyle="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-anima-rfc8366bis-00" category="std" consensus="yes" tocInclude="true" sortRefs="true" symRefs="true" obsoletes="" updates="" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.5.0 -->
  <front>
    <title abbrev="Voucher Artifact">A Voucher Artifact for Bootstrapping Protocols</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-anima-rfc8366bis-00"/>
    <author initials="K." surname="Watsen" fullname="Kent Watsen">
      <organization>Juniper Networks</organization>
      <address>
        <email>kwatsen@juniper.net</email>
      </address>
    </author>
    <author initials="M." surname="Richardson" fullname="Michael C. Richardson">
      <organization>Sandelman Software</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
        <uri>http://www.sandelman.ca/</uri>
      </address>
    </author>
    <author initials="M." surname="Pritikin" fullname="Max Pritikin">
      <organization>Cisco Systems</organization>
      <address>
        <email>pritikin@cisco.com</email>
      </address>
    </author>
    <author initials="T." surname="Eckert" fullname="Toerless Eckert">
      <organization abbrev="Huawei">Futurewei Technologies Inc.</organization>
      <address>
        <postal>
          <street>2330 Central Expy</street>
          <city>Santa Clara</city>
          <code>95050</code>
          <country>United States of America</country>
        </postal>
        <email>tte+ietf@cs.fau.de</email>
      </address>
    </author>
    <author initials="Q." surname="Ma" fullname="Qiufang Ma">
      <organization>Huawei</organization>
      <address>
        <postal>
          <street>101 Software Avenue, Yuhua District</street>
          <city>Nanjing</city>
          <code>210012</code>
          <country>China</country>
        </postal>
        <email>maqiufang1@huawei.com</email>
      </address>
    </author>
    <date year="2022" month="January"/>
    <area>Operations</area>
    <workgroup>ANIMA Working Group</workgroup>
    <keyword>voucher</keyword>
    <abstract>
      <t>This document defines a strategy to securely assign a pledge to an owner
using an artifact signed, directly or indirectly, by the pledge's manufacturer.
This artifact is known as a "voucher".</t>
      <t>This document defines an artifact format as a YANG-defined JSON document
that has been signed using a Cryptographic Message Syntax (CMS) structure.
Other YANG-derived formats are possible.
The voucher artifact is normally generated by
the pledge's manufacturer (i.e., the Manufacturer Authorized Signing
Authority (MASA)).</t>
      <t>This document only defines the voucher artifact, leaving it to other
documents to describe specialized protocols for accessing it.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
  Autonomic Networking Integrated Model and Approach Working Group mailing list (anima@ietf.org),
  which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/anima/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
  <eref target="https://github.com/anima-wg/voucher"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>This document defines a strategy to securely assign a candidate device
(pledge) to an owner using an artifact signed, directly or indirectly,
by the pledge's manufacturer, i.e., the Manufacturer Authorized
Signing Authority (MASA).  This artifact is known as the "voucher".</t>
      <t>The voucher artifact is a JSON <xref target="RFC8259" format="default"/> document that
conforms with a data model described by YANG <xref target="RFC7950" format="default"/>, is
encoded using the rules defined in <xref target="RFC8259" format="default"/>, and
is signed using (by default) a CMS structure <xref target="RFC5652" format="default"/>.</t>
      <t>The primary purpose of a voucher is to securely convey a
certificate, the "pinned-domain-cert", that a pledge can
use to authenticate subsequent interactions. A voucher may be useful
in several contexts, but the driving motivation
herein is to support secure bootstrapping mechanisms.  Assigning
ownership is important to bootstrapping mechanisms so that the pledge
can authenticate the network that is trying to take control of it.</t>
      <t>The lifetimes of vouchers may vary. In some bootstrapping protocols,
the vouchers may include a nonce restricting them to a single use,
whereas the vouchers in other bootstrapping protocols may have an
indicated lifetime. In order to support long lifetimes, this document
recommends using short lifetimes with programmatic renewal, see
<xref target="renewal-over-revocation" format="default"/>.</t>
      <t>This document only defines the voucher artifact, leaving it to other
documents to describe specialized protocols for accessing it.
Some bootstrapping protocols using the voucher artifact defined in
this document include: <xref target="ZERO-TOUCH" format="default"/>, <xref target="SECUREJOIN" format="default"/>, and
<xref target="BRSKI" format="default"/>).</t>
    </section>
    <section anchor="terminology" numbered="true" toc="default">
      <name>Terminology</name>
      <t>This document uses the following terms:</t>
      <dl>
        <dt>
Artifact:  </dt>
        <dd>
          <t>Used throughout to represent the voucher as instantiated in the form
of a signed structure.</t>
        </dd>
        <dt>
Domain:  </dt>
        <dd>
          <t>The set of entities or infrastructure under common administrative
control.
The goal of the bootstrapping protocol is to enable a pledge to
discover and join a domain.</t>
        </dd>
        <dt>
Imprint:  </dt>
        <dd>
          <t>The process where a device obtains the cryptographic key material to
identify and trust future interactions with a network. This term is
taken from Konrad Lorenz's work in biology with new ducklings:
"during a critical period, the duckling would assume that anything
that looks like a mother duck is in fact their mother"
<xref target="Stajano99theresurrecting" format="default"/>. An equivalent for a device is to
obtain the fingerprint of the network's root certification authority
certificate. A device that imprints on an attacker suffers a similar
fate to a duckling that imprints on a hungry wolf. Imprinting is a
term from psychology and ethology, as described in <xref target="imprinting" format="default"/>.</t>
        </dd>
        <dt>
Join Registrar (and Coordinator):  </dt>
        <dd>
          <t>A representative of the domain that is configured, perhaps
autonomically, to decide whether a new device is allowed to join the
domain. The administrator of the domain interfaces with a join
registrar (and Coordinator) to control this process.
Typically, a join registrar is "inside" its domain. For simplicity,
this document often refers to this as just "registrar".</t>
        </dd>
        <dt>
MASA (Manufacturer Authorized Signing Authority):  </dt>
        <dd>
          <t>The entity that, for the purpose of this document, signs the
vouchers for a manufacturer's pledges.
In some bootstrapping protocols, the MASA may have an Internet
presence and be integral to the bootstrapping process, whereas in
other protocols the MASA may be an offline service that has no
active role in the bootstrapping process.</t>
        </dd>
        <dt>
Owner:  </dt>
        <dd>
          <t>The entity that controls the private key of the "pinned-domain-cert"
certificate conveyed by the voucher.</t>
        </dd>
        <dt>
Pledge:  </dt>
        <dd>
          <t>The prospective device attempting to find and securely join a
domain.
When shipped, it only trusts authorized representatives of the
manufacturer.</t>
        </dd>
        <dt>
Registrar:  </dt>
        <dd>
          <t>See join registrar.</t>
        </dd>
        <dt>
TOFU (Trust on First Use):  </dt>
        <dd>
          <t>Where a pledge device makes no security decisions but rather simply
trusts the first domain entity it is contacted by.
Used similarly to <xref target="RFC7435" format="default"/>.
This is also known as the "resurrecting duckling" model.</t>
        </dd>
        <dt>
Voucher:  </dt>
        <dd>
          <t>A signed statement from the MASA service that indicates to a pledge
the cryptographic identity of the domain it should trust.</t>
        </dd>
      </dl>
    </section>
    <section anchor="requirements-language" numbered="true" toc="default">
      <name>Requirements Language</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP&nbsp;14 <xref target="RFC2119" format="default"/> <xref target="RFC8174" format="default"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="survey-of-voucher-types" numbered="true" toc="default">
      <name>Survey of Voucher Types</name>
      <t>A voucher is a cryptographically protected statement to the pledge
device authorizing a zero-touch "imprint" on the join registrar of the
domain. The specific information a voucher provides is influenced by the
bootstrapping use case.</t>
      <t>The voucher can impart the following information to
the join registrar and pledge:</t>
      <dl>
        <dt>
Assertion Basis:  </dt>
        <dd>
          <t>Indicates the method that protects
the imprint (this is distinct from the voucher signature that
protects the voucher itself). This might include
manufacturer-asserted ownership verification, assured
logging operations, or reliance on pledge endpoint behavior
such as secure root of trust
of measurement. The join registrar might use this information.
Only some methods are normatively defined in this
document. Other methods are left for future work.</t>
        </dd>
        <dt>
Authentication of Join Registrar:  </dt>
        <dd>
          <t>Indicates how the pledge
can authenticate the join registrar.  This document defines
a mechanism to pin the domain certificate.
Pinning a symmetric key, a raw key, or "CN-ID" or "DNS-ID"
information (as defined in <xref target="RFC6125" format="default"/>) is left for future work.</t>
        </dd>
        <dt>
Anti-Replay Protections:  </dt>
        <dd>
          <t>Time- or nonce-based
information to constrain the voucher to time periods or bootstrap
attempts.</t>
        </dd>
      </dl>
      <t>A number of bootstrapping scenarios can be met using differing
combinations of this information. All scenarios address the primary
threat of a Man-in-The-Middle (MiTM) registrar gaining control over
the pledge device. The following combinations are "types" of vouchers:</t>
      <artwork name="" type="" align="left" alt=""><![CDATA[
             |Assertion   |Registrar ID    | Validity    |
Voucher      |Log-|Veri-  |Trust  |CN-ID or| RTC | Nonce |
Type         | ged|  fied |Anchor |DNS-ID  |     |       |
---------------------------------------------------------|
Audit        |  X |       | X     |        |     | X     |
-------------|----|-------|-------|--------|-----|-------|
Nonceless    |  X |       | X     |        | X   |       |
Audit        |    |       |       |        |     |       |
-------------|----|-------|-------|--------|-----|-------|
Owner Audit  |  X |   X   | X     |        | X   | X     |
-------------|----|-------|-------|--------|-----|-------|
Owner ID     |    |   X   | X     |  X     | X   |       |
-------------|----|-------|----------------|-----|-------|
Bearer       |  X |       |   wildcard     | optional    |
out-of-scope |    |       |                |             |
-------------|----|-------|----------------|-------------|

NOTE: All voucher types include a 'pledge ID serial-number'
      (not shown here for space reasons).
]]></artwork>
      <dl>
        <dt>
Audit Voucher:  </dt>
        <dd>
          <t>An Audit Voucher is named after the logging assertion mechanisms
that the registrar then "audits" to enforce local policy. The
registrar mitigates a MiTM registrar by auditing that an unknown
MiTM registrar does not appear in the log entries. This does not
directly prevent the MiTM but provides a response mechanism that
ensures the MiTM is unsuccessful. The advantage is that actual
ownership knowledge is not required on the MASA service.</t>
        </dd>
        <dt>
Nonceless Audit Voucher:  </dt>
        <dd>
          <t>An Audit Voucher without a validity period statement. Fundamentally,
it is the same as an Audit Voucher except that it can be issued in
advance to support network partitions or to provide a permanent
voucher for remote deployments.</t>
        </dd>
        <dt>
Ownership Audit Voucher:  </dt>
        <dd>
          <t>An Audit Voucher where the MASA service has verified the registrar
as the authorized owner.
The MASA service mitigates a MiTM registrar by refusing to generate
Audit Vouchers for unauthorized registrars. The registrar uses audit
techniques to supplement the MASA. This provides an ideal sharing of
policy decisions and enforcement between the vendor and the owner.</t>
        </dd>
        <dt>
Ownership ID Voucher:  </dt>
        <dd>
          <t>Named after inclusion of the pledge's CN-ID or DNS-ID within the
voucher. The MASA service mitigates a MiTM registrar by identifying
the specific registrar (via WebPKI) authorized to own the pledge.</t>
        </dd>
        <dt>
Bearer Voucher:  </dt>
        <dd>
          <t>A Bearer Voucher is named after the inclusion of a registrar ID
wildcard. Because the registrar identity is not indicated, this
voucher type must be treated as a secret and protected from exposure
as any 'bearer' of the voucher can claim the pledge
device. Publishing a nonceless bearer voucher effectively turns the
specified pledge into a "TOFU" device with minimal mitigation
against MiTM registrars. Bearer vouchers are out of scope.</t>
        </dd>
      </dl>
    </section>
    <section anchor="voucher" numbered="true" toc="default">
      <name>Voucher Artifact</name>
      <t>The voucher's primary purpose is to securely assign a pledge to an
owner.
The voucher informs the pledge which entity it should consider to be
its owner.</t>
      <t>This document defines a voucher that is a JSON-encoded instance of the
YANG module defined in <xref target="voucher-yang-module" format="default"/> that has been, by
default, CMS signed.</t>
      <t>This format is described here as a practical basis for some uses (such
as in NETCONF), but more to clearly indicate what vouchers look like
in practice.
This description also serves to validate the YANG data model.</t>
      <t>Future work is expected to define new mappings of the voucher to
Concise Binary Object Representation (CBOR) (from JSON) and to change
the signature container from CMS to JSON Object Signing and Encryption
(JOSE) or CBOR Object Signing and Encryption (COSE).
XML or ASN.1 formats are also conceivable.</t>
      <t>This document defines a media type and a filename extension for the
CMS-encoded JSON type.  Future documents on additional formats
would define additional media types.  Signaling is in the form of a MIME
Content-Type, an HTTP Accept: header, or more mundane methods like
use of a filename extension when a voucher is transferred on a USB
key.</t>
      <section anchor="voucher-tree-diagram" numbered="true" toc="default">
        <name>Tree Diagram</name>
        <t>The following tree diagram illustrates a high-level view of a voucher
document.
The notation used in this diagram is described in <xref target="RFC8340" format="default"/>.
Each node in the diagram is fully described by the YANG module in
<xref target="voucher-yang-module" format="default"/>.
Please review the YANG module for a detailed description of the
voucher format.</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
module: ietf-voucher

  grouping voucher-artifact-grouping
    +-- voucher
       +-- created-on                       yang:date-and-time
       +-- expires-on?                      yang:date-and-time
       +-- assertion                        ianavat:voucher-assertion
       +-- serial-number                    string
       +-- idevid-issuer?                   binary
       +-- pinned-domain-cert               binary
       +-- domain-cert-revocation-checks?   boolean
       +-- nonce?                           binary
       +-- last-renewal-date?               yang:date-and-time
]]></artwork>
      </section>
      <section anchor="voucher-examples" numbered="true" toc="default">
        <name>Examples</name>
        <t>This section provides voucher examples for illustration
purposes.  These examples conform to the encoding rules
defined in <xref target="RFC8259" format="default"/>.</t>
        <t>The following example illustrates an ephemeral voucher (uses a nonce).
The MASA generated this voucher using the 'logged' assertion type, knowing
that it would be suitable for the pledge making the request.</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
{
  "ietf-voucher:voucher": {
    "created-on": "2016-10-07T19:31:42Z",
    "assertion": "logged",
    "serial-number": "JADA123456789",
    "idevid-issuer": "base64encodedvalue==",
    "pinned-domain-cert": "base64encodedvalue==",
    "nonce": "base64encodedvalue=="
  }
}
]]></artwork>
        <t>The following example illustrates a non-ephemeral voucher (no nonce).
While the voucher itself expires after two weeks, it presumably can
be renewed for up to a year.   The MASA generated this voucher
using the 'verified' assertion type, which should satisfy all pledges.</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
{
  "ietf-voucher:voucher": {
    "created-on": "2016-10-07T19:31:42Z",
    "expires-on": "2016-10-21T19:31:42Z",
    "assertion": "verified",
    "serial-number": "JADA123456789",
    "idevid-issuer": "base64encodedvalue==",
    "pinned-domain-cert": "base64encodedvalue==",
    "domain-cert-revocation-checks": "true",
    "last-renewal-date": "2017-10-07T19:31:42Z"
  }
}
]]></artwork>
      </section>
      <section anchor="voucher-yang-module" numbered="true" toc="default">
        <name>YANG Module</name>
        <section anchor="iana-voucher-assertion-type-module" numbered="true" toc="default">
          <name>"iana-voucher-assertion-type" Module</name>
          <t>Following is a YANG <xref target="RFC7950" format="default"/> module formally
describing the voucher's assertion type.</t>
          <sourcecode type="yang" markers="true">
 module iana-voucher-assertion-type {
  namespace "urn:ietf:params:xml:ns:yang:iana-voucher-assertion-type";
  prefix ianavat;

  organization
    "IANA";
  contact
    "Internet Assigned Numbers Authority
     Postal: ICANN
             12025 Waterfront Drive, Suite 300
             Los Angeles, CA 90094-2536
             United States of America
     Tel:    +1 310 301 5800
     &lt;mailto:iana@iana.org&gt;";
  description
    "This YANG module defines a YANG enumeration type for IANA
     -registered voucher assertion type. This YANG module is
     maintained by IANA and reflects the 'voucher assertion types'
     registry. The lastest revision of this YANG module can be
     obtained from the IANA web site.  Request for new enumerations
     should be made to IANA via email(iana@iana.org).

     The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
     NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
     'MAY', and 'OPTIONAL' in this document are to be interpreted as
     described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
     they appear in all capitals, as shown here.

     Copyright (c) 2018 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject to
     the license terms contained in, the Simplified BSD License set
     forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC XXX; see the
     RFC itself for full legal notices.";

  revision 2021-07-04 {
    description
      "Initial version";
    reference "RFC XXXX: Voucher Artifact for Bootstrapping Protocols";
  }

  typedef voucher-assertion {
    type enumeration {
      enum verified {
        value 0;
        description
          "Indicates that the ownership has been positively verified
           by the MASA (e.g., through sales channel integration).";
      }
      enum logged {
        value 1;
        description
          "Indicates that the voucher has been issued after
           minimal verification of ownership or control.  The
           issuance has been logged for detection of
           potential security issues (e.g., recipients of
           vouchers might verify for themselves that unexpected
           vouchers are not in the log).  This is similar to
           unsecured trust-on-first-use principles but with the
           logging providing a basis for detecting unexpected
           events.";
      }
      enum proximity {
        value 2;
        description
          "Indicates that the voucher has been issued after
           the MASA verified a proximity proof provided by the
           device and target domain.  The issuance has been logged
           for detection of potential security issues.  This is
           stronger than just logging, because it requires some
           verification that the pledge and owner are
           in communication but is still dependent on analysis of
           the logs to detect unexpected events.";
      }
      enum agent-proximity {
        value 3;
        description
          "Indicates that the voucher has been issued after the
           MASA...support of asynchronous enrollment in BRSKI";
      }
    }
    description "Indicates what kind of ownership is being asserted by voucher";
  }
}
</sourcecode>
        </section>
        <section anchor="ietf-voucher-module" numbered="true" toc="default">
          <name>"ietf-voucher" Module</name>
          <t>The revised ietf-voucher YANG module imports the typedef defined in
"iana-voucher-assertion-type" YANG module specified in this document.</t>
          <sourcecode type="yang" markers="true">
module ietf-voucher {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-voucher";
  prefix vch;

  import ietf-yang-types {
    prefix yang;
    reference "RFC 6991: Common YANG Data Types";
  }
  import ietf-restconf {
    prefix rc;
    description
      "This import statement is only present to access
       the yang-data extension defined in RFC 8040.";
    reference "RFC 8040: RESTCONF Protocol";
  }

  import iana-voucher-assertion-type {
    prefix ianavat;
    reference "RFCZZZZ: Voucher Profile for Bootstrapping Protocols";
  }

  organization
    "IETF ANIMA Working Group";
  contact
    "WG Web:   &lt;https://datatracker.ietf.org/wg/anima/&gt;
     WG List:  &lt;mailto:anima@ietf.org&gt;
     Author:   Kent Watsen
               &lt;mailto:kwatsen@juniper.net&gt;
     Author:   Max Pritikin
               &lt;mailto:pritikin@cisco.com&gt;
     Author:   Michael Richardson
               &lt;mailto:mcr+ietf@sandelman.ca&gt;
     Author:   Toerless Eckert
               &lt;mailto:tte+ietf@cs.fau.de&gt;";
  description
    "This module defines the format for a voucher, which is produced by
     a pledge's manufacturer or delegate (MASA) to securely assign a
     pledge to an 'owner', so that the pledge may establish a secure
     connection to the owner's network infrastructure.

     The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
     NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
     'MAY', and 'OPTIONAL' in this document are to be interpreted as
     described in BCP 14 (RFC 2119) (RFC 8174) when, and only when, they
     appear in all capitals, as shown here.

     Copyright (c) 2018 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or without
     modification, is permitted pursuant to, and subject to the license
     terms contained in, the Simplified BSD License set forth in Section
     4.c of the IETF Trust's Legal Provisions Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC 8366; see the RFC
     itself for full legal notices.";

  revision 2021-07-04 {
    description
      "updated to support new assertion enumerated type";
    reference "RFC ZZZZ Voucher Profile for Bootstrapping Protocols";
  }

  // Top-level statement
  rc:yang-data voucher-artifact {
    uses voucher-artifact-grouping;
  }

  // Grouping defined for future augmentations

  grouping voucher-artifact-grouping {
    description
      "Grouping to allow reuse/extensions in future work.";
    container voucher {
      description
        "A voucher assigns a pledge to an owner (pinned-domain-cert).";
      leaf created-on {
        type yang:date-and-time;
        mandatory true;
        description
          "A value indicating the date this voucher was created.  This
           node is primarily for human consumption and auditing. Future
           work MAY create verification requirements based on this
           node.";
      }
      leaf expires-on {
        type yang:date-and-time;
        must 'not(../nonce)';
        description
          "A value indicating when this voucher expires.  The node is
           optional as not all pledges support expirations, such as
           pledges lacking a reliable clock.

           If this field exists, then the pledges MUST ensure that
           the expires-on time has not yet passed. A pledge without
           an accurate clock cannot meet this requirement.

           The expires-on value MUST NOT exceed the expiration date
           of any of the listed 'pinned-domain-cert' certificates.";
      }
      leaf assertion {
        type ianavat:voucher-assertion;
        mandatory true;
        description
          "The assertion is a statement from the MASA regarding how
           the owner was verified.  This statement enables pledges
           to support more detailed policy checks.  Pledges MUST
           ensure that the assertion provided is acceptable, per
           local policy, before processing the voucher.";
      }
      leaf serial-number {
        type string;
        mandatory true;
        description
          "The serial-number of the hardware.  When processing a
           voucher, a pledge MUST ensure that its serial-number
           matches this value.  If no match occurs, then the
           pledge MUST NOT process this voucher.";
      }
      leaf idevid-issuer {
        type binary;
        description
          "The Authority Key Identifier OCTET STRING (as defined in
           Section 4.2.1.1 of RFC 5280) from the pledge's IDevID
           certificate.  Optional since some serial-numbers are
           already unique within the scope of a MASA.
           Inclusion of the statistically unique key identifier
           ensures statistically unique identification of the hardware.
           When processing a voucher, a pledge MUST ensure that its
           IDevID Authority Key Identifier matches this value.  If no
           match occurs, then the pledge MUST NOT process this voucher.

           When issuing a voucher, the MASA MUST ensure that this field
           is populated for serial-numbers that are not otherwise unique
           within the scope of the MASA.";
      }
      leaf pinned-domain-cert {
        type binary;
        mandatory true;
        description
          "An X.509 v3 certificate structure, as specified by RFC 5280,
           using Distinguished Encoding Rules (DER) encoding, as defined
           in ITU-T X.690.

           This certificate is used by a pledge to trust a Public Key
           Infrastructure in order to verify a domain certificate
           supplied to the pledge separately by the bootstrapping
           protocol.  The domain certificate MUST have this certificate
           somewhere in its chain of certificates.  This certificate
           MAY be an end-entity certificate, including a self-signed
           entity.";
        reference
          "RFC 5280:
             Internet X.509 Public Key Infrastructure Certificate
             and Certificate Revocation List (CRL) Profile.
           ITU-T X.690:
              Information technology - ASN.1 encoding rules:
              Specification of Basic Encoding Rules (BER),
              Canonical Encoding Rules (CER) and Distinguished
              Encoding Rules (DER).";
      }
      leaf domain-cert-revocation-checks {
        type boolean;
        description
          "A processing instruction to the pledge that it MUST (true)
           or MUST NOT (false) verify the revocation status for the
           pinned domain certificate.  If this field is not set, then
           normal PKIX behavior applies to validation of the domain
           certificate.";
      }
      leaf nonce {
        type binary {
          length "8..32";
        }
        must 'not(../expires-on)';
        description
          "A value that can be used by a pledge in some bootstrapping
           protocols to enable anti-replay protection.  This node is
           optional because it is not used by all bootstrapping
           protocols.

           When present, the pledge MUST compare the provided nonce
           value with another value that the pledge randomly generated
           and sent to a bootstrap server in an earlier bootstrapping
           message.  If the values do not match, then the pledge MUST
           NOT process this voucher.";
      }
      leaf last-renewal-date {
        type yang:date-and-time;
        must '../expires-on';
        description
          "The date that the MASA projects to be the last date it
           will renew a voucher on. This field is merely informative; it
           is not processed by pledges.

           Circumstances may occur after a voucher is generated that
           may alter a voucher's validity period.  For instance, a
           vendor may associate validity periods with support contracts,
           which may be terminated or extended over time.";
      }
    } // end voucher
  } // end voucher-grouping
}
</sourcecode>
        </section>
      </section>
      <section anchor="cms-voucher" numbered="true" toc="default">
        <name>CMS Format Voucher Artifact</name>
        <t>The IETF evolution of PKCS#7 is CMS <xref target="RFC5652" format="default"/>.
A CMS-signed voucher, the default type, contains a ContentInfo
structure with the voucher content. An eContentType of 40
indicates that the content is a JSON-encoded voucher.</t>
        <t>The signing structure is a CMS SignedData structure, as specified by
Section 5.1 of <xref target="RFC5652" format="default"/>, encoded using ASN.1 Distinguished Encoding
Rules (DER), as specified in ITU-T X.690 <xref target="ITU-T.X690.2015" format="default"/>.</t>
        <t>To facilitate interoperability, <xref target="vcj" format="default"/> in this document registers the
media type "application/voucher-cms+json" and the filename extension
".vcj".</t>
        <t>The CMS structure <bcp14>MUST</bcp14> contain a 'signerInfo' structure, as
described in Section 5.1 of <xref target="RFC5652" format="default"/>, containing the
signature generated over the content using a private key
trusted by the recipient. Normally, the recipient is the pledge and the
signer is the MASA. Another possible use could be as a "signed
voucher request" format originating from the pledge or registrar
toward the MASA.
Within this document, the signer is assumed to be the MASA.</t>
        <t>Note that Section 5.1 of <xref target="RFC5652" format="default"/> includes a
discussion about how to validate a CMS object, which is really a
PKCS7 object (cmsVersion=1).  Intermediate systems (such the
Bootstrapping Remote Secure Key Infrastructures <xref target="BRSKI" format="default"/> registrar)
that might need to evaluate the voucher in flight <bcp14>MUST</bcp14> be prepared for
such an older format.
No signaling is necessary, as the manufacturer knows the capabilities
of the pledge and will use an appropriate format voucher for each
pledge.</t>
        <t>The CMS structure <bcp14>SHOULD</bcp14> also contain all of the certificates
leading up to and including the signer's trust anchor certificate
known to the recipient.  The inclusion of the trust anchor is
unusual in many applications, but third parties cannot accurately
audit the transaction without it.</t>
        <t>The CMS structure <bcp14>MAY</bcp14> also contain revocation objects for any
intermediate certificate authorities (CAs) between the
voucher issuer and the trust anchor known to the recipient.
However, the use of CRLs and other validity mechanisms is
discouraged, as the pledge is unlikely to be able to perform
online checks and is unlikely to have a trusted clock source.
As described below, the use of short-lived vouchers and/or a
pledge-provided nonce provides a freshness guarantee.</t>
      </section>
    </section>
    <section anchor="design-con" numbered="true" toc="default">
      <name>Design Considerations</name>
      <section anchor="renewal-over-revocation" numbered="true" toc="default">
        <name>Renewals Instead of Revocations</name>
        <t>The lifetimes of vouchers may vary.  In some bootstrapping protocols,
the vouchers may be created and consumed immediately, whereas in other
bootstrapping solutions, there may be a significant time delay between
when a voucher is created and when it is consumed.
In cases when there is a time delay, there is a need for the pledge
to ensure that the assertions made when the voucher was created are
still valid.</t>
        <t>A revocation artifact is generally used to verify the continued validity
of an assertion such as a PKIX certificate, web token, or a "voucher".  With
this approach, a potentially long-lived assertion is paired with a reasonably
fresh revocation status check to ensure that the assertion is still valid.
However, this approach increases solution complexity, as it introduces the
need for additional protocols and code paths to distribute and process the
revocations.</t>
        <t>Addressing the shortcomings of revocations, this document recommends
instead the use of lightweight renewals of short-lived non-revocable
vouchers.  That is, rather than issue a long-lived voucher, where the
'expires-on' leaf is set to some distant date, the expectation
is for the MASA to instead issue a short-lived voucher, where the
'expires-on' leaf is set to a relatively near date, along with a promise
(reflected in the 'last-renewal-date' field) to reissue the voucher again
when needed.  Importantly, while issuing the initial voucher may incur
heavyweight verification checks ("Are you who you say you are?" "Does the
pledge actually belong to you?"), reissuing the voucher should be a
lightweight process, as it ostensibly only updates the voucher's
validity period.
With this approach, there is
only the one artifact, and only one code path is needed to process
it; there is no possibility of a pledge choosing to skip the
revocation status check because, for instance, the OCSP Responder is
not reachable.</t>
        <t>While this document recommends issuing short-lived vouchers, the
voucher artifact does not restrict the ability to create long-lived
voucher, if required; however, no revocation method is described.</t>
        <t>Note that a voucher may be signed by a chain of intermediate CAs
leading up to the trust anchor certificate known by the pledge.  Even
though the voucher itself is not revocable, it may still be revoked,
per se, if one of the intermediate CA certificates is revoked.</t>
      </section>
      <section anchor="voucher-per-pledge" numbered="true" toc="default">
        <name>Voucher Per Pledge</name>
        <t>The solution described herein originally enabled a single voucher to
apply to many pledges, using lists of regular expressions to represent
ranges of serial-numbers.  However, it was determined that blocking the
renewal of a voucher that applied to many devices would be excessive
when only the ownership for a single pledge needed to be blocked.
Thus, the voucher format now only supports a single serial-number
to be listed.</t>
      </section>
    </section>
    <section anchor="sec-con" numbered="true" toc="default">
      <name>Security Considerations</name>
      <section anchor="clock-sensitivity" numbered="true" toc="default">
        <name>Clock Sensitivity</name>
        <t>An attacker could use an expired voucher to gain control over
a device that has no understanding of time.  The device cannot
trust NTP as a time reference, as an attacker could control
the NTP stream.</t>
        <t>There are three things to defend against this: 1) devices are
required to verify that the expires-on field has not yet passed,
2) devices without access to time can use nonces to
get ephemeral vouchers, and 3) vouchers without expiration times
may be used, which will appear in the audit log, informing the
security decision.</t>
        <t>This document defines a voucher format that contains time values
for expirations, which require an accurate clock
in order to be processed correctly.  Vendors planning on
issuing vouchers with expiration values must ensure that devices
have an accurate clock when shipped from manufacturing
facilities and take steps to prevent clock tampering.
If it is not possible to ensure clock accuracy, then
vouchers with expirations should not be issued.</t>
      </section>
      <section anchor="protect-voucher-pki-in-hsm" numbered="true" toc="default">
        <name>Protect Voucher PKI in HSM</name>
        <t>Pursuant the recommendation made in Section 6.1 for the MASA to be
deployed as an online voucher signing service, it is <bcp14>RECOMMENDED</bcp14> that
the MASA's private key used for signing vouchers is protected by
a hardware security module (HSM).</t>
      </section>
      <section anchor="test-domain-certificate-validity-when-signing" numbered="true" toc="default">
        <name>Test Domain Certificate Validity When Signing</name>
        <t>If a domain certificate is compromised, then any outstanding
vouchers for that domain could be used by the attacker.  The domain
administrator is clearly expected to initiate revocation of any
domain identity certificates (as is normal in PKI solutions).</t>
        <t>Similarly, they are expected to contact the MASA to indicate that
an outstanding (presumably short lifetime) voucher should be blocked from
automated renewal.
Protocols for voucher distribution are
<bcp14>RECOMMENDED</bcp14> to check for revocation of domain identity certificates
before the signing of vouchers.</t>
      </section>
      <section anchor="yang-module-security-considerations" numbered="true" toc="default">
        <name>YANG Module Security Considerations</name>
        <t>The YANG module specified in this document defines the schema
for data that is subsequently encapsulated by a CMS signed-data
content type, as described in Section 5 of <xref target="RFC5652" format="default"/>.  As such,
all of the YANG modeled data is protected from modification.</t>
        <t>Implementations should be aware that the signed data is only
protected from external modification; the data is still visible.
This potential disclosure of information doesn't affect security
so much as privacy.  In particular, adversaries can glean
information such as which devices belong to which organizations
and which CRL Distribution Point and/or OCSP Responder URLs are
accessed to validate the vouchers.  When privacy is important,
the CMS signed-data content type <bcp14>SHOULD</bcp14> be encrypted, either by
conveying it via a mutually authenticated secure transport protocol
(e.g., TLS <xref target="RFC5246" format="default"/>) or by encapsulating the signed-data
content type with an enveloped-data content type (Section 6
of <xref target="RFC5652" format="default"/>), though details for how to do this are outside
the scope of this document.</t>
        <t>The use of YANG to define data structures, via the 'yang-data'
statement, is relatively new and distinct from the traditional use of
YANG to define an API accessed by network management protocols such as
NETCONF <xref target="RFC6241" format="default"/> and RESTCONF <xref target="RFC8040" format="default"/>. For this reason, these
guidelines do not follow template described by Section 3.7 of
<xref target="YANG-GUIDE" format="default"/>.</t>
      </section>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>This section deals with actions and processes necessary for IANA to undertake to maintain
the "iana-voucher-assertion-type" YANG module.
The iana-voucher-assertion-type YANG module is intended to reflect the "voucher assertion types" registry in [TBD].</t>
      <t>IANA is asked to create the "iana-voucher-assertion-type YANG module" registry.</t>
      <t>Voucher assertion types must not be directly added to the iana-voucher-type YANG module.
They must instead be added to the "voucher assertion types" registry.</t>
      <t>Whenever a new enumerated type is added to the "voucher assertion types" registry, IANA
must also update the "ietf-voucher-assertion-type" YANG module and add a new "enum"
statement to the "voucher-assertion-type" type.
The assigned name defined by the "enum" statement <bcp14>SHALL</bcp14> be the same as the mnemonic name of the new assertion type.
The following substatements to the "enum" statement <bcp14>SHALL</bcp14> be defined:</t>
      <ul empty="true">
        <li>
          <dl>
            <dt>
"value":    </dt>
            <dd>
              <t>Use the decimal value from the registry.</t>
            </dd>
            <dt>
"status":    </dt>
            <dd>
              <t>Include only if a class or type registration has been deprecated or obsoleted.
IANA "deprecated" maps to YANG status "deprecated", and IANA "obsolete" maps to YANG status   "obsolete".</t>
            </dd>
            <dt>
"description":    </dt>
            <dd>
              <t>Replicate the corresponding information from the registry, namely the full name of the new assertion type.</t>
            </dd>
            <dt>
"reference":    </dt>
            <dd>
              <t>Replicate the reference(s) from the registry.</t>
            </dd>
          </dl>
        </li>
      </ul>
      <t>Each time the "iana-voucher-assertion-type" YANG module is updated, a new "revision" statement <bcp14>SHALL</bcp14> be added before the existing "revision" statements.
IANA has added this note to the "voucher assertion types" registries:</t>
      <t>When this registry is modified, the YANG module "iana-voucher-assertion-type" must
be updated as defined in [RFCXXXX].
The "Reference" text in the "voucher assertion types" registry has been updated
as follows:
OLD:
| [RFC8366]
NEW:
| [RFC8366][RFCXXX]</t>
      <section anchor="the-ietf-xml-registry" numbered="true" toc="default">
        <name>The IETF XML Registry</name>
        <t>This document registers two URIs in the "IETF XML Registry" <xref target="RFC3688" format="default"/>.</t>
        <t>IANA has registered the following:</t>
        <ul empty="true">
          <li>
            <dl spacing="compact">
              <dt>
URI:    </dt>
              <dd>
                <t>urn:ietf:params:xml:ns:yang:ietf-voucher</t>
              </dd>
              <dt>
Registrant Contact:    </dt>
              <dd>
                <t>The ANIMA WG of the IETF.</t>
              </dd>
              <dt>
XML:    </dt>
              <dd>
                <t>N/A, the requested URI is an XML namespace.</t>
              </dd>
            </dl>
          </li>
        </ul>
        <t>IANA is asked to register a second URI as follows:</t>
        <ul empty="true">
          <li>
            <dl spacing="compact">
              <dt>
URI:    </dt>
              <dd>
                <t>urn:ietf:params:xml:ns:yang:iana-voucher-assertion-type</t>
              </dd>
              <dt>
Registrant Contact:    </dt>
              <dd>
                <t>The ANIMA WG of the IETF.</t>
              </dd>
              <dt>
XML:    </dt>
              <dd>
                <t>N/A, the requested URI is an XML namespace.</t>
              </dd>
            </dl>
          </li>
        </ul>
      </section>
      <section anchor="the-yang-module-names-registry" numbered="true" toc="default">
        <name>The YANG Module Names Registry</name>
        <t>This document registers two YANG module in the "YANG Module Names"
registry <xref target="RFC6020" format="default"/>.</t>
        <t>IANA is asked to registrar the following:</t>
        <ul empty="true">
          <li>
            <dl spacing="compact">
              <dt>
name:    </dt>
              <dd>
                <t>ietf-voucher</t>
              </dd>
              <dt>
namespace:    </dt>
              <dd>
                <t>urn:ietf:params:xml:ns:yang:ietf-voucher</t>
              </dd>
              <dt>
prefix:    </dt>
              <dd>
                <t>vch</t>
              </dd>
            </dl>
            <t>reference:
  :RFC 8366</t>
          </li>
        </ul>
        <t>IANA is asked to register a second YANG module as follows:</t>
        <ul empty="true">
          <li>
            <dl spacing="compact">
              <dt>
name:    </dt>
              <dd>
                <t>iana-voucher-assertion-type</t>
              </dd>
              <dt>
namespace:    </dt>
              <dd>
                <t>urn:ietf:params:xml:ns:yang:iana-voucher-assertion-type</t>
              </dd>
              <dt>
prefix:    </dt>
              <dd>
                <t>ianavat</t>
              </dd>
              <dt>
reference:    </dt>
              <dd>
                <t>RFC XXXX</t>
              </dd>
            </dl>
          </li>
        </ul>
      </section>
      <section anchor="vcj" numbered="true" toc="default">
        <name>The Media Types Registry</name>
        <t>This document requests IANA to update the following "Media Types" entry to point to the RFC number that will be assigned to this document:</t>
        <dl>
          <dt>
Type name:  </dt>
          <dd>
            <t>application</t>
          </dd>
          <dt>
Subtype name:  </dt>
          <dd>
            <t>voucher-cms+json</t>
          </dd>
          <dt>
Required parameters:  </dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>
Optional parameters:  </dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>
Encoding considerations:  </dt>
          <dd>
            <t>CMS-signed JSON vouchers are ASN.1/DER encoded.</t>
          </dd>
          <dt>
Security considerations:  </dt>
          <dd>
            <t>See <xref target="sec-con" format="default"/></t>
          </dd>
          <dt>
Interoperability considerations:  </dt>
          <dd>
            <t>The format is designed to be broadly interoperable.</t>
          </dd>
          <dt>
Published specification:  </dt>
          <dd>
            <t>RFC 8366</t>
          </dd>
          <dt>
Applications that use this media type:  </dt>
          <dd>
            <t>ANIMA, 6tisch, and NETCONF zero-touch imprinting systems.</t>
          </dd>
          <dt>
Fragment identifier considerations:  </dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>
Additional information:  </dt>
          <dd>
            <dl>
              <dt>
Deprecated alias names for this type:      </dt>
              <dd>
                <t>none</t>
              </dd>
              <dt>
Magic number(s):      </dt>
              <dd>
                <t>None</t>
              </dd>
              <dt>
File extension(s):      </dt>
              <dd>
                <t>.vcj</t>
              </dd>
              <dt>
Macintosh file type code(s):      </dt>
              <dd>
                <t>none</t>
              </dd>
            </dl>
          </dd>
          <dt>
Person and email address to contact for further information:  </dt>
          <dd>
            <t>IETF&nbsp;ANIMA WG</t>
          </dd>
          <dt>
Intended usage:  </dt>
          <dd>
            <t>LIMITED</t>
          </dd>
          <dt>
Restrictions on usage:  </dt>
          <dd>
            <t>NONE</t>
          </dd>
          <dt>
Author:  </dt>
          <dd>
            <t>ANIMA WG</t>
          </dd>
          <dt>
Change controller:  </dt>
          <dd>
            <t>IETF</t>
          </dd>
          <dt>
Provisional registration? (standards tree only):  </dt>
          <dd>
            <t>NO</t>
          </dd>
        </dl>
      </section>
      <section anchor="the-smi-security-for-smime-cms-content-type-registry" numbered="true" toc="default">
        <name>The SMI Security for S/MIME CMS Content Type Registry</name>
        <t>This document requests IANA to update this  registered OID in the "SMI Security for S/MIME CMS Content Type (1.2.840.113549.1.9.16.1)" registry to point to the RFC number to be assigned to this document:</t>
        <table align="center">
          <thead>
            <tr>
              <th align="left">Decimal</th>
              <th align="left">Description</th>
              <th align="left">References</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">40</td>
              <td align="left">id-ct-animaJSONVoucher</td>
              <td align="left">RFC 8366</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC5652">
          <front>
            <title>Cryptographic Message Syntax (CMS)</title>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the Cryptographic Message Syntax (CMS).  This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="70"/>
          <seriesInfo name="RFC" value="5652"/>
          <seriesInfo name="DOI" value="10.17487/RFC5652"/>
        </reference>
        <reference anchor="RFC6020">
          <front>
            <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund">
              <organization/>
            </author>
            <date month="October" year="2010"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6020"/>
          <seriesInfo name="DOI" value="10.17487/RFC6020"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray">
              <organization/>
            </author>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format.  It was derived from the ECMAScript Programming Language Standard.  JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC7950">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund">
              <organization/>
            </author>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols.  This document describes the syntax and semantics of version 1.1 of the YANG language.  YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification.  There are a small number of backward incompatibilities from YANG version 1.  This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="ITU-T.X690.2015" target="https://www.itu.int/rec/T-REC-X.690/">
          <front>
            <title>Information Technology - ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author>
              <organization>International Telecommunication Union</organization>
            </author>
            <date year="2015" month="August"/>
          </front>
          <seriesInfo name="ITU-T Recommendation X.690," value="ISO/IEC 8825-1"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks">
              <organization/>
            </author>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol.  The TLS protocol provides communications security over the Internet.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC3688">
          <front>
            <title>The IETF XML Registry</title>
            <author fullname="M. Mealling" initials="M." surname="Mealling">
              <organization/>
            </author>
            <date month="January" year="2004"/>
            <abstract>
              <t>This document describes an IANA maintained registry for IETF standards which use Extensible Markup Language (XML) related items such as Namespaces, Document Type Declarations (DTDs), Schemas, and Resource Description Framework (RDF) Schemas.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="81"/>
          <seriesInfo name="RFC" value="3688"/>
          <seriesInfo name="DOI" value="10.17487/RFC3688"/>
        </reference>
        <reference anchor="RFC6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed">
              <organization/>
            </author>
            <author fullname="J. Klensin" initials="J." surname="Klensin">
              <organization/>
            </author>
            <author fullname="T. Hansen" initials="T." surname="Hansen">
              <organization/>
            </author>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols.  This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns">
              <organization/>
            </author>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund">
              <organization/>
            </author>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder">
              <organization/>
            </author>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman">
              <organization/>
            </author>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices.  It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages.  The NETCONF protocol operations are realized as remote procedure calls (RPCs).  This document obsoletes RFC 4741.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman">
              <organization/>
            </author>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund">
              <organization/>
            </author>
            <author fullname="K. Watsen" initials="K." surname="Watsen">
              <organization/>
            </author>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC8340">
          <front>
            <title>YANG Tree Diagrams</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund">
              <organization/>
            </author>
            <author fullname="L. Berger" initials="L." role="editor" surname="Berger">
              <organization/>
            </author>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document captures the current syntax used in YANG module tree diagrams.  The purpose of this document is to provide a single location for this definition.  This syntax may be updated from time to time based on the evolution of the YANG language.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="215"/>
          <seriesInfo name="RFC" value="8340"/>
          <seriesInfo name="DOI" value="10.17487/RFC8340"/>
        </reference>
        <reference anchor="RFC6125">
          <front>
            <title>Representation and Verification of Domain-Based Application Service Identity within Internet Public Key Infrastructure Using X.509 (PKIX) Certificates in the Context of Transport Layer Security (TLS)</title>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre">
              <organization/>
            </author>
            <author fullname="J. Hodges" initials="J." surname="Hodges">
              <organization/>
            </author>
            <date month="March" year="2011"/>
            <abstract>
              <t>Many application technologies enable secure communication between two entities by means of Internet Public Key Infrastructure Using X.509 (PKIX) certificates in the context of Transport Layer Security (TLS). This document specifies procedures for representing and verifying the identity of application services in such interactions.   [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6125"/>
          <seriesInfo name="DOI" value="10.17487/RFC6125"/>
        </reference>
        <reference anchor="RFC7435">
          <front>
            <title>Opportunistic Security: Some Protection Most of the Time</title>
            <author fullname="V. Dukhovni" initials="V." surname="Dukhovni">
              <organization/>
            </author>
            <date month="December" year="2014"/>
            <abstract>
              <t>This document defines the concept "Opportunistic Security" in the context of communications protocols.  Protocol designs based on Opportunistic Security use encryption even when authentication is not available, and use authentication when possible, thereby removing barriers to the widespread use of encryption on the Internet.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7435"/>
          <seriesInfo name="DOI" value="10.17487/RFC7435"/>
        </reference>
        <reference anchor="ZERO-TOUCH">
          <front>
            <title>Secure Zero Touch Provisioning (SZTP)</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen">
              <organization/>
            </author>
            <author fullname="I. Farrer" initials="I." surname="Farrer">
              <organization/>
            </author>
            <author fullname="M. Abrahamsson" initials="M." surname="Abrahamsson">
              <organization/>
            </author>
            <date month="April" year="2019"/>
            <abstract>
              <t>This document presents a technique to securely provision a networking device when it is booting in a factory-default state.  Variations in the solution enable it to be used on both public and private networks.  The provisioning steps are able to update the boot image, commit an initial configuration, and execute arbitrary scripts to address auxiliary needs.  The updated device is subsequently able to establish secure connections with other systems.  For instance, a device may establish NETCONF (RFC 6241) and/or RESTCONF (RFC 8040) connections with deployment-specific network management systems.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8572"/>
          <seriesInfo name="DOI" value="10.17487/RFC8572"/>
        </reference>
        <reference anchor="BRSKI">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin">
              <organization/>
            </author>
            <author fullname="M. Richardson" initials="M." surname="Richardson">
              <organization/>
            </author>
            <author fullname="T. Eckert" initials="T." surname="Eckert">
              <organization/>
            </author>
            <author fullname="M. Behringer" initials="M." surname="Behringer">
              <organization/>
            </author>
            <author fullname="K. Watsen" initials="K." surname="Watsen">
              <organization/>
            </author>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane.  To do this, a Secure Key Infrastructure is bootstrapped.  This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline.  We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device.  The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="SECUREJOIN">
          <front>
            <title>6tisch Secure Join protocol</title>
            <author fullname="Michael Richardson">
	 </author>
            <date day="25" month="February" year="2017"/>
            <abstract>
              <t>   This document describes a zero-touch mechanism to enroll a new device
   (the "pledge") into a IEEE802.15.4 TSCH network using the 6tisch
   signaling mechanisms.  The resulting device will obtain a domain
   specific credential that can be used with either 802.15.9 per-host
   pair keying protocols, or to obtain the network-wide key from a
   coordinator.  The mechanism describe her is an augmentation to the
   one-touch mechanism described in [I-D.ietf-6tisch-minimal-security].

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-6tisch-dtsecurity-secure-join-01"/>
        </reference>
        <reference anchor="YANG-GUIDE">
          <front>
            <title>Guidelines for Authors and Reviewers of Documents Containing YANG Data Models</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman">
              <organization/>
            </author>
            <date month="October" year="2018"/>
            <abstract>
              <t>This memo provides guidelines for authors and reviewers of specifications containing YANG modules.  Recommendations and procedures are defined, which are intended to increase interoperability and usability of Network Configuration Protocol (NETCONF) and RESTCONF protocol implementations that utilize YANG modules.  This document obsoletes RFC 6087.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="216"/>
          <seriesInfo name="RFC" value="8407"/>
          <seriesInfo name="DOI" value="10.17487/RFC8407"/>
        </reference>
        <reference anchor="Stajano99theresurrecting" target="https://www.cl.cam.ac.uk/research/dtg/www/files/publications/public/files/tr.1999.2.pdf">
          <front>
            <title>The Resurrecting Duckling: Security Issues for Ad-Hoc Wireless Networks</title>
            <author initials="F." surname="Stajano" fullname="Frank Stajano">
              <organization/>
            </author>
            <author initials="R." surname="Anderson" fullname="Ross Anderson">
              <organization/>
            </author>
            <date year="1999"/>
          </front>
        </reference>
        <reference anchor="imprinting" target="https://en.wikipedia.org/w/index.php?title=Imprinting_(psychology)&amp;oldid=825757556">
          <front>
            <title>Wikipedia article: Imprinting</title>
            <author>
              <organization>Wikipedia</organization>
            </author>
            <date year="2018" month="February"/>
          </front>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgements" toc="default">
      <name>Acknowledgements</name>
      <t>The authors would like to thank for following for
lively discussions on list and in the halls (ordered
by last name): William Atwood, Toerless Eckert, and Sheng Jiang.</t>
      <t>Russ Housley provided the upgrade from PKCS7 to CMS (RFC 5652) along
with the detailed CMS structure diagram.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
