<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.18 (Ruby 2.6.6) -->
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<?rfc linkmailto="no"?>
<?rfc editing="no"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc rfcedstyle="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-anima-rfc8366bis-04" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.3 -->
  <front>
    <title abbrev="Voucher Artifact">A Voucher Artifact for Bootstrapping Protocols</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-anima-rfc8366bis-04"/>
    <author initials="K." surname="Watsen" fullname="Kent Watsen">
      <organization>Watsen Networks</organization>
      <address>
        <email>kent+ietf@watsen.net</email>
      </address>
    </author>
    <author initials="M." surname="Richardson" fullname="Michael C. Richardson">
      <organization>Sandelman Software</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
        <uri>http://www.sandelman.ca/</uri>
      </address>
    </author>
    <author initials="M." surname="Pritikin" fullname="Max Pritikin">
      <organization>Cisco Systems</organization>
      <address>
        <email>pritikin@cisco.com</email>
      </address>
    </author>
    <author initials="T." surname="Eckert" fullname="Toerless Eckert">
      <organization abbrev="Huawei">Futurewei Technologies Inc.</organization>
      <address>
        <postal>
          <street>2330 Central Expy</street>
          <city>Santa Clara</city>
          <code>95050</code>
          <country>United States of America</country>
        </postal>
        <email>tte+ietf@cs.fau.de</email>
      </address>
    </author>
    <author initials="Q." surname="Ma" fullname="Qiufang Ma">
      <organization>Huawei</organization>
      <address>
        <postal>
          <street>101 Software Avenue, Yuhua District</street>
          <city>Nanjing</city>
          <code>210012</code>
          <country>China</country>
        </postal>
        <email>maqiufang1@huawei.com</email>
      </address>
    </author>
    <date year="2023" month="January" day="17"/>
    <area>Operations</area>
    <workgroup>ANIMA Working Group</workgroup>
    <keyword>voucher</keyword>
    <abstract>
      <t>This document defines a strategy to securely assign a pledge to an owner
using an artifact signed, directly or indirectly, by the pledge's manufacturer.
This artifact is known as a "voucher".</t>
      <t>This document defines an artifact format as a YANG-defined JSON document
that has been signed using a Cryptographic Message Syntax (CMS) structure.
Other YANG-derived formats are possible.
The voucher artifact is normally generated by
the pledge's manufacturer (i.e., the Manufacturer Authorized Signing
Authority (MASA)).</t>
      <t>This document only defines the voucher artifact, leaving it to other
documents to describe specialized protocols for accessing it.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
  Autonomic Networking Integrated Model and Approach Working Group mailing list (anima@ietf.org),
  which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/anima/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
  <eref target="https://github.com/anima-wg/voucher"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>This document defines a strategy to securely assign a candidate device
(pledge) to an owner using an artifact signed, directly or indirectly,
by the pledge's manufacturer, i.e., the Manufacturer Authorized
Signing Authority (MASA).  This artifact is known as the "voucher".</t>
      <t>The voucher artifact is a JSON <xref target="RFC8259"/> document that
conforms with a data model described by YANG <xref target="RFC7950"/>, is
encoded using the rules defined in <xref target="RFC8259"/>, and
is signed using (by default) a CMS structure <xref target="RFC5652"/>.</t>
      <t>The primary purpose of a voucher is to securely convey a
certificate, the "pinned-domain-cert", that a pledge can
use to authenticate subsequent interactions. A voucher may be useful
in several contexts, but the driving motivation
herein is to support secure bootstrapping mechanisms.  Assigning
ownership is important to bootstrapping mechanisms so that the pledge
can authenticate the network that is trying to take control of it.</t>
      <t>The lifetimes of vouchers may vary. In some bootstrapping protocols,
the vouchers may include a nonce restricting them to a single use,
whereas the vouchers in other bootstrapping protocols may have an
indicated lifetime. In order to support long lifetimes, this document
recommends using short lifetimes with programmatic renewal, see
<xref target="renewal-over-revocation"/>.</t>
      <t>This document only defines the voucher artifact, leaving it to other
documents to describe specialized protocols for accessing it.
Some bootstrapping protocols using the voucher artifact defined in
this document include: <xref target="ZERO-TOUCH"/>, <xref target="SECUREJOIN"/>, and
<xref target="BRSKI"/>.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>This document uses the following terms:</t>
      <dl>
        <dt>Artifact:</dt>
        <dd>
          <t>Used throughout to represent the voucher as instantiated in the form
of a signed structure.</t>
        </dd>
        <dt>Domain:</dt>
        <dd>
          <t>The set of entities or infrastructure under common administrative
control.
The goal of the bootstrapping protocol is to enable a pledge to
discover and join a domain.</t>
        </dd>
        <dt>Imprint:</dt>
        <dd>
          <t>The process where a device obtains the cryptographic key material to
identify and trust future interactions with a network. This term is
taken from Konrad Lorenz's work in biology with new ducklings:
"during a critical period, the duckling would assume that anything
that looks like a mother duck is in fact their mother"
<xref target="Stajano99theresurrecting"/>. An equivalent for a device is to
obtain the fingerprint of the network's root certification authority
certificate. A device that imprints on an attacker suffers a similar
fate to a duckling that imprints on a hungry wolf. Imprinting is a
term from psychology and ethology, as described in <xref target="imprinting"/>.</t>
        </dd>
        <dt>Join Registrar (and Coordinator):</dt>
        <dd>
          <t>A representative of the domain that is configured, perhaps
autonomically, to decide whether a new device is allowed to join the
domain. The administrator of the domain interfaces with a join
registrar (and Coordinator) to control this process.
Typically, a join registrar is "inside" its domain. For simplicity,
this document often refers to this as just "registrar".</t>
        </dd>
        <dt>MASA (Manufacturer Authorized Signing Authority):</dt>
        <dd>
          <t>The entity that, for the purpose of this document, signs the
vouchers for a manufacturer's pledges.
In some bootstrapping protocols, the MASA may have an Internet
presence and be integral to the bootstrapping process, whereas in
other protocols the MASA may be an offline service that has no
active role in the bootstrapping process.</t>
        </dd>
        <dt>Owner:</dt>
        <dd>
          <t>The entity that controls the private key of the "pinned-domain-cert"
certificate conveyed by the voucher.</t>
        </dd>
        <dt>Pledge:</dt>
        <dd>
          <t>The prospective device attempting to find and securely join a
domain.
When shipped, it only trusts authorized representatives of the
manufacturer.</t>
        </dd>
        <dt>Registrar:</dt>
        <dd>
          <t>See join registrar.</t>
        </dd>
        <dt>TOFU (Trust on First Use):</dt>
        <dd>
          <t>Where a pledge device makes no security decisions but rather simply
trusts the first domain entity it is contacted by.
Used similarly to <xref target="RFC7435"/>.
This is also known as the "resurrecting duckling" model.</t>
        </dd>
        <dt>Voucher:</dt>
        <dd>
          <t>A signed statement from the MASA service that indicates to a pledge
the cryptographic identity of the domain it should trust.</t>
        </dd>
      </dl>
    </section>
    <section anchor="requirements-language">
      <name>Requirements Language</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="survey-of-voucher-types">
      <name>Survey of Voucher Types</name>
      <t>A voucher is a cryptographically protected statement to the pledge
device authorizing a zero-touch "imprint" on the join registrar of the
domain. The specific information a voucher provides is influenced by the
bootstrapping use case.</t>
      <t>The voucher can impart the following information to
the join registrar and pledge:</t>
      <dl>
        <dt>Assertion Basis:</dt>
        <dd>
          <t>Indicates the method that protects
the imprint (this is distinct from the voucher signature that
protects the voucher itself). This might include
manufacturer-asserted ownership verification, assured
logging operations, or reliance on pledge endpoint behavior
such as secure root of trust
of measurement. The join registrar might use this information.
Only some methods are normatively defined in this
document. Other methods are left for future work.</t>
        </dd>
        <dt>Authentication of Join Registrar:</dt>
        <dd>
          <t>Indicates how the pledge
can authenticate the join registrar.  This document defines
a mechanism to pin the domain certificate.
Pinning a symmetric key, a raw key, or "CN-ID" or "DNS-ID"
information (as defined in <xref target="RFC6125"/>) is left for future work.</t>
        </dd>
        <dt>Anti-Replay Protections:</dt>
        <dd>
          <t>Time- or nonce-based
information to constrain the voucher to time periods or bootstrap
attempts.</t>
        </dd>
      </dl>
      <t>A number of bootstrapping scenarios can be met using differing
combinations of this information. All scenarios address the primary
threat of a Man-in-The-Middle (MiTM) registrar gaining control over
the pledge device. The following combinations are "types" of vouchers:</t>
      <artwork><![CDATA[
             |Assertion   |Registrar ID    | Validity    |
Voucher      |Log-|Veri-  |Trust  |CN-ID or| RTC | Nonce |
Type         | ged|  fied |Anchor |DNS-ID  |     |       |
---------------------------------------------------------|
Audit        |  X |       | X     |        |     | X     |
-------------|----|-------|-------|--------|-----|-------|
Nonceless    |  X |       | X     |        | X   |       |
Audit        |    |       |       |        |     |       |
-------------|----|-------|-------|--------|-----|-------|
Owner Audit  |  X |   X   | X     |        | X   | X     |
-------------|----|-------|-------|--------|-----|-------|
Owner ID     |    |   X   | X     |  X     | X   |       |
-------------|----|-------|----------------|-----|-------|
Bearer       |  X |       |   wildcard     | optional    |
out-of-scope |    |       |                |             |
-------------|----|-------|----------------|-------------|

NOTE: All voucher types include a 'pledge ID serial-number'
      (not shown here for space reasons).
(XXX - translate me to markdown table)
]]></artwork>
      <dl>
        <dt>Audit Voucher:</dt>
        <dd>
          <t>An Audit Voucher is named after the logging assertion mechanisms
that the registrar then "audits" to enforce local policy. The
registrar mitigates a MiTM registrar by auditing that an unknown
MiTM registrar does not appear in the log entries. This does not
directly prevent the MiTM but provides a response mechanism that
ensures the MiTM is unsuccessful. The advantage is that actual
ownership knowledge is not required on the MASA service.</t>
        </dd>
        <dt>Nonceless Audit Voucher:</dt>
        <dd>
          <t>An Audit Voucher without a validity period statement. Fundamentally,
it is the same as an Audit Voucher except that it can be issued in
advance to support network partitions or to provide a permanent
voucher for remote deployments.</t>
        </dd>
        <dt>Ownership Audit Voucher:</dt>
        <dd>
          <t>An Audit Voucher where the MASA service has verified the registrar
as the authorized owner.
The MASA service mitigates a MiTM registrar by refusing to generate
Audit Vouchers for unauthorized registrars. The registrar uses audit
techniques to supplement the MASA. This provides an ideal sharing of
policy decisions and enforcement between the vendor and the owner.</t>
        </dd>
        <dt>Ownership ID Voucher:</dt>
        <dd>
          <t>Named after inclusion of the pledge's CN-ID or DNS-ID within the
voucher. The MASA service mitigates a MiTM registrar by identifying
the specific registrar (via WebPKI) authorized to own the pledge.</t>
        </dd>
        <dt>Bearer Voucher:</dt>
        <dd>
          <t>A Bearer Voucher is named after the inclusion of a registrar ID
wildcard. Because the registrar identity is not indicated, this
voucher type must be treated as a secret and protected from exposure
as any 'bearer' of the voucher can claim the pledge
device. Publishing a nonceless bearer voucher effectively turns the
specified pledge into a "TOFU" device with minimal mitigation
against MiTM registrars. Bearer vouchers are out of scope.</t>
        </dd>
      </dl>
    </section>
    <section anchor="voucher">
      <name>Voucher Artifact</name>
      <t>The voucher's primary purpose is to securely assign a pledge to an
owner.
The voucher informs the pledge which entity it should consider to be
its owner.</t>
      <t>This document defines a voucher that is a JSON-encoded instance of the
YANG module defined in <xref target="voucher-yang-module"/> that has been, by
default, CMS signed.</t>
      <t>This format is described here as a practical basis for some uses (such
as in NETCONF), but more to clearly indicate what vouchers look like
in practice.
This description also serves to validate the YANG data model.</t>
      <t>Future work is expected to define new mappings of the voucher to
Concise Binary Object Representation (CBOR) (from JSON) and to change
the signature container from CMS to JSON Object Signing and Encryption
(JOSE) or CBOR Object Signing and Encryption (COSE).
XML or ASN.1 formats are also conceivable.</t>
      <t>This document defines a media type and a filename extension for the
CMS-encoded JSON type.  Future documents on additional formats
would define additional media types.  Signaling is in the form of a MIME
Content-Type, an HTTP Accept: header, or more mundane methods like
use of a filename extension when a voucher is transferred on a USB
key.</t>
      <section anchor="voucher-tree-diagram">
        <name>Tree Diagram</name>
        <t>The following tree diagram illustrates a high-level view of a voucher
document.
The notation used in this diagram is described in <xref target="RFC8340"/>.
Each node in the diagram is fully described by the YANG module in
<xref target="voucher-yang-module"/>.
Please review the YANG module for a detailed description of the
voucher format.</t>
        <artwork><![CDATA[
module: ietf-voucher

  structure voucher:
    +-- voucher
       +-- created-on?                      yang:date-and-time
       +-- expires-on?                      yang:date-and-time
       +-- assertion?                       enumeration
       +-- serial-number                    string
       +-- idevid-issuer?                   binary
       +-- pinned-domain-cert?              binary
       +-- domain-cert-revocation-checks?   boolean
       +-- nonce?                           binary
       +-- pinned-domain-pubk?              binary
       +-- pinned-domain-pubk-sha256?       binary
       +-- last-renewal-date?               yang:date-and-time
]]></artwork>
      </section>
      <section anchor="voucher-examples">
        <name>Examples</name>
        <t>This section provides voucher examples for illustration
purposes.  These examples conform to the encoding rules
defined in <xref target="RFC8259"/>.</t>
        <t>The following example illustrates an ephemeral voucher (uses a nonce).
The MASA generated this voucher using the 'logged' assertion type, knowing
that it would be suitable for the pledge making the request.</t>
        <artwork><![CDATA[
{
  "ietf-voucher:voucher": {
    "created-on": "2016-10-07T19:31:42Z",
    "assertion": "logged",
    "serial-number": "JADA123456789",
    "idevid-issuer": "base64encodedvalue==",
    "pinned-domain-cert": "base64encodedvalue==",
    "nonce": "base64encodedvalue=="
  }
}
]]></artwork>
        <t>The following example illustrates a non-ephemeral voucher (no nonce).
While the voucher itself expires after two weeks, it presumably can
be renewed for up to a year.   The MASA generated this voucher
using the 'verified' assertion type, which should satisfy all pledges.</t>
        <artwork><![CDATA[
{
  "ietf-voucher:voucher": {
    "created-on": "2016-10-07T19:31:42Z",
    "expires-on": "2016-10-21T19:31:42Z",
    "assertion": "verified",
    "serial-number": "JADA123456789",
    "idevid-issuer": "base64encodedvalue==",
    "pinned-domain-cert": "base64encodedvalue==",
    "domain-cert-revocation-checks": "true",
    "last-renewal-date": "2017-10-07T19:31:42Z"
  }
}
]]></artwork>
      </section>
      <section anchor="voucher-yang-module">
        <name>YANG Module</name>
        <sourcecode type="yang" markers="true"><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

module ietf-voucher {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-voucher";
  prefix vch;

  import ietf-yang-types {
    prefix yang;
    reference
      "RFC 6991: Common YANG Data Types";
  }
  import ietf-yang-structure-ext {
    prefix sx;
  }

  organization
    "IETF ANIMA Working Group";
  contact
    "WG Web:   <https://datatracker.ietf.org/wg/anima/>
     WG List:  <mailto:anima@ietf.org>
     Author:   Kent Watsen
               <mailto:kwatsen@juniper.net>
     Author:   Max Pritikin
               <mailto:pritikin@cisco.com>
     Author:   Michael Richardson
               <mailto:mcr+ietf@sandelman.ca>
     Author:   Toerless Eckert
               <mailto:tte+ietf@cs.fau.de>";
  description
    "This module defines the format for a voucher, which is \
                                                          produced by
     a pledge's manufacturer or delegate (MASA) to securely assign a
     pledge to an 'owner', so that the pledge may establish a secure
     connection to the owner's network infrastructure.

     The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
     NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
     'MAY', and 'OPTIONAL' in this document are to be interpreted as
     described in BCP 14 (RFC 2119) (RFC 8174) when, and only when, \
                                                                 they
     appear in all capitals, as shown here.

     Copyright (c) 2018 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or \
                                                              without
     modification, is permitted pursuant to, and subject to the \
                                                              license
     terms contained in, the Simplified BSD License set forth in \
                                                              Section
     4.c of the IETF Trust's Legal Provisions Relating to IETF \
                                                            Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC 8366; see the \
                                                                  RFC
     itself for full legal notices.";

  revision 2023-01-10 {
    description
      "updated to support new assertion enumerated type";
    reference
      "RFC ZZZZ Voucher Profile for Bootstrapping Protocols";
  }

  // Top-level statement
  sx:structure voucher {
    uses voucher-artifact-grouping;
  }

  // Grouping defined for future augmentations

  grouping voucher-artifact-grouping {
    description
      "Grouping to allow reuse/extensions in future work.";
    container voucher {
      description
        "A voucher assigns a pledge to an owner (pinned-domain-cert)\
                                                                  .";
      leaf created-on {
        type yang:date-and-time;
        mandatory false;
        must 'not(../created-on-integer)';
        description
          "A value indicating the date this voucher was created.  \
                                                                 This
           node is primarily for human consumption and auditing. \
                                                               Future
           work MAY create verification requirements based on this
           node.";
      }
      leaf expires-on {
        type yang:date-and-time;
        must 'not(../nonce)';
        description
          "A value indicating when this voucher expires.  The node is
           optional as not all pledges support expirations, such as
           pledges lacking a reliable clock.

           If this field exists, then the pledges MUST ensure that
           the expires-on time has not yet passed. A pledge without
           an accurate clock cannot meet this requirement.

           The expires-on value MUST NOT exceed the expiration date
           of any of the listed 'pinned-domain-cert' certificates.";
      }
      leaf assertion {
        type enumeration {
          enum verified {
            value 0;
            description
              "Indicates that the ownership has been positively
               verified by the MASA (e.g., through sales channel
               integration).";
          }
          enum logged {
            value 1;
            description
              "Indicates that the voucher has been issued after
               minimal verification of ownership or control.  The
               issuance has been logged for detection of
               potential security issues (e.g., recipients of
               vouchers might verify for themselves that unexpected
               vouchers are not in the log).  This is similar to
               unsecured trust-on-first-use principles but with the
               logging providing a basis for detecting unexpected
               events.";
          }
          enum proximity {
            value 2;
            description
              "Indicates that the voucher has been issued after
               the MASA verified a proximity proof provided by the
               device and target domain.  The issuance has been \
                                                               logged
               for detection of potential security issues.  This is
               stronger than just logging, because it requires some
               verification that the pledge and owner are
               in communication but is still dependent on analysis of
               the logs to detect unexpected events.";
          }
        }
      }
      leaf serial-number {
        type string;
        mandatory true;
        description
          "The serial-number of the hardware.  When processing a
           voucher, a pledge MUST ensure that its serial-number
           matches this value.  If no match occurs, then the
           pledge MUST NOT process this voucher.";
      }
      leaf idevid-issuer {
        type binary;
        description
          "The Authority Key Identifier OCTET STRING (as defined in
           Section 4.2.1.1 of RFC 5280) from the pledge's IDevID
           certificate.  Optional since some serial-numbers are
           already unique within the scope of a MASA.
           Inclusion of the statistically unique key identifier
           ensures statistically unique identification of the \
                                                            hardware.
           When processing a voucher, a pledge MUST ensure that its
           IDevID Authority Key Identifier matches this value.  If no
           match occurs, then the pledge MUST NOT process this \
                                                             voucher.

           When issuing a voucher, the MASA MUST ensure that this \
                                                                field
           is populated for serial-numbers that are not otherwise \
                                                               unique
           within the scope of the MASA.";
      }
      leaf pinned-domain-cert {
        type binary;
        mandatory false;
        description
          "An X.509 v3 certificate structure, as specified by RFC \
                                                                5280,
           using Distinguished Encoding Rules (DER) encoding, as \
                                                              defined
           in ITU-T X.690.

           This certificate is used by a pledge to trust a Public Key
           Infrastructure in order to verify a domain certificate
           supplied to the pledge separately by the bootstrapping
           protocol.  The domain certificate MUST have this \
                                                          certificate
           somewhere in its chain of certificates.  This certificate
           MAY be an end-entity certificate, including a self-signed
           entity.";
        reference
          "RFC 5280:
             Internet X.509 Public Key Infrastructure Certificate
             and Certificate Revocation List (CRL) Profile.
           ITU-T X.690:
              Information technology - ASN.1 encoding rules:
              Specification of Basic Encoding Rules (BER),
              Canonical Encoding Rules (CER) and Distinguished
              Encoding Rules (DER).";
      }
      leaf domain-cert-revocation-checks {
        type boolean;
        description
          "A processing instruction to the pledge that it MUST (true)
           or MUST NOT (false) verify the revocation status for the
           pinned domain certificate.  If this field is not set, then
           normal PKIX behavior applies to validation of the domain
           certificate.";
      }
      leaf nonce {
        type binary {
          length "8..32";
        }
        must 'not(../expires-on)';
        description
          "A value that can be used by a pledge in some bootstrapping
           protocols to enable anti-replay protection.  This node is
           optional because it is not used by all bootstrapping
           protocols.

           When present, the pledge MUST compare the provided nonce
           value with another value that the pledge randomly \
                                                            generated
           and sent to a bootstrap server in an earlier bootstrapping
           message.  If the values do not match, then the pledge MUST
           NOT process this voucher.";
      }
      leaf pinned-domain-pubk {
        type binary;
        description
          "The pinned-domain-pubk may replace the
             pinned-domain-cert in constrained uses of
             the voucher. The pinned-domain-pubk
             is the Raw Public Key of the Registrar.
             This field is encoded as a Subject Public Key Info block
             as specified in RFC7250, in section 3.
             The ECDSA algorithm MUST be supported.
             The EdDSA algorithm as specified in
             draft-ietf-tls-rfc4492bis-17 SHOULD be supported.
             Support for the DSA algorithm is not recommended.
             Support for the RSA algorithm is a MAY.";
      }
      leaf pinned-domain-pubk-sha256 {
        type binary;
        description
          "The pinned-domain-pubk-sha256 is a second
             alternative to pinned-domain-cert.  In many cases the
             public key of the domain has already been transmitted
             during the key agreement process, and it is wasteful
             to transmit the public key another two times.
             The use of a hash of public key info, at 32-bytes for
             sha256 is a significant savings compared to an RSA
             public key, but is only a minor savings compared to
             a 256-bit ECDSA public-key.
             Algorithm agility is provided by extensions to this
             specification which can define a new leaf for another
             hash type.";
      }
      leaf last-renewal-date {
        type yang:date-and-time;
        must '../expires-on';
        description
          "The date that the MASA projects to be the last date it
           will renew a voucher on. This field is merely informative\
                                                                 ; it
           is not processed by pledges.

           Circumstances may occur after a voucher is generated that
           may alter a voucher's validity period.  For instance,
           a vendor may associate validity periods with support
           contracts, which may be terminated or extended
           over time.";
      }
    } // end voucher
  } // end voucher-grouping

}
]]></sourcecode>
      </section>
      <section anchor="ietf-voucher-sid-values">
        <name>ietf-voucher SID values</name>
        <t><xref target="RFC9148"/> explains how to serialize YANG into CBOR, and for this a series of SID values are required.
While <xref target="I-D.ietf-core-sid"/> defines the management process for these values, due to the immaturity  of the tooling around this YANG-SID mechanisms, the following values are considered normative.
It is believed, however, that they will not change.</t>
        <artwork><![CDATA[
           
      SID Assigned to
--------- -------------------------------------------------- 
     2451 data /ietf-voucher-constrained:voucher
     2452 data /ietf-voucher-constrained:voucher/assertion
     2453 data /ietf-voucher-constrained:voucher/created-on
     2454 data .../domain-cert-revocation-checks
     2455 data /ietf-voucher-constrained:voucher/expires-on
     2456 data /ietf-voucher-constrained:voucher/idevid-issuer
     2457 data .../last-renewal-date
     2458 data /ietf-voucher-constrained:voucher/nonce
     2459 data .../pinned-domain-cert
     2460 data .../pinned-domain-pubk
     2461 data .../pinned-domain-pubk-sha256
     2462 data /ietf-voucher-constrained:voucher/serial-number
           
 WARNING, obsolete definitions
]]></artwork>
        <t>The "assertion" attribute is an enumerated type <xref target="RFC8366"/>, and the current PYANG tooling does not document the valid values for this attribute.
In the JSON serialization, the literal strings from the enumerated types are used so there is no ambiguity.
In the CBOR serialization, a small integer is used.
This following values are documented here, but the YANG module should be considered authoritative. No IANA registry is provided or necessary because the YANG module provides for extensions.</t>
        <table anchor="assertion-enums">
          <name>CBOR integers for the "assertion" attribute enum</name>
          <thead>
            <tr>
              <th align="left">Integer</th>
              <th align="left">Assertion Type</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">0</td>
              <td align="left">verified</td>
            </tr>
            <tr>
              <td align="left">1</td>
              <td align="left">logged</td>
            </tr>
            <tr>
              <td align="left">2</td>
              <td align="left">proximity</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="cms-voucher">
        <name>CMS Format Voucher Artifact</name>
        <t>The IETF evolution of PKCS#7 is CMS <xref target="RFC5652"/>.
A CMS-signed voucher, the default type, contains a ContentInfo
structure with the voucher content. An eContentType of 40
indicates that the content is a JSON-encoded voucher.</t>
        <t>The signing structure is a CMS SignedData structure, as specified by
Section 5.1 of <xref target="RFC5652"/>, encoded using ASN.1 Distinguished Encoding
Rules (DER), as specified in ITU-T X.690 <xref target="ITU-T.X690.2015"/>.</t>
        <t>To facilitate interoperability, <xref target="vcj"/> in this document registers the
media type "application/voucher-cms+json" and the filename extension
".vcj".</t>
        <t>The CMS structure <bcp14>MUST</bcp14> contain a 'signerInfo' structure, as
described in Section 5.1 of <xref target="RFC5652"/>, containing the
signature generated over the content using a private key
trusted by the recipient. Normally, the recipient is the pledge and the
signer is the MASA. Another possible use could be as a "signed
voucher request" format originating from the pledge or registrar
toward the MASA.
Within this document, the signer is assumed to be the MASA.</t>
        <t>Note that Section 5.1 of <xref target="RFC5652"/> includes a
discussion about how to validate a CMS object, which is really a
PKCS7 object (cmsVersion=1).  Intermediate systems (such the
Bootstrapping Remote Secure Key Infrastructures <xref target="BRSKI"/> registrar)
that might need to evaluate the voucher in flight <bcp14>MUST</bcp14> be prepared for
such an older format.
No signaling is necessary, as the manufacturer knows the capabilities
of the pledge and will use an appropriate format voucher for each
pledge.</t>
        <t>The CMS structure <bcp14>SHOULD</bcp14> also contain all of the certificates
leading up to and including the signer's trust anchor certificate
known to the recipient.  The inclusion of the trust anchor is
unusual in many applications, but third parties cannot accurately
audit the transaction without it.</t>
        <t>The CMS structure <bcp14>MAY</bcp14> also contain revocation objects for any
intermediate certificate authorities (CAs) between the
voucher issuer and the trust anchor known to the recipient.
However, the use of CRLs and other validity mechanisms is
discouraged, as the pledge is unlikely to be able to perform
online checks and is unlikely to have a trusted clock source.
As described below, the use of short-lived vouchers and/or a
pledge-provided nonce provides a freshness guarantee.</t>
      </section>
    </section>
    <section anchor="voucher-request">
      <name>Voucher Request Artifact</name>
      <t><xref section="3" sectionFormat="comma" target="BRSKI"/> defined a Voucher-Request Artifact as an augmented artifact from the Voucher Artifact originally defined in <xref target="RFC8366"/>.
That definition has been moved to this document, and translated from YANG-DATA <xref target="RFC8040"/> to the SX:STRUCTURE extension <xref target="RFC8971"/>.</t>
      <section anchor="voucher-request-tree-diagram">
        <name>Tree Diagram</name>
        <t>The following tree diagram illustrates a high-level view of a voucher
request document.
The notation used in this diagram is described in <xref target="RFC8340"/>.
Each node in the diagram is fully described by the YANG module in
<xref target="voucher-request-yang-module"/>.</t>
        <artwork><![CDATA[
module: ietf-voucher-request

  structure voucher:
    +-- voucher
       +-- created-on?
       |       yang:date-and-time
       +-- expires-on?
       |       yang:date-and-time
       +-- assertion?                                 enumeration
       +-- serial-number                              string
       +-- idevid-issuer?                             binary
       +-- pinned-domain-cert?                        binary
       +-- domain-cert-revocation-checks?             boolean
       +-- nonce?                                     binary
       +-- pinned-domain-pubk?                        binary
       +-- pinned-domain-pubk-sha256?                 binary
       +-- last-renewal-date?
       |       yang:date-and-time
       +-- prior-signed-voucher-request?              binary
       +-- proximity-registrar-cert?                  binary
       +-- proximity-registrar-pubk?                  binary
       +-- proximity-registrar-pubk-sha256?           binary
       +-- agent-signed-data?                         binary
       +-- agent-provided-proximity-registrar-cert?   binary
       +-- agent-sign-cert?                           binary
]]></artwork>
      </section>
      <section anchor="voucher-request-yang-module">
        <name>"ietf-voucher-request" Module</name>
        <t>The ietf-voucher-request YANG module is derived from the ietf-voucher module.</t>
        <sourcecode type="yang" markers="true"><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

module ietf-voucher-request {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-voucher-request";
  prefix vcr;

  import ietf-yang-structure-ext {
    prefix sx;
  }
  import ietf-voucher {
    prefix vch;
    description
      "This module defines the format for a voucher,
       which is produced by a pledge's manufacturer or
       delegate (MASA) to securely assign a pledge to
       an 'owner', so that the pledge may establish a secure
       connection to the owner's network infrastructure";
    reference
      "RFC 8366: Voucher Artifact for
       Bootstrapping Protocols";
  }

  organization
    "IETF ANIMA Working Group";
  contact
    "WG Web:   <https://datatracker.ietf.org/wg/anima/>
     WG List:  <mailto:anima@ietf.org>
     Author:   Kent Watsen
               <mailto:kent+ietf@watsen.net>
     Author:   Michael H. Behringer
               <mailto:Michael.H.Behringer@gmail.com>
     Author:   Toerless Eckert
               <mailto:tte+ietf@cs.fau.de>
     Author:   Max Pritikin
               <mailto:pritikin@cisco.com>
     Author:   Michael Richardson
               <mailto:mcr+ietf@sandelman.ca>";
  description
    "This module defines the format for a voucher request.
     It is a superset of the voucher itself.
     It provides content to the MASA for consideration
     during a voucher request.

     The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
     NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
     'MAY', and 'OPTIONAL' in this document are to be interpreted as
     described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
     they appear in all capitals, as shown here.

     Copyright (c) 2019 IETF Trust and the persons identified as
     authors of the code. All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject
     to the license terms contained in, the Simplified BSD License
     set forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (http://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC XXXX; see the \
                                                                  RFC
     itself for full legal notices.";

  revision 2023-01-10 {
    description
      "Initial version";
    reference
      "RFC XXXX: Bootstrapping Remote Secure Key Infrastructure";
  }

  // Top-level statement
  sx:structure voucher {
    uses voucher-request-grouping;
  }

  // Grouping defined for future usage

  grouping voucher-request-grouping {
    description
      "Grouping to allow reuse/extensions in future work.";
    uses vch:voucher-artifact-grouping {
      refine "voucher/created-on" {
        mandatory false;
      }
      refine "voucher/pinned-domain-cert" {
        mandatory false;
        description
          "A pinned-domain-cert field
           is not valid in a voucher request, and
           any occurrence MUST be ignored";
      }
      refine "voucher/last-renewal-date" {
        description
          "A last-renewal-date field
           is not valid in a voucher request, and
           any occurrence MUST be ignored";
      }
      refine "voucher/domain-cert-revocation-checks" {
        description
          "The domain-cert-revocation-checks field
           is not valid in a voucher request, and
           any occurrence MUST be ignored";
      }
      refine "voucher/assertion" {
        mandatory false;
        description
          "Any assertion included in registrar voucher
           requests SHOULD be ignored by the MASA.";
      }
      augment "voucher" {
        description
          "Adds leaf nodes appropriate for requesting vouchers.";
        leaf prior-signed-voucher-request {
          type binary;
          description
            "If it is necessary to change a voucher, or re-sign and
             forward a voucher that was previously provided along a
             protocol path, then the previously signed voucher SHOULD
             be included in this field.

             For example, a pledge might sign a voucher request
             with a proximity-registrar-cert, and the registrar
             then includes it as the prior-signed-voucher-request
             field.  This is a simple mechanism for a chain of
             trusted parties to change a voucher request, while
             maintaining the prior signature information.

             The Registrar and MASA MAY examine the prior signed
             voucher information for the
             purposes of policy decisions. For example this
             information could be useful to a MASA to determine
             that both pledge and registrar agree on proximity
             assertions. The MASA SHOULD remove all
             prior-signed-voucher-request information when
             signing a voucher for imprinting so as to minimize
             the final voucher size.";
        }
        leaf proximity-registrar-cert {
          type binary;
          description
            "An X.509 v3 certificate structure as specified by
             RFC 5280, Section 4 encoded using the ASN.1
             distinguished encoding rules (DER), as specified
             in [ITU.X690.1994].

             The first certificate in the Registrar TLS server
             certificate_list sequence  (the end-entity TLS
             certificate, see [RFC8446]) presented by the Registrar
             to the Pledge.
             This MUST be populated in a Pledge's voucher request
             when a proximity assertion is requested.";
        }
        leaf proximity-registrar-pubk {
          type binary;
          description
            "The proximity-registrar-pubk replaces
             the proximity-registrar-cert in constrained uses of
             the voucher-request.
             The proximity-registrar-pubk is the
             Raw Public Key of the Registrar. This field is encoded
             as specified in RFC7250, section 3.
             The ECDSA algorithm MUST be supported.
             The EdDSA algorithm as specified in
             draft-ietf-tls-rfc4492bis-17 SHOULD be supported.
             Support for the DSA algorithm is not recommended.
             Support for the RSA algorithm is a MAY, but due to
             size is discouraged.";
        }
        leaf proximity-registrar-pubk-sha256 {
          type binary;
          description
            "The proximity-registrar-pubk-sha256
             is an alternative to both
             proximity-registrar-pubk and pinned-domain-cert.
             In many cases the public key of the domain has already
             been transmitted during the key agreement protocol,
             and it is wasteful to transmit the public key another
             two times.
             The use of a hash of public key info, at 32-bytes for
             sha256 is a significant savings compared to an RSA
             public key, but is only a minor savings compared to
             a 256-bit ECDSA public-key.
             Algorithm agility is provided by extensions to this
             specification which may define a new leaf for another
             hash type.";
        }
        leaf agent-signed-data {
          type binary;
          description
            "The agent-signed-data field contains a JOSE [RFC7515]
             object provided by the Registrar-Agent to the Pledge.

             This artifact is signed by the Registrar-Agent
             and contains a copy of the pledge's serial-number.";
        }
        leaf agent-provided-proximity-registrar-cert {
          type binary;
          description
            "An X.509 v3 certificate structure, as specified by
             RFC 5280, Section 4, encoded using the ASN.1
             distinguished encoding rules (DER), as specified
             in ITU X.690.
             The first certificate in the registrar TLS server
             certificate_list sequence (the end-entity TLS
             certificate; see RFC 8446) presented by the
             registrar to the registrar-agent and provided to
             the pledge.
             This MUST be populated in a pledge's voucher-request
             when an agent-proximity assertion is requested.";
          reference
            "ITU X.690: Information Technology - ASN.1 encoding
             rules: Specification of Basic Encoding Rules (BER),
             Canonical Encoding Rules (CER) and Distinguished
             Encoding Rules (DER)
             RFC 5280: Internet X.509 Public Key Infrastructure
             Certificate and Certificate Revocation List (CRL)
             Profile
             RFC 8446: The Transport Layer Security (TLS)
             Protocol Version 1.3";
        }
        leaf agent-sign-cert {
          type binary;
          description
            "An X.509 v3 certificate structure, as specified by
             RFC 5280, Section 4, encoded using the ASN.1
             distinguished encoding rules (DER), as specified
             in ITU X.690.
             This certificate can be used by the pledge,
             the registrar, and the MASA to verify the signature
             of agent-signed-data. It is an optional component
             for the pledge-voucher request.
             This MUST be populated in a registrar's
             voucher-request when an agent-proximity assertion
             is requested.";
          reference
            "ITU X.690: Information Technology - ASN.1 encoding
             rules: Specification of Basic Encoding Rules (BER),
             Canonical Encoding Rules (CER) and Distinguished
             Encoding Rules (DER)
             RFC 5280: Internet X.509 Public Key Infrastructure
             Certificate and Certificate Revocation List (CRL)
             Profile";
        }
      }
    }
  }
}
]]></sourcecode>
      </section>
      <section anchor="voucher-request-sid-values">
        <name>ietf-voucher-request SID values</name>
        <t><xref target="RFC9148"/> explains how to serialize YANG into CBOR, and for this a series of SID values are required.
While <xref target="I-D.ietf-core-sid"/> defines the management process for these values, due to the immaturity  of the tooling around this YANG-SID mechanisms, the following values are considered normative.
It is believed, however, that they will not change.</t>
        <artwork><![CDATA[
           
      SID Assigned to
--------- -------------------------------------------------- 
     2501 data /ietf-voucher-request:voucher/voucher
     2515 data .../agent-provided-proximity-registrar-cert
     2516 data .../agent-sign-cert
     2517 data .../agent-signed-data
     2502 data /ietf-voucher-request:voucher/voucher/assertion
     2503 data /ietf-voucher-request:voucher/voucher/created-on
     2504 data .../domain-cert-revocation-checks
     2505 data /ietf-voucher-request:voucher/voucher/expires-on
     2506 data .../idevid-issuer
     2507 data .../last-renewal-date
     2508 data /ietf-voucher-request:voucher/voucher/nonce
     2509 data .../pinned-domain-cert
     2518 data .../pinned-domain-pubk
     2519 data .../pinned-domain-pubk-sha256
     2510 data .../prior-signed-voucher-request
     2511 data .../proximity-registrar-cert
     2513 data .../proximity-registrar-pubk
     2512 data .../proximity-registrar-pubk-sha256
     2514 data .../serial-number
           
 WARNING, obsolete definitions
]]></artwork>
        <t>The "assertion" attribute is an enumerated type, and has values as defined above in <xref target="assertion-enums"/>.</t>
      </section>
    </section>
    <section anchor="design-con">
      <name>Design Considerations</name>
      <section anchor="renewal-over-revocation">
        <name>Renewals Instead of Revocations</name>
        <t>The lifetimes of vouchers may vary.  In some bootstrapping protocols,
the vouchers may be created and consumed immediately, whereas in other
bootstrapping solutions, there may be a significant time delay between
when a voucher is created and when it is consumed.
In cases when there is a time delay, there is a need for the pledge
to ensure that the assertions made when the voucher was created are
still valid.</t>
        <t>A revocation artifact is generally used to verify the continued validity
of an assertion such as a PKIX certificate, web token, or a "voucher".  With
this approach, a potentially long-lived assertion is paired with a reasonably
fresh revocation status check to ensure that the assertion is still valid.
However, this approach increases solution complexity, as it introduces the
need for additional protocols and code paths to distribute and process the
revocations.</t>
        <t>Addressing the shortcomings of revocations, this document recommends
instead the use of lightweight renewals of short-lived non-revocable
vouchers.  That is, rather than issue a long-lived voucher, where the
'expires-on' leaf is set to some distant date, the expectation
is for the MASA to instead issue a short-lived voucher, where the
'expires-on' leaf is set to a relatively near date, along with a promise
(reflected in the 'last-renewal-date' field) to reissue the voucher again
when needed.  Importantly, while issuing the initial voucher may incur
heavyweight verification checks ("Are you who you say you are?" "Does the
pledge actually belong to you?"), reissuing the voucher should be a
lightweight process, as it ostensibly only updates the voucher's
validity period.
With this approach, there is
only the one artifact, and only one code path is needed to process
it; there is no possibility of a pledge choosing to skip the
revocation status check because, for instance, the OCSP Responder is
not reachable.</t>
        <t>While this document recommends issuing short-lived vouchers, the
voucher artifact does not restrict the ability to create long-lived
voucher, if required; however, no revocation method is described.</t>
        <t>Note that a voucher may be signed by a chain of intermediate CAs
leading up to the trust anchor certificate known by the pledge.  Even
though the voucher itself is not revocable, it may still be revoked,
per se, if one of the intermediate CA certificates is revoked.</t>
      </section>
      <section anchor="voucher-per-pledge">
        <name>Voucher Per Pledge</name>
        <t>The solution described herein originally enabled a single voucher to
apply to many pledges, using lists of regular expressions to represent
ranges of serial-numbers.  However, it was determined that blocking the
renewal of a voucher that applied to many devices would be excessive
when only the ownership for a single pledge needed to be blocked.
Thus, the voucher format now only supports a single serial-number
to be listed.</t>
      </section>
    </section>
    <section anchor="sec-con">
      <name>Security Considerations</name>
      <section anchor="clock-sensitivity">
        <name>Clock Sensitivity</name>
        <t>An attacker could use an expired voucher to gain control over
a device that has no understanding of time.  The device cannot
trust NTP as a time reference, as an attacker could control
the NTP stream.</t>
        <t>There are three things to defend against this: 1) devices are
required to verify that the expires-on field has not yet passed,
2) devices without access to time can use nonces to
get ephemeral vouchers, and 3) vouchers without expiration times
may be used, which will appear in the audit log, informing the
security decision.</t>
        <t>This document defines a voucher format that contains time values
for expirations, which require an accurate clock
in order to be processed correctly.  Vendors planning on
issuing vouchers with expiration values must ensure that devices
have an accurate clock when shipped from manufacturing
facilities and take steps to prevent clock tampering.
If it is not possible to ensure clock accuracy, then
vouchers with expirations should not be issued.</t>
      </section>
      <section anchor="protect-voucher-pki-in-hsm">
        <name>Protect Voucher PKI in HSM</name>
        <t>Pursuant the recommendation made in Section 6.1 for the MASA to be
deployed as an online voucher signing service, it is <bcp14>RECOMMENDED</bcp14> that
the MASA's private key used for signing vouchers is protected by
a hardware security module (HSM).</t>
      </section>
      <section anchor="test-domain-certificate-validity-when-signing">
        <name>Test Domain Certificate Validity When Signing</name>
        <t>If a domain certificate is compromised, then any outstanding
vouchers for that domain could be used by the attacker.  The domain
administrator is clearly expected to initiate revocation of any
domain identity certificates (as is normal in PKI solutions).</t>
        <t>Similarly, they are expected to contact the MASA to indicate that
an outstanding (presumably short lifetime) voucher should be blocked from
automated renewal.
Protocols for voucher distribution are
<bcp14>RECOMMENDED</bcp14> to check for revocation of domain identity certificates
before the signing of vouchers.</t>
      </section>
      <section anchor="yang-module-security-considerations">
        <name>YANG Module Security Considerations</name>
        <t>The YANG module specified in this document defines the schema
for data that is subsequently encapsulated by a CMS signed-data
content type, as described in Section 5 of <xref target="RFC5652"/>.  As such,
all of the YANG modeled data is protected from modification.</t>
        <t>Implementations should be aware that the signed data is only
protected from external modification; the data is still visible.
This potential disclosure of information doesn't affect security
so much as privacy.  In particular, adversaries can glean
information such as which devices belong to which organizations
and which CRL Distribution Point and/or OCSP Responder URLs are
accessed to validate the vouchers.  When privacy is important,
the CMS signed-data content type <bcp14>SHOULD</bcp14> be encrypted, either by
conveying it via a mutually authenticated secure transport protocol
(e.g., TLS <xref target="RFC5246"/>) or by encapsulating the signed-data
content type with an enveloped-data content type (Section 6
of <xref target="RFC5652"/>), though details for how to do this are outside
the scope of this document.</t>
        <t>The use of YANG to define data structures, via the 'yang-data'
statement, is relatively new and distinct from the traditional use of
YANG to define an API accessed by network management protocols such as
NETCONF <xref target="RFC6241"/> and RESTCONF <xref target="RFC8040"/>. For this reason, these
guidelines do not follow template described by Section 3.7 of
<xref target="YANG-GUIDE"/>.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This section deals with actions and processes necessary for IANA to undertake to maintain
the "iana-voucher-assertion-type" YANG module.
The iana-voucher-assertion-type YANG module is intended to reflect the "voucher assertion types" registry in [TBD].</t>
      <t>IANA is asked to create the "iana-voucher-assertion-type YANG module" registry.</t>
      <t>Voucher assertion types must not be directly added to the iana-voucher-type YANG module.
They must instead be added to the "voucher assertion types" registry.</t>
      <t>Whenever a new enumerated type is added to the "voucher assertion types" registry, IANA
must also update the "ietf-voucher-assertion-type" YANG module and add a new "enum"
statement to the "voucher-assertion-type" type.
The assigned name defined by the "enum" statement <bcp14>SHALL</bcp14> be the same as the mnemonic name of the new assertion type.
The following substatements to the "enum" statement <bcp14>SHALL</bcp14> be defined:</t>
      <ul empty="true">
        <li>
          <dl>
            <dt>"value":</dt>
            <dd>
              <t>Use the decimal value from the registry.</t>
            </dd>
            <dt>"status":</dt>
            <dd>
              <t>Include only if a class or type registration has been deprecated or obsoleted.
IANA "deprecated" maps to YANG status "deprecated", and IANA "obsolete" maps to YANG status   "obsolete".</t>
            </dd>
            <dt>"description":</dt>
            <dd>
              <t>Replicate the corresponding information from the registry, namely the full name of the new assertion type.</t>
            </dd>
            <dt>"reference":</dt>
            <dd>
              <t>Replicate the reference(s) from the registry.</t>
            </dd>
          </dl>
        </li>
      </ul>
      <t>Each time the "iana-voucher-assertion-type" YANG module is updated, a new "revision" statement <bcp14>SHALL</bcp14> be added before the existing "revision" statements.
IANA has added this note to the "voucher assertion types" registries:</t>
      <t>When this registry is modified, the YANG module "iana-voucher-assertion-type" must
be updated as defined in [RFCXXXX].
The "Reference" text in the "voucher assertion types" registry has been updated
as follows:
OLD:
| <xref target="RFC8366"/>
NEW:
| [RFC8366][RFCXXX]</t>
      <section anchor="the-ietf-xml-registry">
        <name>The IETF XML Registry</name>
        <t>This document registers two URIs in the "IETF XML Registry" <xref target="RFC3688"/>.</t>
        <t>IANA has registered the following:</t>
        <ul empty="true">
          <li>
            <dl spacing="compact">
              <dt>URI:</dt>
              <dd>
                <t>urn:ietf:params:xml:ns:yang:ietf-voucher</t>
              </dd>
              <dt>Registrant Contact:</dt>
              <dd>
                <t>The ANIMA WG of the IETF.</t>
              </dd>
              <dt>XML:</dt>
              <dd>
                <t>N/A, the requested URI is an XML namespace.</t>
              </dd>
            </dl>
          </li>
        </ul>
        <t>IANA is asked to register a second URI as follows:</t>
        <ul empty="true">
          <li>
            <dl spacing="compact">
              <dt>URI:</dt>
              <dd>
                <t>urn:ietf:params:xml:ns:yang:iana-voucher-assertion-type</t>
              </dd>
              <dt>Registrant Contact:</dt>
              <dd>
                <t>The ANIMA WG of the IETF.</t>
              </dd>
              <dt>XML:</dt>
              <dd>
                <t>N/A, the requested URI is an XML namespace.</t>
              </dd>
            </dl>
          </li>
        </ul>
      </section>
      <section anchor="the-yang-module-names-registry">
        <name>The YANG Module Names Registry</name>
        <t>This document registers two YANG module in the "YANG Module Names"
registry <xref target="RFC6020"/>.</t>
        <t>IANA is asked to registrar the following:</t>
        <ul empty="true">
          <li>
            <dl spacing="compact">
              <dt>name:</dt>
              <dd>
                <t>ietf-voucher</t>
              </dd>
              <dt>namespace:</dt>
              <dd>
                <t>urn:ietf:params:xml:ns:yang:ietf-voucher</t>
              </dd>
              <dt>prefix:</dt>
              <dd>
                <t>vch</t>
              </dd>
            </dl>
            <t>reference:
  :RFC 8366</t>
          </li>
        </ul>
        <t>IANA is asked to register a second YANG module as follows:</t>
        <ul empty="true">
          <li>
            <dl spacing="compact">
              <dt>name:</dt>
              <dd>
                <t>iana-voucher-assertion-type</t>
              </dd>
              <dt>namespace:</dt>
              <dd>
                <t>urn:ietf:params:xml:ns:yang:iana-voucher-assertion-type</t>
              </dd>
              <dt>prefix:</dt>
              <dd>
                <t>ianavat</t>
              </dd>
              <dt>reference:</dt>
              <dd>
                <t>RFC XXXX</t>
              </dd>
            </dl>
          </li>
        </ul>
      </section>
      <section anchor="vcj">
        <name>The Media Types Registry</name>
        <t>This document requests IANA to update the following "Media Types" entry to point to the RFC number that will be assigned to this document:</t>
        <dl>
          <dt>Type name:</dt>
          <dd>
            <t>application</t>
          </dd>
          <dt>Subtype name:</dt>
          <dd>
            <t>voucher-cms+json</t>
          </dd>
          <dt>Required parameters:</dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>Optional parameters:</dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>Encoding considerations:</dt>
          <dd>
            <t>CMS-signed JSON vouchers are ASN.1/DER encoded.</t>
          </dd>
          <dt>Security considerations:</dt>
          <dd>
            <t>See <xref target="sec-con"/></t>
          </dd>
          <dt>Interoperability considerations:</dt>
          <dd>
            <t>The format is designed to be broadly interoperable.</t>
          </dd>
          <dt>Published specification:</dt>
          <dd>
            <t>RFC 8366</t>
          </dd>
          <dt>Applications that use this media type:</dt>
          <dd>
            <t>ANIMA, 6tisch, and NETCONF zero-touch imprinting systems.</t>
          </dd>
          <dt>Fragment identifier considerations:</dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>Additional information:</dt>
          <dd>
            <dl>
              <dt>Deprecated alias names for this type:</dt>
              <dd>
                <t>none</t>
              </dd>
              <dt>Magic number(s):</dt>
              <dd>
                <t>None</t>
              </dd>
              <dt>File extension(s):</dt>
              <dd>
                <t>.vcj</t>
              </dd>
              <dt>Macintosh file type code(s):</dt>
              <dd>
                <t>none</t>
              </dd>
            </dl>
          </dd>
          <dt>Person and email address to contact for further information:</dt>
          <dd>
            <t>IETF ANIMA WG</t>
          </dd>
          <dt>Intended usage:</dt>
          <dd>
            <t>LIMITED</t>
          </dd>
          <dt>Restrictions on usage:</dt>
          <dd>
            <t>NONE</t>
          </dd>
          <dt>Author:</dt>
          <dd>
            <t>ANIMA WG</t>
          </dd>
          <dt>Change controller:</dt>
          <dd>
            <t>IETF</t>
          </dd>
          <dt>Provisional registration? (standards tree only):</dt>
          <dd>
            <t>NO</t>
          </dd>
        </dl>
      </section>
      <section anchor="the-smi-security-for-smime-cms-content-type-registry">
        <name>The SMI Security for S/MIME CMS Content Type Registry</name>
        <t>This document requests IANA to update this  registered OID in the "SMI Security for S/MIME CMS Content Type (1.2.840.113549.1.9.16.1)" registry to point to the RFC number to be assigned to this document:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Decimal</th>
              <th align="left">Description</th>
              <th align="left">References</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">40</td>
              <td align="left">id-ct-animaJSONVoucher</td>
              <td align="left">RFC 8366</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC5652">
          <front>
            <title>Cryptographic Message Syntax (CMS)</title>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the Cryptographic Message Syntax (CMS).  This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="70"/>
          <seriesInfo name="RFC" value="5652"/>
          <seriesInfo name="DOI" value="10.17487/RFC5652"/>
        </reference>
        <reference anchor="RFC6020">
          <front>
            <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund">
              <organization/>
            </author>
            <date month="October" year="2010"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6020"/>
          <seriesInfo name="DOI" value="10.17487/RFC6020"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray">
              <organization/>
            </author>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format.  It was derived from the ECMAScript Programming Language Standard.  JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC7950">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund">
              <organization/>
            </author>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols.  This document describes the syntax and semantics of version 1.1 of the YANG language.  YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification.  There are a small number of backward incompatibilities from YANG version 1.  This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="I-D.ietf-core-sid">
          <front>
            <title>YANG Schema Item iDentifier (YANG SID)</title>
            <author fullname="Michel Veillette" initials="M." surname="Veillette">
              <organization>Trilliant Networks Inc.</organization>
            </author>
            <author fullname="Alexander Pelov" initials="A." surname="Pelov">
              <organization>Acklio</organization>
            </author>
            <author fullname="Ivaylo Petrov" initials="I." surname="Petrov">
              <organization>Google Switzerland GmbH</organization>
            </author>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date day="26" month="July" year="2022"/>
            <abstract>
              <t>   YANG Schema Item iDentifiers (YANG SID) are globally unique 63-bit
   unsigned integers used to identify YANG items, as a more compact
   method to identify YANG items that can be used for efficiency and in
   constrained environments (RFC 7228).  This document defines the
   semantics, the registration, and assignment processes of YANG SIDs
   for IETF managed YANG modules.  To enable the implementation of these
   processes, this document also defines a file format used to persist
   and publish assigned YANG SIDs.


   // The present version (-19) adds in draft text about objectives,
   // parties, and roles.  This attempts to record discussions at side
   // meetings before, at, and after IETF 113.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-sid-19"/>
        </reference>
        <reference anchor="RFC9148">
          <front>
            <title>EST-coaps: Enrollment over Secure Transport with the Secure Constrained Application Protocol</title>
            <author fullname="P. van der Stok" initials="P." surname="van der Stok">
              <organization/>
            </author>
            <author fullname="P. Kampanakis" initials="P." surname="Kampanakis">
              <organization/>
            </author>
            <author fullname="M. Richardson" initials="M." surname="Richardson">
              <organization/>
            </author>
            <author fullname="S. Raza" initials="S." surname="Raza">
              <organization/>
            </author>
            <date month="April" year="2022"/>
            <abstract>
              <t>Enrollment over Secure Transport (EST) is used as a certificate provisioning protocol over HTTPS. Low-resource devices often use the lightweight Constrained Application Protocol (CoAP) for message exchanges. This document defines how to transport EST payloads over secure CoAP (EST-coaps), which allows constrained devices to use existing EST functionality for provisioning certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9148"/>
          <seriesInfo name="DOI" value="10.17487/RFC9148"/>
        </reference>
        <reference anchor="ITU-T.X690.2015" target="https://www.itu.int/rec/T-REC-X.690/">
          <front>
            <title>Information Technology - ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author>
              <organization>International Telecommunication Union</organization>
            </author>
            <date year="2015" month="August"/>
          </front>
          <seriesInfo name="ITU-T Recommendation X.690," value="ISO/IEC 8825-1"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks">
              <organization/>
            </author>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol.  The TLS protocol provides communications security over the Internet.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC3688">
          <front>
            <title>The IETF XML Registry</title>
            <author fullname="M. Mealling" initials="M." surname="Mealling">
              <organization/>
            </author>
            <date month="January" year="2004"/>
            <abstract>
              <t>This document describes an IANA maintained registry for IETF standards which use Extensible Markup Language (XML) related items such as Namespaces, Document Type Declarations (DTDs), Schemas, and Resource Description Framework (RDF) Schemas.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="81"/>
          <seriesInfo name="RFC" value="3688"/>
          <seriesInfo name="DOI" value="10.17487/RFC3688"/>
        </reference>
        <reference anchor="RFC6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed">
              <organization/>
            </author>
            <author fullname="J. Klensin" initials="J." surname="Klensin">
              <organization/>
            </author>
            <author fullname="T. Hansen" initials="T." surname="Hansen">
              <organization/>
            </author>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols.  This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns">
              <organization/>
            </author>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund">
              <organization/>
            </author>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder">
              <organization/>
            </author>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman">
              <organization/>
            </author>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices.  It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages.  The NETCONF protocol operations are realized as remote procedure calls (RPCs).  This document obsoletes RFC 4741.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman">
              <organization/>
            </author>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund">
              <organization/>
            </author>
            <author fullname="K. Watsen" initials="K." surname="Watsen">
              <organization/>
            </author>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC8340">
          <front>
            <title>YANG Tree Diagrams</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund">
              <organization/>
            </author>
            <author fullname="L. Berger" initials="L." role="editor" surname="Berger">
              <organization/>
            </author>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document captures the current syntax used in YANG module tree diagrams.  The purpose of this document is to provide a single location for this definition.  This syntax may be updated from time to time based on the evolution of the YANG language.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="215"/>
          <seriesInfo name="RFC" value="8340"/>
          <seriesInfo name="DOI" value="10.17487/RFC8340"/>
        </reference>
        <reference anchor="RFC6125">
          <front>
            <title>Representation and Verification of Domain-Based Application Service Identity within Internet Public Key Infrastructure Using X.509 (PKIX) Certificates in the Context of Transport Layer Security (TLS)</title>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre">
              <organization/>
            </author>
            <author fullname="J. Hodges" initials="J." surname="Hodges">
              <organization/>
            </author>
            <date month="March" year="2011"/>
            <abstract>
              <t>Many application technologies enable secure communication between two entities by means of Internet Public Key Infrastructure Using X.509 (PKIX) certificates in the context of Transport Layer Security (TLS). This document specifies procedures for representing and verifying the identity of application services in such interactions.   [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6125"/>
          <seriesInfo name="DOI" value="10.17487/RFC6125"/>
        </reference>
        <reference anchor="RFC7435">
          <front>
            <title>Opportunistic Security: Some Protection Most of the Time</title>
            <author fullname="V. Dukhovni" initials="V." surname="Dukhovni">
              <organization/>
            </author>
            <date month="December" year="2014"/>
            <abstract>
              <t>This document defines the concept "Opportunistic Security" in the context of communications protocols.  Protocol designs based on Opportunistic Security use encryption even when authentication is not available, and use authentication when possible, thereby removing barriers to the widespread use of encryption on the Internet.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7435"/>
          <seriesInfo name="DOI" value="10.17487/RFC7435"/>
        </reference>
        <reference anchor="RFC8971">
          <front>
            <title>Bidirectional Forwarding Detection (BFD) for Virtual eXtensible Local Area Network (VXLAN)</title>
            <author fullname="S. Pallagatti" initials="S." role="editor" surname="Pallagatti">
              <organization/>
            </author>
            <author fullname="G. Mirsky" initials="G." role="editor" surname="Mirsky">
              <organization/>
            </author>
            <author fullname="S. Paragiri" initials="S." surname="Paragiri">
              <organization/>
            </author>
            <author fullname="V. Govindan" initials="V." surname="Govindan">
              <organization/>
            </author>
            <author fullname="M. Mudigonda" initials="M." surname="Mudigonda">
              <organization/>
            </author>
            <date month="December" year="2020"/>
            <abstract>
              <t>This document describes the use of the Bidirectional Forwarding Detection (BFD) protocol in point-to-point Virtual eXtensible Local Area Network (VXLAN) tunnels used to form an overlay network.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8971"/>
          <seriesInfo name="DOI" value="10.17487/RFC8971"/>
        </reference>
        <reference anchor="ZERO-TOUCH">
          <front>
            <title>Secure Zero Touch Provisioning (SZTP)</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen">
              <organization/>
            </author>
            <author fullname="I. Farrer" initials="I." surname="Farrer">
              <organization/>
            </author>
            <author fullname="M. Abrahamsson" initials="M." surname="Abrahamsson">
              <organization/>
            </author>
            <date month="April" year="2019"/>
            <abstract>
              <t>This document presents a technique to securely provision a networking device when it is booting in a factory-default state.  Variations in the solution enable it to be used on both public and private networks.  The provisioning steps are able to update the boot image, commit an initial configuration, and execute arbitrary scripts to address auxiliary needs.  The updated device is subsequently able to establish secure connections with other systems.  For instance, a device may establish NETCONF (RFC 6241) and/or RESTCONF (RFC 8040) connections with deployment-specific network management systems.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8572"/>
          <seriesInfo name="DOI" value="10.17487/RFC8572"/>
        </reference>
        <reference anchor="BRSKI">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin">
              <organization/>
            </author>
            <author fullname="M. Richardson" initials="M." surname="Richardson">
              <organization/>
            </author>
            <author fullname="T. Eckert" initials="T." surname="Eckert">
              <organization/>
            </author>
            <author fullname="M. Behringer" initials="M." surname="Behringer">
              <organization/>
            </author>
            <author fullname="K. Watsen" initials="K." surname="Watsen">
              <organization/>
            </author>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane.  To do this, a Secure Key Infrastructure is bootstrapped.  This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline.  We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device.  The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="SECUREJOIN">
          <front>
            <title>6tisch Secure Join protocol</title>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date day="25" month="February" year="2017"/>
            <abstract>
              <t>   This document describes a zero-touch mechanism to enroll a new device
   (the "pledge") into a IEEE802.15.4 TSCH network using the 6tisch
   signaling mechanisms.  The resulting device will obtain a domain
   specific credential that can be used with either 802.15.9 per-host
   pair keying protocols, or to obtain the network-wide key from a
   coordinator.  The mechanism describe her is an augmentation to the
   one-touch mechanism described in [I-D.ietf-6tisch-minimal-security].

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-6tisch-dtsecurity-secure-join-01"/>
        </reference>
        <reference anchor="YANG-GUIDE">
          <front>
            <title>Guidelines for Authors and Reviewers of Documents Containing YANG Data Models</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman">
              <organization/>
            </author>
            <date month="October" year="2018"/>
            <abstract>
              <t>This memo provides guidelines for authors and reviewers of specifications containing YANG modules.  Recommendations and procedures are defined, which are intended to increase interoperability and usability of Network Configuration Protocol (NETCONF) and RESTCONF protocol implementations that utilize YANG modules.  This document obsoletes RFC 6087.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="216"/>
          <seriesInfo name="RFC" value="8407"/>
          <seriesInfo name="DOI" value="10.17487/RFC8407"/>
        </reference>
        <reference anchor="Stajano99theresurrecting" target="https://www.cl.cam.ac.uk/research/dtg/www/files/publications/public/files/tr.1999.2.pdf">
          <front>
            <title>The Resurrecting Duckling: Security Issues for Ad-Hoc Wireless Networks</title>
            <author initials="F." surname="Stajano" fullname="Frank Stajano">
              <organization/>
            </author>
            <author initials="R." surname="Anderson" fullname="Ross Anderson">
              <organization/>
            </author>
            <date year="1999"/>
          </front>
        </reference>
        <reference anchor="imprinting" target="https://en.wikipedia.org/w/index.php?title=Imprinting_(psychology)&amp;oldid=825757556">
          <front>
            <title>Wikipedia article: Imprinting</title>
            <author>
              <organization>Wikipedia</organization>
            </author>
            <date year="2018" month="February"/>
          </front>
        </reference>
        <reference anchor="RFC8366">
          <front>
            <title>A Voucher Artifact for Bootstrapping Protocols</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen">
              <organization/>
            </author>
            <author fullname="M. Richardson" initials="M." surname="Richardson">
              <organization/>
            </author>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin">
              <organization/>
            </author>
            <author fullname="T. Eckert" initials="T." surname="Eckert">
              <organization/>
            </author>
            <date month="May" year="2018"/>
            <abstract>
              <t>This document defines a strategy to securely assign a pledge to an owner using an artifact signed, directly or indirectly, by the pledge's manufacturer.  This artifact is known as a "voucher".</t>
              <t>This document defines an artifact format as a YANG-defined JSON document that has been signed using a Cryptographic Message Syntax (CMS) structure.  Other YANG-derived formats are possible.  The voucher artifact is normally generated by the pledge's manufacturer (i.e., the Manufacturer Authorized Signing Authority (MASA)).</t>
              <t>This document only defines the voucher artifact, leaving it to other documents to describe specialized protocols for accessing it.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8366"/>
          <seriesInfo name="DOI" value="10.17487/RFC8366"/>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The authors would like to thank for following for
lively discussions on list and in the halls (ordered
by last name): William Atwood, Toerless Eckert, and Sheng Jiang.</t>
      <t>Russ Housley provided the upgrade from PKCS7 to CMS (RFC 5652) along
with the detailed CMS structure diagram.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
