<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.7 (Ruby 2.6.6) -->
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<?rfc linkmailto="no"?>
<?rfc editing="no"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc rfcedstyle="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-anima-rfc8366bis-12" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.19.1 -->
  <front>
    <title abbrev="Voucher Artifact">A Voucher Artifact for Bootstrapping Protocols</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-anima-rfc8366bis-12"/>
    <author initials="K." surname="Watsen" fullname="Kent Watsen">
      <organization>Watsen Networks</organization>
      <address>
        <email>kent+ietf@watsen.net</email>
      </address>
    </author>
    <author initials="M." surname="Richardson" fullname="Michael C. Richardson">
      <organization>Sandelman Software</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
        <uri>http://www.sandelman.ca/</uri>
      </address>
    </author>
    <author initials="M." surname="Pritikin" fullname="Max Pritikin">
      <organization>Cisco Systems</organization>
      <address>
        <email>pritikin@cisco.com</email>
      </address>
    </author>
    <author initials="T." surname="Eckert" fullname="Toerless Eckert">
      <organization>Futurewei Technologies Inc.</organization>
      <address>
        <postal>
          <street>2330 Central Expy</street>
          <city>Santa Clara</city>
          <code>95050</code>
          <country>United States of America</country>
        </postal>
        <email>tte+ietf@cs.fau.de</email>
      </address>
    </author>
    <author initials="Q." surname="Ma" fullname="Qiufang Ma">
      <organization>Huawei</organization>
      <address>
        <postal>
          <street>101 Software Avenue, Yuhua District</street>
          <city>Nanjing</city>
          <code>210012</code>
          <country>China</country>
        </postal>
        <email>maqiufang1@huawei.com</email>
      </address>
    </author>
    <date year="2024" month="July" day="08"/>
    <area>Operations</area>
    <workgroup>ANIMA Working Group</workgroup>
    <keyword>voucher</keyword>
    <abstract>
      <?line 112?>

<t>This document defines a strategy to securely assign a pledge to an owner
using an artifact signed, directly or indirectly, by the pledge's manufacturer.
This artifact is known as a "voucher".</t>
      <t>This document defines an artifact format as a YANG-defined JSON or CBOR document
that has been signed using a variety of cryptographic systems.</t>
      <t>The voucher artifact is normally generated by
the pledge's manufacturer (i.e., the Manufacturer Authorized Signing
Authority (MASA)).</t>
      <t>This document updates RFC8366, merging a number of extensions into the YANG.
The RFC8995 voucher request is also merged into this document.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-anima-rfc8366bis/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        anima Working Group mailing list (<eref target="mailto:anima@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/anima/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/anima/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/anima-wg/voucher"/>.</t>
    </note>
  </front>
  <middle>
    <?line 129?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document defines a strategy to securely assign a candidate device
(pledge) to an owner using an artifact signed, directly or indirectly,
by the pledge's manufacturer, i.e., the Manufacturer Authorized
Signing Authority (MASA).  This artifact is known as the "voucher".</t>
      <t>The voucher artifact is a JSON <xref target="RFC8259"/> document that
conforms with a data model described by YANG <xref target="RFC7950"/>.
It may also be serialized to CBOR <xref target="CBOR"/>.
It is encoded using the rules defined in <xref target="RFC7951"/>, and
is signed using (by default) a CMS structure <xref target="RFC5652"/>.</t>
      <t>The primary purpose of a voucher is to securely convey a
certificate, the "pinned-domain-cert" (and constrained variations), that a pledge can
use to authenticate subsequent interactions.
A voucher may be useful in several contexts, but the driving motivation
herein is to support secure onboarding mechanisms.
Assigning ownership is important to device onboarding mechanisms so that the pledge
can authenticate the network that is trying to take control of it.</t>
      <t>The lifetimes of vouchers may vary. In some onboarding protocols,
the vouchers may include a nonce restricting them to a single use,
whereas the vouchers in other onboarding protocols may have an
indicated lifetime.
In order to support long lifetimes, this document recommends using short lifetimes with programmatic renewal, see <xref target="renewal-over-revocation"/>.</t>
      <t>This document only defines the voucher artifact, leaving it to other
documents to describe specialized protocols for accessing it.
Some onboarding protocols using the voucher artifact defined in
this document include: <xref target="ZERO-TOUCH"/>, <xref target="SECUREJOIN"/>, and <xref target="BRSKI"/>.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>This document uses the following terms:</t>
      <dl>
        <dt>(Voucher) Artifact:</dt>
        <dd>
          <t>Used throughout to represent the voucher as instantiated in the form
of a signed structure.</t>
        </dd>
        <dt>Bootstrapping:</dt>
        <dd>
          <t>The process where a pledge component obtains cryptographic key material to identify
 and trust future interactions within a specific domain network. Based on imprinted
 key material provided during manufacturing process (see imprinting).</t>
        </dd>
        <dt>Domain:</dt>
        <dd>
          <t>The set of entities or infrastructure under common administrative
control.
The goal of the onboarding protocol is to enable a pledge component to
join a domain and obtain domain specific security credentials.</t>
        </dd>
        <dt>Imprint:</dt>
        <dd>
          <t>The process where a device obtains the cryptographic key material to
identify and trust future interactions generally as part of the manufacturing.
This term is taken from Konrad Lorenz's work in biology with new ducklings:
"during a critical period, the duckling would assume that anything
that looks like a mother duck is in fact their mother"
<xref target="Stajano99theresurrecting"/>. An equivalent for a device is to
obtain the fingerprint of the manufacturer's root certification authority (root ca)
certificate. A device that imprints on an attacker suffers a similar
fate to a duckling that imprints on a hungry wolf. Imprinting is a
term from psychology and ethology, as described in <xref target="imprinting"/>.</t>
        </dd>
        <dt>Join Registrar (and Coordinator):</dt>
        <dd>
          <t>A representative of the domain that is configured, perhaps
autonomically, to decide whether a new device is allowed to join the
domain. The administrator of the domain interfaces with a join
registrar (and Coordinator) to control this process.
Typically, a join registrar is "inside" its domain. For simplicity,
this document often refers to this as just "registrar".</t>
        </dd>
        <dt>MASA (Manufacturer Authorized Signing Authority):</dt>
        <dd>
          <t>The entity that, for the purpose of this document, issues and signs the
vouchers for a manufacturer's pledges.
In some onboarding protocols, the MASA may have an Internet
presence and be integral to the onboarding process, whereas in
other protocols the MASA may be an offline service that has no
active role in the onboarding process.</t>
        </dd>
        <dt>malicious registrar:</dt>
        <dd>
          <t>An on-path active attacker that presents itself as a legitimate registrar, but which is in fact under the control of an attacker.</t>
        </dd>
        <dt>Onboarding:</dt>
        <dd>
          <t>Onboarding describes the process to provide necessary operational data to pledge
components and completes the process to bring a device into an operational state.
This data may be configuration data, or also application specific cryptographic
key material (application speciifc security credentials).</t>
        </dd>
        <dt>Owner:</dt>
        <dd>
          <t>The entity that controls the private key of the "pinned-domain-cert"
certificate conveyed by the voucher.</t>
        </dd>
        <dt>Pledge:</dt>
        <dd>
          <t>The prospective component attempting to find and securely join a
domain.
When shipped or in factory reset mode, it only trusts authorized representatives of the
manufacturer.</t>
        </dd>
        <dt>Registrar:</dt>
        <dd>
          <t>See join registrar.</t>
        </dd>
        <dt>TOFU (Trust on First Use):</dt>
        <dd>
          <t>Where a pledge component makes no security decisions but rather simply
trusts the first domain entity it is contacted by.
Used similarly to <xref target="RFC7435"/>.
This is also known as the "resurrecting duckling" model.</t>
        </dd>
        <dt>Voucher:</dt>
        <dd>
          <t>A short form for Voucher Artifact.  It refers to the signed statement
from the MASA service that indicates to a pledge
the cryptographic identity of the domain it should trust.
When clarity is needed, it may be preceeded by the type of the signature, such as CMS, JWS or COSE.</t>
        </dd>
        <dt>Voucher Data:</dt>
        <dd>
          <t>The raw (serialized) representation of the YANG without any enclosing signature.
Current formats include JSON and CBOR.</t>
        </dd>
        <dt>Voucher Request:</dt>
        <dd>
          <t>A signed artifact sent from the Pledge to the Registrar, or from the Registrar to the MASA for Voucher acquisition.</t>
        </dd>
        <dt>Pledge Voucher Request (PVR):</dt>
        <dd>
          <t>A signed artifact sent from the Pledge to the Registrar. It is a special form of Voucher Request.</t>
        </dd>
        <dt>Registrar Voucher Request (RVR):</dt>
        <dd>
          <t>A signed artifact sent from the Registrar to the MASA. It is a special form of Voucher Request.</t>
        </dd>
      </dl>
    </section>
    <section anchor="requirements-language">
      <name>Requirements Language</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="survey-of-voucher-types">
      <name>Survey of Voucher Types</name>
      <t>A voucher is a cryptographically protected statement to the pledge
device authorizing a zero-touch "imprint" on the join registrar of the
domain. The specific information a voucher provides is influenced by the
onboarding use case.</t>
      <t>The voucher can impart the following information to
the join registrar and pledge:</t>
      <dl>
        <dt>Assertion Basis:</dt>
        <dd>
          <t>Indicates the method that protects
the imprint (this is distinct from the voucher signature that
protects the voucher itself). This might include
manufacturer-asserted ownership verification, assured
logging operations, or reliance on pledge endpoint behavior
such as secure root of trust
of measurement. The join registrar might use this information.
Only some methods are normatively defined in this
document. Other methods are left for future work.</t>
        </dd>
        <dt>Authentication of Join Registrar:</dt>
        <dd>
          <t>Indicates how the pledge
can authenticate the join registrar.  This document defines
a mechanism to pin the domain certificate, or a raw public key.
Pinning a symmetric key, or "CN-ID" or "DNS-ID"
information (as defined in <xref target="RFC6125"/>) is left for future work.</t>
        </dd>
        <dt>Anti-Replay Protections:</dt>
        <dd>
          <t>Time- or nonce-based
information to constrain the voucher to time periods or bootstrap
attempts.</t>
        </dd>
      </dl>
      <t>A number of onboarding scenarios can be met using differing
combinations of this information. All scenarios address the primary
threat of an on-path active attacker (or MiTM) impersonating the registrar.
This would gain control over the pledge device.
The following combinations are "types" of vouchers:</t>
      <table>
        <thead>
          <tr>
            <th align="left"> </th>
            <th align="right">Assertion</th>
            <th align="right"> </th>
            <th align="right">Registrar ID</th>
            <th align="right"> </th>
            <th align="right">Validity</th>
            <th align="right"> </th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">Voucher Type</td>
            <td align="right">Logged</td>
            <td align="right">Verified</td>
            <td align="right">Trust Anchor</td>
            <td align="right">CN-ID or DNS-ID</td>
            <td align="right">RTC</td>
            <td align="right">Nonce</td>
          </tr>
          <tr>
            <td align="left">Audit</td>
            <td align="right">X</td>
            <td align="right"> </td>
            <td align="right">X</td>
            <td align="right"> </td>
            <td align="right"> </td>
            <td align="right">X</td>
          </tr>
          <tr>
            <td align="left">Nonceless Audit</td>
            <td align="right">X</td>
            <td align="right"> </td>
            <td align="right">X</td>
            <td align="right"> </td>
            <td align="right">X</td>
            <td align="right"> </td>
          </tr>
          <tr>
            <td align="left">Owner Audit</td>
            <td align="right">X</td>
            <td align="right">X</td>
            <td align="right">X</td>
            <td align="right"> </td>
            <td align="right">X</td>
            <td align="right">X</td>
          </tr>
          <tr>
            <td align="left">Owner ID</td>
            <td align="right"> </td>
            <td align="right">X</td>
            <td align="right">X</td>
            <td align="right">X</td>
            <td align="right">X</td>
            <td align="right"> </td>
          </tr>
          <tr>
            <td align="left">Bearer out-of-scope</td>
            <td align="right">X</td>
            <td align="right"> </td>
            <td align="right">wildcard</td>
            <td align="right">wildcard</td>
            <td align="right">optional</td>
            <td align="right">opt</td>
          </tr>
        </tbody>
      </table>
      <t>NOTE: All voucher types include a 'pledge ID serial-number'
      (not shown here for space reasons).</t>
      <dl>
        <dt>Audit Voucher:</dt>
        <dd>
          <t>An Audit Voucher is named after the logging assertion mechanisms
that the registrar then "audits" to enforce local policy. The
registrar mitigates a malicious registrar by auditing that an unknown
malicious registrar does not appear in the log entries.
This does not
directly prevent a malicious registrar but provides a response mechanism that
ensures the MiTM is unsuccessful. The advantage is that actual
ownership knowledge is not required on the MASA service.</t>
        </dd>
        <dt>Nonceless Audit Voucher:</dt>
        <dd>
          <t>An Audit Voucher without a validity period statement. Fundamentally,
it is the same as an Audit Voucher except that it can be issued in
advance to support network partitions or to provide a permanent
voucher for remote deployments.</t>
        </dd>
        <dt>Ownership Audit Voucher:</dt>
        <dd>
          <t>An Audit Voucher where the MASA service has verified the registrar
as the authorized owner.
The MASA service mitigates a MiTM registrar by refusing to generate
Audit Vouchers for unauthorized registrars. The registrar uses audit
techniques to supplement the MASA. This provides an ideal sharing of
policy decisions and enforcement between the vendor and the owner.</t>
        </dd>
        <dt>Ownership ID Voucher:</dt>
        <dd>
          <t>Named after inclusion of the pledge's CN-ID or DNS-ID within the
voucher. The MASA service mitigates a MiTM registrar by identifying
the specific registrar (via WebPKI) authorized to own the pledge.</t>
        </dd>
        <dt>Bearer Voucher:</dt>
        <dd>
          <t>A Bearer Voucher is named after the inclusion of a registrar ID
wildcard. Because the registrar identity is not indicated, this
voucher type must be treated as a secret and protected from exposure
as any 'bearer' of the voucher can claim the pledge
device. Publishing a nonceless bearer voucher effectively turns the
specified pledge into a "TOFU" device with minimal mitigation
against MiTM registrars. Bearer vouchers are out of scope.</t>
        </dd>
      </dl>
    </section>
    <section anchor="changes-since-rfc8366">
      <name>Changes since RFC8366</name>
      <t><xref target="RFC8366"/> was published in 2018 during the development of <xref target="BRSKI"/>,
<xref target="ZERO-TOUCH"/> and other work-in-progress efforts.
Since then the industry has matured significantly, and the in-the-field activity which this document supports has become known as <em>onboarding</em> rather than <em>bootstrapping</em>.</t>
      <t>The focus of <xref target="BRSKI"/> was onboarding of ISP and Enterprise owned wired routing and switching equipment, with IoT devices being a less important aspect.
<xref target="ZERO-TOUCH"/> has focused upon onboarding of CPE equipment like cable modems and other larger IoT devices, again with smaller IoT devices being of less import.</t>
      <t>Since <xref target="BRSKI"/> was published there is now a mature effort to do application-level onboarding of constrained IoT devices defined by The Thread and Fairhair (now OCF) consortia.
The <xref target="cBRSKI"/> document has defined a version of <xref target="BRSKI"/> that is useable over constrained 802.15.4 networks using CoAP and DTLS, while <xref target="I-D.selander-ace-ake-authz"/> provides for using CoAP and EDHOC on even more constrained devices with very constrained networks.</t>
      <t><xref target="PRM"/> has created a new methodology for onboarding that does not depend upon a synchronous connection between the Pledge and the Registrar.
This mechanism uses a mobile Registrar Agent that works to collect and transfer signed artifacts via physical travel from one network to another.</t>
      <t>Both <xref target="cBRSKI"/> and <xref target="PRM"/> require extensions to the Voucher Request and the resulting Voucher. The new attribtes are required to carry the additional attributes and describe the extended semantics.
In addition <xref target="cBRSKI"/> uses the serialization mechanism described in <xref target="YANGCBOR"/> to produce significantly more compact artifacts.</t>
      <t>When the process to define <xref target="cBRSKI"/> and <xref target="PRM"/> was started, there was a belief that the appropriate process was to use the <xref target="RFC8040"/> <em>augment</em> mechanism to further extend both the voucher request <xref target="BRSKI"/> and voucher <xref target="RFC8366"/> artifacts.
However, <xref target="PRM"/> needs to extend an enumerated type with additional values and <em>augment</em> can not do this, so that was initially the impetus for this document.</t>
      <t>An attempt was then made to determine what would happen if one wanted to have a constrained version of the <xref target="PRM"/> voucher artifact.
The result was invalid YANG, with multiple definitions of the core attributes from the <xref target="RFC8366"/> voucher artifact.
After some discussion, it was determined that the <em>augment</em> mechanism did not work, nor did it work better when <xref target="RFC8040"/> yang-data was replaced with the <xref target="RFC8791"/> structure mechanisms.</t>
      <t>After significant discussion the decision was made to simply roll all of the needed extensions up into this document as "RFC8366bis".</t>
      <t>This document therefore represents a merge of YANG definitions from <xref target="RFC8366"/>, the voucher-request from <xref target="BRSKI"/>, and then extensions to each of these from <xref target="cBRSKI"/>, <xref target="CLOUD"/> and <xref target="PRM"/>.
There are some difficulties with this approach: this document does not attempt to establish rigorous semantic definitions for how some attributes are to be used, referring normatively instead to the other relevant documents.</t>
    </section>
    <section anchor="signature-mechanisms">
      <name>Signature mechanisms</name>
      <t>Three signature systems have been defined for vouchers and voucher-requests.</t>
      <t><xref target="cBRSKI"/> defines a mechanism that uses COSE <xref target="RFC9052"/>, with the voucher data encoded using <xref target="I-D.ietf-core-sid"/>.
However, as the SID processe requires up-to-date YANG, the SID values for this mechanism are presented in this document.</t>
      <t><xref target="jBRSKI"/> defines a mechanism that uses JSON <xref target="RFC8259"/> and <xref target="JWS"/>.</t>
      <t>The CMS mechanism first defined in <xref target="RFC8366"/> continues to be defined here.</t>
      <section anchor="cms-voucher">
        <name>CMS Format Voucher Artifact</name>
        <t>The IETF evolution of PKCS#7 is CMS <xref target="RFC5652"/>.
A CMS-signed voucher, the default type, contains a ContentInfo
structure with the voucher content. An eContentType of 40
indicates that the content is a JSON-encoded voucher.</t>
        <t>The signing structure is a CMS SignedData structure, as specified by
Section 5.1 of <xref target="RFC5652"/>, encoded using ASN.1 Distinguished Encoding
Rules (DER), as specified in ITU-T X.690 <xref target="ITU-T.X690.2015"/>.</t>
        <t>To facilitate interoperability, <xref target="vcj"/> in this document registers the
media type "application/voucher-cms+json" and the filename extension
".vcj".</t>
        <t>The CMS structure <bcp14>MUST</bcp14> contain a 'signerInfo' structure, as
described in Section 5.1 of <xref target="RFC5652"/>, containing the
signature generated over the content using a private key
trusted by the recipient.
Normally, the recipient is the pledge and the signer is the MASA.
In the Voucher Request, the signer is the pledge, or the Registrar.
Within this document, the signer is assumed to be the MASA.</t>
        <t>Note that Section 5.1 of <xref target="RFC5652"/> includes a
discussion about how to validate a CMS object, which is really a
PKCS7 object (cmsVersion=1).  Intermediate systems (such the
Bootstrapping Remote Secure Key Infrastructures <xref target="BRSKI"/> registrar)
that might need to evaluate the voucher in flight <bcp14>MUST</bcp14> be prepared for
such an older format.
No signaling is necessary, as the manufacturer knows the capabilities
of the pledge and will use an appropriate format voucher for each
pledge.</t>
        <t>The CMS structure <bcp14>SHOULD</bcp14> also contain all of the certificates
leading up to and including the signer's trust anchor certificate
known to the recipient.  The inclusion of the trust anchor is
unusual in many applications, but third parties cannot accurately
audit the transaction without it.</t>
        <t>The CMS structure <bcp14>MAY</bcp14> also contain revocation objects for any
intermediate certificate authorities (CAs) between the
voucher issuer and the trust anchor known to the recipient.
However, the use of CRLs and other validity mechanisms is
discouraged, as the pledge is unlikely to be able to perform
online checks and is unlikely to have a trusted clock source.
As described below, the use of short-lived vouchers and/or a
pledge-provided nonce provides a freshness guarantee.</t>
      </section>
    </section>
    <section anchor="voucher">
      <name>Voucher Artifact</name>
      <t>The voucher's primary purpose is to securely assign a pledge to an
owner.
The voucher informs the pledge which entity it should consider to be
its owner.</t>
      <t>This document defines a voucher that is a JSON-encoded or CBOR-encoded instance of the
YANG module defined in <xref target="voucher-yang-module"/>.</t>
      <t>This format is described here as a practical basis for some uses (such
as in NETCONF), but more to clearly indicate what vouchers look like
in practice.
This description also serves to validate the YANG data model.</t>
      <t><xref target="RFC8366"/> defined a media type and a filename extension for the
CMS-encoded JSON type.
Which type of voucher is expected is signaled (where possible) in the form of a MIME
Content-Type, an HTTP Accept: header, or more mundane methods like use of a filename extension  when a voucher is transferred on a USB key.</t>
      <section anchor="voucher-tree-diagram">
        <name>Tree Diagram</name>
        <t>The following tree diagram illustrates a high-level view of a voucher
document.
The notation used in this diagram is described in <xref target="RFC8340"/>.
Each node in the diagram is fully described by the YANG module in
<xref target="voucher-yang-module"/>.
Please review the YANG module for a detailed description of the
voucher format.</t>
        <artwork><![CDATA[
module: ietf-voucher

  structure voucher:
    +-- voucher
       +-- created-on?                      yang:date-and-time
       +-- expires-on?                      yang:date-and-time
       +-- assertion?                       enumeration
       +-- serial-number                    string
       +-- idevid-issuer?                   binary
       +-- pinned-domain-cert?              binary
       +-- domain-cert-revocation-checks?   boolean
       +-- nonce?                           binary
       +-- pinned-domain-pubk?              binary
       +-- pinned-domain-pubk-sha256?       binary
       +-- last-renewal-date?               yang:date-and-time
       +-- est-domain?                      ietf:uri
       +-- additional-configuration?        ietf:uri
]]></artwork>
      </section>
      <section anchor="voucher-examples">
        <name>Examples</name>
        <t>This section provides voucher examples for illustration
purposes.  These examples conform to the encoding rules
defined in <xref target="RFC8259"/>.</t>
        <t>The following example illustrates an ephemeral voucher (uses a nonce).
The MASA generated this voucher using the 'logged' assertion type, knowing
that it would be suitable for the pledge making the request.</t>
        <artwork><![CDATA[
{
  "ietf-voucher:voucher": {
    "created-on": "2016-10-07T19:31:42Z",
    "assertion": "logged",
    "serial-number": "JADA123456789",
    "idevid-issuer": "base64encodedvalue==",
    "pinned-domain-cert": "base64encodedvalue==",
    "nonce": "base64encodedvalue=="
  }
}
]]></artwork>
        <t>The following example illustrates a non-ephemeral voucher (no nonce).
While the voucher itself expires after two weeks, it presumably can
be renewed for up to a year.   The MASA generated this voucher
using the 'verified' assertion type, which should satisfy all pledges.</t>
        <artwork><![CDATA[
{
  "ietf-voucher:voucher": {
    "created-on": "2016-10-07T19:31:42Z",
    "expires-on": "2016-10-21T19:31:42Z",
    "assertion": "verified",
    "serial-number": "JADA123456789",
    "idevid-issuer": "base64encodedvalue==",
    "pinned-domain-cert": "base64encodedvalue==",
    "domain-cert-revocation-checks": true,
    "last-renewal-date": "2017-10-07T19:31:42Z"
  }
}
]]></artwork>
        <t><xref section="8" sectionFormat="comma" target="jBRSKI"/> contains examples of vouchers encoded in JSON, and signed with <xref target="JWS"/>.
<xref section="9" sectionFormat="comma" target="cBRSKI"/> contains examples of vouchers encoded in CBOR, and signed with <xref target="COSE"/>.</t>
      </section>
      <section anchor="voucher-yang-module">
        <name>YANG Module</name>
        <sourcecode type="yang" markers="true"><![CDATA[
module ietf-voucher {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-voucher";
  prefix vch;

  import ietf-yang-types {
    prefix yang;
    reference
      "RFC 6991: Common YANG Data Types";
  }
  import ietf-inet-types {
    prefix ietf;
    reference
      "RFC 6991: Common YANG Data Types";
  }
  import ietf-yang-structure-ext {
    prefix sx;
  }

  organization
    "IETF ANIMA Working Group";
  contact
    "WG Web:   <https://datatracker.ietf.org/wg/anima/>
     WG List:  <mailto:anima@ietf.org>
     Author:   Kent Watsen
               <mailto:kent+ietf@watsen.net>
     Author:   Michael Richardson
               <mailto:mcr+ietf@sandelman.ca>
     Author:   Max Pritikin
               <mailto:pritikin@cisco.com>
     Author:   Toerless Eckert
               <mailto:tte+ietf@cs.fau.de>
     Author:   Qiufang Ma
               <mailto:maqiufang1@huawei.com>";
  description
    "This module defines the format for a voucher, which is
     produced by a pledge's manufacturer or delegate (MASA)
     to securely assign a pledge to an 'owner', so that the
     pledge may establish a secure connection to the owner's
     network infrastructure.

     Copyright (c) 2024 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject to
     the license terms contained in, the Revised BSD License set
     forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC XXXX
     (https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself
     for full legal notices.

     The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
     NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
     'MAY', and 'OPTIONAL' in this document are to be interpreted as
     described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
     they appear in all capitals, as shown here.";

  revision 2023-01-10 {
    description
      "updated to support new assertion enumerated type";
    reference
      "RFC ZZZZ Voucher Profile for Bootstrapping Protocols";
  }

  // Top-level statement
  sx:structure voucher {
    uses voucher-artifact-grouping;
  }

  // Grouping defined for future augmentations

  grouping voucher-artifact-grouping {
    description
      "Grouping to allow reuse/extensions in future work.";
    container voucher {
      description
        "A voucher assigns a pledge to an owner using
         the (pinned-domain-cert) value.";
      leaf created-on {
        type yang:date-and-time;
        description
          "A value indicating the date this voucher was created.
           This node is primarily for human consumption and auditing.
           Future work MAY create verification requirements based on
           this node.";
      }
      leaf expires-on {
        type yang:date-and-time;
        must 'not(../nonce)';
        description
          "A value indicating when this voucher expires.  The node is
           optional as not all pledges support expirations, such as
           pledges lacking a reliable clock.

           If this field exists, then the pledges MUST ensure that
           the expires-on time has not yet passed. A pledge without
           an accurate clock cannot meet this requirement.

           The expires-on value MUST NOT exceed the expiration date
           of any of the listed 'pinned-domain-cert' certificates.";
      }
      leaf assertion {
        type enumeration {
          enum verified {
            value 0;
            description
              "Indicates that the ownership has been positively
               verified by the MASA (e.g., through sales channel
               integration).";
          }
          enum logged {
            value 1;
            description
              "Indicates that the voucher has been issued after
               minimal verification of ownership or control.  The
               issuance has been logged for detection of
               potential security issues (e.g., recipients of
               vouchers might verify for themselves that unexpected
               vouchers are not in the log).  This is similar to
               unsecured trust-on-first-use principles but with the
               logging providing a basis for detecting unexpected
               events.";
          }
          enum proximity {
            value 2;
            description
              "Indicates that the voucher has been issued after
               the MASA verified a proximity proof provided by the
               device and target domain.  The issuance has been
               logged for detection of potential security issues.";
          }
          enum agent-proximity {
            value 3;
            description
              "Mostly identical to proximity, but
               indicates that the voucher has been issued
               after the MASA has verified a statement that
               a registrar agent has made contact with the device.";
          }
        }
        description
          "The assertion is a statement from the MASA regarding how
           the owner was verified.  This statement enables pledges
           to support more detailed policy checks.  Pledges MUST
           ensure that the assertion provided is acceptable, per
           local policy, before processing the voucher.";
      }
      leaf serial-number {
        type string;
        mandatory true;
        description
          "The serial-number of the hardware.  When processing a
           voucher, a pledge MUST ensure that its serial-number
           matches this value.  If no match occurs, then the
           pledge MUST NOT process this voucher.";
      }
      leaf idevid-issuer {
        type binary;
        description
          "The Authority Key Identifier OCTET STRING (as defined in
           Section 4.2.1.1 of RFC 5280) from the pledge's IDevID
           certificate.  Optional since some serial-numbers are
           already unique within the scope of a MASA.
           Inclusion of the statistically unique key identifier
           ensures statistically unique identification of the
           hardware.
           When processing a voucher, a pledge MUST ensure that its
           IDevID Authority Key Identifier matches this value.  If no
           match occurs, then the pledge MUST NOT process this
           voucher.
           When issuing a voucher, the MASA MUST ensure that this
           field is populated for serial-numbers that are not
           otherwise unique within the scope of the MASA.";
      }
      leaf pinned-domain-cert {
        type binary;
        description
          "An X.509 v3 certificate structure, as specified by
           RFC 5280, using Distinguished Encoding Rules (DER)
           encoding, as defined in ITU-T X.690.

           This certificate is used by a pledge to trust a Public Key
           Infrastructure in order to verify a domain certificate
           supplied to the pledge separately by the bootstrapping
           protocol.  The domain certificate MUST have this
           certificate somewhere in its chain of certificates.
           This certificate MAY be an end-entity certificate,
           including a self-signed entity.";
        reference
          "RFC 5280:
             Internet X.509 Public Key Infrastructure Certificate
             and Certificate Revocation List (CRL) Profile.
           ITU-T X.690:
              Information technology - ASN.1 encoding rules:
              Specification of Basic Encoding Rules (BER),
              Canonical Encoding Rules (CER) and Distinguished
              Encoding Rules (DER).";
      }
      leaf domain-cert-revocation-checks {
        type boolean;
        description
          "A processing instruction to the pledge that it MUST (true)
           or MUST NOT (false) verify the revocation status for the
           pinned domain certificate.  If this field is not set, then
           normal PKIX behavior applies to validation of the domain
           certificate.";
      }
      leaf nonce {
        type binary {
          length "8..32";
        }
        must 'not(../expires-on)';
        description
          "A value that can be used by a pledge in some bootstrapping
           protocols to enable anti-replay protection.  This node is
           optional because it is not used by all bootstrapping
           protocols.

           When present, the pledge MUST compare the provided nonce
           value with another value that the pledge randomly
           generated and sent to a bootstrap server in an earlier
           bootstrapping message.  If the value is present, but
           the values do not match, then the pledge MUST NOT process
           this voucher.";
      }
      leaf pinned-domain-pubk {
        type binary;
        description
          "The pinned-domain-pubk may replace the
             pinned-domain-cert in constrained uses of
             the voucher. The pinned-domain-pubk
             is the Raw Public Key of the Registrar.
             This field is encoded as a Subject Public Key Info block
             as specified in RFC7250, in section 3.
             The ECDSA algorithm MUST be supported.
             The EdDSA algorithm as specified in
             draft-ietf-tls-rfc4492bis-17 SHOULD be supported.
             Support for the DSA algorithm is not recommended.
             Support for the RSA algorithm is a MAY.";
      }
      leaf pinned-domain-pubk-sha256 {
        type binary;
        description
          "The pinned-domain-pubk-sha256 is a second
             alternative to pinned-domain-cert.  In many cases the
             public key of the domain has already been transmitted
             during the key agreement process, and it is wasteful
             to transmit the public key another two times.
             The use of a hash of public key info, at 32-bytes for
             sha256 is a significant savings compared to an RSA
             public key, but is only a minor savings compared to
             a 256-bit ECDSA public-key.
             Algorithm agility is provided by extensions to this
             specification which can define a new leaf for another
             hash type.";
      }
      leaf last-renewal-date {
        type yang:date-and-time;
        must '../expires-on';
        description
          "The date that the MASA projects to be the last date it
           will renew a voucher on. This field is merely
           informative; it is not processed by pledges.

           Circumstances may occur after a voucher is generated that
           may alter a voucher's validity period.  For instance,
           a vendor may associate validity periods with support
           contracts, which may be terminated or extended
           over time.";
      }
      // from BRSKI-CLOUD
      leaf est-domain {
        type ietf:uri;
        description
          "The est-domain is a URL from which the Pledge should
             continue doing enrollment rather than with the
             Cloud Registrar.
             The pinned-domain-cert contains a trust-anchor
             which is to be used to authenticate the server
             found at this URI.
            ";
      }
      leaf additional-configuration {
        type ietf:uri;
        description
          "The additional-configuration attribute contains a
             URL to which the Pledge can retrieve additional
             configuration information.
             The contents of this URL are vendor specific.
             This is intended to do things like configure
             a VoIP phone to point to the correct hosted
             PBX, for example.";
      }
    } // end voucher
  } // end voucher-grouping

}
]]></sourcecode>
      </section>
      <section anchor="ietf-voucher-sid-values">
        <name>ietf-voucher SID values</name>
        <t><xref target="RFC9148"/> explains how to serialize YANG into CBOR, and for this a series of SID values are required.
While <xref target="I-D.ietf-core-sid"/> defines the management process for these values, due to the immaturity  of the tooling around this YANG-SID mechanisms, the following values are considered normative.
It is believed, however, that they will not change.</t>
        <artwork><![CDATA[
           
      SID Assigned to
--------- -------------------------------------------------- 
     2451 data /ietf-voucher:voucher/voucher
     2452 data /ietf-voucher:voucher/voucher/assertion
     2453 data /ietf-voucher:voucher/voucher/created-on
     2454 data .../domain-cert-revocation-checks
     2455 data /ietf-voucher:voucher/voucher/expires-on
     2456 data /ietf-voucher:voucher/voucher/idevid-issuer
     2457 data /ietf-voucher:voucher/voucher/last-renewal-date
     2458 data /ietf-voucher:voucher/voucher/nonce
     2459 data /ietf-voucher:voucher/voucher/pinned-domain-cert
     2460 data /ietf-voucher:voucher/voucher/pinned-domain-pubk
     2461 data .../pinned-domain-pubk-sha256
     2462 data /ietf-voucher:voucher/voucher/serial-number
     2463 data .../additional-configuration
     2466 data /ietf-voucher:voucher/voucher/est-domain
           
 WARNING, obsolete definitions
]]></artwork>
        <t>The "assertion" attribute is an enumerated type in <xref target="RFC8366"/>, but no values were provided as part of the enumeration.
This document provides enumerated values as part of the YANG module.</t>
        <t>In the JSON serialization, the literal strings from the enumerated types are used so there is no ambiguity.</t>
        <t>In the CBOR serialization, a small integer is used, and the following values are repeated here.
The YANG module should be considered authoritative in the future.
No IANA registry is provided or necessary because the YANG module (and this document) would be extended when there are new entries to make.</t>
        <table anchor="assertion-enums">
          <name>CBOR integers for the "assertion" attribute enum</name>
          <thead>
            <tr>
              <th align="left">Integer</th>
              <th align="left">Assertion Type</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">0</td>
              <td align="left">verified</td>
            </tr>
            <tr>
              <td align="left">1</td>
              <td align="left">logged</td>
            </tr>
            <tr>
              <td align="left">2</td>
              <td align="left">proximity</td>
            </tr>
            <tr>
              <td align="left">3</td>
              <td align="left">agent-proximity</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="voucher-request">
      <name>Voucher Request Artifact</name>
      <t><xref section="3" sectionFormat="comma" target="BRSKI"/> defined a Voucher-Request Artifact as an augmented artifact from the Voucher Artifact originally defined in <xref target="RFC8366"/>.
That definition has been moved to this document, and translated from YANG-DATA <xref target="RFC8040"/> to the SX:STRUCTURE extension <xref target="RFC8791"/>.</t>
      <section anchor="voucher-request-tree-diagram">
        <name>Tree Diagram</name>
        <t>The following tree diagram illustrates a high-level view of a voucher
request document.
The notation used in this diagram is described in <xref target="RFC8340"/>.
Each node in the diagram is fully described by the YANG module in
<xref target="voucher-request-yang-module"/>.</t>
        <artwork><![CDATA[
module: ietf-voucher-request

  structure voucher:
    +-- voucher
       +-- created-on?
       |       yang:date-and-time
       +-- expires-on?
       |       yang:date-and-time
       +-- assertion?                                 enumeration
       +-- serial-number                              string
       +-- idevid-issuer?                             binary
       +-- pinned-domain-cert?                        binary
       +-- domain-cert-revocation-checks?             boolean
       +-- nonce?                                     binary
       +-- pinned-domain-pubk?                        binary
       +-- pinned-domain-pubk-sha256?                 binary
       +-- last-renewal-date?
       |       yang:date-and-time
       +-- est-domain?                                ietf:uri
       +-- additional-configuration?                  ietf:uri
       +-- prior-signed-voucher-request?              binary
       +-- proximity-registrar-cert?                  binary
       +-- proximity-registrar-pubk?                  binary
       +-- proximity-registrar-pubk-sha256?           binary
       +-- agent-signed-data?                         binary
       +-- agent-provided-proximity-registrar-cert?   binary
       +-- agent-sign-cert?                           binary
]]></artwork>
      </section>
      <section anchor="voucher-request-yang-module">
        <name>"ietf-voucher-request" Module</name>
        <t>The ietf-voucher-request YANG module is derived from the ietf-voucher module.</t>
        <sourcecode type="yang" markers="true"><![CDATA[
module ietf-voucher-request {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-voucher-request";
  prefix vcr;

  import ietf-yang-structure-ext {
    prefix sx;
  }
  import ietf-voucher {
    prefix vch;
    description
      "This module defines the format for a voucher,
       which is produced by a pledge's manufacturer or
       delegate (MASA) to securely assign a pledge to
       an 'owner', so that the pledge may establish a secure
       connection to the owner's network infrastructure";
    reference
      "RFC 8366: Voucher Artifact for
       Bootstrapping Protocols";
  }

  organization
    "IETF ANIMA Working Group";
  contact
    "WG Web:   <https://datatracker.ietf.org/wg/anima/>
     WG List:  <mailto:anima@ietf.org>
     Author:   Kent Watsen
               <mailto:kent+ietf@watsen.net>
     Author:   Michael Richardson
               <mailto:mcr+ietf@sandelman.ca>
     Author:   Max Pritikin
               <mailto:pritikin@cisco.com>
     Author:   Toerless Eckert
               <mailto:tte+ietf@cs.fau.de>
     Author:   Qiufang Ma
               <mailto:maqiufang1@huawei.com>";
  description
    "This module defines the format for a voucher request.
     It is a superset of the voucher itself.
     It provides content to the MASA for consideration
     during a voucher request.

     The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
     NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
     'MAY', and 'OPTIONAL' in this document are to be interpreted as
     described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
     they appear in all capitals, as shown here.

      Copyright (c) 2024 IETF Trust and the persons identified as
      authors of the code.  All rights reserved.

      Redistribution and use in source and binary forms, with or
      without modification, is permitted pursuant to, and subject to
      the license terms contained in, the Revised BSD License set
      forth in Section 4.c of the IETF Trust's Legal Provisions
      Relating to IETF Documents
      (https://trustee.ietf.org/license-info).

      This version of this YANG module is part of RFC XXXX
      (https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself
      for full legal notices.

      The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
      NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
      'MAY', and 'OPTIONAL' in this document are to be interpreted as
      described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
      they appear in all capitals, as shown here.";

  revision 2023-01-10 {
    description
      "Initial version";
    reference
      "RFC XXXX: Bootstrapping Remote Secure Key Infrastructure";
  }

  // Top-level statement
  sx:structure voucher {
    uses voucher-request-grouping;
  }

  // Grouping defined for future usage

  grouping voucher-request-grouping {
    description
      "Grouping to allow reuse/extensions in future work.";
    uses vch:voucher-artifact-grouping {
      refine "voucher/created-on" {
        mandatory false;
      }
      refine "voucher/pinned-domain-cert" {
        mandatory false;
        description
          "A pinned-domain-cert field
           is not valid in a voucher request, and
           any occurrence MUST be ignored";
      }
      refine "voucher/last-renewal-date" {
        description
          "A last-renewal-date field
           is not valid in a voucher request, and
           any occurrence MUST be ignored";
      }
      refine "voucher/domain-cert-revocation-checks" {
        description
          "The domain-cert-revocation-checks field
           is not valid in a voucher request, and
           any occurrence MUST be ignored";
      }
      refine "voucher/assertion" {
        mandatory false;
        description
          "Any assertion included in registrar voucher
           requests SHOULD be ignored by the MASA.";
      }
      augment "voucher" {
        description
          "Adds leaf nodes appropriate for requesting vouchers.";
        leaf prior-signed-voucher-request {
          type binary;
          description
            "If it is necessary to change a voucher, or re-sign and
             forward a voucher that was previously provided along a
             protocol path, then the previously signed voucher SHOULD
             be included in this field.

             For example, a pledge might sign a voucher request
             with a proximity-registrar-cert, and the registrar
             then includes it as the prior-signed-voucher-request
             field.  This is a simple mechanism for a chain of
             trusted parties to change a voucher request, while
             maintaining the prior signature information.

             The Registrar and MASA MAY examine the prior signed
             voucher information for the
             purposes of policy decisions. For example this
             information could be useful to a MASA to determine
             that both pledge and registrar agree on proximity
             assertions. The MASA SHOULD remove all
             prior-signed-voucher-request information when
             signing a voucher for imprinting so as to minimize
             the final voucher size.";
        }
        leaf proximity-registrar-cert {
          type binary;
          description
            "An X.509 v3 certificate structure as specified by
             RFC 5280, Section 4 encoded using the ASN.1
             distinguished encoding rules (DER), as specified
             in [ITU.X690.1994].

             The first certificate in the Registrar TLS server
             certificate_list sequence  (the end-entity TLS
             certificate, see [RFC8446]) presented by the Registrar
             to the Pledge.
             This MUST be populated in a Pledge's voucher request
             when a proximity assertion is requested.";
        }
        leaf proximity-registrar-pubk {
          type binary;
          description
            "The proximity-registrar-pubk replaces
             the proximity-registrar-cert in constrained uses of
             the voucher-request.
             The proximity-registrar-pubk is the
             Raw Public Key of the Registrar. This field is encoded
             as specified in RFC7250, section 3.
             The ECDSA algorithm MUST be supported.
             The EdDSA algorithm as specified in
             draft-ietf-tls-rfc4492bis-17 SHOULD be supported.
             Support for the DSA algorithm is not recommended.
             Support for the RSA algorithm is a MAY, but due to
             size is discouraged.";
        }
        leaf proximity-registrar-pubk-sha256 {
          type binary;
          description
            "The proximity-registrar-pubk-sha256
             is an alternative to both
             proximity-registrar-pubk and pinned-domain-cert.
             In many cases the public key of the domain has already
             been transmitted during the key agreement protocol,
             and it is wasteful to transmit the public key another
             two times.
             The use of a hash of public key info, at 32-bytes for
             sha256 is a significant savings compared to an RSA
             public key, but is only a minor savings compared to
             a 256-bit ECDSA public-key.
             Algorithm agility is provided by extensions to this
             specification which may define a new leaf for another
             hash type.";
        }
        leaf agent-signed-data {
          type binary;
          description
            "The agent-signed-data field contains a JOSE [RFC7515]
             object provided by the Registrar-Agent to the Pledge.

             This artifact is signed by the Registrar-Agent
             and contains a copy of the pledge's serial-number.";
        }
        leaf agent-provided-proximity-registrar-cert {
          type binary;
          description
            "An X.509 v3 certificate structure, as specified by
             RFC 5280, Section 4, encoded using the ASN.1
             distinguished encoding rules (DER), as specified
             in ITU X.690.
             The first certificate in the registrar TLS server
             certificate_list sequence (the end-entity TLS
             certificate; see RFC 8446) presented by the
             registrar to the registrar-agent and provided to
             the pledge.
             This MUST be populated in a pledge's voucher-request
             when an agent-proximity assertion is requested.";
          reference
            "ITU X.690: Information Technology - ASN.1 encoding
             rules: Specification of Basic Encoding Rules (BER),
             Canonical Encoding Rules (CER) and Distinguished
             Encoding Rules (DER)
             RFC 5280: Internet X.509 Public Key Infrastructure
             Certificate and Certificate Revocation List (CRL)
             Profile
             RFC 8446: The Transport Layer Security (TLS)
             Protocol Version 1.3";
        }
        leaf agent-sign-cert {
          type binary;
          description
            "An X.509 v3 certificate structure, as specified by
             RFC 5280, Section 4, encoded using the ASN.1
             distinguished encoding rules (DER), as specified
             in ITU X.690.
             This certificate can be used by the pledge,
             the registrar, and the MASA to verify the signature
             of agent-signed-data. It is an optional component
             for the pledge-voucher request.
             This MUST be populated in a registrar's
             voucher-request when an agent-proximity assertion
             is requested.";
          reference
            "ITU X.690: Information Technology - ASN.1 encoding
             rules: Specification of Basic Encoding Rules (BER),
             Canonical Encoding Rules (CER) and Distinguished
             Encoding Rules (DER)
             RFC 5280: Internet X.509 Public Key Infrastructure
             Certificate and Certificate Revocation List (CRL)
             Profile";
        }
      }
    }
  }
}
]]></sourcecode>
      </section>
      <section anchor="voucher-request-sid-values">
        <name>ietf-voucher-request SID values</name>
        <t><xref target="RFC9148"/> explains how to serialize YANG into CBOR, and for this a series of SID values are required.
While <xref target="I-D.ietf-core-sid"/> defines the management process for these values, due to the immaturity  of the tooling around this YANG-SID mechanisms, the following values are considered normative.
It is believed, however, that they will not change.</t>
        <artwork><![CDATA[
           
      SID Assigned to
--------- -------------------------------------------------- 
     2501 data /ietf-voucher-request:voucher/voucher
     2502 data /ietf-voucher-request:voucher/voucher/assertion
     2503 data /ietf-voucher-request:voucher/voucher/created-on
     2504 data .../domain-cert-revocation-checks
     2505 data /ietf-voucher-request:voucher/voucher/expires-on
     2506 data .../idevid-issuer
     2507 data .../last-renewal-date
     2508 data /ietf-voucher-request:voucher/voucher/nonce
     2509 data .../pinned-domain-cert
     2510 data .../prior-signed-voucher-request
     2511 data .../proximity-registrar-cert
     2512 data .../proximity-registrar-pubk-sha256
     2513 data .../proximity-registrar-pubk
     2514 data .../serial-number
     2515 data .../agent-provided-proximity-registrar-cert
     2516 data .../agent-sign-cert
     2517 data .../agent-signed-data
     2518 data .../pinned-domain-pubk
     2519 data .../pinned-domain-pubk-sha256
           
 WARNING, obsolete definitions
]]></artwork>
        <t>The "assertion" attribute is an enumerated type, and has values as defined above in <xref target="assertion-enums"/>.</t>
      </section>
    </section>
    <section anchor="design-con">
      <name>Design Considerations</name>
      <section anchor="renewal-over-revocation">
        <name>Renewals Instead of Revocations</name>
        <t>The lifetimes of vouchers may vary.  In some onboarding protocols,
the vouchers may be created and consumed immediately, whereas in other
onboarding solutions, there may be a significant time delay between
when a voucher is created and when it is consumed.
In cases when there is a time delay, there is a need for the pledge
to ensure that the assertions made when the voucher was created are
still valid.</t>
        <t>A revocation artifact is generally used to verify the continued validity
of an assertion such as a PKIX certificate, web token, or a "voucher".  With
this approach, a potentially long-lived assertion is paired with a reasonably
fresh revocation status check to ensure that the assertion is still valid.
However, this approach increases solution complexity, as it introduces the
need for additional protocols and code paths to distribute and process the
revocations.</t>
        <t>Addressing the shortcomings of revocations, this document recommends
instead the use of lightweight renewals of short-lived non-revocable
vouchers.  That is, rather than issue a long-lived voucher, where the
'expires-on' leaf is set to some distant date, the expectation
is for the MASA to instead issue a short-lived voucher, where the
'expires-on' leaf is set to a relatively near date, along with a promise
(reflected in the 'last-renewal-date' field) to reissue the voucher again
when needed.  Importantly, while issuing the initial voucher may incur
heavyweight verification checks ("Are you who you say you are?" "Does the
pledge actually belong to you?"), reissuing the voucher should be a
lightweight process, as it ostensibly only updates the voucher's
validity period.
With this approach, there is
only the one artifact, and only one code path is needed to process
it; there is no possibility of a pledge choosing to skip the
revocation status check because, for instance, the OCSP Responder is
not reachable.</t>
        <t>While this document recommends issuing short-lived vouchers, the
voucher artifact does not restrict the ability to create long-lived
voucher, if required; however, no revocation method is described.</t>
        <t>Note that a voucher may be signed by a chain of intermediate CAs
leading up to the trust anchor certificate known by the pledge.  Even
though the voucher itself is not revocable, it may still be revoked,
per se, if one of the intermediate CA certificates is revoked.</t>
      </section>
      <section anchor="voucher-per-pledge">
        <name>Voucher Per Pledge</name>
        <t>The solution described herein originally enabled a single voucher to
apply to many pledges, using lists of regular expressions to represent
ranges of serial-numbers.  However, it was determined that blocking the
renewal of a voucher that applied to many devices would be excessive
when only the ownership for a single pledge needed to be blocked.
Thus, the voucher format now only supports a single serial-number
to be listed.</t>
      </section>
    </section>
    <section anchor="sec-con">
      <name>Security Considerations</name>
      <section anchor="clock-sensitivity">
        <name>Clock Sensitivity</name>
        <t>An attacker could use an expired voucher to gain control over
a device that has no understanding of time.  The device cannot
trust NTP as a time reference, as an attacker could control
the NTP stream.</t>
        <t>There are three things to defend against this: 1) devices are
required to verify that the expires-on field has not yet passed,
2) devices without access to time can use nonces to
get ephemeral vouchers, and 3) vouchers without expiration times
may be used, which will appear in the audit log, informing the
security decision.</t>
        <t>This document defines a voucher format that contains time values
for expirations, which require an accurate clock
in order to be processed correctly.  Vendors planning on
issuing vouchers with expiration values must ensure that devices
have an accurate clock when shipped from manufacturing
facilities and take steps to prevent clock tampering.
If it is not possible to ensure clock accuracy, then
vouchers with expirations should not be issued.</t>
      </section>
      <section anchor="protect-voucher-pki-in-hsm">
        <name>Protect Voucher PKI in HSM</name>
        <t>Pursuant the recommendation made in Section 6.1 for the MASA to be
deployed as an online voucher signing service, it is <bcp14>RECOMMENDED</bcp14> that
the MASA's private key used for signing vouchers is protected by
a hardware security module (HSM).</t>
      </section>
      <section anchor="test-domain-certificate-validity-when-signing">
        <name>Test Domain Certificate Validity When Signing</name>
        <t>If a domain certificate is compromised, then any outstanding
vouchers for that domain could be used by the attacker.  The domain
administrator is clearly expected to initiate revocation of any
domain identity certificates (as is normal in PKI solutions).</t>
        <t>Similarly, they are expected to contact the MASA to indicate that
an outstanding (presumably short lifetime) voucher should be blocked from
automated renewal.
Protocols for voucher distribution are
<bcp14>RECOMMENDED</bcp14> to check for revocation of domain identity certificates
before the signing of vouchers.</t>
      </section>
      <section anchor="yang-module-security-considerations">
        <name>YANG Module Security Considerations</name>
        <t>The YANG module specified in this document defines the schema
for data that is subsequently encapsulated by a CMS signed-data
content type, as described in Section 5 of <xref target="RFC5652"/>.  As such,
all of the YANG modeled data is protected from modification.</t>
        <t>Implementations should be aware that the signed data is only
protected from external modification; the data is still visible.
This potential disclosure of information doesn't affect security
so much as privacy.  In particular, adversaries can glean
information such as which devices belong to which organizations
and which CRL Distribution Point and/or OCSP Responder URLs are
accessed to validate the vouchers.  When privacy is important,
the CMS signed-data content type <bcp14>SHOULD</bcp14> be encrypted, either by
conveying it via a mutually authenticated secure transport protocol
(e.g., TLS <xref target="RFC5246"/>) or by encapsulating the signed-data
content type with an enveloped-data content type (Section 6
of <xref target="RFC5652"/>), though details for how to do this are outside
the scope of this document.</t>
        <t>The use of YANG to define data structures, via the 'yang-data'
statement, is relatively new and distinct from the traditional use of
YANG to define an API accessed by network management protocols such as
NETCONF <xref target="RFC6241"/> and RESTCONF <xref target="RFC8040"/>. For this reason, these
guidelines do not follow template described by Section 3.7 of
<xref target="YANG-GUIDE"/>.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="the-ietf-xml-registry">
        <name>The IETF XML Registry</name>
        <t>This document registers two URIs in the "IETF XML Registry" <xref target="RFC3688"/>.</t>
        <t>IANA has registered the following:</t>
        <ul empty="true">
          <li>
            <dl spacing="compact">
              <dt>URI:</dt>
              <dd>
                <t>urn:ietf:params:xml:ns:yang:ietf-voucher</t>
              </dd>
              <dt>Registrant Contact:</dt>
              <dd>
                <t>The ANIMA WG of the IETF.</t>
              </dd>
              <dt>XML:</dt>
              <dd>
                <t>N/A, the requested URI is an XML namespace.</t>
              </dd>
            </dl>
          </li>
        </ul>
        <t>This reference should be updated to point to this document.</t>
      </section>
      <section anchor="the-yang-module-names-registry">
        <name>The YANG Module Names Registry</name>
        <t>This document registers two YANG module in the "YANG Module Names"
registry <xref target="RFC6020"/>.</t>
        <t>IANA has registred the following:</t>
        <ul empty="true">
          <li>
            <dl spacing="compact">
              <dt>name:</dt>
              <dd>
                <t>ietf-voucher</t>
              </dd>
              <dt>namespace:</dt>
              <dd>
                <t>urn:ietf:params:xml:ns:yang:ietf-voucher</t>
              </dd>
              <dt>prefix:</dt>
              <dd>
                <t>vch</t>
              </dd>
            </dl>
            <t>reference:
  :RFC 8366</t>
          </li>
        </ul>
        <t>This reference should be updated to point to this document.</t>
      </section>
      <section anchor="vcj">
        <name>The Media Types Registry</name>
        <t>IANA has registered the media type: voucher-cms+json, and this registration should be updated to point to this document.</t>
      </section>
      <section anchor="the-smi-security-for-smime-cms-content-type-registry">
        <name>The SMI Security for S/MIME CMS Content Type Registry</name>
        <t>IANA has registered the OID 1.2.840.113549.1.9.16.1.40, id-ct-animaJSONVoucher.
This registration should be updated to point to this document.</t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC5652">
          <front>
            <title>Cryptographic Message Syntax (CMS)</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="70"/>
          <seriesInfo name="RFC" value="5652"/>
          <seriesInfo name="DOI" value="10.17487/RFC5652"/>
        </reference>
        <reference anchor="RFC6020">
          <front>
            <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="October" year="2010"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6020"/>
          <seriesInfo name="DOI" value="10.17487/RFC6020"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC7950">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="I-D.ietf-core-sid">
          <front>
            <title>YANG Schema Item iDentifier (YANG SID)</title>
            <author fullname="Michel Veillette" initials="M." surname="Veillette">
              <organization>Trilliant Networks Inc.</organization>
            </author>
            <author fullname="Alexander Pelov" initials="A." surname="Pelov">
              <organization>IMT Atlantique</organization>
            </author>
            <author fullname="Ivaylo Petrov" initials="I." surname="Petrov">
              <organization>Google Switzerland GmbH</organization>
            </author>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date day="22" month="December" year="2023"/>
            <abstract>
              <t>   YANG Schema Item iDentifiers (YANG SID) are globally unique 63-bit
   unsigned integers used to identify YANG items, as a more compact
   method to identify YANG items that can be used for efficiency and in
   constrained environments (RFC 7228).  This document defines the
   semantics, the registration, and assignment processes of YANG SIDs
   for IETF managed YANG modules.  To enable the implementation of these
   processes, this document also defines a file format used to persist
   and publish assigned YANG SIDs.


   // The present version (–24) is intended to address the remaining
   // IESG comments.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-sid-24"/>
        </reference>
        <reference anchor="RFC9148">
          <front>
            <title>EST-coaps: Enrollment over Secure Transport with the Secure Constrained Application Protocol</title>
            <author fullname="P. van der Stok" initials="P." surname="van der Stok"/>
            <author fullname="P. Kampanakis" initials="P." surname="Kampanakis"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="S. Raza" initials="S." surname="Raza"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>Enrollment over Secure Transport (EST) is used as a certificate provisioning protocol over HTTPS. Low-resource devices often use the lightweight Constrained Application Protocol (CoAP) for message exchanges. This document defines how to transport EST payloads over secure CoAP (EST-coaps), which allows constrained devices to use existing EST functionality for provisioning certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9148"/>
          <seriesInfo name="DOI" value="10.17487/RFC9148"/>
        </reference>
        <reference anchor="cBRSKI">
          <front>
            <title>Constrained Bootstrapping Remote Secure Key Infrastructure (cBRSKI)</title>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Peter Van der Stok" initials="P." surname="Van der Stok">
              <organization>vanderstok consultancy</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Esko Dijk" initials="E." surname="Dijk">
              <organization>IoTconsultancy.nl</organization>
            </author>
            <date day="8" month="July" year="2024"/>
            <abstract>
              <t>   This document defines the Constrained Bootstrapping Remote Secure Key
   Infrastructure (cBRSKI) protocol, which provides a solution for
   secure zero-touch onboarding of resource-constrained (IoT) devices
   into the network of a domain owner.  This protocol is designed for
   constrained networks, which may have limited data throughput or may
   experience frequent packet loss. cBRSKI is a variant of the BRSKI
   protocol, which uses an artifact signed by the device manufacturer
   called the "voucher" which enables a new device and the owner's
   network to mutually authenticate.  While the BRSKI voucher data is
   encoded in JSON, cBRSKI uses a compact CBOR-encoded voucher.  The
   BRSKI voucher data definition is extended with new data types that
   allow for smaller voucher sizes.  The Enrollment over Secure
   Transport (EST) protocol, used in BRSKI, is replaced with EST-over-
   CoAPS; and HTTPS used in BRSKI is replaced with DTLS-secured CoAP
   (CoAPS).  This document Updates RFC 8995 and RFC 9148.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-constrained-voucher-25"/>
        </reference>
        <reference anchor="jBRSKI">
          <front>
            <title>JWS signed Voucher Artifacts for Bootstrapping Protocols</title>
            <author fullname="Thomas Werner" initials="T." surname="Werner">
              <organization>Siemens AG</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date day="18" month="June" year="2024"/>
            <abstract>
              <t>   [I-D.draft-ietf-anima-rfc8366bis] defines a digital artifact called
   voucher as a YANG-defined JSON document that is signed using a
   Cryptographic Message Syntax (CMS) structure.  This document
   introduces a variant of the voucher artifact in which CMS is replaced
   by the JSON Object Signing and Encryption (JOSE) mechanism described
   in RFC7515 to support deployments in which JOSE is preferred over
   CMS.

   In addition to explaining how the format is created, the
   "application/voucher-jws+json" media type is registered and examples
   are provided.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-jws-voucher-10"/>
        </reference>
        <reference anchor="ITU-T.X690.2015" target="https://www.itu.int/rec/T-REC-X.690/">
          <front>
            <title>Information Technology - ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author>
              <organization>International Telecommunication Union</organization>
            </author>
            <date year="2015" month="August"/>
          </front>
          <seriesInfo name="ITU-T Recommendation X.690," value="ISO/IEC 8825-1"/>
        </reference>
        <reference anchor="ZERO-TOUCH">
          <front>
            <title>Secure Zero Touch Provisioning (SZTP)</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="I. Farrer" initials="I." surname="Farrer"/>
            <author fullname="M. Abrahamsson" initials="M." surname="Abrahamsson"/>
            <date month="April" year="2019"/>
            <abstract>
              <t>This document presents a technique to securely provision a networking device when it is booting in a factory-default state. Variations in the solution enable it to be used on both public and private networks. The provisioning steps are able to update the boot image, commit an initial configuration, and execute arbitrary scripts to address auxiliary needs. The updated device is subsequently able to establish secure connections with other systems. For instance, a device may establish NETCONF (RFC 6241) and/or RESTCONF (RFC 8040) connections with deployment-specific network management systems.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8572"/>
          <seriesInfo name="DOI" value="10.17487/RFC8572"/>
        </reference>
        <reference anchor="BRSKI">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="T. Eckert" initials="T." surname="Eckert"/>
            <author fullname="M. Behringer" initials="M." surname="Behringer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane. To do this, a Secure Key Infrastructure is bootstrapped. This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline. We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device. The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="PRM">
          <front>
            <title>BRSKI with Pledge in Responder Mode (BRSKI-PRM)</title>
            <author fullname="Steffen Fries" initials="S." surname="Fries">
              <organization>Siemens AG</organization>
            </author>
            <author fullname="Thomas Werner" initials="T." surname="Werner">
              <organization>Siemens AG</organization>
            </author>
            <author fullname="Eliot Lear" initials="E." surname="Lear">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date day="5" month="July" year="2024"/>
            <abstract>
              <t>   This document defines enhancements to Bootstrapping a Remote Secure
   Key Infrastructure (BRSKI, RFC8995) to enable bootstrapping in
   domains featuring no or only limited connectivity between a pledge
   and the domain registrar.  It specifically changes the interaction
   model from a pledge-initiated mode, as used in BRSKI, to a pledge-
   responding mode, where the pledge is in server role.  For this, BRSKI
   with Pledge in Responder Mode (BRSKI-PRM) introduces a new component,
   the Registrar-Agent, which facilitates the communication between
   pledge and registrar during the bootstrapping phase.  To establish
   the trust relation between pledge and registrar, BRSKI-PRM relies on
   object security rather than transport security.  The approach defined
   here is agnostic to the enrollment protocol that connects the domain
   registrar to the domain CA.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-brski-prm-13"/>
        </reference>
        <reference anchor="CLOUD">
          <front>
            <title>BRSKI Cloud Registrar</title>
            <author fullname="Owen Friel" initials="O." surname="Friel">
              <organization>Cisco</organization>
            </author>
            <author fullname="Rifaat Shekh-Yusef" initials="R." surname="Shekh-Yusef">
              <organization>Auth0</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date day="24" month="August" year="2023"/>
            <abstract>
              <t>   Bootstrapping Remote Secure Key Infrastructures defines how to
   onboard a device securely into an operator maintained infrastructure.
   It assumes that there is local network infrastructure for the device
   to discover and to help the device.  This document extends the new
   device behaviour so that if no local infrastructure is available,
   such as in a home or remote office, that the device can use a well
   defined "call-home" mechanism to find the operator maintained
   infrastructure.

   To this, this document defines how to contact a well-known Cloud
   Registrar, and two ways in which the new device may be redirected
   towards the operator maintained infrastructure.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-brski-cloud-08"/>
        </reference>
        <reference anchor="RFC8791">
          <front>
            <title>YANG Data Structure Extensions</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Björklund" initials="M." surname="Björklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="June" year="2020"/>
            <abstract>
              <t>This document describes YANG mechanisms for defining abstract data structures with YANG.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8791"/>
          <seriesInfo name="DOI" value="10.17487/RFC8791"/>
        </reference>
        <reference anchor="RFC7951">
          <front>
            <title>JSON Encoding of Data Modeled with YANG</title>
            <author fullname="L. Lhotka" initials="L." surname="Lhotka"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>This document defines encoding rules for representing configuration data, state data, parameters of Remote Procedure Call (RPC) operations or actions, and notifications defined using YANG as JavaScript Object Notation (JSON) text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7951"/>
          <seriesInfo name="DOI" value="10.17487/RFC7951"/>
        </reference>
        <reference anchor="RFC2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC3688">
          <front>
            <title>The IETF XML Registry</title>
            <author fullname="M. Mealling" initials="M." surname="Mealling"/>
            <date month="January" year="2004"/>
            <abstract>
              <t>This document describes an IANA maintained registry for IETF standards which use Extensible Markup Language (XML) related items such as Namespaces, Document Type Declarations (DTDs), Schemas, and Resource Description Framework (RDF) Schemas.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="81"/>
          <seriesInfo name="RFC" value="3688"/>
          <seriesInfo name="DOI" value="10.17487/RFC3688"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC8340">
          <front>
            <title>YANG Tree Diagrams</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="L. Berger" initials="L." role="editor" surname="Berger"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document captures the current syntax used in YANG module tree diagrams. The purpose of this document is to provide a single location for this definition. This syntax may be updated from time to time based on the evolution of the YANG language.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="215"/>
          <seriesInfo name="RFC" value="8340"/>
          <seriesInfo name="DOI" value="10.17487/RFC8340"/>
        </reference>
        <reference anchor="RFC6125">
          <front>
            <title>Representation and Verification of Domain-Based Application Service Identity within Internet Public Key Infrastructure Using X.509 (PKIX) Certificates in the Context of Transport Layer Security (TLS)</title>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="J. Hodges" initials="J." surname="Hodges"/>
            <date month="March" year="2011"/>
            <abstract>
              <t>Many application technologies enable secure communication between two entities by means of Internet Public Key Infrastructure Using X.509 (PKIX) certificates in the context of Transport Layer Security (TLS). This document specifies procedures for representing and verifying the identity of application services in such interactions. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6125"/>
          <seriesInfo name="DOI" value="10.17487/RFC6125"/>
        </reference>
        <reference anchor="RFC7435">
          <front>
            <title>Opportunistic Security: Some Protection Most of the Time</title>
            <author fullname="V. Dukhovni" initials="V." surname="Dukhovni"/>
            <date month="December" year="2014"/>
            <abstract>
              <t>This document defines the concept "Opportunistic Security" in the context of communications protocols. Protocol designs based on Opportunistic Security use encryption even when authentication is not available, and use authentication when possible, thereby removing barriers to the widespread use of encryption on the Internet.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7435"/>
          <seriesInfo name="DOI" value="10.17487/RFC7435"/>
        </reference>
        <reference anchor="RFC8366">
          <front>
            <title>A Voucher Artifact for Bootstrapping Protocols</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
            <author fullname="T. Eckert" initials="T." surname="Eckert"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>This document defines a strategy to securely assign a pledge to an owner using an artifact signed, directly or indirectly, by the pledge's manufacturer. This artifact is known as a "voucher".</t>
              <t>This document defines an artifact format as a YANG-defined JSON document that has been signed using a Cryptographic Message Syntax (CMS) structure. Other YANG-derived formats are possible. The voucher artifact is normally generated by the pledge's manufacturer (i.e., the Manufacturer Authorized Signing Authority (MASA)).</t>
              <t>This document only defines the voucher artifact, leaving it to other documents to describe specialized protocols for accessing it.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8366"/>
          <seriesInfo name="DOI" value="10.17487/RFC8366"/>
        </reference>
        <referencegroup anchor="CBOR" target="https://www.rfc-editor.org/info/std94">
          <reference anchor="RFC8949" target="https://www.rfc-editor.org/info/rfc8949">
            <front>
              <title>Concise Binary Object Representation (CBOR)</title>
              <author fullname="C. Bormann" initials="C." surname="Bormann"/>
              <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
              <date month="December" year="2020"/>
              <abstract>
                <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
                <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="94"/>
            <seriesInfo name="RFC" value="8949"/>
            <seriesInfo name="DOI" value="10.17487/RFC8949"/>
          </reference>
        </referencegroup>
        <referencegroup anchor="COSE" target="https://www.rfc-editor.org/info/std96">
          <reference anchor="RFC9052" target="https://www.rfc-editor.org/info/rfc9052">
            <front>
              <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
              <author fullname="J. Schaad" initials="J." surname="Schaad"/>
              <date month="August" year="2022"/>
              <abstract>
                <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
                <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="96"/>
            <seriesInfo name="RFC" value="9052"/>
            <seriesInfo name="DOI" value="10.17487/RFC9052"/>
          </reference>
          <reference anchor="RFC9338" target="https://www.rfc-editor.org/info/rfc9338">
            <front>
              <title>CBOR Object Signing and Encryption (COSE): Countersignatures</title>
              <author fullname="J. Schaad" initials="J." surname="Schaad"/>
              <date month="December" year="2022"/>
              <abstract>
                <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. CBOR Object Signing and Encryption (COSE) defines a set of security services for CBOR. This document defines a countersignature algorithm along with the needed header parameters and CBOR tags for COSE. This document updates RFC 9052.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="96"/>
            <seriesInfo name="RFC" value="9338"/>
            <seriesInfo name="DOI" value="10.17487/RFC9338"/>
          </reference>
        </referencegroup>
        <reference anchor="JWS">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="YANGCBOR">
          <front>
            <title>Encoding of Data Modeled with YANG in the Concise Binary Object Representation (CBOR)</title>
            <author fullname="M. Veillette" initials="M." role="editor" surname="Veillette"/>
            <author fullname="I. Petrov" initials="I." role="editor" surname="Petrov"/>
            <author fullname="A. Pelov" initials="A." surname="Pelov"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>YANG (RFC 7950) is a data modeling language used to model configuration data, state data, parameters and results of Remote Procedure Call (RPC) operations or actions, and notifications.</t>
              <t>This document defines encoding rules for YANG in the Concise Binary Object Representation (CBOR) (RFC 8949).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9254"/>
          <seriesInfo name="DOI" value="10.17487/RFC9254"/>
        </reference>
        <reference anchor="SECUREJOIN">
          <front>
            <title>6tisch Secure Join protocol</title>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date day="25" month="February" year="2017"/>
            <abstract>
              <t>   This document describes a zero-touch mechanism to enroll a new device
   (the "pledge") into a IEEE802.15.4 TSCH network using the 6tisch
   signaling mechanisms.  The resulting device will obtain a domain
   specific credential that can be used with either 802.15.9 per-host
   pair keying protocols, or to obtain the network-wide key from a
   coordinator.  The mechanism describe her is an augmentation to the
   one-touch mechanism described in [I-D.ietf-6tisch-minimal-security].

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-6tisch-dtsecurity-secure-join-01"/>
        </reference>
        <reference anchor="YANG-GUIDE">
          <front>
            <title>Guidelines for Authors and Reviewers of Documents Containing YANG Data Models</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This memo provides guidelines for authors and reviewers of specifications containing YANG modules. Recommendations and procedures are defined, which are intended to increase interoperability and usability of Network Configuration Protocol (NETCONF) and RESTCONF protocol implementations that utilize YANG modules. This document obsoletes RFC 6087.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="216"/>
          <seriesInfo name="RFC" value="8407"/>
          <seriesInfo name="DOI" value="10.17487/RFC8407"/>
        </reference>
        <reference anchor="Stajano99theresurrecting" target="https://www.cl.cam.ac.uk/research/dtg/www/files/publications/public/files/tr.1999.2.pdf">
          <front>
            <title>The Resurrecting Duckling: Security Issues for Ad-Hoc Wireless Networks</title>
            <author initials="F." surname="Stajano" fullname="Frank Stajano">
              <organization/>
            </author>
            <author initials="R." surname="Anderson" fullname="Ross Anderson">
              <organization/>
            </author>
            <date year="1999"/>
          </front>
        </reference>
        <reference anchor="imprinting" target="https://en.wikipedia.org/w/index.php?title=Imprinting_(psychology)&amp;oldid=825757556">
          <front>
            <title>Wikipedia article: Imprinting</title>
            <author>
              <organization>Wikipedia</organization>
            </author>
            <date year="2018" month="February"/>
          </front>
        </reference>
        <reference anchor="I-D.selander-ace-ake-authz">
          <front>
            <title>Lightweight Authorization for Authenticated Key Exchange.</title>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Mališa Vučinić" initials="M." surname="Vučinić">
              <organization>INRIA</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Aurelio Schellenbaum" initials="A." surname="Schellenbaum">
              <organization>Institute of Embedded Systems, ZHAW</organization>
            </author>
            <date day="18" month="April" year="2022"/>
            <abstract>
              <t>   This document describes a procedure for augmenting the lightweight
   authenticated Diffie-Hellman key exchange protocol EDHOC with third
   party assisted authorization, targeting constrained IoT deployments
   (RFC 7228).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-selander-ace-ake-authz-05"/>
        </reference>
      </references>
    </references>
    <?line 1440?>

<section anchor="examples">
      <name>Examples</name>
      <section anchor="key-pairs-associated-with-examples">
        <name>Key pairs associated with examples</name>
        <t>The following voucher request has been produced using the IDevID public (certificate) and private key.
They are included so that other developers can match the same output.</t>
        <t>The private RSA key:</t>
        <artwork><![CDATA[
-----BEGIN EC PRIVATE KEY-----
MHcCAQEEIBHNh6r8QRevRuo+tEmBJeFjQKf6bpFA/9NGoltv+9sNoAoGCCqGSM49
AwEHoUQDQgAEA6N1Q4ezfMAKmoecrfb0OBMc1AyEH+BATkF58FsTSyBxs0SbSWLx
FjDOuwB9gLGn2TsTUJumJ6VPw5Z/TP4hJw==
-----END EC PRIVATE KEY-----
]]></artwork>
        <t>The IDevID certificate (public key):</t>
        <artwork><![CDATA[
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
]]></artwork>
        <t>The Certification Authority that created the IDevID:</t>
        <artwork><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1016146354 (0x3c9129b2)
        Signature Algorithm: sha256WithRSAEncryption
        Issuer: CN = highway-test.example.com CA
        Validity
            Not Before: Apr  5 19:36:57 2021 GMT
            Not After : May  6 05:36:57 2021 GMT
        Subject: CN = highway-test.example.com CA
        Subject Public Key Info:
            Public Key Algorithm: rsaEncryption
                Public-Key: (3072 bit)
                Modulus:
                    00:b4:7b:27:42:49:9f:ed:85:47:74:ff:f6:50:cd:
                    5d:22:1a:64:38:22:f8:09:d2:d6:f3:60:d8:98:7f:
                    e5:84:52:1e:d9:ce:96:b4:dc:a6:43:74:67:27:d9:
                    9d:42:7d:bf:1a:43:92:9b:d1:dd:34:9b:41:d2:e3:
                    d5:59:b3:40:fc:b3:c9:e1:58:84:3f:87:f7:06:45:
                    25:26:4c:bf:a1:45:72:a0:0a:5b:86:41:d7:8e:be:
                    d3:38:b5:aa:66:69:bd:3a:fd:e9:b5:b8:a2:79:c4:
                    f0:a5:3c:9e:91:94:32:1e:9c:b0:7f:25:46:5b:76:
                    1d:86:23:85:b0:62:45:5c:a8:6f:fb:c5:26:e1:dd:
                    a8:f2:68:ab:c5:8c:b4:58:b4:2e:96:49:fa:fe:d2:
                    ea:a5:11:68:c2:8d:f4:58:ab:30:bd:dd:1b:29:97:
                    00:18:6f:59:40:9c:3a:2a:e4:96:25:bb:12:f4:1a:
                    11:72:6d:31:f6:b4:e1:cc:d8:9a:0c:aa:a8:aa:a4:
                    64:e3:f1:06:1c:c0:09:df:62:ba:04:cb:70:b0:c4:
                    f7:ca:35:22:ea:a9:c7:52:e1:ce:27:fb:6c:52:39:
                    b7:22:b3:5d:97:cb:0a:9f:75:a3:af:16:ef:e6:b2:
                    1b:6a:c3:0b:1d:15:fd:b8:d8:e7:8a:f6:f4:99:1c:
                    23:97:4b:80:e9:79:a3:85:16:f8:dd:bd:77:ef:3a:
                    3c:8e:e7:75:56:67:36:3a:dd:42:7b:84:2f:64:2f:
                    13:0e:fa:b0:3b:11:13:7e:ae:78:a6:2f:46:dd:4b:
                    11:88:e4:7b:19:ab:21:2d:1f:34:ba:61:cd:51:84:
                    a5:ec:6a:c1:90:20:70:e3:aa:f4:01:fd:0c:6e:cd:
                    04:47:99:31:70:79:6c:af:41:78:c1:04:2a:43:78:
                    84:8a:fe:c3:3d:f2:41:c8:2a:a1:10:e0:b7:b4:4f:
                    4e:e6:26:79:ac:49:64:cf:57:1e:2e:e3:2f:58:bd:
                    6f:30:00:67:d7:8b:d6:13:60:bf
                Exponent: 65537 (0x10001)
        X509v3 extensions:
            X509v3 Basic Constraints: critical
                CA:TRUE
            X509v3 Key Usage: critical
                Certificate Sign, CRL Sign
            X509v3 Subject Key Identifier: 
                33:12:45:B7:1B:10:BE:F3:CB:64:E5:4C:50:80:7C:9D:88:\
                                                             65:74:40
            X509v3 Authority Key Identifier: 
                33:12:45:B7:1B:10:BE:F3:CB:64:E5:4C:50:80:7C:9D:88:\
                                                             65:74:40
    Signature Algorithm: sha256WithRSAEncryption
    Signature Value:
        05:37:28:85:37:39:71:87:ec:5c:f0:51:19:55:4a:b7:e0:2a:
        e6:61:30:d4:e2:2b:ad:7a:db:12:fc:8a:a6:6e:15:82:80:10:
        fa:5d:67:60:e8:54:14:e3:89:d6:4e:60:89:98:5b:ab:fe:32:
        26:aa:02:35:68:4e:c6:2e:ce:08:36:d1:ea:a0:97:3d:76:38:
        6e:9d:4b:6f:33:d2:fa:c2:7e:b0:59:bc:75:97:17:d1:1b:c5:
        c4:58:ae:7b:7e:87:e5:87:2b:8b:6b:10:16:70:7c:c8:65:c7:
        d0:62:5d:f3:b5:06:af:03:8b:32:dd:88:f0:07:2b:5d:61:58:
        61:35:54:a6:ce:95:81:a2:6e:fa:b5:aa:25:e1:41:53:9d:e7:
        4b:7e:93:88:79:6b:dd:a3:6e:9a:0d:bd:85:b4:2d:66:b9:cc:
        01:13:f1:b5:d5:91:cc:86:5e:a7:c8:4a:8f:4d:9d:f8:17:31:
        32:7d:50:d5:c2:79:a0:41:a0:69:83:33:16:14:35:26:10:3b:
        23:eb:60:d9:28:68:99:d5:55:61:89:b5:35:5d:8b:fe:b1:96:
        32:69:3e:8b:c2:a2:4e:e1:d8:76:04:3c:87:91:5d:66:9e:81:
        a5:bf:18:2e:3e:39:da:4f:68:57:46:d2:1d:aa:81:51:3b:33:
        72:da:e9:7d:12:b6:a1:fc:c7:1d:c1:9c:bd:92:e8:1b:d2:06:
        e8:0b:82:2a:4f:23:5a:7a:fa:7b:86:a0:d7:c1:46:e7:04:47:
        77:11:cd:da:7c:50:32:d2:6f:fd:1e:0a:df:cf:b1:20:d2:86:
        ce:40:5a:27:61:49:2f:71:f5:04:ac:eb:c6:03:70:a4:70:13:
        4a:af:41:35:83:dc:55:c0:29:7f:12:4f:d0:f1:bb:f7:61:4a:
        9f:8d:61:b0:5e:89:46:49:e3:27:8b:42:82:5e:af:14:d5:d9:
        91:69:3d:af:11:70:5b:a3:92:3b:e3:c8:2a:a4:38:e5:88:f2:
        6f:09:f4:e5:04:3b
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
]]></artwork>
        <t>The private key for the Certification Authority that created the IDevID:</t>
        <artwork><![CDATA[
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
]]></artwork>
        <t>The MASA certificate that signs the voucher:</t>
        <artwork><![CDATA[
-----BEGIN CERTIFICATE-----
MIIBcDCB9qADAgECAgQLhwoxMAoGCCqGSM49BAMCMCYxJDAiBgNVBAMMG2hpZ2h3
YXktdGVzdC5leGFtcGxlLmNvbSBDQTAeFw0yMTA0MTMyMTQwMTZaFw0yMzA0MTMy
MTQwMTZaMCgxJjAkBgNVBAMMHWhpZ2h3YXktdGVzdC5leGFtcGxlLmNvbSBNQVNB
MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEqgQVo0S54kT4yfkbBxumdHOcHrps
qbOpMKmiMln3oB1HAW25MJV+gqi4tMFfSJ0iEwt8kszfWXK4rLgJS2mnpaMQMA4w
DAYDVR0TAQH/BAIwADAKBggqhkjOPQQDAgNpADBmAjEArsthLdRcjW6GqgsGHcbT
YLoyczYl0yOFSYcczpQjeRqeQVUkHRUioUi7CsCrPBNzAjEAhjxns5Wi4uX5rfkd
nME0Mnj1z+rVRwOfAL/QWctRwpgEgSSKURNQsXWyL52otPS5
-----END CERTIFICATE-----
]]></artwork>
        <t>The private key for MASA certificate signs the voucher:</t>
        <artwork><![CDATA[
-----BEGIN EC PRIVATE KEY-----
MHcCAQEEIFhdd0eDdzip67kXx72K+KHGJQYJHNy8pkiLJ6CcvxMGoAoGCCqGSM49
AwEHoUQDQgAEqgQVo0S54kT4yfkbBxumdHOcHrpsqbOpMKmiMln3oB1HAW25MJV+
gqi4tMFfSJ0iEwt8kszfWXK4rLgJS2mnpQ==
-----END EC PRIVATE KEY-----
]]></artwork>
      </section>
      <section anchor="example-cms-signed-voucher-request">
        <name>Example CMS signed voucher request</name>
        <artwork><![CDATA[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]]></artwork>
      </section>
      <section anchor="example-cms-signed-voucher-from-masa">
        <name>Example CMS signed voucher from MASA</name>
        <artwork><![CDATA[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]]></artwork>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The authors would like to thank for following for
lively discussions on list and in the halls (ordered
by last name):
<contact fullname="William Atwood"/>,
<contact fullname="Michael H. Behringer"/>,
<contact fullname="Esko Dijk"/>,
<contact fullname="Steffen Fries"/>,
<contact fullname="Sheng Jiang"/>,
<contact fullname="Thomas Werner"/>.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
