<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.6.4 (Ruby 2.6.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-anima-voucher-delegation-02" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.12.4 -->
  <front>
    <title abbrev="delegated-voucher">Delegated Authority for Bootstrap Voucher Artifacts</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-anima-voucher-delegation-02"/>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <author initials="W." surname="Pan" fullname="Wei Pan">
      <organization>Huawei Technologies</organization>
      <address>
        <email>william.panwei@huawei.com</email>
      </address>
    </author>
    <date year="2022" month="July" day="11"/>
    <area>Internet</area>
    <workgroup>anima Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document describes an extension of the RFC8366 Voucher Artifact
in order to support delegation of signing authority.  The initial voucher
pins a public identity, and that public indentity can then issue additional
vouchers.  This chain of authorization can support permission-less resale
of devices, as well as guarding against business failure of the
BRSKI Manufacturer Authorized Signing Authority (MASA).</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>The <xref target="RFC8366"/> voucher artifact provides a proof from a manufacturer's
authorizing signing authority (MASA) of the intended owner of a device.  This is
used by an onboarding Pledge device in BRSKI (<xref target="RFC8995"/>,
<xref target="I-D.ietf-anima-constrained-voucher"/>), and SZTP (<xref target="RFC8572"/>).</t>
      <t>There are a number of criticisms of the MASA concept.  They include:</t>
      <ul spacing="normal">
        <li>the MASA must be reachable to the Registar during the onboarding process.</li>
        <li>while the use of a nonceless voucher (see <xref target="RFC8366"/> section 4) can
permit the MASA to be offline, it still requires the public key/certificate
of the Registrar to be known at issuing time. The device owner is always
strongly dependent on the MASA service.</li>
        <li>the MASA must approve all transfers of ownership, impacting the rights of the supply chain distributors to transfer ownership as they see fit.</li>
        <li>if the Registrar has any nonceless vouchers, then it can not change it's public key, nor can it change which certification authority it uses.</li>
        <li>it is not possible for a MASA to pin ownership to a Registrar by Certification Authority plus DN.</li>
        <li>the creator of an assembly of parts/components can speak for the entire
assembly of parts in a transparent way.</li>
      </ul>
      <section anchor="requirements">
        <name>Requirements for the Delegation</name>
        <t>This voucher artifact satisfies the following requirements:</t>
        <section anchor="device-onboarding-with-disconnected-or-offline-masa">
          <name>Device Onboarding with Disconnected or Offline MASA</name>
          <t>A Registrar wishes to onboard devices while it is not being connected to the
Internet and MASA.</t>
        </section>
        <section anchor="resale-of-devices">
          <name>Resale of Devices</name>
          <t>An owner of a device wishes to resale it which has previously been
onboarded to a third party without specific authorization from the
manufacturer.</t>
        </section>
        <section anchor="crypto-agility-for-registrar">
          <name>Crypto-agility for Registrar</name>
          <t>The owner/manager of a registrar wishes to be able to replace its domain
registration key.
Replacing the registration key would invalidate any previously acquired
(nonceless) vouchers.
Any devices which have not been onboarded, or which need to be factory reset,
would not trust a replacement key.</t>
        </section>
        <section anchor="transparent-assemblersvalue-added-resellers">
          <name>Transparent Assemblers/Value-Added-Resellers</name>
          <t>An assembly may consist of a number of parts which are onboarded to a local
controller during the manufacturing process.
Subsequent to this, the entire assembly will be shipped to a customer who
wishes to onboard all the components.
The sub-components of the assembly needs to communicate with other
sub-components, and so all the parts need to transparently onboarded.
(This is contrasted with an assembly where the controller acts as a security
gateway. Such a gateway might be a single point of failure)</t>
          <t>Assemblies may nest quite deeply.</t>
        </section>
      </section>
      <section anchor="overview-of-proposed-solution">
        <name>Overview of Proposed Solution</name>
        <t>The MASA will issue a voucher that delegates it's signing authority for one
or more devices to a specific Registrar.
This is called a "delegation voucher".</t>
        <t>This Registrar can then operate as an authorized signing authority for the
manufacturer, and can subsequently issue additional vouchers binding the
pledge to new Registrars.</t>
        <t>This delegation can potentially be repeated multiple times to enable second,
third, or n-th level of resale.</t>
        <t>The delegation voucher may be stored by the pledge for storage, to be
included by the pledge in subsequent bootstrap operations.
The inclusion of the delegation voucher permits next Registrar with heuristics that
permit it to find the delegated authorized signing authority (DASA).</t>
        <t>The delegation voucher pins the identity of the delegated authority using a
variety of different mechanisms which are covered in <xref target="pinnedmechanism"/>.</t>
      </section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <dl>
        <dt>Delegated Authorized Signing Authority :</dt>
        <dd>
          <t>the Delegated Authorized Signing Authority (DASA) is a service that can
generate vouchers for one or more pledges to provide bootstrap authority,
which is separated and delegated from the manufacturer.</t>
        </dd>
        <dt>Delegation Voucher:</dt>
        <dd>
          <t>a Delegation Voucher is an <xref target="RFC8366"/> format voucher that has additional
fields to provide details of the entity to which authority has been delegated.</t>
        </dd>
        <dt>Intermediate Voucher:</dt>
        <dd>
          <t>a voucher that is not the final voucher linking a pledge to its owner.</t>
        </dd>
        <dt>End Voucher:</dt>
        <dd>
          <t>a voucher that is the final voucher linking a pledge to its owner.</t>
        </dd>
      </dl>
    </section>
    <section anchor="delegation-voucher-artifact">
      <name>Delegation Voucher Artifact</name>
      <t>The following tree diagram shows the extensions to the <xref target="RFC8366"/> voucher.</t>
      <t>There are a few new fields:</t>
      <dl>
        <dt>delegation-enable-flag:</dt>
        <dd>
          <t>A global enable flag to the pledge that it can be delegated (true) or not (false). With default, this flag is false, which is consistent with the voucher artifact in RFC8366.</t>
        </dd>
        <dt>pinned-delegation-cert-authority:</dt>
        <dd>
          <t>An subject-public-key-info for a public key of the new DASA</t>
        </dd>
        <dt>pinned-delegation-cert-name:</dt>
        <dd>
          <t>A string for the rfc822Name SubjectAltName contents of the new DASA; (XXX- is it enough, should other DNs be considered?)</t>
        </dd>
        <dt>delegation-voucher:</dt>
        <dd>
          <t>One or a series of Intermediate Vouchers that delegate authority to the DASA. For the latter case, the series of Intermediate Vouchers constitute a nested structure, and the most inner voucher is from the MASA, which is called terminal voucher here</t>
        </dd>
        <dt>intermediate-identities:</dt>
        <dd>
          <t>A set of voucher identities being consistent with the series of Intermediate Vouchers</t>
        </dd>
        <dt>delegation-countdown:</dt>
        <dd>
          <t>Number of delegations still available. If zero or omitted, then this is a terminal voucher and may not be further delegated.</t>
        </dd>
      </dl>
      <t>In addition, the serial-number field is no longer a plain leaf, but can also be an array (See <xref target="delegationmultidev"/>).</t>
      <artwork><![CDATA[
module: ietf-voucher-delegated

  grouping voucher-delegated-grouping:
    +-- voucher
       +-- created-on                          yang:date-and-time
       +-- expires-on?                         yang:date-and-time
       +-- assertion
       |       ianavat:voucher-assertion
       +-- serial-number                       string
       +-- idevid-issuer?                      binary
       +-- pinned-domain-cert?                 binary
       +-- domain-cert-revocation-checks?      boolean
       +-- nonce?                              binary
       +-- last-renewal-date?                  yang:date-and-time
       +-- delegation-enable-flag?             boolean
       +-- pinned-delegation-cert-authority?   binary
       +-- pinned-delegation-cert-name?        binary
       +-- delegation-voucher?                 binary
       +-- intermediate-identities?            binary
       +-- delegation-countdown?               int16
]]></artwork>
      <section anchor="yang-module">
        <name>YANG Module</name>
        <t>This module uses the grouping that was created in <xref target="RFC8366"/> to extend the
definition.</t>
        <sourcecode markers="true" name="ietf-voucher-delegated@2020-01-06.yang"><![CDATA[
module ietf-voucher-delegated {
  yang-version 1.1;

  namespace
    "urn:ietf:params:xml:ns:yang:ietf-voucher-delegated";
  prefix "delegated";

  import ietf-restconf {
    prefix rc;
    description
      "This import statement is only present to access
       the yang-data extension defined in RFC 8040.";
    reference "RFC 8040: RESTCONF Protocol";
  }

  // maybe should import from constrained-voucher instead!
  import ietf-voucher {
    prefix "v";
  }

  organization
   "IETF ANIMA Working Group";

  contact
   "WG Web:   <http://tools.ietf.org/wg/anima/>
    WG List:  <mailto:anima@ietf.org>
    Author:   Michael Richardson
              <mailto:mcr+ietf@sandelman.ca>";

  description
  "This module extends the RFC8366 voucher format to provide
   a mechanism by which the authority to issue additional vouchers
   may be delegated to another entity

   The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL',
   'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'MAY',
   and 'OPTIONAL' in the module text are to be interpreted as
   described in BCP 14 RFC 2119, and RFC8174.";

  revision "2020-01-06" {
    description
     "Initial version";
    reference
     "RFC XXXX: Voucher Profile for Delegation Vouchers";
  }

  rc:yang-data voucher-delegated-artifact {
    // YANG data template for a voucher.
    uses voucher-delegated-grouping;
  }

  // Grouping defined for future usage
  grouping voucher-delegated-grouping {
    description
      "Grouping to allow reuse/extensions in future work.";

    uses v:voucher-artifact-grouping {

      refine voucher/pinned-domain-cert {
          mandatory  false;
      }

      augment "voucher" {
        description "Base the delegated voucher
                     upon the regular one";

        leaf delegation-enable-flag {
          type boolean;
          description
            "A global enable flag to the pledge that it can be
             delegated (true) or not (false). With default,
             this flag is false, which is consistent with
             the voucher artifact in RFC8366. ";
        }

        leaf pinned-delegation-cert-authority {
          type binary;
          description
            "An subject-public-key-info for a public key of the
             certificate authority that is to be trusted to issue
             a delegation voucher to the Registrar.
             This is not used by end-vouchers, and only valid
             when delegation-enable-flag is true.";
        }

        leaf pinned-delegation-cert-name {
          type binary;
          description
            "A string for the rfc822Name SubjectAltName contents
             which will be trusted to issue delegation vouchers.
             This is not used by end-vouchers, and only valid
             when delegation-enable-flag is true.";
        }

        leaf delegation-voucher {
          type binary;
          description
            "The intermediate voucher that delegates
             authority to the entity that signs this voucher
             is to be included here, and only valid
             when delegation-enable-flag is true.";
        }

        leaf intermediate-identities {
          type binary;
          description
            "A set of identities that will be needed to
             validate the chain of vouchers, and only valid
             when delegation-enable-flag is true. MAY BE REDUNDANT";
        }

        leaf delegation-countdown {
          type int16;
          description
          "Number of delegations still available, and only valid
             when delegation-enable-flag is true. If zero
           or omitted, then this is a terminal voucher and
           may not be further delegated";
        }
      }
    }
  }
}
]]></sourcecode>
      </section>
      <section anchor="bundling-of-the-vouchers">
        <name>Bundling of The Vouchers</name>
        <t><xref target="RFC8995"/> defines a mechanism to return a single voucher to the pledge.</t>
        <t>This protocol requires a number of additional items to be returned to the
pledge for evaluation:  the series of Intermediate Vouchers that leads to the
DASA, and the public keys (often as certificates) of the Registrars on the
Delegation Path that leads to each Authority.</t>
      </section>
      <section anchor="delegationmultidev">
        <name>Delegation of Multiple Devices</name>
        <t>A MASA MAY delegate multiple devices to the same Registrar by putting an
array of items in the "serial-number" attributes. (XXX-how to describe this
in the YANG, and the detailed mechanism, are TBD)</t>
      </section>
    </section>
    <section anchor="enhanced-pledge-behavior">
      <name>Enhanced Pledge Behavior</name>
      <t>The use of a Delegation Voucher requires changes to how the pledge evaluates
the voucher that is returned to by the Registrar.</t>
      <t>There are no significant changes to the voucher-request that is made.
The pledge continues to pin the identity of the Registrar to which it is
connected, providing a nonce to establish freshness.</t>
      <t>A pledge which has previously stored a Delegation Voucher and DASA
, SHOULD include it in its voucher request.
This will be in the form of a certificate provided by the "previous" owner.
This allows the Registrar to discover the previous authority for the pledge.
As the pledge has no idea if it connecting to an entity that it previously
has connected to, it needs to include this certificate anyway.</t>
      <t>The pledge receives a voucher from the Registrar.
This voucher is called the zero voucher.
It will observe that the voucher is not signed with its built-in manufacturer
trust anchor and it can not verify it.</t>
      <t>The pledge will examine the voucher to look for the "delegation-voucher"
and the "intermediate-identities" attributes within the voucher.
A certificate from the set of intermediate-identities is expected to validate
the signature on this zeroth end-entity voucher.
(XXX- This attribute can be replaced by the CMS certificate chain)</t>
      <t>The contained delegation-voucher object is to be interpreted as an
(Intermediate) Voucher.
This first voucher is called the first voucher, or "voucher[1]".
Generically, for voucher[i], the voucher found in the delegation-voucher is
called voucher[i+1].</t>
      <t>If voucher[i] can be validated by a built-in trust anchor, then the process
is done.
If not, then voucher[i] is examined in a recursive process until there are
no further embedded vouchers.
The last voucher[n] is expected to be validated by a built-in manufacturer
trust anchor.</t>
      <t>Once the top (n-th) voucher is found, then the pinned-certificate-authority
is added to the working set of trust anchors.
The "pinned-certificate-name" attribute is used along with the trust anchor to
validate the certificate chain provided with the (n-1)th voucher.
This is repeated (unwinding the recursive processing) until the zeroth
voucher has been validated.</t>
    </section>
    <section anchor="changes-to-registrar-behavior">
      <name>Changes to Registrar Behavior</name>
      <t>The Registrar is the component that authenticates the pledge, makes authorization decisions, and distributes vouchers. If the vouchers is delegated, then the registrar need to co-ordinate MASA and DASA.</t>
      <section anchor="discovering-the-most-recent-delegated-authority-to-use">
        <name>Discovering The Most Recent Delegated Authority to Use</name>
        <t>The pledge continues to use its manufacturer issued IDevID when performing
BRSKI-style onboarding.
The IDevID contains an extension, the MASA URL (see
<xref target="RFC8995"/> section 2.3.2).
The IDevID certificate is not expected to be updated when the device is
resold, nor may it be practical for an intermediate owner to be able
to replace the IDevID with their own.
(Some devices may support having an intermediate owner replace the IDevID, in
which case this section does not apply)</t>
        <t>The Registrar needs to be informed that it should not contact a MASA using
the URL in the IDevID, but rather to contact the previous owner's DASA.</t>
        <t>This can be accomplished by local override, as described in
<xref target="RFC8995"/> section 5.4:</t>
        <artwork><![CDATA[
Registrars MAY include a mechanism to override
the MASA URL on a manufacturer-by-manufacturer basis, and within that
override it is appropriate to provide alternate anchors.  This will
typically used by some vendors to establish explicit (or private)
trust anchors for validating their MASA that is part of a sales
channel integration.
]]></artwork>
        <t>The above override needs to be established on a per-device basis.
It requires per-device configuration which is very much non-autonomic.</t>
        <t>There are two other alternatives:</t>
        <ol spacing="normal" type="1"><li>The Manufacturer could be aware of any Delegation Vouchers that it has
issued for a particular device, and when contacted by the Registrar, it
could redirect the Registrar to its DASA. And the DASA may redirect the
Registrar to its delegated DASA, this process is recursive to the final DASA.</li>
          <li>The Pledge could provide a signed statement from the manufacturer
providing the Registrar with a pointer to the DASA.</li>
        </ol>
        <t>Option 1 requires that the Registrar still contact the MASA, violating most
of the goals from <xref target="requirements"/>.</t>
        <t>Option 2 requires a signed artifact, and conveniently, the Delegation Voucher
is exactly the item needed.
The most difficult problem is that the Pledge needs to (a) store one or more
Delegation Vouchers in a non-volatile storage that survives factory reset
operations, (b) attach these items to the pledge's voucher-request.</t>
        <t>The extension to the <xref target="RFC8995"/>
voucher-request described below provides for a contained for these Delegation Vouchers.</t>
      </section>
    </section>
    <section anchor="applying-the-delegation-voucher-to-requirements">
      <name>Applying The Delegation Voucher to Requirements</name>
      <section anchor="case-1-resale">
        <name>Case 1: Resale</name>
        <t>This case has many application scenarios.</t>
        <t>The simplest is that a device, previously owned by one entity is sold to another entity.
This would include many large home appliances (furnace, stove, refriderator) which are either sold with the home (because they are attached), or for which there is a frequent resale market.
Entire systems (HVAC, physical security, elevators) in commercial buildings also fall into this category.
Many of these devices exist for decades.</t>
        <t>The initial onboarder would obtain a delegated voucher, and would keep this voucher safe.
Should the device need to be resold, this voucher is provided to the new owner.
This protects the first owner from situations where the manufacturer is unwilling, or goes into bankruptcy.</t>
        <t>A creditor, such as a bank, which may take the property, including required systems as collatoral for a loan could require that a delegated voucher be obtained.
A bank would find a building that needed new systems installed difficult to resale should the bank have to foreclose.
It is likely that this requirement would make devices which do not come with delegated vouchers significant liabilities, and that financial institutions (banks, insurance companies) might refuse to lend in this case.</t>
        <t>As a different example,  an owner might initially start with some hosted Registrar (in the cloud perhaps, as a service).  Later on, the owner wishes to bring the Registrar in-house (or just change who is providing the Registrar service).
Such an activity is effectively a "resale".</t>
        <t>It is common when a company goes bankrupt that many of it's assets (routers, switches, desktops, as well as furniture) are sold by the court.
There are many resellers of digital equipment, and they typically take the devices, factory reset them, verify that they work, and then list them for resale.
Such an entity would want to have a delegated voucher for each device.
Whether the delegated voucher would be obtained from the original (bankrupt) company, by the court, or directly from the manufacturer is probably a legal problem.</t>
        <t>Further, the pledges may be resaled many times, and when onboarding, they will receive all vouchers in order with the sale chain, firstly masa vouchour, then 1st intermidate, 2nd intermidate, till to the final dealer. In this case, the pledge's authorization form a signed voucher chain.</t>
        <t>The following illustrates a delegation voucher for a pledge:
   {
     "ietf-voucher-delegated:voucher": {
       "created-on": "2020-07-14T06:28:31Z",
       "expire-on": "2022-07-31T01:61:80Z",
       "assertion": "logged",
       "serial-number": "JADA123456789",
       "delegation-enable-flag": true,
       "pinned-delegation-cert-authority": "base64encodedvalue",
       "pinned-delegation-cert-name": "base64encodedvalue",
       "delegation-voucher": "base64encodedvalue",
       "intermediate-identities": "intermediateId1",
       "delegation-enable-flag": 1,
     }
   }</t>
      </section>
      <section anchor="case-2-assembly">
        <name>Case 2: Assembly</name>
        <t>In some application, many pledges which come from multiple component assembled by a system integrated.
They need to to be assembled together in the first sale.
In this time, the owner is assembly controller, so the pledge's voucher need to include these  delegation options.</t>
        <t>In addition, there are also transparent assembly, for example rail wagon scenario.
Firstly, the assembly onboards normally to get all pledges' vouchers, then this assembly acts as intermidate registrar, who "sell" these pledges to every rail wagon registrar.</t>
      </section>
    </section>
    <section anchor="pinnedmechanism">
      <name>Constraints on Pinning The Delegated Authority</name>
      <t>TBD</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>YYY</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <section anchor="delegation-vouchers-do-not-expire">
        <name>Delegation Vouchers do not expire</name>
        <t>A significant feature of the <xref target="RFC8366"/> voucher is that it can be short-lived, and often renewed if needed.
This goes along with the arguments that renewal is better than revocation explained better in <xref target="RFC8739"/>.
However, in order for a delegated voucher to be useful it has to have a life longer than the pessimistic expected life of the manufacturer (MASA).
This argues for the expiry time of a voucher to be rather long (decades), if not actually infinite.</t>
        <t><xref target="RFC8995"/> makes arguments for why a Pledge dos not need to have a clock that it can trust, because it can use a nonce to verify freshness of the resulting Voucher.
The Delegated Voucher can not use a nonce to verify the chain of delegated vouchers presented, although it can use a nonce for the last (non-delegated) voucher.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requires the following IANA actions:</t>
      <section anchor="the-ietf-xml-registry">
        <name>The IETF XML Registry</name>
        <t>This document registers a URI in the "IETF XML Registry" <xref target="RFC3688"/>.
IANA is asked to register the following:</t>
        <artwork><![CDATA[
     URI: urn:ietf:params:xml:ns:yang:ietf-voucher-delegated
     Registrant Contact: The ANIMA WG of the IETF.
     XML: N/A, the requested URI is an XML namespace.
]]></artwork>
      </section>
      <section anchor="yang-module-names-registry">
        <name>YANG Module Names Registry</name>
        <t>This document registers a YANG module in the "YANG Module Names" registry <xref target="RFC6020"/>.
IANA is asked to register the following:</t>
        <artwork><![CDATA[
     name:         ietf-voucher-delegated
     namespace:    urn:ietf:params:xml:ns:yang:ietf-voucher-delegated
     prefix:       NONE
     reference:    THIS DOCUMENT
]]></artwork>
      </section>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Hello.</t>
    </section>
    <section anchor="changelog">
      <name>Changelog</name>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8366" target="https://www.rfc-editor.org/info/rfc8366">
          <front>
            <title>A Voucher Artifact for Bootstrapping Protocols</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen">
              <organization/>
            </author>
            <author fullname="M. Richardson" initials="M." surname="Richardson">
              <organization/>
            </author>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin">
              <organization/>
            </author>
            <author fullname="T. Eckert" initials="T." surname="Eckert">
              <organization/>
            </author>
            <date month="May" year="2018"/>
            <abstract>
              <t>This document defines a strategy to securely assign a pledge to an owner using an artifact signed, directly or indirectly, by the pledge's manufacturer.  This artifact is known as a "voucher".</t>
              <t>This document defines an artifact format as a YANG-defined JSON document that has been signed using a Cryptographic Message Syntax (CMS) structure.  Other YANG-derived formats are possible.  The voucher artifact is normally generated by the pledge's manufacturer (i.e., the Manufacturer Authorized Signing Authority (MASA)).</t>
              <t>This document only defines the voucher artifact, leaving it to other documents to describe specialized protocols for accessing it.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8366"/>
          <seriesInfo name="DOI" value="10.17487/RFC8366"/>
        </reference>
        <reference anchor="RFC8995" target="https://www.rfc-editor.org/info/rfc8995">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin">
              <organization/>
            </author>
            <author fullname="M. Richardson" initials="M." surname="Richardson">
              <organization/>
            </author>
            <author fullname="T. Eckert" initials="T." surname="Eckert">
              <organization/>
            </author>
            <author fullname="M. Behringer" initials="M." surname="Behringer">
              <organization/>
            </author>
            <author fullname="K. Watsen" initials="K." surname="Watsen">
              <organization/>
            </author>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane.  To do this, a Secure Key Infrastructure is bootstrapped.  This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline.  We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device.  The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="I-D.ietf-anima-constrained-voucher" target="https://www.ietf.org/archive/id/draft-ietf-anima-constrained-voucher-17.txt">
          <front>
            <title>Constrained Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="Michael Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Peter van der Stok">
              <organization>vanderstok consultancy</organization>
            </author>
            <author fullname="Panos Kampanakis">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Esko Dijk">
              <organization>IoTconsultancy.nl</organization>
            </author>
            <date day="7" month="April" year="2022"/>
            <abstract>
              <t>   This document defines the Constrained Bootstrapping Remote Secure Key
   Infrastructure (Constrained BRSKI) protocol, which provides a
   solution for secure zero-touch bootstrapping of resource-constrained
   (IoT) devices into the network of a domain owner.  This protocol is
   designed for constrained networks, which may have limited data
   throughput or may experience frequent packet loss.  Constrained BRSKI
   is a variant of the BRSKI protocol, which uses an artifact signed by
   the device manufacturer called the "voucher" which enables a new
   device and the owner's network to mutually authenticate.  While the
   BRSKI voucher is typically encoded in JSON, Constrained BRSKI defines
   a compact CBOR-encoded voucher.  The BRSKI voucher is extended with
   new data types that allow for smaller voucher sizes.  The Enrollment
   over Secure Transport (EST) protocol, used in BRSKI, is replaced with
   EST-over-CoAPS; and HTTPS used in BRSKI is replaced with CoAPS.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-constrained-voucher-17"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC3688" target="https://www.rfc-editor.org/info/rfc3688">
          <front>
            <title>The IETF XML Registry</title>
            <author fullname="M. Mealling" initials="M." surname="Mealling">
              <organization/>
            </author>
            <date month="January" year="2004"/>
            <abstract>
              <t>This document describes an IANA maintained registry for IETF standards which use Extensible Markup Language (XML) related items such as Namespaces, Document Type Declarations (DTDs), Schemas, and Resource Description Framework (RDF) Schemas.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="81"/>
          <seriesInfo name="RFC" value="3688"/>
          <seriesInfo name="DOI" value="10.17487/RFC3688"/>
        </reference>
        <reference anchor="RFC8572" target="https://www.rfc-editor.org/info/rfc8572">
          <front>
            <title>Secure Zero Touch Provisioning (SZTP)</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen">
              <organization/>
            </author>
            <author fullname="I. Farrer" initials="I." surname="Farrer">
              <organization/>
            </author>
            <author fullname="M. Abrahamsson" initials="M." surname="Abrahamsson">
              <organization/>
            </author>
            <date month="April" year="2019"/>
            <abstract>
              <t>This document presents a technique to securely provision a networking device when it is booting in a factory-default state.  Variations in the solution enable it to be used on both public and private networks.  The provisioning steps are able to update the boot image, commit an initial configuration, and execute arbitrary scripts to address auxiliary needs.  The updated device is subsequently able to establish secure connections with other systems.  For instance, a device may establish NETCONF (RFC 6241) and/or RESTCONF (RFC 8040) connections with deployment-specific network management systems.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8572"/>
          <seriesInfo name="DOI" value="10.17487/RFC8572"/>
        </reference>
        <reference anchor="RFC8040" target="https://www.rfc-editor.org/info/rfc8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman">
              <organization/>
            </author>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund">
              <organization/>
            </author>
            <author fullname="K. Watsen" initials="K." surname="Watsen">
              <organization/>
            </author>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC6020" target="https://www.rfc-editor.org/info/rfc6020">
          <front>
            <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund">
              <organization/>
            </author>
            <date month="October" year="2010"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6020"/>
          <seriesInfo name="DOI" value="10.17487/RFC6020"/>
        </reference>
        <reference anchor="RFC8739" target="https://www.rfc-editor.org/info/rfc8739">
          <front>
            <title>Support for Short-Term, Automatically Renewed (STAR) Certificates in the Automated Certificate Management Environment (ACME)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer">
              <organization/>
            </author>
            <author fullname="D. Lopez" initials="D." surname="Lopez">
              <organization/>
            </author>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios">
              <organization/>
            </author>
            <author fullname="A. Pastor Perales" initials="A." surname="Pastor Perales">
              <organization/>
            </author>
            <author fullname="T. Fossati" initials="T." surname="Fossati">
              <organization/>
            </author>
            <date month="March" year="2020"/>
            <abstract>
              <t>Public key certificates need to be revoked when they are compromised, that is, when the associated private key is exposed to an unauthorized entity.  However, the revocation process is often unreliable. An alternative to revocation is issuing a sequence of certificates, each with a short validity period, and terminating the sequence upon compromise.  This memo proposes an Automated Certificate Management Environment (ACME) extension to enable the issuance of Short-Term, Automatically Renewed (STAR) X.509 certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8739"/>
          <seriesInfo name="DOI" value="10.17487/RFC8739"/>
        </reference>
      </references>
    </references>
    <section anchor="extra-references">
      <name>Extra references</name>
      <t>RFC Editor, please remove this section.
This section lists references in the YANG. <xref target="RFC8174"/>, <xref target="RFC8040"/>.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
