<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-opsawg-yang-provenance-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="yang-data-provenance">Applying COSE Signatures for YANG Data Provenance</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-yang-provenance-02"/>
    <author initials="D." surname="Lopez" fullname="Diego Lopez">
      <organization>Telefonica</organization>
      <address>
        <email>diego.r.lopez@telefonica.com</email>
      </address>
    </author>
    <author initials="A." surname="Pastor" fullname="Antonio Pastor">
      <organization>Telefonica</organization>
      <address>
        <email>antonio.pastorperales@telefonica.com</email>
      </address>
    </author>
    <author initials="A." surname="Huang Feng" fullname="Alex Huang Feng">
      <organization>INSA-Lyon</organization>
      <address>
        <email>alex.huang-feng@insa-lyon.fr</email>
      </address>
    </author>
    <author initials="A." surname="Mendez" fullname="Ana Mendez">
      <organization>Telefonica</organization>
      <address>
        <email>ana.mendezperez@telefonica.com</email>
      </address>
    </author>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization abbrev="Fraunhofer SIT">Fraunhofer SIT</organization>
      <address>
        <postal>
          <street>Rheinstrasse 75</street>
          <city>Darmstadt</city>
          <code>64295</code>
          <country>Germany</country>
        </postal>
        <email>henk.birkholz@sit.fraunhofer.de</email>
      </address>
    </author>
    <date year="2025" month="October" day="19"/>
    <area>Operations and Management</area>
    <workgroup>Operations and Management Area Working Group</workgroup>
    <keyword>provenance</keyword>
    <keyword>signature</keyword>
    <keyword>COSE</keyword>
    <keyword>metadata</keyword>
    <abstract>
      <?line 75?>

<t>This document defines a mechanism based on COSE signatures to provide and verify the provenance of YANG data, so it is possible to verify the origin and integrity of a dataset, even when those data are going to be processed and/or applied in workflows where a crypto-enabled data transport directly from the original data stream is not available. As the application of evidence-based OAM automation and the use of tools such as AI/ML grow, provenance validation becomes more relevant in all scenarios, in support of the assuring the origin and integritu of datasets and/or data streams. The use of compact signatures facilitates the inclusion of provenance strings in any YANG schema requiring them.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://dr2lopez.github.io/yang-provenance/draft-ietf-opsawg-yang-provenance.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-opsawg-yang-provenance/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Operations and Management Area Working Group Working Group mailing list (<eref target="mailto:opsawg@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/opsawg/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/opsawg/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/dr2lopez/yang-provenance"/>.</t>
    </note>
  </front>
  <middle>
    <?line 79?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>OAM automation, generally based on closed-loop principles, requires at least two datasets to be used. Using the common terms in Control Theory, we need those from the plant (the network device or segment under control) and those to be used as reference (the desired values of the relevant data). The usual automation behavior compares these values and takes a decision, by whatever the method (algorithmic, rule-based, an AI model tuned by ML...) to decide on a control action according to this comparison. Assurance of the origin and integrity of these datasets, what we refer in this document as "provenance", becomes essential to guarantee a proper behavior of closed-loop automation.</t>
      <t>When datasets are made available as an online data flow, provenance can be assessed by properties of the data transport protocol, as long as some kind of cryptographic protocol is used for source authentication, with TLS, SSH and IPsec as the main examples. But when these datasets are stored, go through some pre-processing or aggregation stages, or even cryptographic data transport is not available, provenance must be assessed by other means.</t>
      <t>The original use case for this provenance mechanism is associated with <xref target="YANGmanifest"/>, in order to provide a proof of the origin and integrity of the provided metadata, and therefore the examples in this document use the modules described there, but it soon became clear that it could be extended to any YANG datamodel to support provenance evidence. An analysis of other potential use cases suggested the interest of defining an independent, generally applicable mechanism.</t>
      <t>Provenance verification by signatures incorporated in YANG data can be applied to any data processing pipeline, whether they rely on an online flow or use some kind of data store, such as data lakes or time-series databases. The application of recorded data for ML training or validation constitute the most relevant examples of these scenarios.</t>
      <t>This document provides a mechanism for including digital signatures within YANG data. It applies COSE <xref target="RFC9052"/> to make the signature compact and reduce the resources required for calculating it. This mechanism is applicable to any serialization of the YANG data supporting a clear method for canonicalization, but this document considers three base ones: CBOR, JSON and XML.</t>
      <section anchor="target-deployment-scenarios">
        <name>Target Deployment Scenarios</name>
        <t>The provenance mechanisms described in this document are designed to be flexible and applicable in multiple deployment contexts within operational and management practices. The following non-exhaustive list provides examples of intended deployment scenarios:</t>
        <ul spacing="normal">
          <li>
            <t>Device Configuration Integrity: Digital signatures may be applied to device configuration elements to ensure that specific configuration fragments originate from an authorized source (e.g., controller, automation system) and have not been altered in transit. This is useful for zero-touch provisioning and secure configuration distribution in programmable networks.</t>
          </li>
          <li>
            <t>Telemetry and Monitoring Data: When applied to operational state or streaming telemetry data (e.g., YANG-Push updates or Subscription Notifications), provenance signatures can help verify the integrity and authenticity of data collected from network elements, especially when the data may traverse untrusted collection pipelines.</t>
          </li>
          <li>
            <t>Network-Wide Service Orchestration: In multi-vendor or multi-domain environments, provenance can be used to track and validate contributions from different orchestrators or domain controllers in composite service models. This enables trustable service chaining and auditability.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>The term "data provenance" refers to a documented trail accounting for the origin of a piece of data and where it has moved from to where it is presently. The signature mechanism provided here can be recursively applied to allow this accounting for YANG data.</t>
    </section>
    <section anchor="defining-provenance-elements">
      <name>Defining Provenance Elements</name>
      <t>The provenance for a given YANG element <bcp14>MUST</bcp14> be convened by a leaf element, containing the COSE signature bitstring built according to the procedure defined below in this section. The provenance leaf <bcp14>MUST</bcp14> be of type provenance-signature, defined as follows:</t>
      <artwork><![CDATA[
typedef provenance-signature {
     type binary;
     description
      "The provenance-signature type represents a digital signature
       corresponding to the associated YANG element. The signature is based
       on COSE and generated using a canonicalized version of the
       associated element.";
     reference
      "RFC 9052: CBOR Object Signing and Encryption (COSE): Structures and Process
       draft-ietf-opsawg-yang-provenance";
}
]]></artwork>
      <t>The use of this type is the proper method for identifying signature leaves, and therefore whenever this type is used for a leaf element, it <bcp14>MUST</bcp14> be considered a provenance signature element, to be generated or verified according to the procedures described in this section.</t>
      <section anchor="provenance-signature-strings">
        <name>Provenance Signature Strings</name>
        <t>Provenance signature strings are COSE single signature messages with [nil] payload, according to COSE conventions and registries, and with the following structure (as defined by <xref section="4.2" sectionFormat="comma" target="RFC9052"/>):</t>
        <artwork><![CDATA[
COSE_Sign1 = [
protected /algorithm-identifier, kid, serialization-method/
unprotected /algorithm-parameters/
signature /using as external data the content of the YANG
           (meta-)data without the signature leaf/
]
]]></artwork>
        <t>The COSE_Sign1 procedure yields a bitstring when building the signature and expects a bitstring for checking it, hence the proposed type for provenance signature leaves. The structure of the COSE_Sign1 consists of:</t>
        <ul spacing="normal">
          <li>
            <t>The algorithm-identifier, which <bcp14>MUST</bcp14> follow COSE conventions and registries.</t>
          </li>
          <li>
            <t>The kid (Key ID), to be locally agreed, used and interpreted by the signer and the signature validator. URIs <xref target="RFC3986"/> and RFC822-style <xref target="RFC5322"/> identifiers are typical values to be used as kid.</t>
          </li>
          <li>
            <t>The serialization-method, a string identifying the YANG serialization in use. It <bcp14>MUST</bcp14> be one of the three possible values "xml" (for XML serialization <xref target="RFC7950"/>), "json" (for JSON serialization <xref target="RFC7951"/>) or "cbor" (for CBOR serialization <xref target="RFC9254"/>).</t>
          </li>
          <li>
            <t>The value algorithm-parameters, which <bcp14>MUST</bcp14> follow the COSE conventions for providing relevant parameters to the signing algorithm.</t>
          </li>
          <li>
            <t>The signature for the YANG element provenance is being established for, to be produced and verified according to the procedure described below for each one of the enclosing methods for the provenance string described below.</t>
          </li>
        </ul>
      </section>
      <section anchor="signature-and-verification-procedures">
        <name>Signature and Verification Procedures</name>
        <t>To keep a concise signature and avoid the need for wrapping YANG constructs in COSE envelopes, the whole signature <bcp14>MUST</bcp14> be built and verified by means of externally supplied data, as defined in <xref section="4.3" sectionFormat="comma" target="RFC9052"/>, with a [nil] payload.</t>
        <t>The byte strings to be used as input to the signature and verification procedures <bcp14>MUST</bcp14> be built by:</t>
        <ul spacing="normal">
          <li>
            <t>Selecting the exact YANG content to be used, according to the corresponding enclosing methods.</t>
          </li>
          <li>
            <t>Applying the corresponding canonicalization method as described in the following section.</t>
          </li>
        </ul>
        <t>In order to guarantee proper verification, the signature procedure <bcp14>MUST</bcp14> be the last action to be taken before the YANG construct being signed is made available, whatever the means (sent as a reply to a poll or a notification, written to a file or record, etc.), and verification <bcp14>SHOULD</bcp14> take place in advance of any processing by the consuming application. The actions to be taken if the verification fails are specific to the consuming application, but it is <bcp14>RECOMMENDED</bcp14> to at least issue an error warning.</t>
      </section>
      <section anchor="canonicalization">
        <name>Canonicalization</name>
        <t>Signature generation and verification require a canonicalization method to be applied, that depends on the serialization used. According to the three types of serialization defined, the following canonicalization methods <bcp14>MUST</bcp14> be applied:</t>
        <ul spacing="normal">
          <li>
            <t>For CBOR, length-first core deterministic encoding, as defined by <xref target="RFC8949"/>.</t>
          </li>
          <li>
            <t>For JSON, JSON Canonicalization Scheme (JCS), as defined by <xref target="RFC8785"/>.</t>
          </li>
          <li>
            <t>For XML, Exclusive XML Canonicalization 1.0, as defined by <xref target="XMLSig"/>.</t>
          </li>
        </ul>
      </section>
      <section anchor="provenance-signature-yang-module">
        <name>Provenance-Signature YANG Module</name>
        <t>This module defines a provenance-signature type to be used in other YANG modules.</t>
        <sourcecode markers="true" name="ietf-yang-provenance@2025-05-09.yang"><![CDATA[
module ietf-yang-provenance {
  yang-version 1.1;
  namespace
    "urn:ietf:params:xml:ns:yang:ietf-yang-provenance";
  prefix iyangprov;

  organization "IETF OPSAWG (Operations and Management Area Working Group)";
  contact
    "WG Web:   <https://datatracker.ietf.org/wg/opsawg/>
     WG List:  <mailto:opsawg@ietf.org>

     Authors:  Alex Huang Feng
               <mailto:alex.huang-feng@insa-lyon.fr>
               Diego Lopez
               <mailto:diego.r.lopez@telefonica.com>
               Antonio Pastor
               <mailto:antonio.pastorperales@telefonica.com>
               Henk Birkholz
               <mailto:henk.birkholz@sit.fraunhofer.de>";

  description
    "Defines a binary provenance-signature type to be used in other YANG
    modules.

    Copyright (c) 2025 IETF Trust and the persons identified as
    authors of the code.  All rights reserved.

    Redistribution and use in source and binary forms, with or without
    modification, is permitted pursuant to, and subject to the license
    terms contained in, the Revised BSD License set forth in Section
    4.c of the IETF Trust's Legal Provisions Relating to IETF Documents
    (https://trustee.ietf.org/license-info).

    This version of this YANG module is part of RFC XXXX; see the RFC
    itself for full legal notices.";

  revision 2025-05-09 {
    description
      "First revision";
    reference
      "RFC XXXX: Applying COSE Signatures for YANG Data Provenance";
  }

  typedef provenance-signature {
    type binary;
    description
      "The provenance-signature type represents a digital signature
      corresponding to the associated YANG element. The signature is based
      on COSE and generated using a canonicalized version of the
      associated element.";
    reference
      "RFC XXXX: Applying COSE Signatures for YANG Data Provenance";
  }
}
]]></sourcecode>
      </section>
    </section>
    <section anchor="enclosing-methods">
      <name>Enclosing Methods</name>
      <t>Once defined the procedures for generating and verifying the provenance signature string, let's consider how these signatures can be integrated with the associated YANG data by enclosing the signature in the data structure. This document considers four different enclosing methods, suitable for different stages of the YANG schema and usage patterns of the YANG data. The enclosing method defines not only how the provenance signature string is combined with the signed YANG data but also the specific procedure for selecting the specific YANG content to be processed when signing and verifying.</t>
      <t>Appendix A includes a set of examples of the different enclosing methods, applied to the same YANG fragment, to illustrate their use.</t>
      <section anchor="including-a-provenance-leaf-in-a-yang-element">
        <name>Including a Provenance Leaf in a YANG Element</name>
        <t>This enclosing method requires a specific element in the YANG schema defining the element to be signed (the enclosing element), and thus implies considering provenance signatures when defining a YANG module, or the use of augmentation to include the provenance signature element in a existing YANG module.</t>
        <t>When defining a provenance signature leaf element to appear in a YANG schema by means of this enclosing method, the provenance-signature leaf <bcp14>MAY</bcp14> be defined to be at any position in the enclosing element, but only one such leaf <bcp14>MUST</bcp14> be defined for this enclosing element. If the enclosing element contains other non-leaf elements, they <bcp14>MAY</bcp14> define their own provenance-signature leaf, according to the same rule. In this case, the provenance-signature leaves in the children elements are applicable to the specific child element where they are enclosed, while the provenance-signature leaf enclosed in the top-most element is applicable to the whole element contents, including the children provenance-signature leaf themselves. This allows for recursive provenance validation, data aggregation, and the application of provenance verification of relevant children elements at different stages of any data processing pipeline.</t>
        <t>The specific YANG content to be processed <bcp14>SHALL</bcp14> be generated by taking the whole enclosing element and eliminiating the leaf containing the provenance signature string.</t>
        <t>As example, let us consider the two modules proposed in <xref target="YANGmanifest"/>. For the platform-manifest module, the provenance for a platform would be provided by augmenting the current schema with the optional platform-provenance leaf shown below:</t>
        <artwork><![CDATA[
module: ietf-platform-manifest
  +--ro platforms
     +--ro platform* [id]
       +--ro id                      string
       +--ro name?                   string
       +--ro vendor?                 string
       +--ro vendor-pen?             uint32
       +--ro software-version?       string
       +--ro software-flavor?        string
       +--ro os-version?             string
       +--ro os-type?                string
       +--ro platform-provenance?    provenance-signature
       +--ro yang-push-streams
       |  +--ro stream* [name]
       |     +--ro name
       |     +--ro description?
       +--ro yang-library
       + . . .
       .
       .
       .
]]></artwork>
        <t>For data collections, the provenance of each one would be provided by augmenting the schema with an optional collector-provenance leaf, as shown below:</t>
        <artwork><![CDATA[
module: ietf-data-collection-manifest
  +--ro data-collections
     +--ro data-collection* [platform-id]
     +--ro platform-id
     |       -> /p-mf:platforms/platform/id
     +--ro collector-provenance?   provenance-signature
     +--ro yang-push-subscriptions
       +--ro subscription* [id]
         +--ro id
         |      sn:subscription-id
         +
         .
         .
         .
     + . . .
     |
     .
     .
     .
]]></artwork>
        <t>Note how, in the two examples, the element bearing the provenance signature appears at different positions in the enclosing element. And note that, for processing the element for signature generation and verification, the signature element <bcp14>MUST</bcp14> be eliminated from the enclosing element before applying the corresponding canonicalization method.</t>
        <t>Note that, in application of the recursion mechanism described above, a provenance element could be included at the top of any of the collections, supporting the verification of the provenance of the collection itself (as provided by a specific collector), without interfering with the verification of the provenance of each of the collection elements. As an example, in the case of the platform manifests it would look like:</t>
        <artwork><![CDATA[
module: ietf-platform-manifest
  +--ro platforms
     +--ro platform-collection-provenance? provenance-signature
     +--ro platform* [id]
       +--ro platform-provenance?          provenance-signature
       +--ro id                            string
       +--ro name?                         string
       +--ro vendor?                       string
       + . . .
       .
       .
       .
]]></artwork>
        <t>Note here that, to generate the YANG content to be processed in the case of the collection the provenance leafs of the indivual elements <bcp14>SHALL NOT</bcp14> be eliminated, as it <bcp14>SHALL</bcp14> be the case when generating the YANG content to be processed for each individual element in the collection.</t>
      </section>
      <section anchor="including-a-provenance-signature-in-yang-push-notifications">
        <name>Including a Provenance Signature in YANG-Push Notifications</name>
        <t>The signature mechanism proposed in this document <bcp14>MAY</bcp14> be used with YANG-Push <xref target="RFC8641"/> to sign notifications generated  directly by publisher nodes. The signature is carried inside the notification envelope header defined in <xref target="I-D.ietf-netconf-notif-envelope"/> as a new extension.</t>
        <t>The YANG content to be processed <bcp14>MUST</bcp14> consist of the content defined by the "contents" element in <xref target="I-D.ietf-netconf-notif-envelope"/>.</t>
        <t>The following sections define the YANG module that augments the "ietf-yp-notification" module. It extends the notification envelope header with a new leaf for the provenance signature and an augmentation to the "ietf-notification-capabilities" to enable clients discover the support of the provenance signature.</t>
        <section anchor="yang-tree-diagram">
          <name>YANG Tree Diagram</name>
          <t>The following is the YANG tree diagram <xref target="RFC8340"/> for the "ietf-yp-provenance" module.</t>
          <artwork><![CDATA[
module: ietf-yp-provenance

  augment /sysc:system-capabilities/notc:subscription-capabilities
            /inotenv:notification-metadata/inotenv:metadata:
    +--ro notification-provenance?   boolean

  augment-structure /inotenv:envelope:
    +-- provenance?   iyangprov:provenance-signature
]]></artwork>
          <t>And the following is the full YANG tree diagram for the notification structure.</t>
          <artwork><![CDATA[
module: ietf-notification

  structure envelope:
    +-- event-time         yang:date-and-time
    +-- hostname?          inet:host
    +-- sequence-number?   yang:counter32
    +-- provenance?        iyangprov:provenance-signature
    +-- contents?          <anydata>
]]></artwork>
          <t>Unlike the first enclosing method, in this second enclosing method the provenance leaf is added by augmenting a structure (/inotenv:envelope). The provenance leaf is inserted before the contents leaf.
This ordering is important because the provenance signature <bcp14>MUST</bcp14> cover the content of the notification but <bcp14>MUST NOT</bcp14> include itself in the signature computation. This ensures the signature remains valid and verifiable. YANG augmented structures typically respect the convention that the anydata node, when present, should appear as the last element in the structure. Therefore, any newly augmented elements are automatically placed before it.</t>
        </section>
        <section anchor="yang-module">
          <name>YANG Module</name>
          <t>The "ietf-yp-provenance" module augments "ietf-yp-notification" module <xref target="I-D.ietf-netconf-notif-envelope"/> adding the provenance leaf to the notification envelope structure.
It also adds the notification-provenance capability to allow clients to discover if provenance signatures are supported.</t>
          <sourcecode markers="true" name="ietf-yp-provenance@2024-05-09.yang"><![CDATA[
module ietf-yp-provenance {
  yang-version 1.1;
  namespace
    "urn:ietf:params:xml:ns:yang:ietf-yp-provenance";
  prefix inotifprov;

  import ietf-system-capabilities {
    prefix sysc;
    reference
      "RFC 9196: YANG Modules Describing Capabilities for
       Systems and Datastore Update Notifications";
  }
  import ietf-notification-capabilities {
    prefix notc;
    reference
      "RFC 9196: YANG Modules Describing Capabilities for
       Systems and Datastore Update Notifications";
  }
  import ietf-yang-provenance {
    prefix iyangprov;
    reference
      "RFC XXXX: Applying COSE Signatures for YANG Data Provenance";
  }
  import ietf-yang-structure-ext {
    prefix sx;
    reference
      "RFC 8791: YANG Data Structure Extensions";
  }
  import ietf-yp-notification {
    prefix inotenv;
    reference
      "RFC YYYY: Extensible YANG Model for YANG-Push Notifications";
  }

  organization "IETF OPSAWG (Operations and Management Area Working Group)";
  contact
    "WG Web:   <https://datatracker.ietf.org/wg/opsawg/>
     WG List:  <mailto:opsawg@ietf.org>

     Authors:  Alex Huang Feng
               <mailto:alex.huang-feng@insa-lyon.fr>
               Diego Lopez
               <mailto:diego.r.lopez@telefonica.com>
               Antonio Pastor
               <mailto:antonio.pastorperales@telefonica.com>";

  description
    "Defines a bynary provenance-signature type to be used in other YANG
    modules.

    Copyright (c) 2025 IETF Trust and the persons identified as
    authors of the code.  All rights reserved.

    Redistribution and use in source and binary forms, with or without
    modification, is permitted pursuant to, and subject to the license
    terms contained in, the Revised BSD License set forth in Section
    4.c of the IETF Trust's Legal Provisions Relating to IETF Documents
    (https://trustee.ietf.org/license-info).

    This version of this YANG module is part of RFC XXXX; see the RFC
    itself for full legal notices.";

  revision 2025-05-09 {
    description
      "First revision";
    reference
      "RFC XXXX: Applying COSE Signatures for YANG Data Provenance";
  }

  sx:augment-structure "/inotenv:envelope" {
    leaf provenance {
      type iyangprov:provenance-signature;
      description
        "COSE signature of the content of the Notification for
        provenance verification.";
    }
  }

  augment "/sysc:system-capabilities"
        + "/notc:subscription-capabilities"
        + "/inotenv:notification-metadata/inotenv:metadata" {
    description
      "Extensions to Notification Capabilities enabling clients to
      know whether the provenance signature is supported.";
    leaf notification-provenance {
      type boolean;
      default "false";
      description
        "Support of the provenance signature on YANG-Push
        Notifications.";
    }
  }
}
]]></sourcecode>
        </section>
      </section>
      <section anchor="including-provenance-as-metadata-in-yang-instance-data">
        <name>Including Provenance as Metadata in YANG Instance Data</name>
        <t>Provenance signature strings can be included as part of the metadata in YANG instance data files, as defined in <xref target="RFC9195"/> for data at rest. The augmented YANG tree diagram including the provenance signature is as follows:</t>
        <artwork><![CDATA[
module: ietf-yang-instance-data-provenance
  augment-structure /id:instance-data-set:
    +-- provenance?   iyangprov:provenance-signature
]]></artwork>
        <ul empty="true">
          <li>
            <t><strong>Note:</strong> As in the second enclosing method, since this is a data structure, the <tt>provenance</tt> leaf appears before the <tt>content-data</tt> element.</t>
          </li>
        </ul>
        <t>The resulting YANG tree structure is:</t>
        <artwork><![CDATA[
  structure instance-data-set:
    + . . .
    +-- timestamp?           yang:date-and-time
    +-- provenance?          iyangprov:provenance-signature
    +-- content-data?        <anydata>
]]></artwork>
        <t>The provenance signature defined in this enclosing method applies to the whole content of the instance-data-set structure. This is independent of any other provenance signature strings that might be present within the content-data itself through other enclosing methods.</t>
        <t>The specific YANG content to be processed <bcp14>SHALL</bcp14> be generated by taking the contents of instance-data-set structure, excluding the provenance signature element itself and applying the corresponding canonicalization method.</t>
        <section anchor="yang-module-1">
          <name>YANG Module</name>
          <t>This module defines the provenance signature element to be included as metadata of a YANG data instance.</t>
          <sourcecode markers="true" name="ietf-yang-instance-data-provenance@2025-07-07.yang"><![CDATA[
module ietf-yang-instance-data-provenance {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-yang-instance-data-provenance";
  prefix "yidprov";
  import ietf-yang-instance-data {
    prefix "id";
    reference
     “RFC 9195 A File Format for YANG Instance Data”
  }
import ietf-yang-provenance {
    prefix iyangprov;
    reference
      "RFC XXXX: Applying COSE Signatures for YANG Data Provenance";
  }
  import ietf-yang-structure-ext {
    prefix sx;
    reference
      "RFC 8791: YANG Data Structure Extensions";
  }
  organization "IETF OPSAWG (Operations and Management Area Working Group)";
  contact
    "WG Web:   <https://datatracker.ietf.org/wg/opsawg/>
     WG List:  <mailto:opsawg@ietf.org>

     Authors:  Ana Mendez
               <mailto:ana.mendezperz@telefonica.com>
               Diego Lopez
               <mailto:diego.r.lopez@telefonica.com>";
  description
        "Defines a binary provenance-signature type to be used as metadata
         in a YANG data instance.

         Copyright (c) 2025 IETF Trust and the persons identified as
         authors of the code.  All rights reserved.

         Redistribution and use in source and binary forms, with or without
         modification, is permitted pursuant to, and subject to the license
         terms contained in, the Revised BSD License set forth in Section
         4.c of the IETF Trust's Legal Provisions Relating to IETF Documents
         (https://trustee.ietf.org/license-info).

         This version of this YANG module is part of RFC XXXX; see the RFC
         itself for full legal notices.";

  revision 2025-07-07 {
    description "First revision.";
    reference "RFC XXXX: Applying COSE Signatures for YANG Data Provenance";
  }
  sx:augment-structure "/id:instance-data-set" {
    leaf provenance {
      type iyangprov:provenance-signature;
      description
        "Provenance signature that applies to the full content-data block of an instance dataset.This signature can be used to verify the integrity and authenticity of the instance data.";
    }
  }
}
]]></sourcecode>
        </section>
      </section>
      <section anchor="EMannotations">
        <name>Including Provenance in YANG Annotations</name>
        <t>The use of annotations as defined in <xref target="RFC7952"/> seems a natural enclosing method, dealing with the provenance signature string as metadata extension and not requiring modification of existing YANG schemas. The provenance-string annotation is defined as follows:</t>
        <artwork><![CDATA[
 md:annotation provenance {
       type provenance-signature;
       description
         "This annotation contains a digital signature corresponding
          to the YANG element in which it appears.";
     }
]]></artwork>
        <t>The specific YANG content to be processed <bcp14>SHALL</bcp14> be generated by eliminating the provenance annotation (encoded according to what is described in Section 5 of <xref target="RFC7952"/>) from the element it applies to, before invoking the corresponding canonicalization method. In application of the general recursion principle for provenance signature strings, any other provenance strings within the element to which the provenance-string applies <bcp14>SHALL</bcp14> be left as they appear, whatever the enclosing method used for them.</t>
        <section anchor="yang-module-2">
          <name>YANG Module</name>
          <t>This module defines a metadata annotation to include a provenance signature for a YANG element.</t>
          <sourcecode markers="true" name="ietf-yang-provenance-annotation@2024-06-30.yang"><![CDATA[
module ietf-yang-provenance-annotation {
     yang-version 1.1;
     namespace
       "urn:ietf:params:xml:ns:yang:ietf-yang-annotation-pmd";
     prefix "ypmd";
     import ietf-yang-metadata {
       prefix "md";
     }
     organization "IETF OPSAWG (Operations and Management Area Working Group)";
     contact
       "WG Web:   <https://datatracker.ietf.org/wg/opsawg/>
        WG List:  <mailto:opsawg@ietf.org>

        Authors: Diego Lopez
                 <mailto:diego.r.lopez@telefonica.com>
                 Alex Huang Feng
                 <mailto:alex.huang-feng@insa-lyon.fr>
                 Antonio Pastor
                 <mailto:antonio.pastorperales@telefonica.com>
                 Henk Birkholz
                 <mailto:henk.birkholz@sit.fraunhofer.de>";
        description
        "Defines a binary provenance-signature type to be used in YANG
         metadata annotations

         Copyright (c) 2024 IETF Trust and the persons identified as
         authors of the code.  All rights reserved.

         Redistribution and use in source and binary forms, with or without
         modification, is permitted pursuant to, and subject to the license
         terms contained in, the Revised BSD License set forth in Section
         4.c of the IETF Trust's Legal Provisions Relating to IETF Documents
         (https://trustee.ietf.org/license-info).

         This version of this YANG module is part of RFC XXXX; see the RFC
         itself for full legal notices.";

     revision 2024-06-30 {
        description
        "First revision";
        reference
        "RFC XXXX: Applying COSE Signatures for YANG Data Provenance";
     }
     md:annotation provenance {
       type yang:provenance-signature;
       description
         "This annotation contains the provenance signature for
          the YANG element associated with it";
     }
}
]]></sourcecode>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The provenance assessment mechanism described in this document relies on COSE <xref target="RFC9052"/> and the deterministic encoding or canonicalization procedures described by <xref target="RFC8949"/>, <xref target="RFC8785"/> and <xref target="XMLSig"/>. The security considerations made in these references are fully applicable here.</t>
      <t>The verification step depends on the association of the kid (Key ID) with the proper public key. This is a local matter for the verifier and its specification is out of the scope of this document. Similarly, key association with reliable data sources is a deployment decision, though a couple of deployment patterns can be considered, depending on the application scenario under consideration. On the one hand, identities may be associated to controller entities (a domain controller, a person in charge of operational aspects, an organizational unit managing an administrative domain, ec.) owning the private keys to be use in generating the provenance signatures for YANG data such as configurations or telemetry. Alternatively, individual devices may hold the identities and corresponding private keys to generate provenance signatures for locally originated data (e.g., telemetry updates). The use of certificates, PKI mechanisms, or any other secure out-of-band distribution of id-public key mappings is <bcp14>RECOMMENDED</bcp14>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="ietf-xml-registry">
        <name>IETF XML Registry</name>
        <t>This document registers the following URIs in the "IETF XML Registry" <xref target="RFC3688"/>:</t>
        <artwork><![CDATA[
  URI: urn:ietf:params:xml:ns:yang:ietf-yang-provenance
  Registrant Contact: The IESG.
  XML: N/A; the requested URI is an XML namespace.
]]></artwork>
        <artwork><![CDATA[
  URI: urn:ietf:params:xml:ns:yang:ietf-yp-provenance
  Registrant Contact: The IESG.
  XML: N/A; the requested URI is an XML namespace.
]]></artwork>
        <artwork><![CDATA[
  URI: urn:ietf:params:xml:ns:yang:ietf-yang-instance-data-provenance
  Registrant Contact: The IESG.
  XML: N/A; the requested URI is an XML namespace.
]]></artwork>
        <artwork><![CDATA[
  URI: urn:ietf:params:xml:ns:yang:ietf-yang-annotation-pmd
  Registrant Contact: The IESG.
  XML: N/A; the requested URI is an XML namespace.
]]></artwork>
      </section>
      <section anchor="yang-module-name">
        <name>YANG Module Name</name>
        <t>This document registers the following YANG modules in the "YANG Module Names" registry <xref target="RFC6020"/>:</t>
        <artwork><![CDATA[
  name: ietf-yang-provenance
  namespace: urn:ietf:params:xml:ns:yang:ietf-yang-provenance
  prefix: iyangprov
  reference: RFC XXXX
]]></artwork>
        <artwork><![CDATA[
  name: ietf-yp-provenance
  namespace: urn:ietf:params:xml:ns:yang:ietf-yp-provenance
  prefix: inotifprov
  reference: RFC XXXX
]]></artwork>
        <artwork><![CDATA[
  name: ietf-yang-instance-data-provenance
  namespace: urn:ietf:params:xml:ns:yang:ietf-yang-instance-data-provenance
  prefix: yidprov
  reference: RFC XXXX
]]></artwork>
        <artwork><![CDATA[
  name: ietf-yang-provenance-annotation
  namespace: urn:ietf:params:xml:ns:yang:ietf-yang-annotation-pmd
  prefix: ypmd
  reference: RFC XXXX
]]></artwork>
      </section>
    </section>
    <section anchor="implementation-status">
      <name>Implementation Status</name>
      <t>An open-source reference implementation, written in Java, is available at <eref target="https://github.com/tefiros/cose-provenance">https://github.com/tefiros/cose-provenance</eref>. This implementation has been used to generate the examples in the appendix of this document, and was first demonstrated at the IETF 122 Hackathon. Work is ongoing to explore its integration with other open-source YANG modules. A Kafka message broker integration was presented at the IETF 123 Hackathon aiming at convergence with current efforts on YANG Push. The implementation is available at <eref target="https://github.com/tefiros/kafka-provenance">https://github.com/tefiros/kafka-provenance</eref>.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC3688">
          <front>
            <title>The IETF XML Registry</title>
            <author fullname="M. Mealling" initials="M." surname="Mealling"/>
            <date month="January" year="2004"/>
            <abstract>
              <t>This document describes an IANA maintained registry for IETF standards which use Extensible Markup Language (XML) related items such as Namespaces, Document Type Declarations (DTDs), Schemas, and Resource Description Framework (RDF) Schemas.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="81"/>
          <seriesInfo name="RFC" value="3688"/>
          <seriesInfo name="DOI" value="10.17487/RFC3688"/>
        </reference>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC5322">
          <front>
            <title>Internet Message Format</title>
            <author fullname="P. Resnick" initials="P." role="editor" surname="Resnick"/>
            <date month="October" year="2008"/>
            <abstract>
              <t>This document specifies the Internet Message Format (IMF), a syntax for text messages that are sent between computer users, within the framework of "electronic mail" messages. This specification is a revision of Request For Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, "Standard for the Format of ARPA Internet Text Messages", updating it to reflect current practice and incorporating incremental changes that were specified in other RFCs. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5322"/>
          <seriesInfo name="DOI" value="10.17487/RFC5322"/>
        </reference>
        <reference anchor="RFC6020">
          <front>
            <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="October" year="2010"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6020"/>
          <seriesInfo name="DOI" value="10.17487/RFC6020"/>
        </reference>
        <reference anchor="RFC7950">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="RFC7951">
          <front>
            <title>JSON Encoding of Data Modeled with YANG</title>
            <author fullname="L. Lhotka" initials="L." surname="Lhotka"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>This document defines encoding rules for representing configuration data, state data, parameters of Remote Procedure Call (RPC) operations or actions, and notifications defined using YANG as JavaScript Object Notation (JSON) text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7951"/>
          <seriesInfo name="DOI" value="10.17487/RFC7951"/>
        </reference>
        <reference anchor="RFC7952">
          <front>
            <title>Defining and Using Metadata with YANG</title>
            <author fullname="L. Lhotka" initials="L." surname="Lhotka"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>This document defines a YANG extension that allows for defining metadata annotations in YANG modules. The document also specifies XML and JSON encoding of annotations and other rules for annotating instances of YANG data nodes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7952"/>
          <seriesInfo name="DOI" value="10.17487/RFC7952"/>
        </reference>
        <reference anchor="RFC8340">
          <front>
            <title>YANG Tree Diagrams</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="L. Berger" initials="L." role="editor" surname="Berger"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document captures the current syntax used in YANG module tree diagrams. The purpose of this document is to provide a single location for this definition. This syntax may be updated from time to time based on the evolution of the YANG language.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="215"/>
          <seriesInfo name="RFC" value="8340"/>
          <seriesInfo name="DOI" value="10.17487/RFC8340"/>
        </reference>
        <reference anchor="RFC8641">
          <front>
            <title>Subscription to YANG Notifications for Datastore Updates</title>
            <author fullname="A. Clemm" initials="A." surname="Clemm"/>
            <author fullname="E. Voit" initials="E." surname="Voit"/>
            <date month="September" year="2019"/>
            <abstract>
              <t>This document describes a mechanism that allows subscriber applications to request a continuous and customized stream of updates from a YANG datastore. Providing such visibility into updates enables new capabilities based on the remote mirroring and monitoring of configuration and operational state.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8641"/>
          <seriesInfo name="DOI" value="10.17487/RFC8641"/>
        </reference>
        <reference anchor="RFC8785">
          <front>
            <title>JSON Canonicalization Scheme (JCS)</title>
            <author fullname="A. Rundgren" initials="A." surname="Rundgren"/>
            <author fullname="B. Jordan" initials="B." surname="Jordan"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <date month="June" year="2020"/>
            <abstract>
              <t>Cryptographic operations like hashing and signing need the data to be expressed in an invariant format so that the operations are reliably repeatable. One way to address this is to create a canonical representation of the data. Canonicalization also permits data to be exchanged in its original form on the "wire" while cryptographic operations performed on the canonicalized counterpart of the data in the producer and consumer endpoints generate consistent results.</t>
              <t>This document describes the JSON Canonicalization Scheme (JCS). This specification defines how to create a canonical representation of JSON data by building on the strict serialization methods for JSON primitives defined by ECMAScript, constraining JSON data to the Internet JSON (I-JSON) subset, and by using deterministic property sorting.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8785"/>
          <seriesInfo name="DOI" value="10.17487/RFC8785"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC9195">
          <front>
            <title>A File Format for YANG Instance Data</title>
            <author fullname="B. Lengyel" initials="B." surname="Lengyel"/>
            <author fullname="B. Claise" initials="B." surname="Claise"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>There is a need to document data defined in YANG models at design time, implementation time, or when a live server is unavailable. This document specifies a standard file format for YANG instance data, which follows the syntax and semantics of existing YANG models and annotates it with metadata.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9195"/>
          <seriesInfo name="DOI" value="10.17487/RFC9195"/>
        </reference>
        <reference anchor="RFC9254">
          <front>
            <title>Encoding of Data Modeled with YANG in the Concise Binary Object Representation (CBOR)</title>
            <author fullname="M. Veillette" initials="M." role="editor" surname="Veillette"/>
            <author fullname="I. Petrov" initials="I." role="editor" surname="Petrov"/>
            <author fullname="A. Pelov" initials="A." surname="Pelov"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>YANG (RFC 7950) is a data modeling language used to model configuration data, state data, parameters and results of Remote Procedure Call (RPC) operations or actions, and notifications.</t>
              <t>This document defines encoding rules for YANG in the Concise Binary Object Representation (CBOR) (RFC 8949).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9254"/>
          <seriesInfo name="DOI" value="10.17487/RFC9254"/>
        </reference>
        <reference anchor="I-D.ietf-netconf-notif-envelope">
          <front>
            <title>Extensible YANG Model for YANG-Push Notifications</title>
            <author fullname="Alex Huang Feng" initials="A. H." surname="Feng">
              <organization>INSA-Lyon</organization>
            </author>
            <author fullname="Pierre Francois" initials="P." surname="Francois">
              <organization>INSA-Lyon</organization>
            </author>
            <author fullname="Thomas Graf" initials="T." surname="Graf">
              <organization>Swisscom</organization>
            </author>
            <author fullname="Benoît Claise" initials="B." surname="Claise">
              <organization>Huawei</organization>
            </author>
            <date day="17" month="June" year="2025"/>
            <abstract>
              <t>   This document defines a new extensible notification structure,
   defined in YANG, for use in YANG-Push Notification messages enabling
   any YANG-compatible encodings such as XML, JSON, or CBOR.
   Additionally, it defines two essential extensions to this structure,
   the support of a hostname and a sequence number and the support of a
   timestamp characterizing the moment when the changed data was
   observed.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-netconf-notif-envelope-02"/>
        </reference>
        <reference anchor="XMLSig" target="https://www.w3.org/TR/xmldsig-core2/">
          <front>
            <title>XML Signature Syntax and Processing Version 2.0</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7223">
          <front>
            <title>A YANG Data Model for Interface Management</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>This document defines a YANG data model for the management of network interfaces. It is expected that interface-type-specific data models augment the generic interfaces data model defined in this document. The data model includes configuration data and state data (status information and counters for the collection of statistics).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7223"/>
          <seriesInfo name="DOI" value="10.17487/RFC7223"/>
        </reference>
        <reference anchor="YANGmanifest">
          <front>
            <title>A Data Manifest for Contextualized Telemetry Data</title>
            <author fullname="Benoît Claise" initials="B." surname="Claise">
              <organization>Huawei</organization>
            </author>
            <author fullname="Jean Quilbeuf" initials="J." surname="Quilbeuf">
              <organization>Huawei</organization>
            </author>
            <author fullname="Diego Lopez" initials="D." surname="Lopez">
              <organization>Telefonica I+D</organization>
            </author>
            <author fullname="Ignacio Dominguez Martinez-Casanueva" initials="I. D." surname="Martinez-Casanueva">
              <organization>Telefonica I+D</organization>
            </author>
            <author fullname="Thomas Graf" initials="T." surname="Graf">
              <organization>Swisscom</organization>
            </author>
            <date day="21" month="July" year="2025"/>
            <abstract>
              <t>   Network platforms use Network Telemetry, such as YANG-Push, to
   continuously stream information, including both counters and state
   information.  This document describes the metadata that ensure that
   the collected data can be interpreted correctly.  This document
   specifies the data manifest, composed of two YANG data models (the
   platform manifest and the non-normative data collection manifest).
   These YANG modules are specified at the network level (e.g., network
   controllers) to provide a model that encompasses several network
   platforms.  The data manifest must be streamed and stored along with
   the data, up to the collection and analytics systems to keep the
   collected data fully exploitable by the data scientists and relevant
   tools.  Additionally, this document specifies an augmentation of the
   YANG-Push model to include the actual collection period, in case it
   differs from the configured collection period.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-opsawg-collected-data-manifest-09"/>
        </reference>
      </references>
    </references>
    <?line 724?>

<section numbered="false" anchor="appendix-a-examples-of-application-of-the-different-enclosing-methods">
      <name>Appendix A. Examples of Application of the Different Enclosing Methods</name>
      <t>In the examples that follow, the signature strings have been wrapped and, in some cases, indented to improve readability. If these examples are used for any kind of validation, all intermediate carriage returns and whitespace should be deleted to build the actual signature string to be considered.</t>
      <section numbered="false" anchor="xml">
        <name>XML</name>
        <t>Let us consider the following YANG instance, corresponding to a monitoring interface statement, as defined in <xref target="RFC7223"/>:</t>
        <artwork><![CDATA[
<?xml version="1.0" encoding="UTF-8"?>
<interfaces xmlns="urn:ietf:params:xml:ns:yang:ietf-interfaces">
    <interface>
        <name>GigabitEthernet1</name>
        <type xmlns:ianaift="urn:ietf:params:xml:ns:yang:iana-if-type">
            ianaift:ethernetCsmacd</type>
        <admin-status>up</admin-status>
        <oper-status>up</oper-status>
        <last-change>2024-02-03T11:22:41.081+00:00</last-change>
        <if-index>1</if-index>
        <phys-address>0c:00:00:37:d6:00</phys-address>
        <speed>1000000000</speed>
        <statistics>
            <discontinuity-time>2024-02-03T11:20:38+00:00</discontinuity-time>
            <in-octets>8157</in-octets>
            <in-unicast-pkts>94</in-unicast-pkts>
            <in-broadcast-pkts>0</in-broadcast-pkts>
            <in-multicast-pkts>0</in-multicast-pkts>
            <in-discards>0</in-discards>
            <in-errors>0</in-errors>
            <in-unknown-protos>0</in-unknown-protos>
            <out-octets>89363</out-octets>
            <out-unicast-pkts>209</out-unicast-pkts>
            <out-broadcast-pkts>0</out-broadcast-pkts>
            <out-multicast-pkts>0</out-multicast-pkts>
            <out-discards>0</out-discards>
            <out-errors>0</out-errors>
        </statistics>
    </interface>
</interfaces>
]]></artwork>
        <t>Using the first enclosing method, we will demonstrate how to augment the previous ietf-interfaces YANG module by defining it in the new example module below:</t>
        <artwork><![CDATA[
module interfaces-provenance-augmented {
  yang-version 1.1;
  namespace "urn:example:interfaces-provenance-augmented";
  prefix ifprov;

  import ietf-interfaces {
    prefix if;
  }
  import ietf-yang-provenance {
    prefix iyangprov;
  }

  description
    "Augments ietf-interfaces with provenance information";

  revision "2025-10-08" {
    description
      "Initial revision of the augment module adding provenance information to ietf-interfaces.";
  }

  augment "/if:interfaces" {
    leaf interfaces-provenance {
      type iyangprov:provenance-signature;
      description
        "Signature proving provenance of the interface configuration";
    }
  }
}


]]></artwork>
        <t>The following tree diagram illustrates the augmentation of the ietf-interfaces module with a provenance-signature at the root container:</t>
        <artwork><![CDATA[
module: ietf-interfaces
  +--rw interfaces
     +--rw interface* [name]
     |  +--rw name          string
     |  +--rw type          identityref
     |  ...
     +--rw ifprov:interfaces-provenance?  iyangprov:provenance-signature
]]></artwork>
        <t>The following example illustrates how a provenance signature can be attached to the root interfaces container to protect the entire set of interface configuration and operational data.
This augmentation adds a provenance-signature leaf at the root interfaces container (named "interfaces-provenance" in this case) and produces the following output:</t>
        <artwork><![CDATA[
<?xml version="1.0" encoding="UTF-8"?>
<interfaces xmlns="urn:ietf:params:xml:ns:yang:ietf-interfaces">
    <interfaces-provenance xmlns="urn:example:interfaces-provenance-augmented">
      0oRRowNjeG1sBGdlYzIua2V5ASag9lhAvzyFP5HP0nONaqTRxKmSqerrDS6C
      QXJSK+5NdprzQZLf0QsHtAi2pxzbuDJDy9kZoy1JTvNaJmMxGTLdm4ktug==
    </interfaces-provenance>
    <interface>
        <name>GigabitEthernet1</name>
        <type xmlns:ianaift="urn:ietf:params:xml:ns:yang:iana-if-type">
            ianaift:ethernetCsmacd</type>
        <admin-status>up</admin-status>
        <oper-status>up</oper-status>
        <last-change>2024-02-03T11:22:41.081+00:00</last-change>
        <if-index>1</if-index>
        <phys-address>0c:00:00:37:d6:00</phys-address>
        <speed>1000000000</speed>
        <statistics>
            <discontinuity-time>2024-02-03T11:20:38+00:00</discontinuity-time>
            <in-octets>8157</in-octets>
            <in-unicast-pkts>94</in-unicast-pkts>
            <in-broadcast-pkts>0</in-broadcast-pkts>
            <in-multicast-pkts>0</in-multicast-pkts>
            <in-discards>0</in-discards>
            <in-errors>0</in-errors>
            <in-unknown-protos>0</in-unknown-protos>
            <out-octets>89363</out-octets>
            <out-unicast-pkts>209</out-unicast-pkts>
            <out-broadcast-pkts>0</out-broadcast-pkts>
            <out-multicast-pkts>0</out-multicast-pkts>
            <out-discards>0</out-discards>
            <out-errors>0</out-errors>
        </statistics>
    </interface>
</interfaces>
]]></artwork>
        <t>The second enclosing method shows a notification with the provenance signature included inside the notification envelope. The provenance element is placed immediately before the contents element:</t>
        <artwork><![CDATA[
<?xml version="1.0" encoding="UTF-8"?>
<envelope xmlns="urn:ietf:params:xml:ns:yang:ietf-yp-notification">
    <event-time>2024-02-03T11:37:25.94Z</event-time>
    <provenance xmlns="urn:ietf:params:xml:ns:yang:ietf-yp-provenance">
    0oRRowNjeG1sBGdlYzIua2V5ASag9lhAzyJBpvnpzI/TirrjckAA29q6Qmf
    u56L8ZhUXXhu0KFcKh1qSRFx2wGR/y+xgKigVHYicC7fp/0AlHSXWiKB2sg==
    </provenance>
    <contents>
        <push-update xmlns="urn:ietf:params:xml:ns:yang:ietf-yang-push">
            <subscription-id>2147483648</subscription-id>
            <datastore-contents>
                <interfaces-state xmlns="urn:ietf:params:xml:ns:yang:ietf-interfaces">
                    <interface>
                        <name>GigabitEthernet1</name>
                        <type xmlns:ianaift="urn:ietf:params:xml:ns:yang:iana-if-type">
                            ianaift:ethernetCsmacd</type>
                        <admin-status>up</admin-status>
                        <oper-status>up</oper-status>
                        <last-change>2024-02-03T11:22:41.081+00:00</last-change>
                        <if-index>1</if-index>
                        <phys-address>0c:00:00:37:d6:00</phys-address>
                        <speed>1000000000</speed>
                        <statistics>
                            <discontinuity-time>2024-02-03T11:20:38+00:00</discontinuity-time>
                            <in-octets>8157</in-octets>
                            <in-unicast-pkts>94</in-unicast-pkts>
                            <in-broadcast-pkts>0</in-broadcast-pkts>
                            <in-multicast-pkts>0</in-multicast-pkts>
                            <in-discards>0</in-discards>
                            <in-errors>0</in-errors>
                            <in-unknown-protos>0</in-unknown-protos>
                            <out-octets>89363</out-octets>
                            <out-unicast-pkts>209</out-unicast-pkts>
                            <out-broadcast-pkts>0</out-broadcast-pkts>
                            <out-multicast-pkts>0</out-multicast-pkts>
                            <out-discards>0</out-discards>
                            <out-errors>0</out-errors>
                        </statistics>
                    </interface>
                </interfaces-state>
            </datastore-contents>
        </push-update>
    </contents>
</envelope>
]]></artwork>
        <t>The third enclosing method, applicable if the instance is to be stored as YANG instance data at rest, by adding the corresponding metadata, would produce a results as shown below:</t>
        <artwork><![CDATA[
<?xml version="1.0" encoding="UTF-8"?>
<instance-data-set xmlns="urn:ietf:params:xml:ns:yang:ietf-yang-instance-data">
  <name>atRestYANG</name>
  <content-schema></content-schema>
  <revision>
    <date>2024-11-03</date>
    <description>For demos</description>
  </revision>
  <description>Sample for demonstrating provenance signatures</description>
  <contact>diego.r.lopez@telefonica.com</contact>
  <provenance xmlns="urn:ietf:params:xml:ns:yang:ietf-yang-instance-data-provenance">
  0oRRowNjeG1sBGdlYzIua2V5ASag9lhAWff+fMbfNChKUYZ52UTOBmAlYPFe4
  vlZOLyZeW0CU7/2OutDeMCG28+m3rm58jqLjKbcueKLFq8qFJb4mvPY+Q==
  </provenance>
  <content-data>
   <interfaces-state xmlns="urn:ietf:params:xml:ns:yang:ietf-interfaces">
    <interface>
        <name>GigabitEthernet1</name>
        <type xmlns:ianaift="urn:ietf:params:xml:ns:yang:iana-if-type">
            ianaift:ethernetCsmacd</type>
        <admin-status>up</admin-status>
        <oper-status>up</oper-status>
        <last-change>2024-02-03T11:22:41.081+00:00</last-change>
        <if-index>1</if-index>
        <phys-address>0c:00:00:37:d6:00</phys-address>
        <speed>1000000000</speed>
        <statistics>
            <discontinuity-time>2024-02-03T11:20:38+00:00</discontinuity-time>
            <in-octets>8157</in-octets>
            <in-unicast-pkts>94</in-unicast-pkts>
            <in-broadcast-pkts>0</in-broadcast-pkts>
            <in-multicast-pkts>0</in-multicast-pkts>
            <in-discards>0</in-discards>
            <in-errors>0</in-errors>
            <in-unknown-protos>0</in-unknown-protos>
            <out-octets>89363</out-octets>
            <out-unicast-pkts>209</out-unicast-pkts>
            <out-broadcast-pkts>0</out-broadcast-pkts>
            <out-multicast-pkts>0</out-multicast-pkts>
            <out-discards>0</out-discards>
            <out-errors>0</out-errors>
        </statistics>
    </interface>
   </interfaces-state>
 </content-data>
</instance-data-set>
]]></artwork>
        <t>Finally, using the fourth enclosing method, the YANG instance would incorporate the corresponding provenance metadata as an annotation, using the namespace prefix specified in the ietf-yang-provenance-annotation module, as introduced in <xref target="EMannotations"/>:</t>
        <artwork><![CDATA[
<?xml version="1.0" encoding="UTF-8"?>
<interfaces-state xmlns="urn:ietf:params:xml:ns:yang:ietf-interfaces"
                  xmlns:ypmd="urn:ietf:params:xml:ns:yang:ietf-yang-annotation-pmd"
                  ypmd:provenance=
                  "0oRRowNjeG1sBGdlYzIua2V5ASag9lhAzen3Bm9AZoyXuetpoTB70SzZqKVxeu
                  OMW099sm+NXSqCfnqBKfXeuqDNEkuEr+E0XiAso986fbAHQCHbAJMOhw==">
    <interface>
        <name>GigabitEthernet1</name>
        <type xmlns:ianaift="urn:ietf:params:xml:ns:yang:iana-if-type">
            ianaift:ethernetCsmacd</type>
        <admin-status>up</admin-status>
        <oper-status>up</oper-status>
        <last-change>2024-02-03T11:22:41.081+00:00</last-change>
        <if-index>1</if-index>
        <phys-address>0c:00:00:37:d6:00</phys-address>
        <speed>1000000000</speed>
        <statistics>
            <discontinuity-time>2024-02-03T11:20:38+00:00</discontinuity-time>
            <in-octets>8157</in-octets>
            <in-unicast-pkts>94</in-unicast-pkts>
            <in-broadcast-pkts>0</in-broadcast-pkts>
            <in-multicast-pkts>0</in-multicast-pkts>
            <in-discards>0</in-discards>
            <in-errors>0</in-errors>
            <in-unknown-protos>0</in-unknown-protos>
            <out-octets>89363</out-octets>
            <out-unicast-pkts>209</out-unicast-pkts>
            <out-broadcast-pkts>0</out-broadcast-pkts>
            <out-multicast-pkts>0</out-multicast-pkts>
            <out-discards>0</out-discards>
            <out-errors>0</out-errors>
        </statistics>
    </interface>
</interfaces>
]]></artwork>
      </section>
      <section numbered="false" anchor="json">
        <name>JSON</name>
        <t>Let us consider the following YANG instance, corresponding to the same monitoring interface statement, with JSON serialization:</t>
        <artwork><![CDATA[
{
  "ietf-interfaces:interfaces": {
    "interface": [
      {
        "name": "GigabitEthernet1",
        "type": "ianaift:ethernetCsmacd",
        "admin-status": "up",
        "oper-status": "up",
        "last-change": "2024-02-03T11:22:41.081+00:00",
        "if-index": 1,
        "phys-address": "0c:00:00:37:d6:00",
        "speed": 1000000000,
        "statistics": {
          "discontinuity-time": "2024-02-03T11:20:38+00:00",
          "in-octets": 8157,
          "in-unicast-pkts": 94,
          "in-broadcast-pkts": 0,
          "in-multicast-pkts": 0,
          "in-discards": 0,
          "in-errors": 0,
          "in-unknown-protos": 0,
          "out-octets": 89363,
          "out-unicast-pkts": 209,
          "out-broadcast-pkts": 0,
          "out-multicast-pkts": 0,
          "out-discards": 0,
          "out-errors": 0
        }
      }
    ]
  }
}
]]></artwork>
        <t>Applying the first enclosing method, a provenance-signature leaf at the top element (named "interfaces-provenance" in this case") would be included following the augmentation module previously defined for the XML example. This will produce the following output:</t>
        <artwork><![CDATA[
{
  "ietf-interfaces:interfaces": {
    "interface": [
      {
        "name": "GigabitEthernet1",
        "type": "ianaift:ethernetCsmacd",
        "admin-status": "up",
        "oper-status": "up",
        "last-change": "2024-02-03T11:22:41.081+00:00",
        "if-index": 1,
        "phys-address": "0c:00:00:37:d6:00",
        "speed": 1000000000,
        "statistics": {
          "discontinuity-time": "2024-02-03T11:20:38+00:00",
          "in-octets": 8157,
          "in-unicast-pkts": 94,
          "in-broadcast-pkts": 0,
          "in-multicast-pkts": 0,
          "in-discards": 0,
          "in-errors": 0,
          "in-unknown-protos": 0,
          "out-octets": 89363,
          "out-unicast-pkts": 209,
          "out-broadcast-pkts": 0,
          "out-multicast-pkts": 0,
          "out-discards": 0,
          "out-errors": 0
        }
      }
    ],
    "interfaces-provenance-augmented:interfaces-provenance":
      "0oRRowNjeG1sBGdlYzIua2V5ASag9lhAvzyFP5HP0nONaqTRxKmSqerrDS6C
       QXJSK+5NdprzQZLf0QsHtAi2pxzbuDJDy9kZoy1JTvNaJmMxGTLdm4ktug=="
  }
}

]]></artwork>
        <t>The second enclosing method would translate into a notification including the "provenance" element as follows:</t>
        <artwork><![CDATA[
{
  "ietf-yp-notification:envelope" : {
    "event-time" : "2013-12-21T00:01:00Z",
    "ietf-yp-provenance:provenance":
    "0oRRowNjeG1sBGdlYzIua2V5ASag9lhAiKEKLQKJT12LsNgxt8WllEI65lyi
     E/m12drCfl+wh7T61cTYhFGdEeX8A5F0vmUWROZebq/VVFewUZeVYGZBOQ==",
    "contents": {
      "ietf-yang-push:push-update": {
        "subscription-id": 2147483648,
        "datastore-contents": {
          "ietf-interfaces:interfaces-state": {
            "interface": [ {
                "name": "GigabitEthernet1",
                "type": "ianaift:ethernetCsmacd",
                "admin-status": "up",
                "oper-status": "up",
                "last-change": "2024-02-03T11:22:41.081+00:00",
                "if-index": 1,
                "phys-address": "0c:00:00:37:d6:00",
                "speed": 1000000000,
                "statistics": {
                  "discontinuity-time": "2024-02-03T11:20:38+00:00",
                  "in-octets": 8157,
                  "in-unicast-pkts": 94,
                  "in-broadcast-pkts": 0,
                  "in-multicast-pkts": 0,
                  "in-discards": 0,
                  "in-errors": 0,
                  "in-unknown-protos": 0,
                  "out-octets": 89363,
                  "out-unicast-pkts": 209,
                  "out-broadcast-pkts": 0,
                  "out-multicast-pkts": 0,
                  "out-discards": 0,
                  "out-errors": 0
                }
              }
            ]
          }
        }
      }
    }
  }
}
]]></artwork>
        <t>The third enclosing method, applicable if the instance is to be stored as YANG instance data at rest, by adding the corresponding metadata, would produce a results as shown below:</t>
        <artwork><![CDATA[
{
  "ietf-yang-instance-data:instance-data-set" : {
    "name" : "interfaces-labTID-status",
    "contact" : "sofia.garciarincon.practicas@telefonica.com",
    "timestamp" : "Thu Jul 18 11:42:06 CEST 2024",
    "ietf-yang-instance-data-provenance:provenance" :
    "0oRRowNjeG1sBGdlYzIua2V5ASag9lhAmop/c7wMcjRmiSPVy65F/N6O21dsG
     kjGQjIDRizhu3WMwi9Je+VUf5sqwlhSwQCdv5u7mRXa6Pd9dhCwdxdRCA==",
    "content-data" : {
      "ietf-interfaces:interfaces": {
        "interface": [
          {
            "name": "GigabitEthernet1",
            "iana-if-type:type": "ianaift:ethernetCsmacd",
            "admin-status": "up",
            "oper-status": "up",
            "last-change": "2024-02-03T11:22:41.081+00:00",
            "if-index": 1,
            "phys-address": "0c:00:00:37:d6:00",
            "speed": 1000000000,
            "statistics": {
              "discontinuity-time": "2024-02-03T11:20:38+00:00",
              "in-octets": 8157,
              "in-unicast-pkts": 94,
              "in-broadcast-pkts": 0,
              "in-multicast-pkts": 0,
              "in-discards": 0,
              "in-errors": 0,
              "in-unknown-protos": 0,
              "out-octets": 89363,
              "out-unicast-pkts": 209,
              "out-broadcast-pkts": 0,
              "out-multicast-pkts": 0,
              "out-discards": 0,
              "out-errors": 0
            }
          }
        ]
      }
    }
  }
}
]]></artwork>
        <t>Finally, using the fourth enclosing method, the YANG instance would incorporate the corresponding provenance metadata as an annotation, using the namespace prefix specified in the yang-provenance-metadata module, as introduced in <xref target="EMannotations"/>, and the recommendations in section 5.2.3 of <xref target="RFC7952"/>:</t>
        <artwork><![CDATA[
{
  "ietf-interfaces:interfaces" : {
    "@": {
      "ypmd:provenance": "0oRRowNjeG1sBGdlYzIua2V5ASag9lhAM/Dx3HVc4GL91jmuU5nWgcmOPPVpARLJkWo5wwQYvGFJpKMXTkjAtArPp8v6Sl1ZD1qHimKMhAoHLMHVxBtrcA=="
    },
    "interface" : [
      {
        "name" : "GigabitEthernet1",
        "iana-if-type:type" : "ianaift:ethernetCsmacd",
        "admin-status" : "up",
        "oper-status" : "up",
        "last-change" : "2024-02-03T11:22:41.081+00:00",
        "if-index" : 1,
        "phys-address" : "0c:00:00:37:d6:00",
        "speed" : 1000000000,
        "statistics" : {
          "discontinuity-time" : "2024-02-03T11:20:38+00:00",
          "in-octets" : 8157,
          "in-unicast-pkts" : 94,
          "in-broadcast-pkts" : 0,
          "in-multicast-pkts" : 0,
          "in-discards" : 0,
          "in-errors" : 0,
          "in-unknown-protos" : 0,
          "out-octets" : 89363,
          "out-unicast-pkts" : 209,
          "out-broadcast-pkts" : 0,
          "out-multicast-pkts" : 0,
          "out-discards" : 0,
          "out-errors" : 0
        }
      }
    ]
  }
}
]]></artwork>
      </section>
      <section numbered="false" anchor="cbor">
        <name>CBOR</name>
        <t>TBD, as the reference implementation evolves.</t>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Sofia Garcia (UC3M, sgarciarincon01@gmail.com) for being instrumental in demonstrating the feasibility of the proposed approach, providing a first proof of concept of YANG provenance signatures.</t>
      <t>This document is based on work partially funded by the EU Horizon Europe projects PRIVATEER (grant 101096110), HORSE (grant 101096342), MARE (grant 101191436), ACROSS (grant 101097122), iTrust6G (grant 101139198) and CYBERNEMO (grant 101168182).</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
