<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.16 -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<?rfc toc="yes"?>
<?rfc symrefs="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-richardson-anima-masa-considerations-06" category="std" obsoletes="" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.5.0 -->
  <front>
    <title abbrev="MASA Considerations">Operatonal Considerations for Voucher infrastructure for BRSKI MASA</title>
    <seriesInfo name="Internet-Draft" value="draft-richardson-anima-masa-considerations-06"/>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <author initials="W." surname="Pan" fullname="Wei Pan">
      <organization>Huawei Technologies</organization>
      <address>
        <email>william.panwei@huawei.com</email>
      </address>
    </author>
    <date year="2021" month="November" day="13"/>
    <area>Internet</area>
    <workgroup>anima Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document describes a number of operational modes that a
BRSKI Manufacturer Authorized Signing Authority (MASA) may take on.</t>
      <t>Each mode is defined, and then each mode is given a relevance
within an over applicability of what kind of organization the
MASA is deployed into.  This document does not change any
protocol mechanisms.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t><xref target="RFC8995" format="default"/> introduces a mechanism for
new devices (called pledges) to be onboarded into a network without
intervention from an expert operator.</t>
      <t>This mechanism leverages the pre-existing relationship between a device and
the manufacturer that built the device.  There are two aspects to this
relationship: the provision of an identity for the device by the
manufacturer (the IDevID), and a mechanism which convinces the device to
trust the new owner (the <xref target="RFC8366" format="default"/> voucher).</t>
      <t>The manufacturer, or their designate, is involved in both aspects of this
process.  This requires the manufacturer (or designate) to maintain on online presence.</t>
      <t>This document offers a number of operational considerations recommendations for operating this online presence.</t>
      <t>The first aspect is the device identity in the form of an <xref target="ieee802-1AR" format="default"/>
certificate that is installed at manufacturing time in the device.
Some of the background for the operational considerations of building this public key infrastructure is described in <xref target="I-D.richardson-t2trg-idevid-considerations" format="default"/>.</t>
      <t>The second aspect is the use of the Manufacturer Authorized Signing Authority
(MASA), as described in <xref target="RFC8995" format="default"/> section 2.5.4.   The device needs to have
the MASA anchor built in; the exact nature of the anchor is open to a number of
possibilities which are explained in this document.
This document primarily deals with a number of options for architecting the security of the MASA relationship.</t>
      <t>There are some additional considerations for a MASA that deals with
constrained vouchers as described in <xref target="I-D.ietf-anima-constrained-voucher" format="default"/>.
In particular in the COSE signed version, there may be no PKI structure included in the voucher mechanism, so cryptographic hygiene needs a different set of tradeoffs.</t>
    </section>
    <section anchor="operational-considerations-for-manufacturer-authorized-signing-authority-masa" numbered="true" toc="default">
      <name>Operational Considerations for Manufacturer Authorized Signing Authority (MASA)</name>
      <t>The manufacturer needs to make a Signing Authority available to new owners so that
they may obtain <xref target="RFC8366" format="default"/> format vouchers to prove ownership.  This section initially
assumes that the manufacturer will provide this Authority internally, but
subsequent sections deal with some adjustments when the authority is
externally run.</t>
      <t>The MASA is a public facing web system.  It will be subject to network load from
legitimate users when a network is bootstrapped for the first time.
The legitimate load will be proportional to sales.</t>
      <t>The MASA will also be subject to a malicious load.</t>
      <section anchor="deflecting-unwanted-tls-traffic-with-client-certificates" numbered="true" toc="default">
        <name>Deflecting unwanted TLS traffic with Client Certificates</name>
        <t>One way to deflect unwanted users from the application framework backend is to require TLS Client Certificates for  all connections.
As described in Section 5.5.4 of <xref target="RFC8995" format="default"/>, the Registrar may be authenticated with a TLS Client Certificate.</t>
        <t>This offloads much of the defense to what is typically a hardware TLS termination system.
This can be effective even if the hardware is unable to do the actual validation of the TLS Client Certificate, as validation of the certificate occurs prior to any communication with the application server.</t>
        <t>This increases the effort requires for attackers, and if they repeat the same certificate then it becomes easier to reject such attackers if a list of invalid/unwanted clients is cached.</t>
        <t>The use of a client certificate forces attackers to generate new key pairs and certificates for each attack.</t>
      </section>
      <section anchor="web-framework-architecture" numbered="true" toc="default">
        <name>Web framework architecture</name>
        <t>Web framework three-tier mechanisms are a very common architecture.
See <xref target="threetier" format="default"/> for an overview.
There are Internet scale frameworks exist for Ruby (RubyOnRails), Python (Django), Java (J2EE),  GO, PHP and others.
The methods of deploying them and dealing with expected scale are common in most enterprise IT departments.</t>
        <t>Consideration should be made to deploying the presentation layer into multiple data centers in order to provide resiliency against distributed denial of service (DDoS) attacks that affect all tenants of that data center.</t>
        <t>Consideration should also be given to the use of a cloud front end to mitigate attacks, however, such a system needs to be able to securely transmit the TLS Client Certificates, if the MASA wants to identify Registrars at the TLS connection time.</t>
        <t>The middle (application) tier needs to be scalable, but it is unlikely that it needs to scale very much on a per-minute or even per-hour basis.
It is probably easier and more reliable to have application tiers do database operations across the Internet or via VPN to a single location database cluster than it is to handle asynchronous database operations resulting from geographically dispersed multi-master database systems.</t>
        <t>But, these are local design decisions which web deployment make on a regular basis.
The MASA functionality is not different than other public facing systems.</t>
        <t>The database tables that the MASA uses scale linearly with the number of products sold,
but as they are mostly read-only, they could be easily replicated in a read-only manner from a sales database.</t>
        <t>Direct integration with a sales system could be considered, but would involve a more significant security impact analysis, so a process where the sales data is extracted to a less sensitive system is RECOMMENDED.</t>
        <t>In any case, the manufacturer SHOULD plan for a situation where the manufacturer is no longer able or interested in running the Authority: this does not have to an unhappy situation!
While the case of the manufacturer going out of business is discussed in <xref target="escrow" format="default"/>, there are more happy events which should be prepared for.
For instance, if a manufacturer goes through a merge or acquisition and it makes sense to consolidate the Signing Authority in another part of the organization.</t>
        <t>Business continuity plan should include backing up the voucher signing keys.
This may involve multiple Hardware Security Modules, and secret splitting mechanisms
SHOULD be employed.
For large value items, customers are going to need to review the plan as part of their contingency audits.
The document <xref target="I-D.richardson-t2trg-idevid-considerations" format="default"/> can provide some common basis for this kind of evaluation.</t>
        <t>The trust anchors needs to validate <xref target="RFC8366" format="default"/> vouchers will typically be part of the firmware loaded inot the devie firmware.</t>
        <t>There are many models to manage these trust anchors, but in order having only a single key, a PKI infrastructure is appropriate, but not required.</t>
        <t>On constrained devices without code space to parse and validate a public key certificate chain require different considerations, a single key may be necessary.
This document does not (yet) provide appropriate considerations for that case.</t>
        <t>What follows are a number of ways to construct a resilient PKI to sign vouchers.</t>
      </section>
      <section anchor="self-contained-multi-product-masa-no-pki" numbered="true" toc="default">
        <name>Self-contained multi-product MASA, no PKI</name>
        <t>The simplest situation is to create a self-signed End Entity certificate.
That is, a public/private key pair.
The certificate/public key is embedded in the products to validate vouchers, and the private part is kept online to sign vouchers.</t>
        <t>This situation has very low security against theft of a key from the MASA.
Such a theft would result in recall of all products that have not yet been onboarded.
It is very simple to operate.</t>
      </section>
      <section anchor="self-contained-multi-product-masa-with-one-level-pki" numbered="true" toc="default">
        <name>Self-contained multi-product MASA, with one-level PKI</name>
        <t>A simple way is to create an new offline certification authority (CA), have it periodically sign a new End-Entity (EE) identity's certificate.
This End-Entity identity has a private key kept online, and it uses that to sign voucher requests.
Note that the entity used to sign <xref target="RFC8366" format="default"/> format vouchers does not need to be a certificate authority.</t>
        <t>If the public key of this offline CA is then built-in to the firmware of the device,
then the devices do not need any further anchors.</t>
        <t>There is no requirement for this CA to be signed by any other certification authority.
That is, it may be a root CA.
There is also no prohibition against it.</t>
        <t>If this offline CA signs any other certificates, then it is important that the device know which End-Entity certificates may sign vouchers.
This is an authorization step, and it may be accomplished it a number of ways:</t>
        <ol spacing="normal" type="1"><li>the Distinguished Name (DN) of the appropriate End-Entity certificate can be built-in to the firmware</li>
          <li>a particular policy OID may be included in certificates intended to sign vouchers</li>
        </ol>
        <t>A voucher created for one product could be used to sign a voucher for another product.
This situation is also mitigated by never repeating serialNumbers across product lines.</t>
        <t>An End-Entity certificate used to sign the voucher is included in the certificate set in the CMS structure that is used to sign the voucher.
The root CA's trust anchor should <em>also</em> be included, even though it is self-signed, as this permits auditing elements in a Registrar to validate the End-Entity Certificate.</t>
        <t>The inclusion of the full chain also supports a Trust-on-First-Use (TOFU) workflow for the manager of the Registrar: they can see the trust anchor chain and can compare a fingerprint displayed on their screen with one that could be included in packaging or other sales channel information.</t>
        <t>When building the MASA public key into a device, only the public key contents matter, not the structure of the self-signed certificate itself.
Using only the public key enables a MASA architecture to evolve from a single self-contained system into a more complex architecture later on.</t>
      </section>
      <section anchor="perproduct" numbered="true" toc="default">
        <name>Self-contained per-product MASA</name>
        <t>A simple enhancement to the previous scenario is to have a unique MASA offline key for each product line.
This has a few advantages:</t>
        <ul spacing="normal">
          <li>if the private keys are kept separately (under different encryption keys), then compromise of a single product lines MASA does not compromise all products.</li>
          <li>if a product line is sold to another entity, or if it has to go through an escrow process due to the product going out of production, then the process affects only a single product line.</li>
          <li>it is safe to have serialNumber duplicated among different product lines since a voucher for one product line would not validate on another product line.</li>
        </ul>
        <t>The disadvantage is that it requires a private key to be stored per product line, and most large OEMs have many dozens of product lines.
If the keys are stored in a single Hardware Security Module (HSM), with the access to it split across the same parties, then some of the cryptographic advantages of different private keys will go away, as a compromise of one key likely compromises them all.
Given a HSM, the most likely way a key is compromised is by an attacker getting authorization on the HSM through theft or coercion.</t>
        <t>The use of per-product MASA signing keys is encouraged.</t>
      </section>
      <section anchor="per-product-masa-keys-intertwined-with-idevid-pki" numbered="true" toc="default">
        <name>Per-product MASA keys intertwined with IDevID PKI</name>
        <t>The IDevID certificate chain (the intermediate CA and root CA that signed the IDevID certificate) should be included in the device firmware so that they can be communicated during the BRSKI-EST exchange.</t>
        <t>Since they are already present, could they be used as the MASA trust anchor as well?</t>
        <t>In order to do this there is an attack that needs to mitigated.
Since the root-CA that creates IDevIDs and the root-CA that creates vouchers are the same, when validating a voucher, a pledge needs to make sure that it is signed by a key authorized to sign vouchers.
In other scenarios any key signed by the voucher-signing-root-CA would be valid, but in this scenario that would also include any IDevID, such as would be installed in any other device.
Without an additional signal as to which keys can sign vouchers, and which keys are just IDevID keys, then it would be possible to sign vouchers with any IDevID private key, rather than just the designated voucher-signing key.
An attacker that could extract a private key from even one instance of a product, could use that to sign vouchers, and impersonate the MASA.</t>
        <t>The challenge with combining it into the IDevID PKI is making sure that only an authorized entity can sign the vouchers.
The solution is that it can not be the same intermediate CA that is used to sign the IDevID, since that CA should have the authority to sign vouchers.</t>
        <t>The PKI root CA therefore needs to sign an intermediate CA, or End-Entity certificate with an extension OID that is specific for Voucher Authorization.
This is easy to do as policy OIDs can be created from Private Enterprise Numbers.
There is no need for standardization, as the entity doing the signing is also creating the verification code.
If the entire PKI operation was outsource, then there would be a benefit for standardization.</t>
      </section>
      <section anchor="rotatingkeys" numbered="true" toc="default">
        <name>Rotating MASA authorization keys</name>
        <t>As a variation of the scenario described in <xref target="perproduct" format="default"/>, there could be multiple Signing Authority keys per product line.
They could be rotated though in some deterministic order.
For instance, serial numbers ending in 0 would have MASA key 0 embedded in them at manufacturing time.
The asset database would have to know which key that corresponded to, and it would have to produce vouchers using that key.</t>
        <t>There are significant downsides to this mechanism:</t>
        <ul spacing="normal">
          <li>all of the MASA signing keys need to be online and available in order to respond to any voucher request</li>
          <li>it is necessary to keep track of which device trust which key in the asset database</li>
        </ul>
        <t>There is no obvious advantage to doing this if all the MASA signing private keys are kept in the same device, under control of the same managers.
But if the keys are spread out to multiple locations and are under control of different people, then there may be some advantage.
A single MASA signing authority key compromise does not cause a recall of all devices, but only the portion that had that key embedded in it.</t>
        <t>The relationship between signing key and device could be temporal: all devices made on Tuesday could have the same key, there could be hundreds of keys, each one used only for a few hundred devices.
There are many variations possible.</t>
        <t>The major advantage comes with the COSE signed constrained-vouchers described in <xref target="I-D.ietf-anima-constrained-voucher" format="default"/>.
In this context, where there isn't space in the voucher for a certificate chain, nor is there code in the device to validate a certificate chain,  a raw public key can sign the voucher.
The (public) key used to sign is embedded directly in the firmware of each device without the benefit of any public key infrastructure, which would allow indirection of the key.</t>
      </section>
    </section>
    <section anchor="operational-considerations-for-constrained-masa" numbered="true" toc="default">
      <name>Operational Considerations for Constrained MASA</name>
      <t>TBD</t>
    </section>
    <section anchor="operational-considerations-for-creating-nonceless-vouchers" numbered="true" toc="default">
      <name>Operational Considerations for creating Nonceless vouchers</name>
      <t>TBD</t>
    </section>
    <section anchor="escrow" numbered="true" toc="default">
      <name>Business Continuity and Escow Considerations</name>
      <t>A number of jurisdictions have legal requirements for businesses to have contingency plans in order to continue operating after an incident or disaster.
Specifications include <xref target="iso22301_2019" format="default"/>, but the problem of continuity goes back over 40 years.</t>
      <t>The <xref target="holman2012" format="default"/> document defined an eight tier process to understand how data would be backed up.
Tier 0 is "no off-site data", and would be inappropriate for the MASA's signing key.
The question as to how much delay (downtime) is tolerable during a disaster for activating new devices.
The consideration should depend upon the type of the device, and what kind of disasters are being planned for.
Given current technologies for replicating databases online, a tier-4 ("Point-in-time copies") or better solution may be quite economically deployed.</t>
      <t>A key aspect of the MASA is that it was designed as a component that can be outsourced to a third party, and this third party can leverage economies of scale to provide more resilient systems at much lower costs.</t>
      <t>The PKI components that are used to provision the IDevID certificiates into new devices need to be operational only when the factory that produces the devices is active.
The business continuity planning needs to include provision for backing up the private keys used within the PKI.
It may be enough to backup just the root CA key: the rest of the levels of the PKI can be regenerated in another location if necessary.</t>
    </section>
    <section anchor="privacy-considerations" numbered="true" toc="default">
      <name>Privacy Considerations</name>
      <t>YYY</t>
    </section>
    <section anchor="security-considerations" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>ZZZ</t>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>This document makes no IANA requests.</t>
    </section>
    <section anchor="acknowledgements" numbered="true" toc="default">
      <name>Acknowledgements</name>
      <t>Hello.</t>
    </section>
    <section anchor="changelog" numbered="true" toc="default">
      <name>Changelog</name>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC8366" target="https://www.rfc-editor.org/info/rfc8366" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8366.xml">
          <front>
            <title>A Voucher Artifact for Bootstrapping Protocols</title>
            <author initials="K." surname="Watsen" fullname="K. Watsen">
              <organization/>
            </author>
            <author initials="M." surname="Richardson" fullname="M. Richardson">
              <organization/>
            </author>
            <author initials="M." surname="Pritikin" fullname="M. Pritikin">
              <organization/>
            </author>
            <author initials="T." surname="Eckert" fullname="T. Eckert">
              <organization/>
            </author>
            <date year="2018" month="May"/>
            <abstract>
              <t>This document defines a strategy to securely assign a pledge to an owner using an artifact signed, directly or indirectly, by the pledge's manufacturer.  This artifact is known as a "voucher".</t>
              <t>This document defines an artifact format as a YANG-defined JSON document that has been signed using a Cryptographic Message Syntax (CMS) structure.  Other YANG-derived formats are possible.  The voucher artifact is normally generated by the pledge's manufacturer (i.e., the Manufacturer Authorized Signing Authority (MASA)).</t>
              <t>This document only defines the voucher artifact, leaving it to other documents to describe specialized protocols for accessing it.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8366"/>
          <seriesInfo name="DOI" value="10.17487/RFC8366"/>
        </reference>
        <reference anchor="I-D.richardson-t2trg-idevid-considerations" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.richardson-t2trg-idevid-considerations.xml" target="https://www.ietf.org/archive/id/draft-richardson-t2trg-idevid-considerations-05.txt">
          <front>
            <title>A Taxonomy of operational security considerations for manufacturer installed keys and Trust Anchors</title>
            <author fullname="Michael Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date month="June" day="21" year="2021"/>
            <abstract>
              <t>   This document provides a taxonomy of methods used by manufacturers of
   silicon and devices to secure private keys and public trust anchors.
   This deals with two related activities: how trust anchors and private
   keys are installed into devices during manufacturing, and how the
   related manufacturer held private keys are secured against
   disclosure.

   This document does not evaluate the different mechanisms, but rather
   just serves to name them in a consistent manner in order to aid in
   communication.

   RFCEDITOR: please remove this paragraph.  This work is occurring in
   https://github.com/mcr/idevid-security-considerations

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-richardson-t2trg-idevid-considerations-05"/>
        </reference>
        <reference anchor="I-D.ietf-anima-constrained-voucher" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-anima-constrained-voucher.xml" target="https://www.ietf.org/archive/id/draft-ietf-anima-constrained-voucher-14.txt">
          <front>
            <title>Constrained Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="Michael Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Peter van der Stok">
              <organization>vanderstok consultancy</organization>
            </author>
            <author fullname="Panos Kampanakis">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Esko Dijk">
              <organization>IoTconsultancy.nl</organization>
            </author>
            <date month="October" day="25" year="2021"/>
            <abstract>
              <t>   This document defines a protocol to securely assign a Pledge to an
   owner and to enroll it into the owner's network.  The protocol uses
   an artifact that is signed by the Pledge's manufacturer.  This
   artifact is known as a "voucher".

   This document builds upon the work in [RFC8366] and [BRSKI], but
   defines an encoding of the voucher in CBOR rather than JSON, and
   enables the Pledge to perform its transactions using CoAP rather than
   HTTPS.

   The use of Raw Public Keys instead of X.509 certificates for security
   operations is also explained.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-constrained-voucher-14"/>
        </reference>
        <reference anchor="RFC8995" target="https://www.rfc-editor.org/info/rfc8995" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8995.xml">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author initials="M." surname="Pritikin" fullname="M. Pritikin">
              <organization/>
            </author>
            <author initials="M." surname="Richardson" fullname="M. Richardson">
              <organization/>
            </author>
            <author initials="T." surname="Eckert" fullname="T. Eckert">
              <organization/>
            </author>
            <author initials="M." surname="Behringer" fullname="M. Behringer">
              <organization/>
            </author>
            <author initials="K." surname="Watsen" fullname="K. Watsen">
              <organization/>
            </author>
            <date year="2021" month="May"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane.  To do this, a Secure Key Infrastructure is bootstrapped.  This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline.  We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device.  The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="I-D.richardson-anima-registrar-considerations" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.richardson-anima-registrar-considerations.xml" target="https://www.ietf.org/archive/id/draft-richardson-anima-registrar-considerations-04.txt">
          <front>
            <title>Operational Considerations for BRSKI Registrar</title>
            <author fullname="Michael Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Jie Yang">
              <organization>Huawei Technologies Co., Ltd.</organization>
            </author>
            <date month="July" day="29" year="2020"/>
            <abstract>
              <t>   This document describes a number of operational modes that a BRSKI
   Registration Authority (Registrar) may take on.

   Each mode is defined, and then each mode is given a relevance within
   an over applicability of what kind of organization the Registrar is
   deployed into.  This document does not change any protocol
   mechanisms.

   This document includes operational advice about avoiding unwanted
   consequences.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-richardson-anima-registrar-considerations-04"/>
        </reference>
        <reference anchor="I-D.moskowitz-ecdsa-pki" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.moskowitz-ecdsa-pki.xml" target="https://www.ietf.org/archive/id/draft-moskowitz-ecdsa-pki-10.txt">
          <front>
            <title>Guide for building an ECC pki</title>
            <author fullname="Robert Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Henk Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Liang Xia">
              <organization>Huawei</organization>
            </author>
            <author fullname="Michael C. Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date month="January" day="31" year="2021"/>
            <abstract>
              <t>   This memo provides a guide for building a PKI (Public Key
   Infrastructure) using openSSL.  All certificates in this guide are
   ECDSA, P-256, with SHA256 certificates.  Along with common End Entity
   certificates, this guide provides instructions for creating IEEE
   802.1AR iDevID Secure Device certificates.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-moskowitz-ecdsa-pki-10"/>
        </reference>
        <reference anchor="threetier" target="https://en.wikipedia.org/wiki/Multitier_architecture">
          <front>
            <title>Multitier architecture</title>
            <author initials="." surname="Wikipedia">
              <organization/>
            </author>
            <date year="2019" month="December"/>
          </front>
        </reference>
        <reference anchor="ieee802-1AR" target="http://standards.ieee.org/findstds/standard/802.1AR-2009.html">
          <front>
            <title>IEEE 802.1AR Secure Device Identifier</title>
            <author initials="." surname="IEEE Standard">
              <organization/>
            </author>
            <date year="2009"/>
          </front>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC7030" target="https://www.rfc-editor.org/info/rfc7030" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7030.xml">
          <front>
            <title>Enrollment over Secure Transport</title>
            <author initials="M." surname="Pritikin" fullname="M. Pritikin" role="editor">
              <organization/>
            </author>
            <author initials="P." surname="Yee" fullname="P. Yee" role="editor">
              <organization/>
            </author>
            <author initials="D." surname="Harkins" fullname="D. Harkins" role="editor">
              <organization/>
            </author>
            <date year="2013" month="October"/>
            <abstract>
              <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport.  This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates.  It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7030"/>
          <seriesInfo name="DOI" value="10.17487/RFC7030"/>
        </reference>
        <reference anchor="BedOfNails" target="https://en.wikipedia.org/wiki/In-circuit_test#Bed_of_nails_tester">
          <front>
            <title>In-circuit test</title>
            <author>
              <organization>Wikipedia</organization>
            </author>
            <date year="2019"/>
          </front>
        </reference>
        <reference anchor="RambusCryptoManager" target="https://www.rambus.com/qualcomm-licenses-rambus-cryptomanager-key-and-feature-management-security-solution/">
          <front>
            <title>Qualcomm Licenses Rambus CryptoManager Key and Feature Management Security Solution</title>
            <author>
              <organization>Qualcomm press release</organization>
            </author>
            <date year="2014"/>
          </front>
        </reference>
        <reference anchor="kskceremony" target="https://www.iana.org/dnssec/dps/zsk-operator/dps-zsk-operator-v2.0.pdf">
          <front>
            <title>DNSSEC Practice Statement for the Root Zone ZSK Operator</title>
            <author>
              <organization>Verisign</organization>
            </author>
            <date year="2017"/>
          </front>
        </reference>
        <reference anchor="rootkeyceremony" target="https://cryptography.fandom.com/wiki/Root_Key_Ceremony">
          <front>
            <title>Root Key Ceremony, Cryptography Wiki</title>
            <author>
              <organization>Community</organization>
            </author>
            <date year="2020" month="April"/>
          </front>
        </reference>
        <reference anchor="keyceremony2" target="http://www.digi-sign.com/compliance/key%20ceremony/index">
          <front>
            <title>SAS 70 Key Ceremony</title>
            <author>
              <organization>Digi-Sign</organization>
            </author>
            <date year="2020" month="April"/>
          </front>
        </reference>
        <reference anchor="nistsp800-57" target="https://csrc.nist.gov/publications/detail/sp/800-57-part-1/rev-4/final">
          <front>
            <title>SP 800-57 Part 1 Rev. 4 Recommendation for Key Management, Part 1: General</title>
            <author>
              <organization>NIST</organization>
            </author>
            <date year="2016" month="January" day="01"/>
          </front>
        </reference>
        <reference anchor="iso22301_2019" target="https://www.iso.org/standard/75106.html">
          <front>
            <title>ISO 22301: Societal security — Business continuity management systems — Requirements</title>
            <author>
              <organization>ISO</organization>
            </author>
            <date year="2019" month="January" day="01"/>
          </front>
        </reference>
        <reference anchor="holman2012" target="https://share.confex.com/share/118/webprogram/Handout/Session10387/Session%2010387%20Business%20Continuity%20Soloution%20Selection%20Methodology%2003-7-2012.pdf">
          <front>
            <title>A Business Continuity Solution Selection Methodology</title>
            <author initials="E." surname="Holman" fullname="Ellis Holman">
              <organization>IBM Corp</organization>
            </author>
            <date year="2012" month="March" day="13"/>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
