<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.6.4 (Ruby 2.6.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-richardson-anima-registrar-considerations-07" category="bcp" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.13.1 -->
  <front>
    <title abbrev="Registrar Considerations">Operational Considerations for BRSKI Registrar</title>
    <seriesInfo name="Internet-Draft" value="draft-richardson-anima-registrar-considerations-07"/>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <author initials="W." surname="Pan" fullname="Wei Pan">
      <organization>Huawei Technologies</organization>
      <address>
        <email>william.panwei@huawei.com</email>
      </address>
    </author>
    <date year="2023" month="May" day="11"/>
    <area>Internet</area>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document describes a number of operational modes that a
BRSKI Registration Authority (Registrar) may take on.</t>
      <t>Each mode is defined, and then each mode is given a relevance
within an over applicability of what kind of organization the
Registrar is deployed into.
This document does not change any protocol mechanisms.</t>
      <t>This document includes operational advice about avoiding unwanted
consequences.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-richardson-anima-registrar-considerations/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        anima Working Group mailing list (<eref target="mailto:anima@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/anima/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/mcr/registrar-operational-considerations.git"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="RFC8995"/> introduces a mechanism for
new devices (called pledges) to be onboarded into a network without
intervention from an expert operator.</t>
      <t>A key aspect of this is that there has to be a thing for the pledge to join!
<xref target="RFC8995"/> refers to this thing as the
"Domain", identified technically by the "DomainID".  The Registrar component
embodies the identity, membership and trust anchor of the domain.
Membership in the domain is proven by possession of a valid Local DeviceID, a
form of <xref target="ieee802-1AR"/> certificate.</t>
      <t>The Registrar is the component that implements the domain, authorizing new devices (pledges) to join.  Proper and efficient operation of the Registrar is key aspect for the Autonomic mechanisms, and for enabling secure onboarding.</t>
      <t>This document provides implementation, deployment and operational guidance for the BRSKI Registrar.</t>
      <t>There are however several classes of operator of a local domain: ISP and large
managed multi-side Enterprises are the primary target for this document.
Medium sized single site Enterprises and Industrial Plant users are a
secondary target for this document.  Unmanaged small enterprises and home
users are addressed in a separate section at the end as special case.</t>
      <t>This document first introduces the different scales of deployment as a reference for further discussion and contrasts, and then provides analyses some consequences of architectural choices that may be appropriate for different scales of deployments.</t>
      <t>The document includes security best practices for the management of the certificates and the certification authorities.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>Although this document is not an IETF Standards Track publication, it
adopts the conventions for normative language to provide clarity of
instructions to the implementer.
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      </section>
      <section anchor="reference-network-and-diagrams">
        <name>Reference Network and Diagrams</name>
        <t>In order to deal with the full complexity and generality of operations, the
reference network described herein is a bit more complicated than many
networks actually are.</t>
        <t>XXX-some of these diagrams as more complex than the document currently justifies.</t>
        <section anchor="tier-1-network">
          <name>Tier-1 Network</name>
          <t>In this guide one target is a world-wide Tier-1 ISP.  It has three network
operations centers (NOC), the two major ones in Frankfurt and Denver, with an
secondary center located in Perth, Australia.  The exact location of these
NOCs is not important: the locations have been chosen to have an hour
overlap in their 8-6 daytime shift, typical of world-wide operations.
This overlap is also not important, it just adds a degree of realism to this
discussion.  The use of actual names makes subsequent discussion about
failures easier.</t>
          <figure>
            <name>Reference Tier-1 ISP network</name>
            <artwork type="WHOLEFLOW" align="center"><![CDATA[

               .---------.   .------.
               | Denver  |   | NYC  |
          .----|---------|---|router|-.   .-----------.
         /     | NOC/JRC |   '------'   \ | Frankfurt |
        '      '---------'               '|-----------|
   .---------.                            | NOC/JRC   |
   | SanJose |                            '-----------'
   | router  |                                  .
   '---------'                                 /
       |                                      /
       |                                     /
.-----------.                               /
|   Perth   |              .-------.       /
|-----------|              | Tokyo |      /
| NOC/EST   |--------------|router |-----'
|           |              '-------'
'-----------'
]]></artwork>
          </figure>
          <t>XXX-there were some extended consequences that this diagram was anticipating, which have yet to be writen.</t>
        </section>
        <section anchor="enterprise-network">
          <name>Enterprise Network</name>
          <t>A second target is a medium Enterprise that has a single (probably on-premise) data
center.  The Enterprise has Information Technology (IT) operations that
include the routers and systems supporting it's office staff in it's
buildings.  It has Building Operations which integrates the IoT devices found
in the buildings that it owns, and it has Operations Technology (OT) that
manages the automated systems in it's on-site manufacturing facilities.</t>
          <figure>
            <name>Reference Enterprise network</name>
            <artwork type="WHOLEFLOW" align="center"><![CDATA[
                      .-------------.
                      | Data Center |
                 .----|-------------|------.
                /     | NOC/JRC     |       \
               /      '-------------'        \
              /                               \
             /                                 \
            /                                   \
   .--------------.                      .-------------.
   | Office Staff |                      |   building  |
   |   routers    |                      |  automation |
   |   switches   |                      |     IoT     |
   |   servers    |                      |   sensors   |
   '--------------'                      '-------------'
]]></artwork>
          </figure>
        </section>
        <section anchor="home-network">
          <name>Home Network</name>
          <t>A third target is a resident with a single CPE device.  The home owner has a
few medium sized devices (a home NAS) as well as a few IoT devices (light
bulbs, clothes washing machine).</t>
        </section>
      </section>
      <section anchor="internal-architectural-view">
        <name>Internal architectural view</name>
        <t>A Registrar will have four major interfaces, connected together by a common database.</t>
        <figure anchor="tier1isp">
          <name>Reference Internal Architecture for Registrar</name>
          <artwork type="ARCHVIEW" align="center"><![CDATA[
                  .------------.
                  |    MASA    |
                  |  Interface |
                  | BRSKI-MASA |
                  '------------'
                         ^
                         |
 .------------.          |           .---------------.
 | management |    .----------.      | certification |
 | interface  |<---| database |----->|   authority   |
 '------------'    '----------'      '---------------'
                         |
                         |
                         v
.------------.     .-----------.       .------------.
| Join Proxy |     |  Pledge   |--.    | EST/BRSKI  |
|------------|     | Interface |  |    |------------|
| GRASP      |     | BRSKI-EST |e |    |    GRASP   |
| (DULL)     |     '-----------'T |    '------------'
'------------'        '-----------'
]]></artwork>
        </figure>
        <section anchor="pledge-interface-southbound-interface">
          <name>Pledge Interface (Southbound Interface)</name>
          <t>The pledge interface is the southbound interface.
This interface runs the BRSKI-EST protocol.
It may also offer a constrained-BRSKI protocol using CoAP as described in <xref target="I-D.ietf-anima-constrained-voucher"/>.
It may further offer ultra-constrained onboarding protocols such as <xref target="I-D.selander-lake-authz"/>.</t>
          <t>This interface faces into the operator's network, receiving requests from devices to join the network.</t>
          <t>There is no requirement that the different onboarding protocols run on the same system, or from the same IP address.
They may also be seperated onto different networks, and perform all of their coordination through the database.</t>
          <t>For <xref target="RFC8995"/> use, the pledge interface is an HTTPS interface.</t>
          <t>Due to the use of provinsional trust state in the BRSKI-EST interface the pledge never verifies the contents of the TLS server certificate.
The registrar may also run on arbitrary port numbers, as the port number is part of the announcements used in the discovery protocol(s).
The voucher pins the associated certificate, so the Registrar does not need to have any
specific (subjectAltName) dnsName.</t>
          <t><xref target="I-D.ietf-anima-constrained-join-proxy"/> describes a mechanism to provide a stateless proxy of CoAPS connections, in which case DTLS traffic will be proxied by the Join Proxy to the port that the Registrar announces via GRASP within the ACP.
In this case, then there is DTLS layer below the CoAP layer.</t>
          <t><xref target="RFC9031"/> describes a proxy mechanism that can be used with <xref target="I-D.selander-lake-authz"/> to pass CoAP traffic.
In this case, depending upon the chosen AKE, the key agreement protocol would be above CoAP.</t>
          <t><xref target="I-D.richardson-anima-state-for-joinrouter"/> offers some additional
mechanisms, one of which involves dynamically created IPIP tunnels.
If these mechanisms are in use, then the southbound interface would need to support
these options as well.</t>
          <t>The Pledge Interface requires a TLS ServerCertificate, and <xref target="brskiestcert"/>
discusses option for creating this certificate.</t>
          <t>The certificates (or DH keys) used for the different protocols could entirely different.
If horizontal scaling is used, where there are multiple systems offering a BRSKI-EST interface (probably using a load balancing mechanism) then it is not necessary to have the same private keys for each system.
This assumption requires that the entire BRSKI-EST protocol exchange occur in a single TLS session (i.e. using HTTP/1.1 sessions), or that the load balancing system is able to consistently map each pledge to the same BRSKI-EST interface.</t>
          <t>As explained above, the Pledge Inteface does not require a public IP address, nor does it have have to run on port 443.
The address and port of the Pledge interface to the Registrar is advertised by the Registrar using GRASP, according to <xref target="RFC8995"/> section 4.1.1.
The service may run on any available port.
The HTTPS, CoAP and CoAPS port numbers do not need to be coordinated.</t>
          <t>In an ACP application (<xref target="RFC8994"/>), the Pledge Interface SHOULD have an IPv6 Unique Local Address (ULA) address from the prefix allocated to the ACP.
<xref target="acpnoc"/> provides some options for how the Pledge Interface can be best connected to the ACP.</t>
          <t>Outside of the ACP context, running the Pledge interface on an IP address that has a FQDN that resolves to that IP address (if only internally), and operating it on port 443 may have operational advantages.
The Registrar may have additional management functions, it may also serve as an EST end point for certificate renewal, and <xref target="I-D.ietf-anima-brski-cloud"/> proposes a mechanism to bootstrap devices which are not connected by a convex ACP, or no ACP.
The Registrar may be accessible via multiple interfaces.</t>
        </section>
        <section anchor="masa-client-northbound-interface">
          <name>MASA client (Northbound Interface)</name>
          <t>The MASA client interface connects outward to the Internet to speak to the
Manufacturer Authorized Signing Authority (MASA).
This is a TLS Client interface.</t>
          <t>Use of a TLSClientCertificate is RECOMMENDED as this may be the best way for
a manufacturer to identify clients.
<xref target="brskimasacert"/> discusses options for signing this certificate.</t>
          <t>The Northbound interface (V-&gt;W) described in <xref target="I-D.selander-lake-authz"/> may require a proof of possesion of the (private) key which the pledge (U) has witnessed.
In that case, this proof of posession may need to be done in the Southbound BRSKI-EST interface, and stored in the database for use by the Northbound BRSKI-MASA system.
The private keys from the Southbound interfaces SHOULD NOT be made available on the Northbound interfaces.</t>
          <t>The MASA client interface is outgoing only and does not require any special connectivity.
It may be placed behind a typical enterprise or residential NAT44 gateway.
IPv6 connectivity is RECOMMENDED however, as an increasing number of MASA may prefer IPv6 only connectivity.
It does need access to DNS, and the DNS lookups SHOULD be validated with DNSSEC.</t>
          <t>The MASA client interface will need to validate the server certificates of the MASA, and to do this it will need access to the common public WebPKI (<xref target="WebPKI"/>) trust anchors to validate the MASA.
The MASA client MAY also require access to a database of pinned certificates to validate specific manufacturers as called out for in <xref target="RFC8995"/> section 2.8 and section 5.4.</t>
        </section>
        <section anchor="join-proxy-southbound-interface">
          <name>Join Proxy (Southbound Interface)</name>
          <t>In the ACP context, the Registrar is expected to have a Join Proxy operating
on the Southbound Interface in order to announce the existence of the
Registrar to the local network, for the benefit of directly connected
devices.
This permits the systems on the LAN in the NOC itself to autonomically join the domain.</t>
          <t>The Join Proxy MAY announce the IP address (ULA) and port of the actual Pledge Interface, rather than announcing a link-local address and then performing a proxy operation.</t>
        </section>
        <section anchor="est-and-brski-grasp-announcements">
          <name>EST and BRSKI GRASP announcements</name>
          <t>As specified in <xref target="RFC8995"/> section 4.3, in an ACP context, the Registrar MUST announce itself inside the ACP using GRASP.
The Registrar MUST incorporate enough of a GRASP daemon in order to perform the M_FLOOD announcements.</t>
          <t>As specified in <xref target="RFC8995"/> section 6.1.2, in an ACP context, if the Registrar will also be providing for renewal of certificates using EST, then it SHOULD
announce itself inside the ACP using GRASP.
See <xref target="RFC8994"/> section 6.1.5.1 for details.
Unless made impossible due to loading concerns, it is RECOMMENDED that all Registrar instances offer certificate renewal services in this fashion.</t>
          <t>The use of <xref target="RFC8739"/> Short-Term Automatically-Renewed Certificates is RECOMMENDED.
This mandates that the EST server be highly available.
If STAR-style renewals are not used, then the Certification Authority will need to make OCSP or CRL Distribution points available.</t>
        </section>
        <section anchor="certification-authority">
          <name>Certification Authority</name>
          <t>If the Enterprise/ISP has an existing certification authority system that it wishes to use, then an interface to it has to be enabled.
This may run protocols like EST, CMP or ACME.</t>
          <t>Smaller Enterprises and Residential uses of BRSKI are encouraged to use an internal (private) certification authority.
See <xref target="certauthsecurity"/> for a discussion of securing this CA.</t>
        </section>
        <section anchor="management-interface">
          <name>Management Interface</name>
          <t>The Registrar will require a management interface.
As is the trend, this will often be a web-based single page application using AJAX API calls to perform communications.
This interface SHOULD be made available on the Southbound NOC interface only, and it MUST be on a different IP address and port number then the BRSKI-EST interface.
It should be secured with HTTPS, and use of a public (<xref target="WebPKI"/>) anchor is reasonable as it may be that the internal certification authority may be unavailable or require maintenance.</t>
          <t>An entirely separate process is justified with the only connection to the other procesess being the database.
(This does not mean it can not share code modules)</t>
        </section>
      </section>
    </section>
    <section anchor="acpnoc">
      <name>Connecting the Autonomic Control Plane to the Network Operations Center (NOC)</name>
      <t><xref target="RFC8994"/> section 8.1 describes a mechanism to connect non-ACP capable systems to the ACP.
The use of this mechanism is critical to incremental deployment of ANIMA and BRSKI in operators.</t>
      <t>The deployment of BRSKI capable equipment would ideally occur in an outward
wave, a concentric ring, from the NOC.</t>
      <t>(EDNOTE: INSERT DIAGRAMS)</t>
      <t>This would start by an upgrade of the router that connects the NOC to the production network.  This device needs to support the ACP connect functionality.</t>
      <t>It is possible, but beyond the scope of this document, to do initial
connectivity of the ACP and of multiple NOCs by manually configured IPsec tunnels.
This is likely an important step for incremental initial deployment.</t>
      <t>The Registrar described in the next section either needs to be connected via one of the above mentioned tunnels, or it must be located on a network with ACP Connect, or it must itself be part of an automatically configured ACP.
It is quite reasonable for the Registrar to be part of a larger appliance that also includes an ACP Connect functionality.</t>
    </section>
    <section anchor="certauthsecurity">
      <name>Public Key Infrastructure Recommendations for the Registrar</name>
      <t>The Registrar requires access to, or must contain a Certification Authority (CA).</t>
      <t>This section deals with the situation where the CA is provided internally.
<xref target="I-D.ietf-acme-integrations"/> deals with the case where the CA is provided by an external service, and the CA trust anchors are public.
These use ACME (<xref target="RFC8555"/>) is used as the interface.
That is out of scope for this document.</t>
      <t>There are also a number of commercial offerings where a private CA is operated by an external entity using a wide variety of protocols, including proprietary ones.
Those are also out of scope for this document.</t>
      <t>The requirements for the PKI depends upon what kind of network is being managed.</t>
      <section anchor="pki-recommendations-for-tier-1isp-networks">
        <name>PKI recommendations for Tier-1/ISP Networks</name>
        <t>A three-tier PKI infrastructure is appropriate for an ISP.
This entails having a root CA created with the key kept offline, and a number of intermediate CAs that have online keys that issue "day-to-day" certificates.</t>
        <t>Whether the root private key is secured by applying secret-splitting, and then storing the results on multiple USBs key kept in multiple safes, or via Hardware Security Module is a local decision informed by best current practices.</t>
        <t>The root CA is then used to sign a number of intermediate entities: this will include an intermediate CA for the Registrar that is deployed into each redundant NOC location.
Multiple intermediate CAs with a common root provides significantly more
security and operational flexibility than attempts to share a private key among locations.</t>
        <t>While the root CA should have a longevity of at least 5 years, after which it can be re-signed rather than re-generated.
(Resigning an existing key might not require replacement of trust anchors on all devices)</t>
        <t>The intermediate CA keys need only have a 1-2 year duration, and before the end of their lifetime, a new private key should be generated and replace the old one.</t>
        <t>Shorter periods are possible, but until there is more experience with them, not recommended.  The intermediate CA key should be regenerated because the intermediate CA private key will need to be online, available to the Registrar CA system.
There are many more opportunities for the key to leak, such as into backups.</t>
        <t>The intermediate CA is then used to sign End-Entity certificates which are returned as part of the BRSKI-EST mechanism.</t>
        <t>The Registrar needs both of client and server certificates for it's BRSKI-EST and BRSKI-MASA connections.
It is recommended that an additional intermediate CA can be created for manually issued certificates such as these.
This intermediate CA could be called the NOC Infrastructure CA, and could be used to issue certificates for all manner of infrastructure such as web-based monitoring tools.
The private root CA certificate should be installed into the browsers of NOC personnel.</t>
        <t>The document <xref target="I-D.moskowitz-ecdsa-pki"/> provides some practical instructions on setting up this kind of system.</t>
        <t>This document recommends the use of ECDSA keys for the root and subordinate CAs, but there may be  operational reasons why an RSA subordinate CA will be required for some legacy equipment.</t>
      </section>
      <section anchor="enterprise-network-1">
        <name>Enterprise Network</name>
        <t>Enterprises that have multiple Network Operations Center should consider the recommendations above for an ISP.</t>
        <t>This section applies to Enterprises that have all NOC operations/personel into a single location, which is probably on-premise data center.
This is not a hard rule for scaling, but the intent is that physical security for the ACP Connect network is rather easy, that only a single legal jurisdiction will apply, and that it is possible to get people together easily to do things like resign keys.</t>
        <t>A three-tier PKI infrastructure is still recommended for the reason that it provides operational continuity options not available with a two-level system.
The recommendation is to have a root CA mechanism installed on a Virtual Machine which is not connected to a network.
The root CA private key is kept offline, secret split among a number of USB keys, kept in the possession of key personnel.</t>
        <t>The secret split should have at least five components, of which at least three are required to reconstruct the key.
See <xref target="I-D.hallambaker-mesh-udf"/> section 4.5 for one such mechanism, there are many others, and there are no interoperability requirements for the secret split.</t>
        <t>The essential point is that the Enterprise is able to recover the root CA key even without some number of personnel and is able to continue operating it's network.</t>
        <t>As in the ISP case, the intermediate CA is then used to sign End-Entity certificates which  are returned as part of the BRSKI-EST mechanism.
One intermediate CA key suffices as there is only one NOC location with a Registrar.
Incidental certificates for internal operations (such as internal web servers, email servers, etc.), and for the BRSKI-EST server certificate can be done with this single intermediate CA.</t>
        <t>The BRSKI-MASA TLS Client Certificate key for an enterprise may not be needed; it depends upon the policies of the manufacturers which are involved.
It may be simpler to use a certificate produced by a public CA (such as LetsEncrypt), as this makes it easier for manufacturers to validate the provided certificate.</t>
        <t>The document <xref target="I-D.moskowitz-ecdsa-pki"/> provides some practical instructions on setting up this kind of system.
This document recommends the use of ECDSA keys for the root and intermediate CAs.
In an  Enterprise, there are likely many more legacy devices that might need to become involved in the secure domain.
It is recommended that an RSA root and intermediate CA be more strongly considered.</t>
      </section>
      <section anchor="home-network-1">
        <name>Home Network</name>
        <t>Home networks and small offices that use residential class equipment are the most challenging situation.
The three-tier PKI architecture is not justified because the ability to keep the root CA offline has no operational value.</t>
        <t>The home network registrar should be initialized with a single key pair used as the certification authority.</t>
        <t>Secret splitting is useful in order to save the generated key with a few neighbours.
It is recommended that the entire PKI system database (including CA private key) be encrypted with a symmetric key and the results made available regularly for download to a variety of devices.
The symmetric key is split among the neighbours.</t>
        <t>The most difficult part of the Home Network PKI and Registrar is where to locate it.
Generally it should be located on a device that is fully owned by the home user.
This is sometimes the Home Router, but in a lot of situations the Home Router is the ISP's CPE router.
If the home has a Network Attached Storage (NAS) system, then running it there is probably better.</t>
        <t>A compromise for CPE devices owned by the ISP that can run containers is for the Registrar to be located on detachable storage that is inserted into the CPE.
The detachable storage is owned by the home owner, and can be removed from the CPE device if it is replaced.
More experience will be necessary in order to determine if this is a workable solution.</t>
      </section>
    </section>
    <section anchor="arch">
      <name>Architecture Considerations for the Registrar</name>
      <t>There are a number of ways to scale the Registrar.
Web framework three-tier mechanisms are the most obvious.
See <xref target="threetier"/> for an overview.
This architecture is very familiar and can work well for a Registrar.
There are a few small issues that need to be addressed relating to the TLS connections.</t>
      <t>The BRSKI-EST connection uses TLS Client Certificate information, so it is necessary for the presentation tier to pass the entire certificate through to the application layer.
The presentation tier MUST accept all Client Certificates, many of which might it might not have anchors for.
Many n-tier systems provide for non-standard ways to transmit the client certificate from presentation layer to application layer, but <xref target="I-D.bdc-something-something-certificate"/> also intends to provide a standards track mechanism.</t>
      <t>In addition, the Registrar Voucher-Request MUST be signed using the same key pair that is used to terminate the TLS connection, so the application layer will need access to the same keypair that the presentation tier uses.
This can be operationally challenging if the presentation tier is provided by a hardware-based TLS load balancer.</t>
      <t>For this reason, an alternate architecture where the front-end load balancer provides TCP level load balancing, leaving the TLS operations to software TLS implementations in the application layer may be simpler to build.
Given that the Registrar is an inward facing system, and is not subject to the Internet-scale loads typical of "Black Friday" web system, the same kind of extreme scaling is not necessary.</t>
      <t>The BRSKI-EST flow includes a back-end call to the BRSKI-MASA flow.
That is, during the BRSKI-EST /voucherrequest call, a voucher will need to be fetched from the MASA using a BRSKI-MASA connection.
There are three ways to do this.</t>
      <section anchor="completely-synchronous-registrar">
        <name>Completely Synchronous Registrar</name>
        <t>In this simplest version the Registrar operates as a single thread, processing the voucher-request from the Pledge, and then starting a BRSKI-MASA client session, while the connection from the Pledge waits.</t>
        <t>This flow is very simple to implement, but requires an entire processing thread to block while the BRSKI-MASA protocol executes.
The Pledge may timeout on this request, disconnect and retry.
Experience so far is that typical default timeouts work fine.</t>
        <t>It is recommended that the voucher-request be recorded in a database, and if a corresponding fresh voucher is also found in the database, that it be returned rather than fetching a new voucher from the MASA.
This accomodates the situation where the Pledge did timeout, but the BRSKI-MASA protocol did complete.
This results in the Pledge receiving the voucher upon retrying without having to go through the process of getting a new voucher.
This only works if the Pledge retries with the same Nonce each time.</t>
      </section>
      <section anchor="partially-synchronous-registrar">
        <name>Partially Synchronous Registrar</name>
        <t>A slightly more complicated version is for the Registrar to look in a database for a matching voucher-request, and if none is found, to return a 202 code upon the voucher-request, asking the Pledge to retry.</t>
        <t>In the meantime the BRSKI-MASA connection can be performed, and the resulting voucher stored in a database.
The connection can be done in the same thread that just deferred the connection, or in another thread kicked off for this purpose.</t>
      </section>
      <section anchor="asynchronous-registrar">
        <name>Asynchronous Registrar</name>
        <t>In the completely asynchronous architecture, things work as with the Partially Synchronous version.
The voucher request is placed into a database as before.</t>
        <t>A completely separate system, probably with different network connectivity, but connected to the same database,  performs the BRSKI-MASA processing, then fills the database with the answer.</t>
        <t>This version may have a noticeably higher latency as it requires a database operation and a database trigger to invoke the process.
This architecture has the advantage, however, that the internal facing Registrar never connects to the Internet.
Furthermore, the number of internal facing Registrar instances can be tuned independently from the number of outward facing clients.
This may be an advantage for networks that need to deal with a high number of malicious or lost internal clients.</t>
      </section>
    </section>
    <section anchor="certificates-needed-for-the-registrar">
      <name>Certificates needed for the Registrar</name>
      <t>In addition to hosting a PKI root, the Registrar needs several other key pairs.  They are:</t>
      <section anchor="brskiestcert">
        <name>TLS Server Certificate for BRSKI-EST</name>
        <t>A certificate to be used to answer TLS connections from new devices (pledges).
This must be of a type that expected pledges can understand.
Returning an RSA key to a client that can validate only ECDSA chains is a problem.
The constrained IoT ecosystem prefers ECDSA, and often does not have code that can verify RSA.  Meanwhile, older FIPS-140 validated libraries present in many router operating systems support only RSA!</t>
        <t>The recommendation is to use ECDSA keys, with a sensitiviity to when a majority of systems might support EdDSA.
There are well established mechanisms in most TLS server libraries to permit multiple certificates to be loaded and to return an appropriate key based upon the client capabilities.
This should be used.</t>
        <t>The certificate used for the BRSKI-EST end point is not validated by the BRSKI pledge using public trust anchors, but rather it is pinned by the <xref target="RFC8366"/> voucher.
As such it can come from the private CA, as recommended above: either signed by a specific intermediate CA or via a root CA as appropriate for the environment.</t>
      </section>
      <section anchor="brskimasacert">
        <name>TLS Client Certificate for BRSKI-MASA</name>
        <t>A certificate may optionally be used for authentication of the Registrar to the MASA.
It is recommended to always include one.</t>
        <t>It can be the same certificate used by TLS Server Certificate above, and this is most appropriate in small Registrars which are not distributed, such as ones aimed as Residential/Home networks.</t>
        <t>In larger, distributed Registrars, cryptographic hygiene dictates that the private key not be distributed, so a unique certificate per Registrar client is appropriate.
They should all be signed by the same intermediate CA, with the intermediate and root CA certificates being supplied in the TLS connection.</t>
        <section anchor="use-of-publically-anchored-tls-client-certificate-with-brski-masa-connection">
          <name>Use of Publically Anchored TLS Client Certificate with BRSKI-MASA connection</name>
          <t>The use TLS Client Certificate which has a public anchor (such as from LetsEncrypt) has an advantage that is makes it easier for the MASA to reject malicious clients.</t>
          <t>If the Registrar is not using a supply chain integration that includes the MASA being aware of the cryptographic identity of the Registrar, then the use of a publically anchored certificate is RECOMMENDED.</t>
        </section>
      </section>
      <section anchor="brskivoucherrequest">
        <name>Certificate for signing of Voucher-Requests</name>
        <t>As part of the BRSKI voucher-request process the Pledge's Voucher-Request is wrapped by the Registrar in another voucher-request and signed.
It is this certificate which pinned by MASA to validate the connection.</t>
        <t>The certificate used to sign the (parboiled) voucher-request MUST be the same as the one that is used for the TLS Server Connection.
This implies that the signed voucher-request MUST be constructed on the same machine that terminates the BRSKI-EST connection.</t>
      </section>
    </section>
    <section anchor="autonomic-control-plane-addressing">
      <name>Autonomic Control Plane Addressing</name>
      <t>In the Enterprise and ISP use cases, the creation of an <xref target="RFC8994"/> Autonomic Control Plane is assumed.
(The use of an ACP for the Home Network of IoT devices is considered unnecessary due to HNCP)</t>
      <t>In these context the certificates which are returned by the Registrar MUST contain a unique IPv6 ULA address.
<xref target="RFC8994"/> section 6.10 outlines several addressing schemes for the ULA addresses.
The use of the ACP Vlong Addressing Sub-Scheme (6.10.5) is recommended as it provides the most flexibility for devices.</t>
      <t>The use of this mode limits the number of nodes in the network to between 32768 and 8 Million.
32K routers in an ISP network seems like quite a lot already, but use of F=0 addresses provides for up to 8 Million devices, each with 256 management end points.</t>
      <t>It should be noted that a mix of F=0 and F=1 addresses may be used, but the BRSKI protocol does not directly provide a way to negotiated this.
This could be done as part of the Certificate Signing Request: the device could decide which kind of address to ask for by changing the address that it asks for, but this is non-standardized and may not work.</t>
      <t>A network manager that saw that a device was running out of F=0 space, that is if 256 addresses was not enough for a device, could allocate an F=1 address in a management interface.
At the next certificate renewal (which could be forced by a management action), then a new certificate would be issues with the larger address space.</t>
      <t>256 addresses for a single device may seem like a lot, but it is increasing the case that routers may have a large number of virtualized functions within and each may reasonably need to be separately connected to it's SDN controller.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>Section 10.2 of <xref target="RFC8995"/> details a number of things that are revealed by the BRSKI-EST protocol.
A multi-location Registrar with different TLS Server Certificates will have a different privacy profile than a Registrar that uses only a single certificate.</t>
      <t>Section 10.3 of <xref target="RFC8995"/> details what is revealed by the BRSKI-MASA protocol.
The operational recommendations of this document do not affect or mitigate things at all.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Section 11 of <xref target="RFC8995"/> does not deal with any attacks against the Registrar, as the Registrar is considered to be an internally facing system.</t>
      <t>In the context of the Autonomic Control Plane (<xref target="RFC8995"/> section 9, and <xref target="RFC8994"/>) it is expected that the majority of equipment attached to a network are connected by wired ethernet.  The opportunity for a massive attack against the Registrar is considered low in an ISP, or multi-side Enterprise backbone network.</t>
      <section anchor="denial-of-service-attacks-against-the-registrar">
        <name>Denial of Service Attacks against the Registrar</name>
        <t>However, there are some exposures which need to be taken into account, particular in the Enterprise or Institutional Campus network: typically these networks have large number of access ports, one for each desktop system.
Those systems can be infected with Malware, or may be located in student computer labs physically accessible with minimal authorization.
While an attack on the Registrar might be part of some kind of student protest, an attack by malware seems more likely.</t>
        <t>The different architectures proposed in <xref target="arch"/> of this document provides some recommendations on differing scales.
The use of a fully asynchronous design is recommended for Enterprise uses of BRSKI where there may be a large number of IoT devices that are expected to onboard.
The ability to scale the BRSKI-EST Pledge Interface without having the scale the rest of the system provides for resiliency of the Registrary.</t>
        <t>It bears repeating that the use of of a stateless technology in the Join Proxy moves the load due to attacking systems from the Join Proxy into the Registrar.
This increases the network bandwidth required from the Join Proxy to the Registrar with the benefit of simplifying the Join Proxy.</t>
        <t>This is an intentional design decision to centralize the impact into the purpose built Registrar system(s).</t>
      </section>
      <section anchor="loss-of-keyscorruption-of-infrastructure">
        <name>Loss of Keys/Corruption of Infrastructure</name>
        <t>In Home/Residential Network ("homenet") uses of <xref target="RFC8995"/> the biggest risk is likely that of loss of the Registrar's key pairs.
That is, accidental loss of the private key is more likely than loss to a malicious entity that steals them with intent to cause damage.</t>
        <t>This can be due to failure to backup the database followed by a CPE device failure, but the case where a CPE device is simply thrown away to be replaced by an uninformed technician or household member is probably the most likely situation.</t>
        <t>This situation results in loss of control for all devices in the home, and much frustration from the home owner who has to go through an onboarding process for all the devices.
The use of a standardized onboarding protocol significantly mitigates the hassle; the current "state of the art" proccess involves a series of appliance-specific smartphone applications, which may or not not actually work on more recent devices.</t>
        <t>This is why the focus on saving of the database along with a secret splitting process to secure it.
At present there is no cross-vendor format for this database, so the saved data is only useable with a Registrar from the same vendor.
So this protects against device failure, where it is replaced by an identical device or an upward compatible device from the same manufacturer, but not against changes of vendor.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document makes no IANA allocations.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Your name here.</t>
    </section>
    <section anchor="changelog">
      <name>Changelog</name>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8995" target="https://www.rfc-editor.org/info/rfc8995">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin">
              <organization/>
            </author>
            <author fullname="M. Richardson" initials="M." surname="Richardson">
              <organization/>
            </author>
            <author fullname="T. Eckert" initials="T." surname="Eckert">
              <organization/>
            </author>
            <author fullname="M. Behringer" initials="M." surname="Behringer">
              <organization/>
            </author>
            <author fullname="K. Watsen" initials="K." surname="Watsen">
              <organization/>
            </author>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane.  To do this, a Secure Key Infrastructure is bootstrapped.  This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline.  We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device.  The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="RFC8994" target="https://www.rfc-editor.org/info/rfc8994">
          <front>
            <title>An Autonomic Control Plane (ACP)</title>
            <author fullname="T. Eckert" initials="T." role="editor" surname="Eckert">
              <organization/>
            </author>
            <author fullname="M. Behringer" initials="M." role="editor" surname="Behringer">
              <organization/>
            </author>
            <author fullname="S. Bjarnason" initials="S." surname="Bjarnason">
              <organization/>
            </author>
            <date month="May" year="2021"/>
            <abstract>
              <t>Autonomic functions need a control plane to communicate, which depends on some addressing and routing.  This Autonomic Control Plane should ideally be self-managing and be as independent as possible of configuration.  This document defines such a plane and calls it the "Autonomic Control Plane", with the primary use as a control plane for autonomic functions.  It also serves as a "virtual out-of-band channel" for Operations, Administration, and Management (OAM) communications over a network that provides automatically configured, hop-by-hop authenticated and encrypted communications via automatically configured IPv6 even when the network is not configured or is misconfigured.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8994"/>
          <seriesInfo name="DOI" value="10.17487/RFC8994"/>
        </reference>
        <reference anchor="I-D.ietf-anima-constrained-voucher" target="https://datatracker.ietf.org/doc/html/draft-ietf-anima-constrained-voucher-20">
          <front>
            <title>Constrained Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Peter Van der Stok" initials="P." surname="Van der Stok">
              <organization>vanderstok consultancy</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Esko Dijk" initials="E." surname="Dijk">
              <organization>IoTconsultancy.nl</organization>
            </author>
            <date day="13" month="March" year="2023"/>
            <abstract>
              <t>   This document defines the Constrained Bootstrapping Remote Secure Key
   Infrastructure (Constrained BRSKI) protocol, which provides a
   solution for secure zero-touch bootstrapping of resource-constrained
   (IoT) devices into the network of a domain owner.  This protocol is
   designed for constrained networks, which may have limited data
   throughput or may experience frequent packet loss.  Constrained BRSKI
   is a variant of the BRSKI protocol, which uses an artifact signed by
   the device manufacturer called the "voucher" which enables a new
   device and the owner's network to mutually authenticate.  While the
   BRSKI voucher is typically encoded in JSON, Constrained BRSKI uses a
   compact CBOR-encoded voucher.  The BRSKI voucher is extended with new
   data types that allow for smaller voucher sizes.  The Enrollment over
   Secure Transport (EST) protocol, used in BRSKI, is replaced with EST-
   over-CoAPS; and HTTPS used in BRSKI is replaced with CoAPS.  This
   document Updates RFC 8366 and RFC 8995.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-constrained-voucher-20"/>
        </reference>
        <reference anchor="RFC8366" target="https://www.rfc-editor.org/info/rfc8366">
          <front>
            <title>A Voucher Artifact for Bootstrapping Protocols</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen">
              <organization/>
            </author>
            <author fullname="M. Richardson" initials="M." surname="Richardson">
              <organization/>
            </author>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin">
              <organization/>
            </author>
            <author fullname="T. Eckert" initials="T." surname="Eckert">
              <organization/>
            </author>
            <date month="May" year="2018"/>
            <abstract>
              <t>This document defines a strategy to securely assign a pledge to an owner using an artifact signed, directly or indirectly, by the pledge's manufacturer.  This artifact is known as a "voucher".</t>
              <t>This document defines an artifact format as a YANG-defined JSON document that has been signed using a Cryptographic Message Syntax (CMS) structure.  Other YANG-derived formats are possible.  The voucher artifact is normally generated by the pledge's manufacturer (i.e., the Manufacturer Authorized Signing Authority (MASA)).</t>
              <t>This document only defines the voucher artifact, leaving it to other documents to describe specialized protocols for accessing it.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8366"/>
          <seriesInfo name="DOI" value="10.17487/RFC8366"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC8739" target="https://www.rfc-editor.org/info/rfc8739">
          <front>
            <title>Support for Short-Term, Automatically Renewed (STAR) Certificates in the Automated Certificate Management Environment (ACME)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer">
              <organization/>
            </author>
            <author fullname="D. Lopez" initials="D." surname="Lopez">
              <organization/>
            </author>
            <author fullname="O. Gonzalez de Dios" initials="O." surname="Gonzalez de Dios">
              <organization/>
            </author>
            <author fullname="A. Pastor Perales" initials="A." surname="Pastor Perales">
              <organization/>
            </author>
            <author fullname="T. Fossati" initials="T." surname="Fossati">
              <organization/>
            </author>
            <date month="March" year="2020"/>
            <abstract>
              <t>Public key certificates need to be revoked when they are compromised, that is, when the associated private key is exposed to an unauthorized entity.  However, the revocation process is often unreliable. An alternative to revocation is issuing a sequence of certificates, each with a short validity period, and terminating the sequence upon compromise.  This memo proposes an Automated Certificate Management Environment (ACME) extension to enable the issuance of Short-Term, Automatically Renewed (STAR) X.509 certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8739"/>
          <seriesInfo name="DOI" value="10.17487/RFC8739"/>
        </reference>
        <reference anchor="RFC7030" target="https://www.rfc-editor.org/info/rfc7030">
          <front>
            <title>Enrollment over Secure Transport</title>
            <author fullname="M. Pritikin" initials="M." role="editor" surname="Pritikin">
              <organization/>
            </author>
            <author fullname="P. Yee" initials="P." role="editor" surname="Yee">
              <organization/>
            </author>
            <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins">
              <organization/>
            </author>
            <date month="October" year="2013"/>
            <abstract>
              <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport.  This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates.  It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7030"/>
          <seriesInfo name="DOI" value="10.17487/RFC7030"/>
        </reference>
        <reference anchor="I-D.richardson-anima-state-for-joinrouter" target="https://datatracker.ietf.org/doc/html/draft-richardson-anima-state-for-joinrouter-03">
          <front>
            <title>Considerations for stateful vs stateless join router in ANIMA bootstrap</title>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date day="22" month="September" year="2020"/>
            <abstract>
              <t>   This document explores a number of issues affecting the decision to
   use a stateful or stateless forwarding mechanism by the join router
   (aka join assistant) during the bootstrap process for ANIMA.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-richardson-anima-state-for-joinrouter-03"/>
        </reference>
        <reference anchor="RFC8555" target="https://www.rfc-editor.org/info/rfc8555">
          <front>
            <title>Automatic Certificate Management Environment (ACME)</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes">
              <organization/>
            </author>
            <author fullname="J. Hoffman-Andrews" initials="J." surname="Hoffman-Andrews">
              <organization/>
            </author>
            <author fullname="D. McCarney" initials="D." surname="McCarney">
              <organization/>
            </author>
            <author fullname="J. Kasten" initials="J." surname="Kasten">
              <organization/>
            </author>
            <date month="March" year="2019"/>
            <abstract>
              <t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names.  Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate.  As of this writing, this verification is done through a collection of ad hoc mechanisms.  This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance.  The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8555"/>
          <seriesInfo name="DOI" value="10.17487/RFC8555"/>
        </reference>
        <reference anchor="I-D.friel-acme-integrations" target="https://datatracker.ietf.org/doc/html/draft-friel-acme-integrations-02">
          <front>
            <title>ACME Integrations</title>
            <author fullname="Owen Friel" initials="O." surname="Friel">
              <organization>Cisco</organization>
            </author>
            <author fullname="Richard Barnes" initials="R." surname="Barnes">
              <organization>Cisco</organization>
            </author>
            <author fullname="Rifaat Shekh-Yusef" initials="R." surname="Shekh-Yusef">
              <organization>Avaya</organization>
            </author>
            <date day="24" month="October" year="2019"/>
            <abstract>
              <t>   This document outlines multiple advanced use cases and integrations
   that ACME facilitates without any modifications or enhancements
   required to the base ACME specification.  The use cases include ACME
   integration with EST, BRSKI and TEAP.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-friel-acme-integrations-02"/>
        </reference>
        <reference anchor="I-D.moskowitz-ecdsa-pki" target="https://datatracker.ietf.org/doc/html/draft-moskowitz-ecdsa-pki-10">
          <front>
            <title>Guide for building an ECC pki</title>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Liang Xia" initials="L." surname="Xia">
              <organization>Huawei</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date day="31" month="January" year="2021"/>
            <abstract>
              <t>   This memo provides a guide for building a PKI (Public Key
   Infrastructure) using openSSL.  All certificates in this guide are
   ECDSA, P-256, with SHA256 certificates.  Along with common End Entity
   certificates, this guide provides instructions for creating IEEE
   802.1AR iDevID Secure Device certificates.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-moskowitz-ecdsa-pki-10"/>
        </reference>
        <reference anchor="I-D.hallambaker-mesh-udf" target="https://datatracker.ietf.org/doc/html/draft-hallambaker-mesh-udf-17">
          <front>
            <title>Mathematical Mesh 3.0 Part II: Uniform Data Fingerprint.</title>
            <author fullname="Phillip Hallam-Baker" initials="P." surname="Hallam-Baker">
              <organization>ThresholdSecrets.com</organization>
            </author>
            <date day="23" month="October" year="2022"/>
            <abstract>
              <t>   This document describes the underlying naming and addressing schemes
   used in the Mathematical Mesh.  The means of generating Uniform Data
   Fingerprint (UDF) values and their presentation as text sequences and
   as URIs are described.

   A UDF consists of a binary sequence, the initial eight bits of which
   specify a type identifier code.  For convenience, UDFs are typically
   presented to the user in the form of a Base32 encoded string.  Type
   identifier codes have been selected so as to provide a useful
   mnemonic indicating their purpose when presented in Base32 encoding.

   Two categories of UDF are described.  Data UDFs provide a compact
   presentation of a fixed length binary data value in a format that is
   convenient for data entry.  A Data UDF may represent a cryptographic
   key, a nonce value or a share of a secret.  Fingerprint UDFs provide
   a compact presentation of a Message Digest or Message Authentication
   Code value.

   A Strong Internet Name (SIN) consists of a DNS name which contains at
   least one label that is a UDF fingerprint of a policy document
   controlling interpretation of the name.  SINs allow a direct trust
   model to be applied to achieve end-to-end security in existing
   Internet applications without the need for trusted third parties.

   UDFs may be presented as URIs to form either names or locators for
   use with the UDF location service.  An Encrypted Authenticated
   Resource Locator (EARL) is a UDF locator URI presenting a service
   from which an encrypted resource may be obtained and a symmetric key
   that may be used to decrypt the content.  EARLs may be presented on
   paper correspondence as a QR code to securely provide a machine-
   readable version of the same content.  This may be applied to
   automate processes such as invoicing or to provide accessibility
   services for the partially sighted.

   [Note to Readers]

   Discussion of this draft takes place on the MATHMESH mailing list
   (mathmesh@ietf.org), which is archived at
   https://mailarchive.ietf.org/arch/search/?email_list=mathmesh.

   This document is also available online at
   http://mathmesh.com/Documents/draft-hallambaker-mesh-udf.html.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-hallambaker-mesh-udf-17"/>
        </reference>
        <reference anchor="I-D.bdc-something-something-certificate" target="https://datatracker.ietf.org/doc/html/draft-bdc-something-something-certificate-05">
          <front>
            <title>Client-Cert HTTP Header: Conveying Client Certificate Information from TLS Terminating Reverse Proxies to Origin Server Applications</title>
            <author fullname="Brian Campbell" initials="B." surname="Campbell">
              <organization>Ping Identity</organization>
            </author>
            <date day="23" month="March" year="2021"/>
            <abstract>
              <t>   This document defines the HTTP header field "Client-Cert" that allows
   a TLS terminating reverse proxy to convey the client certificate of a
   mutually-authenticated TLS connection to the origin server in a
   common and predictable manner.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-bdc-something-something-certificate-05"/>
        </reference>
        <reference anchor="threetier" target="https://en.wikipedia.org/wiki/Multitier_architecture">
          <front>
            <title>Multitier architecture</title>
            <author>
              <organization>Wikipedia</organization>
            </author>
            <date year="2019" month="December"/>
          </front>
        </reference>
        <reference anchor="WebPKI" target="https://cabforum.org/wp-content/uploads/BRv1.2.2.pdf">
          <front>
            <title>CA/Browser Forum Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates, v.1.2.2</title>
            <author initials="" surname="CA/Browser Forum">
              <organization/>
            </author>
            <date year="2014" month="October"/>
          </front>
        </reference>
        <reference anchor="ieee802-1AR" target="http://standards.ieee.org/findstds/standard/802.1AR-2009.html">
          <front>
            <title>IEEE 802.1AR Secure Device Identifier</title>
            <author initials="" surname="IEEE Standard">
              <organization/>
            </author>
            <date year="2009"/>
          </front>
        </reference>
        <reference anchor="I-D.selander-lake-authz" target="https://datatracker.ietf.org/doc/html/draft-selander-lake-authz-02">
          <front>
            <title>Lightweight Authorization for EDHOC</title>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Mališa Vučinić" initials="M." surname="Vučinić">
              <organization>INRIA</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Aurelio Schellenbaum" initials="A." surname="Schellenbaum">
              <organization>Institute of Embedded Systems, ZHAW</organization>
            </author>
            <date day="21" month="April" year="2023"/>
            <abstract>
              <t>   This document describes a procedure for augmenting the lightweight
   authenticated Diffie-Hellman key exchange protocol EDHOC with third
   party assisted authorization, targeting constrained IoT deployments
   (RFC 7228).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-selander-lake-authz-02"/>
        </reference>
        <reference anchor="I-D.ietf-anima-constrained-join-proxy" target="https://datatracker.ietf.org/doc/html/draft-ietf-anima-constrained-join-proxy-14">
          <front>
            <title>Constrained Join Proxy for Bootstrapping Protocols</title>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Peter Van der Stok" initials="P." surname="Van der Stok">
              <organization>vanderstok consultancy</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>Cisco Systems</organization>
            </author>
            <date day="26" month="April" year="2023"/>
            <abstract>
              <t>   This document extends the work of Bootstrapping Remote Secure Key
   Infrastructures (BRSKI) by replacing the Circuit-proxy between Pledge
   and Registrar by a stateless/stateful constrained Join Proxy.  The
   constrained Join Proxy is a mesh neighbor of the Pledge and can relay
   a DTLS session originating from a Pledge with only link-local
   addresses to a Registrar which is not a mesh neighbor of the Pledge.

   This document defines a protocol to securely assign a Pledge to a
   domain, represented by a Registrar, using an intermediary node
   between Pledge and Registrar.  This intermediary node is known as a
   "constrained Join Proxy".  An enrolled Pledge can act as a
   constrained Join Proxy.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-constrained-join-proxy-14"/>
        </reference>
        <reference anchor="RFC9031" target="https://www.rfc-editor.org/info/rfc9031">
          <front>
            <title>Constrained Join Protocol (CoJP) for 6TiSCH</title>
            <author fullname="M. Vučinić" initials="M." role="editor" surname="Vučinić">
              <organization/>
            </author>
            <author fullname="J. Simon" initials="J." surname="Simon">
              <organization/>
            </author>
            <author fullname="K. Pister" initials="K." surname="Pister">
              <organization/>
            </author>
            <author fullname="M. Richardson" initials="M." surname="Richardson">
              <organization/>
            </author>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes the minimal framework required for a new device, called a "pledge", to securely join a 6TiSCH (IPv6 over the Time-Slotted Channel Hopping mode of IEEE 802.15.4) network. The framework requires that the pledge and the JRC (Join Registrar/Coordinator, a central entity), share a symmetric key. How this key is provisioned is out of scope of this document. Through a single CoAP (Constrained Application Protocol) request-response exchange secured by OSCORE (Object Security for Constrained RESTful Environments), the pledge requests admission into the network, and the JRC configures it with link-layer keying material and other parameters. The JRC may at any time update the parameters through another request-response exchange secured by OSCORE. This specification defines the Constrained Join Protocol and its CBOR (Concise Binary Object Representation) data structures, and it describes how to configure the rest of the 6TiSCH communication stack for this join process to occur in a secure manner. Additional security mechanisms may be added on top of this minimal framework.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9031"/>
          <seriesInfo name="DOI" value="10.17487/RFC9031"/>
        </reference>
        <reference anchor="I-D.ietf-anima-brski-cloud" target="https://datatracker.ietf.org/doc/html/draft-ietf-anima-brski-cloud-05">
          <front>
            <title>BRSKI Cloud Registrar</title>
            <author fullname="Owen Friel" initials="O." surname="Friel">
              <organization>Cisco</organization>
            </author>
            <author fullname="Rifaat Shekh-Yusef" initials="R." surname="Shekh-Yusef">
              <organization>Auth0</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date day="13" month="November" year="2022"/>
            <abstract>
              <t>   This document specifies the behavior of a BRSKI Cloud Registrar, and
   how a pledge can interact with a BRSKI Cloud Registrar when
   bootstrapping.

   RFCED REMOVE: It is being actively worked on at https://github.com/
   anima-wg/brski-cloud

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-brski-cloud-05"/>
        </reference>
        <reference anchor="I-D.ietf-acme-integrations" target="https://datatracker.ietf.org/doc/html/draft-ietf-acme-integrations-13">
          <front>
            <title>ACME Integrations for Device Certificate Enrollment</title>
            <author fullname="Owen Friel" initials="O." surname="Friel">
              <organization>Cisco</organization>
            </author>
            <author fullname="Richard Barnes" initials="R." surname="Barnes">
              <organization>Cisco</organization>
            </author>
            <author fullname="Rifaat Shekh-Yusef" initials="R." surname="Shekh-Yusef">
              <organization>Auth0</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date day="10" month="February" year="2023"/>
            <abstract>
              <t>   This document outlines multiple advanced use cases and integrations
   that ACME facilitates without any modifications or enhancements
   required to the base ACME specification.  The use cases include ACME
   integration with EST, BRSKI and TEAP.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-acme-integrations-13"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
