<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-anima-jws-voucher-16" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.25.0 -->
  <front>
    <title abbrev="JWS-voucher">JWS signed Voucher Artifacts for Bootstrapping Protocols</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-anima-jws-voucher-16"/>
    <author initials="T." surname="Werner" fullname="Thomas Werner">
      <organization>Siemens AG</organization>
      <address>
        <email>thomas-werner@siemens.com</email>
      </address>
    </author>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <date year="2025" month="January" day="15"/>
    <area>Internet</area>
    <workgroup>anima Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 67?>

<t>This document introduces a variant of the RFC8366 voucher artifact in which CMS is replaced by the JSON Object Signing and Encryption (JOSE) mechanism described in RFC7515. This supports deployments in which JOSE is preferred over CMS.
In addition to specifying the format, the "application/voucher-jws+json" media type is registered and examples are provided.</t>
    </abstract>
  </front>
  <middle>
    <?line 72?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document provides cryptographic signing of voucher data in form of JSON Web Signature (JWS) <xref target="RFC7515"/> and the media type <tt>application/voucher-jws+json</tt> to identify the voucher format.
The encoding specified in this document is used by <xref target="I-D.ietf-anima-brski-prm"/>
and may be more handy for use cases already using Javascript Object Signing and Encryption (JOSE).</t>
      <t>This is an extension to "A Voucher Artifact for Bootstrapping Protocols" <xref target="I-D.ietf-anima-rfc8366bis"/> in which the YANG data model is
used by "Bootstrapping Remote Secure Key Infrastructure (BRSKI)" <xref target="RFC8995"/> and "Secure Zero Touch Provisioning (SZTP)" <xref target="RFC8572"/>
to transfer ownership of a device from a manufacturer to a new owner (customer or operational domain).
That document provides a serialization of the voucher data to JSON <xref target="RFC8259"/> with cryptographic signing according to the Cryptographic Message Syntax (CMS) <xref target="RFC5652"/>.</t>
      <t>This document is similar to <xref target="I-D.ietf-anima-constrained-voucher"/>, which provides cryptographic signing according COSE <xref target="RFC8812"/>.
These documents do not change nor extend the YANG definitions of <xref target="I-D.ietf-anima-rfc8366bis"/>.</t>
      <t>With the availability of different voucher formats, it is up to an industry-specific application statement to decide which format is to be used.
The associated media types are used to distinguish different voucher formats.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
      </t>
      <t>This document uses the following terms:</t>
      <dl>
        <dt>JSON Voucher Data:</dt>
        <dd>
          <t>An unsigned JSON representation of the voucher data.</t>
        </dd>
        <dt>JWS Voucher:</dt>
        <dd>
          <t>A JWS structure signing the JSON Voucher Data.</t>
        </dd>
        <dt>Voucher:</dt>
        <dd>
          <t>A short form for voucher artifact and refers to the signed statement from a Manufacturer Authorized Signing Authority (MASA) service that indicates to a Pledge the cryptographic identity of the domain it should trust, per <xref target="I-D.ietf-anima-rfc8366bis"/>.</t>
        </dd>
        <dt>Voucher Data:</dt>
        <dd>
          <t>The raw (serialized) representation of the <tt>ietf-voucher</tt> YANG module without any enclosing signature, per <xref target="I-D.ietf-anima-rfc8366bis"/>.</t>
        </dd>
        <dt>MASA (Manufacturer Authorized Signing Authority):</dt>
        <dd>
          <t>The entity that, for the purpose of this document, issues and signs the vouchers for the manufacturer's pledges. In some onboarding protocols, the MASA may have an Internet presence and be integral to the onboarding process, whereas in other protocols the MASA may be an offline service that has no active role in the onboarding process, per <xref target="I-D.ietf-anima-rfc8366bis"/>.</t>
        </dd>
        <dt>Pledge:</dt>
        <dd>
          <t>The prospective component attempting to find and securely join a domain. When shipped or in factory reset mode, it only trusts authorized representatives of the manufacturer, per <xref target="I-D.ietf-anima-rfc8366bis"/>.</t>
        </dd>
        <dt>Registrar:</dt>
        <dd>
          <t>A representative of the domain that is configured, perhaps autonomically, to decide whether a new device is allowed to join the domain, per <xref target="I-D.ietf-anima-rfc8366bis"/>.</t>
        </dd>
      </dl>
      <t>This document uses the following encoding notations:</t>
      <dl>
        <dt>BASE64URL(OCTETS):</dt>
        <dd>
          <t>Denotes the base64url encoding of OCTETS, per <xref section="2" sectionFormat="of" target="RFC7515"/>.</t>
        </dd>
        <dt>UTF8(STRING):</dt>
        <dd>
          <t>Denotes the octets of the UTF-8 <xref target="RFC3629"/> representation of STRING, per <xref section="1" sectionFormat="of" target="RFC7515"/>.</t>
        </dd>
      </dl>
    </section>
    <section anchor="voucher-artifact-with-json-web-signature">
      <name>Voucher Artifact with JSON Web Signature</name>
      <t>JWS voucher artifacts MUST use the "General JWS JSON Serialization Syntax" defined in <xref section="7.2.1" sectionFormat="of" target="RFC7515"/>.
This syntax supports multiple signatures as already supported by <xref target="RFC8366"/> for CMS-signed vouchers.
The following figure summarizes the serialization of JWS voucher artifacts:</t>
      <figure anchor="VoucherGeneralJWSFigure">
        <name>Voucher Representation in General JWS JSON Serialization Syntax (JWS Voucher)</name>
        <artwork align="left"><![CDATA[
    {
      "payload": BASE64URL(UTF8(JSON Voucher Data)),
      "signatures": [
        {
          "protected": BASE64URL(UTF8(JWS Protected Header)),
          "signature": BASE64URL(JWS Signature)
        }
      ]
    }
]]></artwork>
      </figure>
      <t>The JSON Voucher Data MUST be UTF-8 encoded to become the octet-based JWS Payload defined in <xref target="RFC7515"/>.
The JWS Payload is further base64url-encoded to become the string value of the <tt>payload</tt> member as described in <xref section="3.2" sectionFormat="of" target="RFC7515"/>.
The octets of the UTF-8 representation of the JWS Protected Header are base64url-encoded to become the string value of the <tt>protected</tt> member.
The generated JWS Signature is base64url-encoded to become the string value of the <tt>signature</tt> member.</t>
      <section anchor="json-voucher-data">
        <name>JSON Voucher Data</name>
        <t>The JSON Voucher Data is an unsigned JSON document <xref target="RFC8259"/> that conforms with the data model described by the ietf-voucher YANG module <xref target="RFC7950"/> defined in <xref section="7.3" sectionFormat="of" target="I-D.ietf-anima-rfc8366bis"/> and is encoded using the rules defined in <xref target="RFC7951"/>.
The following figure provides an example of JSON Voucher Data:</t>
        <figure anchor="VoucherGeneralJWSVoucherPayloadFigure">
          <name>JSON Voucher Data Example</name>
          <artwork align="left"><![CDATA[
    {
      "ietf-voucher:voucher": {
        "assertion": "logged",
        "serial-number": "0123456789",
        "nonce": "5742698422680472",
        "created-on": "2022-07-08T03:01:24.618Z",
        "pinned-domain-cert": "base64encodedvalue=="
      }
    }
]]></artwork>
        </figure>
      </section>
      <section anchor="jws-protected-header">
        <name>JWS Protected Header</name>
        <t>The JWS Protected Header defined in <xref target="RFC7515"/> uses the standard header parameters <tt>alg</tt>, <tt>typ</tt>, and <tt>x5c</tt>:</t>
        <ul spacing="normal">
          <li>
            <t>The <tt>alg</tt> parameter MUST contain the algorithm type (e.g., <tt>ES256</tt>) used to create the signature as defined in <xref section="4.1.1" sectionFormat="of" target="RFC7515"/>.</t>
          </li>
          <li>
            <t>The <tt>typ</tt> parameter is optional and used when more than one kind of object could be present in an application data structure as described in <xref section="4.1.9" sectionFormat="of" target="RFC7515"/>. If present, the <tt>typ</tt> parameter MUST contain the value <tt>voucher-jws+json</tt>.</t>
          </li>
          <li>
            <t>If X.509 (PKIX) certificates <xref target="RFC5280"/> are used, the <tt>x5c</tt> parameter MUST contain the base64-encoded (not base64url-encoded) X.509 v3 (DER) certificate as defined in <xref section="4.1.6" sectionFormat="of" target="RFC7515"/> and MUST also contain the certificate chain.</t>
          </li>
        </ul>
        <dl>
          <dt>Implementation Note:</dt>
          <dd>
            <t>base64-encoded values, in contrast to base64url-encoded values, may contain slashes (<tt>/</tt>).
JSON <xref target="RFC8259"/> optionally allows escaping these with backslashes (<tt>\\</tt>).
Hence, depending on the JSON parser/serializer implementation used, they may or may not be included.
JWS Voucher parsers MUST be prepared accordingly to extract certificates correctly.</t>
          </dd>
        </dl>
        <t>To validate voucher signatures, all certificates of the certificate chain are required up to the trust anchor.
Note, to establish trust the trust anchor MUST be provided out-of-band up front.</t>
        <t>The following figure gives an example of a JWS Protected Header:</t>
        <figure anchor="VoucherGeneralJWSProtectedHeaderFigure">
          <name>JWS Protected Header Example</name>
          <artwork align="left"><![CDATA[
    {
      "alg": "ES256",
      "typ": "voucher-jws+json",
      "x5c": [
        "base64encodedvalue1==",
        "base64encodedvalue2=="
      ]
    }
]]></artwork>
        </figure>
      </section>
      <section anchor="jws-signature">
        <name>JWS Signature</name>
        <t>The JWS Signature is generated over the JWS Protected Header and the JWS Payload (= UTF-8 encoded JSON Voucher Data) as described in <xref section="5.1" sectionFormat="of" target="RFC7515"/>.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>The Pledge-Voucher-Request (PVR) reveals the IDevID of the component (Pledge) that is in the process of bootstrapping.</t>
      <t>A PVR is transported via HTTP-over-TLS.
However, for the Pledge-to-Registrar TLS connection a Pledge provisionally accepts the Registrar server certificate during the TLS server authentication.
Hence, it is subject to disclosure by a Dolev-Yao attacker (a "malicious messenger") <xref target="ON-PATH"/>, as explained in <xref section="10.2" sectionFormat="of" target="RFC8995"/>.</t>
      <t>The use of a JWS header, with mentioned standard header parameters alg, typ, and x5c, brings no new privacy considerations next to <xref section="10.2" sectionFormat="of" target="RFC8995"/>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The issues of how <xref target="I-D.ietf-anima-rfc8366bis"/> vouchers are used in a BRSKI system is addressed in <xref section="11" sectionFormat="of" target="RFC8995"/>.
This document does not change any of those issues, it just changes the signature technology used for voucher request and response artifacts.</t>
      <t><xref section="9" sectionFormat="of" target="RFC8572"/> deals with voucher use in Secure Zero Touch Provisioning (SZTP), for which this document also makes no changes to security.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="media-type-registry">
        <name>Media-Type Registry</name>
        <t>This section registers <tt>application/voucher-jws+json</tt> in the "Media Types" registry.</t>
        <section anchor="applicationvoucher-jwsjson">
          <name>application/voucher-jws+json</name>
          <artwork><![CDATA[
Type name:  application
Subtype name:  voucher-jws+json
Required parameters:  N/A
Optional parameters:  N/A
Encoding considerations:  JWS+JSON vouchers are JOSE objects
                          signed with one or multiple signers.
Security considerations:  See section [Security Considerations]
Interoperability considerations:  N/A
Published specification:  THIS RFC
Applications that use this media type:  ANIMA, 6tisch, and other
  zero-touch bootstrapping/provisioning solutions
Additional information:
  Magic number(s):  N/A
  File extension(s):  .vjj
  Macintosh file type code(s):  N/A
Person & email address to contact for further information:  IETF
  ANIMA WG
Intended usage:  LIMITED
Restrictions on usage:  N/A
Author:  ANIMA WG
Change controller:  IETF
Provisional registration? (standards tree only):  NO
]]></artwork>
        </section>
      </section>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We would like to thank the various reviewers for their input,
in particular Steffen Fries, Ingo Wenda, Esko Dijk and Toerless Eckert.
Thanks for the supporting PoC implementations to Hong Rui Li and He Peng Jia.</t>
    </section>
    <section anchor="examples">
      <name>Examples</name>
      <t>These examples are folded according to the <xref target="RFC8792"/> Single Backslash rule.</t>
      <section anchor="example-pledge-voucher-request-pvr">
        <name>Example Pledge-Voucher-Request (PVR)</name>
        <t>The following is an example of a Pledge-Voucher-Request (PVR) as JWS Voucher artifact, which would be sent from a Pledge to the Registrar:</t>
        <figure anchor="ExamplePledgeVoucherRequestfigure">
          <name>Example Pledge-Voucher-Request (PVR)</name>
          <artwork align="left"><![CDATA[
{
  "payload": "eyJpZXRmLXZvdWNoZXItcmVxdWVzdDp2b3VjaGVyIjp7InNlcmlhbC\
1udW1iZXIiOiJraXQtOTg3NjU0MzIxIiwibm9uY2UiOiJUYXV2SytZL2NjMlJmSUZ2cF\
p6ZktRPT0iLCJjcmVhdGVkLW9uIjoiMjAyNC0xMS0yOVQwOTozNDoxNi40MjZaIiwicH\
JveGltaXR5LXJlZ2lzdHJhci1jZXJ0IjoiTUlJQ0RUQ0NBYk9nQXdJQkFnSUdBWk4zTk\
RtUE1Bb0dDQ3FHU000OUJBTUNNRnd4Q3pBSkJnTlZCQVlUQWtGUk1SSXdFQVlEVlFRS0\
RBbE5lVU52YlhCaGJua3hGVEFUQmdOVkJBc01ERTE1VTNWaWMybGthV0Z5ZVRFUE1BME\
dBMVVFQnd3R1RYbFRhWFJsTVJFd0R3WURWUVFEREFoTmVWTnBkR1ZEUVRBZUZ3MHlORE\
V4TWprd09URTFNekZhRncwek5ERXhNamt3T1RFMU16RmFNR0l4Q3pBSkJnTlZCQVlUQW\
tGUk1SSXdFQVlEVlFRS0RBbE5lVU52YlhCaGJua3hGREFTQmdOVkJBc01DMDE1VTNWaW\
MybGtZWEo1TVE4d0RRWURWUVFIREFaTmVWTnBkR1V4R0RBV0JnTlZCQU1NRDAxNVUybD\
BaVkpsWjJsemRISmhjakJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUFCQU\
grTFptbnRncGgralUvc2NUQnhkVHpzd2xmUTZ1Sy9BOWFJYkpaS2U0UGl0VnhraE5HWW\
d0Nm9wMytDaVFLTHdaOWdEMHFXMjIxQUxZNSs3bVFKNnlqV3pCWk1CMEdBMVVkSlFRV0\
1CUUdDQ3NHQVFVRkJ3TUJCZ2dyQmdFRkJRY0RIREFPQmdOVkhROEJBZjhFQkFNQ0I0QX\
dLQVlEVlIwUkJDRXdINElkYlhsemFYUmxjbVZuYVhOMGNtRnlMbTE1WTI5dGNHRnVlUz\
VqYjIwd0NnWUlLb1pJemowRUF3SURTQUF3UlFJZ0Q3a0J4MU82TzJGVFBPUlgwNDdTcF\
N2cGF6dC8rR3YyOXM4N3lyTXU2UE1DSVFEeU90cGJ2bEwvd1c4Zy9ESUx2T0RZZ01PT1\
VrVDE1ZHZZTUVOR1QyQ3V5Zz09In19",
  "signatures": [
    {
      "protected": "eyJ4NWMiOlsiTUlJQ056Q0NBZDJnQXdJQkFnSUdBWk4zTkRt\
S01Bb0dDQ3FHU000OUJBTUNNRmd4Q3pBSkJnTlZCQVlUQWtGUk1Sc3dHUVlEVlFRS0RC\
Sk5ZVzUxWm1GamRIVnlaWEl3TURFZ1FVY3hFekFSQmdOVkJBc01Dazl5WjFnZ1ZXNXBk\
RUV4RnpBVkJnTlZCQU1NRGsxaGJuVm1ZV04wZFhKbGNrTkJNQ0FYRFRJME1URXlPVEE1\
TVRVek1Wb1lEems1T1RreE1qTXhNak0xT1RVNVdqQnZNUXN3Q1FZRFZRUUdFd0pCVVRF\
Yk1Ca0dBMVVFQ2d3U1RXRnVkV1poWTNSMWNtVnlNREF4SUVGSE1STXdFUVlEVlFRTERB\
cFBjbWRZSUZWdWFYUkJNUll3RkFZRFZRUUZFdzFyYVhRdE9UZzNOalUwTXpJeE1SWXdG\
QVlEVlFRRERBMUJRa016TGtVM05TMHhNREJCTUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJ\
emowREFRY0RRZ0FFZ05rMXc2ZlBFRFlyekRJam5ybUV4RjU0WGsrK1psZjJITTRrQ29P\
bkt2VHJPMFY4YUJoMW11enlRVlUwano2VTd6OTFBSjlvNlNSQmxibTJmQlRPYTZONk1I\
Z3dNQVlJS3dZQkJRVUhBU0FFSkJZaWJXRnpZUzEwWlhOMExuaDVlbTFoYm5WbVlXTjBk\
WEpsY2k1amIyMDZPVFEwTXpBZkJnTlZIU01FR0RBV2dCU1ZUdFYrM1FxK2lrdlBLTVpv\
MEhaOXhESUg5VEFUQmdOVkhTVUVEREFLQmdnckJnRUZCUWNEQWpBT0JnTlZIUThCQWY4\
RUJBTUNCNEF3Q2dZSUtvWkl6ajBFQXdJRFNBQXdSUUlnVTJUNkpTOHVqUTAzK1QvdDE2\
dVNoZ2lsOE0vbWFHVnhuSzRxek9OUFVKRUNJUURHTVRxcmkyVzBMSUltajZCS1d0QU95\
WDJmRWdvaFI4RFVyTDNCMjFvRGlnPT0iXSwidHlwIjoidm91Y2hlci1qd3MranNvbiIs\
ImFsZyI6IkVTMjU2In0",
      "signature": "ehYSVTUFgJ890sF5F8ky5nfOXsG9JMfBVBv9POlwHVZGQnFQ\
hP3F0BQj6bj4mGICcfk5FGPD8rJKs7txuBfKgA"
    }
  ]
}
]]></artwork>
        </figure>
        <t>The following private key (of the IDevID) is used to sign a Pledge-Voucher-Request (PVR) by Pledge:</t>
        <artwork><![CDATA[
-----BEGIN PRIVATE KEY-----
MEECAQAwEwYHKoZIzj0CAQYIKoZIzj0DAQcEJzAlAgEBBCA4b574lJvkZZt+ij+D
ughPm8xFg95HMW3BHKCbQEaxUw==
-----END PRIVATE KEY-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
]]></artwork>
      </section>
      <section anchor="example-registrar-voucher-request-rvr">
        <name>Example Registrar-Voucher-Request (RVR)</name>
        <t>The following is an example Registrar-Voucher-Request (RVR) as JWS Voucher artifact, which would be sent from the Registrar to the MASA.
Note, the previous PVR can be seen in the payload in the field <tt>prior-signed-voucher-request</tt>.</t>
        <figure anchor="ExampleRegistrarVoucherRequestfigure">
          <name>Example Registrar-Voucher-Request (RVR)</name>
          <artwork align="left"><![CDATA[
{
  "payload": "eyJpZXRmLXZvdWNoZXItcmVxdWVzdDp2b3VjaGVyIjp7InNlcmlhbC\
1udW1iZXIiOiJraXQtOTg3NjU0MzIxIiwiaWRldmlkLWlzc3VlciI6IkJCZ3dGb0FVbF\
U3VmZ0MEt2b3BMenlqR2FOQjJmY1F5Qi9VPSIsIm5vbmNlIjoiVGF1dksrWS9jYzJSZk\
lGdnBaemZLUT09IiwicHJpb3Itc2lnbmVkLXZvdWNoZXItcmVxdWVzdCI6ImV5SndZWG\
xzYjJGa0lqb2laWGxLY0ZwWVVtMU1XRnAyWkZkT2IxcFlTWFJqYlZaNFpGZFdlbVJFY0\
RKaU0xWnFZVWRXZVVscWNEZEpiazVzWTIxc2FHSkRNWFZrVnpGcFdsaEphVTlwU25KaF\
dGRjBUMVJuTTA1cVZUQk5la2w0U1dsM2FXSnRPWFZaTWxWcFQybEtWVmxZVmpKVGVYUm\
FUREpPYWsxc1NtMVRWVm95WTBad05scHJkRkpRVkRCcFRFTkthbU50Vm1oa1IxWnJURm\
M1ZFVscWIybE5ha0Y1VGtNd2VFMVRNSGxQVmxGM1QxUnZlazVFYjNoT2FUUXdUV3BhWV\
VscGQybGpTRXAyWlVkc2RHRllValZNV0Vwc1dqSnNlbVJJU21oamFURnFXbGhLTUVscW\
IybFVWV3hLVVRCU1ZWRXdUa0paYXpsdVVWaGtTbEZyUm01VFZXUkNWMnMwZWxSclVuUl\
ZSVEZDWWpCa1JGRXpSa2hWTURBd1QxVktRbFJWVGs1U2JtUTBVVE53UWxOclNtNVViRn\
BEVVZac1ZWRlhkRWRWYXpGVFUxaGtSbEZXYkVWV2JFWlNVekJTUW1KRk5XeFdWVFV5V1\
d4b1EyRkhTblZoTTJoSFZrVkdWVkZ0WkU5V2EwcENZekF4UlZKVVJURldWRTVYWVZkTm\
VXSkhkR2hXTUZvMVdsWlNSbFZGTVVKTlJXUkNUVlpXUmxGdVpETlNNVkpaWWtaU2FGZE\
dTbk5VVmtwR1pEQlNNMWRWVWxkVlZrWkZVa1ZHYjFSdFZsZFVia0pyVWpGYVJWVldVa0\
phVlZvelRVaHNUMUpGVmpSVVYzQnlaREE1VlZKVVJrNWxhMXBvVW01amQyVnJOVVZTV0\
doT1lXMTBNMVF4VWtaTlZURTJVbTFHVGxJd2JEUlJNM0JDVTJ0S2JsUnNXa05SVm14Vl\
VWZDBSMVZyTVZOVFdHUkdVVlpzUlZac1JsSlRNRkpDWWtVMWJGWlZOVEpaYkdoRFlVZE\
tkV0V6YUVkU1JVWlVVVzFrVDFaclNrSmpNREZFVFVSRk1WWlVUbGRoVjAxNVlrZDBXbG\
RGYnpGVVZrVTBaREJTVWxkVlVsZFZWa1pKVWtWR1lWUnRWbGRVYmtKclVqRldORkl3VW\
tKV01FcHVWR3hhUTFGVk1VNVNSRUY0VGxaVmVXSkVRbUZXYTNCelYycEtjMlZ0VWtsVG\
JXaHFZV3RLWVZSVlNrNVNNRW8xWTFWa1ZGUlVVVFZSVjJSR1VqQk9SR05WWkZSVVZGRT\
FVVmhrUmxORlJYZFRWVVpEVVZWbmNsUkdjSFJpYmxKdVkwZG5jbUZzVlhaak1rNVZVVz\
VvYTFaSWNIcGtNbmh0VlZSYU1WTjVPVUpQVjBaS1dXdHdZVk15VlRCVlIyd3dWbTVvY2\
1GRk5VaFhWMlF3VG0wNWQwMTVkRVJoVmtaTVZFaGtZVTlYWkVWTlNFWllUV3BKZUZGVm\
VGcE9VM016WWxaR1MwNXViSEZXTTNCRFYyc3hRMDFGWkVKTlZsWnJVMnhHVWxZd01VTl\
ZWV1JFVVROT1NGRldSbFpTYTBvelZGVktRMW95WkhsUmJXUkdVbXRLVWxrd1VrbFNSVV\
pRVVcxa1QxWnJhRkpQUlVwQ1dtcG9SbEZyUms1Uk1Fa3dVVmhrVEZGV2JFVldiRWwzVl\
d0S1JGSllaRWxPUld4cldXeG9jMlZ0UmxsVmJYaHFZbFphZFZsV2FFOU5SMDUwVW01c1\
RXSlVSVEZYVkVrMVpFZE9TRkp1Vm14VmVsWnhXV3BKZDJRd1RtNVhWV3hNWWpGd1NtVn\
RiM2RTVlVZelUxVlNWRkZWUmpOVmJFWktXakJSTTJFd1NqUk5WVGd5VkhwS1IxWkdRbE\
JWYkdkM1RrUmtWR05HVGpKalIwWTJaRU00Y2xJeldYbFBXRTAwVGpOc2VWUllWVEpWUl\
RGRVUxWkdSV1ZWT1RCalIwb3lZa1YzZG1ReFl6UmFlVGxGVTFWNE1sUXdVbHBhTURGUV\
ZERldjbFpFUlRGYVNGcGFWRlZXVDFJeFVYbFJNMVkxV25vd09VbHVNVGtpTENKemFXZH\
VZWFIxY21WeklqcGJleUp3Y205MFpXTjBaV1FpT2lKbGVVbzBUbGROYVU5c2MybFVWV3\
hLVVRBMU5sRXdUa0phUkVwdVVWaGtTbEZyUm01VFZXUkNWMnMwZWxSclVuUlRNREZDWW\
pCa1JGRXpSa2hWTURBd1QxVktRbFJWVGs1U2JXUTBVVE53UWxOclNtNVViRnBEVVZac1\
ZWRlhkRWRWYXpGVFl6TmtTRlZXYkVWV2JFWlNVekJTUTFOck5WcFdlbFY0VjIweFIyRn\
RVa2xXYm14aFYwVnNNMVJWVWtaYU1VWldXVE5vUm1WclJsTlJiV1JQVm10S1FtTXdNVV\
JoZW13MVYycEdibG94V2xoT1dFSnJVbFZXTkZKdWNFSldhMHB1Vkd4YVExRlZNVTVTUj\
NONFlVZEtkVlp0TVZwV01EUjNXa1pvUzJKSFRuSlVhMHBPVVRCR1dWSkdVa3BOUlRGVl\
VsaHNVRlpGUlRGVVZsSldaV3N4VjJJeGJFVmxiWE14VkRGU2NtVkZNWEZVV0doT1lXc3\
dlRlF4VWxaT1ZtUnhVVzVhVGxWWVRqTlJNVVphVWtaYVVsVlZaRVprTUhCRFZsWlNSbG\
xyTVVOaE1HUkNUVlpXUmxFeVpETlZNVkpZVW01V2ExWXhjRzlYVkU1VFRWZE9kRlp1Yk\
U1U1JVWTBVMVZXUjFORk1WTlVXR1JHVlZac1JWWnNSbEpVUlZKQ1kwWkNhbUpYVWxwVF\
ZWcFhaRmRHV1ZWclNrNVZiR3d6VW10R1dsSkdXbEpWVlZwR1pIcEdlVmxXYUZKa1JUbF\
ZXbnBPVDJGc1ZYZFVXSEJLWlVVeFUxZFlaRWRSVm14RlZteEdVbEpGVWtKTlZVcFNZVE\
F4TmxSSGRGWk5NRFZVVFVob1RsSkZTa05VVlZweVpEQldNMWRWYUV4aU1YQktaVzF2ZD\
FFd1JsSlhWV3hNWWpGd1NtVnRiM2RTUlVaU1dUQlNVbG93UmtaYU1EVnlUVmhqTWxwc1\
FrWlNSbXg1Wld0U1NtRnROWGxpVlZZMFVtcFZNRmRIYzNKTE1YQnpXbXBLU1ZSVVVuSl\
JNamxRWW10ME1sWklTbEJOUmxrMFdWVktiMDFYTVRGbGJteFNWbXhWZDJGdWJ6SldWR1\
EyVDFSR1FsTnFiSFpPYkU1VFVXMTRhV0pVU20xUmJGSlFXVlJhVDA1ck1VbGFNMlJPVV\
Zac1NsTXpaRnBSYTBwU1ZsVm9RbFV3UmtaVGEwcGFZVmRLV0ZKdWNGcFZla1YzVjJ4b1\
QwMUZlSFZoUkZac1lsUkdiMWx0TlZkaVZteFlWR3BDYTFkRmNITlpNbXN4WVcxSmVVMU\
VXbEJXUmtWM1ZGaHdRbHByU201VWJGcEpWVEF4UmxJd1VrSldNbVJEVlRGYVZXUkdXWE\
pOTVVaNFN6SnNjbVJzUWt4VVZuQjJUVVZvWVU5WWFFVlRWV2MxVmtWR1ZWRnRaRTlXYT\
JoVVZsVldSVkpGUmt4UmJXUnVZMnRLYmxKVldrTlZWMDVGVVZkd1FsUXdTbTVVYkZwSl\
ZWUm9RMUZYV1RSU1ZVcENWRlZPUTA1RlJqTlJNbVJhVTFWMGRsZHJiRFpoYWtKR1VWaG\
tTbEpHVGtKUldHUlRWVlZzYmxaVVNsVk9hM0JVVDBoV2NWVlVRWHBMTVZGMlpFUkZNbV\
JXVG05YU1teHpUMFV3ZG1KWFJraFdibWgxVTNwU2VHVnJPVTlWUmxaTFVsVk9TbFZWVW\
toVVZsSjRZMjFyZVZaNlFrMVRWV3gwWVdwYVExTXhaREJSVlRrMVYwUktiVkpYWkhaaF\
JrazBVa1pXZVZSRVRrTk5ha1oyVWtkc2JsQlVNR2xZVTNkcFpFaHNkMGxxYjJsa2JUa3\
hXVEpvYkdOcE1YRmtNMDF5WVc1T2RtSnBTWE5KYlVaeldubEpOa2xyVmxSTmFsVXlTVz\
R3SWl3aWMybG5ibUYwZFhKbElqb2laV2haVTFaVVZVWm5Tamc1TUhOR05VWTRhM2sxYm\
1aUFdITkhPVXBOWmtKV1FuWTVVRTlzZDBoV1drZFJia1pSYUZBelJqQkNVV28yWW1vMG\
JVZEpRMk5tYXpWR1IxQkVPSEpLUzNNM2RIaDFRbVpMWjBFaWZWMTkiLCJjcmVhdGVkLW\
9uIjoiMjAyNC0xMS0yOVQwOTozNDoxNi41ODBaIn19",
  "signatures": [
    {
      "protected": "eyJ4NWMiOlsiTUlJQjhEQ0NBWmFnQXdJQkFnSUdBWk4zTkRt\
Uk1Bb0dDQ3FHU000OUJBTUNNRnd4Q3pBSkJnTlZCQVlUQWtGUk1SSXdFQVlEVlFRS0RB\
bE5lVU52YlhCaGJua3hGVEFUQmdOVkJBc01ERTE1VTNWaWMybGthV0Z5ZVRFUE1BMEdB\
MVVFQnd3R1RYbFRhWFJsTVJFd0R3WURWUVFEREFoTmVWTnBkR1ZEUVRBZUZ3MHlOREV4\
TWprd09URTFNekZhRncwek5ERXhNamt3T1RFMU16RmFNSGt4Q3pBSkJnTlZCQVlUQWtG\
Uk1SSXdFQVlEVlFRS0RBbE5lVU52YlhCaGJua3hGVEFUQmdOVkJBc01ERTE1VTNWaWMy\
bGthV0Z5ZVRFUE1BMEdBMVVFQnd3R1RYbFRhWFJsTVM0d0xBWURWUVFERENWU1pXZHBj\
M1J5WVhJZ1ZtOTFZMmhsY2lCU1pYRjFaWE4wSUZOcFoyNXBibWNnUzJWNU1Ga3dFd1lI\
S29aSXpqMENBUVlJS29aSXpqMERBUWNEUWdBRXh3ejJJQzdNaW16VGhpS1huczMzTkhT\
SitIdzl2ZHRFb1Y4b2lwQWlPazJtclpWK2dGZVBNNmdadWczby84ak9VZ0NGeGRxb0l2\
U1Y3dkxEU2lic2lxTW5NQ1V3RXdZRFZSMGxCQXd3Q2dZSUt3WUJCUVVIQXh3d0RnWURW\
UjBQQVFIL0JBUURBZ2VBTUFvR0NDcUdTTTQ5QkFNQ0EwZ0FNRVVDSVFENDhKeDh2TlJw\
VE9LREtjWmtjR0xTb2V6REFuTktndDNkU25DNFFkTGpBUUlnZmFxYkFvREtTZnpWcS9p\
cy9Cc2duaUpwQ2VUcU1FTUV0SUIwOGJsRDA5az0iXSwidHlwIjoidm91Y2hlci1qd3Mr\
anNvbiIsImFsZyI6IkVTMjU2In0",
      "signature": "4K-jQbrBtzj_YE9zgJoMZYC1QPgEEU3gTKiaLh5TdO5dcgB1\
z_zguJPSvR_QdpIbZmjkEyIyL9GJDZ2jACLKVg"
    }
  ]
}
]]></artwork>
        </figure>
        <t>The following private key is used to sign a Registrar-Voucher-Request (RVR) by Registrar:</t>
        <artwork><![CDATA[
-----BEGIN PRIVATE KEY-----
MEECAQAwEwYHKoZIzj0CAQYIKoZIzj0DAQcEJzAlAgEBBCDU/WkJnGR67oUgP8L1
bmvYpUPt4i6Rc/OUSg0C8SiWdg==
-----END PRIVATE KEY-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
]]></artwork>
      </section>
      <section anchor="example-voucher-response">
        <name>Example Voucher Response</name>
        <t>The following is an example voucher response as JWS Voucher artifact, which would be sent from the MASA to the Pledge via Registrar.</t>
        <figure anchor="ExampleVoucherResponsefigure">
          <name>Example Voucher Response</name>
          <artwork align="left"><![CDATA[
{
  "payload": "eyJpZXRmLXZvdWNoZXI6dm91Y2hlciI6eyJhc3NlcnRpb24iOiJsb2\
dnZWQiLCJzZXJpYWwtbnVtYmVyIjoia2l0LTk4NzY1NDMyMSIsIm5vbmNlIjoiVGF1dk\
srWS9jYzJSZklGdnBaemZLUT09IiwiY3JlYXRlZC1vbiI6IjIwMjQtMTEtMjlUMDk6Mz\
Q6MTcuMDI5WiIsInBpbm5lZC1kb21haW4tY2VydCI6Ik1JSUI4VENDQVplZ0F3SUJBZ0\
lHQVpOM05EbU5NQW9HQ0NxR1NNNDlCQU1DTUZ3eEN6QUpCZ05WQkFZVEFrRlJNUkl3RU\
FZRFZRUUtEQWxOZVVOdmJYQmhibmt4RlRBVEJnTlZCQXNNREUxNVUzVmljMmxrYVdGeW\
VURVBNQTBHQTFVRUJ3d0dUWGxUYVhSbE1SRXdEd1lEVlFRRERBaE5lVk5wZEdWRFFUQW\
VGdzB5TkRFeE1qa3dPVEUxTXpGYUZ3MHpOREV4TWprd09URTFNekZhTUZ3eEN6QUpCZ0\
5WQkFZVEFrRlJNUkl3RUFZRFZRUUtEQWxOZVVOdmJYQmhibmt4RlRBVEJnTlZCQXNNRE\
UxNVUzVmljMmxrYVdGeWVURVBNQTBHQTFVRUJ3d0dUWGxUYVhSbE1SRXdEd1lEVlFRRE\
RBaE5lVk5wZEdWRFFUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDlBd0VIQTBJQUJIOG\
hqUElSdTZjcVBDWmJ3ZDhBQ2NySFZQMHY0Wi9EUjNsbXpISmlZbWtwZjMrckllS2tPRm\
5GSEQ3S3l3cDMxUVFOejV5OFM3UU00K21wcnNaTWZJS2pSVEJETUJJR0ExVWRFd0VCL3\
dRSU1BWUJBZjhDQVFFd0RnWURWUjBQQVFIL0JBUURBZ0lFTUIwR0ExVWREZ1FXQkJScX\
ljMVJTNGQ2ekVnRG1sRFpOWW80aEVzTFZ6QUtCZ2dxaGtqT1BRUURBZ05JQURCRkFpRU\
FnSWUxRXNzc1ZKd0ZyZnpEMVdtK2FCN2trT3IxbGRlOU03RjB6dTNGNitrQ0lDYXRIV0\
VwamkvMFZkYy9sRFkwUk5zeWxacEpCTDN6Vytpa09DdnZhSkV1In19",
  "signatures": [
    {
      "protected": "eyJ4NWMiOlsiTUlJQnh6Q0NBVzZnQXdJQkFnSUdBWk4zTkRs\
L01Bb0dDQ3FHU000OUJBTUNNRmd4Q3pBSkJnTlZCQVlUQWtGUk1Sc3dHUVlEVlFRS0RC\
Sk5ZVzUxWm1GamRIVnlaWEl3TURFZ1FVY3hFekFSQmdOVkJBc01Dazl5WjFnZ1ZXNXBk\
RUV4RnpBVkJnTlZCQU1NRGsxaGJuVm1ZV04wZFhKbGNrTkJNQjRYRFRJME1URXlPVEE1\
TVRVek1Wb1hEVE0wTVRFeU9UQTVNVFV6TVZvd2FqRUxNQWtHQTFVRUJoTUNRVkV4R3pB\
WkJnTlZCQW9NRWsxaGJuVm1ZV04wZFhKbGNqQXdNU0JCUnpFVE1CRUdBMVVFQ3d3S1Qz\
Sm5XQ0JWYm1sMFFURXBNQ2NHQTFVRUF3d2dUV0Z1ZFdaaFkzUjFjbVZ5SUZadmRXTm9a\
WElnVTJsbmJtbHVaeUJMWlhrd1dUQVRCZ2NxaGtqT1BRSUJCZ2dxaGtqT1BRTUJCd05D\
QUFSR0NJM0gwL0xrWnNZNDV1OEZTZ1RLNlpLMUk3d2s1eWZEWk12elo2L3Y5NGJoNFB0\
UG9SU3cwSjBvemhiL2hrRkVGeE5mbkt6WUtvT3dDdU9nUENNUm94SXdFREFPQmdOVkhR\
OEJBZjhFQkFNQ0I0QXdDZ1lJS29aSXpqMEVBd0lEUndBd1JBSWdCcUF3WkYxRm9kRFBB\
Nzhjcnp2bWJqSHBMUlRUM0hGcWI5UHRXTzhwTjYwQ0lBV1l6aUpUQk9xNXcxNXl2Q05V\
S1pYSEVGMSt2TkUxcjMyTnpVWTBQSEY1Il0sInR5cCI6InZvdWNoZXItandzK2pzb24i\
LCJhbGciOiJFUzI1NiJ9",
      "signature": "TYwc3Nzi4l5A_326zr0IFvpqfzt7v7SqidFK_Go4wNFVCnXa\
t5GngoTboMGXOMelfbx0LqxStz5Tq-5nFSvD2w"
    }
  ]
}
]]></artwork>
        </figure>
        <t>The following private key is used to sign a Voucher by MASA:</t>
        <artwork><![CDATA[
-----BEGIN PRIVATE KEY-----
MEECAQAwEwYHKoZIzj0CAQYIKoZIzj0DAQcEJzAlAgEBBCAergZDU0lUzsqylxKs
I0KZZsqgcx+LKJglpD0agoiaWQ==
-----END PRIVATE KEY-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
MIIB6DCCAY+gAwIBAgIGAZN3NDl2MAoGCCqGSM49BAMCMFgxCzAJBgNVBAYTAkFR
MRswGQYDVQQKDBJNYW51ZmFjdHVyZXIwMDEgQUcxEzARBgNVBAsMCk9yZ1ggVW5p
dEExFzAVBgNVBAMMDk1hbnVmYWN0dXJlckNBMB4XDTI0MTEyOTA5MTUzMVoXDTM5
MTEyOTA5MTUzMVowWDELMAkGA1UEBhMCQVExGzAZBgNVBAoMEk1hbnVmYWN0dXJl
cjAwMSBBRzETMBEGA1UECwwKT3JnWCBVbml0QTEXMBUGA1UEAwwOTWFudWZhY3R1
cmVyQ0EwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATfl/ScKL8rB6DPTjOX4ug/
mCmtrry59h0q4J0r/yEMmGGzKhNSskJ54u22q2kdGcMpAISH59a0SZ6mip60FzLz
o0UwQzASBgNVHRMBAf8ECDAGAQH/AgEBMA4GA1UdDwEB/wQEAwICBDAdBgNVHQ4E
FgQUlU7Vft0KvopLzyjGaNB2fcQyB/UwCgYIKoZIzj0EAwIDRwAwRAIgN0nzFkSM
iSMygrUBhPARioFiAb+zVPc7sdSy/o3nfSYCIBxGrzP3BssOJTjniu8loqHXyf9m
JKYL4lAyT0nAC0jc
-----END CERTIFICATE-----
]]></artwork>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8995">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="T. Eckert" initials="T." surname="Eckert"/>
            <author fullname="M. Behringer" initials="M." surname="Behringer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane. To do this, a Secure Key Infrastructure is bootstrapped. This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline. We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device. The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="I-D.ietf-anima-rfc8366bis">
          <front>
            <title>A Voucher Artifact for Bootstrapping Protocols</title>
            <author fullname="Kent Watsen" initials="K." surname="Watsen">
              <organization>Watsen Networks</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software</organization>
            </author>
            <author fullname="Max Pritikin" initials="M." surname="Pritikin">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Toerless Eckert" initials="T. T." surname="Eckert">
              <organization>Futurewei Technologies Inc.</organization>
            </author>
            <author fullname="Qiufang Ma" initials="Q." surname="Ma">
              <organization>Huawei</organization>
            </author>
            <date day="8" month="July" year="2024"/>
            <abstract>
              <t>   This document defines a strategy to securely assign a pledge to an
   owner using an artifact signed, directly or indirectly, by the
   pledge's manufacturer.  This artifact is known as a "voucher".

   This document defines an artifact format as a YANG-defined JSON or
   CBOR document that has been signed using a variety of cryptographic
   systems.

   The voucher artifact is normally generated by the pledge's
   manufacturer (i.e., the Manufacturer Authorized Signing Authority
   (MASA)).

   This document updates RFC8366, merging a number of extensions into
   the YANG.  The RFC8995 voucher request is also merged into this
   document.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-rfc8366bis-12"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8572">
          <front>
            <title>Secure Zero Touch Provisioning (SZTP)</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="I. Farrer" initials="I." surname="Farrer"/>
            <author fullname="M. Abrahamsson" initials="M." surname="Abrahamsson"/>
            <date month="April" year="2019"/>
            <abstract>
              <t>This document presents a technique to securely provision a networking device when it is booting in a factory-default state. Variations in the solution enable it to be used on both public and private networks. The provisioning steps are able to update the boot image, commit an initial configuration, and execute arbitrary scripts to address auxiliary needs. The updated device is subsequently able to establish secure connections with other systems. For instance, a device may establish NETCONF (RFC 6241) and/or RESTCONF (RFC 8040) connections with deployment-specific network management systems.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8572"/>
          <seriesInfo name="DOI" value="10.17487/RFC8572"/>
        </reference>
        <reference anchor="RFC3629">
          <front>
            <title>UTF-8, a transformation format of ISO 10646</title>
            <author fullname="F. Yergeau" initials="F." surname="Yergeau"/>
            <date month="November" year="2003"/>
            <abstract>
              <t>ISO/IEC 10646-1 defines a large character set called the Universal Character Set (UCS) which encompasses most of the world's writing systems. The originally proposed encodings of the UCS, however, were not compatible with many current applications and protocols, and this has led to the development of UTF-8, the object of this memo. UTF-8 has the characteristic of preserving the full US-ASCII range, providing compatibility with file systems, parsers and other software that rely on US-ASCII values but are transparent to other values. This memo obsoletes and replaces RFC 2279.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="63"/>
          <seriesInfo name="RFC" value="3629"/>
          <seriesInfo name="DOI" value="10.17487/RFC3629"/>
        </reference>
        <reference anchor="RFC5652">
          <front>
            <title>Cryptographic Message Syntax (CMS)</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="70"/>
          <seriesInfo name="RFC" value="5652"/>
          <seriesInfo name="DOI" value="10.17487/RFC5652"/>
        </reference>
        <reference anchor="RFC7950">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="RFC7951">
          <front>
            <title>JSON Encoding of Data Modeled with YANG</title>
            <author fullname="L. Lhotka" initials="L." surname="Lhotka"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>This document defines encoding rules for representing configuration data, state data, parameters of Remote Procedure Call (RPC) operations or actions, and notifications defined using YANG as JavaScript Object Notation (JSON) text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7951"/>
          <seriesInfo name="DOI" value="10.17487/RFC7951"/>
        </reference>
        <reference anchor="RFC8366">
          <front>
            <title>A Voucher Artifact for Bootstrapping Protocols</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
            <author fullname="T. Eckert" initials="T." surname="Eckert"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>This document defines a strategy to securely assign a pledge to an owner using an artifact signed, directly or indirectly, by the pledge's manufacturer. This artifact is known as a "voucher".</t>
              <t>This document defines an artifact format as a YANG-defined JSON document that has been signed using a Cryptographic Message Syntax (CMS) structure. Other YANG-derived formats are possible. The voucher artifact is normally generated by the pledge's manufacturer (i.e., the Manufacturer Authorized Signing Authority (MASA)).</t>
              <t>This document only defines the voucher artifact, leaving it to other documents to describe specialized protocols for accessing it.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8366"/>
          <seriesInfo name="DOI" value="10.17487/RFC8366"/>
        </reference>
        <reference anchor="RFC8792">
          <front>
            <title>Handling Long Lines in Content of Internet-Drafts and RFCs</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="E. Auerswald" initials="E." surname="Auerswald"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <date month="June" year="2020"/>
            <abstract>
              <t>This document defines two strategies for handling long lines in width-bounded text content. One strategy, called the "single backslash" strategy, is based on the historical use of a single backslash ('\') character to indicate where line-folding has occurred, with the continuation occurring with the first character that is not a space character (' ') on the next line. The second strategy, called the "double backslash" strategy, extends the first strategy by adding a second backslash character to identify where the continuation begins and is thereby able to handle cases not supported by the first strategy. Both strategies use a self-describing header enabling automated reconstitution of the original content.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8792"/>
          <seriesInfo name="DOI" value="10.17487/RFC8792"/>
        </reference>
        <reference anchor="RFC8812">
          <front>
            <title>CBOR Object Signing and Encryption (COSE) and JSON Object Signing and Encryption (JOSE) Registrations for Web Authentication (WebAuthn) Algorithms</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="August" year="2020"/>
            <abstract>
              <t>The W3C Web Authentication (WebAuthn) specification and the FIDO Alliance FIDO2 Client to Authenticator Protocol (CTAP) specification use CBOR Object Signing and Encryption (COSE) algorithm identifiers. This specification registers the following algorithms (which are used by WebAuthn and CTAP implementations) in the IANA "COSE Algorithms" registry: RSASSA-PKCS1-v1_5 using SHA-256, SHA-384, SHA-512, and SHA-1; and Elliptic Curve Digital Signature Algorithm (ECDSA) using the secp256k1 curve and SHA-256. It registers the secp256k1 elliptic curve in the IANA "COSE Elliptic Curves" registry. Also, for use with JSON Object Signing and Encryption (JOSE), it registers the algorithm ECDSA using the secp256k1 curve and SHA-256 in the IANA "JSON Web Signature and Encryption Algorithms" registry and the secp256k1 elliptic curve in the IANA "JSON Web Key Elliptic Curve" registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8812"/>
          <seriesInfo name="DOI" value="10.17487/RFC8812"/>
        </reference>
        <reference anchor="ON-PATH" target="https://mailarchive.ietf.org/arch/msg/saag/m1r9uo4xYznOcf85Eyk0Rhut598/">
          <front>
            <title>can an on-path attacker drop traffic?</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="I-D.ietf-anima-brski-prm">
          <front>
            <title>BRSKI with Pledge in Responder Mode (BRSKI-PRM)</title>
            <author fullname="Steffen Fries" initials="S." surname="Fries">
              <organization>Siemens AG</organization>
            </author>
            <author fullname="Thomas Werner" initials="T." surname="Werner">
              <organization>Siemens AG</organization>
            </author>
            <author fullname="Eliot Lear" initials="E." surname="Lear">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date day="15" month="January" year="2025"/>
            <abstract>
              <t>   This document defines enhancements to Bootstrapping a Remote Secure
   Key Infrastructure (BRSKI, RFC8995) to enable bootstrapping in
   domains featuring no or only limited connectivity between a pledge
   and the domain registrar.  It specifically changes the interaction
   model from a pledge-initiated mode, as used in BRSKI, to a pledge-
   responding mode, where the pledge is in server role.  For this, BRSKI
   with Pledge in Responder Mode (BRSKI-PRM) introduces new endpoints
   for the Domain Registrar and pledge, and a new component, the
   Registrar-Agent, which facilitates the communication between pledge
   and registrar during the bootstrapping phase.  To establish the trust
   relation between pledge and registrar, BRSKI-PRM relies on object
   security rather than transport security.  The approach defined here
   is agnostic to the enrollment protocol that connects the domain
   registrar to the Key Infrastructure (e.g., domain CA).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-brski-prm-17"/>
        </reference>
        <reference anchor="I-D.ietf-anima-constrained-voucher">
          <front>
            <title>Constrained Bootstrapping Remote Secure Key Infrastructure (cBRSKI)</title>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Peter Van der Stok" initials="P." surname="Van der Stok">
              <organization>vanderstok consultancy</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Esko Dijk" initials="E." surname="Dijk">
              <organization>IoTconsultancy.nl</organization>
            </author>
            <date day="8" month="January" year="2025"/>
            <abstract>
              <t>   This document defines the Constrained Bootstrapping Remote Secure Key
   Infrastructure (cBRSKI) protocol, which provides a solution for
   secure zero-touch onboarding of resource-constrained (IoT) devices
   into the network of a domain owner.  This protocol is designed for
   constrained networks, which may have limited data throughput or may
   experience frequent packet loss. cBRSKI is a variant of the BRSKI
   protocol, which uses an artifact signed by the device manufacturer
   called the "voucher" which enables a new device and the owner's
   network to mutually authenticate.  While the BRSKI voucher data is
   encoded in JSON, cBRSKI uses a compact CBOR-encoded voucher.  The
   BRSKI voucher data definition is extended with new data types that
   allow for smaller voucher sizes.  The Enrollment over Secure
   Transport (EST) protocol, used in BRSKI, is replaced with EST-over-
   CoAPS; and HTTPS used in BRSKI is replaced with DTLS-secured CoAP
   (CoAPS).  This document Updates RFC 8995 and RFC 9148.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-constrained-voucher-26"/>
        </reference>
      </references>
    </references>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="T." surname="Eckert" fullname="Toerless Eckert">
        <organization>Futurewei Technologies Inc.</organization>
        <address>
          <email>tte+ietf@cs.fau.de</email>
        </address>
      </contact>
      <contact initials="E." surname="Dijk" fullname="Esko Dijk">
        <organization/>
        <address>
          <email>esko.dijk@iotconsultancy.nl</email>
        </address>
      </contact>
      <contact initials="S." surname="Fries" fullname="Steffen Fries">
        <organization>Siemens AG</organization>
        <address>
          <email>steffen.fries@siemens.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
