<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.18 (Ruby 2.6.6) -->
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<?rfc linkmailto="no"?>
<?rfc editing="no"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc rfcedstyle="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-anima-rfc8366bis-01" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.3 -->
  <front>
    <title abbrev="Voucher Artifact">A Voucher Artifact for Bootstrapping Protocols</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-anima-rfc8366bis-01"/>
    <author initials="K." surname="Watsen" fullname="Kent Watsen">
      <organization>Watsen Networks</organization>
      <address>
        <email>kent+ietf@watsen.net</email>
      </address>
    </author>
    <author initials="M." surname="Richardson" fullname="Michael C. Richardson">
      <organization>Sandelman Software</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
        <uri>http://www.sandelman.ca/</uri>
      </address>
    </author>
    <author initials="M." surname="Pritikin" fullname="Max Pritikin">
      <organization>Cisco Systems</organization>
      <address>
        <email>pritikin@cisco.com</email>
      </address>
    </author>
    <author initials="T." surname="Eckert" fullname="Toerless Eckert">
      <organization abbrev="Huawei">Futurewei Technologies Inc.</organization>
      <address>
        <postal>
          <street>2330 Central Expy</street>
          <city>Santa Clara</city>
          <code>95050</code>
          <country>United States of America</country>
        </postal>
        <email>tte+ietf@cs.fau.de</email>
      </address>
    </author>
    <author initials="Q." surname="Ma" fullname="Qiufang Ma">
      <organization>Huawei</organization>
      <address>
        <postal>
          <street>101 Software Avenue, Yuhua District</street>
          <city>Nanjing</city>
          <code>210012</code>
          <country>China</country>
        </postal>
        <email>maqiufang1@huawei.com</email>
      </address>
    </author>
    <date year="2023" month="January" day="11"/>
    <area>Operations</area>
    <workgroup>ANIMA Working Group</workgroup>
    <keyword>voucher</keyword>
    <abstract>
      <t>This document defines a strategy to securely assign a pledge to an owner
using an artifact signed, directly or indirectly, by the pledge's manufacturer.
This artifact is known as a "voucher".</t>
      <t>This document defines an artifact format as a YANG-defined JSON document
that has been signed using a Cryptographic Message Syntax (CMS) structure.
Other YANG-derived formats are possible.
The voucher artifact is normally generated by
the pledge's manufacturer (i.e., the Manufacturer Authorized Signing
Authority (MASA)).</t>
      <t>This document only defines the voucher artifact, leaving it to other
documents to describe specialized protocols for accessing it.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
  Autonomic Networking Integrated Model and Approach Working Group mailing list (anima@ietf.org),
  which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/anima/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
  <eref target="https://github.com/anima-wg/voucher"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>This document defines a strategy to securely assign a candidate device
(pledge) to an owner using an artifact signed, directly or indirectly,
by the pledge's manufacturer, i.e., the Manufacturer Authorized
Signing Authority (MASA).  This artifact is known as the "voucher".</t>
      <t>The voucher artifact is a JSON <xref target="RFC8259"/> document that
conforms with a data model described by YANG <xref target="RFC7950"/>, is
encoded using the rules defined in <xref target="RFC8259"/>, and
is signed using (by default) a CMS structure <xref target="RFC5652"/>.</t>
      <t>The primary purpose of a voucher is to securely convey a
certificate, the "pinned-domain-cert", that a pledge can
use to authenticate subsequent interactions. A voucher may be useful
in several contexts, but the driving motivation
herein is to support secure bootstrapping mechanisms.  Assigning
ownership is important to bootstrapping mechanisms so that the pledge
can authenticate the network that is trying to take control of it.</t>
      <t>The lifetimes of vouchers may vary. In some bootstrapping protocols,
the vouchers may include a nonce restricting them to a single use,
whereas the vouchers in other bootstrapping protocols may have an
indicated lifetime. In order to support long lifetimes, this document
recommends using short lifetimes with programmatic renewal, see
<xref target="renewal-over-revocation"/>.</t>
      <t>This document only defines the voucher artifact, leaving it to other
documents to describe specialized protocols for accessing it.
Some bootstrapping protocols using the voucher artifact defined in
this document include: <xref target="ZERO-TOUCH"/>, <xref target="SECUREJOIN"/>, and
<xref target="BRSKI"/>.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>This document uses the following terms:</t>
      <dl>
        <dt>Artifact:</dt>
        <dd>
          <t>Used throughout to represent the voucher as instantiated in the form
of a signed structure.</t>
        </dd>
        <dt>Domain:</dt>
        <dd>
          <t>The set of entities or infrastructure under common administrative
control.
The goal of the bootstrapping protocol is to enable a pledge to
discover and join a domain.</t>
        </dd>
        <dt>Imprint:</dt>
        <dd>
          <t>The process where a device obtains the cryptographic key material to
identify and trust future interactions with a network. This term is
taken from Konrad Lorenz's work in biology with new ducklings:
"during a critical period, the duckling would assume that anything
that looks like a mother duck is in fact their mother"
<xref target="Stajano99theresurrecting"/>. An equivalent for a device is to
obtain the fingerprint of the network's root certification authority
certificate. A device that imprints on an attacker suffers a similar
fate to a duckling that imprints on a hungry wolf. Imprinting is a
term from psychology and ethology, as described in <xref target="imprinting"/>.</t>
        </dd>
        <dt>Join Registrar (and Coordinator):</dt>
        <dd>
          <t>A representative of the domain that is configured, perhaps
autonomically, to decide whether a new device is allowed to join the
domain. The administrator of the domain interfaces with a join
registrar (and Coordinator) to control this process.
Typically, a join registrar is "inside" its domain. For simplicity,
this document often refers to this as just "registrar".</t>
        </dd>
        <dt>MASA (Manufacturer Authorized Signing Authority):</dt>
        <dd>
          <t>The entity that, for the purpose of this document, signs the
vouchers for a manufacturer's pledges.
In some bootstrapping protocols, the MASA may have an Internet
presence and be integral to the bootstrapping process, whereas in
other protocols the MASA may be an offline service that has no
active role in the bootstrapping process.</t>
        </dd>
        <dt>Owner:</dt>
        <dd>
          <t>The entity that controls the private key of the "pinned-domain-cert"
certificate conveyed by the voucher.</t>
        </dd>
        <dt>Pledge:</dt>
        <dd>
          <t>The prospective device attempting to find and securely join a
domain.
When shipped, it only trusts authorized representatives of the
manufacturer.</t>
        </dd>
        <dt>Registrar:</dt>
        <dd>
          <t>See join registrar.</t>
        </dd>
        <dt>TOFU (Trust on First Use):</dt>
        <dd>
          <t>Where a pledge device makes no security decisions but rather simply
trusts the first domain entity it is contacted by.
Used similarly to <xref target="RFC7435"/>.
This is also known as the "resurrecting duckling" model.</t>
        </dd>
        <dt>Voucher:</dt>
        <dd>
          <t>A signed statement from the MASA service that indicates to a pledge
the cryptographic identity of the domain it should trust.</t>
        </dd>
      </dl>
    </section>
    <section anchor="requirements-language">
      <name>Requirements Language</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="survey-of-voucher-types">
      <name>Survey of Voucher Types</name>
      <t>A voucher is a cryptographically protected statement to the pledge
device authorizing a zero-touch "imprint" on the join registrar of the
domain. The specific information a voucher provides is influenced by the
bootstrapping use case.</t>
      <t>The voucher can impart the following information to
the join registrar and pledge:</t>
      <dl>
        <dt>Assertion Basis:</dt>
        <dd>
          <t>Indicates the method that protects
the imprint (this is distinct from the voucher signature that
protects the voucher itself). This might include
manufacturer-asserted ownership verification, assured
logging operations, or reliance on pledge endpoint behavior
such as secure root of trust
of measurement. The join registrar might use this information.
Only some methods are normatively defined in this
document. Other methods are left for future work.</t>
        </dd>
        <dt>Authentication of Join Registrar:</dt>
        <dd>
          <t>Indicates how the pledge
can authenticate the join registrar.  This document defines
a mechanism to pin the domain certificate.
Pinning a symmetric key, a raw key, or "CN-ID" or "DNS-ID"
information (as defined in <xref target="RFC6125"/>) is left for future work.</t>
        </dd>
        <dt>Anti-Replay Protections:</dt>
        <dd>
          <t>Time- or nonce-based
information to constrain the voucher to time periods or bootstrap
attempts.</t>
        </dd>
      </dl>
      <t>A number of bootstrapping scenarios can be met using differing
combinations of this information. All scenarios address the primary
threat of a Man-in-The-Middle (MiTM) registrar gaining control over
the pledge device. The following combinations are "types" of vouchers:</t>
      <artwork><![CDATA[
             |Assertion   |Registrar ID    | Validity    |
Voucher      |Log-|Veri-  |Trust  |CN-ID or| RTC | Nonce |
Type         | ged|  fied |Anchor |DNS-ID  |     |       |
---------------------------------------------------------|
Audit        |  X |       | X     |        |     | X     |
-------------|----|-------|-------|--------|-----|-------|
Nonceless    |  X |       | X     |        | X   |       |
Audit        |    |       |       |        |     |       |
-------------|----|-------|-------|--------|-----|-------|
Owner Audit  |  X |   X   | X     |        | X   | X     |
-------------|----|-------|-------|--------|-----|-------|
Owner ID     |    |   X   | X     |  X     | X   |       |
-------------|----|-------|----------------|-----|-------|
Bearer       |  X |       |   wildcard     | optional    |
out-of-scope |    |       |                |             |
-------------|----|-------|----------------|-------------|

NOTE: All voucher types include a 'pledge ID serial-number'
      (not shown here for space reasons).
(XXX - translate me to markdown table)
]]></artwork>
      <dl>
        <dt>Audit Voucher:</dt>
        <dd>
          <t>An Audit Voucher is named after the logging assertion mechanisms
that the registrar then "audits" to enforce local policy. The
registrar mitigates a MiTM registrar by auditing that an unknown
MiTM registrar does not appear in the log entries. This does not
directly prevent the MiTM but provides a response mechanism that
ensures the MiTM is unsuccessful. The advantage is that actual
ownership knowledge is not required on the MASA service.</t>
        </dd>
        <dt>Nonceless Audit Voucher:</dt>
        <dd>
          <t>An Audit Voucher without a validity period statement. Fundamentally,
it is the same as an Audit Voucher except that it can be issued in
advance to support network partitions or to provide a permanent
voucher for remote deployments.</t>
        </dd>
        <dt>Ownership Audit Voucher:</dt>
        <dd>
          <t>An Audit Voucher where the MASA service has verified the registrar
as the authorized owner.
The MASA service mitigates a MiTM registrar by refusing to generate
Audit Vouchers for unauthorized registrars. The registrar uses audit
techniques to supplement the MASA. This provides an ideal sharing of
policy decisions and enforcement between the vendor and the owner.</t>
        </dd>
        <dt>Ownership ID Voucher:</dt>
        <dd>
          <t>Named after inclusion of the pledge's CN-ID or DNS-ID within the
voucher. The MASA service mitigates a MiTM registrar by identifying
the specific registrar (via WebPKI) authorized to own the pledge.</t>
        </dd>
        <dt>Bearer Voucher:</dt>
        <dd>
          <t>A Bearer Voucher is named after the inclusion of a registrar ID
wildcard. Because the registrar identity is not indicated, this
voucher type must be treated as a secret and protected from exposure
as any 'bearer' of the voucher can claim the pledge
device. Publishing a nonceless bearer voucher effectively turns the
specified pledge into a "TOFU" device with minimal mitigation
against MiTM registrars. Bearer vouchers are out of scope.</t>
        </dd>
      </dl>
    </section>
    <section anchor="voucher">
      <name>Voucher Artifact</name>
      <t>The voucher's primary purpose is to securely assign a pledge to an
owner.
The voucher informs the pledge which entity it should consider to be
its owner.</t>
      <t>This document defines a voucher that is a JSON-encoded instance of the
YANG module defined in <xref target="voucher-yang-module"/> that has been, by
default, CMS signed.</t>
      <t>This format is described here as a practical basis for some uses (such
as in NETCONF), but more to clearly indicate what vouchers look like
in practice.
This description also serves to validate the YANG data model.</t>
      <t>Future work is expected to define new mappings of the voucher to
Concise Binary Object Representation (CBOR) (from JSON) and to change
the signature container from CMS to JSON Object Signing and Encryption
(JOSE) or CBOR Object Signing and Encryption (COSE).
XML or ASN.1 formats are also conceivable.</t>
      <t>This document defines a media type and a filename extension for the
CMS-encoded JSON type.  Future documents on additional formats
would define additional media types.  Signaling is in the form of a MIME
Content-Type, an HTTP Accept: header, or more mundane methods like
use of a filename extension when a voucher is transferred on a USB
key.</t>
      <section anchor="voucher-tree-diagram">
        <name>Tree Diagram</name>
        <t>The following tree diagram illustrates a high-level view of a voucher
document.
The notation used in this diagram is described in <xref target="RFC8340"/>.
Each node in the diagram is fully described by the YANG module in
<xref target="voucher-yang-module"/>.
Please review the YANG module for a detailed description of the
voucher format.</t>
        <artwork><![CDATA[
module: ietf-voucher

  grouping voucher-artifact-grouping:
    +-- voucher
       +-- created-on                       yang:date-and-time
       +-- expires-on?                      yang:date-and-time
       +-- assertion                        ianavat:voucher-assertion
       +-- serial-number                    string
       +-- idevid-issuer?                   binary
       +-- pinned-domain-cert               binary
       +-- domain-cert-revocation-checks?   boolean
       +-- nonce?                           binary
       +-- last-renewal-date?               yang:date-and-time
]]></artwork>
      </section>
      <section anchor="voucher-examples">
        <name>Examples</name>
        <t>This section provides voucher examples for illustration
purposes.  These examples conform to the encoding rules
defined in <xref target="RFC8259"/>.</t>
        <t>The following example illustrates an ephemeral voucher (uses a nonce).
The MASA generated this voucher using the 'logged' assertion type, knowing
that it would be suitable for the pledge making the request.</t>
        <artwork><![CDATA[
{
  "ietf-voucher:voucher": {
    "created-on": "2016-10-07T19:31:42Z",
    "assertion": "logged",
    "serial-number": "JADA123456789",
    "idevid-issuer": "base64encodedvalue==",
    "pinned-domain-cert": "base64encodedvalue==",
    "nonce": "base64encodedvalue=="
  }
}
]]></artwork>
        <t>The following example illustrates a non-ephemeral voucher (no nonce).
While the voucher itself expires after two weeks, it presumably can
be renewed for up to a year.   The MASA generated this voucher
using the 'verified' assertion type, which should satisfy all pledges.</t>
        <artwork><![CDATA[
{
  "ietf-voucher:voucher": {
    "created-on": "2016-10-07T19:31:42Z",
    "expires-on": "2016-10-21T19:31:42Z",
    "assertion": "verified",
    "serial-number": "JADA123456789",
    "idevid-issuer": "base64encodedvalue==",
    "pinned-domain-cert": "base64encodedvalue==",
    "domain-cert-revocation-checks": "true",
    "last-renewal-date": "2017-10-07T19:31:42Z"
  }
}
]]></artwork>
      </section>
      <section anchor="voucher-yang-module">
        <name>YANG Module</name>
        <section anchor="iana-voucher-assertion-type-module">
          <name>"iana-voucher-assertion-type" Module</name>
          <t>Following is a YANG <xref target="RFC7950"/> module formally
describing the voucher's assertion type.</t>
          <sourcecode type="yang" markers="true"><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

module iana-voucher-assertion-type {
  namespace "urn:ietf:params:xml:ns:yang:"
          + "iana-voucher-assertion-type";
  prefix ianavat;

  organization
    "IANA";
  contact
    "Internet Assigned Numbers Authority
     Postal: ICANN
             12025 Waterfront Drive, Suite 300
             Los Angeles, CA 90094-2536
             United States of America
     Tel:    +1 310 301 5800
     <mailto:iana@iana.org>";
  description
    "This YANG module defines a YANG enumeration type for
     IANA-registered voucher assertion type. This YANG
     module is maintained by IANA and reflects the
     'voucher assertion types' registry.
     The lastest revision of this YANG module can be
     obtained from the IANA web site.  Request for new
     enumerations should be made to IANA via email(iana@iana.org).

     The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
     NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
     'MAY', and 'OPTIONAL' in this document are to be interpreted as
     described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
     they appear in all capitals, as shown here.

     Copyright (c) 2018 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject to
     the license terms contained in, the Simplified BSD License set
     forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC XXX; see the
     RFC itself for full legal notices.";

  revision 2023-01-10 {
    description
      "Initial version";
    reference "RFC XXXX: Voucher Artifact for"
            + "Bootstrapping Protocols";
  }

  typedef voucher-assertion {
    type enumeration {
      enum verified {
        value 0;
        description
          "Indicates that the ownership has been positively verified
           by the MASA (e.g., through sales channel integration).";
      }
      enum logged {
        value 1;
        description
          "Indicates that the voucher has been issued after
           minimal verification of ownership or control.  The
           issuance has been logged for detection of
           potential security issues (e.g., recipients of
           vouchers might verify for themselves that unexpected
           vouchers are not in the log).  This is similar to
           unsecured trust-on-first-use principles but with the
           logging providing a basis for detecting unexpected
           events.";
      }
      enum proximity {
        value 2;
        description
          "Indicates that the voucher has been issued after
           the MASA verified a proximity proof provided by the
           device and target domain.  The issuance has been logged
           for detection of potential security issues.  This is
           stronger than just logging, because it requires some
           verification that the pledge and owner are
           in communication but is still dependent on analysis of
           the logs to detect unexpected events.";
      }
      enum agent-proximity {
        value 3;
        description
          "Indicates that the voucher has been issued after the
           MASA...support of asynchronous enrollment in BRSKI";
      }
    }
    description
      "Indicates what kind of ownership is being asserted by voucher\
                                                                   ";
  }
}
]]></sourcecode>
        </section>
        <section anchor="ietf-voucher-module">
          <name>"ietf-voucher" Module</name>
          <t>The revised ietf-voucher YANG module imports the typedef defined in
"iana-voucher-assertion-type" YANG module specified in this document.</t>
          <sourcecode type="yang" markers="true"><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

module ietf-voucher {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-voucher";
  prefix vch;

  import ietf-yang-types {
    prefix yang;
    reference
      "RFC 6991: Common YANG Data Types";
  }
  import ietf-yang-structure-ext {
    prefix sx;
  }
  import iana-voucher-assertion-type {
    prefix ianavat;
    reference
      "RFCZZZZ: Voucher Profile for Bootstrapping Protocols";
  }

  organization
    "IETF ANIMA Working Group";
  contact
    "WG Web:   <https://datatracker.ietf.org/wg/anima/>
     WG List:  <mailto:anima@ietf.org>
     Author:   Kent Watsen
               <mailto:kwatsen@juniper.net>
     Author:   Max Pritikin
               <mailto:pritikin@cisco.com>
     Author:   Michael Richardson
               <mailto:mcr+ietf@sandelman.ca>
     Author:   Toerless Eckert
               <mailto:tte+ietf@cs.fau.de>";
  description
    "This module defines the format for a voucher, which is \
                                                          produced by
     a pledge's manufacturer or delegate (MASA) to securely assign a
     pledge to an 'owner', so that the pledge may establish a secure
     connection to the owner's network infrastructure.

     The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
     NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
     'MAY', and 'OPTIONAL' in this document are to be interpreted as
     described in BCP 14 (RFC 2119) (RFC 8174) when, and only when, \
                                                                 they
     appear in all capitals, as shown here.

     Copyright (c) 2018 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or \
                                                              without
     modification, is permitted pursuant to, and subject to the \
                                                              license
     terms contained in, the Simplified BSD License set forth in \
                                                              Section
     4.c of the IETF Trust's Legal Provisions Relating to IETF \
                                                            Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC 8366; see the \
                                                                  RFC
     itself for full legal notices.";

  revision 2023-01-10 {
    description
      "updated to support new assertion enumerated type";
    reference
      "RFC ZZZZ Voucher Profile for Bootstrapping Protocols";
  }

  // Top-level statement
  sx:structure voucher-artifact {
    uses voucher-artifact-grouping;
  }

  // Grouping defined for future augmentations

  grouping voucher-artifact-grouping {
    description
      "Grouping to allow reuse/extensions in future work.";
    container voucher {
      description
        "A voucher assigns a pledge to an owner (pinned-domain-cert)\
                                                                  .";
      leaf created-on {
        type yang:date-and-time;
        mandatory true;
        description
          "A value indicating the date this voucher was created.  \
                                                                 This
           node is primarily for human consumption and auditing. \
                                                               Future
           work MAY create verification requirements based on this
           node.";
      }
      leaf expires-on {
        type yang:date-and-time;
        must 'not(../nonce)';
        description
          "A value indicating when this voucher expires.  The node is
           optional as not all pledges support expirations, such as
           pledges lacking a reliable clock.

           If this field exists, then the pledges MUST ensure that
           the expires-on time has not yet passed. A pledge without
           an accurate clock cannot meet this requirement.

           The expires-on value MUST NOT exceed the expiration date
           of any of the listed 'pinned-domain-cert' certificates.";
      }
      leaf assertion {
        type ianavat:voucher-assertion;
        mandatory true;
        description
          "The assertion is a statement from the MASA regarding how
           the owner was verified.  This statement enables pledges
           to support more detailed policy checks.  Pledges MUST
           ensure that the assertion provided is acceptable, per
           local policy, before processing the voucher.";
      }
      leaf serial-number {
        type string;
        mandatory true;
        description
          "The serial-number of the hardware.  When processing a
           voucher, a pledge MUST ensure that its serial-number
           matches this value.  If no match occurs, then the
           pledge MUST NOT process this voucher.";
      }
      leaf idevid-issuer {
        type binary;
        description
          "The Authority Key Identifier OCTET STRING (as defined in
           Section 4.2.1.1 of RFC 5280) from the pledge's IDevID
           certificate.  Optional since some serial-numbers are
           already unique within the scope of a MASA.
           Inclusion of the statistically unique key identifier
           ensures statistically unique identification of the \
                                                            hardware.
           When processing a voucher, a pledge MUST ensure that its
           IDevID Authority Key Identifier matches this value.  If no
           match occurs, then the pledge MUST NOT process this \
                                                             voucher.

           When issuing a voucher, the MASA MUST ensure that this \
                                                                field
           is populated for serial-numbers that are not otherwise \
                                                               unique
           within the scope of the MASA.";
      }
      leaf pinned-domain-cert {
        type binary;
        mandatory true;
        description
          "An X.509 v3 certificate structure, as specified by RFC \
                                                                5280,
           using Distinguished Encoding Rules (DER) encoding, as \
                                                              defined
           in ITU-T X.690.

           This certificate is used by a pledge to trust a Public Key
           Infrastructure in order to verify a domain certificate
           supplied to the pledge separately by the bootstrapping
           protocol.  The domain certificate MUST have this \
                                                          certificate
           somewhere in its chain of certificates.  This certificate
           MAY be an end-entity certificate, including a self-signed
           entity.";
        reference
          "RFC 5280:
             Internet X.509 Public Key Infrastructure Certificate
             and Certificate Revocation List (CRL) Profile.
           ITU-T X.690:
              Information technology - ASN.1 encoding rules:
              Specification of Basic Encoding Rules (BER),
              Canonical Encoding Rules (CER) and Distinguished
              Encoding Rules (DER).";
      }
      leaf domain-cert-revocation-checks {
        type boolean;
        description
          "A processing instruction to the pledge that it MUST (true)
           or MUST NOT (false) verify the revocation status for the
           pinned domain certificate.  If this field is not set, then
           normal PKIX behavior applies to validation of the domain
           certificate.";
      }
      leaf nonce {
        type binary {
          length "8..32";
        }
        must 'not(../expires-on)';
        description
          "A value that can be used by a pledge in some bootstrapping
           protocols to enable anti-replay protection.  This node is
           optional because it is not used by all bootstrapping
           protocols.

           When present, the pledge MUST compare the provided nonce
           value with another value that the pledge randomly \
                                                            generated
           and sent to a bootstrap server in an earlier bootstrapping
           message.  If the values do not match, then the pledge MUST
           NOT process this voucher.";
      }
      leaf last-renewal-date {
        type yang:date-and-time;
        must '../expires-on';
        description
          "The date that the MASA projects to be the last date it
           will renew a voucher on. This field is merely informative\
                                                                 ; it
           is not processed by pledges.

           Circumstances may occur after a voucher is generated that
           may alter a voucher's validity period.  For instance,
           a vendor may associate validity periods with support
           contracts, which may be terminated or extended
           over time.";
      }
    } // end voucher
  } // end voucher-grouping

}
]]></sourcecode>
        </section>
        <section anchor="ietf-voucher-sid-definitions">
          <name>ietf-voucher SID definitions</name>
          <t><xref target="RFC9148"/> explains how to serialize YANG into CBOR, and for this a series of SID values are required.
While <xref target="I-D.ietf-core-sid"/> defines the management process for these values, due to the immaturity  of the tooling around this YANG-SID mechanisms, the following values are considered normative.
It is believed, however, that they will not change.</t>
          <artwork><![CDATA[
           
      SID Assigned to
--------- -------------------------------------------------- 
     2451 data /ietf-voucher-constrained:voucher
     2452 data /ietf-voucher-constrained:voucher/assertion
     2453 data /ietf-voucher-constrained:voucher/created-on
     2454 data .../domain-cert-revocation-checks
     2455 data /ietf-voucher-constrained:voucher/expires-on
     2456 data /ietf-voucher-constrained:voucher/idevid-issuer
     2457 data .../last-renewal-date
     2458 data /ietf-voucher-constrained:voucher/nonce
     2459 data .../pinned-domain-cert
     2460 data .../pinned-domain-pubk
     2461 data .../pinned-domain-pubk-sha256
     2462 data /ietf-voucher-constrained:voucher/serial-number
           
 WARNING, obsolete definitions
]]></artwork>
          <t>The "assertion" attribute is an enumerated type <xref target="RFC8366"/>, and the current PYANG tooling does not document the valid values for this attribute.
In the JSON serialization, the literal strings from the enumerated types are used so there is no ambiguity.
In the CBOR serialization, a small integer is used.
This following values are documented here, but the YANG module should be considered authoritative. No IANA registry is provided or necessary because the YANG module provides for extensions.</t>
          <table anchor="assertion-enums">
            <name>CBOR integers for the "assertion" attribute enum</name>
            <thead>
              <tr>
                <th align="left">Integer</th>
                <th align="left">Assertion Type</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">0</td>
                <td align="left">verified</td>
              </tr>
              <tr>
                <td align="left">1</td>
                <td align="left">logged</td>
              </tr>
              <tr>
                <td align="left">2</td>
                <td align="left">proximity</td>
              </tr>
            </tbody>
          </table>
        </section>
      </section>
      <section anchor="cms-voucher">
        <name>CMS Format Voucher Artifact</name>
        <t>The IETF evolution of PKCS#7 is CMS <xref target="RFC5652"/>.
A CMS-signed voucher, the default type, contains a ContentInfo
structure with the voucher content. An eContentType of 40
indicates that the content is a JSON-encoded voucher.</t>
        <t>The signing structure is a CMS SignedData structure, as specified by
Section 5.1 of <xref target="RFC5652"/>, encoded using ASN.1 Distinguished Encoding
Rules (DER), as specified in ITU-T X.690 <xref target="ITU-T.X690.2015"/>.</t>
        <t>To facilitate interoperability, <xref target="vcj"/> in this document registers the
media type "application/voucher-cms+json" and the filename extension
".vcj".</t>
        <t>The CMS structure <bcp14>MUST</bcp14> contain a 'signerInfo' structure, as
described in Section 5.1 of <xref target="RFC5652"/>, containing the
signature generated over the content using a private key
trusted by the recipient. Normally, the recipient is the pledge and the
signer is the MASA. Another possible use could be as a "signed
voucher request" format originating from the pledge or registrar
toward the MASA.
Within this document, the signer is assumed to be the MASA.</t>
        <t>Note that Section 5.1 of <xref target="RFC5652"/> includes a
discussion about how to validate a CMS object, which is really a
PKCS7 object (cmsVersion=1).  Intermediate systems (such the
Bootstrapping Remote Secure Key Infrastructures <xref target="BRSKI"/> registrar)
that might need to evaluate the voucher in flight <bcp14>MUST</bcp14> be prepared for
such an older format.
No signaling is necessary, as the manufacturer knows the capabilities
of the pledge and will use an appropriate format voucher for each
pledge.</t>
        <t>The CMS structure <bcp14>SHOULD</bcp14> also contain all of the certificates
leading up to and including the signer's trust anchor certificate
known to the recipient.  The inclusion of the trust anchor is
unusual in many applications, but third parties cannot accurately
audit the transaction without it.</t>
        <t>The CMS structure <bcp14>MAY</bcp14> also contain revocation objects for any
intermediate certificate authorities (CAs) between the
voucher issuer and the trust anchor known to the recipient.
However, the use of CRLs and other validity mechanisms is
discouraged, as the pledge is unlikely to be able to perform
online checks and is unlikely to have a trusted clock source.
As described below, the use of short-lived vouchers and/or a
pledge-provided nonce provides a freshness guarantee.</t>
      </section>
    </section>
    <section anchor="voucher-request">
      <name>Voucher Request Artifact</name>
      <t><xref section="3" sectionFormat="comma" target="BRSKI"/> defined a Voucher-Request Artifact as an augmented artifact from the Voucher Artifact originally defined in <xref target="RFC8366"/>.
That definition has been moved to this document, and translated from YANG-DATA <xref target="RFC8040"/> to the SX:STRUCTURE extension <xref target="RFC8971"/>.</t>
      <section anchor="voucher-request-tree-diagram">
        <name>Tree Diagram</name>
        <t>The following tree diagram illustrates a high-level view of a voucher
request document.
The notation used in this diagram is described in <xref target="RFC8340"/>.
Each node in the diagram is fully described by the YANG module in
<xref target="voucher-request-yang-module"/>.</t>
        <artwork><![CDATA[
module: ietf-voucher-request

  grouping voucher-request-grouping:
    +-- voucher
       +-- created-on?                      yang:date-and-time
       +-- expires-on?                      yang:date-and-time
       +-- assertion?                       ianavat:voucher-assertion
       +-- serial-number                    string
       +-- idevid-issuer?                   binary
       +-- pinned-domain-cert?              binary
       +-- domain-cert-revocation-checks?   boolean
       +-- nonce?                           binary
       +-- last-renewal-date?               yang:date-and-time
       +-- prior-signed-voucher-request?    binary
       +-- proximity-registrar-cert?        binary
]]></artwork>
      </section>
      <section anchor="voucher-request-yang-module">
        <name>"ietf-voucher-request" Module</name>
        <t>The ietf-voucher-request YANG module is derived from the ietf-voucher module.</t>
        <sourcecode type="yang" markers="true"><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

module ietf-voucher-request {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-voucher-request";
  prefix vcr;

  import ietf-restconf {
    prefix rc;
    description
      "This import statement is only present to access
       the yang-data extension defined in RFC 8040.";
    reference
      "RFC 8040: RESTCONF Protocol";
  }
  import ietf-voucher {
    prefix vch;
    description
      "This module defines the format for a voucher,
       which is produced by a pledge's manufacturer or
       delegate (MASA) to securely assign a pledge to
       an 'owner', so that the pledge may establish a secure
       connection to the owner's network infrastructure";
    reference
      "RFC 8366: Voucher Artifact for
       Bootstrapping Protocols";
  }

  organization
    "IETF ANIMA Working Group";
  contact
    "WG Web:   <https://datatracker.ietf.org/wg/anima/>
     WG List:  <mailto:anima@ietf.org>
     Author:   Kent Watsen
               <mailto:kent+ietf@watsen.net>
     Author:   Michael H. Behringer
               <mailto:Michael.H.Behringer@gmail.com>
     Author:   Toerless Eckert
               <mailto:tte+ietf@cs.fau.de>
     Author:   Max Pritikin
               <mailto:pritikin@cisco.com>
     Author:   Michael Richardson
               <mailto:mcr+ietf@sandelman.ca>";
  description
    "This module defines the format for a voucher request.
     It is a superset of the voucher itself.
     It provides content to the MASA for consideration
     during a voucher request.

     The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
     NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
     'MAY', and 'OPTIONAL' in this document are to be interpreted as
     described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
     they appear in all capitals, as shown here.

     Copyright (c) 2019 IETF Trust and the persons identified as
     authors of the code. All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject
     to the license terms contained in, the Simplified BSD License
     set forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (http://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC XXXX; see the \
                                                                  RFC
     itself for full legal notices.";

  revision 2023-01-10 {
    description
      "Initial version";
    reference
      "RFC XXXX: Bootstrapping Remote Secure Key Infrastructure";
  }

  // Top-level statement
  rc:yang-data voucher-request-artifact {
    uses voucher-request-grouping;
  }

  // Grouping defined for future usage

  grouping voucher-request-grouping {
    description
      "Grouping to allow reuse/extensions in future work.";
    uses vch:voucher-artifact-grouping {
      refine "voucher/created-on" {
        mandatory false;
      }
      refine "voucher/pinned-domain-cert" {
        mandatory false;
        description
          "A pinned-domain-cert field
           is not valid in a voucher request, and
           any occurrence MUST be ignored";
      }
      refine "voucher/last-renewal-date" {
        description
          "A last-renewal-date field
           is not valid in a voucher request, and
           any occurrence MUST be ignored";
      }
      refine "voucher/domain-cert-revocation-checks" {
        description
          "The domain-cert-revocation-checks field
           is not valid in a voucher request, and
           any occurrence MUST be ignored";
      }
      refine "voucher/assertion" {
        mandatory false;
        description
          "Any assertion included in registrar voucher
           requests SHOULD be ignored by the MASA.";
      }
      augment "voucher" {
        description
          "Adds leaf nodes appropriate for requesting vouchers.";
        leaf prior-signed-voucher-request {
          type binary;
          description
            "If it is necessary to change a voucher, or re-sign and
             forward a voucher that was previously provided along a
             protocol path, then the previously signed voucher SHOULD
             be included in this field.

             For example, a pledge might sign a voucher request
             with a proximity-registrar-cert, and the registrar
             then includes it as the prior-signed-voucher-request
             field.  This is a simple mechanism for a chain of
             trusted parties to change a voucher request, while
             maintaining the prior signature information.

             The Registrar and MASA MAY examine the prior signed
             voucher information for the
             purposes of policy decisions. For example this
             information could be useful to a MASA to determine
             that both pledge and registrar agree on proximity
             assertions. The MASA SHOULD remove all
             prior-signed-voucher-request information when
             signing a voucher for imprinting so as to minimize
             the final voucher size.";
        }
        leaf proximity-registrar-cert {
          type binary;
          description
            "An X.509 v3 certificate structure as specified by
             RFC 5280, Section 4 encoded using the ASN.1
             distinguished encoding rules (DER), as specified
             in [ITU.X690.1994].

             The first certificate in the Registrar TLS server
             certificate_list sequence  (the end-entity TLS
             certificate, see [RFC8446]) presented by the Registrar
             to the Pledge.
             This MUST be populated in a Pledge's voucher request
             when a proximity assertion is requested.";
        }
      }
    }
  }
}
]]></sourcecode>
      </section>
      <section anchor="ietf-voucher-request-sid-values">
        <name>ietf-voucher-request SID values</name>
        <t><xref target="RFC9148"/> explains how to serialize YANG into CBOR, and for this a series of SID values are required.
While <xref target="I-D.ietf-core-sid"/> defines the management process for these values, due to the immaturity  of the tooling around this YANG-SID mechanisms, the following values are considered normative.
It is believed, however, that they will not change.</t>
        <artwork><![CDATA[
           
      SID Assigned to
--------- -------------------------------------------------- 
     2501 data /ietf-voucher-request-constrained:voucher
     2502 data .../assertion
     2503 data .../created-on
     2504 data .../domain-cert-revocation-checks
     2505 data .../expires-on
     2506 data .../idevid-issuer
     2507 data .../last-renewal-date
     2508 data /ietf-voucher-request-constrained:voucher/nonce
     2509 data .../pinned-domain-cert
     2510 data .../prior-signed-voucher-request
     2511 data .../proximity-registrar-cert
     2513 data .../proximity-registrar-pubk
     2512 data .../proximity-registrar-pubk-sha256
     2514 data .../serial-number
     2519 data /ietf-voucher-request:voucher
     2520 data /ietf-voucher-request:voucher/assertion
     2521 data /ietf-voucher-request:voucher/created-on
     2522 data .../domain-cert-revocation-checks
     2523 data /ietf-voucher-request:voucher/expires-on
     2524 data /ietf-voucher-request:voucher/idevid-issuer
     2525 data /ietf-voucher-request:voucher/last-renewal-date
     2526 data /ietf-voucher-request:voucher/nonce
     2527 data /ietf-voucher-request:voucher/pinned-domain-cert
     2528 data .../prior-signed-voucher-request
     2529 data .../proximity-registrar-cert
     2530 data /ietf-voucher-request:voucher/serial-number
           
 WARNING, obsolete definitions
           
]]></artwork>
        <t>The "assertion" attribute is an enumerated type, and has values as defined above in <xref target="assertion-enums"/>.</t>
      </section>
    </section>
    <section anchor="design-con">
      <name>Design Considerations</name>
      <section anchor="renewal-over-revocation">
        <name>Renewals Instead of Revocations</name>
        <t>The lifetimes of vouchers may vary.  In some bootstrapping protocols,
the vouchers may be created and consumed immediately, whereas in other
bootstrapping solutions, there may be a significant time delay between
when a voucher is created and when it is consumed.
In cases when there is a time delay, there is a need for the pledge
to ensure that the assertions made when the voucher was created are
still valid.</t>
        <t>A revocation artifact is generally used to verify the continued validity
of an assertion such as a PKIX certificate, web token, or a "voucher".  With
this approach, a potentially long-lived assertion is paired with a reasonably
fresh revocation status check to ensure that the assertion is still valid.
However, this approach increases solution complexity, as it introduces the
need for additional protocols and code paths to distribute and process the
revocations.</t>
        <t>Addressing the shortcomings of revocations, this document recommends
instead the use of lightweight renewals of short-lived non-revocable
vouchers.  That is, rather than issue a long-lived voucher, where the
'expires-on' leaf is set to some distant date, the expectation
is for the MASA to instead issue a short-lived voucher, where the
'expires-on' leaf is set to a relatively near date, along with a promise
(reflected in the 'last-renewal-date' field) to reissue the voucher again
when needed.  Importantly, while issuing the initial voucher may incur
heavyweight verification checks ("Are you who you say you are?" "Does the
pledge actually belong to you?"), reissuing the voucher should be a
lightweight process, as it ostensibly only updates the voucher's
validity period.
With this approach, there is
only the one artifact, and only one code path is needed to process
it; there is no possibility of a pledge choosing to skip the
revocation status check because, for instance, the OCSP Responder is
not reachable.</t>
        <t>While this document recommends issuing short-lived vouchers, the
voucher artifact does not restrict the ability to create long-lived
voucher, if required; however, no revocation method is described.</t>
        <t>Note that a voucher may be signed by a chain of intermediate CAs
leading up to the trust anchor certificate known by the pledge.  Even
though the voucher itself is not revocable, it may still be revoked,
per se, if one of the intermediate CA certificates is revoked.</t>
      </section>
      <section anchor="voucher-per-pledge">
        <name>Voucher Per Pledge</name>
        <t>The solution described herein originally enabled a single voucher to
apply to many pledges, using lists of regular expressions to represent
ranges of serial-numbers.  However, it was determined that blocking the
renewal of a voucher that applied to many devices would be excessive
when only the ownership for a single pledge needed to be blocked.
Thus, the voucher format now only supports a single serial-number
to be listed.</t>
      </section>
    </section>
    <section anchor="sec-con">
      <name>Security Considerations</name>
      <section anchor="clock-sensitivity">
        <name>Clock Sensitivity</name>
        <t>An attacker could use an expired voucher to gain control over
a device that has no understanding of time.  The device cannot
trust NTP as a time reference, as an attacker could control
the NTP stream.</t>
        <t>There are three things to defend against this: 1) devices are
required to verify that the expires-on field has not yet passed,
2) devices without access to time can use nonces to
get ephemeral vouchers, and 3) vouchers without expiration times
may be used, which will appear in the audit log, informing the
security decision.</t>
        <t>This document defines a voucher format that contains time values
for expirations, which require an accurate clock
in order to be processed correctly.  Vendors planning on
issuing vouchers with expiration values must ensure that devices
have an accurate clock when shipped from manufacturing
facilities and take steps to prevent clock tampering.
If it is not possible to ensure clock accuracy, then
vouchers with expirations should not be issued.</t>
      </section>
      <section anchor="protect-voucher-pki-in-hsm">
        <name>Protect Voucher PKI in HSM</name>
        <t>Pursuant the recommendation made in Section 6.1 for the MASA to be
deployed as an online voucher signing service, it is <bcp14>RECOMMENDED</bcp14> that
the MASA's private key used for signing vouchers is protected by
a hardware security module (HSM).</t>
      </section>
      <section anchor="test-domain-certificate-validity-when-signing">
        <name>Test Domain Certificate Validity When Signing</name>
        <t>If a domain certificate is compromised, then any outstanding
vouchers for that domain could be used by the attacker.  The domain
administrator is clearly expected to initiate revocation of any
domain identity certificates (as is normal in PKI solutions).</t>
        <t>Similarly, they are expected to contact the MASA to indicate that
an outstanding (presumably short lifetime) voucher should be blocked from
automated renewal.
Protocols for voucher distribution are
<bcp14>RECOMMENDED</bcp14> to check for revocation of domain identity certificates
before the signing of vouchers.</t>
      </section>
      <section anchor="yang-module-security-considerations">
        <name>YANG Module Security Considerations</name>
        <t>The YANG module specified in this document defines the schema
for data that is subsequently encapsulated by a CMS signed-data
content type, as described in Section 5 of <xref target="RFC5652"/>.  As such,
all of the YANG modeled data is protected from modification.</t>
        <t>Implementations should be aware that the signed data is only
protected from external modification; the data is still visible.
This potential disclosure of information doesn't affect security
so much as privacy.  In particular, adversaries can glean
information such as which devices belong to which organizations
and which CRL Distribution Point and/or OCSP Responder URLs are
accessed to validate the vouchers.  When privacy is important,
the CMS signed-data content type <bcp14>SHOULD</bcp14> be encrypted, either by
conveying it via a mutually authenticated secure transport protocol
(e.g., TLS <xref target="RFC5246"/>) or by encapsulating the signed-data
content type with an enveloped-data content type (Section 6
of <xref target="RFC5652"/>), though details for how to do this are outside
the scope of this document.</t>
        <t>The use of YANG to define data structures, via the 'yang-data'
statement, is relatively new and distinct from the traditional use of
YANG to define an API accessed by network management protocols such as
NETCONF <xref target="RFC6241"/> and RESTCONF <xref target="RFC8040"/>. For this reason, these
guidelines do not follow template described by Section 3.7 of
<xref target="YANG-GUIDE"/>.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This section deals with actions and processes necessary for IANA to undertake to maintain
the "iana-voucher-assertion-type" YANG module.
The iana-voucher-assertion-type YANG module is intended to reflect the "voucher assertion types" registry in [TBD].</t>
      <t>IANA is asked to create the "iana-voucher-assertion-type YANG module" registry.</t>
      <t>Voucher assertion types must not be directly added to the iana-voucher-type YANG module.
They must instead be added to the "voucher assertion types" registry.</t>
      <t>Whenever a new enumerated type is added to the "voucher assertion types" registry, IANA
must also update the "ietf-voucher-assertion-type" YANG module and add a new "enum"
statement to the "voucher-assertion-type" type.
The assigned name defined by the "enum" statement <bcp14>SHALL</bcp14> be the same as the mnemonic name of the new assertion type.
The following substatements to the "enum" statement <bcp14>SHALL</bcp14> be defined:</t>
      <ul empty="true">
        <li>
          <dl>
            <dt>"value":</dt>
            <dd>
              <t>Use the decimal value from the registry.</t>
            </dd>
            <dt>"status":</dt>
            <dd>
              <t>Include only if a class or type registration has been deprecated or obsoleted.
IANA "deprecated" maps to YANG status "deprecated", and IANA "obsolete" maps to YANG status   "obsolete".</t>
            </dd>
            <dt>"description":</dt>
            <dd>
              <t>Replicate the corresponding information from the registry, namely the full name of the new assertion type.</t>
            </dd>
            <dt>"reference":</dt>
            <dd>
              <t>Replicate the reference(s) from the registry.</t>
            </dd>
          </dl>
        </li>
      </ul>
      <t>Each time the "iana-voucher-assertion-type" YANG module is updated, a new "revision" statement <bcp14>SHALL</bcp14> be added before the existing "revision" statements.
IANA has added this note to the "voucher assertion types" registries:</t>
      <t>When this registry is modified, the YANG module "iana-voucher-assertion-type" must
be updated as defined in [RFCXXXX].
The "Reference" text in the "voucher assertion types" registry has been updated
as follows:
OLD:
| <xref target="RFC8366"/>
NEW:
| [RFC8366][RFCXXX]</t>
      <section anchor="the-ietf-xml-registry">
        <name>The IETF XML Registry</name>
        <t>This document registers two URIs in the "IETF XML Registry" <xref target="RFC3688"/>.</t>
        <t>IANA has registered the following:</t>
        <ul empty="true">
          <li>
            <dl spacing="compact">
              <dt>URI:</dt>
              <dd>
                <t>urn:ietf:params:xml:ns:yang:ietf-voucher</t>
              </dd>
              <dt>Registrant Contact:</dt>
              <dd>
                <t>The ANIMA WG of the IETF.</t>
              </dd>
              <dt>XML:</dt>
              <dd>
                <t>N/A, the requested URI is an XML namespace.</t>
              </dd>
            </dl>
          </li>
        </ul>
        <t>IANA is asked to register a second URI as follows:</t>
        <ul empty="true">
          <li>
            <dl spacing="compact">
              <dt>URI:</dt>
              <dd>
                <t>urn:ietf:params:xml:ns:yang:iana-voucher-assertion-type</t>
              </dd>
              <dt>Registrant Contact:</dt>
              <dd>
                <t>The ANIMA WG of the IETF.</t>
              </dd>
              <dt>XML:</dt>
              <dd>
                <t>N/A, the requested URI is an XML namespace.</t>
              </dd>
            </dl>
          </li>
        </ul>
      </section>
      <section anchor="the-yang-module-names-registry">
        <name>The YANG Module Names Registry</name>
        <t>This document registers two YANG module in the "YANG Module Names"
registry <xref target="RFC6020"/>.</t>
        <t>IANA is asked to registrar the following:</t>
        <ul empty="true">
          <li>
            <dl spacing="compact">
              <dt>name:</dt>
              <dd>
                <t>ietf-voucher</t>
              </dd>
              <dt>namespace:</dt>
              <dd>
                <t>urn:ietf:params:xml:ns:yang:ietf-voucher</t>
              </dd>
              <dt>prefix:</dt>
              <dd>
                <t>vch</t>
              </dd>
            </dl>
            <t>reference:
  :RFC 8366</t>
          </li>
        </ul>
        <t>IANA is asked to register a second YANG module as follows:</t>
        <ul empty="true">
          <li>
            <dl spacing="compact">
              <dt>name:</dt>
              <dd>
                <t>iana-voucher-assertion-type</t>
              </dd>
              <dt>namespace:</dt>
              <dd>
                <t>urn:ietf:params:xml:ns:yang:iana-voucher-assertion-type</t>
              </dd>
              <dt>prefix:</dt>
              <dd>
                <t>ianavat</t>
              </dd>
              <dt>reference:</dt>
              <dd>
                <t>RFC XXXX</t>
              </dd>
            </dl>
          </li>
        </ul>
      </section>
      <section anchor="vcj">
        <name>The Media Types Registry</name>
        <t>This document requests IANA to update the following "Media Types" entry to point to the RFC number that will be assigned to this document:</t>
        <dl>
          <dt>Type name:</dt>
          <dd>
            <t>application</t>
          </dd>
          <dt>Subtype name:</dt>
          <dd>
            <t>voucher-cms+json</t>
          </dd>
          <dt>Required parameters:</dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>Optional parameters:</dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>Encoding considerations:</dt>
          <dd>
            <t>CMS-signed JSON vouchers are ASN.1/DER encoded.</t>
          </dd>
          <dt>Security considerations:</dt>
          <dd>
            <t>See <xref target="sec-con"/></t>
          </dd>
          <dt>Interoperability considerations:</dt>
          <dd>
            <t>The format is designed to be broadly interoperable.</t>
          </dd>
          <dt>Published specification:</dt>
          <dd>
            <t>RFC 8366</t>
          </dd>
          <dt>Applications that use this media type:</dt>
          <dd>
            <t>ANIMA, 6tisch, and NETCONF zero-touch imprinting systems.</t>
          </dd>
          <dt>Fragment identifier considerations:</dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>Additional information:</dt>
          <dd>
            <dl>
              <dt>Deprecated alias names for this type:</dt>
              <dd>
                <t>none</t>
              </dd>
              <dt>Magic number(s):</dt>
              <dd>
                <t>None</t>
              </dd>
              <dt>File extension(s):</dt>
              <dd>
                <t>.vcj</t>
              </dd>
              <dt>Macintosh file type code(s):</dt>
              <dd>
                <t>none</t>
              </dd>
            </dl>
          </dd>
          <dt>Person and email address to contact for further information:</dt>
          <dd>
            <t>IETF ANIMA WG</t>
          </dd>
          <dt>Intended usage:</dt>
          <dd>
            <t>LIMITED</t>
          </dd>
          <dt>Restrictions on usage:</dt>
          <dd>
            <t>NONE</t>
          </dd>
          <dt>Author:</dt>
          <dd>
            <t>ANIMA WG</t>
          </dd>
          <dt>Change controller:</dt>
          <dd>
            <t>IETF</t>
          </dd>
          <dt>Provisional registration? (standards tree only):</dt>
          <dd>
            <t>NO</t>
          </dd>
        </dl>
      </section>
      <section anchor="the-smi-security-for-smime-cms-content-type-registry">
        <name>The SMI Security for S/MIME CMS Content Type Registry</name>
        <t>This document requests IANA to update this  registered OID in the "SMI Security for S/MIME CMS Content Type (1.2.840.113549.1.9.16.1)" registry to point to the RFC number to be assigned to this document:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Decimal</th>
              <th align="left">Description</th>
              <th align="left">References</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">40</td>
              <td align="left">id-ct-animaJSONVoucher</td>
              <td align="left">RFC 8366</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC5652">
          <front>
            <title>Cryptographic Message Syntax (CMS)</title>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the Cryptographic Message Syntax (CMS).  This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="70"/>
          <seriesInfo name="RFC" value="5652"/>
          <seriesInfo name="DOI" value="10.17487/RFC5652"/>
        </reference>
        <reference anchor="RFC6020">
          <front>
            <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund">
              <organization/>
            </author>
            <date month="October" year="2010"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6020"/>
          <seriesInfo name="DOI" value="10.17487/RFC6020"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray">
              <organization/>
            </author>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format.  It was derived from the ECMAScript Programming Language Standard.  JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC7950">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund">
              <organization/>
            </author>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols.  This document describes the syntax and semantics of version 1.1 of the YANG language.  YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification.  There are a small number of backward incompatibilities from YANG version 1.  This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="I-D.ietf-core-sid">
          <front>
            <title>YANG Schema Item iDentifier (YANG SID)</title>
            <author fullname="Michel Veillette" initials="M." surname="Veillette">
              <organization>Trilliant Networks Inc.</organization>
            </author>
            <author fullname="Alexander Pelov" initials="A." surname="Pelov">
              <organization>Acklio</organization>
            </author>
            <author fullname="Ivaylo Petrov" initials="I." surname="Petrov">
              <organization>Google Switzerland GmbH</organization>
            </author>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date day="26" month="July" year="2022"/>
            <abstract>
              <t>   YANG Schema Item iDentifiers (YANG SID) are globally unique 63-bit
   unsigned integers used to identify YANG items, as a more compact
   method to identify YANG items that can be used for efficiency and in
   constrained environments (RFC 7228).  This document defines the
   semantics, the registration, and assignment processes of YANG SIDs
   for IETF managed YANG modules.  To enable the implementation of these
   processes, this document also defines a file format used to persist
   and publish assigned YANG SIDs.


   // The present version (-19) adds in draft text about objectives,
   // parties, and roles.  This attempts to record discussions at side
   // meetings before, at, and after IETF 113.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-sid-19"/>
        </reference>
        <reference anchor="RFC9148">
          <front>
            <title>EST-coaps: Enrollment over Secure Transport with the Secure Constrained Application Protocol</title>
            <author fullname="P. van der Stok" initials="P." surname="van der Stok">
              <organization/>
            </author>
            <author fullname="P. Kampanakis" initials="P." surname="Kampanakis">
              <organization/>
            </author>
            <author fullname="M. Richardson" initials="M." surname="Richardson">
              <organization/>
            </author>
            <author fullname="S. Raza" initials="S." surname="Raza">
              <organization/>
            </author>
            <date month="April" year="2022"/>
            <abstract>
              <t>Enrollment over Secure Transport (EST) is used as a certificate provisioning protocol over HTTPS. Low-resource devices often use the lightweight Constrained Application Protocol (CoAP) for message exchanges. This document defines how to transport EST payloads over secure CoAP (EST-coaps), which allows constrained devices to use existing EST functionality for provisioning certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9148"/>
          <seriesInfo name="DOI" value="10.17487/RFC9148"/>
        </reference>
        <reference anchor="ITU-T.X690.2015" target="https://www.itu.int/rec/T-REC-X.690/">
          <front>
            <title>Information Technology - ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author>
              <organization>International Telecommunication Union</organization>
            </author>
            <date year="2015" month="August"/>
          </front>
          <seriesInfo name="ITU-T Recommendation X.690," value="ISO/IEC 8825-1"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks">
              <organization/>
            </author>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol.  The TLS protocol provides communications security over the Internet.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC3688">
          <front>
            <title>The IETF XML Registry</title>
            <author fullname="M. Mealling" initials="M." surname="Mealling">
              <organization/>
            </author>
            <date month="January" year="2004"/>
            <abstract>
              <t>This document describes an IANA maintained registry for IETF standards which use Extensible Markup Language (XML) related items such as Namespaces, Document Type Declarations (DTDs), Schemas, and Resource Description Framework (RDF) Schemas.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="81"/>
          <seriesInfo name="RFC" value="3688"/>
          <seriesInfo name="DOI" value="10.17487/RFC3688"/>
        </reference>
        <reference anchor="RFC6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed">
              <organization/>
            </author>
            <author fullname="J. Klensin" initials="J." surname="Klensin">
              <organization/>
            </author>
            <author fullname="T. Hansen" initials="T." surname="Hansen">
              <organization/>
            </author>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols.  This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns">
              <organization/>
            </author>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund">
              <organization/>
            </author>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder">
              <organization/>
            </author>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman">
              <organization/>
            </author>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices.  It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages.  The NETCONF protocol operations are realized as remote procedure calls (RPCs).  This document obsoletes RFC 4741.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman">
              <organization/>
            </author>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund">
              <organization/>
            </author>
            <author fullname="K. Watsen" initials="K." surname="Watsen">
              <organization/>
            </author>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC8340">
          <front>
            <title>YANG Tree Diagrams</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund">
              <organization/>
            </author>
            <author fullname="L. Berger" initials="L." role="editor" surname="Berger">
              <organization/>
            </author>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document captures the current syntax used in YANG module tree diagrams.  The purpose of this document is to provide a single location for this definition.  This syntax may be updated from time to time based on the evolution of the YANG language.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="215"/>
          <seriesInfo name="RFC" value="8340"/>
          <seriesInfo name="DOI" value="10.17487/RFC8340"/>
        </reference>
        <reference anchor="RFC6125">
          <front>
            <title>Representation and Verification of Domain-Based Application Service Identity within Internet Public Key Infrastructure Using X.509 (PKIX) Certificates in the Context of Transport Layer Security (TLS)</title>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre">
              <organization/>
            </author>
            <author fullname="J. Hodges" initials="J." surname="Hodges">
              <organization/>
            </author>
            <date month="March" year="2011"/>
            <abstract>
              <t>Many application technologies enable secure communication between two entities by means of Internet Public Key Infrastructure Using X.509 (PKIX) certificates in the context of Transport Layer Security (TLS). This document specifies procedures for representing and verifying the identity of application services in such interactions.   [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6125"/>
          <seriesInfo name="DOI" value="10.17487/RFC6125"/>
        </reference>
        <reference anchor="RFC7435">
          <front>
            <title>Opportunistic Security: Some Protection Most of the Time</title>
            <author fullname="V. Dukhovni" initials="V." surname="Dukhovni">
              <organization/>
            </author>
            <date month="December" year="2014"/>
            <abstract>
              <t>This document defines the concept "Opportunistic Security" in the context of communications protocols.  Protocol designs based on Opportunistic Security use encryption even when authentication is not available, and use authentication when possible, thereby removing barriers to the widespread use of encryption on the Internet.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7435"/>
          <seriesInfo name="DOI" value="10.17487/RFC7435"/>
        </reference>
        <reference anchor="RFC8971">
          <front>
            <title>Bidirectional Forwarding Detection (BFD) for Virtual eXtensible Local Area Network (VXLAN)</title>
            <author fullname="S. Pallagatti" initials="S." role="editor" surname="Pallagatti">
              <organization/>
            </author>
            <author fullname="G. Mirsky" initials="G." role="editor" surname="Mirsky">
              <organization/>
            </author>
            <author fullname="S. Paragiri" initials="S." surname="Paragiri">
              <organization/>
            </author>
            <author fullname="V. Govindan" initials="V." surname="Govindan">
              <organization/>
            </author>
            <author fullname="M. Mudigonda" initials="M." surname="Mudigonda">
              <organization/>
            </author>
            <date month="December" year="2020"/>
            <abstract>
              <t>This document describes the use of the Bidirectional Forwarding Detection (BFD) protocol in point-to-point Virtual eXtensible Local Area Network (VXLAN) tunnels used to form an overlay network.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8971"/>
          <seriesInfo name="DOI" value="10.17487/RFC8971"/>
        </reference>
        <reference anchor="ZERO-TOUCH">
          <front>
            <title>Secure Zero Touch Provisioning (SZTP)</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen">
              <organization/>
            </author>
            <author fullname="I. Farrer" initials="I." surname="Farrer">
              <organization/>
            </author>
            <author fullname="M. Abrahamsson" initials="M." surname="Abrahamsson">
              <organization/>
            </author>
            <date month="April" year="2019"/>
            <abstract>
              <t>This document presents a technique to securely provision a networking device when it is booting in a factory-default state.  Variations in the solution enable it to be used on both public and private networks.  The provisioning steps are able to update the boot image, commit an initial configuration, and execute arbitrary scripts to address auxiliary needs.  The updated device is subsequently able to establish secure connections with other systems.  For instance, a device may establish NETCONF (RFC 6241) and/or RESTCONF (RFC 8040) connections with deployment-specific network management systems.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8572"/>
          <seriesInfo name="DOI" value="10.17487/RFC8572"/>
        </reference>
        <reference anchor="BRSKI">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin">
              <organization/>
            </author>
            <author fullname="M. Richardson" initials="M." surname="Richardson">
              <organization/>
            </author>
            <author fullname="T. Eckert" initials="T." surname="Eckert">
              <organization/>
            </author>
            <author fullname="M. Behringer" initials="M." surname="Behringer">
              <organization/>
            </author>
            <author fullname="K. Watsen" initials="K." surname="Watsen">
              <organization/>
            </author>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane.  To do this, a Secure Key Infrastructure is bootstrapped.  This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline.  We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device.  The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="SECUREJOIN">
          <front>
            <title>6tisch Secure Join protocol</title>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date day="25" month="February" year="2017"/>
            <abstract>
              <t>   This document describes a zero-touch mechanism to enroll a new device
   (the "pledge") into a IEEE802.15.4 TSCH network using the 6tisch
   signaling mechanisms.  The resulting device will obtain a domain
   specific credential that can be used with either 802.15.9 per-host
   pair keying protocols, or to obtain the network-wide key from a
   coordinator.  The mechanism describe her is an augmentation to the
   one-touch mechanism described in [I-D.ietf-6tisch-minimal-security].

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-6tisch-dtsecurity-secure-join-01"/>
        </reference>
        <reference anchor="YANG-GUIDE">
          <front>
            <title>Guidelines for Authors and Reviewers of Documents Containing YANG Data Models</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman">
              <organization/>
            </author>
            <date month="October" year="2018"/>
            <abstract>
              <t>This memo provides guidelines for authors and reviewers of specifications containing YANG modules.  Recommendations and procedures are defined, which are intended to increase interoperability and usability of Network Configuration Protocol (NETCONF) and RESTCONF protocol implementations that utilize YANG modules.  This document obsoletes RFC 6087.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="216"/>
          <seriesInfo name="RFC" value="8407"/>
          <seriesInfo name="DOI" value="10.17487/RFC8407"/>
        </reference>
        <reference anchor="Stajano99theresurrecting" target="https://www.cl.cam.ac.uk/research/dtg/www/files/publications/public/files/tr.1999.2.pdf">
          <front>
            <title>The Resurrecting Duckling: Security Issues for Ad-Hoc Wireless Networks</title>
            <author initials="F." surname="Stajano" fullname="Frank Stajano">
              <organization/>
            </author>
            <author initials="R." surname="Anderson" fullname="Ross Anderson">
              <organization/>
            </author>
            <date year="1999"/>
          </front>
        </reference>
        <reference anchor="imprinting" target="https://en.wikipedia.org/w/index.php?title=Imprinting_(psychology)&amp;oldid=825757556">
          <front>
            <title>Wikipedia article: Imprinting</title>
            <author>
              <organization>Wikipedia</organization>
            </author>
            <date year="2018" month="February"/>
          </front>
        </reference>
        <reference anchor="RFC8366">
          <front>
            <title>A Voucher Artifact for Bootstrapping Protocols</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen">
              <organization/>
            </author>
            <author fullname="M. Richardson" initials="M." surname="Richardson">
              <organization/>
            </author>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin">
              <organization/>
            </author>
            <author fullname="T. Eckert" initials="T." surname="Eckert">
              <organization/>
            </author>
            <date month="May" year="2018"/>
            <abstract>
              <t>This document defines a strategy to securely assign a pledge to an owner using an artifact signed, directly or indirectly, by the pledge's manufacturer.  This artifact is known as a "voucher".</t>
              <t>This document defines an artifact format as a YANG-defined JSON document that has been signed using a Cryptographic Message Syntax (CMS) structure.  Other YANG-derived formats are possible.  The voucher artifact is normally generated by the pledge's manufacturer (i.e., the Manufacturer Authorized Signing Authority (MASA)).</t>
              <t>This document only defines the voucher artifact, leaving it to other documents to describe specialized protocols for accessing it.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8366"/>
          <seriesInfo name="DOI" value="10.17487/RFC8366"/>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The authors would like to thank for following for
lively discussions on list and in the halls (ordered
by last name): William Atwood, Toerless Eckert, and Sheng Jiang.</t>
      <t>Russ Housley provided the upgrade from PKCS7 to CMS (RFC 5652) along
with the detailed CMS structure diagram.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
