<?xml version="1.0" encoding="us-ascii"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.2.7 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!ENTITY RFC2119 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC7049 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7049.xml">
<!ENTITY I-D.ietf-core-yang-cbor SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-core-yang-cbor.xml">
<!ENTITY I-D.ietf-core-sid SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-core-sid.xml">
<!ENTITY RFC7250 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7250.xml">
<!ENTITY RFC5652 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.5652.xml">
<!ENTITY RFC8152 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8152.xml">
<!ENTITY I-D.ietf-anima-voucher SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-anima-voucher.xml">
<!ENTITY I-D.ietf-anima-bootstrapping-keyinfra SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-anima-bootstrapping-keyinfra.xml">
<!ENTITY I-D.ietf-core-object-security SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-core-object-security.xml">
<!ENTITY I-D.ietf-ace-cbor-web-token SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-ace-cbor-web-token.xml">
<!ENTITY I-D.vanderstok-ace-coap-est SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.vanderstok-ace-coap-est.xml">
<!ENTITY I-D.ietf-netmod-yang-tree-diagrams SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-netmod-yang-tree-diagrams.xml">
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-richardson-anima-ace-constrained-voucher-00" category="info">

  <front>
    <title abbrev="Constrained Vouchers">Constrained Voucher Profile for Bootstrapping Protocols</title>

    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>

    <date year="2017" month="December" day="11"/>

    <area>Internet</area>
    <workgroup>6tisch Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document defines a strategy to securely assign a pledge to an
owner, using an artifact signed, directly or indirectly, by the
pledge's manufacturer.  This artifact is known as a "voucher".</t>

<t>This document builds upon the work in <xref target="I-D.ietf-anima-voucher"/>, encoding
the resulting artifact in CBOR.  Use with two signature technologies are
described.</t>

<t>Additionally, this document explains how constrained vouchers may be
transported in the <xref target="I-D.vanderstok-ace-coap-est"/> protocol.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>Enrollment of new nodes into constrained networks with constrained nodes
present unique challenges.</t>

<t>There are bandwidth and code space issues to contend.  A solution such as
<xref target="I-D.ietf-anima-bootstrapping-keyinfra"/> may be too large in terms of
code space or bandwidth required.</t>

<t>This document defines a constrained version of <xref target="I-D.ietf-anima-voucher"/>.
Rather than serializing the YANG definition in JSON, it is serialized into
CBOR (<xref target="RFC7049"/>).</t>

<t>This document follows a similar, but not identical structure as
<xref target="I-D.ietf-anima-voucher"/>. Some sections are left out entirely.</t>

<t>The CBOR definitions for this constrained voucher format are defined using
the mechanism describe in <xref target="I-D.ietf-core-yang-cbor"/> using the SID
mechanism explained in <xref target="I-D.ietf-core-sid"/>.  As the tooling to convert
YANG documents into an list of SID keys is still in its infancy, the table of
SID values presented here should be considered normative rather than the
output of the pyang tool.</t>

<t>Two methods of signing the resulting CBOR object are described in this
document.  One is CMS <xref target="RFC5652"/>.  The other is COSE <xref target="RFC8152"/> signatures.</t>

</section>
<section anchor="Terminology" title="Terminology">

<t>The following terms are defined in <xref target="I-D.ietf-anima-voucher"/>, and are used
identically as in that document: artifact, imprint, domain, Join
Registrar/Coordinator (JRC), Manufacturer Authorized Signing Authority
(MASA), pledge, Trust of First Use (TOFU), and Voucher.</t>

</section>
<section anchor="rfc2119" title="Requirements Language">

<t>In this document, the key words "MUST", "MUST NOT", "REQUIRED",
"SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY",
and "OPTIONAL" are to be interpreted as described in BCP 14, RFC 2119
<xref target="RFC2119"/> and indicate requirement levels for compliant STuPiD
implementations.</t>

</section>
<section anchor="survey-of-voucher-types" title="Survey of Voucher Types">

<t><xref target="I-D.ietf-anima-voucher"/> provides for vouchers that assert proximity, that
authenticate the registrar and that include different amounts of anti-replay
protection.</t>

<t>This document does not make any extensions to the types of vouchers.</t>

<t>Time based vouchers are included in this definition, but given that
constrained devices are extremely unlikely to know the correct time, their
use is very unlikely.  Most users of these constrained vouchers will be
online and will use live nonces to provide anti-replay protection.</t>

<t><xref target="I-D.ietf-anima-voucher"/> defined only the voucher artifact, and not the
Voucher Request artifact, which was defined in <xref target="I-D.ietf-anima-bootstrapping-keyinfra"/>.</t>

<t>This document defines both a constrained voucher and a constrained voucher-request.
They are presented in the order voucher-request, followed by voucher response
as this is the time order that they occur.</t>

</section>
<section anchor="artifacts" title="Artifacts">

<t>This section describes the abstract (tree) definition as explained
in <xref target="I-D.ietf-netmod-yang-tree-diagrams"/> first.  This provides a high-level
view of the contents of each artifact.</t>

<t>Then the assigned SID values are presented. These have been assigned using
the rules in <xref target="I-D.ietf-core-yang-cbor"/>, with an allocation that was made
via the http://comi.space service.  ((EDNOTE: it is unclear if there is
further IANA work))</t>

<section anchor="voucher-request-artifact" title="Voucher Request artifact">

<section anchor="tree-diagram" title="Tree Diagram">

<t><figure>
<artwork><![CDATA[
module: ietf-cwt-voucher-request

  grouping voucher-request-cwt-grouping
    +---- voucher
       +---- created-on
       |       yang:date-and-time
       +---- expires-on?
       |       yang:date-and-time
       +---- assertion
       |       enumeration
       +---- serial-number                                  string
       +---- idevid-issuer?                                 binary
       +---- pinned-domain-cert                             binary
       +---- domain-cert-revocation-checks?                 boolean
       +---- nonce?                                         binary
       +---- last-renewal-date?
       |       yang:date-and-time
       +---- proximity-registrar-subject-public-key-info?   binary
]]></artwork>
</figure></t>

</section>
<section anchor="sid-values" title="SID values">

<t><figure>
<artwork><![CDATA[
]]></artwork>
</figure></t>

</section>
<section anchor="yang-module" title="YANG Module">

<t><figure>
<artwork><![CDATA[
<CODE BEGINS> file "ietf-cwt-voucher-request.yang"
/* -*- c -*- */
module ietf-cwt-voucher-request {
  yang-version 1.1;

  namespace
    "urn:ietf:params:xml:ns:yang:ietf-cwt-voucher-request";
  prefix "vcwt";

  import ietf-voucher {
    prefix "v";
  }

  organization
   "IETF 6tisch Working Group";

  contact
   "WG Web:   <http://tools.ietf.org/wg/6tisch/>
    WG List:  <mailto:6tisch@ietf.org>
    Author:   Michael Richardson
              <mailto:mcr+ietf@sandelman.ca>";

  description
   "This module defines the format for a voucher, which is produced by
    a pledge's manufacturer or delegate (MASA) to securely assign one
    or more pledges to an 'owner', so that the pledges may establish a
    secure connection to the owner's network infrastructure.

    This version provides a very restricted subset appropriate
    for very constrained devices.
    In particular, it assumes that nonce-ful operation is
    always required, that expiration dates are rather weak, as no
    clocks can be assumed, and that the Registrar is identified
    by a pinned Raw Public Key.

    The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL NOT',
    'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'MAY', and 'OPTIONAL' in
    the module text are to be interpreted as described in RFC 2119.";

  revision "YYYY-MM-DD" {
    description
     "Initial version";
    reference
     "RFC XXXX: Voucher Profile for Constrained Devices";
  }

  // Grouping defined for future usage
  grouping voucher-request-cwt-grouping {
    description
      "Grouping to allow reuse/extensions in future work.";

    uses v:voucher-artifact-grouping {
      augment "voucher" {
        description "Base the CWT voucher-request upon the regular one";
        leaf proximity-registrar-subject-public-key-info {
          type binary;
          description
            "The proximity-registrar-subject-public-key-info replaces
         the proximit-registrar-cert in constrained uses of
         the voucher-request.
         The proximity-registrar-subject-public-key-info is the
         Raw Public Key of the Registrar. This field is encoded
         as specified in RFC7250, section 3.
         The ECDSA algorithm MUST be supported.
         The EdDSA algorithm as specified in
         draft-ietf-tls-rfc4492bis-17 SHOULD be supported.
         Support for the DSA algorithm is not recommended.
         Support for the RSA algorithm is a MAY.";
        }
      }
    }
  }
}
<CODE ENDS>
]]></artwork>
</figure></t>

</section>
<section anchor="example-voucher-request-artifacts" title="Example voucher request artifacts">

<t>TBD</t>

</section>
</section>
<section anchor="voucher-artifact" title="Voucher artifact">

<t>The voucher's primary purpose is to securely assign a pledge to an
owner.  The voucher informs the pledge which entity it should
consider to be its owner.</t>

<t>This document defines a voucher that is a CBOR encoded instance of
the YANG module defined in Section 5.3 that has been signed with CMS
or with COSE.</t>

</section>
<section anchor="tree-diagram-1" title="Tree Diagram">

<t><figure>
<artwork><![CDATA[
module: ietf-cwt-voucher

  grouping voucher-cwt-grouping
    +---- voucher
       +---- created-on
       |       yang:date-and-time
       +---- expires-on?
       |       yang:date-and-time
       +---- assertion                                enumeration
       +---- serial-number                            string
       +---- idevid-issuer?                           binary
       +---- pinned-domain-cert                       binary
       +---- domain-cert-revocation-checks?           boolean
       +---- nonce?                                   binary
       +---- last-renewal-date?
       |       yang:date-and-time
       +---- pinned-domain-subject-public-key-info?   binary
]]></artwork>
</figure></t>

</section>
<section anchor="sid-values-1" title="SID values">

<t><figure>
<artwork><![CDATA[
           
      SID Assigned to
--------- -------------------------------------------------- 
  1001100 module ietf-cwt-voucher
  1001101 module ietf-restconf
  1001102 module ietf-voucher
  1001103 module ietf-yang-types
  1001104 data .../ietf-cwt-voucher:voucher
  1001105 data .../assertion
  1001106 data .../created-on
  1001107 data .../domain-cert-revocation-checks
  1001108 data .../expires-on
  1001109 data .../idevid-issuer
  1001110 data .../last-renewal-date
  1001111 data .../nonce
  1001112 data .../pinned-domain-cert
  1001113 data .../pinned-domain-subject-public-key-info
  1001114 data .../serial-number
       No .sid file
]]></artwork>
</figure></t>

</section>
<section anchor="yang-module-1" title="YANG Module">

<t><figure>
<artwork><![CDATA[
<CODE BEGINS> file "ietf-cwt-voucher.yang"
/* -*- c -*- */
module ietf-cwt-voucher {
  yang-version 1.1;

  namespace
    "urn:ietf:params:xml:ns:yang:ietf-cwt-voucher";
  prefix "vcwt";

  import ietf-voucher {
    prefix "v";
  }

  organization
   "IETF 6tisch Working Group";

  contact
   "WG Web:   <http://tools.ietf.org/wg/6tisch/>
    WG List:  <mailto:6tisch@ietf.org>
    Author:   Michael Richardson
              <mailto:mcr+ietf@sandelman.ca>";

  description
   "This module defines the format for a voucher, which is produced by
    a pledge's manufacturer or delegate (MASA) to securely assign one
    or more pledges to an 'owner', so that the pledges may establish a
    secure connection to the owner's network infrastructure.

    This version provides a very restricted subset appropriate
    for very constrained devices.
    In particular, it assumes that nonce-ful operation is
    always required, that expiration dates are rather weak, as no
    clocks can be assumed, and that the Registrar is identified
    by a pinned Raw Public Key.

    The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL NOT',
    'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'MAY', and 'OPTIONAL' in
    the module text are to be interpreted as described in RFC 2119.";

  revision "YYYY-MM-DD" {
    description
     "Initial version";
    reference
     "RFC XXXX: Voucher Profile for Constrained Devices";
  }

  // Grouping defined for future usage
  grouping voucher-cwt-grouping {
    description
      "Grouping to allow reuse/extensions in future work.";

    uses v:voucher-artifact-grouping {
      augment "voucher" {
        description "Base the CWT voucher upon the regular one";
        leaf pinned-domain-subject-public-key-info {
          type binary;
          description
            "The pinned-domain-subject replaces the
         pinned-domain-certificate in constrained uses of
         the voucher.  The pinned-domain-public-key-info is the
         Raw Public Key of the Registrar. This field is encoded
         as specified in RFC7250, section 3.
         The ECDSA algorithm MUST be supported.
         The EdDSA algorithm as specified in
         draft-ietf-tls-rfc4492bis-17 SHOULD be supported.
         Support for the DSA algorithm is not recommended.
         Support for the RSA algorithm is a MAY.";
        }
      }
    }
  }
}
<CODE ENDS>
]]></artwork>
</figure></t>

<section anchor="example-voucher-artifacts" title="Example voucher artifacts">

<t>TBD</t>

</section>
</section>
<section anchor="cms-format-voucher-and-voucher-request-artifacts" title="CMS format voucher and voucher-request artifacts">

</section>
<section anchor="cose-format-voucher-and-voucher-request-artifacts" title="COSE format voucher and voucher-request artifacts">

</section>
</section>
<section anchor="design-considerations" title="Design Considerations">

<section anchor="renewals-instead-of-revocations" title="Renewals instead of Revocations">

</section>
<section anchor="voucher-per-pledge" title="Voucher Per Pledge">

</section>
</section>
<section anchor="security-considerations" title="Security Considerations">

<section anchor="clock-sensitivity" title="Clock Sensitivity">
<t>## Protect Voucher PKI in HSM
## Test Domain Certificate Validity when Signing</t>

</section>
</section>
<section anchor="iana-considerations" title="IANA Considerations">

<section anchor="the-ietf-xml-registry" title="The IETF XML Registry">

<t>This document registers two URIs in the IETF XML registry [RFC3688].
Following the format in [RFC3688], the following registration is
requested:</t>

<figure><artwork><![CDATA[
  URI: urn:ietf:params:xml:ns:yang:ietf-cwt-voucher
  Registrant Contact: The ANIMA WG of the IETF.
  XML: N/A, the requested URI is an XML namespace.

  URI: urn:ietf:params:xml:ns:yang:ietf-cwt-voucher-request
  Registrant Contact: The ANIMA WG of the IETF.
  XML: N/A, the requested URI is an XML namespace.
]]></artwork></figure>

</section>
<section anchor="the-yang-module-names-registry" title="The YANG Module Names Registry">

<t>This document registers two YANG modules in the YANG Module Names
registry [RFC6020].  Following the format defined in [RFC6020], the
the following registration is requested:</t>

<figure><artwork><![CDATA[
  name:         ietf-cwt-voucher
  namespace:    urn:ietf:params:xml:ns:yang:ietf-cwt-voucher
  prefix:       vch
  reference:    RFC XXXX

  name:         ietf-cwt-voucher-request
  namespace:    urn:ietf:params:xml:ns:yang:ietf-cwt-voucher-request
  prefix:       vch
  reference:    RFC XXXX
]]></artwork></figure>

</section>
<section anchor="the-smi-security-for-smime-cms-content-type-registry" title="The SMI Security for S/MIME CMS Content Type Registry">

<t>This document registers an OID in the "SMI Security for S/MIME CMS
Content Type" registry (1.2.840.113549.1.9.16.1), with the value:</t>

<figure><artwork><![CDATA[
  Decimal  Description                             References
  -------  --------------------------------------  ----------
  TBD1      id-ct-animaCBORVoucher                 [ThisRFC]
]]></artwork></figure>

<t>XXX: should a seperate value be used for Voucher Requests?</t>

</section>
<section anchor="the-sid-registry" title="The SID registry">

<t>The SID range 1001100 was allocated by comi.space to the IETF-CWT-VOUCHER
yang module.</t>

<t>The SID range 1001150 was allocated by comi.space to the IETF-CWT-VOUCHER-REQUEST
yang module.</t>

<t>EDNOTE: it is unclear if there is further IANA work required.</t>

</section>
</section>
<section anchor="acknowledgements" title="Acknowledgements">

<t>TBD</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>

&RFC2119;
&RFC7049;
&I-D.ietf-core-yang-cbor;
&I-D.ietf-core-sid;
&RFC7250;
&RFC5652;
&RFC8152;
&I-D.ietf-anima-voucher;
&I-D.ietf-anima-bootstrapping-keyinfra;
&I-D.ietf-core-object-security;
&I-D.ietf-ace-cbor-web-token;
&I-D.vanderstok-ace-coap-est;
<reference anchor="ieee802-1AR" target="http://standards.ieee.org/findstds/standard/802.1AR-2009.html">
  <front>
    <title>IEEE 802.1AR Secure Device Identifier</title>
    <author initials="." surname="IEEE Standard">
      <organization></organization>
    </author>
    <date year="2009"/>
  </front>
</reference>


    </references>

    <references title='Informative References'>

&I-D.ietf-netmod-yang-tree-diagrams;
<reference anchor="pledge" target="http://dictionary.reference.com/browse/pledge">
  <front>
    <title>Dictionary.com Unabridged</title>
    <author initials="." surname="Dictionary.com" fullname="Dictionary.com">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
</reference>
<reference anchor="duckling" target="https://www.cl.cam.ac.uk/~fms27/papers/1999-StajanoAnd-duckling.pdf">
  <front>
    <title>The resurrecting duckling: security issues for ad-hoc wireless networks</title>
    <author initials="F." surname="Stajano" fullname="Frank Stajano">
      <organization></organization>
    </author>
    <author initials="R." surname="Anderson" fullname="Ross Anderson">
      <organization></organization>
    </author>
    <date year="1999"/>
  </front>
</reference>


    </references>




  </back>

<!-- ##markdown-source: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-->

</rfc>

