<?xml version="1.0" encoding="us-ascii"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.2.7 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!ENTITY RFC2119 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC7049 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7049.xml">
<!ENTITY I-D.ietf-core-yang-cbor SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-core-yang-cbor.xml">
<!ENTITY I-D.ietf-core-sid SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-core-sid.xml">
<!ENTITY RFC7250 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7250.xml">
<!ENTITY RFC5652 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.5652.xml">
<!ENTITY RFC8152 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8152.xml">
<!ENTITY I-D.ietf-anima-voucher SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-anima-voucher.xml">
<!ENTITY I-D.ietf-anima-bootstrapping-keyinfra SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-anima-bootstrapping-keyinfra.xml">
<!ENTITY I-D.ietf-core-object-security SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-core-object-security.xml">
<!ENTITY I-D.ietf-ace-cbor-web-token SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-ace-cbor-web-token.xml">
<!ENTITY I-D.vanderstok-ace-coap-est SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.vanderstok-ace-coap-est.xml">
<!ENTITY I-D.ietf-netmod-yang-tree-diagrams SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-netmod-yang-tree-diagrams.xml">
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-richardson-anima-ace-constrained-voucher-01" category="info">

  <front>
    <title abbrev="Constrained Vouchers">Constrained Voucher Profile for Bootstrapping Protocols</title>

    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>

    <date year="2017" month="December" day="11"/>

    <area>Internet</area>
    <workgroup>6tisch Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document defines a strategy to securely assign a pledge to an
owner, using an artifact signed, directly or indirectly, by the
pledge's manufacturer.  This artifact is known as a "voucher".</t>

<t>This document builds upon the work in <xref target="I-D.ietf-anima-voucher"/>, encoding
the resulting artifact in CBOR.  Use with two signature technologies are
described.</t>

<t>Additionally, this document explains how constrained vouchers may be
transported in the <xref target="I-D.vanderstok-ace-coap-est"/> protocol.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>Enrollment of new nodes into constrained networks with constrained nodes
present unique challenges.</t>

<t>There are bandwidth and code space issues to contend.  A solution such as
<xref target="I-D.ietf-anima-bootstrapping-keyinfra"/> may be too large in terms of
code space or bandwidth required.</t>

<t>This document defines a constrained version of <xref target="I-D.ietf-anima-voucher"/>.
Rather than serializing the YANG definition in JSON, it is serialized into
CBOR (<xref target="RFC7049"/>).</t>

<t>This document follows a similar, but not identical structure as
<xref target="I-D.ietf-anima-voucher"/>. Some sections are left out entirely.</t>

<t>The CBOR definitions for this constrained voucher format are defined using
the mechanism describe in <xref target="I-D.ietf-core-yang-cbor"/> using the SID
mechanism explained in <xref target="I-D.ietf-core-sid"/>.  As the tooling to convert
YANG documents into an list of SID keys is still in its infancy, the table of
SID values presented here should be considered normative rather than the
output of the pyang tool.</t>

<t>Two methods of signing the resulting CBOR object are described in this
document.  One is CMS <xref target="RFC5652"/>.  The other is COSE <xref target="RFC8152"/> signatures.</t>

</section>
<section anchor="Terminology" title="Terminology">

<t>The following terms are defined in <xref target="I-D.ietf-anima-voucher"/>, and are used
identically as in that document: artifact, imprint, domain, Join
Registrar/Coordinator (JRC), Manufacturer Authorized Signing Authority
(MASA), pledge, Trust of First Use (TOFU), and Voucher.</t>

</section>
<section anchor="rfc2119" title="Requirements Language">

<t>In this document, the key words "MUST", "MUST NOT", "REQUIRED",
"SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY",
and "OPTIONAL" are to be interpreted as described in BCP 14, RFC 2119
<xref target="RFC2119"/> and indicate requirement levels for compliant STuPiD
implementations.</t>

</section>
<section anchor="survey-of-voucher-types" title="Survey of Voucher Types">

<t><xref target="I-D.ietf-anima-voucher"/> provides for vouchers that assert proximity, that
authenticate the registrar and that include different amounts of anti-replay
protection.</t>

<t>This document does not make any extensions to the types of vouchers.</t>

<t>Time based vouchers are included in this definition, but given that
constrained devices are extremely unlikely to know the correct time, their
use is very unlikely.  Most users of these constrained vouchers will be
online and will use live nonces to provide anti-replay protection.</t>

<t><xref target="I-D.ietf-anima-voucher"/> defined only the voucher artifact, and not the
Voucher Request artifact, which was defined in <xref target="I-D.ietf-anima-bootstrapping-keyinfra"/>.</t>

<t>This document defines both a constrained voucher and a constrained voucher-request.
They are presented in the order voucher-request, followed by voucher response
as this is the time order that they occur.</t>

</section>
<section anchor="artifacts" title="Artifacts">

<t>This section describes the abstract (tree) definition as explained
in <xref target="I-D.ietf-netmod-yang-tree-diagrams"/> first.  This provides a high-level
view of the contents of each artifact.</t>

<t>Then the assigned SID values are presented. These have been assigned using
the rules in <xref target="I-D.ietf-core-yang-cbor"/>, with an allocation that was made
via the http://comi.space service.  ((EDNOTE: it is unclear if there is
further IANA work))</t>

<section anchor="voucher-request-artifact" title="Voucher Request artifact">

<section anchor="tree-diagram" title="Tree Diagram">

<t><figure>
<artwork><![CDATA[
module: ietf-cwt-voucher-request

  grouping voucher-request-cwt-grouping
    +---- voucher
       +---- created-on
       |       yang:date-and-time
       +---- expires-on?
       |       yang:date-and-time
       +---- assertion
       |       enumeration
       +---- serial-number                                  string
       +---- idevid-issuer?                                 binary
       +---- pinned-domain-cert                             binary
       +---- domain-cert-revocation-checks?                 boolean
       +---- nonce?                                         binary
       +---- last-renewal-date?
       |       yang:date-and-time
       +---- proximity-registrar-subject-public-key-info?   binary
]]></artwork>
</figure></t>

</section>
<section anchor="sid-values" title="SID values">

<t><figure>
<artwork><![CDATA[
]]></artwork>
</figure></t>

</section>
<section anchor="yang-module" title="YANG Module">

<t><figure>
<artwork><![CDATA[
<CODE BEGINS> file "ietf-cwt-voucher-request@2017-12-11.yang"
/* -*- c -*- */
module ietf-cwt-voucher-request {
  yang-version 1.1;

  namespace
    "urn:ietf:params:xml:ns:yang:ietf-cwt-voucher-request";
  prefix "vcwt";

  import ietf-voucher {
    prefix "v";
  }

  organization
   "IETF 6tisch Working Group";

  contact
   "WG Web:   <http://tools.ietf.org/wg/6tisch/>
    WG List:  <mailto:6tisch@ietf.org>
    Author:   Michael Richardson
              <mailto:mcr+ietf@sandelman.ca>";

  description
   "This module defines the format for a voucher, which is produced by
    a pledge's manufacturer or delegate (MASA) to securely assign one
    or more pledges to an 'owner', so that the pledges may establish a
    secure connection to the owner's network infrastructure.

    This version provides a very restricted subset appropriate
    for very constrained devices.
    In particular, it assumes that nonce-ful operation is
    always required, that expiration dates are rather weak, as no
    clocks can be assumed, and that the Registrar is identified
    by a pinned Raw Public Key.

    The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL NOT',
    'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'MAY', and 'OPTIONAL' in
    the module text are to be interpreted as described in RFC 2119.";

  revision "2017-12-11" {
    description
     "Initial version";
    reference
     "RFC XXXX: Voucher Profile for Constrained Devices";
  }

  // Grouping defined for future usage
  grouping voucher-request-cwt-grouping {
    description
      "Grouping to allow reuse/extensions in future work.";

    uses v:voucher-artifact-grouping {
      augment "voucher" {
        description "Base the CWT voucher-request upon the regular one";
        leaf proximity-registrar-subject-public-key-info {
          type binary;
          description
            "The proximity-registrar-subject-public-key-info replaces
         the proximit-registrar-cert in constrained uses of
         the voucher-request.
         The proximity-registrar-subject-public-key-info is the
         Raw Public Key of the Registrar. This field is encoded
         as specified in RFC7250, section 3.
         The ECDSA algorithm MUST be supported.
         The EdDSA algorithm as specified in
         draft-ietf-tls-rfc4492bis-17 SHOULD be supported.
         Support for the DSA algorithm is not recommended.
         Support for the RSA algorithm is a MAY.";
        }
      }
    }
  }
}
<CODE ENDS>
]]></artwork>
</figure></t>

</section>
<section anchor="example-voucher-request-artifacts" title="Example voucher request artifacts">

<t>TBD</t>

</section>
</section>
<section anchor="voucher-artifact" title="Voucher artifact">

<t>The voucher's primary purpose is to securely assign a pledge to an
owner.  The voucher informs the pledge which entity it should
consider to be its owner.</t>

<t>This document defines a voucher that is a CBOR encoded instance of
the YANG module defined in Section 5.3 that has been signed with CMS
or with COSE.</t>

</section>
<section anchor="tree-diagram-1" title="Tree Diagram">

<t><figure>
<artwork><![CDATA[
module: ietf-cwt-voucher

  grouping voucher-cwt-grouping
    +---- voucher
       +---- created-on
       |       yang:date-and-time
       +---- expires-on?
       |       yang:date-and-time
       +---- assertion                                enumeration
       +---- serial-number                            string
       +---- idevid-issuer?                           binary
       +---- pinned-domain-cert                       binary
       +---- domain-cert-revocation-checks?           boolean
       +---- nonce?                                   binary
       +---- last-renewal-date?
       |       yang:date-and-time
       +---- pinned-domain-subject-public-key-info?   binary
]]></artwork>
</figure></t>

</section>
<section anchor="sid-values-1" title="SID values">

<t><figure>
<artwork><![CDATA[
           
      SID Assigned to
--------- -------------------------------------------------- 
  1001100 module ietf-cwt-voucher
  1001101 module ietf-restconf
  1001102 module ietf-voucher
  1001103 module ietf-yang-types
  1001104 data .../ietf-cwt-voucher:voucher
  1001105 data .../assertion
  1001106 data .../created-on
  1001107 data .../domain-cert-revocation-checks
  1001108 data .../expires-on
  1001109 data .../idevid-issuer
  1001110 data .../last-renewal-date
  1001111 data .../nonce
  1001112 data .../pinned-domain-cert
  1001113 data .../pinned-domain-subject-public-key-info
  1001114 data .../serial-number
       No .sid file
]]></artwork>
</figure></t>

</section>
<section anchor="yang-module-1" title="YANG Module">

<t><figure>
<artwork><![CDATA[
<CODE BEGINS> file "ietf-cwt-voucher@2017-12-11.yang"
/* -*- c -*- */
module ietf-cwt-voucher {
  yang-version 1.1;

  namespace
    "urn:ietf:params:xml:ns:yang:ietf-cwt-voucher";
  prefix "vcwt";

  import ietf-voucher {
    prefix "v";
  }

  organization
   "IETF 6tisch Working Group";

  contact
   "WG Web:   <http://tools.ietf.org/wg/6tisch/>
    WG List:  <mailto:6tisch@ietf.org>
    Author:   Michael Richardson
              <mailto:mcr+ietf@sandelman.ca>";

  description
   "This module defines the format for a voucher, which is produced by
    a pledge's manufacturer or delegate (MASA) to securely assign one
    or more pledges to an 'owner', so that the pledges may establish a
    secure connection to the owner's network infrastructure.

    This version provides a very restricted subset appropriate
    for very constrained devices.
    In particular, it assumes that nonce-ful operation is
    always required, that expiration dates are rather weak, as no
    clocks can be assumed, and that the Registrar is identified
    by a pinned Raw Public Key.

    The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL NOT',
    'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'MAY', and 'OPTIONAL' in
    the module text are to be interpreted as described in RFC 2119.";

  revision "2017-12-11" {
    description
     "Initial version";
    reference
     "RFC XXXX: Voucher Profile for Constrained Devices";
  }

  // Grouping defined for future usage
  grouping voucher-cwt-grouping {
    description
      "Grouping to allow reuse/extensions in future work.";

    uses v:voucher-artifact-grouping {
      augment "voucher" {
        description "Base the CWT voucher upon the regular one";
        leaf pinned-domain-subject-public-key-info {
          type binary;
          description
            "The pinned-domain-subject replaces the
         pinned-domain-certificate in constrained uses of
         the voucher.  The pinned-domain-public-key-info is the
         Raw Public Key of the Registrar. This field is encoded
         as specified in RFC7250, section 3.
         The ECDSA algorithm MUST be supported.
         The EdDSA algorithm as specified in
         draft-ietf-tls-rfc4492bis-17 SHOULD be supported.
         Support for the DSA algorithm is not recommended.
         Support for the RSA algorithm is a MAY.";
        }
      }
    }
  }
}
<CODE ENDS>
]]></artwork>
</figure></t>

<section anchor="example-voucher-artifacts" title="Example voucher artifacts">

<t>TBD</t>

</section>
</section>
<section anchor="cms-format-voucher-and-voucher-request-artifacts" title="CMS format voucher and voucher-request artifacts">

</section>
<section anchor="cose-format-voucher-and-voucher-request-artifacts" title="COSE format voucher and voucher-request artifacts">

</section>
</section>
<section anchor="design-considerations" title="Design Considerations">

<section anchor="renewals-instead-of-revocations" title="Renewals instead of Revocations">

</section>
<section anchor="voucher-per-pledge" title="Voucher Per Pledge">

</section>
</section>
<section anchor="security-considerations" title="Security Considerations">

<section anchor="clock-sensitivity" title="Clock Sensitivity">
<t>## Protect Voucher PKI in HSM
## Test Domain Certificate Validity when Signing</t>

</section>
</section>
<section anchor="iana-considerations" title="IANA Considerations">

<section anchor="the-ietf-xml-registry" title="The IETF XML Registry">

<t>This document registers two URIs in the IETF XML registry [RFC3688].
Following the format in [RFC3688], the following registration is
requested:</t>

<figure><artwork><![CDATA[
  URI: urn:ietf:params:xml:ns:yang:ietf-cwt-voucher
  Registrant Contact: The ANIMA WG of the IETF.
  XML: N/A, the requested URI is an XML namespace.

  URI: urn:ietf:params:xml:ns:yang:ietf-cwt-voucher-request
  Registrant Contact: The ANIMA WG of the IETF.
  XML: N/A, the requested URI is an XML namespace.
]]></artwork></figure>

</section>
<section anchor="the-yang-module-names-registry" title="The YANG Module Names Registry">

<t>This document registers two YANG modules in the YANG Module Names
registry [RFC6020].  Following the format defined in [RFC6020], the
the following registration is requested:</t>

<figure><artwork><![CDATA[
  name:         ietf-cwt-voucher
  namespace:    urn:ietf:params:xml:ns:yang:ietf-cwt-voucher
  prefix:       vch
  reference:    RFC XXXX

  name:         ietf-cwt-voucher-request
  namespace:    urn:ietf:params:xml:ns:yang:ietf-cwt-voucher-request
  prefix:       vch
  reference:    RFC XXXX
]]></artwork></figure>

</section>
<section anchor="the-smi-security-for-smime-cms-content-type-registry" title="The SMI Security for S/MIME CMS Content Type Registry">

<t>This document registers an OID in the "SMI Security for S/MIME CMS
Content Type" registry (1.2.840.113549.1.9.16.1), with the value:</t>

<figure><artwork><![CDATA[
  Decimal  Description                             References
  -------  --------------------------------------  ----------
  TBD1      id-ct-animaCBORVoucher                 [ThisRFC]
]]></artwork></figure>

<t>XXX: should a seperate value be used for Voucher Requests?</t>

</section>
<section anchor="the-sid-registry" title="The SID registry">

<t>The SID range 1001100 was allocated by comi.space to the IETF-CWT-VOUCHER
yang module.</t>

<t>The SID range 1001150 was allocated by comi.space to the IETF-CWT-VOUCHER-REQUEST
yang module.</t>

<t>EDNOTE: it is unclear if there is further IANA work required.</t>

</section>
</section>
<section anchor="acknowledgements" title="Acknowledgements">

<t>TBD</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>

&RFC2119;
&RFC7049;
&I-D.ietf-core-yang-cbor;
&I-D.ietf-core-sid;
&RFC7250;
&RFC5652;
&RFC8152;
&I-D.ietf-anima-voucher;
&I-D.ietf-anima-bootstrapping-keyinfra;
&I-D.ietf-core-object-security;
&I-D.ietf-ace-cbor-web-token;
&I-D.vanderstok-ace-coap-est;
<reference anchor="ieee802-1AR" target="http://standards.ieee.org/findstds/standard/802.1AR-2009.html">
  <front>
    <title>IEEE 802.1AR Secure Device Identifier</title>
    <author initials="." surname="IEEE Standard">
      <organization></organization>
    </author>
    <date year="2009"/>
  </front>
</reference>


    </references>

    <references title='Informative References'>

&I-D.ietf-netmod-yang-tree-diagrams;
<reference anchor="pledge" target="http://dictionary.reference.com/browse/pledge">
  <front>
    <title>Dictionary.com Unabridged</title>
    <author initials="." surname="Dictionary.com" fullname="Dictionary.com">
      <organization></organization>
    </author>
    <date year="2015"/>
  </front>
</reference>
<reference anchor="duckling" target="https://www.cl.cam.ac.uk/~fms27/papers/1999-StajanoAnd-duckling.pdf">
  <front>
    <title>The resurrecting duckling: security issues for ad-hoc wireless networks</title>
    <author initials="F." surname="Stajano" fullname="Frank Stajano">
      <organization></organization>
    </author>
    <author initials="R." surname="Anderson" fullname="Ross Anderson">
      <organization></organization>
    </author>
    <date year="1999"/>
  </front>
</reference>


    </references>




  </back>

<!-- ##markdown-source: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-->

</rfc>

