<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.21 -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<?rfc linkmailto="no"?>
<?rfc editing="no"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc rfcedstyle="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-richardson-anima-rfc8366bis-03" category="std" consensus="yes" tocInclude="true" sortRefs="true" symRefs="true" obsoletes="" updates="" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.5.0 -->
  <front>
    <title abbrev="Voucher Profile">A Voucher Artifact for Bootstrapping Protocols</title>
    <seriesInfo name="Internet-Draft" value="draft-richardson-anima-rfc8366bis-03"/>
    <author initials="K." surname="Watsen" fullname="Kent Watsen">
      <organization>Juniper Networks</organization>
      <address>
        <email>kwatsen@juniper.net</email>
      </address>
    </author>
    <author initials="M." surname="Richardson" fullname="Michael C. Richardson">
      <organization>Sandelman Software</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
        <uri>http://www.sandelman.ca/</uri>
      </address>
    </author>
    <author initials="M." surname="Pritikin" fullname="Max Pritikin">
      <organization>Cisco Systems</organization>
      <address>
        <email>pritikin@cisco.com</email>
      </address>
    </author>
    <author initials="T." surname="Eckert" fullname="Toerless Eckert">
      <organization abbrev="Huawei">Futurewei Technologies Inc.</organization>
      <address>
        <postal>
          <street>2330 Central Expy</street>
          <city>Santa Clara</city>
          <code>95050</code>
          <country>United States of America</country>
        </postal>
        <email>tte+ietf@cs.fau.de</email>
      </address>
    </author>
    <date year="2021" month="December"/>
    <area>Operations</area>
    <workgroup>ANIMA Working Group</workgroup>
    <keyword>voucher</keyword>
    <abstract>
      <t>This document defines a strategy to securely assign a pledge to an owner
using an artifact signed, directly or indirectly, by the pledge's manufacturer.
This artifact is known as a "voucher".</t>
      <t>This document defines an artifact format as a YANG-defined JSON document
that has been signed using a Cryptographic Message Syntax (CMS) structure.
Other YANG-derived formats are possible.
The voucher artifact is normally generated by
the pledge's manufacturer (i.e., the Manufacturer Authorized Signing
Authority (MASA)).</t>
      <t>This document only defines the voucher artifact, leaving it to other
documents to describe specialized protocols for accessing it.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
  Autonomic Networking Integrated Model and Approach Working Group mailing list (anima@ietf.org),
  which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/anima/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
  <eref target="https://github.com/anima-wg/voucher"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>This document defines a strategy to securely assign a candidate device
(pledge) to an owner using an artifact signed, directly or indirectly,
by the pledge's manufacturer, i.e., the Manufacturer Authorized
Signing Authority (MASA).  This artifact is known as the "voucher".</t>
      <t>The voucher artifact is a JSON <xref target="RFC8259" format="default"/> document that
conforms with a data model described by YANG <xref target="RFC7950" format="default"/>, is
encoded using the rules defined in <xref target="RFC8259" format="default"/>, and
is signed using (by default) a CMS structure <xref target="RFC5652" format="default"/>.</t>
      <t>The primary purpose of a voucher is to securely convey a
certificate, the "pinned-domain-cert", that a pledge can
use to authenticate subsequent interactions. A voucher may be useful
in several contexts, but the driving motivation
herein is to support secure bootstrapping mechanisms.  Assigning
ownership is important to bootstrapping mechanisms so that the pledge
can authenticate the network that is trying to take control of it.</t>
      <t>The lifetimes of vouchers may vary. In some bootstrapping protocols,
the vouchers may include a nonce restricting them to a single use,
whereas the vouchers in other bootstrapping protocols may have an
indicated lifetime. In order to support long lifetimes, this document
recommends using short lifetimes with programmatic renewal, see
<xref target="renewal-over-revocation" format="default"/>.</t>
      <t>This document only defines the voucher artifact, leaving it to other
documents to describe specialized protocols for accessing it.
Some bootstrapping protocols using the voucher artifact defined in
this document include: <xref target="ZERO-TOUCH" format="default"/>, <xref target="SECUREJOIN" format="default"/>, and
<xref target="BRSKI" format="default"/>).</t>
    </section>
    <section anchor="terminology" numbered="true" toc="default">
      <name>Terminology</name>
      <t>This document uses the following terms:</t>
      <dl>
        <dt>
Artifact:  </dt>
        <dd>
          <t>Used throughout to represent the voucher as instantiated in the form
of a signed structure.</t>
        </dd>
        <dt>
Domain:  </dt>
        <dd>
          <t>The set of entities or infrastructure under common administrative
control.
The goal of the bootstrapping protocol is to enable a pledge to
discover and join a domain.</t>
        </dd>
        <dt>
Imprint:  </dt>
        <dd>
          <t>The process where a device obtains the cryptographic key material to
identify and trust future interactions with a network. This term is
taken from Konrad Lorenz's work in biology with new ducklings:
"during a critical period, the duckling would assume that anything
that looks like a mother duck is in fact their mother"
<xref target="Stajano99theresurrecting" format="default"/>. An equivalent for a device is to
obtain the fingerprint of the network's root certification authority
certificate. A device that imprints on an attacker suffers a similar
fate to a duckling that imprints on a hungry wolf. Imprinting is a
term from psychology and ethology, as described in <xref target="imprinting" format="default"/>.</t>
        </dd>
        <dt>
Join Registrar (and Coordinator):  </dt>
        <dd>
          <t>A representative of the domain that is configured, perhaps
autonomically, to decide whether a new device is allowed to join the
domain. The administrator of the domain interfaces with a join
registrar (and Coordinator) to control this process.
Typically, a join registrar is "inside" its domain. For simplicity,
this document often refers to this as just "registrar".</t>
        </dd>
        <dt>
MASA (Manufacturer Authorized Signing Authority):  </dt>
        <dd>
          <t>The entity that, for the purpose of this document, signs the
vouchers for a manufacturer's pledges.
In some bootstrapping protocols, the MASA may have an Internet
presence and be integral to the bootstrapping process, whereas in
other protocols the MASA may be an offline service that has no
active role in the bootstrapping process.</t>
        </dd>
        <dt>
Owner:  </dt>
        <dd>
          <t>The entity that controls the private key of the "pinned-domain-cert"
certificate conveyed by the voucher.</t>
        </dd>
        <dt>
Pledge:  </dt>
        <dd>
          <t>The prospective device attempting to find and securely join a
domain.
When shipped, it only trusts authorized representatives of the
manufacturer.</t>
        </dd>
        <dt>
Registrar:  </dt>
        <dd>
          <t>See join registrar.</t>
        </dd>
        <dt>
TOFU (Trust on First Use):  </dt>
        <dd>
          <t>Where a pledge device makes no security decisions but rather simply
trusts the first domain entity it is contacted by.
Used similarly to <xref target="RFC7435" format="default"/>.
This is also known as the "resurrecting duckling" model.</t>
        </dd>
        <dt>
Voucher:  </dt>
        <dd>
          <t>A signed statement from the MASA service that indicates to a pledge
the cryptographic identity of the domain it should trust.</t>
        </dd>
      </dl>
    </section>
    <section anchor="requirements-language" numbered="true" toc="default">
      <name>Requirements Language</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP&nbsp;14 <xref target="RFC2119" format="default"/> <xref target="RFC8174" format="default"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="survey-of-voucher-types" numbered="true" toc="default">
      <name>Survey of Voucher Types</name>
      <t>A voucher is a cryptographically protected statement to the pledge
device authorizing a zero-touch "imprint" on the join registrar of the
domain. The specific information a voucher provides is influenced by the
bootstrapping use case.</t>
      <t>The voucher can impart the following information to
the join registrar and pledge:</t>
      <dl>
        <dt>
Assertion Basis:  </dt>
        <dd>
          <t>Indicates the method that protects
the imprint (this is distinct from the voucher signature that
protects the voucher itself). This might include
manufacturer-asserted ownership verification, assured
logging operations, or reliance on pledge endpoint behavior
such as secure root of trust
of measurement. The join registrar might use this information.
Only some methods are normatively defined in this
document. Other methods are left for future work.</t>
        </dd>
        <dt>
Authentication of Join Registrar:  </dt>
        <dd>
          <t>Indicates how the pledge
can authenticate the join registrar.  This document defines
a mechanism to pin the domain certificate.
Pinning a symmetric key, a raw key, or "CN-ID" or "DNS-ID"
information (as defined in <xref target="RFC6125" format="default"/>) is left for future work.</t>
        </dd>
        <dt>
Anti-Replay Protections:  </dt>
        <dd>
          <t>Time- or nonce-based
information to constrain the voucher to time periods or bootstrap
attempts.</t>
        </dd>
      </dl>
      <t>A number of bootstrapping scenarios can be met using differing
combinations of this information. All scenarios address the primary
threat of a Man-in-The-Middle (MiTM) registrar gaining control over
the pledge device. The following combinations are "types" of vouchers:</t>
      <artwork name="" type="" align="left" alt=""><![CDATA[
             |Assertion   |Registrar ID    | Validity    |
Voucher      |Log-|Veri-  |Trust  |CN-ID or| RTC | Nonce |
Type         | ged|  fied |Anchor |DNS-ID  |     |       |
---------------------------------------------------------|
Audit        |  X |       | X     |        |     | X     |
-------------|----|-------|-------|--------|-----|-------|
Nonceless    |  X |       | X     |        | X   |       |
Audit        |    |       |       |        |     |       |
-------------|----|-------|-------|--------|-----|-------|
Owner Audit  |  X |   X   | X     |        | X   | X     |
-------------|----|-------|-------|--------|-----|-------|
Owner ID     |    |   X   | X     |  X     | X   |       |
-------------|----|-------|----------------|-----|-------|
Bearer       |  X |       |   wildcard     | optional    |
out-of-scope |    |       |                |             |
-------------|----|-------|----------------|-------------|

NOTE: All voucher types include a 'pledge ID serial-number'
      (not shown here for space reasons).
]]></artwork>
      <dl>
        <dt>
Audit Voucher:  </dt>
        <dd>
          <t>An Audit Voucher is named after the logging assertion mechanisms
that the registrar then "audits" to enforce local policy. The
registrar mitigates a MiTM registrar by auditing that an unknown
MiTM registrar does not appear in the log entries. This does not
directly prevent the MiTM but provides a response mechanism that
ensures the MiTM is unsuccessful. The advantage is that actual
ownership knowledge is not required on the MASA service.</t>
        </dd>
        <dt>
Nonceless Audit Voucher:  </dt>
        <dd>
          <t>An Audit Voucher without a validity period statement. Fundamentally,
it is the same as an Audit Voucher except that it can be issued in
advance to support network partitions or to provide a permanent
voucher for remote deployments.</t>
        </dd>
        <dt>
Ownership Audit Voucher:  </dt>
        <dd>
          <t>An Audit Voucher where the MASA service has verified the registrar
as the authorized owner.
The MASA service mitigates a MiTM registrar by refusing to generate
Audit Vouchers for unauthorized registrars. The registrar uses audit
techniques to supplement the MASA. This provides an ideal sharing of
policy decisions and enforcement between the vendor and the owner.</t>
        </dd>
        <dt>
Ownership ID Voucher:  </dt>
        <dd>
          <t>Named after inclusion of the pledge's CN-ID or DNS-ID within the
voucher. The MASA service mitigates a MiTM registrar by identifying
the specific registrar (via WebPKI) authorized to own the pledge.</t>
        </dd>
        <dt>
Bearer Voucher:  </dt>
        <dd>
          <t>A Bearer Voucher is named after the inclusion of a registrar ID
wildcard. Because the registrar identity is not indicated, this
voucher type must be treated as a secret and protected from exposure
as any 'bearer' of the voucher can claim the pledge
device. Publishing a nonceless bearer voucher effectively turns the
specified pledge into a "TOFU" device with minimal mitigation
against MiTM registrars. Bearer vouchers are out of scope.</t>
        </dd>
      </dl>
    </section>
    <section anchor="voucher" numbered="true" toc="default">
      <name>Voucher Artifact</name>
      <t>The voucher's primary purpose is to securely assign a pledge to an
owner.
The voucher informs the pledge which entity it should consider to be
its owner.</t>
      <t>This document defines a voucher that is a JSON-encoded instance of the
YANG module defined in <xref target="voucher-yang-module" format="default"/> that has been, by
default, CMS signed.</t>
      <t>This format is described here as a practical basis for some uses (such
as in NETCONF), but more to clearly indicate what vouchers look like
in practice.
This description also serves to validate the YANG data model.</t>
      <t>Future work is expected to define new mappings of the voucher to
Concise Binary Object Representation (CBOR) (from JSON) and to change
the signature container from CMS to JSON Object Signing and Encryption
(JOSE) or CBOR Object Signing and Encryption (COSE).
XML or ASN.1 formats are also conceivable.</t>
      <t>This document defines a media type and a filename extension for the
CMS-encoded JSON type.  Future documents on additional formats
would define additional media types.  Signaling is in the form of a MIME
Content-Type, an HTTP Accept: header, or more mundane methods like
use of a filename extension when a voucher is transferred on a USB
key.</t>
      <section anchor="voucher-tree-diagram" numbered="true" toc="default">
        <name>Tree Diagram</name>
        <t>The following tree diagram illustrates a high-level view of a voucher
document.
The notation used in this diagram is described in <xref target="RFC8340" format="default"/>.
Each node in the diagram is fully described by the YANG module in
<xref target="voucher-yang-module" format="default"/>.
Please review the YANG module for a detailed description of the
voucher format.</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
module: ietf-voucher

  grouping voucher-artifact-grouping
    +-- voucher
       +-- created-on                       yang:date-and-time
       +-- expires-on?                      yang:date-and-time
       +-- assertion                        ianavat:voucher-assertion
       +-- serial-number                    string
       +-- idevid-issuer?                   binary
       +-- pinned-domain-cert               binary
       +-- domain-cert-revocation-checks?   boolean
       +-- nonce?                           binary
       +-- last-renewal-date?               yang:date-and-time
]]></artwork>
      </section>
      <section anchor="voucher-examples" numbered="true" toc="default">
        <name>Examples</name>
        <t>This section provides voucher examples for illustration
purposes.  These examples conform to the encoding rules
defined in <xref target="RFC8259" format="default"/>.</t>
        <t>The following example illustrates an ephemeral voucher (uses a nonce).
The MASA generated this voucher using the 'logged' assertion type, knowing
that it would be suitable for the pledge making the request.</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
{
  "ietf-voucher:voucher": {
    "created-on": "2016-10-07T19:31:42Z",
    "assertion": "logged",
    "serial-number": "JADA123456789",
    "idevid-issuer": "base64encodedvalue==",
    "pinned-domain-cert": "base64encodedvalue==",
    "nonce": "base64encodedvalue=="
  }
}
]]></artwork>
        <t>The following example illustrates a non-ephemeral voucher (no nonce).
While the voucher itself expires after two weeks, it presumably can
be renewed for up to a year.   The MASA generated this voucher
using the 'verified' assertion type, which should satisfy all pledges.</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
{
  "ietf-voucher:voucher": {
    "created-on": "2016-10-07T19:31:42Z",
    "expires-on": "2016-10-21T19:31:42Z",
    "assertion": "verified",
    "serial-number": "JADA123456789",
    "idevid-issuer": "base64encodedvalue==",
    "pinned-domain-cert": "base64encodedvalue==",
    "domain-cert-revocation-checks": "true",
    "last-renewal-date": "2017-10-07T19:31:42Z"
  }
}
]]></artwork>
      </section>
      <section anchor="voucher-yang-module" numbered="true" toc="default">
        <name>YANG Module</name>
        <section anchor="iana-voucher-assertion-type-module" numbered="true" toc="default">
          <name>"iana-voucher-assertion-type" Module</name>
          <t>Following is a YANG <xref target="RFC7950" format="default"/> module formally
describing the voucher's assertion type.</t>
          <sourcecode type="yang" markers="true">
 module iana-voucher-assertion-type {
  namespace "urn:ietf:params:xml:ns:yang:iana-voucher-assertion-type";
  prefix ianavat;

  organization
    "IETF ANIMA Working Group";
  contact
    "WG Web:   &lt;https://datatracker.ietf.org/wg/anima/&gt;
     WG List:  &lt;mailto:anima@ietf.org&gt;
     Author:   Kent Watsen
               &lt;mailto:kwatsen@juniper.net&gt;
     Author:   Max Pritikin
               &lt;mailto:pritikin@cisco.com&gt;
     Author:   Michael Richardson
               &lt;mailto:mcr+ietf@sandelman.ca&gt;
     Author:   Toerless Eckert
               &lt;mailto:tte+ietf@cs.fau.de&gt;";
  description
    "This YANG module defines a YANG enumeration type for IANA
     -registered voucher assertion type. This YANG module is
     maintained by IANA and reflects the 'voucher assertion types'
     registry. The lastest revision of this YANG module can be
     obtained from the IANA web site.  Request for new enumerations
     should be made to IANA via email(iana@iana.org).

     The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
     NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
     'MAY', and 'OPTIONAL' in this document are to be interpreted as
     described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
     they appear in all capitals, as shown here.

     Copyright (c) 2018 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject to
     the license terms contained in, the Simplified BSD License set
     forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC XXX; see the
     RFC itself for full legal notices.";

  revision 2021-07-04 {
    description
      "Initial version";
    reference "RFC ZZZZ: Voucher Profile for Bootstrapping Protocols";
  }

  typedef voucher-assertion {
    description "Indicates what kind of ownership is being asserted by voucher";
    type enumeration {
      enum verified {
        value 0;
        description
          "Indicates that the ownership has been positively verified
           by the MASA (e.g., through sales channel integration).";
      }
      enum logged {
        value 1;
        description
          "Indicates that the voucher has been issued after
           minimal verification of ownership or control.  The
           issuance has been logged for detection of
           potential security issues (e.g., recipients of
           vouchers might verify for themselves that unexpected
           vouchers are not in the log).  This is similar to
           unsecured trust-on-first-use principles but with the
           logging providing a basis for detecting unexpected
           events.";
      }
      enum proximity {
        value 2;
        description
          "Indicates that the voucher has been issued after
           the MASA verified a proximity proof provided by the
           device and target domain.  The issuance has been logged
           for detection of potential security issues.  This is
           stronger than just logging, because it requires some
           verification that the pledge and owner are
           in communication but is still dependent on analysis of
           the logs to detect unexpected events.";
      }
      enum agent-proximity {
        value 3;
        description
          "Indicates that the voucher has been issued after the
           MASA...support of asynchronous enrollment in BRSKI";
     }
    }
  }
}
</sourcecode>
        </section>
        <section anchor="ietf-voucher-module" numbered="true" toc="default">
          <name>"ietf-voucher" Module</name>
          <t>The revised ietf-voucher YANG module imports the typedef defined in
"iana-voucher-assertion-type" YANG module specified in this document.</t>
          <sourcecode type="yang" markers="true">
module ietf-voucher {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-voucher";
  prefix vch;

  import ietf-yang-types {
    prefix yang;
    reference "RFC 6991: Common YANG Data Types";
  }
  import ietf-restconf {
    prefix rc;
    description
      "This import statement is only present to access
       the yang-data extension defined in RFC 8040.";
    reference "RFC 8040: RESTCONF Protocol";
  }

  import iana-voucher-assertion-type {
    prefix ianavat;
    reference "RFCZZZZ: Voucher Profile for Bootstrapping Protocols";
  }

  organization
    "IETF ANIMA Working Group";
  contact
    "WG Web:   &lt;https://datatracker.ietf.org/wg/anima/&gt;
     WG List:  &lt;mailto:anima@ietf.org&gt;
     Author:   Kent Watsen
               &lt;mailto:kwatsen@juniper.net&gt;
     Author:   Max Pritikin
               &lt;mailto:pritikin@cisco.com&gt;
     Author:   Michael Richardson
               &lt;mailto:mcr+ietf@sandelman.ca&gt;
     Author:   Toerless Eckert
               &lt;mailto:tte+ietf@cs.fau.de&gt;";
  description
    "This module defines the format for a voucher, which is produced by
     a pledge's manufacturer or delegate (MASA) to securely assign a
     pledge to an 'owner', so that the pledge may establish a secure
     connection to the owner's network infrastructure.

     The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
     NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
     'MAY', and 'OPTIONAL' in this document are to be interpreted as
     described in BCP 14 (RFC 2119) (RFC 8174) when, and only when, they
     appear in all capitals, as shown here.

     Copyright (c) 2018 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or without
     modification, is permitted pursuant to, and subject to the license
     terms contained in, the Simplified BSD License set forth in Section
     4.c of the IETF Trust's Legal Provisions Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC 8366; see the RFC
     itself for full legal notices.";

  revision 2021-07-04 {
    description
      "updated to support new assertion enumerated type";
    reference "RFC ZZZZ Voucher Profile for Bootstrapping Protocols";
  }

  // Top-level statement
  rc:yang-data voucher-artifact {
    uses voucher-artifact-grouping;
  }

  // Grouping defined for future augmentations

  grouping voucher-artifact-grouping {
    description
      "Grouping to allow reuse/extensions in future work.";
    container voucher {
      description
        "A voucher assigns a pledge to an owner (pinned-domain-cert).";
      leaf created-on {
        type yang:date-and-time;
        mandatory true;
        description
          "A value indicating the date this voucher was created.  This
           node is primarily for human consumption and auditing. Future
           work MAY create verification requirements based on this
           node.";
      }
      leaf expires-on {
        type yang:date-and-time;
        must 'not(../nonce)';
        description
          "A value indicating when this voucher expires.  The node is
           optional as not all pledges support expirations, such as
           pledges lacking a reliable clock.

           If this field exists, then the pledges MUST ensure that
           the expires-on time has not yet passed. A pledge without
           an accurate clock cannot meet this requirement.

           The expires-on value MUST NOT exceed the expiration date
           of any of the listed 'pinned-domain-cert' certificates.";
      }
      leaf assertion {
        type ianavat:voucher-assertion;
        mandatory true;
        description
          "The assertion is a statement from the MASA regarding how
           the owner was verified.  This statement enables pledges
           to support more detailed policy checks.  Pledges MUST
           ensure that the assertion provided is acceptable, per
           local policy, before processing the voucher.";
      }
      leaf serial-number {
        type string;
        mandatory true;
        description
          "The serial-number of the hardware.  When processing a
           voucher, a pledge MUST ensure that its serial-number
           matches this value.  If no match occurs, then the
           pledge MUST NOT process this voucher.";
      }
      leaf idevid-issuer {
        type binary;
        description
          "The Authority Key Identifier OCTET STRING (as defined in
           Section 4.2.1.1 of RFC 5280) from the pledge's IDevID
           certificate.  Optional since some serial-numbers are
           already unique within the scope of a MASA.
           Inclusion of the statistically unique key identifier
           ensures statistically unique identification of the hardware.
           When processing a voucher, a pledge MUST ensure that its
           IDevID Authority Key Identifier matches this value.  If no
           match occurs, then the pledge MUST NOT process this voucher.

           When issuing a voucher, the MASA MUST ensure that this field
           is populated for serial-numbers that are not otherwise unique
           within the scope of the MASA.";
      }
      leaf pinned-domain-cert {
        type binary;
        mandatory true;
        description
          "An X.509 v3 certificate structure, as specified by RFC 5280,
           using Distinguished Encoding Rules (DER) encoding, as defined
           in ITU-T X.690.

           This certificate is used by a pledge to trust a Public Key
           Infrastructure in order to verify a domain certificate
           supplied to the pledge separately by the bootstrapping
           protocol.  The domain certificate MUST have this certificate
           somewhere in its chain of certificates.  This certificate
           MAY be an end-entity certificate, including a self-signed
           entity.";
        reference
          "RFC 5280:
             Internet X.509 Public Key Infrastructure Certificate
             and Certificate Revocation List (CRL) Profile.
           ITU-T X.690:
              Information technology - ASN.1 encoding rules:
              Specification of Basic Encoding Rules (BER),
              Canonical Encoding Rules (CER) and Distinguished
              Encoding Rules (DER).";
      }
      leaf domain-cert-revocation-checks {
        type boolean;
        description
          "A processing instruction to the pledge that it MUST (true)
           or MUST NOT (false) verify the revocation status for the
           pinned domain certificate.  If this field is not set, then
           normal PKIX behavior applies to validation of the domain
           certificate.";
      }
      leaf nonce {
        type binary {
          length "8..32";
        }
        must 'not(../expires-on)';
        description
          "A value that can be used by a pledge in some bootstrapping
           protocols to enable anti-replay protection.  This node is
           optional because it is not used by all bootstrapping
           protocols.

           When present, the pledge MUST compare the provided nonce
           value with another value that the pledge randomly generated
           and sent to a bootstrap server in an earlier bootstrapping
           message.  If the values do not match, then the pledge MUST
           NOT process this voucher.";
      }
      leaf last-renewal-date {
        type yang:date-and-time;
        must '../expires-on';
        description
          "The date that the MASA projects to be the last date it
           will renew a voucher on. This field is merely informative; it
           is not processed by pledges.

           Circumstances may occur after a voucher is generated that
           may alter a voucher's validity period.  For instance, a
           vendor may associate validity periods with support contracts,
           which may be terminated or extended over time.";
      }
    } // end voucher
  } // end voucher-grouping
}
</sourcecode>
        </section>
      </section>
      <section anchor="cms-voucher" numbered="true" toc="default">
        <name>CMS Format Voucher Artifact</name>
        <t>The IETF evolution of PKCS#7 is CMS <xref target="RFC5652" format="default"/>.
A CMS-signed voucher, the default type, contains a ContentInfo
structure with the voucher content. An eContentType of 40
indicates that the content is a JSON-encoded voucher.</t>
        <t>The signing structure is a CMS SignedData structure, as specified by
Section 5.1 of <xref target="RFC5652" format="default"/>, encoded using ASN.1 Distinguished Encoding
Rules (DER), as specified in ITU-T X.690 <xref target="ITU-T.X690.2015" format="default"/>.</t>
        <t>To facilitate interoperability, <xref target="vcj" format="default"/> in this document registers the
media type "application/voucher-cms+json" and the filename extension
".vcj".</t>
        <t>The CMS structure <bcp14>MUST</bcp14> contain a 'signerInfo' structure, as
described in Section 5.1 of <xref target="RFC5652" format="default"/>, containing the
signature generated over the content using a private key
trusted by the recipient. Normally, the recipient is the pledge and the
signer is the MASA. Another possible use could be as a "signed
voucher request" format originating from the pledge or registrar
toward the MASA.
Within this document, the signer is assumed to be the MASA.</t>
        <t>Note that Section 5.1 of <xref target="RFC5652" format="default"/> includes a
discussion about how to validate a CMS object, which is really a
PKCS7 object (cmsVersion=1).  Intermediate systems (such the
Bootstrapping Remote Secure Key Infrastructures <xref target="BRSKI" format="default"/> registrar)
that might need to evaluate the voucher in flight <bcp14>MUST</bcp14> be prepared for
such an older format.
No signaling is necessary, as the manufacturer knows the capabilities
of the pledge and will use an appropriate format voucher for each
pledge.</t>
        <t>The CMS structure <bcp14>SHOULD</bcp14> also contain all of the certificates
leading up to and including the signer's trust anchor certificate
known to the recipient.  The inclusion of the trust anchor is
unusual in many applications, but third parties cannot accurately
audit the transaction without it.</t>
        <t>The CMS structure <bcp14>MAY</bcp14> also contain revocation objects for any
intermediate certificate authorities (CAs) between the
voucher issuer and the trust anchor known to the recipient.
However, the use of CRLs and other validity mechanisms is
discouraged, as the pledge is unlikely to be able to perform
online checks and is unlikely to have a trusted clock source.
As described below, the use of short-lived vouchers and/or a
pledge-provided nonce provides a freshness guarantee.</t>
      </section>
    </section>
    <section anchor="design-con" numbered="true" toc="default">
      <name>Design Considerations</name>
      <section anchor="renewal-over-revocation" numbered="true" toc="default">
        <name>Renewals Instead of Revocations</name>
        <t>The lifetimes of vouchers may vary.  In some bootstrapping protocols,
the vouchers may be created and consumed immediately, whereas in other
bootstrapping solutions, there may be a significant time delay between
when a voucher is created and when it is consumed.
In cases when there is a time delay, there is a need for the pledge
to ensure that the assertions made when the voucher was created are
still valid.</t>
        <t>A revocation artifact is generally used to verify the continued validity
of an assertion such as a PKIX certificate, web token, or a "voucher".  With
this approach, a potentially long-lived assertion is paired with a reasonably
fresh revocation status check to ensure that the assertion is still valid.
However, this approach increases solution complexity, as it introduces the
need for additional protocols and code paths to distribute and process the
revocations.</t>
        <t>Addressing the shortcomings of revocations, this document recommends
instead the use of lightweight renewals of short-lived non-revocable
vouchers.  That is, rather than issue a long-lived voucher, where the
'expires-on' leaf is set to some distant date, the expectation
is for the MASA to instead issue a short-lived voucher, where the
'expires-on' leaf is set to a relatively near date, along with a promise
(reflected in the 'last-renewal-date' field) to reissue the voucher again
when needed.  Importantly, while issuing the initial voucher may incur
heavyweight verification checks ("Are you who you say you are?" "Does the
pledge actually belong to you?"), reissuing the voucher should be a
lightweight process, as it ostensibly only updates the voucher's
validity period.
With this approach, there is
only the one artifact, and only one code path is needed to process
it; there is no possibility of a pledge choosing to skip the
revocation status check because, for instance, the OCSP Responder is
not reachable.</t>
        <t>While this document recommends issuing short-lived vouchers, the
voucher artifact does not restrict the ability to create long-lived
voucher, if required; however, no revocation method is described.</t>
        <t>Note that a voucher may be signed by a chain of intermediate CAs
leading up to the trust anchor certificate known by the pledge.  Even
though the voucher itself is not revocable, it may still be revoked,
per se, if one of the intermediate CA certificates is revoked.</t>
      </section>
      <section anchor="voucher-per-pledge" numbered="true" toc="default">
        <name>Voucher Per Pledge</name>
        <t>The solution described herein originally enabled a single voucher to
apply to many pledges, using lists of regular expressions to represent
ranges of serial-numbers.  However, it was determined that blocking the
renewal of a voucher that applied to many devices would be excessive
when only the ownership for a single pledge needed to be blocked.
Thus, the voucher format now only supports a single serial-number
to be listed.</t>
      </section>
    </section>
    <section anchor="sec-con" numbered="true" toc="default">
      <name>Security Considerations</name>
      <section anchor="clock-sensitivity" numbered="true" toc="default">
        <name>Clock Sensitivity</name>
        <t>An attacker could use an expired voucher to gain control over
a device that has no understanding of time.  The device cannot
trust NTP as a time reference, as an attacker could control
the NTP stream.</t>
        <t>There are three things to defend against this: 1) devices are
required to verify that the expires-on field has not yet passed,
2) devices without access to time can use nonces to
get ephemeral vouchers, and 3) vouchers without expiration times
may be used, which will appear in the audit log, informing the
security decision.</t>
        <t>This document defines a voucher format that  contains time values
for expirations, which require an accurate clock
in order to be processed correctly.  Vendors planning on
issuing vouchers with expiration values must ensure that devices
have an accurate clock when shipped from manufacturing
facilities and take steps to prevent clock tampering.
If it is not possible to ensure clock accuracy, then
vouchers with expirations should not be issued.</t>
      </section>
      <section anchor="protect-voucher-pki-in-hsm" numbered="true" toc="default">
        <name>Protect Voucher PKI in HSM</name>
        <t>Pursuant the recommendation made in Section 6.1 for the MASA to be
deployed as an online voucher signing service, it is <bcp14>RECOMMENDED</bcp14> that
the MASA's private key used for signing vouchers is protected by
a hardware security module (HSM).</t>
      </section>
      <section anchor="test-domain-certificate-validity-when-signing" numbered="true" toc="default">
        <name>Test Domain Certificate Validity When Signing</name>
        <t>If a domain certificate is compromised, then any outstanding
vouchers for that domain could be used by the attacker.  The domain
administrator is clearly expected to initiate revocation of any
domain identity certificates (as is normal in PKI solutions).</t>
        <t>Similarly,they are expected to contact the MASA to indicate that
an outstanding (presumably short lifetime) voucher should be blocked from
automated renewal.
Protocols for voucher distribution are
<bcp14>RECOMMENDED</bcp14> to check for revocation of domain identity certificates
before the signing of vouchers.</t>
      </section>
      <section anchor="yang-module-security-considerations" numbered="true" toc="default">
        <name>YANG Module Security Considerations</name>
        <t>The YANG module specified in this document defines the schema
for data that is subsequently encapsulated by a CMS signed-data
content type, as described in Section 5 of <xref target="RFC5652" format="default"/>.  As such,
all of the YANG modeled data is protected from modification.</t>
        <t>Implementations should be aware that the signed data is only
protected from external modification; the data is still visible.
This potential disclosure of information doesn't affect security
so much as privacy.  In particular, adversaries can glean
information such as which devices belong to which organizations
and which CRL Distribution Point and/or OCSP Responder URLs are
accessed to validate the vouchers.  When privacy is important,
the CMS signed-data content type <bcp14>SHOULD</bcp14> be encrypted, either by
conveying it via a mutually authenticated secure transport protocol
(e.g., TLS <xref target="RFC5246" format="default"/>) or by encapsulating the signed-data
content type with an enveloped-data content type (Section 6
of <xref target="RFC5652" format="default"/>), though details for how to do this are outside
the scope of this document.</t>
        <t>The use of YANG to define data structures, via the 'yang-data'
statement, is relatively new and distinct from the traditional use of
YANG to define an API accessed by network management protocols such as
NETCONF <xref target="RFC6241" format="default"/> and RESTCONF <xref target="RFC8040" format="default"/>. For this reason, these
guidelines do not follow template described by Section 3.7 of
<xref target="YANG-GUIDE" format="default"/>.</t>
      </section>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>This section deals with actions and processes necessary for IANA to undertake to maintain
the "iana-voucher-assertion-type" YANG module.
The iana-voucher-assertion-type YANG module is intended to reflect the "voucher assertion types" registry in [TBD].</t>
      <t>IANA is asked to create the "iana-voucher-assertion-type YANG module" registry.</t>
      <t>Voucher assertion types must not be directly added to the iana-voucher-type YANG module.
They must instead be added to the "voucher assertion types" registry.</t>
      <t>Whenever a new enumerated type is added to the "voucher assertion types" registry, IANA
must also update the "ietf-voucher-assertion-type" YANG module and add a new "enum"
statement to the "voucher-assertion-type" type.
The assigned name defined by the "enum" statement <bcp14>SHALL</bcp14> be the same as the mnemonic name of the new assertion type.
The following substatements to the "enum" statement <bcp14>SHALL</bcp14> be defined:</t>
      <artwork name="" type="" align="left" alt=""><![CDATA[
"value": Use the decimal value from the registry.

"status": Include only if a class or type registration has been deprecated or obsoleted.
IANA "deprecated" maps to YANG status "deprecated", and IANA "obsolete" maps to YANG status   "obsolete".

"description": Replicate the corresponding information from the registry, namely the full name of the new assertion type.

"reference": Replicate the reference(s) from the registry.
]]></artwork>
      <t>Each time the "iana-voucher-assertion-type" YANG module is updated, a new "revision" statement <bcp14>SHALL</bcp14> be added before the existing "revision" statements.
IANA has added this note to the "voucher assertion types" registries:</t>
      <t>When this registry is modified, the YANG module "iana-voucher-assertion-type" must
be updated as defined in [RFCXXXX].
The "Reference" text in the "voucher assertion types" registry has been updated
as follows:
OLD:
| [RFC8366]
NEW:
| [RFC8366][RFCXXX]</t>
      <section anchor="the-ietf-xml-registry" numbered="true" toc="default">
        <name>The IETF XML Registry</name>
        <t>This document registers two URIs in the "IETF XML Registry" <xref target="RFC3688" format="default"/>.</t>
        <t>IANA has registered the following:</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
   URI: urn:ietf:params:xml:ns:yang:ietf-voucher
   Registrant Contact: The ANIMA WG of the IETF.
   XML: N/A, the requested URI is an XML namespace.
]]></artwork>
        <t>IANA is asked to register a second URI as follows:</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
    URI: urn:ietf:params:xml:ns:yang:iana-voucher-assertion-type
    Registrant Contact: The ANIMA WG of the IETF.
    XML: N/A, the requested URI is an XML namespace.
]]></artwork>
      </section>
      <section anchor="the-yang-module-names-registry" numbered="true" toc="default">
        <name>The YANG Module Names Registry</name>
        <t>This document registers two YANG module in the "YANG Module Names"
registry <xref target="RFC6020" format="default"/>.</t>
        <t>IANA has registered the following:</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
   name:         ietf-voucher
   namespace:    urn:ietf:params:xml:ns:yang:ietf-voucher
   prefix:       vch
   reference:    RFC 8366
]]></artwork>
        <t>IANA is asked to register a second YANG module as follows:</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
   name:         iana-voucher-assertion-type
   namespace:    urn:ietf:params:xml:ns:yang:iana-voucher-assertion-type
   prefix:       ianavat
   reference:    RFC XXXX
]]></artwork>
      </section>
      <section anchor="vcj" numbered="true" toc="default">
        <name>The Media Types Registry</name>
        <t>This document registers a new media type in the "Media Types"
registry <xref target="RFC6838" format="default"/>. IANA has registered the following:</t>
        <dl>
          <dt>
Type name:  </dt>
          <dd>
            <t>application</t>
          </dd>
          <dt>
Subtype name:  </dt>
          <dd>
            <t>voucher-cms+json</t>
          </dd>
          <dt>
Required parameters:  </dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>
Optional parameters:  </dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>
Encoding considerations:  </dt>
          <dd>
            <t>CMS-signed JSON vouchers are ASN.1/DER encoded.</t>
          </dd>
          <dt>
Security considerations:  </dt>
          <dd>
            <t>See <xref target="sec-con" format="default"/></t>
          </dd>
          <dt>
Interoperability considerations:  </dt>
          <dd>
            <t>The format is designed to be broadly interoperable.</t>
          </dd>
          <dt>
Published specification:  </dt>
          <dd>
            <t>RFC 8366</t>
          </dd>
          <dt>
Applications that use this media type:  </dt>
          <dd>
            <t>ANIMA, 6tisch, and NETCONF zero-touch imprinting systems.</t>
          </dd>
          <dt>
Fragment identifier considerations:  </dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>
Additional information:  </dt>
          <dd>
            <dl>
              <dt>
Deprecated alias names for this type:      </dt>
              <dd>
                <t>none</t>
              </dd>
              <dt>
Magic number(s):      </dt>
              <dd>
                <t>None</t>
              </dd>
              <dt>
File extension(s):      </dt>
              <dd>
                <t>.vcj</t>
              </dd>
              <dt>
Macintosh file type code(s):      </dt>
              <dd>
                <t>none</t>
              </dd>
            </dl>
          </dd>
          <dt>
Person and email address to contact for further information:  </dt>
          <dd>
            <t>IETF&nbsp;ANIMA WG</t>
          </dd>
          <dt>
Intended usage:  </dt>
          <dd>
            <t>LIMITED</t>
          </dd>
          <dt>
Restrictions on usage:  </dt>
          <dd>
            <t>NONE</t>
          </dd>
          <dt>
Author:  </dt>
          <dd>
            <t>ANIMA WG</t>
          </dd>
          <dt>
Change controller:  </dt>
          <dd>
            <t>IETF</t>
          </dd>
          <dt>
Provisional registration? (standards tree only):  </dt>
          <dd>
            <t>NO</t>
          </dd>
        </dl>
      </section>
      <section anchor="the-smi-security-for-smime-cms-content-type-registry" numbered="true" toc="default">
        <name>The SMI Security for S/MIME CMS Content Type Registry</name>
        <t>IANA has registered the following OID in the "SMI Security for S/MIME
CMS Content Type (1.2.840.113549.1.9.16.1)" registry:</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
            Decimal  Description                             References
            -------  --------------------------------------  ----------
            40       id-ct-animaJSONVoucher                  RFC 8366
]]></artwork>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC5652">
          <front>
            <title>Cryptographic Message Syntax (CMS)</title>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the Cryptographic Message Syntax (CMS).  This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="70"/>
          <seriesInfo name="RFC" value="5652"/>
          <seriesInfo name="DOI" value="10.17487/RFC5652"/>
        </reference>
        <reference anchor="RFC6020">
          <front>
            <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund">
              <organization/>
            </author>
            <date month="October" year="2010"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6020"/>
          <seriesInfo name="DOI" value="10.17487/RFC6020"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray">
              <organization/>
            </author>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format.  It was derived from the ECMAScript Programming Language Standard.  JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC7950">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund">
              <organization/>
            </author>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols.  This document describes the syntax and semantics of version 1.1 of the YANG language.  YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification.  There are a small number of backward incompatibilities from YANG version 1.  This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="ITU-T.X690.2015" target="https://www.itu.int/rec/T-REC-X.690/">
          <front>
            <title>Information Technology - ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author>
              <organization>International Telecommunication Union</organization>
            </author>
            <date year="2015" month="August"/>
          </front>
          <seriesInfo name="ITU-T Recommendation X.690," value="ISO/IEC 8825-1"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks">
              <organization/>
            </author>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol.  The TLS protocol provides communications security over the Internet.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC3688">
          <front>
            <title>The IETF XML Registry</title>
            <author fullname="M. Mealling" initials="M." surname="Mealling">
              <organization/>
            </author>
            <date month="January" year="2004"/>
            <abstract>
              <t>This document describes an IANA maintained registry for IETF standards which use Extensible Markup Language (XML) related items such as Namespaces, Document Type Declarations (DTDs), Schemas, and Resource Description Framework (RDF) Schemas.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="81"/>
          <seriesInfo name="RFC" value="3688"/>
          <seriesInfo name="DOI" value="10.17487/RFC3688"/>
        </reference>
        <reference anchor="RFC6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed">
              <organization/>
            </author>
            <author fullname="J. Klensin" initials="J." surname="Klensin">
              <organization/>
            </author>
            <author fullname="T. Hansen" initials="T." surname="Hansen">
              <organization/>
            </author>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols.  This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns">
              <organization/>
            </author>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund">
              <organization/>
            </author>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder">
              <organization/>
            </author>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman">
              <organization/>
            </author>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices.  It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages.  The NETCONF protocol operations are realized as remote procedure calls (RPCs).  This document obsoletes RFC 4741.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman">
              <organization/>
            </author>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund">
              <organization/>
            </author>
            <author fullname="K. Watsen" initials="K." surname="Watsen">
              <organization/>
            </author>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC8340">
          <front>
            <title>YANG Tree Diagrams</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund">
              <organization/>
            </author>
            <author fullname="L. Berger" initials="L." role="editor" surname="Berger">
              <organization/>
            </author>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document captures the current syntax used in YANG module tree diagrams.  The purpose of this document is to provide a single location for this definition.  This syntax may be updated from time to time based on the evolution of the YANG language.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="215"/>
          <seriesInfo name="RFC" value="8340"/>
          <seriesInfo name="DOI" value="10.17487/RFC8340"/>
        </reference>
        <reference anchor="RFC6125">
          <front>
            <title>Representation and Verification of Domain-Based Application Service Identity within Internet Public Key Infrastructure Using X.509 (PKIX) Certificates in the Context of Transport Layer Security (TLS)</title>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre">
              <organization/>
            </author>
            <author fullname="J. Hodges" initials="J." surname="Hodges">
              <organization/>
            </author>
            <date month="March" year="2011"/>
            <abstract>
              <t>Many application technologies enable secure communication between two entities by means of Internet Public Key Infrastructure Using X.509 (PKIX) certificates in the context of Transport Layer Security (TLS). This document specifies procedures for representing and verifying the identity of application services in such interactions.   [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6125"/>
          <seriesInfo name="DOI" value="10.17487/RFC6125"/>
        </reference>
        <reference anchor="RFC7435">
          <front>
            <title>Opportunistic Security: Some Protection Most of the Time</title>
            <author fullname="V. Dukhovni" initials="V." surname="Dukhovni">
              <organization/>
            </author>
            <date month="December" year="2014"/>
            <abstract>
              <t>This document defines the concept "Opportunistic Security" in the context of communications protocols.  Protocol designs based on Opportunistic Security use encryption even when authentication is not available, and use authentication when possible, thereby removing barriers to the widespread use of encryption on the Internet.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7435"/>
          <seriesInfo name="DOI" value="10.17487/RFC7435"/>
        </reference>
        <reference anchor="ZERO-TOUCH">
          <front>
            <title>Secure Zero Touch Provisioning (SZTP)</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen">
              <organization/>
            </author>
            <author fullname="I. Farrer" initials="I." surname="Farrer">
              <organization/>
            </author>
            <author fullname="M. Abrahamsson" initials="M." surname="Abrahamsson">
              <organization/>
            </author>
            <date month="April" year="2019"/>
            <abstract>
              <t>This document presents a technique to securely provision a networking device when it is booting in a factory-default state.  Variations in the solution enable it to be used on both public and private networks.  The provisioning steps are able to update the boot image, commit an initial configuration, and execute arbitrary scripts to address auxiliary needs.  The updated device is subsequently able to establish secure connections with other systems.  For instance, a device may establish NETCONF (RFC 6241) and/or RESTCONF (RFC 8040) connections with deployment-specific network management systems.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8572"/>
          <seriesInfo name="DOI" value="10.17487/RFC8572"/>
        </reference>
        <reference anchor="BRSKI">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin">
              <organization/>
            </author>
            <author fullname="M. Richardson" initials="M." surname="Richardson">
              <organization/>
            </author>
            <author fullname="T. Eckert" initials="T." surname="Eckert">
              <organization/>
            </author>
            <author fullname="M. Behringer" initials="M." surname="Behringer">
              <organization/>
            </author>
            <author fullname="K. Watsen" initials="K." surname="Watsen">
              <organization/>
            </author>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane.  To do this, a Secure Key Infrastructure is bootstrapped.  This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline.  We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device.  The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="SECUREJOIN">
          <front>
            <title>6tisch Secure Join protocol</title>
            <author fullname="Michael Richardson">
	 </author>
            <date day="25" month="February" year="2017"/>
            <abstract>
              <t>   This document describes a zero-touch mechanism to enroll a new device
   (the "pledge") into a IEEE802.15.4 TSCH network using the 6tisch
   signaling mechanisms.  The resulting device will obtain a domain
   specific credential that can be used with either 802.15.9 per-host
   pair keying protocols, or to obtain the network-wide key from a
   coordinator.  The mechanism describe her is an augmentation to the
   one-touch mechanism described in [I-D.ietf-6tisch-minimal-security].

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-6tisch-dtsecurity-secure-join-01"/>
        </reference>
        <reference anchor="YANG-GUIDE">
          <front>
            <title>Guidelines for Authors and Reviewers of Documents Containing YANG Data Models</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman">
              <organization/>
            </author>
            <date month="October" year="2018"/>
            <abstract>
              <t>This memo provides guidelines for authors and reviewers of specifications containing YANG modules.  Recommendations and procedures are defined, which are intended to increase interoperability and usability of Network Configuration Protocol (NETCONF) and RESTCONF protocol implementations that utilize YANG modules.  This document obsoletes RFC 6087.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="216"/>
          <seriesInfo name="RFC" value="8407"/>
          <seriesInfo name="DOI" value="10.17487/RFC8407"/>
        </reference>
        <reference anchor="Stajano99theresurrecting" target="https://www.cl.cam.ac.uk/research/dtg/www/files/publications/public/files/tr.1999.2.pdf">
          <front>
            <title>The Resurrecting Duckling: Security Issues for Ad-Hoc Wireless Networks</title>
            <author initials="F." surname="Stajano" fullname="Frank Stajano">
              <organization/>
            </author>
            <author initials="R." surname="Anderson" fullname="Ross Anderson">
              <organization/>
            </author>
            <date year="1999"/>
          </front>
        </reference>
        <reference anchor="imprinting" target="https://en.wikipedia.org/w/index.php?title=Imprinting_(psychology)&amp;oldid=825757556">
          <front>
            <title>Wikipedia article: Imprinting</title>
            <author surname="Wikipedia">
              <organization/>
            </author>
            <date year="2018" month="February"/>
          </front>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgements" toc="default">
      <name>Acknowledgements</name>
      <t>The authors would like to thank for following for
lively discussions on list and in the halls (ordered
by last name): William Atwood, Toerless Eckert, and Sheng Jiang.</t>
      <t>Russ Housley provided the upgrade from PKCS7 to CMS (RFC 5652) along
with the detailed CMS structure diagram.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
