<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.23 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-richardson-anima-voucher-delegation-03" category="std">

  <front>
    <title abbrev="delegated-voucher">Delegated Authority for Bootstrap Voucher Artifacts</title>

    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <author initials="W." surname="Pan" fullname="Wei Pan">
      <organization>Huawei Technologies</organization>
      <address>
        <email>william.panwei@huawei.com</email>
      </address>
    </author>

    <date year="2021" month="March" day="22"/>

    <area>Internet</area>
    <workgroup>anima Working Group</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document describes an extension of the RFC8366 Voucher Artifact
in order to support delegation of signing authority.  The initial voucher
pins a public identity, and that public indentity can then issue additional
vouchers.  This chain of authorization can support permission-less resale
of devices, as well as guarding against business failure of the
BRSKI <xref target="I-D.ietf-anima-bootstrapping-keyinfra"/> Manufacturer Authorized Signing Authority (MASA).</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>The <xref target="RFC8366"/> voucher artifact provides a proof from a manufacturer’s
authorizing signing authority (MASA) of the intended owner of a device.  This is
used by an onboarding Pledge device in BRSKI (<xref target="I-D.ietf-anima-bootstrapping-keyinfra"/>,
<xref target="I-D.ietf-anima-constrained-voucher"/>), and SZTP (<xref target="RFC8572"/>).</t>

<t>There are a number of criticisms of the MASA concept.  They include:</t>

<t><list style="symbols">
  <t>the MASA must be reachable to the Registar during the onboarding process.</t>
  <t>while the use of a nonceless voucher (see <xref target="RFC8366"/> section 4) can
permit the MASA to be offline, it still requires the public key/certificate
of the Registrar to be known at issuing time. The device owner is always
strongly dependent on the MASA service.</t>
  <t>the MASA must approve all transfers of ownership, impacting the rights of the supply chain distributors to transfer ownership as they see fit.</t>
  <t>if the Registrar has any nonceless vouchers, then it can not change it’s public key, nor can it change which certification authority it uses.</t>
  <t>it is not possible for a MASA to pin ownership to a Registrar by Certification Authority plus DN.</t>
  <t>the creator of an assembly of parts/components can speak for the entire
assembly of parts in a transparent way.</t>
</list></t>

<section anchor="requirements" title="Requirements for the Delegation">

<t>This voucher artifact satisfies the following requirements:</t>

<section anchor="device-onboarding-with-disconnected-or-offline-masa" title="Device Onboarding with Disconnected or Offline MASA">

<t>A Registrar wishes to onboard devices while it is not being connected to the
Internet and MASA.</t>

</section>
<section anchor="resale-of-devices" title="Resale of Devices">

<t>An owner of a device wishes to resale it which has previously been
onboarded to a third party without specific authorization from the
manufacturer.</t>

</section>
<section anchor="crypto-agility-for-registrar" title="Crypto-agility for Registrar">

<t>The owner/manager of a registrar wishes to be able to replace its domain
registration key.
Replacing the registration key would invalidate any previously acquired
(nonceless) vouchers.
Any devices which have not been onboarded, or which need to be factory reset,
would not trust a replacement key.</t>

</section>
<section anchor="transparent-assemblersvalue-added-resellers" title="Transparent Assemblers/Value-Added-Resellers">

<t>An assembly may consist of a number of parts which are onboarded to a local
controller during the manufacturing process.
Subsequent to this, the entire assembly will be shipped to a customer who
wishes to onboard all the components.
The sub-components of the assembly needs to communicate with other
sub-components, and so all the parts need to transparently onboarded.
(This is contrasted with an assembly where the controller acts as a security
gateway. Such a gateway might be a single point of failure)</t>

<t>Assemblies may nest quite deeply.</t>

</section>
</section>
<section anchor="overview-of-proposed-solution" title="Overview of Proposed Solution">

<t>The MASA will issue a voucher that delegates it’s signing authority for one
or more devices to a specific Registrar.
This is called a “delegation voucher”.</t>

<t>This Registrar can then operate as an authorized signing authority for the
manufacturer, and can subsequently issue additional vouchers binding the
pledge to new Registrars.</t>

<t>This delegation can potentially be repeated multiple times to enable second,
third, or n-th level of resale.</t>

<t>The delegation voucher may be stored by the pledge for storage, to be
included by the pledge in subsequent bootstrap operations.
The inclusion of the delegation voucher permits next Registrar with heuristics that
permit it to find the delegated authorized signing authority (DASA).</t>

<t>The delegation voucher pins the identity of the delegated authority using a
variety of different mechanisms which are covered in <xref target="pinnedmechanism"/>.</t>

</section>
</section>
<section anchor="terminology" title="Terminology">

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL
NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”,
“MAY”, and “OPTIONAL” in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<t><list style="hanging">
  <t hangText="Delegated Authorized Signing Authority :">
  the Delegated Authorized Signing Authority (DASA) is a service that can
generate vouchers for one or more pledges to provide bootstrap authority,
which is separated and delegated from the manufacturer.</t>
  <t hangText="Delegation Voucher:">
  a Delegation Voucher is an <xref target="RFC8366"/> format voucher that has additional
fields to provide details of the entity to which authority has been delegated.</t>
  <t hangText="Intermediate Voucher:">
  a voucher that is not the final voucher linking a pledge to its owner.</t>
  <t hangText="End Voucher:">
  a voucher that is the final voucher linking a pledge to its owner.</t>
</list></t>

</section>
<section anchor="delegation-voucher-artifact" title="Delegation Voucher Artifact">

<t>The following tree diagram shows the extensions to the <xref target="RFC8366"/> voucher.</t>

<t>There are a few new fields:</t>

<t><list style="hanging">
  <t hangText="delegation-enable-flag:">
  A global enable flag to the pledge that it can be delegated (true) or not (false). With default, this flag is false, which is consistent with the voucher artifact in RFC8366.</t>
  <t hangText="pinned-delegation-cert-authority:">
  An subject-public-key-info for a public key of the new DASA</t>
  <t hangText="pinned-delegation-cert-name:">
  A string for the rfc822Name SubjectAltName contents of the new DASA; (XXX- is it enough, should other DNs be considered?)</t>
  <t hangText="delegation-voucher:">
  One or a series of Intermediate Vouchers that delegate authority to the DASA. For the latter case, the series of Intermediate Vouchers constitute a nested structure, and the most inner voucher is from the MASA, which is called terminal voucher here</t>
  <t hangText="intermediate-identities:">
  A set of voucher identities being consistent with the series of Intermediate Vouchers</t>
  <t hangText="delegation-countdown:">
  Number of delegations still available. If zero or omitted, then this is a terminal voucher and may not be further delegated.</t>
</list></t>

<t>In addition, the serial-number field is no longer a plain leaf, but can also be an array (See <xref target="delegationmultidev"/>).</t>

<figure><artwork><![CDATA[
module: ietf-delegated-voucher

  grouping voucher-delegated-grouping
    +-- voucher
       +-- created-on                          yang:date-and-time
       +-- expires-on?                         yang:date-and-time
       +-- assertion                           enumeration
       +-- serial-number                       string
       +-- idevid-issuer?                      binary
       +-- pinned-domain-cert?                 binary
       +-- domain-cert-revocation-checks?      boolean
       +-- nonce?                              binary
       +-- last-renewal-date?                  yang:date-and-time
       +-- delegation-enable-flag?             boolean
       +-- pinned-delegation-cert-authority?   binary
       +-- pinned-delegation-cert-name?        binary
       +-- delegation-voucher?                 binary
       +-- intermediate-identities?            binary
       +-- delegation-countdown?               int16
]]></artwork></figure>

<section anchor="yang-module" title="YANG Module">

<t>This module uses the grouping that was created in <xref target="RFC8366"/> to extend the
definition.</t>

<figure><artwork><![CDATA[
<CODE BEGINS> file "ietf-delegated-voucher@2020-01-06.yang"
module ietf-delegated-voucher {
  yang-version 1.1;

  namespace
    "urn:ietf:params:xml:ns:yang:ietf-delegated-voucher";
  prefix "delegated";

  import ietf-restconf {
    prefix rc;
    description
      "This import statement is only present to access
       the yang-data extension defined in RFC 8040.";
    reference "RFC 8040: RESTCONF Protocol";
  }

  // maybe should import from constrained-voucher instead!
  import ietf-voucher {
    prefix "v";
  }

  organization
   "IETF ANIMA Working Group";

  contact
   "WG Web:   <http://tools.ietf.org/wg/anima/>
    WG List:  <mailto:anima@ietf.org>
    Author:   Michael Richardson
              <mailto:mcr+ietf@sandelman.ca>";

  description
  "This module extends the RFC8366 voucher format to provide
   a mechanism by which the authority to issue additional vouchers
   may be delegated to another entity

   The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL',
   'SHALL NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'MAY',
   and 'OPTIONAL' in the module text are to be interpreted as
   described in BCP 14 RFC 2119, and RFC8174.";

  revision "2020-01-06" {
    description
     "Initial version";
    reference
     "RFC XXXX: Voucher Profile for Delegation Vouchers";
  }

  rc:yang-data voucher-delegated-artifact {
    // YANG data template for a voucher.
    uses voucher-delegated-grouping;
  }

  // Grouping defined for future usage
  grouping voucher-delegated-grouping {
    description
      "Grouping to allow reuse/extensions in future work.";

    uses v:voucher-artifact-grouping {

      refine voucher/pinned-domain-cert {
          mandatory  false;
      }

      augment "voucher" {
        description "Base the delegated voucher
                     upon the regular one";

        leaf delegation-enable-flag {
          type boolean;
          description
            "A global enable flag to the pledge that it can be delegated
             (true) or not (false). With default, this flag is false,
             which is consistent with the voucher artifact in RFC8366. ";
        }

        leaf pinned-delegation-cert-authority {
          type binary;
          description
            "An subject-public-key-info for a public key of the
             certificate authority that is to be trusted to issue
             a delegation voucher to the Registrar.
             This is not used by end-vouchers, and only valid
             when delegation-enable-flag is true.";
        }

        leaf pinned-delegation-cert-name {
          type binary;
          description
            "A string for the rfc822Name SubjectAltName contents
             which will be trusted to issue delegation vouchers.
             This is not used by end-vouchers, and only valid
             when delegation-enable-flag is true.";
        }

        leaf delegation-voucher {
          type binary;
          description
            "The intermediate voucher that delegates
             authority to the entity that signs this voucher
             is to be included here, and only valid
             when delegation-enable-flag is true.";
        }

        leaf intermediate-identities {
          type binary;
          description
            "A set of identities that will be needed to
             validate the chain of vouchers, and only valid
             when delegation-enable-flag is true. MAY BE REDUNDANT";
        }

        leaf delegation-countdown {
          type int16;
          description
          "Number of delegations still available, and only valid
             when delegation-enable-flag is true. If zero
           or omitted, then this is a terminal voucher and
           may not be further delegated";
        }
      }
    }
  }
}
<CODE ENDS>
]]></artwork></figure>

</section>
<section anchor="bundling-of-the-vouchers" title="Bundling of The Vouchers">

<t>The <xref target="I-D.ietf-anima-bootstrapping-keyinfra"/> defines a mechanism to return a
single voucher to the pledge.</t>

<t>This protocol requires a number of additional items to be returned to the
pledge for evaluation:  the series of Intermediate Vouchers that leads to the
DASA, and the public keys (often as certificates) of the Registrars on the
Delegation Path that leads to each Authority.</t>

</section>
<section anchor="delegationmultidev" title="Delegation of Multiple Devices">

<t>A MASA MAY delegate multiple devices to the same Registrar by putting an
array of items in the “serial-number” attributes. (XXX-how to describe this
in the YANG, and the detailed mechanism, are TBD)</t>

</section>
</section>
<section anchor="enhanced-pledge-behavior" title="Enhanced Pledge Behavior">

<t>The use of a Delegation Voucher requires changes to how the pledge evaluates
the voucher that is returned to by the Registrar.</t>

<t>There are no significant changes to the voucher-request that is made.
The pledge continues to pin the identity of the Registrar to which it is
connected, providing a nonce to establish freshness.</t>

<t>A pledge which has previously stored a Delegation Voucher and DASA
, SHOULD include it in its voucher request.
This will be in the form of a certificate provided by the “previous” owner.
This allows the Registrar to discover the previous authority for the pledge.
As the pledge has no idea if it connecting to an entity that it previously
has connected to, it needs to include this certificate anyway.</t>

<t>The pledge receives a voucher from the Registrar.
This voucher is called the zero voucher.
It will observe that the voucher is not signed with its built-in manufacturer
trust anchor and it can not verify it.</t>

<t>The pledge will examine the voucher to look for the “delegation-voucher”
and the “intermediate-identities” attributes within the voucher.
A certificate from the set of intermediate-identities is expected to validate
the signature on this zeroth end-entity voucher.
(XXX- This attribute can be replaced by the CMS certificate chain)</t>

<t>The contained delegation-voucher object is to be interpreted as an
(Intermediate) Voucher.
This first voucher is called the first voucher, or “voucher[1]”.
Generically, for voucher[i], the voucher found in the delegation-voucher is
called voucher[i+1].</t>

<t>If voucher[i] can be validated by a built-in trust anchor, then the process
is done.
If not, then voucher[i] is examined in a recursive process until there are
no further embedded vouchers.
The last voucher[n] is expected to be validated by a built-in manufacturer
trust anchor.</t>

<t>Once the top (n-th) voucher is found, then the pinned-certificate-authority
is added to the working set of trust anchors.
The “pinned-certificate-name” attribute is used along with the trust anchor to
validate the certificate chain provided with the (n-1)th voucher.
This is repeated (unwinding the recursive processing) until the zeroth
voucher has been validated.</t>

</section>
<section anchor="changes-to-registrar-behavior" title="Changes to Registrar Behavior">

<t>The Registrar is the component that authenticates the pledge, makes authorization decisions, and distributes vouchers. If the vouchers is delegated, then the registrar need to co-ordinate MASA and DASA.</t>

<section anchor="discovering-the-most-recent-delegated-authority-to-use" title="Discovering The Most Recent Delegated Authority to Use">

<t>The pledge continues to use its manufacturer issued IDevID when performing
BRSKI-style onboarding.
The IDevID contains an extension, the MASA URL (see
<xref target="I-D.ietf-anima-bootstrapping-keyinfra"/> section 2.3.2).
The IDevID certificate is not expected to be updated when the device is
resold, nor may it be practical for an intermediate owner to be able
to replace the IDevID with their own.
(Some devices may support having an intermediate owner replace the IDevID, in
which case this section does not apply)</t>

<t>The Registrar needs to be informed that it should not contact a MASA using
the URL in the IDevID, but rather to contact the previous owner’s DASA.</t>

<t>This can be accomplished by local override, as described in
<xref target="I-D.ietf-anima-bootstrapping-keyinfra"/> section 5.4:</t>

<figure><artwork><![CDATA[
Registrars MAY include a mechanism to override
the MASA URL on a manufacturer-by-manufacturer basis, and within that
override it is appropriate to provide alternate anchors.  This will
typically used by some vendors to establish explicit (or private)
trust anchors for validating their MASA that is part of a sales
channel integration.
]]></artwork></figure>

<t>The above override needs to be established on a per-device basis.
It requires per-device configuration which is very much non-autonomic.</t>

<t>There are two other alternatives:</t>

<t><list style="numbers">
  <t>The Manufacturer could be aware of any Delegation Vouchers that it has
issued for a particular device, and when contacted by the Registrar, it
could redirect the Registrar to its DASA. And the DASA may redirect the
Registrar to its delegated DASA, this process is recursive to the final DASA.</t>
  <t>The Pledge could provide a signed statement from the manufacturer
providing the Registrar with a pointer to the DASA.</t>
</list></t>

<t>Option 1 requires that the Registrar still contact the MASA, violating most
of the goals from <xref target="requirements"/>.</t>

<t>Option 2 requires a signed artifact, and conveniently, the Delegation Voucher
is exactly the item needed.
The most difficult problem is that the Pledge needs to (a) store one or more
Delegation Vouchers in a non-volatile storage that survives factory reset
operations, (b) attach these items to the pledge’s voucher-request.</t>

<t>The extension to the <xref target="I-D.ietf-anima-bootstrapping-keyinfra"/>
voucher-request described below provides for a contained for these Delegation Vouchers.</t>

</section>
</section>
<section anchor="applying-the-delegation-voucher-to-requirements" title="Applying The Delegation Voucher to Requirements">

<section anchor="case-1-resale" title="Case 1: Resale">

<t>This case has many scenarioes in application.</t>

<t>For example, due to the willing of some devices’ owner, or due to the creditor or bankruptcy, their devices need to resale to some third party, but they have previously been onboarded without specific authorization from the manufacturer. Aother example is for some owner, which PKI system is on the cloud initially, but later, they wish to change its CA, and it is effectively a “resale”. Then, the registrar of third party must override MASA URL, contacting this owner’s registrar for voucher. Here, the owner’s registrar is delegation authority.</t>

<t>Furthurly, the pledges may be resaled many times, and when onboarding, they will receive all vouchers in order with the sale chain, firstly masa vouchour, then 1st intermidate, 2nd intermidate, till to the final dealer. In this case, the pledge’s authorization form a signed voucher chain.</t>

<t>In addition, for a pledge, resale can’t be forever, so the delegation voucher need specify the limit number of resales with “delegation-countdown”.</t>

<t>The following illustrates a delegation voucher for a pledge:
   {
     “ietf-delegated-voucher:voucher”: {
       “created-on”: “2020-07-14T06:28:31Z”,
       “expire-on”: “2022-07-31T01:61:80Z”,
       “assertion”: “logged”,
       “serial-number”: “JADA123456789”,
       “delegation-enable-flag”: true,
       “pinned-delegation-cert-authority”: “base64encodedvalue”,
       “pinned-delegation-cert-name”: “base64encodedvalue”,
       “delegation-voucher”: “base64encodedvalue”,
       “intermediate-identities”: “intermediateId1”,
       “delegation-countdown”: 1,
     }
   }</t>

</section>
<section anchor="case-2-assembly" title="Case 2: Assembly">

<t>In some application, many pledges which come from multiple componet manufactures, need to be assemblied together in the first sale, In this time, the owner is assembly controller, so the pledge’s voucher need to include these delegation options.</t>

<t>In addition, there are also transparent assembly, for exmale rail wagon scenario. Firstly, the assembly onboards normally to get all pledges’ vouchers, then this assembly acts as intermidate registrar, who “sell” these pledges to every rail wagon registrar.</t>

</section>
</section>
<section anchor="pinnedmechanism" title="Constraints on Pinning The Delegated Authority">

<t>TBD</t>

</section>
<section anchor="privacy-considerations" title="Privacy Considerations">

<t>YYY</t>

</section>
<section anchor="security-considerations" title="Security Considerations">

<section anchor="yang-module-security-considerations" title="YANG Module Security Considerations">

<t>As described in the Security Considerations section of <xref target="RFC8366"/> (section 7.4), the YANG module specified
in this document defines the schema for data that is subsequently
encapsulated by a CMS signed-data content type, as described in Section 5 of
<xref target="RFC5652"/>. As such, all of the YANG modeled data is protected from modification.</t>

<t>The use of YANG to define data structures, via the ‘yang-data’
statement, is relatively new and distinct from the traditional use
of YANG to define an API accessed by network management protocols
such as NETCONF <xref target="RFC6241"/> and RESTCONF <xref target="RFC8040"/>.
For this reason, these guidelines do not follow template described by
Section 3.7 of <xref target="RFC8407"/>.</t>

</section>
</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>This document requires the following IANA actions:</t>

<section anchor="the-ietf-xml-registry" title="The IETF XML Registry">

<t>This document registers a URI in the “IETF XML Registry” <xref target="RFC3688"/>.
IANA is asked to register the following:</t>

<figure><artwork><![CDATA[
     URI: urn:ietf:params:xml:ns:yang:ietf-delegated-voucher
     Registrant Contact: The ANIMA WG of the IETF.
     XML: N/A, the requested URI is an XML namespace.
]]></artwork></figure>

</section>
<section anchor="yang-module-names-registry" title="YANG Module Names Registry">

<t>This document registers a YANG module in the “YANG Module Names” registry <xref target="RFC6020"/>.
IANA is asked to register the following:</t>

<figure><artwork><![CDATA[
     name:         ietf-delegated-voucher
     namespace:    urn:ietf:params:xml:ns:yang:ietf-delegated-voucher
     prefix:       NONE
     reference:    THIS DOCUMENT
]]></artwork></figure>

</section>
</section>
<section anchor="acknowledgements" title="Acknowledgements">

<t>Hello.</t>

</section>
<section anchor="changelog" title="Changelog">

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference  anchor="RFC8174" target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author initials='B.' surname='Leiba' fullname='B. Leiba'><organization /></author>
<date year='2017' month='May' />
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>



<reference  anchor="RFC8366" target='https://www.rfc-editor.org/info/rfc8366'>
<front>
<title>A Voucher Artifact for Bootstrapping Protocols</title>
<author initials='K.' surname='Watsen' fullname='K. Watsen'><organization /></author>
<author initials='M.' surname='Richardson' fullname='M. Richardson'><organization /></author>
<author initials='M.' surname='Pritikin' fullname='M. Pritikin'><organization /></author>
<author initials='T.' surname='Eckert' fullname='T. Eckert'><organization /></author>
<date year='2018' month='May' />
<abstract><t>This document defines a strategy to securely assign a pledge to an owner using an artifact signed, directly or indirectly, by the pledge's manufacturer.  This artifact is known as a &quot;voucher&quot;.</t><t>This document defines an artifact format as a YANG-defined JSON document that has been signed using a Cryptographic Message Syntax (CMS) structure.  Other YANG-derived formats are possible.  The voucher artifact is normally generated by the pledge's manufacturer (i.e., the Manufacturer Authorized Signing Authority (MASA)).</t><t>This document only defines the voucher artifact, leaving it to other documents to describe specialized protocols for accessing it.</t></abstract>
</front>
<seriesInfo name='RFC' value='8366'/>
<seriesInfo name='DOI' value='10.17487/RFC8366'/>
</reference>



<reference anchor="I-D.ietf-anima-bootstrapping-keyinfra">
<front>
<title>Bootstrapping Remote Secure Key Infrastructures (BRSKI)</title>

<author initials='M' surname='Pritikin' fullname='Max Pritikin'>
    <organization />
</author>

<author initials='M' surname='Richardson' fullname='Michael Richardson'>
    <organization />
</author>

<author initials='T' surname='Eckert' fullname='Toerless Eckert'>
    <organization />
</author>

<author initials='M' surname='Behringer' fullname='Michael Behringer'>
    <organization />
</author>

<author initials='K' surname='Watsen' fullname='Kent Watsen'>
    <organization />
</author>

<date month='November' day='11' year='2020' />

<abstract><t>This document specifies automated bootstrapping of an Autonomic Control Plane.  To do this a Secure Key Infrastructure is bootstrapped.  This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline.  We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur using a routable address and a cloud service, or using only link-local connectivity, or on limited/ disconnected networks.  Support for deployment models with less stringent security requirements is included.  Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device.  The established secure connection can be used to deploy a locally issued certificate to the device as well.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-anima-bootstrapping-keyinfra-45' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-anima-bootstrapping-keyinfra-45.txt' />
</reference>



<reference anchor="I-D.ietf-anima-constrained-voucher">
<front>
<title>Constrained Voucher Artifacts for Bootstrapping Protocols</title>

<author initials='M' surname='Richardson' fullname='Michael Richardson'>
    <organization />
</author>

<author initials='P' surname='Stok' fullname='Peter van der Stok'>
    <organization />
</author>

<author initials='P' surname='Kampanakis' fullname='Panos Kampanakis'>
    <organization />
</author>

<date month='November' day='2' year='2020' />

<abstract><t>This document defines a strategy to securely assign a pledge to an owner, using an artifact signed, directly or indirectly, by the pledge's manufacturer.  This artifact is known as a "voucher".  This document builds upon the work in [RFC8366], encoding the resulting artifact in CBOR.  Use with two signature technologies are described.  Additionally, this document explains how constrained vouchers may be transported as an extension to the [I-D.ietf-ace-coap-est] protocol.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-anima-constrained-voucher-09' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-anima-constrained-voucher-09.txt' />
</reference>



<reference  anchor="RFC2119" target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>




    </references>

    <references title='Informative References'>





<reference  anchor="RFC3688" target='https://www.rfc-editor.org/info/rfc3688'>
<front>
<title>The IETF XML Registry</title>
<author initials='M.' surname='Mealling' fullname='M. Mealling'><organization /></author>
<date year='2004' month='January' />
<abstract><t>This document describes an IANA maintained registry for IETF standards which use Extensible Markup Language (XML) related items such as Namespaces, Document Type Declarations (DTDs), Schemas, and Resource Description Framework (RDF) Schemas.</t></abstract>
</front>
<seriesInfo name='BCP' value='81'/>
<seriesInfo name='RFC' value='3688'/>
<seriesInfo name='DOI' value='10.17487/RFC3688'/>
</reference>



<reference  anchor="RFC8572" target='https://www.rfc-editor.org/info/rfc8572'>
<front>
<title>Secure Zero Touch Provisioning (SZTP)</title>
<author initials='K.' surname='Watsen' fullname='K. Watsen'><organization /></author>
<author initials='I.' surname='Farrer' fullname='I. Farrer'><organization /></author>
<author initials='M.' surname='Abrahamsson' fullname='M. Abrahamsson'><organization /></author>
<date year='2019' month='April' />
<abstract><t>This document presents a technique to securely provision a networking device when it is booting in a factory-default state.  Variations in the solution enable it to be used on both public and private networks.  The provisioning steps are able to update the boot image, commit an initial configuration, and execute arbitrary scripts to address auxiliary needs.  The updated device is subsequently able to establish secure connections with other systems.  For instance, a device may establish NETCONF (RFC 6241) and/or RESTCONF (RFC 8040) connections with deployment-specific network management systems.</t></abstract>
</front>
<seriesInfo name='RFC' value='8572'/>
<seriesInfo name='DOI' value='10.17487/RFC8572'/>
</reference>



<reference  anchor="RFC8040" target='https://www.rfc-editor.org/info/rfc8040'>
<front>
<title>RESTCONF Protocol</title>
<author initials='A.' surname='Bierman' fullname='A. Bierman'><organization /></author>
<author initials='M.' surname='Bjorklund' fullname='M. Bjorklund'><organization /></author>
<author initials='K.' surname='Watsen' fullname='K. Watsen'><organization /></author>
<date year='2017' month='January' />
<abstract><t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t></abstract>
</front>
<seriesInfo name='RFC' value='8040'/>
<seriesInfo name='DOI' value='10.17487/RFC8040'/>
</reference>



<reference  anchor="RFC5652" target='https://www.rfc-editor.org/info/rfc5652'>
<front>
<title>Cryptographic Message Syntax (CMS)</title>
<author initials='R.' surname='Housley' fullname='R. Housley'><organization /></author>
<date year='2009' month='September' />
<abstract><t>This document describes the Cryptographic Message Syntax (CMS).  This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='70'/>
<seriesInfo name='RFC' value='5652'/>
<seriesInfo name='DOI' value='10.17487/RFC5652'/>
</reference>



<reference  anchor="RFC6241" target='https://www.rfc-editor.org/info/rfc6241'>
<front>
<title>Network Configuration Protocol (NETCONF)</title>
<author initials='R.' surname='Enns' fullname='R. Enns' role='editor'><organization /></author>
<author initials='M.' surname='Bjorklund' fullname='M. Bjorklund' role='editor'><organization /></author>
<author initials='J.' surname='Schoenwaelder' fullname='J. Schoenwaelder' role='editor'><organization /></author>
<author initials='A.' surname='Bierman' fullname='A. Bierman' role='editor'><organization /></author>
<date year='2011' month='June' />
<abstract><t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices.  It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages.  The NETCONF protocol operations are realized as remote procedure calls (RPCs).  This document obsoletes RFC 4741.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6241'/>
<seriesInfo name='DOI' value='10.17487/RFC6241'/>
</reference>



<reference  anchor="RFC8407" target='https://www.rfc-editor.org/info/rfc8407'>
<front>
<title>Guidelines for Authors and Reviewers of Documents Containing YANG Data Models</title>
<author initials='A.' surname='Bierman' fullname='A. Bierman'><organization /></author>
<date year='2018' month='October' />
<abstract><t>This memo provides guidelines for authors and reviewers of specifications containing YANG modules.  Recommendations and procedures are defined, which are intended to increase interoperability and usability of Network Configuration Protocol (NETCONF) and RESTCONF protocol implementations that utilize YANG modules.  This document obsoletes RFC 6087.</t></abstract>
</front>
<seriesInfo name='BCP' value='216'/>
<seriesInfo name='RFC' value='8407'/>
<seriesInfo name='DOI' value='10.17487/RFC8407'/>
</reference>



<reference  anchor="RFC6020" target='https://www.rfc-editor.org/info/rfc6020'>
<front>
<title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
<author initials='M.' surname='Bjorklund' fullname='M. Bjorklund' role='editor'><organization /></author>
<date year='2010' month='October' />
<abstract><t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='6020'/>
<seriesInfo name='DOI' value='10.17487/RFC6020'/>
</reference>




    </references>


<section anchor="extra-references" title="Extra references">

<t>RFC Editor, please remove this section.
This section lists references in the YANG. <xref target="RFC8174"/>, <xref target="RFC8040"/>.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

