<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.21 -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<?rfc linkmailto="no"?>
<?rfc editing="no"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc rfcedstyle="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-richardson-anima-rfc8366bis-02" category="std" consensus="yes" tocInclude="true" sortRefs="true" symRefs="true" obsoletes="" updates="" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.5.0 -->
  <front>
    <title abbrev="Voucher Profile">A Voucher Artifact for Bootstrapping Protocols</title>
    <seriesInfo name="Internet-Draft" value="draft-richardson-anima-rfc8366bis-02"/>
    <author initials="K." surname="Watsen" fullname="Kent Watsen">
      <organization>Juniper Networks</organization>
      <address>
        <email>kwatsen@juniper.net</email>
      </address>
    </author>
    <author initials="M." surname="Richardson" fullname="Michael C. Richardson">
      <organization>Sandelman Software</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
        <uri>http://www.sandelman.ca/</uri>
      </address>
    </author>
    <author initials="M." surname="Pritikin" fullname="Max Pritikin">
      <organization>Cisco Systems</organization>
      <address>
        <email>pritikin@cisco.com</email>
      </address>
    </author>
    <author initials="T." surname="Eckert" fullname="Toerless Eckert">
      <organization abbrev="Huawei">Futurewei Technologies Inc.</organization>
      <address>
        <postal>
          <street>2330 Central Expy</street>
          <city>Santa Clara</city>
          <code>95050</code>
          <country>United States of America</country>
        </postal>
        <email>tte+ietf@cs.fau.de</email>
      </address>
    </author>
    <date year="2021" month="December"/>
    <area>Operations</area>
    <workgroup>ANIMA Working Group</workgroup>
    <keyword>voucher</keyword>
    <abstract>
      <t>This document defines a strategy to securely assign a pledge to an owner
using an artifact signed, directly or indirectly, by the pledge's manufacturer.
This artifact is known as a "voucher".</t>
      <t>This document defines an artifact format as a YANG-defined JSON document
that has been signed using a Cryptographic Message Syntax (CMS) structure.
Other YANG-derived formats are possible.
The voucher artifact is normally generated by
the pledge's manufacturer (i.e., the Manufacturer Authorized Signing
Authority (MASA)).</t>
      <t>This document only defines the voucher artifact, leaving it to other
documents to describe specialized protocols for accessing it.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
  Autonomic Networking Integrated Model and Approach Working Group mailing list (anima@ietf.org),
  which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/anima/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
  <eref target="https://github.com/anima-wg/voucher"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>This document defines a strategy to securely assign a candidate device
(pledge) to an owner using an artifact signed, directly or indirectly,
by the pledge's manufacturer, i.e., the Manufacturer Authorized
Signing Authority (MASA).  This artifact is known as the "voucher".</t>
      <t>The voucher artifact is a JSON <xref target="RFC8259" format="default"/> document that
conforms with a data model described by YANG <xref target="RFC7950" format="default"/>, is
encoded using the rules defined in <xref target="RFC8259" format="default"/>, and
is signed using (by default) a CMS structure <xref target="RFC5652" format="default"/>.</t>
      <t>The primary purpose of a voucher is to securely convey a
certificate, the "pinned-domain-cert", that a pledge can
use to authenticate subsequent interactions. A voucher may be useful
in several contexts, but the driving motivation
herein is to support secure bootstrapping mechanisms.  Assigning
ownership is important to bootstrapping mechanisms so that the pledge
can authenticate the network that is trying to take control of it.</t>
      <t>The lifetimes of vouchers may vary. In some bootstrapping protocols,
the vouchers may include a nonce restricting them to a single use,
whereas the vouchers in other bootstrapping protocols may have an
indicated lifetime. In order to support long lifetimes, this document
recommends using short lifetimes with programmatic renewal, see
<xref target="renewal-over-revocation" format="default"/>.</t>
      <t>This document only defines the voucher artifact, leaving it to other
documents to describe specialized protocols for accessing it.
Some bootstrapping protocols using the voucher artifact defined in
this document include: <xref target="ZERO-TOUCH" format="default"/>, <xref target="SECUREJOIN" format="default"/>, and
<xref target="BRSKI" format="default"/>).</t>
    </section>
    <section anchor="terminology" numbered="true" toc="default">
      <name>Terminology</name>
      <t>This document uses the following terms:</t>
      <dl>
        <dt>
Artifact:  </dt>
        <dd>
          <t>Used throughout to represent the voucher as instantiated in the form
of a signed structure.</t>
        </dd>
        <dt>
Domain:  </dt>
        <dd>
          <t>The set of entities or infrastructure under common administrative
control.
The goal of the bootstrapping protocol is to enable a pledge to
discover and join a domain.</t>
        </dd>
        <dt>
Imprint:  </dt>
        <dd>
          <t>The process where a device obtains the cryptographic key material to
identify and trust future interactions with a network. This term is
taken from Konrad Lorenz's work in biology with new ducklings:
"during a critical period, the duckling would assume that anything
that looks like a mother duck is in fact their mother"
<xref target="Stajano99theresurrecting" format="default"/>. An equivalent for a device is to
obtain the fingerprint of the network's root certification authority
certificate. A device that imprints on an attacker suffers a similar
fate to a duckling that imprints on a hungry wolf. Imprinting is a
term from psychology and ethology, as described in <xref target="imprinting" format="default"/>.</t>
        </dd>
        <dt>
Join Registrar (and Coordinator):  </dt>
        <dd>
          <t>A representative of the domain that is configured, perhaps
autonomically, to decide whether a new device is allowed to join the
domain. The administrator of the domain interfaces with a join
registrar (and Coordinator) to control this process.
Typically, a join registrar is "inside" its domain. For simplicity,
this document often refers to this as just "registrar".</t>
        </dd>
        <dt>
MASA (Manufacturer Authorized Signing Authority):  </dt>
        <dd>
          <t>The entity that, for the purpose of this document, signs the
vouchers for a manufacturer's pledges.
In some bootstrapping protocols, the MASA may have an Internet
presence and be integral to the bootstrapping process, whereas in
other protocols the MASA may be an offline service that has no
active role in the bootstrapping process.</t>
        </dd>
        <dt>
Owner:  </dt>
        <dd>
          <t>The entity that controls the private key of the "pinned-domain-cert"
certificate conveyed by the voucher.</t>
        </dd>
        <dt>
Pledge:  </dt>
        <dd>
          <t>The prospective device attempting to find and securely join a
domain.
When shipped, it only trusts authorized representatives of the
manufacturer.</t>
        </dd>
        <dt>
Registrar:  </dt>
        <dd>
          <t>See join registrar.</t>
        </dd>
        <dt>
TOFU (Trust on First Use):  </dt>
        <dd>
          <t>Where a pledge device makes no security decisions but rather simply
trusts the first domain entity it is contacted by.
Used similarly to <xref target="RFC7435" format="default"/>.
This is also known as the "resurrecting duckling" model.</t>
        </dd>
        <dt>
Voucher:  </dt>
        <dd>
          <t>A signed statement from the MASA service that indicates to a pledge
the cryptographic identity of the domain it should trust.</t>
        </dd>
      </dl>
    </section>
    <section anchor="requirements-language" numbered="true" toc="default">
      <name>Requirements Language</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP&nbsp;14 <xref target="RFC2119" format="default"/> <xref target="RFC8174" format="default"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="survey-of-voucher-types" numbered="true" toc="default">
      <name>Survey of Voucher Types</name>
      <t>A voucher is a cryptographically protected statement to the pledge
device authorizing a zero-touch "imprint" on the join registrar of the
domain. The specific information a voucher provides is influenced by the
bootstrapping use case.</t>
      <t>The voucher can impart the following information to
the join registrar and pledge:</t>
      <dl>
        <dt>
Assertion Basis:  </dt>
        <dd>
          <t>Indicates the method that protects
the imprint (this is distinct from the voucher signature that
protects the voucher itself). This might include
manufacturer-asserted ownership verification, assured
logging operations, or reliance on pledge endpoint behavior
such as secure root of trust
of measurement. The join registrar might use this information.
Only some methods are normatively defined in this
document. Other methods are left for future work.</t>
        </dd>
        <dt>
Authentication of Join Registrar:  </dt>
        <dd>
          <t>Indicates how the pledge
can authenticate the join registrar.  This document defines
a mechanism to pin the domain certificate.
Pinning a symmetric key, a raw key, or "CN-ID" or "DNS-ID"
information (as defined in <xref target="RFC6125" format="default"/>) is left for future work.</t>
        </dd>
        <dt>
Anti-Replay Protections:  </dt>
        <dd>
          <t>Time- or nonce-based
information to constrain the voucher to time periods or bootstrap
attempts.</t>
        </dd>
      </dl>
      <t>A number of bootstrapping scenarios can be met using differing
combinations of this information. All scenarios address the primary
threat of a Man-in-The-Middle (MiTM) registrar gaining control over
the pledge device. The following combinations are "types" of vouchers:</t>
      <artwork name="" type="" align="left" alt=""><![CDATA[
             |Assertion   |Registrar ID    | Validity    |
Voucher      |Log-|Veri-  |Trust  |CN-ID or| RTC | Nonce |
Type         | ged|  fied |Anchor |DNS-ID  |     |       |
---------------------------------------------------------|
Audit        |  X |       | X     |        |     | X     |
-------------|----|-------|-------|--------|-----|-------|
Nonceless    |  X |       | X     |        | X   |       |
Audit        |    |       |       |        |     |       |
-------------|----|-------|-------|--------|-----|-------|
Owner Audit  |  X |   X   | X     |        | X   | X     |
-------------|----|-------|-------|--------|-----|-------|
Owner ID     |    |   X   | X     |  X     | X   |       |
-------------|----|-------|----------------|-----|-------|
Bearer       |  X |       |   wildcard     | optional    |
out-of-scope |    |       |                |             |
-------------|----|-------|----------------|-------------|

NOTE: All voucher types include a 'pledge ID serial-number'
      (not shown here for space reasons).
]]></artwork>
      <dl>
        <dt>
Audit Voucher:  </dt>
        <dd>
          <t>An Audit Voucher is named after the logging assertion mechanisms
that the registrar then "audits" to enforce local policy. The
registrar mitigates a MiTM registrar by auditing that an unknown
MiTM registrar does not appear in the log entries. This does not
directly prevent the MiTM but provides a response mechanism that
ensures the MiTM is unsuccessful. The advantage is that actual
ownership knowledge is not required on the MASA service.</t>
        </dd>
        <dt>
Nonceless Audit Voucher:  </dt>
        <dd>
          <t>An Audit Voucher without a validity period statement. Fundamentally,
it is the same as an Audit Voucher except that it can be issued in
advance to support network partitions or to provide a permanent
voucher for remote deployments.</t>
        </dd>
        <dt>
Ownership Audit Voucher:  </dt>
        <dd>
          <t>An Audit Voucher where the MASA service has verified the registrar
as the authorized owner.
The MASA service mitigates a MiTM registrar by refusing to generate
Audit Vouchers for unauthorized registrars. The registrar uses audit
techniques to supplement the MASA. This provides an ideal sharing of
policy decisions and enforcement between the vendor and the owner.</t>
        </dd>
        <dt>
Ownership ID Voucher:  </dt>
        <dd>
          <t>Named after inclusion of the pledge's CN-ID or DNS-ID within the
voucher. The MASA service mitigates a MiTM registrar by identifying
the specific registrar (via WebPKI) authorized to own the pledge.</t>
        </dd>
        <dt>
Bearer Voucher:  </dt>
        <dd>
          <t>A Bearer Voucher is named after the inclusion of a registrar ID
wildcard. Because the registrar identity is not indicated, this
voucher type must be treated as a secret and protected from exposure
as any 'bearer' of the voucher can claim the pledge
device. Publishing a nonceless bearer voucher effectively turns the
specified pledge into a "TOFU" device with minimal mitigation
against MiTM registrars. Bearer vouchers are out of scope.</t>
        </dd>
      </dl>
    </section>
    <section anchor="voucher" numbered="true" toc="default">
      <name>Voucher Artifact</name>
      <t>The voucher's primary purpose is to securely assign a pledge to an
owner.
The voucher informs the pledge which entity it should consider to be
its owner.</t>
      <t>This document defines a voucher that is a JSON-encoded instance of the
YANG module defined in <xref target="voucher-yang-module" format="default"/> that has been, by
default, CMS signed.</t>
      <t>This format is described here as a practical basis for some uses (such
as in NETCONF), but more to clearly indicate what vouchers look like
in practice.
This description also serves to validate the YANG data model.</t>
      <t>Future work is expected to define new mappings of the voucher to
Concise Binary Object Representation (CBOR) (from JSON) and to change
the signature container from CMS to JSON Object Signing and Encryption
(JOSE) or CBOR Object Signing and Encryption (COSE).
XML or ASN.1 formats are also conceivable.</t>
      <t>This document defines a media type and a filename extension for the
CMS-encoded JSON type.  Future documents on additional formats
would define additional media types.  Signaling is in the form of a MIME
Content-Type, an HTTP Accept: header, or more mundane methods like
use of a filename extension when a voucher is transferred on a USB
key.</t>
      <section anchor="voucher-tree-diagram" numbered="true" toc="default">
        <name>Tree Diagram</name>
        <t>The following tree diagram illustrates a high-level view of a voucher
document.
The notation used in this diagram is described in <xref target="RFC8340" format="default"/>.
Each node in the diagram is fully described by the YANG module in
<xref target="voucher-yang-module" format="default"/>.
Please review the YANG module for a detailed description of the
voucher format.</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
module: ietf-voucher

  grouping voucher-artifact-grouping
    +-- voucher
       +-- created-on                       yang:date-and-time
       +-- expires-on?                      yang:date-and-time
       +-- assertion                        ianavat:voucher-assertion
       +-- serial-number                    string
       +-- idevid-issuer?                   binary
       +-- pinned-domain-cert               binary
       +-- domain-cert-revocation-checks?   boolean
       +-- nonce?                           binary
       +-- last-renewal-date?               yang:date-and-time
]]></artwork>
      </section>
      <section anchor="voucher-examples" numbered="true" toc="default">
        <name>Examples</name>
        <t>This section provides voucher examples for illustration
purposes.  These examples conform to the encoding rules
defined in <xref target="RFC8259" format="default"/>.</t>
        <t>The following example illustrates an ephemeral voucher (uses a nonce).
The MASA generated this voucher using the 'logged' assertion type, knowing
that it would be suitable for the pledge making the request.</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
{
  "ietf-voucher:voucher": {
    "created-on": "2016-10-07T19:31:42Z",
    "assertion": "logged",
    "serial-number": "JADA123456789",
    "idevid-issuer": "base64encodedvalue==",
    "pinned-domain-cert": "base64encodedvalue==",
    "nonce": "base64encodedvalue=="
  }
}
]]></artwork>
        <t>The following example illustrates a non-ephemeral voucher (no nonce).
While the voucher itself expires after two weeks, it presumably can
be renewed for up to a year.   The MASA generated this voucher
using the 'verified' assertion type, which should satisfy all pledges.</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
{
  "ietf-voucher:voucher": {
    "created-on": "2016-10-07T19:31:42Z",
    "expires-on": "2016-10-21T19:31:42Z",
    "assertion": "verified",
    "serial-number": "JADA123456789",
    "idevid-issuer": "base64encodedvalue==",
    "pinned-domain-cert": "base64encodedvalue==",
    "domain-cert-revocation-checks": "true",
    "last-renewal-date": "2017-10-07T19:31:42Z"
  }
}
]]></artwork>
      </section>
      <section anchor="voucher-yang-module" numbered="true" toc="default">
        <name>YANG Module</name>
        <section anchor="iana-voucher-assertion-type-module" numbered="true" toc="default">
          <name>"iana-voucher-assertion-type" Module</name>
          <t>Following is a YANG <xref target="RFC7950" format="default"/> module formally
describing the voucher's assertion type.</t>
          <sourcecode type="yang" markers="true">
 module iana-voucher-assertion-type {
  namespace "urn:ietf:params:xml:ns:yang:iana-voucher-assertion-type";
  prefix ianavat;

  organization
    "IETF ANIMA Working Group";
  contact
    "WG Web:   &lt;https://datatracker.ietf.org/wg/anima/&gt;
     WG List:  &lt;mailto:anima@ietf.org&gt;
     Author:   Kent Watsen
               &lt;mailto:kwatsen@juniper.net&gt;
     Author:   Max Pritikin
               &lt;mailto:pritikin@cisco.com&gt;
     Author:   Michael Richardson
               &lt;mailto:mcr+ietf@sandelman.ca&gt;
     Author:   Toerless Eckert
               &lt;mailto:tte+ietf@cs.fau.de&gt;";
  description
    "This YANG module defines a YANG enumeration type for IANA
     -registered voucher assertion type. This YANG module is
     maintained by IANA and reflects the 'voucher assertion types'
     registry. The lastest revision of this YANG module can be
     obtained from the IANA web site.  Request for new enumerations
     should be made to IANA via email(iana@iana.org).

     The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
     NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
     'MAY', and 'OPTIONAL' in this document are to be interpreted as
     described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
     they appear in all capitals, as shown here.

     Copyright (c) 2018 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject to
     the license terms contained in, the Simplified BSD License set
     forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC XXX; see the
     RFC itself for full legal notices.";

  revision 2021-07-04 {
    description
      "Initial version";
    reference "RFC ZZZZ: Voucher Profile for Bootstrapping Protocols";
  }

  typedef voucher-assertion {
    description "Indicates what kind of ownership is being asserted by voucher";
    type enumeration {
      enum verified {
        value 0;
        description
          "Indicates that the ownership has been positively verified
           by the MASA (e.g., through sales channel integration).";
      }
      enum logged {
        value 1;
        description
          "Indicates that the voucher has been issued after
           minimal verification of ownership or control.  The
           issuance has been logged for detection of
           potential security issues (e.g., recipients of
           vouchers might verify for themselves that unexpected
           vouchers are not in the log).  This is similar to
           unsecured trust-on-first-use principles but with the
           logging providing a basis for detecting unexpected
           events.";
      }
      enum proximity {
        value 2;
        description
          "Indicates that the voucher has been issued after
           the MASA verified a proximity proof provided by the
           device and target domain.  The issuance has been logged
           for detection of potential security issues.  This is
           stronger than just logging, because it requires some
           verification that the pledge and owner are
           in communication but is still dependent on analysis of
           the logs to detect unexpected events.";
      }
      enum agent-proximity {
        value 3;
        description
          "Indicates that the voucher has been issued after the
           MASA...support of asynchronous enrollment in BRSKI";
     }
    }
  }
}
</sourcecode>
        </section>
        <section anchor="ietf-voucher-module" numbered="true" toc="default">
          <name>"ietf-voucher" Module</name>
          <t>The revised ietf-voucher YANG module imports the typedef defined in
"iana-voucher-assertion-type" YANG module specified in this document.</t>
          <sourcecode type="yang" markers="true">
module ietf-voucher {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-voucher";
  prefix vch;

  import ietf-yang-types {
    prefix yang;
    reference "RFC 6991: Common YANG Data Types";
  }
  import ietf-restconf {
    prefix rc;
    description
      "This import statement is only present to access
       the yang-data extension defined in RFC 8040.";
    reference "RFC 8040: RESTCONF Protocol";
  }

  import iana-voucher-assertion-type {
    prefix ianavat;
    reference "RFCZZZZ: Voucher Profile for Bootstrapping Protocols";
  }

  organization
    "IETF ANIMA Working Group";
  contact
    "WG Web:   &lt;https://datatracker.ietf.org/wg/anima/&gt;
     WG List:  &lt;mailto:anima@ietf.org&gt;
     Author:   Kent Watsen
               &lt;mailto:kwatsen@juniper.net&gt;
     Author:   Max Pritikin
               &lt;mailto:pritikin@cisco.com&gt;
     Author:   Michael Richardson
               &lt;mailto:mcr+ietf@sandelman.ca&gt;
     Author:   Toerless Eckert
               &lt;mailto:tte+ietf@cs.fau.de&gt;";
  description
    "This module defines the format for a voucher, which is produced by
     a pledge's manufacturer or delegate (MASA) to securely assign a
     pledge to an 'owner', so that the pledge may establish a secure
     connection to the owner's network infrastructure.

     The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
     NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
     'MAY', and 'OPTIONAL' in this document are to be interpreted as
     described in BCP 14 (RFC 2119) (RFC 8174) when, and only when, they
     appear in all capitals, as shown here.

     Copyright (c) 2018 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or without
     modification, is permitted pursuant to, and subject to the license
     terms contained in, the Simplified BSD License set forth in Section
     4.c of the IETF Trust's Legal Provisions Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC 8366; see the RFC
     itself for full legal notices.";

  revision 2021-07-04 {
    description
      "updated to support new assertion enumerated type";
    reference "RFC ZZZZ Voucher Profile for Bootstrapping Protocols";
  }

  // Top-level statement
  rc:yang-data voucher-artifact {
    uses voucher-artifact-grouping;
  }

  // Grouping defined for future augmentations

  grouping voucher-artifact-grouping {
    description
      "Grouping to allow reuse/extensions in future work.";
    container voucher {
      description
        "A voucher assigns a pledge to an owner (pinned-domain-cert).";
      leaf created-on {
        type yang:date-and-time;
        mandatory true;
        description
          "A value indicating the date this voucher was created.  This
           node is primarily for human consumption and auditing. Future
           work MAY create verification requirements based on this
           node.";
      }
      leaf expires-on {
        type yang:date-and-time;
        must 'not(../nonce)';
        description
          "A value indicating when this voucher expires.  The node is
           optional as not all pledges support expirations, such as
           pledges lacking a reliable clock.

           If this field exists, then the pledges MUST ensure that
           the expires-on time has not yet passed. A pledge without
           an accurate clock cannot meet this requirement.

           The expires-on value MUST NOT exceed the expiration date
           of any of the listed 'pinned-domain-cert' certificates.";
      }
      leaf assertion {
        type ianavat:voucher-assertion;
        mandatory true;
        description
          "The assertion is a statement from the MASA regarding how
           the owner was verified.  This statement enables pledges
           to support more detailed policy checks.  Pledges MUST
           ensure that the assertion provided is acceptable, per
           local policy, before processing the voucher.";
      }
      leaf serial-number {
        type string;
        mandatory true;
        description
          "The serial-number of the hardware.  When processing a
           voucher, a pledge MUST ensure that its serial-number
           matches this value.  If no match occurs, then the
           pledge MUST NOT process this voucher.";
      }
      leaf idevid-issuer {
        type binary;
        description
          "The Authority Key Identifier OCTET STRING (as defined in
           Section 4.2.1.1 of RFC 5280) from the pledge's IDevID
           certificate.  Optional since some serial-numbers are
           already unique within the scope of a MASA.
           Inclusion of the statistically unique key identifier
           ensures statistically unique identification of the hardware.
           When processing a voucher, a pledge MUST ensure that its
           IDevID Authority Key Identifier matches this value.  If no
           match occurs, then the pledge MUST NOT process this voucher.

           When issuing a voucher, the MASA MUST ensure that this field
           is populated for serial-numbers that are not otherwise unique
           within the scope of the MASA.";
      }
      leaf pinned-domain-cert {
        type binary;
        mandatory true;
        description
          "An X.509 v3 certificate structure, as specified by RFC 5280,
           using Distinguished Encoding Rules (DER) encoding, as defined
           in ITU-T X.690.

           This certificate is used by a pledge to trust a Public Key
           Infrastructure in order to verify a domain certificate
           supplied to the pledge separately by the bootstrapping
           protocol.  The domain certificate MUST have this certificate
           somewhere in its chain of certificates.  This certificate
           MAY be an end-entity certificate, including a self-signed
           entity.";
        reference
          "RFC 5280:
             Internet X.509 Public Key Infrastructure Certificate
             and Certificate Revocation List (CRL) Profile.
           ITU-T X.690:
              Information technology - ASN.1 encoding rules:
              Specification of Basic Encoding Rules (BER),
              Canonical Encoding Rules (CER) and Distinguished
              Encoding Rules (DER).";
      }
      leaf domain-cert-revocation-checks {
        type boolean;
        description
          "A processing instruction to the pledge that it MUST (true)
           or MUST NOT (false) verify the revocation status for the
           pinned domain certificate.  If this field is not set, then
           normal PKIX behavior applies to validation of the domain
           certificate.";
      }
      leaf nonce {
        type binary {
          length "8..32";
        }
        must 'not(../expires-on)';
        description
          "A value that can be used by a pledge in some bootstrapping
           protocols to enable anti-replay protection.  This node is
           optional because it is not used by all bootstrapping
           protocols.

           When present, the pledge MUST compare the provided nonce
           value with another value that the pledge randomly generated
           and sent to a bootstrap server in an earlier bootstrapping
           message.  If the values do not match, then the pledge MUST
           NOT process this voucher.";
      }
      leaf last-renewal-date {
        type yang:date-and-time;
        must '../expires-on';
        description
          "The date that the MASA projects to be the last date it
           will renew a voucher on. This field is merely informative; it
           is not processed by pledges.

           Circumstances may occur after a voucher is generated that
           may alter a voucher's validity period.  For instance, a
           vendor may associate validity periods with support contracts,
           which may be terminated or extended over time.";
      }
    } // end voucher
  } // end voucher-grouping
}
</sourcecode>
        </section>
      </section>
      <section anchor="cms-voucher" numbered="true" toc="default">
        <name>CMS Format Voucher Artifact</name>
        <t>The IETF evolution of PKCS#7 is CMS <xref target="RFC5652" format="default"/>.
A CMS-signed voucher, the default type, contains a ContentInfo
structure with the voucher content. An eContentType of 40
indicates that the content is a JSON-encoded voucher.</t>
        <t>The signing structure is a CMS SignedData structure, as specified by
Section 5.1 of <xref target="RFC5652" format="default"/>, encoded using ASN.1 Distinguished Encoding
Rules (DER), as specified in ITU-T X.690 <xref target="ITU-T.X690.2015" format="default"/>.</t>
        <t>To facilitate interoperability, <xref target="vcj" format="default"/> in this document registers the
media type "application/voucher-cms+json" and the filename extension
".vcj".</t>
        <t>The CMS structure <bcp14>MUST</bcp14> contain a 'signerInfo' structure, as
described in Section 5.1 of <xref target="RFC5652" format="default"/>, containing the
signature generated over the content using a private key
trusted by the recipient. Normally, the recipient is the pledge and the
signer is the MASA. Another possible use could be as a "signed
voucher request" format originating from the pledge or registrar
toward the MASA.
Within this document, the signer is assumed to be the MASA.</t>
        <t>Note that Section 5.1 of <xref target="RFC5652" format="default"/> includes a
discussion about how to validate a CMS object, which is really a
PKCS7 object (cmsVersion=1).  Intermediate systems (such the
Bootstrapping Remote Secure Key Infrastructures <xref target="BRSKI" format="default"/> registrar)
that might need to evaluate the voucher in flight <bcp14>MUST</bcp14> be prepared for
such an older format.
No signaling is necessary, as the manufacturer knows the capabilities
of the pledge and will use an appropriate format voucher for each
pledge.</t>
        <t>The CMS structure <bcp14>SHOULD</bcp14> also contain all of the certificates
leading up to and including the signer's trust anchor certificate
known to the recipient.  The inclusion of the trust anchor is
unusual in many applications, but third parties cannot accurately
audit the transaction without it.</t>
        <t>The CMS structure <bcp14>MAY</bcp14> also contain revocation objects for any
intermediate certificate authorities (CAs) between the
voucher issuer and the trust anchor known to the recipient.
However, the use of CRLs and other validity mechanisms is
discouraged, as the pledge is unlikely to be able to perform
online checks and is unlikely to have a trusted clock source.
As described below, the use of short-lived vouchers and/or a
pledge-provided nonce provides a freshness guarantee.</t>
      </section>
    </section>
    <section anchor="design-con" numbered="true" toc="default">
      <name>Design Considerations</name>
      <section anchor="renewal-over-revocation" numbered="true" toc="default">
        <name>Renewals Instead of Revocations</name>
        <t>The lifetimes of vouchers may vary.  In some bootstrapping protocols,
the vouchers may be created and consumed immediately, whereas in other
bootstrapping solutions, there may be a significant time delay between
when a voucher is created and when it is consumed.
In cases when there is a time delay, there is a need for the pledge
to ensure that the assertions made when the voucher was created are
still valid.</t>
        <t>A revocation artifact is generally used to verify the continued validity
of an assertion such as a PKIX certificate, web token, or a "voucher".  With
this approach, a potentially long-lived assertion is paired with a reasonably
fresh revocation status check to ensure that the assertion is still valid.
However, this approach increases solution complexity, as it introduces the
need for additional protocols and code paths to distribute and process the
revocations.</t>
        <t>Addressing the shortcomings of revocations, this document recommends
instead the use of lightweight renewals of short-lived non-revocable
vouchers.  That is, rather than issue a long-lived voucher, where the
'expires-on' leaf is set to some distant date, the expectation
is for the MASA to instead issue a short-lived voucher, where the
'expires-on' leaf is set to a relatively near date, along with a promise
(reflected in the 'last-renewal-date' field) to reissue the voucher again
when needed.  Importantly, while issuing the initial voucher may incur
heavyweight verification checks ("Are you who you say you are?" "Does the
pledge actually belong to you?"), reissuing the voucher should be a
lightweight process, as it ostensibly only updates the voucher's
validity period.
With this approach, there is
only the one artifact, and only one code path is needed to process
it; there is no possibility of a pledge choosing to skip the
revocation status check because, for instance, the OCSP Responder is
not reachable.</t>
        <t>While this document recommends issuing short-lived vouchers, the
voucher artifact does not restrict the ability to create long-lived
voucher, if required; however, no revocation method is described.</t>
        <t>Note that a voucher may be signed by a chain of intermediate CAs
leading up to the trust anchor certificate known by the pledge.  Even
though the voucher itself is not revocable, it may still be revoked,
per se, if one of the intermediate CA certificates is revoked.</t>
      </section>
      <section anchor="voucher-per-pledge" numbered="true" toc="default">
        <name>Voucher Per Pledge</name>
        <t>The solution described herein originally enabled a single voucher to
apply to many pledges, using lists of regular expressions to represent
ranges of serial-numbers.  However, it was determined that blocking the
renewal of a voucher that applied to many devices would be excessive
when only the ownership for a single pledge needed to be blocked.
Thus, the voucher format now only supports a single serial-number
to be listed.</t>
      </section>
    </section>
    <section anchor="sec-con" numbered="true" toc="default">
      <name>Security Considerations</name>
      <section anchor="clock-sensitivity" numbered="true" toc="default">
        <name>Clock Sensitivity</name>
        <t>An attacker could use an expired voucher to gain control over
a device that has no understanding of time.  The device cannot
trust NTP as a time reference, as an attacker could control
the NTP stream.</t>
        <t>There are three things to defend against this: 1) devices are
required to verify that the expires-on field has not yet passed,
2) devices without access to time can use nonces to
get ephemeral vouchers, and 3) vouchers without expiration times
may be used, which will appear in the audit log, informing the
security decision.</t>
        <t>This document defines a voucher format that  contains time values
for expirations, which require an accurate clock
in order to be processed correctly.  Vendors planning on
issuing vouchers with expiration values must ensure that devices
have an accurate clock when shipped from manufacturing
facilities and take steps to prevent clock tampering.
If it is not possible to ensure clock accuracy, then
vouchers with expirations should not be issued.</t>
      </section>
      <section anchor="protect-voucher-pki-in-hsm" numbered="true" toc="default">
        <name>Protect Voucher PKI in HSM</name>
        <t>Pursuant the recommendation made in Section 6.1 for the MASA to be
deployed as an online voucher signing service, it is <bcp14>RECOMMENDED</bcp14> that
the MASA's private key used for signing vouchers is protected by
a hardware security module (HSM).</t>
      </section>
      <section anchor="test-domain-certificate-validity-when-signing" numbered="true" toc="default">
        <name>Test Domain Certificate Validity When Signing</name>
        <t>If a domain certificate is compromised, then any outstanding
vouchers for that domain could be used by the attacker.  The domain
administrator is clearly expected to initiate revocation of any
domain identity certificates (as is normal in PKI solutions).</t>
        <t>Similarly,they are expected to contact the MASA to indicate that
an outstanding (presumably short lifetime) voucher should be blocked from
automated renewal.
Protocols for voucher distribution are
<bcp14>RECOMMENDED</bcp14> to check for revocation of domain identity certificates
before the signing of vouchers.</t>
      </section>
      <section anchor="yang-module-security-considerations" numbered="true" toc="default">
        <name>YANG Module Security Considerations</name>
        <t>The YANG module specified in this document defines the schema
for data that is subsequently encapsulated by a CMS signed-data
content type, as described in Section 5 of <xref target="RFC5652" format="default"/>.  As such,
all of the YANG modeled data is protected from modification.</t>
        <t>Implementations should be aware that the signed data is only
protected from external modification; the data is still visible.
This potential disclosure of information doesn't affect security
so much as privacy.  In particular, adversaries can glean
information such as which devices belong to which organizations
and which CRL Distribution Point and/or OCSP Responder URLs are
accessed to validate the vouchers.  When privacy is important,
the CMS signed-data content type <bcp14>SHOULD</bcp14> be encrypted, either by
conveying it via a mutually authenticated secure transport protocol
(e.g., TLS <xref target="RFC5246" format="default"/>) or by encapsulating the signed-data
content type with an enveloped-data content type (Section 6
of <xref target="RFC5652" format="default"/>), though details for how to do this are outside
the scope of this document.</t>
        <t>The use of YANG to define data structures, via the 'yang-data'
statement, is relatively new and distinct from the traditional use of
YANG to define an API accessed by network management protocols such as
NETCONF <xref target="RFC6241" format="default"/> and RESTCONF <xref target="RFC8040" format="default"/>. For this reason, these
guidelines do not follow template described by Section 3.7 of
<xref target="YANG-GUIDE" format="default"/>.</t>
      </section>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>This section deals with actions and processes necessary for IANA to undertake to maintain
the "iana-voucher-assertion-type" YANG module.
The iana-voucher-assertion-type YANG module is intended to reflect the "voucher assertion types" registry in [TBD].</t>
      <t>IANA is asked to create the "iana-voucher-assertion-type YANG module" registry.</t>
      <t>Voucher assertion types must not be directly added to the iana-voucher-type YANG module.
They must instead be added to the "voucher assertion types" registry.</t>
      <t>Whenever a new enumerated type is added to the "voucher assertion types" registry, IANA
must also update the "ietf-voucher-assertion-type" YANG module and add a new "enum"
statement to the "voucher-assertion-type" type.
The assigned name defined by the "enum" statement <bcp14>SHALL</bcp14> be the same as the mnemonic name of the new assertion type.
The following substatements to the "enum" statement <bcp14>SHALL</bcp14> be defined:</t>
      <artwork name="" type="" align="left" alt=""><![CDATA[
"value": Use the decimal value from the registry.

"status": Include only if a class or type registration has been deprecated or obsoleted.
IANA "deprecated" maps to YANG status "deprecated", and IANA "obsolete" maps to YANG status   "obsolete".

"description": Replicate the corresponding information from the registry, namely the full name of the new assertion type.

"reference": Replicate the reference(s) from the registry.
]]></artwork>
      <t>Each time the "iana-voucher-assertion-type" YANG module is updated, a new "revision" statement <bcp14>SHALL</bcp14> be added before the existing "revision" statements.
IANA has added this note to the "voucher assertion types" registries:</t>
      <t>When this registry is modified, the YANG module "iana-voucher-assertion-type" must
be updated as defined in [RFCXXXX].
The "Reference" text in the "voucher assertion types" registry has been updated
as follows:
OLD:
| [RFC8366]
NEW:
| [RFC8366][RFCXXX]</t>
      <section anchor="the-ietf-xml-registry" numbered="true" toc="default">
        <name>The IETF XML Registry</name>
        <t>This document registers two URIs in the "IETF XML Registry" <xref target="RFC3688" format="default"/>.</t>
        <t>IANA has registered the following:</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
   URI: urn:ietf:params:xml:ns:yang:ietf-voucher
   Registrant Contact: The ANIMA WG of the IETF.
   XML: N/A, the requested URI is an XML namespace.
]]></artwork>
        <t>IANA is asked to register a second URI as follows:</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
    URI: urn:ietf:params:xml:ns:yang:iana-voucher-assertion-type
    Registrant Contact: The ANIMA WG of the IETF.
    XML: N/A, the requested URI is an XML namespace.
]]></artwork>
      </section>
      <section anchor="the-yang-module-names-registry" numbered="true" toc="default">
        <name>The YANG Module Names Registry</name>
        <t>This document registers two YANG module in the "YANG Module Names"
registry <xref target="RFC6020" format="default"/>.</t>
        <t>IANA has registered the following:</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
   name:         ietf-voucher
   namespace:    urn:ietf:params:xml:ns:yang:ietf-voucher
   prefix:       vch
   reference:    RFC 8366
]]></artwork>
        <t>IANA is asked to register a second YANG module as follows:</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
   name:         iana-voucher-assertion-type
   namespace:    urn:ietf:params:xml:ns:yang:iana-voucher-assertion-type
   prefix:       ianavat
   reference:    RFC XXXX
]]></artwork>
      </section>
      <section anchor="vcj" numbered="true" toc="default">
        <name>The Media Types Registry</name>
        <t>This document registers a new media type in the "Media Types"
registry <xref target="RFC6838" format="default"/>. IANA has registered the following:</t>
        <dl>
          <dt>
Type name:  </dt>
          <dd>
            <t>application</t>
          </dd>
          <dt>
Subtype name:  </dt>
          <dd>
            <t>voucher-cms+json</t>
          </dd>
          <dt>
Required parameters:  </dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>
Optional parameters:  </dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>
Encoding considerations:  </dt>
          <dd>
            <t>CMS-signed JSON vouchers are ASN.1/DER encoded.</t>
          </dd>
          <dt>
Security considerations:  </dt>
          <dd>
            <t>See <xref target="sec-con" format="default"/></t>
          </dd>
          <dt>
Interoperability considerations:  </dt>
          <dd>
            <t>The format is designed to be broadly interoperable.</t>
          </dd>
          <dt>
Published specification:  </dt>
          <dd>
            <t>RFC 8366</t>
          </dd>
          <dt>
Applications that use this media type:  </dt>
          <dd>
            <t>ANIMA, 6tisch, and NETCONF zero-touch imprinting systems.</t>
          </dd>
          <dt>
Fragment identifier considerations:  </dt>
          <dd>
            <t>none</t>
          </dd>
          <dt>
Additional information:  </dt>
          <dd>
            <dl>
              <dt>
Deprecated alias names for this type:      </dt>
              <dd>
                <t>none</t>
              </dd>
              <dt>
Magic number(s):      </dt>
              <dd>
                <t>None</t>
              </dd>
              <dt>
File extension(s):      </dt>
              <dd>
                <t>.vcj</t>
              </dd>
              <dt>
Macintosh file type code(s):      </dt>
              <dd>
                <t>none</t>
              </dd>
            </dl>
          </dd>
          <dt>
Person and email address to contact for further information:  </dt>
          <dd>
            <t>IETF&nbsp;ANIMA WG</t>
          </dd>
          <dt>
Intended usage:  </dt>
          <dd>
            <t>LIMITED</t>
          </dd>
          <dt>
Restrictions on usage:  </dt>
          <dd>
            <t>NONE</t>
          </dd>
          <dt>
Author:  </dt>
          <dd>
            <t>ANIMA WG</t>
          </dd>
          <dt>
Change controller:  </dt>
          <dd>
            <t>IETF</t>
          </dd>
          <dt>
Provisional registration? (standards tree only):  </dt>
          <dd>
            <t>NO</t>
          </dd>
        </dl>
      </section>
      <section anchor="the-smi-security-for-smime-cms-content-type-registry" numbered="true" toc="default">
        <name>The SMI Security for S/MIME CMS Content Type Registry</name>
        <t>IANA has registered the following OID in the "SMI Security for S/MIME
CMS Content Type (1.2.840.113549.1.9.16.1)" registry:</t>
        <artwork name="" type="" align="left" alt=""><![CDATA[
            Decimal  Description                             References
            -------  --------------------------------------  ----------
            40       id-ct-animaJSONVoucher                  RFC 8366
]]></artwork>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC5652">
          <front>
            <title>Cryptographic Message Syntax (CMS)</title>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the Cryptographic Message Syntax (CMS).  This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="70"/>
          <seriesInfo name="RFC" value="5652"/>
          <seriesInfo name="DOI" value="10.17487/RFC5652"/>
        </reference>
        <reference anchor="RFC6020">
          <front>
            <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund">
              <organization/>
            </author>
            <date month="October" year="2010"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6020"/>
          <seriesInfo name="DOI" value="10.17487/RFC6020"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray">
              <organization/>
            </author>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format.  It was derived from the ECMAScript Programming Language Standard.  JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC7950">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund">
              <organization/>
            </author>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols.  This document describes the syntax and semantics of version 1.1 of the YANG language.  YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification.  There are a small number of backward incompatibilities from YANG version 1.  This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="ITU-T.X690.2015" target="https://www.itu.int/rec/T-REC-X.690/">
          <front>
            <title>Information Technology - ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author>
              <organization>International Telecommunication Union</organization>
            </author>
            <date year="2015" month="August"/>
          </front>
          <seriesInfo name="ITU-T Recommendation X.690," value="ISO/IEC 8825-1"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks">
              <organization/>
            </author>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol.  The TLS protocol provides communications security over the Internet.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC3688">
          <front>
            <title>The IETF XML Registry</title>
            <author fullname="M. Mealling" initials="M." surname="Mealling">
              <organization/>
            </author>
            <date month="January" year="2004"/>
            <abstract>
              <t>This document describes an IANA maintained registry for IETF standards which use Extensible Markup Language (XML) related items such as Namespaces, Document Type Declarations (DTDs), Schemas, and Resource Description Framework (RDF) Schemas.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="81"/>
          <seriesInfo name="RFC" value="3688"/>
          <seriesInfo name="DOI" value="10.17487/RFC3688"/>
        </reference>
        <reference anchor="RFC6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed">
              <organization/>
            </author>
            <author fullname="J. Klensin" initials="J." surname="Klensin">
              <organization/>
            </author>
            <author fullname="T. Hansen" initials="T." surname="Hansen">
              <organization/>
            </author>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols.  This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns">
              <organization/>
            </author>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund">
              <organization/>
            </author>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder">
              <organization/>
            </author>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman">
              <organization/>
            </author>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices.  It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages.  The NETCONF protocol operations are realized as remote procedure calls (RPCs).  This document obsoletes RFC 4741.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman">
              <organization/>
            </author>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund">
              <organization/>
            </author>
            <author fullname="K. Watsen" initials="K." surname="Watsen">
              <organization/>
            </author>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC8340">
          <front>
            <title>YANG Tree Diagrams</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund">
              <organization/>
            </author>
            <author fullname="L. Berger" initials="L." role="editor" surname="Berger">
              <organization/>
            </author>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document captures the current syntax used in YANG module tree diagrams.  The purpose of this document is to provide a single location for this definition.  This syntax may be updated from time to time based on the evolution of the YANG language.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="215"/>
          <seriesInfo name="RFC" value="8340"/>
          <seriesInfo name="DOI" value="10.17487/RFC8340"/>
        </reference>
        <reference anchor="RFC6125">
          <front>
            <title>Representation and Verification of Domain-Based Application Service Identity within Internet Public Key Infrastructure Using X.509 (PKIX) Certificates in the Context of Transport Layer Security (TLS)</title>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre">
              <organization/>
            </author>
            <author fullname="J. Hodges" initials="J." surname="Hodges">
              <organization/>
            </author>
            <date month="March" year="2011"/>
            <abstract>
              <t>Many application technologies enable secure communication between two entities by means of Internet Public Key Infrastructure Using X.509 (PKIX) certificates in the context of Transport Layer Security (TLS). This document specifies procedures for representing and verifying the identity of application services in such interactions.   [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6125"/>
          <seriesInfo name="DOI" value="10.17487/RFC6125"/>
        </reference>
        <reference anchor="RFC7435">
          <front>
            <title>Opportunistic Security: Some Protection Most of the Time</title>
            <author fullname="V. Dukhovni" initials="V." surname="Dukhovni">
              <organization/>
            </author>
            <date month="December" year="2014"/>
            <abstract>
              <t>This document defines the concept "Opportunistic Security" in the context of communications protocols.  Protocol designs based on Opportunistic Security use encryption even when authentication is not available, and use authentication when possible, thereby removing barriers to the widespread use of encryption on the Internet.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7435"/>
          <seriesInfo name="DOI" value="10.17487/RFC7435"/>
        </reference>
        <reference anchor="ZERO-TOUCH">
          <front>
            <title>Secure Zero Touch Provisioning (SZTP)</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen">
              <organization/>
            </author>
            <author fullname="I. Farrer" initials="I." surname="Farrer">
              <organization/>
            </author>
            <author fullname="M. Abrahamsson" initials="M." surname="Abrahamsson">
              <organization/>
            </author>
            <date month="April" year="2019"/>
            <abstract>
              <t>This document presents a technique to securely provision a networking device when it is booting in a factory-default state.  Variations in the solution enable it to be used on both public and private networks.  The provisioning steps are able to update the boot image, commit an initial configuration, and execute arbitrary scripts to address auxiliary needs.  The updated device is subsequently able to establish secure connections with other systems.  For instance, a device may establish NETCONF (RFC 6241) and/or RESTCONF (RFC 8040) connections with deployment-specific network management systems.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8572"/>
          <seriesInfo name="DOI" value="10.17487/RFC8572"/>
        </reference>
        <reference anchor="BRSKI">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin">
              <organization/>
            </author>
            <author fullname="M. Richardson" initials="M." surname="Richardson">
              <organization/>
            </author>
            <author fullname="T. Eckert" initials="T." surname="Eckert">
              <organization/>
            </author>
            <author fullname="M. Behringer" initials="M." surname="Behringer">
              <organization/>
            </author>
            <author fullname="K. Watsen" initials="K." surname="Watsen">
              <organization/>
            </author>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane.  To do this, a Secure Key Infrastructure is bootstrapped.  This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline.  We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device.  The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="SECUREJOIN">
          <front>
            <title>6tisch Secure Join protocol</title>
            <author fullname="Michael Richardson">
	 </author>
            <date day="25" month="February" year="2017"/>
            <abstract>
              <t>   This document describes a zero-touch mechanism to enroll a new device
   (the "pledge") into a IEEE802.15.4 TSCH network using the 6tisch
   signaling mechanisms.  The resulting device will obtain a domain
   specific credential that can be used with either 802.15.9 per-host
   pair keying protocols, or to obtain the network-wide key from a
   coordinator.  The mechanism describe her is an augmentation to the
   one-touch mechanism described in [I-D.ietf-6tisch-minimal-security].

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-6tisch-dtsecurity-secure-join-01"/>
        </reference>
        <reference anchor="YANG-GUIDE">
          <front>
            <title>Guidelines for Authors and Reviewers of Documents Containing YANG Data Models</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman">
              <organization/>
            </author>
            <date month="October" year="2018"/>
            <abstract>
              <t>This memo provides guidelines for authors and reviewers of specifications containing YANG modules.  Recommendations and procedures are defined, which are intended to increase interoperability and usability of Network Configuration Protocol (NETCONF) and RESTCONF protocol implementations that utilize YANG modules.  This document obsoletes RFC 6087.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="216"/>
          <seriesInfo name="RFC" value="8407"/>
          <seriesInfo name="DOI" value="10.17487/RFC8407"/>
        </reference>
        <reference anchor="Stajano99theresurrecting" target="https://www.cl.cam.ac.uk/research/dtg/www/files/publications/public/files/tr.1999.2.pdf">
          <front>
            <title>The Resurrecting Duckling: Security Issues for Ad-Hoc Wireless Networks</title>
            <author initials="F." surname="Stajano" fullname="Frank Stajano">
              <organization/>
            </author>
            <author initials="R." surname="Anderson" fullname="Ross Anderson">
              <organization/>
            </author>
            <date year="1999"/>
          </front>
        </reference>
        <reference anchor="imprinting" target="https://en.wikipedia.org/w/index.php?title=Imprinting_(psychology)&amp;oldid=825757556">
          <front>
            <title>Wikipedia article: Imprinting</title>
            <author surname="Wikipedia">
              <organization/>
            </author>
            <date year="2018" month="February"/>
          </front>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgements" toc="default">
      <name>Acknowledgements</name>
      <t>The authors would like to thank for following for
lively discussions on list and in the halls (ordered
by last name): William Atwood, Toerless Eckert, and Sheng Jiang.</t>
      <t>Russ Housley provided the upgrade from PKCS7 to CMS (RFC 5652) along
with the detailed CMS structure diagram.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
