<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.8 (Ruby 2.6.10) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc compact="yes"?>
<?rfc iprnotified="no"?>
<?rfc strict="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-anima-brski-discovery-11" category="std" consensus="true" submissionType="IETF" updates="draft-ietf-anima-brski-prm, rfc6690, rfc9733" tocDepth="5" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="BRSKI-discovery">BRSKI discovery and variations</title>

    <author initials="T." surname="Eckert" fullname="Toerless Eckert" role="editor">
      <organization abbrev="Futurewei">Futurewei USA</organization>
      <address>
        <postal>
          <country>USA</country>
        </postal>
        <email>tte@cs.fau.de</email>
      </address>
    </author>
    <author initials="E." surname="Dijk" fullname="Esko Dijk">
      <organization>IoTconsultancy.nl</organization>
      <address>
        <email>esko.dijk@iotconsultancy.nl</email>
      </address>
    </author>

    <date year="2026" month="March" day="19"/>

    <area>Operations and Management</area>
    <workgroup>ANIMA</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 108?>

<t>Bootstrapping Remote Secure Key Infrastructure (BRSKI) is a protocol to enroll pledge devices
automatically and secure with a registrar of an owner, relying also on proxies to facilitate
the communication and Manufacturer Authorized Signing Authorities (MASA) and Certificate 
Authorities (CA) to enable the enrollment.</t>

<t>This document specifies how to make BRSKI communications autoconfiguring, extensible and resilient
in the face of simultaneous use of different variations of the BRSKI protocol (BRSKI, BRSKI-AE,
BRSKI-PRM, constrained BRSKI, stateless constrained BRSKI proxies). This document
specifies a data model, IANA registry and BRSKI component procedures to achieve this.</t>

<t>This document does not define any new discovery methods. Instead, its data model allows
signaling of all current (and future) variations of the BRSKI family of protocols consistently
via different existing network discovery mechanisms: DNS-SD, CoAP discovery (CORE-LF) and GRASP.
Additional/future discovery mechanisms can also be supported through the IANA registry.</t>

<t>Automatic resiliency and load-sharing are enabled through the use of discovery mechanisms and the
provisioning of multiple instances of BRSKI components such as registrars and Join Proxies. This document
specifies the procedures to support load-sharing and (fast) failover under failure and recovery of
redundant components.</t>

<t>Future-proof deployments of BRSKI require Join Proxies that automatically support any current and future
BRSKI variation. This document specifies the procedures by which Join Proxies can support this through
specific Join Proxy protocol behavior and the use of discovery mechanisms.</t>

<t>The specification of discovery of pledges by their IDevID as introduced by BRSKI-PRM is refined in this document.</t>



    </abstract>



  </front>

  <middle>


<?line 136?>

<section anchor="terminology"><name>Terminology</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

<t>This document relies on the terminology defined in <xref target="BRSKI"/>.  The following additional terms are also used.</t>

<dl>
  <dt>Context:</dt>
  <dd>
    <t>A set of Services for whom the same set of variations applies</t>
  </dd>
  <dt>IP, IPv4, IPv6:</dt>
  <dd>
    <t>In this document, IP refers to (inclusively) IPv4 or IPv6. If a statement applies to only one of the two versions, then the terms IPv4 or IPv6 are used.</t>
  </dd>
  <dt>Initiator:</dt>
  <dd>
    <t>A host that is using an IP transport protocol to initiate a connection or transaction to another host called the responder.</t>
  </dd>
  <dt>Initiator socket:</dt>
  <dd>
    <t>A socket consisting of an initiators IP address, protocol and protocol port number from which it
initiates connections or transactions to a responder (typically UDP or TCP).</t>
  </dd>
  <dt>Objective Name:</dt>
  <dd>
    <t>See Service Name.</t>
  </dd>
  <dt>Resource Type:</dt>
  <dd>
    <t>See Service Name.</t>
  </dd>
  <dt>Responder:</dt>
  <dd>
    <t>A host that is using an IP transport protocol to respond to transaction or connection requests from an Initiator.</t>
  </dd>
  <dt>Responder socket:</dt>
  <dd>
    <t>A socket consisting of a responders IP address, protocol and protocol port
number on which it responds to requests of the protocol (typically UDP or TCP).</t>
  </dd>
  <dt>Role:</dt>
  <dd>
    <t>In this document, functionality of an entity in a variation of BRSKI that can act as a responder and whose supported variations can be discovered. BRSKI roles relevant in this document include Join Registrar, Join Proxy and pledge. The IANA registry defined by this document allows to specify variations for any roles. See also Context.</t>
  </dd>
  <dt>Socket:</dt>
  <dd>
    <t>The combination of an IP address, an IP protocol that utilizes a port number (such as TCP or UDP) and a port number of that protocol.</t>
  </dd>
  <dt>Service Name:</dt>
  <dd>
    <t>The name for (a subset of) the functionality/API provided by a discoverable responder socket. This term is inherited from <xref target="DNS-SD"/> but unless otherwise specified also used in this document to apply to any other discovery functionality/API. The terminology used by other mechanisms typically differs. For example, when <xref target="GRASP"/> is used to discover a responder socket for BRSKI, the Objective Name carries the equivalent to the service name. In <xref target="CORE-LF"/>, the Resource Type (rt=) carries the equivalent of the service name.</t>
  </dd>
  <dt>Type:</dt>
  <dd>
    <t>See Variation Type.</t>
  </dd>
  <dt>Variation:</dt>
  <dd>
    <t>A combination of one variation choice each for every variation type applicable to the context of one discoverable BRSKI communications.
For example, in the context of BRSKI, a variation is one choice for "mode", one choice for "enroll" and one choice for "vformat".</t>
  </dd>
  <dt>Variation Type:</dt>
  <dd>
    <t>The name for one aspect of a protocol for which two or more choices exist (or may exist in the future), and where the choice
can technically be combined orthogonal to other variation types. This document defines the BRSKI variation types "mode", "enroll" and "vformat".</t>
  </dd>
  <dt>Variation Type Choice:</dt>
  <dd>
    <t>The name for different values that a particular variation type may have.
For example, this document defines the choices "rrm" and "prm" for the BRSKI variation "mode".</t>
  </dd>
  <dt>ACP:</dt>
  <dd>
    <t>"An Autonomic Control Plane", <xref target="ACP"/>.</t>
  </dd>
  <dt>BRSKI:</dt>
  <dd>
    <t>"Bootstrapping Remote Secure Key Infrastructure", <xref target="BRSKI"/>.</t>
  </dd>
  <dt>BRSKI-AE:</dt>
  <dd>
    <t>"Alternative Enrollment Protocols in <xref target="BRSKI"/>", <xref target="BRSKI-AE"/>.</t>
  </dd>
  <dt>BRSKI-PRM:</dt>
  <dd>
    <t>"<xref target="BRSKI"/> with Pledge in Responder Mode", <xref target="BRSKI-PRM"/>.</t>
  </dd>
  <dt>cBRSKI:</dt>
  <dd>
    <t>"Constrained Bootstrapping Remote Secure Key Infrastructure (<xref target="BRSKI"/>)", <xref target="cBRSKI"/>.</t>
  </dd>
  <dt>COAP:</dt>
  <dd>
    <t>"The Constrained Application Protocol (CoAP)", <xref target="COAP"/>.</t>
  </dd>
  <dt>CORE-LF:</dt>
  <dd>
    <t>"Constrained RESTful Environments (CoRE) Link Format", <xref target="CORE-LF"/>.</t>
  </dd>
  <dt>cPROXY:</dt>
  <dd>
    <t>"Constrained Join Proxy for Bootstrapping Protocols", <xref target="cPROXY"/>.</t>
  </dd>
  <dt>DNS-SD:</dt>
  <dd>
    <t>"DNS-Based Service Discovery", <xref target="DNS-SD"/>.</t>
  </dd>
  <dt>EST:</dt>
  <dd>
    <t>"Enrollment over Secure Transport", <xref target="EST"/>.</t>
  </dd>
  <dt>GRASP:</dt>
  <dd>
    <t>"GeneRic Autonomic Signaling Protocol", <xref target="GRASP"/>.</t>
  </dd>
  <dt>GRASP-DNSSD:</dt>
  <dd>
    <t>"DNS-SD Compatible Service Discovery in GeneRic Autonomic Signaling Protocol (GRASP)", <xref target="I-D.eckert-anima-grasp-dnssd"/>.</t>
  </dd>
  <dt>JWS-VOUCHER:</dt>
  <dd>
    <t>"JWS signed Voucher Artifacts for Bootstrapping Protocols", <xref target="JWS-VOUCHER"/>.</t>
  </dd>
  <dt>lwCMP:</dt>
  <dd>
    <t>"Lightweight Certificate Management Protocol (CMP) Profile", <xref target="RFC9483"/>.</t>
  </dd>
  <dt>mDNS:</dt>
  <dd>
    <t>"multicast DNS", <xref target="mDNS"/>.</t>
  </dd>
  <dt>SCEP:</dt>
  <dd>
    <t>"Simple Certificate Enrolment Protocol", <xref target="RFC8894"/>.</t>
  </dd>
</dl>

</section>
<section anchor="overview"><name>Overview</name>

<t>Bootstrapping Remote Secure Key Infrastructure (BRSKI) is a protocol to enroll pledge devices
automatically and secure with a registrar of an owner of the pledge, often relying on proxies to facilitate
the communication and Manufacturer Authorized Signing Authorities (MASA) and Certificate 
Authorities (CA) to enable the enrollment. Readers are assumed to understand at least the
basic concepts of <xref target="BRSKI"/>, which describes how these entities communicate to support the BRSKI
protocol.</t>

<t>This document specifies how to make BRSKI communications autoconfiguring, extensible and resilient
in the face of simultaneous use of different variations of the BRSKI protocol (BRSKI, BRSKI-AE,
BRSKI-PRM, constrained BRSKI, stateless constrained BRSKI proxies). This document
specifies a data model, IANA registry and BRSKI component procedures to achieve this.</t>

<section anchor="challenges"><name>Challenges</name>

<t>BRSKI was designed to support multi-vendor deployments ideally with zero additional
provisioning in the network just to support BRSKI. In recent years, multiple
variations of the BRSKI protocol were specified, such as BRSKI with Pledge in Responder Mode <xref target="BRSKI-PRM"/>,
BRSKI with Alternate Enrollment <xref target="BRSKI-AE"/>, constrained BRSKI <xref target="cBRSKI"/> and constrained BRSKI <xref target="cPROXY"/>;
within these documents there are multiple options that need to be supported by all BRSKI entities involved in a BRSKI
enrollment, such as pledge, proxy and registrar.</t>

<t><list style="numbers">
  <t>Assume for example a registrar from vendor A is deployed in an enterprise network
or manufacturing plant to support a variety of pledges from an ecosystem of vendors all
using the vendor A registrar, and a particular subset of BRSKI protocol variations.
Later, it becomes necessary to also deploy various pledges from a different ecosystem.
Vendor B provides a registrar for this ecosystem, but they do use some slight variation
of BRSKI. Now the proxies deployed through either the A or B ecosystem discover either
registrars A or B and randomly pick one. And in case they pick the wrong registrar,
enrollment for the pledge will fail because the proxy variation of BRSKI is not compatible
with the variation(s) supported by the chosen registrar.  <vspace blankLines='1'/>
Now the proxy implementations coming either from A or B start to fix up the issue
by introducing some proprietary extension to only discover "their" type of registrar.
Now a pledge from the A ecosystem can only be enrolled behind an A proxy and a B pledge
only behind a B proxy. The network operator now falls into the next trap: It is not
possible anymore to have networks where both A and B pledges can be enrolled, because
it is physically not possible or financially feasible to deploy both A and B proxies.
Or if they are deployed, pledges would only randomly pick the right proxy.</t>
  <t>Some use-case community wants to introduce a new variation aspect, such as introducing
a new encoding method for the message exchanges or a different certificate enrollment
protocol. But now this aspect can be combined with any possible other aspect of BRSKI.
And without appropriate planning upfront this ends up in more chaos of ad-hoc definition
every time some ecosystem prefers one specific variation of options.</t>
  <t>As if variations were not difficult enough, networks may only support one specific
autodiscovery protocol, and specific variations did not bother to define how their
variation of BRSKI could be discovered by another discovery protocol mechanism.
So that variation then invents yet another one-off way to discover its variation
in this new type of discover method in this now more important type of networks.</t>
</list></t>

<t>The following sub-sections attempt to more formally describe the different challenges
in a technically more precise language.</t>

<section anchor="signaling-brski-variation-for-responder-selection"><name>Signaling BRSKI variation for responder selection</name>

<t>When an initiator uses a discovery mechanism such as <xref target="DNS-SD"/>
to discover an instance of the service that it intends to connect to, it may discover more than one such instance.</t>

<t>For example, BRSKI pledges want to discover Join Proxies or registrars.
In the presence of variations of the BRSKI mechanisms that impact interoperability, performance
or security, not all discovered instances may support exactly what the initiator needs to achieve
interoperability or they may not provide the best desired metric. To support choosing the best
interoperable responder, the discovery mechanism needs to carry the necessary
additional information beside the service name that indicates the service/role of the responder.</t>

</section>
<section anchor="consistent-support-for-variations-across-different-discovery-mechanisms"><name>Consistent support for variations across different discovery mechanisms.</name>

<t>Different BRSKI deployments may prefer different discovery mechanisms, such as <xref target="DNS-SD"/>, <xref target="GRASP"/>,
<xref target="CORE-LF"/> or others. Any variation in discovery already defined for one discovery mechanism usually
has to be re-specified individually for every other discovery mechanism. This makes it often cumbersome
to select the preferred discovery mechanism for a specific type of deployment, because such additional
specification work can take a long time. Independent specification of variations for different
discovery mechanisms can also easily lead to inconsistencies and hence the inability to equally
support all variations across all discovery mechanisms.</t>

</section>
<section anchor="variation-agnostic-support-for-join-proxies"><name>Variation agnostic support for Join Proxies</name>

<t>Pledges or Agents often need to connect to a registrar that supports the variation of BRSKI
supported by the pledge or Agent via a Join Proxy. The Join Proxy needs to discover registrars
and the variations they support and then announce themselves to pledges or Agents accordingly
so that when the pledge or Agent connects to the Proxy that it will connect it to the right
registrar.</t>

<t>This document defines variations so that Join Proxies can be implemented and operated agnostic 
of variations: When a Join Proxy supports one variation for a particular IP version and transport
(TCP, UDP stateful/stateless), then it can support all current and future variations for the
same IP version and transport without the need for Join Proxy software or configuration updates.</t>

<t>To support agnostic implementations, variations can only differ in the payload of messages carried
across those TCP/UDP connections, but not the transport mechanisms used. New transport mechanisms cannot be
variations, but need to be so-called contexts.</t>

<t>The choice of encoding of variations into different discovery methods also needs to ensure that it
can be discovered by legacy Join Proxy implementations.</t>

<t>Initial support for variations in proxies does create additional coding effort:
When a pledge or Registrar-Agent connects to a Join Proxy with the need to use a specific variation
on a registrar, then the Join Proxy needs to understand which variation that is, so that it can connect
the pledge or registrar to a registrar supporting that variation. This requires that proxies create
per-variation responder sockets.</t>

</section>
</section>
<section anchor="functional-summary"><name>Functional Summary</name>

<t>This document specifies a set of IANA registry tables for BRSKI. These tables allow to define
the attributes for different registry mechanisms to announce and discover different BRSKI role
responders as well as their variations. Defining these via registry tables maximizes consistency
across discovery mechanisms and eases support of variations across different discovery
mechanisms.</t>

<t>Using the discovery information specified through these tables, this document specifies
details of selection and fail-over when discovering more than one interoperable and available responder,
These procedures intend to provide resilience and scalability of BRSKI services not possible without dynamic
discovery mechanisms.</t>

<t>Finally, this document specifies procedures for Join Proxies to discover variations of registrars
using any discovery mechanism, announce them to pledges - and connect a pledge accordingly
to the right registrar based on the variation required by the pledge.  These procedures allow
introducing new variations of BRSKI without need to upgrade proxies.</t>

</section>
</section>
<section anchor="specification"><name>Specification</name>

<section anchor="data-model"><name>Data Model</name>

<t>BRSKI Discovery is about discovery of one or more instances of responders supporting
a specific BRSKI role - and determining whether that responder's variation of BRSKI protocol
options is compatible with / desired by the connection initiator. This section gives
the conceptual overview of how this is achieved.</t>

<section anchor="roles-and-services"><name>Roles and Services</name>

<t>In this document, a service is a specific functionality provided by a responder over
a network socket using a particular transport/security/session stack (such as TCP, UDP, COAP, DTLS).</t>

<t>In this document, a role is functionality performed by a BRSKI entity either as an initiator or responder.
<xref target="BRSKI"/> defines the roles of pledge, Join Proxy, registrar, MASA. <xref target="BRSKI-PRM"/>
adds the role Registrar-Agent. Trust anchor is a dependent role required by BRSKI, provided
through <xref target="EST"/> or other protocols in <xref target="BRSKI-AE"/>.</t>

<t>A single entity may implement multiple roles such as registrars that also often implement
the Join Proxy Role or pledges which stop being a pledge after enrolment but often
then become Join Proxies. Future BRSKI documents may introduce additional roles and many of the definitions in this
document should be extensible to also support such additional roles.</t>

<t>In this document a service is functionality performed as a result of a network connection
from an initiator to a responder. The service is commonly named after the role name of the responder,
such as Join Proxy, registrar or MASA.</t>

</section>
<section anchor="service-names"><name>Service Names</name>

<t>The role that a responder socket supports is indicated in each discovery mechanism through an
appropriate signalling element. <xref target="DNS-SD"/> calls this signalling element the Service Name. Due to
the absence of another equally widely used term for this type of signalling element across arbitrary
discovery mechanisms, this document also refers to the role signaling element as the service name,
 independent of the discovery mechanism.  IP Address, IP transport protocol and IP transport
protocol port are not part of the Service name and are signaled through discovery-mechanism-specific signaling elements.</t>

</section>
<section anchor="variations"><name>Variations</name>

<t>Variations in the BRSKI protocol such as the choice of encoding of messages or features
could impact interoperability between initiator and responder. Initiators
need to be able to discover and select responders based not only on the desired role,
but also based on the best variation for the initiator.</t>

<t>Variations of a role could be indicated by using a different Service Name for every variation,
but that approach would have two challenges</t>

<t><list style="numbers">
  <t>Service Names in different discovery mechanisms are typically not hierarchical (e.g.: not
"role.variation"). Relying only on Service Names would thus require the registration for
every variation as a separate Service Name in a "flat" name space; and register them once for each discovery mechanism.
In addition, not all discovery mechanism registry rules may look favorably at the registration
of Service Names for such protocol variations.</t>
  <t>Whenever a new variation is introduced, all deployed BRSKI proxies would need to be configured
to also proxy this new variation - because new Service Names for the same BRSKI role can
be auto-discovered by proxies (without additional protocol mechanisms that would be more
complex than the variations approach). Most Join Proxies should be able to operate without
configuration though.</t>
</list></t>

<t>For these reasons, this document introduces the encoding of BRSKI (role) variations
through a secondary signaling element in each discovery method, enabling proxies to transparently
support any variation of BRSKI role connections for which they support proxying.</t>

<t>In addition, variations only need to be registered once in a BRSKI specific registry table introduced
by this document, and not once for each current or future discovery method.</t>

<t>A variation is hence specified as describing a combination of signaling choices that a BRSKI connection may
use and that impacts interoperability between initiator and responder at the message
exchange and encoding level.</t>

</section>
<section anchor="variation-types"><name>Variation Types</name>

<t>Today, BRSKI connections can exchange vouchers in one out of multiple different
encoding formats. Independent of that option, the BRSKI connection may also use different
commands (so called "Endpoints"). Today, these are based on whether <xref target="BRSKI-PRM"/> is used or not.
Finally, and also independent of those two options, the BRSKI connection may use one out of multiple
different enrollment protocol options.</t>

<t>This document calls these options "Variation Type", and the above three variation types
are called "vformat" for the voucher format, "mode" for the Endpoints being used (such as
PRM or not), and "enroll" for the enrollment protocol used.</t>

</section>
<section anchor="variation-type-choices"><name>Variation Type Choices</name>

<t>The actual choices for each of these variation types are hence called "Variation Type Choices":
"prm" or "rrm" for the variation type "mode". "cmsj", "cose" or "jose" for the variation type "vformat".
"est", "cmp" or "scep" for the variation type "enroll".</t>

<t>"scep" is an example for the ability of the registration to reserve values: it is not adopted
by any current BRSKI specification.</t>

</section>
<section anchor="variation-strings"><name>Variation Strings</name>

<t>The string name of a variation is as a string concatenating a single variation type choice for every
(necessary) variation type. For example "rrm-cmsj-est" could be describing the protocol options
used by a <xref target="BRSKI"/> connection pledge to registrar - potentially through a Join Proxy. This string
representation of a variation is called the variation string and it is consistently
used for signalling across any discovery mechanisms.</t>

<t>When in the future, additional variation types and choices are introduced, existing variation
strings must not be changed to allow full backward compatibility with existing/deployed implementations.</t>

<t>For example, when using BRSKI over UDP, today only COAPS is supported, but BRSKI UDP sockets
could equally work with QUIC (which runs on top of UDP). At that time, a new variation type of e.g.: "proto"
could be introduced with variation type choices "coaps" and "quic". For backward compatibility,
"coaps" then needs to be defined to be the default for BRSKI over UDP, which means that
existing variation strings such as "rrm-cmsj-est" imply the use of "coaps", whereas the use
of QUIC would have to be indicated explicitly via "rrm-cmsj-est-quic".</t>

<t>For variation strings to be semantically unambiguous, the variation type choices across all
variation types have distinct names, and the order in which variation type choices are
concatenated is the order in which variation types are defined in the according registry
table. Hence new variation type choices have to be tail added to the registry table.</t>

<t>Just because a variation name is composed from variation type choices does not mean that
an unspecified variation of (random) variation type choices can work without new implementation
or specification. Or even make sense. This may be the case, or it may not. This is also the reason
why this document specifies a registry that explicitly enumerates all variations that are
known to have sufficient specification and will work.</t>

<t>For example, <xref target="BRSKI-PRM"/> is indicated through the variation type value "prm", but it may also requires
enhancements to the enrolment protocol used, which is specified in the variation type "enroll", such as
new endpoints in that protocol.  The required functional semantic implied by the "enroll" variation type
value in variations with "prm" is thus a different one than in variations not using "prm". And
<xref target="BRSKI-PRM"/> does not necessarily sufficiently specify these enhancements for enrollment protocols
that may not have been known or specified by the time <xref target="BRSKI-PRM"/> was written.</t>

</section>
<section anchor="contexts"><name>Contexts</name>

<t>Variation strings are defined separately for every group of services for which the
set of variation strings is or could be different or could have different semantics.
A group of services for which the same variation strings are defined is called a Context.</t>

<t>Different list of variation strings are necessary when services have different variation types,
different variation type values, different deployed variations or different defaults
for the same variation type values and hence different variation strings.</t>

<t>"tBRSKI" is the context covering <xref target="BRSKI"/> connections (which are using TCP, hence the "t") from pledge to Join Proxy or registrar and from Join Proxy to registrar connections.</t>

<t>"cBRSKI" ("c"onstrained BRSKI) is the context covering <xref target="cBRSKI"/> 
connections (using UDP) from pledge to Join Proxy or registrar and from Join Proxy to registrar connections.</t>

<t>"BRSKI-PLEDGE" is the context covering pledges using <xref target="BRSKI-PRM"/> for connections
from Registrar-Agents to pledges. It can equally cover in the future through variations the discovery of 
<xref target="BRSKI"/> pledges for connections to them for other purposes - by introduction of
appropriate variation types and values for such additional purposes.</t>

<t>This document does not define variations for different end-to-end encryption mechanisms.
However, the mechanisms described here can also be used to introduce backward incompatible new secure transport options.</t>

<t>Also, this document does not introduce contexts for discovery of other BRSKI roles beyond those mentioned,
such as discovery of MASA by registrars. However, the registries introduced by this document are defined such
that those can be introduced later as well through additional registry entries and specifications.</t>

</section>
<section anchor="discussion"><name>Discussion</name>

<t>Variations as defined by this document only cover protocol options that proxies can
transparently support so that the definition of variations allows to make proxies automatically
extensible.</t>

<t>Other responder selection criteria such as different responder priority or performance based selection 
(called weight in <xref target="DNS-SD"/>) are not covered by the variation concept but can
be used without change in conjunction with variations.  Some selection criteria may also only work with
discovery mechanisms that rely on specific procedures. Network distance to responder can for example
only be well supported by discovery mechanisms that can support per-hop forwarding between initiator
and responder, such as <xref target="GRASP"/>. Any of these criteria will work unchanged with the introduction
of Variations. Variations are simply one more selection criteria.</t>

<t>Differences in the supported transport stack of a responder are typically included as a
signaling element of the discovery method: Whether TCP or UDP or another IP transport protocol
is used, and whether the responder uses IP or even another network layer protocol.</t>

<t>In "sane" services where a change in transport spec does not imply a change in signalled messages
and their semantics, gateways could transparently proxy from IP and vice versa or
even between TCP and some other IP transport protocols such as SCTP. However, this is out of
scope of this specification.</t>

<t>The procedures specified in <xref target="cPROXY"/> would allow not only to
run a transport stack of COAP over DTLS, but equally any other transport stack over UDP, such
as QUIC - without any changes to the Join Proxy implementation or configuration when following
the procedures described in this document. All that is needed would be to introduce appropriate
registration entries for the registry tables specified in this document (e.g.: add new Variation Type
for transport and choices such as "coaps" or "quic" ).</t>

</section>
<section anchor="iana-registry-tables"><name>IANA Registry Tables</name>

<t>This sub-section re-states and summarizes the desired Data Model introduced before in its
instantiation of the IANA Registry (and sub-registries) requested by this document,
the so-called "BRSKI Discovery Parameters" registry (<xref target="reg-discovery"/>).</t>

<t>The detailed requirements for registrations and initial content of the registry tables are
defined in the IANA section for it.</t>

<section anchor="discovery-mechanisms-registry"><name>Discovery Mechanisms registry</name>

<t>The main Discovery Parameters table ({#reg-discovery}) simply defines the abbreviations
for the Discovery Mechanisms specified for use with BRSKI Discovery: CORE-LF, DNS-SD and GRASP.
It allows to add new Discovery mechanisms and track where they are specified - including
outside the IETF.</t>

<t>This table is called the "main" table because the "BRSKI Discovery Parameters" is a
registry with sub-registries and one table has to be associated with the registry itself
instead of a sub-registry.</t>

</section>
<section anchor="contexts-sub-registry"><name>Contexts sub-registry</name>

<t>The IANA "Contexts" sub-registry, <xref target="subreg-contexts"/> registers names for different
groups of services in the overall BRSKI framework: BRSKI for <xref target="BRSKI"/> Registrar-&gt;Proxy-&gt;Pledge,
cBRSKI for constrained BRSKI (<xref target="cBRSKI"/> / <xref target="cPROXY"/>)
Registrar-&gt;(Proxy)-&gt;Pledge, and BRSKI-PLEDGE for <xref target="BRSKI-PRM"/> discovery of pledges.</t>

<t>Grouping services allows to limit registrations/definitions in other registry tables to
these Contexts as opposed to repeating them for every service (Registrar, Stateless-Registrar, Proxy 
for example).</t>

<t>Distinguishing BRSKI from cBRSKI is also necessary so that the different Transport Stack
parameter(s) between the two can be appropriately included into the registries (see <xref target="subreg-service-names"/>)</t>

<t>The Contexts sub-registry also registers the list of Variation Types defined for each context.
The Variation Types are the different aspects of the BRSKI protocols for which different
choices have been specified or could be specified.</t>

</section>
<section anchor="service-names-sub-registry"><name>Service Names sub-registry</name>

<t>The IANA "Service Names" sub-registry, <xref target="subreg-service-names"/> registers the "Service Names"
used to discovery the different BRSKI services for each context and Discovery Mechanism. It also
specifies the necessary (Transport Stack) Parameters that needs to be used in the discovery
mechanism to indicate (discover or recognize in discovery replies) the service. In the
initial table as specified by this document this is primarily used to distinguish BRSKI
services which use TCP and cBRSKI services which use coaps, also represented as UDP  in
some discovery mechanisms (such as DNS-SD).</t>

</section>
<section anchor="variation-type-choices-sub-registry"><name>Variation Type Choices sub-registry</name>

<t>The "IANA Variation Type Choices", <xref target="subreg-choices"/> depends on the definition of Variation Types
from the Contexts sub-registry, <xref target="subreg-contexts"/> by defining the specified choices for each
Variation Type and registers the specification(s) where they are defined.</t>

<t>Registration of a Variation Type Choice is per Context, so that different Contexts can
have different specification (and hence procedures) for the same Variation Type. In
the initial registry content requested by this document, this is used to refer to the
separate specification for BRSKI variations and cBRSKI variations.</t>

</section>
<section anchor="variations-sub-registry"><name>Variations sub-registry</name>

<t>The IANA "Variations" sub-registry, <xref target="subreg-variations"/> registers the so-called "Variation String"
encoding of variations of BRSKI protocols services for each Context. This is ultimately the
encoding specified in this document to be used to signal across all Discovery Methods the
actual Variations supported by a Service Instance. This sub-registry depends on the definitions
of the prior registry tables, which is why it is last.</t>

<t>A Variation is a combination of one Variation Type Choice for every Variation Type. Effectively,
it describes one way that a particular BRSKI service can operate. With the Variation Types
"mode", "vformat" (voucher format) and "enroll" (enrollment protocol) specified in this
document, it is possible to specify a Variation that has a different overall procedure: "mode"
can be "rrm" to indicate the pledge driven progression of BRSKI (as in <xref target="BRSKI"/> and
<xref target="cBRSKI"/>) or the "prm" Variation Type Choice as specified
in <xref target="BRSKI-PRM"/>. "vformat" specifies one of the encoding options possible
for the voucher exchanged in BRSKI, and "enroll" specifies the enrollment protocol, which
logically is separate from BRSKI but factually included into BRSKI because it so far not only
shares most of the time the secure Pledge to Registrar connection, but it also is an
interoperability requirement between Registrar and Pledge: Both need to support the same
encoding for a BRSKI exchange to finish successfully.</t>

<t>Some Variation Type Choices may actually impact other Variation Types, for example, "prm"
does impact also details relating to the enrollment protocol, and <xref target="BRSKI-PRM"/>
accordingly specifies how the <xref target="EST"/> ("enroll" = "est") needs to be modified to operate
"prm". For this reason, the Variations sub-registry only enlists Variations that 
are explicitly specified somewhere as actually being a working combination of Variation
Type Choices. Instead of simply permitting implementations to announce all the Variation
Type Choices separately - and hope any combinations actually do work.</t>

<t>Variations are encoded as Variation Strings which are combined by concatenating the
Variation Type Choice strings with "-", leaving out those Variation Type Choices that
are the "Default" (Dflt in the sub-registry). This encoding scheme allows to maintain
unchanged old Variation Strings when introducing new Variation Types in a backward
compatible fashion. The backward compatible choice for a new Variation Type is marked
as "Dflt", does hence not need to be included in the Variation Type Choice, and hence
the pre-existing Variation Strings without the new Variation Type can continue to
exist and be used without changes.</t>

</section>
</section>
</section>
<section anchor="redundant-discovery-and-selection"><name>Redundant Discovery and Selection</name>

<t>The following subsections describe requirements for resilient and scalable responder
selection. Resilience is supported by automatically selecting the currently best available
responder. Scalability of simultaneous sessions is supported through distributing the connections from multiple
initiators to different responders if so desired through operator configuration of the
discovery methods parameters.</t>

<t>At the time of this specification, the relevant initiators are BRSKI pledges, Join Proxies and Registrar-Agents,
the relevant responders are Join Proxies and BRSKI Registrars. Nevertheless, the rules defined
in this document can equally apply to other BRSKI connections if and when discoverable and redundant
services are desired and added to the registries created by this document. For example discovery of MASA by BRSKI
Registrars.</t>

<t>Note that this specification does not mandate support for specific discovery methods in BRSKI
implementations, because this is specific to the target deployment scenarios - hence the
option to support different discovery methods.</t>

<t>Note that while pledges are discoverable in the context of this documents technologies, this section
and its subsections do not apply to discovery of pledges because there is no redundancy involved,
and selection of pledges is also only by their ID and not by their supported variation.</t>

<section anchor="responder-selection"><name>Responder Selection</name>

<t>If more than one responder is discovered by an initiator, then the initiator
<bcp14>SHOULD</bcp14> support to sequentially attempt to connect to each feasible responder exactly once until
it successfully connects to one. If it fails to connect to any feasible responder,
the initiator <bcp14>SHOULD</bcp14> wait until at least 30 seconds have elapsed since the start of the
last round and update its discoverable responder information from the discovery mechanism
if that is not already happening automatically by the chosen discovery method before it
restarts connection attempts.</t>

<t>A responder is feasible if it supports one or more of the variations requested by the initiator.</t>

<t>The order of responders to attempt connections to is derived from two criteria: preference and weight.</t>

<t>Preference order is foremost determined by the responder's preference across the variations it
supports. Within the set of responders with the same preference by the initiator because of their
variation, the preference is further determined from discovery method specific preference
parameters such as the "priority" parameter in DNS-SD, or possible future distance
parameters in discovery mechanisms like GRASP.</t>

<t>If a responder socket offers more than one variation supported by the initiator
its preference order is calculated from the most preferred variation supported by it.</t>

<t>Within a set of two or more responders with the same preference, the initiator <bcp14>MUST</bcp14> pick at random,
especially after power-on or other reboot events. This is to ensure that those events have
the chance to overcome possible persistent problems when persistently choosing the same
first responder. If deployments desire reproducible and predictable ordering of connection
attempts by initiators then they have to use the discovery specific mechanisms, such
as a different "priority" parameter for each responder in DNS-SD to create such a strict
ordering across the different responders.</t>

<t>Initiators <bcp14>SHOULD</bcp14> support to take discovery mechanism specific weighting 
into account when determining the order of responders with the same preference,
such as the "weight" parameter in DNS-SD.</t>

<t>Support for the so far described resilient selection of responders <bcp14>SHOULD</bcp14> support
selection amongst at least 4 and no more than 10 responders with one or more
supported variation for each supported IP address family (v4 and/or v6). If more responders
are discovered for the preferred variation(s) of the initiator, then it <bcp14>SHOULD</bcp14> pick
a random subset of those responder announcements to select from.</t>

<t>4 Responders for a specific variation are a typical minimum resilience setup in a larger
network setup, in which 2 responders serve as redundancy at the responder host level and
the other 2 responders provide redundancy against network connectivity failure to those
first two responders. Intra-DC and Inter-DC service redundancy is a simple example of such a setup.</t>

</section>
<section anchor="service-announcements"><name>Service Announcements</name>

<t>Responder selection as described in <xref target="responder-selection"/> needs to deal with
unresponsive responders because service announcements may be stale. This happens when
service announcements only loosely track aliveness of a service process.</t>

<t>In typical implementations, service announcement may be activated when the
service process starts, and stopped, when it stops. Problems such as a hanging (unresponsive)
service process will not be reflected in the service announcement setup. In addition,
caching of service announcements, such as through the DNS TTL field are a further
possible cause of assuming service aliveness that is not correct. Only actual
connection probing or other similar tracking can determine if a service responder is responsive
to the level of accepting connections.</t>

<t>Responders intended to be used in resilient deployments <bcp14>SHOULD</bcp14> therefore ensure
that their service announcements are not active when the responder died or would
have failed to successfully accept connection for 120 seconds or more. This can
be implemented for example by connection probing once every 30 seconds and
withdrawing the service announcements when this fails or by other forms
of tracking responsiveness of the responder functionality.</t>

<t>The better service announcements indicate actual aliveness of the service instances, the
faster service selection will be. In addition, in large networks, backup/standby
service instances can then be implemented by tracking primary service announcements
and activating the backup only when the primary ones fail. Such dynamic backup
can further reduce the overall load on the discovery mechanism system used and
on initiators.</t>

</section>
<section anchor="proxy-selection"><name>Responder Selection in Proxies</name>

<t>Unless amended by the requirements listed below, proxies <bcp14>SHOULD</bcp14> follow all the
description from <xref target="responder-selection"/>.  Note that the random selection of
responders with the same preference also applies to stateful proxies and ensures
load balancing (including weighting) across multiple simultaneously connecting pledges.</t>

<t>Stateful proxies <bcp14>SHOULD</bcp14> optimize selection of responders for each variation across
connections for multiple pledges instead of starting the sequence of responders
to try from the highest precedence anew for every new connecting pledge - and repeatedly run
into timeouts for each new connecting pledge when those primary responders time out
on connection attempts because they are unresponsive or unreachable. Instead, after a
responder first fails to connect, the Join Proxy <bcp14>SHOULD</bcp14> skip this responder in further
connection attempts for other connecting pledges.</t>

<t>Stateless proxies cannot learn unresponsiveness or unreachability of a responder
through connection attempts. Instead, they <bcp14>SHOULD</bcp14> perform a stateless responsiveness/reachability
check for each responder that the Join Proxy is actively forwarding packets to from
one or more pledges.  If no packets are returned from such a responder over a period of more
than 30 seconds, then the responder <bcp14>SHOULD</bcp14> be considered unreachable for at least
180 seconds. Unreachability signaling received in response to packets sent to the
responder <bcp14>SHOULD</bcp14> trigger this unreachability status after it persists for 10 seconds.</t>

<t>Load balancing as described in <xref target="responder-selection"/> is <bcp14>NOT RECOMMENDED</bcp14> for
stateless proxies because per-pledge stateless load balancing may involve more
processing complexity than feasible for proxies on
constrained devices. To avoid changing the selection of
active responders when one responder becomes unresponsive, a "stable hash" approach would have
to be used, such as described in <xref target="HRW98"/>, which is used for example by <xref target="I-D.ietf-bess-evpn-fast-df-recovery"/>.
Supporting weights with stateless proxying is even more complex. Instead of
load balancing, responders simply need to be designed to scale to the maximum
amount of simultaneous initiator connections necessary when supporting stateless
proxying mode.</t>

</section>
<section anchor="announcement-protection"><name>Protection against malicious service announcements</name>

<t>Initiators including proxies <bcp14>SHOULD</bcp14> always pick the highest possible priority and weight
parameters possible in the discovery mechanism used that allows to support the
desired preference goals. For example, any primary initiator should select the highest
numerical values possible.</t>

<t>This recommendation is intended as a protection against erroneous, but not malicious
service announcements whenever the default priorities are lower than the maximum
priority. It can also serve as a weak protection against malicious announcements
because with the selection rules required by this document, initiators still have
the highest chance of picking the non-malicious announcement.</t>

<t>While being weak, this recommendation can still be better than nothing against such
malicious announcement. These recommendations <bcp14>SHOULD</bcp14> be superseded by better
recommendations for more narrowly scoped deployment scenarios.</t>

</section>
</section>
<section anchor="join-proxies-support-for-discovery-and-variations"><name>Join Proxies Support for Discovery and Variations</name>

<section anchor="proxy"><name>Join Proxy support for Variations</name>

<t>A Join Proxy compliant with this specification <bcp14>MUST</bcp14> support announcing its
Join Proxy responder socket(s) to which pledges can connect via at least one
of the discovery methods included in the registry tables specified in this
document. The Join Proxy <bcp14>MUST</bcp14> announce the variation(s)
supported on its responder socket(s) according to the registry table entries.</t>

<t>A Join Proxy <bcp14>SHOULD</bcp14> support to pass packets for any variation for which
it has discovered one or more registrar sockets supporting that variation without the
need for the variation to be known at the time of implementation of the Join Proxy
or configured on the Join Proxy. If a Join Proxy supports this requirements, this is
called support for "arbitrary variations". Supporting this requirement requires
the Join Proxy to discover registrar(s) and their supported variation(s) via one or more
of the discovery mechanisms included in the registry tables specified in this document.</t>

<t>Arbitrary variations support allows to deploy proxies once and add
pledges and registrars supporting new variations later - without upgrade
or change of configuration of proxies.</t>

</section>
<section anchor="registrar-operations-modes"><name>Registrar Operations Modes</name>

<t>Proxies may use different approaches to connect to registrars. The following
subsections discuss the primary relevant options.</t>

<section anchor="direct-connection"><name>Direct Connection Mode</name>

<t>In one Join Proxy implementation option called "direct connections", the Join Proxy creates for every discovered registrar
socket a separate Join Proxy responder socket. It announces this socket with the same set of parameters
as it did learn from the registrar's service announcement, except for the appropriate Join Proxy service name
and socket parameters (IP address, port number). When a pledge connects to that socket, the
Join Proxy passes traffic for that pledge's connection to and from the respective registrar socket.</t>

<t>When using the direct connections approach, the task of selecting the best registrar socket for
a particular variation is left to pledges because they are exposed to at least the same number 
of service announcements from proxies as proxies see service announcements from registrars - and the
pledge has to select the best available one from them.</t>

<t>To reduce the number of sockets that have to be announced by proxies when using direct connections
and to also reduce the number of responder sockets that need to be maintained by a Join Proxy operating
in this approach, these proxies <bcp14>SHOULD</bcp14> limit the number of registrar sockets they maps to between 4 and 10
best registrar sockets as described in <xref target="responder-selection"/> per variation.</t>

</section>
<section anchor="best-registrar"><name>Best Registrar Selection Mode</name>

<t>In the implementation mode "best registrar selection", the Join Proxy creates a separate responder socket
for a set of all registrar sockets that it discovers and that announce support for the same set
of variations.</t>

<t>For pledges to discover the Join Proxy, the Join Proxy then announces this socket with the parameters of
the best discovered registrar socket, replacing the service name and network parameter names with those
for its Join Proxy responder socket as in the case of a direct connection.</t>

<t>The Join Proxy then connects pledges to the best available registrar socket from that set when
it receives a connection to that socket.</t>

<t>When performing best registrar selection for that connection, the Join Proxy has to perform selection of the
best available responder as described in <xref target="responder-selection"/>.</t>

<t>Using newly discovered responders in stateless proxies supporting best registrar selection must be done carefully.
Consider the common case that service announcements for a primary responder
did stop due to network issues, now the Join Proxy starts to send packets to a secondary
responder, and then the primary responder becomes reachable and the Join Proxy sees
service announcements for it. If the Join Proxy would now start to forward packets
from pledges to this primary responder due to its higher precedence, then this
could unnecessarily break ongoing connections from clients whose packets
are currently forwarded to the lower preference Join Proxy. Direct connection mode does
not incur this problem, because the pledge can select another Join Proxy responder socket
when it discovers the first one to be unresponsive or erroneous.</t>

<t>Replacing a selected responder in a stateless Join Proxy with a better one
<bcp14>SHOULD</bcp14> hence only be done if no packets have been exchanged between pledges
and the current selected responder through the Join Proxy for more than 300 seconds.
This long timeout specifically intends to not break connections in which the
registrar keeps the pledge waiting for an administrative response such as
an operator performing a policy validation for enrollment.</t>

<t>In addition, stateful proxies implementing best registrar selection <bcp14>SHOULD</bcp14>
optimize selection of registrar for each Join Proxy responder socket across
connections for multiple pledges instead of starting the sequence of responders
to try anew from the highest precedence registrar for every new connecting pledge - and repeatedly run
into timeouts when one or more of the best registrar time out on connection attempts
because they are unresponsive or unreachable. Instead, after a
responder first fails to connect, the Join Proxy <bcp14>SHOULD</bcp14> skip this responder in further
connection attempts for other connecting pledges and re-consider it only for new
connection attempts after at least 60 seconds.</t>

</section>
<section anchor="proxy-in-service-name-only-mode-on-registrars"><name>Proxy in Service Name Only Mode on Registrars</name>

<t>Registrars that implement support for connections from stateful proxies
and/or from pledges may minimize their Join Proxy implementation work by only implementing
the appropriate service name announcements for the same socket to support
connections from both:  announcements as a registrar for connections from
proxies and announcements as a Join Proxy for connections from pledges.
No additional sockets or other Join Proxy specific packet processing code
is required to support this.</t>

<t>Registrars that implement support for connections from stateless proxies can
share that implementation for connections from pledges by also implementing
simple UDP&lt;-&gt;JPY header conversion (see <xref target="cPROXY"/>).
Nevertheless, they do need to do this via
a separate socket and hence need to announce the two sockets separately:
UDP for connections from pledges with the Join Proxy service name, and UDP with JPY header for 
connections from stateless proxies with the stateless registrar service name.</t>

<t>Proxy functionality that is implemented as described here on registrars
is called "proxy in service name only mode", because such an implementation
cannot discover, select and fail over between different registrars.
Such proxies in name only therefore do not share requirements
against discovering and selecting registrars described for the prior specified
modes.</t>

<t>Like other proxies, proxies in name only <bcp14>SHOULD</bcp14> nevertheless track
aliveness of their registrar function and withdraw its service
announcements (both as Join Proxy as well as registrar) when it does not run,
fails or becomes unresponsive.</t>

<t>Proxies in name only <bcp14>SHOULD</bcp14> default to the same discovery method priority and
weight parameter as those configured for the registrar service announcements.
This is so that in the absence of separate proxies in the network selection
of registrars co-located proxies would follow the same criteria as those
used by proxies and which use the registrar service announcement parameters.</t>

</section>
<section anchor="proxy-mode-discussion"><name>Proxy Mode Discussion</name>

<t>This document defines no requirements against the implementation mode for proxies.
Those are left for solution or deployment (profile) specifications. Instead, this
section discusses some considerations for those choices.</t>

<t>The list of possible modes presented is exemplary and not meant to be exhaustive.
Other modes are equally able to support the requirements, such as mixtures
of the described modes. Likewise, introduction of new variations may not
only work well via arbitrary variation support in proxies, but through
explicit configuration of variations on proxies - this all depends on
the target deployment environment. The presented modes were chosen
primarily as the ones providing most configuration free deployment options and
for registrar implementations most simplicity in implementation.</t>

<t>If a deployment has a larger number of service announcements and (extremely)
constrained pledges, direct connection mode may be inappropriate because it shifts
the burden of best available discovery and selection and onto the pledge. If
simultaneously proxies in such deployments can support more scalable complex implementations,
then best registrar selection mode may be most appropriate.</t>

<t>In environments, where all pledges are expected to become proxies after enrollment,
implementers may simply want to implement the option for which both pledge and
Join Proxy code together is easiest to implement.</t>

<t>Even on registrars, proxy in service name only mode may not suffice deployment requirements
or provide best redundancy.  For example, the co-located registrar may incur 
problems, not applicable to alternative registrars, such as for example Internet
connectivity problems to MASAs when different registrars have different
Internet connectivity. If the registrar co-located Join Proxy is then
still the only Join Proxy available to some candidate pledges, then this Join Proxy
needs to be able to connect to an alternative registrar, which would
not be possible if it was a proxy in service name only.</t>

<t>Likewise, proxy in service name only mode will disturb the introduction of new variations
on pledges and other registrars in the network if the registrar node implementing
proxy in service name only mode becomes a necessary Join Proxy for a pledge requiring a
variation not supported by this registrar, but by another registrar that
would only be reachable through this registrar node. Therefore, Join Proxy
in name only mode is best suited for node types not deployed on an edge
of the network where a future variety of pledges may connect to, and those
pledges will require the use of a Join Proxy.</t>

</section>
</section>
<section anchor="extensibility-to-non-brski-services"><name>Extensibility to non BRSKI services</name>

<t>Join Proxy implementations using the procedures described in this document can easily
be reused for any other protocols beside BRSKI as long as they use TCP or UDP.
For this, it would simply be required that the Join Proxy can be configured with
pairs of service names other than those used by tBRSKI/cBRSKI: A service name to
discover, and a service name to use for the Join Proxy responder socket service announcements.</t>

</section>
<section anchor="scaling-service-discovery-and-selection"><name>Scaling service discovery and selection</name>

<t>Discovering and selecting an available service instance can become a design challenge
in large networks with many redundant service announcements.</t>

<t>Consider for example the common case of allowing BRSKI registration in a network
with many geographically spread out sites such as in enterprise,  industrial or
building construction environments. During initial bringup of such sites, 
Internet connectivity may be non-existing, or intermittent, and hence one or more
local registrar in each such site is highly desirable. Such registrars may of course
require private mobile network connectivity to MASA, or rely on out-of-band provisioning
of vouchers.</t>

<t>Later, when such a site does get a well working wide-area network connection,
it may be more appropriate to use more centralized registrars, but a local registrar
as a backup may be considered useful. However, if the service announcements of such
per-site decentralized registrars would be discoverable across the whole geographically
spread out network, then this could introduce a potentially significant
overhead to the service announce and discovery system when for example more
than 100 registrar service announcements exist in the network, and pledges/proxies
connect to them.</t>

<t>Such large number of redundant service announcements is typically highly undesirable,
and appropriate configurations of service discovery mechanisms need to be used
to avoid them. For example, in GRASP, service announcements can be scoped to small hop counts,
Anycast addressing can be used to make all decentralized registrars overload
the same ip address, and hence make them all share the same service announcement.</t>

</section>
</section>
<section anchor="brski-pledge"><name>Discoverable BRSKI Pledges</name>

<section anchor="brski-pledge-context"><name>BRSKI-PLEDGE context</name>

<t>BRSKI-PLEDGE is the context for discovery of pledges by nodes such as Registrar-Agents.
Pledges supporting <xref target="BRSKI-PRM"/> <bcp14>MUST</bcp14> support it. It may also be used by other variations of BRSKI
outside of the PRM use case, for example for inventorizing pledges.</t>

<t>Pledges supporting BRSKI-PLEDGE <bcp14>MUST</bcp14> support DNS-SD for discovery via mDNS, using link-local scope.
For DNS-SD discovery beyond link-local scope, pledges <bcp14>MAY</bcp14> support DNS-SD via <xref target="DNSSD-SRP"/>, using
automatic discovery of the SRP server and registering the below defined DNS-SD data with it.</t>

<t>These DNS-SD requirements are defaults. Specifications for specific deployment contexts such as specific
type of radio mesh network solutions may need to specify their own requirements overriding or amending these
requirements.</t>

<t>Pledges <bcp14>MUST</bcp14> support to be discoverable via their DNS-SD service instance name.</t>

<t>Pledges <bcp14>SHOULD</bcp14> support to be discoverable via DNS-SD browsing, so that Registrar-Agents can find
unexpected pledges or can enumerate expected pledges more easily, especially in the presence of multiple
different subnets and use of mDNS. A pledge can also only be found by browsing if it is not
possible for the owner to acquire serial-number information of a pledge by the time BRSKI-PRM needs it
(to create a service instance name).</t>

<t>When pledges are discoverable via DNS-SD browsing, the "brski-registrar" PTR service name is a
so-called shared resource record. When it is requested via mDNS (multicast), all pledges supporting
BRSKI-PLEDGE and browsing will respond simultaneously, potentially creating congestion/contention.
To avoid this, <xref target="mDNS"/> specifies the following requirement: "each responder <bcp14>SHOULD</bcp14> delay its
response by a random amount of time selected with uniform random distribution in the range 20-120 ms."</t>

<t>It is equally <bcp14>RECOMMENDED</bcp14> to apply the same random delay rule for answers to multicasted or
flooded queries in other discovery mechanisms that have the same response burst problem - even when
they do not specify such a mechanism, such as in GRASP.</t>

<t>If browsing is not desired by a pledge, the pledge does simply not respond to queries for the
"brski-registrar" service name in mDNS or other discovery mechanism queries for the equivalent
service name, or does not register its PTR RR for this service name when using unicast DNS-SD via
<xref target="DNSSD-SRP"/>. This does not affect operations for the service instance name.</t>

<t>This specification does not introduce the procedures to discover pledges via CORE-LF or GRASP
because it is unclear if there is currently demand for this, and because it can easily be added
via additional specs and adding entries to the registry.  For CORE-LF, browsing of entries
can be supported via CORE-RD ({RFC9176}}), with appropriate auto-discovery of the CORE-RD server.
For GRASP, this could be done via a method mapping DNS-SD into GRASP, such as <xref target="I-D.eckert-anima-grasp-dnssd"/>,
specifically to support browsing of pledge instance names.</t>

</section>
<section anchor="service-instance-name"><name>Service Instance Name</name>

<t>The service instance name chosen by a BRSKI pledge <bcp14>MUST</bcp14> be composed from information which is</t>

<t><list style="symbols">
  <t>Easily known by BRSKI operations, such as the operational personnel or software automation,
specifically sales integration backend software.</t>
  <t>Available to the pledge software itself, for example by being encoded in some attribute of the IDevID.</t>
</list></t>

<t>Typically, a customer will know the serial number of a product from sales information, or even
from bar-code/QR-codes on the product itself. If this serial number is used as the service instance
name to discover a pledge from a Registrar-Agent, then this may potentially (but unlikely) lead to (duplicate) replies
from two or more pledges having the same serial number, such as in the following cases:</t>

<t><list style="numbers">
  <t>A manufacturer has different product lines and re-uses serial-numbers across them.</t>
  <t>Two different manufacturers re-use the same serial-number space.</t>
</list></t>

<t>If pledges enable browsing of their service instance name, they <bcp14>MAY</bcp14> support DNS-SD specified
procedures to create unique service instance names when they discover such clashes, by appending
a space and serial number, starting with 2 to the service instance name: "&lt;service-instance-name&gt; (2)",
as described in <xref target="DNS-SD"/> Appendix D.</t>

<t>Nevertheless, this approach to resolving conflicts is not desirable:</t>

<t><list style="symbols">
  <t>If browsing of DNS-SD service instance name is not supported, Registrar-Agents would have to
always (and mostly wrongly) guess that there is a clash and (mostly unnecessarily) search
for "&lt;service-instance-name&gt; (2)".</t>
  <t>If a clash exists between pledges from the same manufacturer, and even if the Registrar-Agent
then attempts to start enrolling all pledges with the same clashing service instance name,
it may not have enough information to distinguish pledges other than by the random numbering. This would happen
especially if the IDevID from both devices (of different product type), had the same serial
number, and the trust anchor certificate of both was the same (e.g. same root CA certificate), which is likely when they are from the same manufacturer.
Even if some other IDevID field was used to distinguish their device model, the Registrar-Agent
would not be able to determine that difference without additional vendor specific programming.</t>
</list></t>

<t>As a result:</t>

<t><list style="symbols">
  <t>Vendors <bcp14>MUST</bcp14> document a scheme how their pledges form a service instance name from
information available to the customer of the pledge.</t>
  <t>These service instance names <bcp14>MUST</bcp14> be unique across all IDevID of the manufacturer that
share the same trust anchor.</t>
</list></t>

<t>The following mechanisms are recommended:</t>

<t><list style="symbols">
  <t>Pledges <bcp14>SHOULD</bcp14> encode manufacturer unique product instance information in their
subject name serialNumber. <xref target="RFC5280"/> calls this the X520SerialNumber.</t>
  <t>Pledges <bcp14>SHOULD</bcp14> make this serialNumber information consistent with easily accessible
product instance information when in physical possession of the pledge, such as
product type code and serial number on bar-code/QR-code to enable <xref target="BRSKI-PRM"/> discovery
without additional backend sales integration. Note that discovery alone does not
allow for enrollment (so it does not introduce a security risk by itself)!</t>
  <t>Pledges <bcp14>SHOULD</bcp14> construct their service instance name by concatenating
their X520SerialNumber with a domain name that is used by the manufacturer
and thus allows to disambiguate devices from different manufacturer using the
same serialNumber scheme, and hence the likelihood of service instance name clashes if manufacturer names are not used.</t>
  <t>Pledges <bcp14>MAY</bcp14> re-use the service instance name as their host name in their AAAA or A RRs.</t>
</list></t>

</section>
<section anchor="example"><name>Example</name>

<t>This section discusses an example manufacturer's approach using the recommendations
from above.  <xref target="service-name-example"/> shows the different data involved in DNS-SD records
for a pledge from manufacturer "Example".</t>

<figure title="Example IDevID and DNS-SD data" anchor="service-name-example"><artwork><![CDATA[
    1. Manufacturer published information:
    
      1.1 IDevID trust anchor certificate.
    
      1.2 IDevID X520 identification schema:
        Brand: Example
          O = example.com, serialNumber = "PID:Model-<PID> SN:<SN>"
          ; Explanation:
          ; SN = Serial Number, PID = Product Identifier
          ; O = Organization
    
      1.3 DNS-SD Instance Schema:
        <X520SerialNumber>.example.com
    
    2. Example Purchase Order Pledge Information
       Brand: Example, Model: 0815, Serial: WLDPC2117A99
    
    3. DNS-SD Instance string:
      "PID:Model-0815 SN:WLDPC2117A99.example.com"
    
    4. DNS-SD RR for the pledge (using mDNS, hand hence .local):
      ; PTR RR to support discovering the pledge through browsing,
      ; e.g. when the serial number is not known in advance
      _brski-pledge._tcp.local  IN PTR
        PID:Model-0815\\ SN:WLDPC2117A99\\.example\\.com._brski-pledge._tcp.local
    
      ; SRC and TXT RR for the service instance name
      PID:Model-0815\\ SN:WLDPC2117A99\\.example\\.com._brski-pledge._tcp.local
        IN SRV 1 1
        PID:Model-0815\\ SN:WLDPC2117A99\\.example\\.com.local
      PID:Model-0815\\ SN:WLDPC2117A99\\.example\\.com._brski-pledge._tcp.local
        IN TXT ""
    
      ; AAAA address resolution for the target host name
      PID:Model-0815\\ SN:WLDPC2117A99\\.example\\.com.local
        IN AAAA fda3:79a6:f6ee:0000::0200:0000:6400:00a1
    
    5. Example Pledge IDevID certificate information:
        ; Format as shown by e.g.: openssh
        Subject: serialNumber = "PID:Model-0815 SN:WLDPC2117A99",
         O = example.com, CN = Model-0815
]]></artwork></figure>

<t>Using the information from the above Example picture, a Registrar-Agent
implementation operates as follows.</t>

<t><list style="numbers">
  <t>Initially, it is configured with the Manufacturer published information (1.),
and as not shown it will likely have a list of such information for various
brands of products.</t>
  <t>After a pledge purchase and initial physical deployment,
it is provided with the Purchase Order information for the pledge (2.),
this order information tells it, that the Manufacturers Brand is "Example",
that the pledge product Model &lt;PID&gt; is "0815" and its Serial Number &lt;SN&gt;
"WLDPC2117A99".</t>
  <t>It looks up the IDevID X520 identification schema for brand "Example" and
uses the template value for the serialNumber field together with the
pledge information values from (2.) for O, &lt;PID&gt; and &lt;SN&gt; to determine 
the DNS-SD Instance of the pledge (3.). That instance is the concatenation
of the X520 serialNumber value of the pledge with the Organization
domain name of the manufacturer. With the Organization being a global
DNS domain "example.com", including this in the Instance makes it unique
across manufacturers.</t>
  <t>It then uses standard DNS-SD via mDNS to find the pledge, using the DNS-SD 
Resource Records (RR) shown in 4.</t>
  <t>Once it receives a response from the device claiming to be the pledge,
it can use any appropriate authentication mechanism to validate
ownership of the IDevID private key. In <xref target="BRSKI-PRM"/> this is done through
the initial TLS handshake in which it learns the presumed IDevID of the
pledge. When the signature in the IDevID matches the public key of the
desired Manufacturer from (1.1), then it trusts that this pledge is from
that manufacturer. When the O and serialNumber of the certificate match
what it constructed from the &lt;PID&gt;/&lt;SN&gt; values from purchase information 
from (3.) then it also trusts that this is indeed the pledge it was
looking for.</t>
</list></t>

<t>Instead of using sales receipt information, the customer may also use scanned
QR/Barcode or RF-Tag information from packaging after receiving shipments for
example for step 2. Scanning packaging information will likely introduce additional
complexity because the manufacturer name can often only be derived from
information such as EAN-13 barcodes.</t>

<t>The process steps may also be simpler if the customer can know the IDevID of the pledge
through the purchase process instead of having to match the IDevID from sales receipt information
(step 2).</t>

<t>The process steps may also become more complex. The manufacturer may have multiple
brands using the same trust anchor. Or the manufacturer may have certificate
chains and different production sub-companies may use different sub-CA certificates in the signing
chain. Or the serialNumber alone is not unique across the certificate chain,
but further Subject fields of the certificate are required for a unique
identification, such as the O)rganization field. It could contain for example
one out of multiple brand names that use simple numerical serialNumber formats
and hence could collide.  None of such complexities are desirable for new designs,
but they may be necessary to support BRSKI for existing products.</t>

<t>For the described mechanism to work, the manufacturer does not necessarily
have to own a domain name such as "example.com" in the example. Owning a
domain name and using it for the DNS-SD Instance Schema is just a simple
way to ensure usage of a unique Instance Schema - if all manufacturers
agree to use this approach.</t>

<t>The RR used to discover the pledge by its serial number is the
"IN SRV" RR.  The "IN PTR" RR is optional and allows for the pledge to
be discovered with DNS-SD browsing, which is necessary if the
pledges serial number information cannot be known by the time the
pledge needs to be enrolled by a Registrar-Agent.</t>

<t>The instance string is also re-used in the host name of the "IN SRV"
RR and hence the domain name of the "IN AAAA" RR. This is just an option,
and the pledge can use whatever host name it wants.</t>

</section>
<section anchor="webpki-derived-instance-schema"><name>WebPKI derived instance schema</name>

<t>There is currently no automated mechanism to avoid the configuration of
manufacturer trust anchor certificates in BRSKI components that need to
authenticate pledges. However, the configuration of additional instance
schemas for different manufacturer device names in BRSKI
equipment could be avoided if it is deemed appropriate by vendors and
operators of BRSKI-PLEDGE installations to rely on WebPKI trust anchors.</t>

<t>The trust anchor certificate itself (or a sub-CA in the certificate chain)
would then have to have a WebPKI trust anchor signature and a DNS Name
that can easily be identified as being used for IDevID, such as
"*.idevid.example.com". And the implied schema for the instance
string is then "&lt;&lt;X520SerialNumber&gt;.DNS-name&gt;", authenticating instance
names of the format "&lt;X520SerialNumber&gt;.idevid.example.com&gt;".</t>

<t>Obtaining a WebPKI signature for their trust anchor for these wildcard domain
names from a WebPKI trust anchor is the added effort for manufacturers of this scheme.</t>

</section>
</section>
<section anchor="variation-signaling-and-encoding-rules-for-different-discovery-mechanisms"><name>Variation signaling and encoding rules for different discovery mechanisms</name>

<section anchor="dns-sd"><name>DNS-SD</name>

<section anchor="signaling"><name>Signaling</name>

<t><xref target="DNS-SD"/> specifies how to use DNS-SD via mDNS and via unicast DNS. Implementations of 
initiators to discover BRSKI services <bcp14>SHOULD</bcp14> support mDNS and unicast DNS to discover desired
responders. They <bcp14>SHOULD</bcp14> support <xref target="DNS-SD"/> Section 11 mechanisms to discover unicast
DNS browsing domains. They <bcp14>SHOULD</bcp14> prefer unicast DNS discovered answers over those discovered
over mDNS.</t>

<t>Implementations of BRSKI responders intended to be reachable over a routed
network such as registrar services <bcp14>SHOULD</bcp14> support <xref target="DNSSD-SRP"/> to register their service(s) with
unicast DNS and <bcp14>SHOULD</bcp14> equally announce their services with mDNS. BRSKI responder implements  that only 
need to announce their services across adjacent subnets such as most proxies <bcp14>SHOULD</bcp14> only use mDNS to announce them.</t>

<t>These requirements may be overridden/reduced for implementations known to be deployed
only in specific known options are required. Likewise, they need to be amended when
using new interfaces (such as specific mesh network technologies where other standards
for signaling DNS-SD are used).</t>

<t>In general, both initiators and responders of BRSKI services are typically meant to operate completely
autonomous without a user-interface that could help in any user/operator driven selection mechanisms
to support discovery and selection. Therefore it is important that the implementations of discovery
are as flexible and comprehensive as to their supported options to support discovery for DNS-SD itself.
This specifically applies to options in DHCP to discover DNS-SD domain or servers.</t>

<t>The remaining specifications in this DNS-SD section apply equally to any instantiation of DNS-SD including
DNS-SD via mDNS as defined in <xref target="DNS-SD"/>, but also via unicast DNS, including registering them via <xref target="DNSSD-SRP"/>.</t>

</section>
<section anchor="variation-string-encoding"><name>Variation String Encoding</name>

<t>Variation Strings from the IANA registry <xref target="fig-variations"/> are encoded as a comma separated
values to the "var" Key.</t>

<t>A Variation String may be the empty string. The absence of any "var" key in the TXT RR indicates
support for that Variation String. Likewise "var=" indicates support for it. If multiple
Variation Strings are encoded, the empty string should come first: "var=,variation2".
However, it is <bcp14>RECOMMENDED</bcp14> for the registry table to also define a non-empty string alternative
and use that in the encoding of the TXT RR "var" key so that its support is more explicit.</t>

<t>Variation strings in DNS-SD are case insensitive as required by DNS-SD. It is <bcp14>RECOMMENDED</bcp14> to only
announce lowercase variation strings in DNS-SD.</t>

</section>
<section anchor="service-instance-and-host-names"><name>Service Instance and Host Names</name>

<t>To be able to specify for each responder socket individually its supported variations as well
as its selection criteria (priority weight), it needs to be represented in DNS-SD as a
service instance name with an SRV and TXT RR. In BRSKI-PLEDGE <xref target="brski-pledge"/> the service instance
name is significant as it is what a Registrar-Agent may need to discover, but in tBRSKI and cBRSKI
it is merely an artefact of DNS-SD encoding: Unlike typical user-centric DNS-SD use-cases, there are
no users that need to make sense of the meaning of the service instance name, for example to know,
which printer to pick. Only operators may need to look at them for troubleshooting.
The choice of instance name (the first component of a service instance name) is hence arbitrary. The same
is true for the host names used in the DNS-SD records for BRSKI.</t>

<t>Registrars <bcp14>SHOULD</bcp14> support automatic generation of their service instance name for their DNS-SD
operation to avoid additional need for operator configurations. Registrars <bcp14>SHOULD</bcp14> likewise support the
configuration of such a name - if the operator so desires to support operational troubleshooting.</t>

<t>If the host on which the registrar is running already has a DNS host name for the IP addresses
used by the registrar and for the desired DNS method (mDNS = .local, unicast DNS = default domain),
then the registrar <bcp14>SHOULD</bcp14> be able to use that host name as the target domain name in the SRV RR.
This requirement avoids the unnecessary addition of DNS A/AAAA RRs because of the registrar,
when useable RRs already exist.</t>

<t>If such a DNS RR does not exist, but a DNS host name for a different DNS method, or a different set of
addresses than used by the registrar, then the registrar <bcp14>MAY</bcp14> be able to use a target domain
name derived from that primary domain name by appending a unique name element. This requirement
exist to avoid the creation of unnecessarily inconsistent host names.</t>

<t>If no DNS host name exists, the registrar <bcp14>MUST</bcp14> be able to automatically create a DNS host name
and the A and/or AAAA RRs for the address(es) used by the registrar for use in the SRV RR target field.
This requirement exists to ensure that operators are not unnecessarily required to configure a host name
on a system that does not need one - and none is required to run a registrar.</t>

<t>A registrar <bcp14>MAY</bcp14> use any unique identifiers of its host system as its instance name or host name.
This can avoid or at least minimize the need to automatically pick another name in case the chosen
name is already taken by another system. This for example would happen if a registrar tried to
use an instance component such as "registrar" and there is already another registrar. Using a
known unique identifier allows a registrar to raise an alert and claim an operational error 
with a high degree of confidence.</t>

<t>MAC addresses are only unique when an application such as a registrar understands what hardware it
is running on, and that the MAC address was assigned by registering its OUI with IEEE and that
MAC addresses from the OUI were assigned uniquely. This is for example not necessarily the
case for IoT equipment or registrars running in a virtual context in the cloud. IP addresses
can be assumed to be unique (enough) when they have global scope or ULA.</t>

<t>When registrar software does not know that no other registrar software or instance of the same
software may run on the same host (for example when being packaged as an application), the
registrar <bcp14>SHOULD</bcp14> not assume that a host unique name is actually unique, but instead disambiguate
it by appending an additional name element to make it unique, such as a process number of the
running process.</t>

<t>Picking well-known or unique identifiers for registrar also helps operator to troubleshoot by often
eliminating the need to also know the IP addresses associated with the name.</t>

<t>Target host names need to follow the requirements for host names. By those requirements, it is not
permitted to use ":" in target host names, for example as part of MAC or IP address based host names.
Instance names do not share these syntactical limitation. For operational simplicity,
instance names <bcp14>SHOULD</bcp14> be constructed in the same manner as target hostnames in an implementation.
For example by replacing ":" with "-".</t>

<t>If the responder needs to indicate different sockets for different (set of) variations, for example,
when operating as a Join Proxy, according to <xref target="proxy"/>, then it needs to signal for each socket a
separate service instance name with the appropriate port information in its SRV record and the
supported variations for that socket in the TXT Record of that service instance name. A responder
<bcp14>MAY</bcp14> create the instance and host name for such different variation sockets by appending the variation
string to the previously determined instance and host names.</t>

</section>
<section anchor="examples"><name>Examples</name>

<t>These example use OUI and IPv6 addresses reserved for documentation
purposes. Do not re-use these addresses in actual deployments</t>

<figure title="DNS-SD for single registrar supporting tBRSKI/cBRSKI variations" anchor="dnssd-example-1"><artwork><![CDATA[
# tBRSKI context
_brski-registrar._tcp.local
               IN PTR  0000-5e00-5314._brski-registrar._tcp.local
0000-5e00-5314._brski-registrar._tcp.local
               IN SRV  1 2 4555 0000-5e00-5314.local
0000-5e00-5314._brski-registrar._tcp.local
               IN TXT  "var=est-tls,prm-jose,cmp"

# cBRSKI
_brski-registrar._udp.local
                IN PTR  0000-5e00-5314._brski-registrar._udp.local
0000-5e00-5314._brski-registrar._udp.local
                IN SRV  1 2 5684 0000-5e00-5314.local
0000-5e00-5314._brski-registrar._udp.local
                IN TXT  "var=rrm-cose"

# Host name
0000-5e00-5314.local
               IN AAAA  2001:DB8:0815::5e00:5314
]]></artwork></figure>

<t>In example <xref target="dnssd-example-1"/>, a registrar on a router, that is using mDNS for being discovered
supports tBRSKI with "rrm" and "prm" modes across the same TCP socket port 4555, with "est" and "cmp".
This leads to the three supported and IANA registry defined Variation Strings "est-tls", "prm-jose", and "cmp".
For cBRSKI (UDP), it supports the only variation registered through this document, "rrm-cose".</t>

<t>Such a registrar implementation might even support a combination of "prm" with "jose" and "cmp",
but at the time of this specification, this exact interoperability aspects of such a combination
have at the time of writing of this spec not been investigated and hence it is not listed 
in the IANA registry. Nevertheless, this may happen later, so it is useful for registrar
implementations to allow configuration of variations for its service announcements to allow
operational modifications.</t>

<t>This registrar implementation is running on a router that otherwise has no for a 
host name registered in DNS or DNS-SD, so it is using its MAC-address as its target host name,
"0000-5e00-5314.local", the same name is used in the registrar service instance names.
Running on a router without modular software, the registrar knows that no other registrar
instances can run on the same host and hence the name has no further disambiguating elements.</t>

<t>Note also that there is never a need for two different service instance names between
tBRSKI and cBRSKI, because they are distinguished bt the "_tcp" versus "_udp" component of the service
instance name.</t>

<figure title="DNS-SD for a tBRSKI/cBRSKI registrar applications" anchor="dnssd-example-2"><artwork><![CDATA[
# tBRSKI registrar application
_brski-registrar._tcp.example.org
     IN PTR  noc-registrar-brski-37253._brski-registrar._tcp.example.org
noc-registrar-brski-37253._brski-registrar._tcp.example.org
     IN SRV  1 2 4555 noc-registrar.example.org
noc-registrar-brski-37253._brski-registrar._tcp.example.org
     IN TXT "var=est-tls,cmp"

# cBRSKI registrar application
_brski-registrar._udp.example.org
     IN PTR  noc-registrar-cbrski-5376._brski-registrar._udp.example.org
noc-registrar-cbrski-5376._brski-registrar._udp.example.org
     IN SRV  1 2 7533 noc-registrar.example.org
noc-registrar-cbrski-5376._brski-registrar._udp.example.org
     IN TXT "var=rrm-cose"

# tBRSKI, PRM variation application
_brski-registrar._tcp.example.org
               IN PTR noc-registrar-prm-9735._brski-registrar._tcp.example.org
noc-registrar-prm-9735._brski-registrar._tcp.example.org
               IN SRV 1 2 17355 noc-registrar.example.org
noc-registrar-prm-9735._brski-registrar._tcp.example.org
               IN TXT "var=prm" 

# Host name
noc-registrar.example.org
               IN AAAA  2001:DB8:0815::5e00:5333
]]></artwork></figure>

<t>In the second example <xref target="dnssd-example-2"/>, a server system in the NOC of customer with
domain example.org is set up as the registrar for various BRSKI options. It uses <xref target="DNSSD-SRP"/>
to register its DNS-SD names into the example.org domain which it discovers as the default domain.
The host name of the server is set to noc-registrar.example.org.</t>

<t>The operator installs three separate registrar applications on this server.
One from a vendor whose pledges use tBRSKI, one from an integrator supporting pledges
from various "IoT" vendors that use cBRSKI, and one from a manufacturer that has
pledges using BRSKI-PRM.</t>

<t>Each of the three applications operates the same way for discovery. It opens a socket for
its registrar responder and notes the port number it receives. It determines that
SRP is usable, that the default domain is "example.org", and that the host name
is noc-registrar. It then forms a unique name from noc-registrar by appending
some string  abbreviation indicating its mode of operation ("brski", "cbrski", "prm"),
and its numeric process identifier - just in case more than one instance of the
same application can be started. It then publishes its PTR, SRV and TXT DNS-RR,
using these creates unique service instance names, the respective port number in the
SRV RR and the variation(s) in the TXT RR.</t>

</section>
</section>
<section anchor="grasp"><name>GRASP</name>

<section anchor="signaling-1"><name>Signaling</name>

<t>This document does not specify a mandatory to implement set of signaling options to guarantee
interoperability of discovery between initiator and responders when using GRASP. Like for the
other discovery mechanisms, these requirements will have to come from other specifications
that outline what in <xref target="GRASP"/> is called the "security and transport substrate" to be used for
GRASP.</t>

<t><xref target="ACP"/> specifies one such "security and transport substrate", which is zero-touch deployable.
It is mandatory to support for initiators and responders implementing the so-called
"Autonomic Network Infrastructure" (ANI). DULL GRASP is used for link-local discovery of
proxies, and the ACP is used to automatically and securely build the connectivity for multi-hop discovery
of registrars by proxies.</t>

</section>
<section anchor="encoding-and-examples"><name>Encoding and Examples</name>

<t>To announce protocol variations with <xref target="GRASP"/>, the supported Variation is indicated in the
objective-value field of the GRASP objective, using the method of forming the Variation String
in <xref target="subreg-variations"/>, and listed in the Variation String column of the <xref target="fig-variations"/> table.</t>

<t>If more than one Variation is supported, then multiple objectives have to be announced, each with
a different objective-value, but the same location information if the different Variations can be
supported across the same socket because they will all be connected to the same registrar.
Different sockets require different objective structures in GRASP anyhow.</t>

<t>Compared to DNS-SD, the choice of encoding for GRASP optimizes for minimum parsing effort, whereas
the DNS-SD encoding is optimized for most compact encoding given the limit for DNS-SD TXT records.</t>

<figure title="GRASP example for a BRSKI registrar supporting RRM and PRM" anchor="grasp-example-1"><artwork><![CDATA[
[M_FLOOD, 12340815, h'fe800000000000000000000000000001', 180000,
    [
     [["AN_Join_Registrar", 4, 255, ""],
      [O_IPv6_LOCATOR,
       h'fe800000000000000000000000000001', IPPROTO_TCP, 4443]],

     [["AN_Join_Registrar", 4, 255, "prm"],
      [O_IPv6_LOCATOR,
       h'fe800000000000000000000000000001', IPPROTO_TCP, 4443]],

     [["AN_Join_Registrar", 4, 255, "rrm"],
      [O_IPv6_LOCATOR,
       h'fe800000000000000000000000000001', IPPROTO_UDP, 4684]]

     [["AN_Join_Registrar_rjp", 4, 255, "rrm"],
      [O_IPv6_LOCATOR,
       h'fe800000000000000000000000000001', IPPROTO_UDP, 4686]]
    ]
]
]]></artwork></figure>

<t><xref target="grasp-example-1"/> is an example for a GRASP service announcement by a registrar in support of BRSKI
with both "rrm" and "prm" supported on the same TCP port 4443 and for cBRSKI (COAP over DTLS) on UDP
port 4684 in stateful mode and port 4686 for stateless mode . The first variation for "rrm" uses an objective-value of ""
for backward compatibility with <xref target="BRSKI"/> where it was introduced. With cBRSKI introducing definitions
for the use of GRASP only with this document, this special case is not proliferated, which is why "rrm" is
used in the cBRSKI announcements.</t>

<t>Note that one or more complete service instances (in the example 3) can be contained within a single GRASP message
without the need for any equivalent to the Service Instance Name of the DNS-SD PTR RR or the
Target name of the DNS-SD SRV RR. DNS-SD requires them because its encoding is
decomposed into different RR, but it also intentionally introduces the Service Instance Name
as an element for human interaction with selection (browsing and/or diagnostics of selection),
something that the current GRASP objective-value encoding does not support.</t>

<figure title="GRASP example for a BRSKI Join Proxy supporting RRM and PRM" anchor="grasp-example-2"><artwork><![CDATA[
[M_FLOOD, 12340815, h'fe800000000000000000000000000001', 180000,
   [
    [["AN_Join_Registrar", 4, 1, ""],
     [O_IPv6_LOCATOR,
      h'fe800000000000000000000000000001', IPPROTO_TCP, 5553]],

    [["AN_Join_Registrar", 4, 1, "prm"],
     [O_IPv6_LOCATOR,
      h'fe800000000000000000000000000001', IPPROTO_TCP, 5555]],

    [["AN_Join_Registrar", 4, 1, "rrm"],
     [O_IPv6_LOCATOR,
      h'fe800000000000000000000000000001', IPPROTO_UDP, 5684]],

    [["AN_Join_Registrar_rjp", 4, 1, "rrm"],
     [O_IPv6_LOCATOR,
      h'fe800000000000000000000000000001', IPPROTO_UDP, 5686]],
   ]
]
]]></artwork></figure>

<t><xref target="grasp-example-2"/> shows a corresponding GRASP service announcement by a Join Proxy that
did discover the registrar from <xref target="grasp-example-1"/> and is now announcing the services that
it can now proxy. Whereas registrar announcements as in <xref target="grasp-example-2"/> typically
use TTL of 255 to be seen across the whole network, Join Proxy announcements are
only intended to reach link local neighboring pledges and hence use a TTL of 1.</t>

<t>The use of "" for "rrm" in BRSKI is again for backward compatibility with
<xref target="BRSKI"/>. The absence of two announcements for cBRSKI is because there is no stateless
mode from Join Proxy to pledge or Registrar-Agent. Instead, the Join Proxy will have
have to decide whether to connect to the registrar via stateful or stateless mode,
but this decision is invisible on its GRASP announcements.</t>

<t>Noteworthy too is the use of two different ports for "rrm" versus "prm". As the Registrar
did announce support for both variations on the same TCP port, the Join Proxy could have
done the same, but by using different ports, the Join Proxy can choose independently
which Registrar to connect "rrm" versus "prm" sessions to. For example, another Registrar
could announce itself for only "prm" and might be preferred by the Join Proxy.</t>

<figure title="GRASP example for a BRSKI Registrar supporting RRM and PRM via separate processes" anchor="grasp-example-3"><artwork><![CDATA[
[M_FLOOD, 12340815, h'fe800000000000000000000000000001', 180000,
    [["AN_Join_Registrar", 4, 255, "",
     [O_IPv6_LOCATOR,
     h'fe800000000000000000000000000001', IPPROTO_TCP, 4443],
     ["AN_Join_Registrar", 4, 255, "",
     [O_IPv6_LOCATOR,
     h'fe800000000000000000000000000001', IPPROTO_UDP, 4684]]
]

[M_FLOOD, 42310815, h'fe800000000000000000000000000001', 180000,
    [["AN_Join_Registrar", 4, 255, "prm",
     [O_IPv6_LOCATOR,
     h'fe800000000000000000000000000001', IPPROTO_TCP, 44000]]
]
]]></artwork></figure>

<t>In <xref target="grasp-example-3"/>, a separate application process supports "prm" and hence
uses a separate socket with port number 44000 from "rrm", with port 4443.
Assuming there is no shared GRASP implementation across the two separate process,
such as a separate GRASP process, the announcements from both processes can
not be merged into a single GRASP packet. Instead, each one will send its own
GRASP announcements separately. This example primarily serves as a reminder, that
it is necessary for receivers to support receiving multiple announcements from the
same sender in GRASP not only within a single packet, but also when they arrive
via separate packets. To support implementation cases just as this one.</t>

<t>For a more extensive, DNS-SD compatible encoding of the objective-value that also
supports Service Instance Names, see <xref target="I-D.eckert-anima-grasp-dnssd"/>.</t>

</section>
</section>
<section anchor="core-lf"><name>CORE-LF</name>

<section anchor="overview-1"><name>Overview</name>

<t>"Web Linking", <xref target="RFC5988"/> defines a format, originally for use with
HTTP headers, to link an HTTP document against other URIs. Web linking is not a standalone
method for discovery of services for use with HTTP.</t>

<t>Based on Web Linking, "Constrained RESTful Environments (CoRE) Link Format", <xref target="CORE-LF"/> introduces a
standalone method to discover resources, such as service instances.
CORE-LF was introduced primarily for use with <xref target="COAP"/> but it can equally be used for discovery of
service instances that use HTTP or any other suitable (web transfer) protocols.
This makes CORE-LF an alternative to DNS-SD and GRASP for any of the BRSKI variations.</t>

<t>In CORE-LF, an initiator may use (link-local) IPv6 multicast UDP packet to the COAP port (5683)
to discover a possible responder for a requested resource. The responder will reply with unicast UDP.
If the IPv6 address of a responder has been configured or is otherwise known to the initiator, it
may instead of multicast equally query the parameters of the desired resource via unicast to the default COAP UDP or
TCP port (5683).</t>

<t><xref target="RFC9176"/> defines a "Resource Directory" mechanism for CORE-LF which is abbreviated CORE-RD. Initiators
can learn the IPv6 address protocol (TCP or UDP) and port number of a CORE-RD server by some other
mechanism (such as DNS-SD) and then use a unicast UDP or TCP COAP connection to the CORE-RD server
to discover CORE-LF resources available on other systems. Resource providers can likewise register
their resources with the resource directory server using CORE-RD registration procedures.</t>

<t>In summary, CORE-LF including CORE-RD is a mechanism for registration and discovery of resources and
hence services which may be preferred in deployments over other options and can equally be applicable
to register/discover any variation of BRSKI for any type of BRSKI service.</t>

</section>
<section anchor="background"><name>Background</name>

<t><xref target="cBRSKI"/> specifies the use of CORE-LF as the reference method
for pledges to discover registrars - in the absence of any proxies, to allow deployments
of scenarios where no proxies are needed - and hence also where <xref target="cBRSKI"/>
is not needed. Because BRSKI is designed so that pledges can be agnostic of whether they connect
to a registrar directly or via a Join Proxy, the resource/service that the pledge needs to discover
is nevertheless called "(BRSKI) Join Proxy (for pledges)", and encoded in CORE-LF as the value
"brski.jp" for the resource type attribute ("rt=resource-type") according to <xref target="CORE-LF"/>.</t>

<t>The following picture, <xref target="corelf-example-1"/> shows the encoding and an example of this discovery.
"ff02::fd" is the link-local scope address for "All Coap Nodes" in IPv6, as introduced in <xref target="RFC7390"/>,
which also defines IPv6 and site-scoped address options.</t>

<figure title="CORE-LF discovery of registrar/proxy by pledges" anchor="corelf-example-1"><artwork><![CDATA[
Template:

REQ: GET coap://[All_Coap_Nodes_IP_multicast_addr]/.well-known/core?rt=brski.jp

RES: 2.05 Content
   <coaps://[Responder_IP_unicast_address]:join-port>; rt="brski.jp"

Example:

REQ: GET coap://[ff02::fd]/.well-known/core?rt=brski.jp

RES: 2.05 Content
   <coaps://[fe80::c78:e3c4:58a0:a4ad]:8485>;rt=brski.jp
]]></artwork></figure>

<t><xref target="cPROXY"/> introduces the operations of a CoAP based Join Proxy
both as a connection based Join Proxy as in <xref target="BRSKI"/> (only using UDP connections for COAPs instead
of TCP for TLS as in <xref target="BRSKI"/>), but also as a new, stateless Join Proxy - to eliminate the
need for potentially highly constrained Join Proxy nodes to keep connection state and avoid
the complexity of protecting that state against attacks. The new resource type "brski.rjp" is
defined to support stateless Join Proxies to discover registrars and their UDP port number
that support the stateless, so-called JPY protocol.</t>

<t>The following picture, <xref target="corelf-example-2"/> shows the encoding and an example of this discovery.
<xref target="cPROXY"/> introduces the new scheme "coaps+jpy" for the packet
header used by the stateless JPY" protocol. The request in the template is assumed to be
based on unicast, relying on another method to discover the IP address of the registrar first.
It could equally use COAP site-scoped IP multicast, but in general, the assumption is that
registrar will not necessarily be link-local connected to proxies (this may be different in
specific deployments). Even though the registrar IP address is hence known, the reply still
needs to include this address again because in the <xref target="CORE-LF"/> link format, and <xref target="RFC3986"/>, Section 3.2, the
authority attribute cannot include a port number unless it also includes the IP address.</t>

<figure title="CORE-LF discovery of registrars that support stateless JPY protocol by proxies" anchor="corelf-example-2"><artwork><![CDATA[
Template:

REQ: GET /.well-known/core?rt=brski.jpy

RES: 2.05 Content
     <coaps+jpy://[Responder_IP_unicast_address]:join-port>;rt=brski.jpy

Example:

REQ: GET /.well-known/core?rt=brski.jpy

RES: 2.05 Content
     <coaps+jpy://[2001:db8:0:abcd::52]:7633>;rt=brski.jpy
]]></artwork></figure>

</section>
<section anchor="corelf-spec"><name>Specification</name>

<t>This section specifies the use of CORE-LF for BRSKI variations.
These specifications are backward compatible extensions to what is specified in <xref target="cBRSKI"/>
and <xref target="cPROXY"/>, except for noted exceptions, where the requirements
are narrowed. The following uses terms from the ABNF in section 2 of <xref target="CORE-LF"/> and from <xref target="RFC3986"/> (URI) for explanations
and relies on the following template example, <xref target="corelf-template"/>.</t>

<figure title="Template for BRSKI discovery with variations" anchor="corelf-template"><artwork><![CDATA[
Template:

REQ: GET /.well-known/core?rt=brski.*

RES: 2.05 Content
     <scheme://[address]:port path-abempty>;\
       rt=brski-service(;var="brski-variation-string(s)");\
       pw="priority weight"
]]></artwork></figure>

<t>BRSKI responder sockets are indicated in CORE-LF as a URI-Reference. The URI-Reference <bcp14>SHOULD</bcp14> be
a URI with a scheme, the IP address of the responder socket and the port used by the responder.
It may optionally be followed by a non-empty path-abempty.</t>

<t>URL-references <bcp14>SHOULD</bcp14> not use a domain name instead of an address to allow responders to
select a BRSKI responder without requiring DNS support. Likewise, port and scheme
<bcp14>MUST</bcp14> be included so that the information can be passed on to consumers without having to
modify it. When omitting this information, the full information can only be known in the
context of the connections scheme and port through which it was retrieved.</t>

<t>Note that these URL-Reference requirements are stronger than those from <xref target="cBRSKI"/>
and <xref target="cPROXY"/> to make extensibility easier.</t>

<t>BRSKI responder sockets <bcp14>MUST</bcp14> include a resource type field indicating a resource type
value indicating a BRSKI service, indicated as "brski-service" in <xref target="corelf-template"/>.
This <bcp14>MUST</bcp14> be registered in the IANA "Resource Type Link Target Attribute Values" registry table,
and also referenced in the "BRSKI Contexts" registry table <xref target="subreg-contexts"/>. 
A brski-service is a string without "." (single component string).</t>

<t>Discovery of registrar sockets  by stateful proxies uses the resource type "brski.rs".
This can be used in conjunction with any scheme: https:// for BRSKI and coaps:// for cBRSKI.
Stateless registrar sockets use the resource type "brski.rjpy". This currently only support
the coaps+jpy:// scheme. By its nature, it can only be used with schemes that rely on UDP.
These resource type uses are no change over <xref target="cBRSKI"/>
and <xref target="cPROXY"/>. This document does not specify how to discover
BRSKI-PLEDGE via CORE-LF.</t>

<t>The variations supported by a BRSKI responder socket are indicated via the optional "var="
link-extension. The value is a quoted-string of one or more space-concatenated
BRSKI variation strings. The absence of a "var=" link-extension indicates support for only
the default variation for the BRSKI context to which the BRSKI service belongs. This
can also be indicated as "var=".</t>

<t>The optional "pw" target attribute indicates priority and weight for the selection of 
the resource target with the semantic and format defined in <xref target="RFC2782"/> for priority
and weight in DNS SRV resource records. If the attribute pw is absent, then
it is assumed to mean pw="65535 0".</t>

<t>A non-empty path-abempty indicates a path prefix for the endpoints supporting the BRSKI
service and variation that is shorter than the default endpoint paths specified for
the service.</t>

</section>
<section anchor="examples-1"><name>Examples</name>

<figure title="CORE-LF examples for BRSKI variations" anchor="corelf-example-4"><artwork><![CDATA[
REQ: GET /.well-known/core?rt=brski.*

RES: 2.05 Content
Content-Format: 40
Payload:
 <https://[2001:DB8:0815::5e00:5314]:4555>;        # [1]
        rt=brski.rs;var="est-tls prm-jose cmp";
        pw="1 2",
 <https://[2001:DB8:0815::5e00:5314]:4555>;        # [2]
        rt=brski.jp;var="est-tls prm-jose cmp";
        pw="1 2",
 <coaps://[2001:DB8:0815::5e00:5314]:5684/b>;      # [3]
        rt=brski.rs;var=,
        pw="1 2",
 <coaps://[2001:DB8:0815::5e00:5314]:5684/b>;      # [4]
        rt=brski.jp;var=,
        pw="1 2",
 <coaps+jpy://[2001:DB8:0815::5e00:5314]:6534/b>;  # [5]
        rt=brski.rjpy;var=,
        pw="1 2"
]]></artwork></figure>

<t><xref target="corelf-example-4"/> shows example BRSKI variations in CORE-LF format. Note that
the example is pretty-printed through indentation and breaking long lines. This
additional white space is not compatible with actual CORE-LF output. Likewise, the text following
"#" are editorial comments.</t>

<t>Example [1] is the equivalent announcement for a BRSKI registrar service as
shown for DNS-SD in <xref target="dnssd-example-1"/> except for the absence of any
service instance. Note the use of "var=" to indicate the list of variation
strings supported and "pw=" to indicate priority and weight as in DNS-SD.</t>

<t>[3] is likewise the comparable example for the cBRSKI registrar example with
DNS-SD. Note that here, a non-empty path-abempty "/b" is used to indicate a
shortened endpoint prefix path for the service. There is no equivalent
in DNS-SD defined. When discovering a service via DNS-SD, the service
will need to use the (longer) pre-defined endpoint prefixes, such as
"/brski" and "/est" instead of "/b".</t>

<t>Example [2] is the same socket as [1], but announced as a Join Proxy
socket for pledges. Likewise, [4] is the same socket as [2] announced
as a Join Proxy socket for pledges. Finally, [5] announces the registrars
socket in support of stateless Join Proxies using the JPY header encapsulation.</t>

</section>
<section anchor="brski-resources"><name>Resource Type Considerations</name>

<t>CORE-LF expresses information about resources of a target identified by
a resource type. This specification encodes BRSKI services in CORE-LF also as
a resource types, as specified in <xref target="corelf-spec"/>. For the purpose of CORE-LF,
a BRSKI service is just another resource, except that it characterizes the
overall functionality available across a connection to the target, composed
of a sequence of endpoint instantiations. In addition, this behavior is
further refined by the list of supported variations indicated.</t>

<t>Often, resources in CORE-LF do - instead of a service - describe details of
as little as a single endpoint, such as its URL prefix and format encoding.
The reason why this fine-grained specification is not a good replacement
for the concept of service and variation is that the availability of a set
of endpoints with specific encodings does not imply whether the target does
support the desired specific sequencing of instantiating those endpoints,
including the use of any endpoint encoding option in any combination.</t>

<t>Making such arbitrary combinations a requirement can easily
lead to more generic, but also more costly implementations and testing
requirements without necessarily gaining deployment benefit.</t>

<t>BRSKI resource types which are not treated as services according to 
this specification can still be used if so desired to amend the
discovery of shortened endpoints, as shown in <xref target="corelf-shortenings"/>.</t>

<figure title="CORE-LF resource examples" anchor="corelf-shortenings"><artwork><![CDATA[
RES: 2.05 Content
Content-Format: 40
Payload:
 <https://[2001:DB8:0815::5e00:5314]:4555/b>;      # [1]
        rt=brski.rs;var="est-tls prm-jose cmp";
        pw="1 2",
 <https://[2001:DB8:0815::5e00:5314]:4555/b/rv>;   # [2]
        rt=brski.rs.requestvoucher,                           
 <https://[2001:DB8:0815::5e00:5314]:4555/b/vs>;   # [3]
        rt=brski.rs.voucher_status,                           
 </b/rv>;rt=brski.rs.rv,                           # [4]
 </b/vs>;rt=brski.rs.vs,                           # [5]
]]></artwork></figure>

<t>[1] shows how the prefix for all BRSKI endpoints over "https://"
can be shortened from "/.well-known/brski" to "/b". Nevertheless,
this would still make it necessary to use "/b/requestvoucher"
and "/b/voucher_status" as endpoints.</t>

<t>[2] and [3] show how to shorten those two endpoints to
"/b/rv" and "/b/rs" by creating resource types "brski.rs.rv"
and "brski.rs.vs". By using resource type prefix "brski.rs."
for both of them as well as path prefix "/b", it can be implied
that these endpoints are part of the service specified in [1],</t>

<t>These discovery options can be further compacted such as
shown in example [4] and [5] when assuming that the
abbreviations "rv" and "vs" are also known even by BRSKI
implementations from <xref target="cBRSKI"/>. Likewise,
the full socket details can be avoided when one can infer it
from context.</t>

<t>While these shortenings can be highly useful in often called
resources, each endpoint in BRSKI is typically only  instantiated
once by a pledge, so the overall savings in communication data
because of these shortenings is likely negligible, and it is
better to define short endpoint paths into the variation
specification if they are likely needed, such as done in
<xref target="cBRSKI"/>, such that it is not
necessary in cBRSKI to add such shortenings in discovery.
For these reasons, this document does not specify if or how
to use such resource targets in conjunction with BRSKI discovery
but only discusses possibilities and limitations here.</t>

<t>Considerations for such non-service resource type use in BRSKI
nevertheless introduces one requirement to avoid conflicts:
The names of BRSKI services
<bcp14>MUST</bcp14> not duplicate the endpoint names of any resources specified
for BRSKI protocols. This means that "rv" or "vs" cannot be
used to create BRSKI service name resource types "brski.rv" or
"brski.rs", and likewise, additional BRSKI endpoints can not
be called "rs", "jp", "jpy" or any other string registered in the
BRSKI discover registry tables.</t>

</section>
</section>
</section>
</section>
<section anchor="updates"><name>Updates</name>

<section anchor="updates-to-rfc9733"><name>Updates to RFC9733</name>

<t>This document updates <xref target="BRSKI-AE"/>, section 5.1 with the following
text which is to be read as if appended to the end of that section.</t>

<t>Instead of using the minimalist "brski-reg-cmp" specified in <xref target="BRSKI-AE"/>,
this document RECOMMENDS for new implementations of BRSKI with CMP and
DNS-SD discovery to use the signaling elements specified in this document
with the following benefits.</t>

<t>For DNS-SD, the equivalent for "brski-reg-cmp" is "brski-registrar"
(see {#subreg-service-names}) with the TXT string "cmp"
(see <xref target="subreg-variations"/>). This automatically allows to use Join Proxies
supporting this specification. They will use "brski-proxy" with TXT
key "var" value of "cmp" to indicate their support to transparently proxy also for a
CMP supporting registrar. Note that this will allow to use CMP in
cBRSKI as both "brski-registrar" and "brski-proxy" are also registered
for use with UDP.</t>

<t>Likewise, "brski-registrar-rjp" with TXT key "var" value "cmp" and UDP
can be used to support CMP with stateless Join Proxies supporting
this specification and the registrations in {#subreg-service-names}
allow to discover Registrars / Proxies for BRSKI and cBRSKI with CMP 
also with GRASP and CORE-LF Discovery Mechanisms.</t>

<t>If backward compatibility is required, "brski-reg-cmp" can continue to
be announced by registrars unchanged.</t>

</section>
<section anchor="updates-to-brski-prm"><name>Updates to BRSKI-PRM</name>

<t>This documents updates <xref target="BRSKI-PRM"/> by adding
the following text to the end of section 6.1.1.</t>

<t>With the procedures specified in this document, Registrar Agents can discover
Registrars supporting PRM by discovering Registrars that announce a variation
which includes "prm". Because <xref target="BRSKI-PRM"/> specifies the
use of JOSE for voucher encoding, the correct Variation String to discover is
"prm-jose", as also registered in <xref target="subreg-variations"/>. Discovery can use
DNS-SD, CORE-LF or GRASP using the encodings specified in this document and
registered in <xref target="subreg-variations"/> for the Variation String and 
<xref target="subreg-service-names"/> for the Service Name.</t>

<t>Registrar Agents <bcp14>MAY</bcp14> use Join Proxies supporting the procedures of this
document to reach Registrars supporting PRM and using the procedures of this
document. This may be of interest if the network available in the location
where the Registrar Agent is operating to access the Pledge is not fully
trusted but Join Proxies are used to only allow connections to Registrars.</t>

<t>This documents updates <xref target="BRSKI-PRM"/> section 6.1.2 with the
procedures specified in <xref target="brski-pledge"/>. Those procedures are meant to be
fully backward compatible with those specified in <xref target="BRSKI-PRM"/>,
but adds more details and suggestions for encoding of signaling elements.</t>

</section>
<section anchor="updates-to-rfc6690"><name>Updates to RFC6690</name>

<t>This document adds the text of <xref target="adtl"/> to <xref target="CORE-LF"/>. It recommends to IANA to document that
addition as indicated in <xref target="rtreg"/>.</t>

<section anchor="adtl"><name>Additional Resource Type requirements for "brski"</name>

<t>The following text is to be read as if inserted into <xref target="CORE-LF"/> section 7.4 after the second paragraph.</t>

<t>For the Resource Type (rt=) Link Target Attribute table, values starting with the
characters "brski" are also subject to the following paragraph requirements.</t>

<t>Resource Type values with the "brski" prefix <bcp14>SHOULD</bcp14> support BRSKI discovery as specified in ([ThisRFC]).
The specification of such a Resource Type <bcp14>SHOULD NOT</bcp14> prohibit or conflict with the ability to
combine variation type values as established by [ThisRFC]. The specification <bcp14>SHOULD</bcp14> include
or point to a definition how the Resource Type is to be included into the "BRSKI Context Registry Table"
<xref target="contexts"/>. Review of these requirements is to be coordinated between Designated Experts for
the Core parameters (core-parameters@ietf.org) and those for the BRSKI Discovery Parameters Registry 
(<xref target="reg-discovery"/>).</t>

</section>
</section>
</section>
<section anchor="IANA"><name>IANA considerations</name>

<section anchor="core-parameters"><name>Core Parameters</name>

<section anchor="rtreg"><name>Resource Type Link Target Attribute Values</name>

<t>This document introduces additional requirements for the registration of Core Resource
Type values with prefix "brski" into the "Resource Type (rt=) Link Target Attribute Values" sub-registry
of the "Constrained RESTful Environments (CoRE) Parameters" registry, as specified in <xref target="adtl"/>.</t>

<t>IANA is suggested to document these additions by adjusting the registration procedure table 
for the "Resource Type (rt=) Link Target Attribute Values" sub-registry as shown in <xref target="fig-rtproc"/>.</t>

<texttable title="Suggested updated registration procedure table for Core (rt=) Rink Target Ranges" anchor="fig-rtproc">
      <ttcol align='left'>Range</ttcol>
      <ttcol align='left'>Registration Procedures</ttcol>
      <ttcol align='left'>Note</ttcol>
      <c>value starts with "core"</c>
      <c>IETF Review</c>
      <c>&#160;</c>
      <c>value starts with "brski"</c>
      <c>Specification Required</c>
      <c>Additional requirements in ThisRFC <xref target="adtl"/></c>
      <c>all other values</c>
      <c>Specification Required</c>
      <c>&#160;</c>
</texttable>

</section>
<section anchor="target-attributes"><name>Target Attributes</name>

<texttable title="Target Variation and Priority/Weight Attributes" anchor="fig-attrs">
      <ttcol align='left'>Attribute Name</ttcol>
      <ttcol align='left'>Brief Description</ttcol>
      <ttcol align='left'>Change Controller</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>var</c>
      <c>List of supported variations of target</c>
      <c>IETF</c>
      <c>[ThisRFC]</c>
      <c>pw</c>
      <c>DNS SRV compatible priority and weight of resource target</c>
      <c>IETF</c>
      <c>[ThisRFC]</c>
</texttable>

<t>IANA is asked to add entries for "var" and "pw" according to above <xref target="fig-attrs"/> to
the "Target Attributes" table.</t>

<t>The "var" target attribute is meant to be used for BRSKI targets as specified in
this document. It is also meant to be usable for other targets if so desired - to
indicate variations of the resource type of the target. For targets with a non-BRSKI
resource target (not using "rt=brski.*"), the format of the value may be different
than specified for BRSKI.</t>

<t>The "pw" target attribute indicates priority and weight for the selection of
the resource target with the semantic and format defined in <xref target="RFC2782"/> for priority
and weight in DNS SRV resource records. If the attribute pw is absent, then
it is assumed to mean pw="65535 0".</t>

</section>
</section>
<section anchor="service-name-registry"><name>Service Names Registry</name>

<t>IANA is asked to modify and amend the "Service Name and Transport Protocol Port Number Registry"
registry (https://www.iana.org/assignments/service-names-port-numbers/service-names-port-numbers.txt) as follows.</t>

<t><list style="symbols">
  <t>brski-proxy, brski-registrar and brski-registrar-rjp are to be added as Service Names for the "udp" protocol
using ThisRFC, <xref target="subreg-service-names"/> as the reference.</t>
  <t>The registrations for brski-proxy and brski-registrar for the "tcp" protocol are to be updated to also
include ThisRFC, <xref target="subreg-service-names"/> as their reference.</t>
  <t>The Defined TXT keys column for brski-proxy, brski-registrar and brski-registrar-rjp for "tcp" and "udp"
protocols are to state the following text:  <vspace blankLines='1'/>
Defined TXT keys: var= comma separated &lt;variation-string(s)&gt;, See ThisRFC <xref target="variation-string-encoding"/>, <xref target="subreg-variations"/></t>
</list></t>

</section>
<section anchor="grasp-registry"><name>GRASP Objective Names Registry</name>

<t>IANA is asked to add the following entry to the
 "GeneRic Autonomic Signaling Protocol (GRASP) Parameters Registry" page,
"GRASP Objective Names Registry".</t>

<texttable title="GRASP Objective Names Registry addition" anchor="fig-grasp-registry">
      <ttcol align='left'>Objective Name</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>AN_join_registrar_rjp</c>
      <c>ThisRFC, <xref target="subreg-service-names"/></c>
</texttable>

</section>
<section anchor="reg-discovery"><name>BRSKI Discovery Parameters</name>

<t>IANA is asked to add a registry called "BRSKI Discovery Parameters"
to the "Bootstrapping Remote Secure Key Infrastructures (BRSKI) Parameters"
registry webpage (https://www.iana.org/assignments/brski-parameters/brski-parameters.xhtml).</t>

<t>The BRSKI Discovery Parameters registry includes several sub-registries that
depend on each other.  Due to the requirement of an IANA registry with sub-registries,
one table has to be chosen to represent the overall registry. The table
used to represent the BRSKI Discover Parameters is the list of discovery
mechanisms supported.</t>

<t>The Registration Procedure for this registry is Specification Required, where Expert Review has to ensure compliance
of entries with the following rules.</t>

<t>Additions to this registry require a specification of the use of the newly registered discovery mechanism
with BRSKI discovery procedures in the way they are specified in this document for DNS-SD, GRASP and CORE-LF.</t>

<t>Changes/extensions to the procedures for any existing registered discovery mechanism, including
DNS-SD, GRASP or CORE-LF can be done by adding such specification to the Reference(s) column.</t>

<t>Any incremental changes to a discovery mechanism procedures require the same or higher level 
of specification as the first one introducing the discovery mechanism. Changes to the procedures
for DNS-SD, GRASP, CORE-LF do hence require an IETF standards track specification for updates.</t>

<t>The initial content is as follows.</t>

<dl>
  <dt>Designated Experts:</dt>
  <dd>
    <t>TBD.</t>
  </dd>
  <dt>Registration Procedure:</dt>
  <dd>
    <t>Specification Required.</t>
  </dd>
  <dt>Notes:</dt>
  <dd>
    <t>See [ThisRFC], <xref target="reg-discovery"/></t>
  </dd>
</dl>

<texttable title="Discovery Mechanisms initial registry table" anchor="fig-discovery-mechanisms">
      <ttcol align='left'>Discovery Mechanism</ttcol>
      <ttcol align='left'>Reference(s)</ttcol>
      <ttcol align='left'>Notes</ttcol>
      <c>DNS-SD</c>
      <c>ThisRFC</c>
      <c>&#160;</c>
      <c>GRASP</c>
      <c>ThisRFC</c>
      <c>&#160;</c>
      <c>CORE-LF</c>
      <c>ThisRFC</c>
      <c>&#160;</c>
</texttable>

<section anchor="subreg-contexts"><name>Contexts</name>

<t>IANA is asked to create a sub-registry called "Contexts" in the "BRSKI Discovery Parameters" registry.</t>

<t>The Registration Procedure for this registry is Specification Required, where Expert Review has to ensure feasibility
of entries with the following behavior/rules.</t>

<t>A Context is a name for a group of one or more BRSKI services. This sub-registry register
a Contexts name and the list of Variation Types defined for the Context.</t>

<t>Variation Types are case independent consisting only of the letters a-z and the digits 0-9,
 must start with a letter and be at most 12 characters long.</t>

<t>Registration of new Contexts <bcp14>MUST</bcp14> include a specification of how to use discovery with the new Context
using the specifications for BRSKI, cBRSKI and BRSKI-PLEDGE in this document as examples.</t>

<t>Technically, Contexts with the same set of Variation Types exist for example to allow registering and
hence discovering different protocol stacks for otherwise logically the same type of services, or
else a BRSKI pledge might be discovering a cBRSKI registrar. See <xref target="subreg-service-names"/> for more details.</t>

<t>The order of Variation Types defines the order in which Variation Type Values are concatenated
to generate Variation Strings as described in <xref target="subreg-variations"/>. Therefore Variation Types
ones registered <bcp14>SHOULD NOT</bcp14> be changed or deleted so that new Variation Strings will be constructed
consistently with old ones. Only new Variation Types may be appended through registration updates.</t>

<t>Registration of additional Variation Types <bcp14>MUST</bcp14> include a specification of how they map
to specific function of the services that use them as this specification does for BRSKI, cBRSKI and
BRSKI-PLEDGE.</t>

<t>Registrations of a new Context <bcp14>MAY</bcp14> initially not define any Variation Types if Variations
are not yet considered for a Context.</t>

<t>The initial content of this sub-registry is as follows.</t>

<dl>
  <dt>Designated Experts:</dt>
  <dd>
    <t>TBD.</t>
  </dd>
  <dt>Registration Procedure:</dt>
  <dd>
    <t>Specification Required.</t>
  </dd>
  <dt>Notes:</dt>
  <dd>
    <t>See [ThisRFC], <xref target="subreg-contexts"/></t>
  </dd>
</dl>

<texttable title="Contexts initial sub-registry table" anchor="fig-subreg-contexts">
      <ttcol align='left'>Context</ttcol>
      <ttcol align='left'>Variation Types</ttcol>
      <ttcol align='left'>Reference(s)</ttcol>
      <ttcol align='left'>Notes</ttcol>
      <c>BRSKI</c>
      <c>mode, vformat, enroll</c>
      <c>ThisRFC</c>
      <c>&#160;</c>
      <c>cBRSKI</c>
      <c>mode, vformat, enroll</c>
      <c>ThisRFC</c>
      <c>&#160;</c>
      <c>BRSKI-PLEDGE</c>
      <c>mode, vformat, enroll</c>
      <c>ThisRFC</c>
      <c>&#160;</c>
</texttable>

</section>
<section anchor="subreg-service-names"><name>Service Names</name>

<t>IANA is asked to create a sub-registry called "Service Names" in the "BRSKI Discovery Parameters" registry.</t>

<t>The Registration Procedure for this registry is Specification Required, where Expert Review has to ensure feasibility
of entries with the following behavior/rules.</t>

<t>Each entry registers a Service Name intended for discovery of a BRSKI related service 
using a specific Discovery Mechanism. The service is to be accessed via specific service (transport) stack Parameter(s)
that are required to be known by the discovery mechanism.</t>

<t>Because they may be used in the future in protocol encodings, Variation Type Choices
<bcp14>SHOULD</bcp14> be as simple as possible. They <bcp14>SHOULD</bcp14>  consist only of the letters a-z and the digits 0-9,
<bcp14>SHOULD</bcp14> start with a letter and be at most 12 characters long.</t>

<t>Depending on the discovery mechanism, the Service Name represents a different signaling element
of the discovery mechanism as follows.</t>

<t>o For DNS-SD, the tables Service Name is the DNS-SD Service Name which <bcp14>MUST</bcp14> also be registered in
  the IANA "Service Name and Transport Protocol Port Number Registry" for use with the DNS-SD
  protocol indicated in the Parameter(s) column.</t>

<t>o For GRASP, the Service Name is the GRASP Objective Name which <bcp14>MUST</bcp14> also be registered
  in the IANA "GeneRic Autonomic Signaling Protocol (GRASP) Parameters" /
  "GRASP Objective Names" registry.</t>

<t>o For CORE-LF, the Service Name is the CoRE Resource Type (rt=) value, which
  <bcp14>MUST</bcp14> be registered in the IANA "Constrained RESTful Environments (CoRE) Parameters" /
  "Resource Type (rt=) Link Target Attribute Values" registry.</t>

<t>Context is a grouping of one or more services with the same set of Variation Types and Values 
as defined below (<xref target="subreg-contexts"/>). Re-use of the same Service Name across multiple
Contexts requires distinction of the services through Parameter(s) that are used as
additional distinguishers (beside the Service Name) in the discovery mechanism.</t>

<t>For example, AN_Proxy is used as the GRASP Objective (aka: "Service Name") to discover <xref target="BRSKI"/>
BRSKI Join Proxies and connect to them via TCP. This is indicated through the IPPROTO_TCP parameter in GRASP.
Likewise, when a constrained BRSKI proxy as described in <xref target="cPROXY"/> is to be
discovered via GRASP, IPPROTO_UDP is to be used in GRASP to distinguish such a cBRSKI Proxy from a
BRSKI Proxy.</t>

<t>Informal names for services are best documented in the Notes column.</t>

<t>The initial registry table adds to the registrations from other BRSKI RFCs new registrations
to discover BRSKI Registrar and Join Proxy via CORE-LF. These do not require new registrations in
the CORE registry because those registrations do not distinguish on the transport stack, and hence the
prior CORE registrations for cBRSKI are equally applicable to BRSKI.  In addition, the registrations
to discover cBRSKI stateful and stateless Registrars and Join Proxies via GRASP and DNS-SD are included.
The necessary additional registrations for these are included in <xref target="service-name-registry"/> for DNS-SD
and <xref target="grasp-registry"/> for GRASP.  With these registrations, both BRSKI and cBRSKI services can use DNS-SD, GRASP or CORE-LF for discovery.</t>

<t>The initial content of this sub-registry is as follows.</t>

<dl>
  <dt>Designated Experts:</dt>
  <dd>
    <t>TBD.</t>
  </dd>
  <dt>Registration Procedure:</dt>
  <dd>
    <t>Specification Required.</t>
  </dd>
  <dt>Notes:</dt>
  <dd>
    <t>See [ThisRFC], <xref target="subreg-service-names"/></t>
  </dd>
</dl>

<texttable title="Service Name(s) initial sub-registry table" anchor="fig-subreg-service-names">
      <ttcol align='left'>Service Name(s)</ttcol>
      <ttcol align='left'>Context</ttcol>
      <ttcol align='left'>Discovery Mechanism</ttcol>
      <ttcol align='left'>Parameter(s)</ttcol>
      <ttcol align='left'>Reference(s)</ttcol>
      <ttcol align='left'>Notes</ttcol>
      <c>brski.jp</c>
      <c>BRSKI</c>
      <c>CORE-LF</c>
      <c>https</c>
      <c>THIS-RFC</c>
      <c>Proxy</c>
      <c>brski.rs</c>
      <c>BRSKI</c>
      <c>CORE-LF</c>
      <c>https</c>
      <c>THIS-RFC</c>
      <c>Registrar (stateful)</c>
      <c>brski-proxy</c>
      <c>BRSKI</c>
      <c>DNS-SD</c>
      <c>tcp</c>
      <c>RFC8995</c>
      <c>Proxy</c>
      <c>brski-registrar</c>
      <c>BRSKI</c>
      <c>DNS-SD</c>
      <c>tcp</c>
      <c>RFC8995</c>
      <c>Registrar (stateful)</c>
      <c>AN_Proxy</c>
      <c>BRSKI</c>
      <c>GRASP</c>
      <c>IPPROTO_TCP</c>
      <c>RFC8995</c>
      <c>Proxy</c>
      <c>AN_join_registrar</c>
      <c>BRSKI</c>
      <c>GRASP</c>
      <c>IPPROTO_TCP</c>
      <c>RFC8995</c>
      <c>Registrar (stateful)</c>
      <c>brski.jp</c>
      <c>cBRSKI</c>
      <c>CORE-LF</c>
      <c>coaps</c>
      <c>I-D.ietf-anima-constrained-voucher</c>
      <c>Proxy</c>
      <c>brski.rs</c>
      <c>cBRSKI</c>
      <c>CORE-LF</c>
      <c>coaps</c>
      <c>I-D.ietf-anima-constrained-join-proxy</c>
      <c>Registrar (stateful)</c>
      <c>brski.rjp</c>
      <c>cBRSKI</c>
      <c>CORE-LF</c>
      <c>coaps</c>
      <c>I-D.ietf-anima-constrained-join-proxy</c>
      <c>Registrar (stateless)</c>
      <c>AN_Proxy</c>
      <c>cBRSKI</c>
      <c>GRASP</c>
      <c>IPPROTO_UDP</c>
      <c>THIS-RFC</c>
      <c>Proxy</c>
      <c>AN_join_registrar</c>
      <c>cBRSKI</c>
      <c>GRASP</c>
      <c>IPPROTO_UDP</c>
      <c>THIS-RFC</c>
      <c>Registrar (stateful)</c>
      <c>AN_join_registrar_rjp</c>
      <c>cBRSKI</c>
      <c>GRASP</c>
      <c>IPPROTO_UDP</c>
      <c>THIS-RFC</c>
      <c>Registrar (stateless)</c>
      <c>brski-proxy</c>
      <c>cBRSKI</c>
      <c>DNS-SD</c>
      <c>udp</c>
      <c>THIS-RFC</c>
      <c>Proxy</c>
      <c>brski-registrar</c>
      <c>cBRSKI</c>
      <c>DNS-SD</c>
      <c>udp</c>
      <c>THIS-RFC</c>
      <c>Registrar (stateful)</c>
      <c>brski-registrar-rjp</c>
      <c>cBRSKI</c>
      <c>DNS-SD</c>
      <c>udp</c>
      <c>THIS-RFC</c>
      <c>Proxy (stateless)</c>
      <c>brski-pledge</c>
      <c>BRSKI-PLEDGE</c>
      <c>DNS-SD</c>
      <c>tcp</c>
      <c>I-D.anima-brski-prm, THIS-RFC</c>
      <c>&#160;</c>
</texttable>

</section>
<section anchor="subreg-choices"><name>Variation Type Choices</name>

<t>IANA is asked to create a sub-registry called "Variation Type Choices" in the "BRSKI Discovery Parameters" registry.</t>

<t>The Registration Procedure for this registry is Specification Required, where Expert Review has to ensure feasibility
of entries with the following expectations/rules.</t>

<t>Each row registers one Variation Type Choice for one Context (as registered in <xref target="subreg-contexts"/>) and 
specifies the Variation Type (also as registered in <xref target="subreg-contexts"/>) for which it is a choice.</t>

<t>All Variation Type Choices <bcp14>MUST</bcp14> be unique across all Variation Types so that the Variation Type can
always be deduced from the Variation Type Choice, permitting future encodings that do not necessarily
have to use the Variation String representation (as registered in <xref target="subreg-variations"/>), and also allowing
to recognize erroneous variation representations easier.</t>

<t>Because they are used in protocol encodings, Variation Type Choices
<bcp14>MUST</bcp14> be as simple as possible. They <bcp14>MUST</bcp14> consist only of the characters a-z and 0-9.</t>

<t>The "Dflt" flag indicates that the Variation Type Choice is the default choice for its Variation Type.
Default choices are not included in the Variation String encoding of Variations. When new Variation
Types are added to a Context to introduce variations of a new aspect of BRSKI, then the choice that
is backward compatible has to become the Default choice for that new Variation Type.</t>

<t>The "Rsvd" flag indicates a choice that has not sufficiently been vetted/specified to allow its use in
Variations (<xref target="subreg-variations"/>), but that is known to be a possible candidate and is reserved to track
that possible extension through future specification work.</t>

<t>References in parenthesis specify the necessary functionality for a Variation Type Choice but do not
specify the actual registration of the Variation Type Choice.</t>

<t>The initial content is as follows.</t>

<dl>
  <dt>Designated Experts:</dt>
  <dd>
    <t>TBD.</t>
  </dd>
  <dt>Registration Procedure:</dt>
  <dd>
    <t>Specification required.</t>
  </dd>
</dl>

<texttable title="Variation Type Choices initial sub-registry table" anchor="fig-choices">
      <ttcol align='left'>Flags</ttcol>
      <ttcol align='left'>Variation Type Choice</ttcol>
      <ttcol align='left'>Variation Type</ttcol>
      <ttcol align='left'>Context</ttcol>
      <ttcol align='left'>Reference(s)</ttcol>
      <ttcol align='left'>Note(s)</ttcol>
      <c>Dflt</c>
      <c>rrm</c>
      <c>mode</c>
      <c>BRSKI</c>
      <c>(RFC8995),ThisRFC</c>
      <c>Registrar Responder Mode</c>
      <c>&#160;</c>
      <c>prm</c>
      <c>mode</c>
      <c>BRSKI</c>
      <c>(I-D.ietf-anima-brski-prm),ThisRFC</c>
      <c>Pledge Responder Mode</c>
      <c>Dflt</c>
      <c>cmsj</c>
      <c>vformat</c>
      <c>BRSKI</c>
      <c>(RFC8368,RFC8995),ThisRFC</c>
      <c>CMS-signed JSON Voucher</c>
      <c>&#160;</c>
      <c>jose</c>
      <c>vformat</c>
      <c>BRSKI</c>
      <c>(I-D.ietf-anima-jws-voucher),ThisRFC</c>
      <c>JOSE-signed JSON</c>
      <c>&#160;</c>
      <c>cose</c>
      <c>vformat</c>
      <c>BRSKI</c>
      <c>ThisRFC</c>
      <c>CBOR with COSE signature</c>
      <c>Dflt</c>
      <c>est</c>
      <c>enroll</c>
      <c>BRSKI</c>
      <c>(RFC7030,RFC8995),ThisRFC</c>
      <c>Enrollment over Secure Transport</c>
      <c>&#160;</c>
      <c>cmp</c>
      <c>enroll</c>
      <c>BRSKI</c>
      <c>(RFC9733,RFC9483),ThisRFC</c>
      <c>Lightweight CMP Profile / BRSKI-AE</c>
      <c>Rsvd</c>
      <c>scep</c>
      <c>enroll</c>
      <c>BRSKI</c>
      <c>ThisRFC</c>
      <c>common legacy option</c>
      <c>Dflt</c>
      <c>rrm</c>
      <c>mode</c>
      <c>cBRSKI</c>
      <c>(I-D.anima-constrained-voucher),ThisRFC</c>
      <c>Registrar Responder Mode</c>
      <c>Dflt</c>
      <c>cose</c>
      <c>vformat</c>
      <c>cBRSKI</c>
      <c>(I-D.ietf-anima-constrained-voucher),ThisRFC</c>
      <c>CBOR with COSE signature</c>
      <c>&#160;</c>
      <c>cmsj</c>
      <c>vformat</c>
      <c>cBRSKI</c>
      <c>ThisRFC</c>
      <c>CMS-signed JSON Voucher</c>
      <c>&#160;</c>
      <c>jose</c>
      <c>vformat</c>
      <c>cBRSKI</c>
      <c>ThisRFC</c>
      <c>JOSE-signed JSON</c>
      <c>Dflt</c>
      <c>est</c>
      <c>enroll</c>
      <c>cBRSKI</c>
      <c>(RFC9148), ThisRFC</c>
      <c>Enroll via EST over COAP</c>
      <c>&#160;</c>
      <c>cmp</c>
      <c>enroll</c>
      <c>cBRSKI</c>
      <c>(RFC9733,RFC9483),ThisRFC</c>
      <c>Lightweight CMP Profile / BRSKI-AE</c>
      <c>Dflt</c>
      <c>prm</c>
      <c>mode</c>
      <c>BRSKI-PLEDGE</c>
      <c>(I-D.ietf-anima-brski-prm),ThisRFC</c>
      <c>Pledge responder Mode</c>
      <c>Dflt</c>
      <c>jose</c>
      <c>vformat</c>
      <c>BRSKI-PLEDGE</c>
      <c>(I-D.ietf-anima-brski-prm),ThisRFC</c>
      <c>JOSE-signed JSON</c>
      <c>Rsvd</c>
      <c>cmsj</c>
      <c>vformat</c>
      <c>BRSKI-PLEDGE</c>
      <c>(I-D.ietf-anima-brski-prm),ThisRFC</c>
      <c>CMS-signed JSON Voucher</c>
      <c>Rsvd</c>
      <c>cose</c>
      <c>vformat</c>
      <c>BRSKI-PLEDGE</c>
      <c>(I-D.ietf-anima-brski-prm),ThisRFC</c>
      <c>CBOR with COSE signature</c>
      <c>Dflt</c>
      <c>est</c>
      <c>enroll</c>
      <c>BRSKI-PLEDGE</c>
      <c>(I-D.ietf-anima-brski-prm),ThisRFC</c>
      <c>Enroll via EST modified for PRM</c>
      <c>&#160;</c>
      <c>cmp</c>
      <c>enroll</c>
      <c>BRSKI-PLEDGE</c>
      <c>(RFC9733,RFC9483,I-D.ietf-anima-brski-prm),ThisRFC</c>
      <c>Lightweight CMP Profile with PRM</c>
</texttable>

</section>
<section anchor="subreg-variations"><name>Variations</name>

<t>IANA is asked to create a sub-registry called "Variations" in the "BRSKI Discovery Parameters" registry.</t>

<t>The Registration Procedure for this registry is Specification Required, where Expert Review has to ensure feasibility
of entries with the following behavior/rules.</t>

<t>Each row registers one or more Variation String(s) that represent one Variation
in one Context, and specifies the combination of Variation Type Values indicated by that Variation.</t>

<t>Variation Type Values <bcp14>MUST</bcp14> be listed in the order in which they appear in <xref target="subreg-contexts"/>,
including the default Variation Type Values for the Variation Types known at the time of registration.
Once a Variation String for a Context is registered, its listed Variation Type Values <bcp14>SHOULD
NOT</bcp14> be modified (except for erroneous registration).</t>

<t>The primary Variation String <bcp14>SHOULD</bcp14> be derived by concatenating the Variation Type 
Values listed, concatenated by "-", except for default values. This is called the standard Variation String construction rule.
The empty string is represented as "".</t>

<t>Any Variation String not meeting that construction scheme <bcp14>SHOULD</bcp14> receive a note explaining why.</t>

<t>When later potentially new Variation Types are introduced into the XXX table, 
then they will not lead to a change in the Variation String(s), instead it is understood
that the Variation will represent the default Variation Type Values for any such additional
Variation Types.</t>

<t>This registry table exists to document which specification(s) utilize specific
Variations so that implementations do not have to consider supporting arbitrary
possible (but not validated by specification) Variations.</t>

<t>The subregistries specified below register the permissible Context and Variation Type Values.</t>

<t>The initial content is as follows.</t>

<dl>
  <dt>Designated Experts:</dt>
  <dd>
    <t>TBD.</t>
  </dd>
  <dt>Registration Procedure:</dt>
  <dd>
    <t>Specification required.</t>
  </dd>
  <dt>Notes:</dt>
  <dd>
    <t>(1) The Variation String "est-tls" is equivalent to the Variation String "" and
is required and only permitted for the AN_join_registrar objective value in GRASP
for backward compatibility with <xref target="BRSKI"/>, where it is used for this variation. Note that AN_proxy uses "".</t>
  </dd>
</dl>

<texttable title="Variations initial sub-registry table" anchor="fig-variations">
      <ttcol align='left'>Variation String</ttcol>
      <ttcol align='left'>Context</ttcol>
      <ttcol align='left'>Variation</ttcol>
      <ttcol align='left'>Specification(s)</ttcol>
      <ttcol align='left'>Notes</ttcol>
      <c>"" / "est-tls"</c>
      <c>BRSKI</c>
      <c>rrm cmsj est</c>
      <c>RFC8995</c>
      <c>See Note (1)</c>
      <c>cmp</c>
      <c>BRSKI</c>
      <c>rrm cmsj cmp</c>
      <c>RFC9733</c>
      <c>&#160;</c>
      <c>prm-jose</c>
      <c>BRSKI</c>
      <c>prm jose est</c>
      <c>(I-D.ietf-anima-jws-voucher,I-D.ietf-anima-brski-prm),ThisRFC</c>
      <c>I-D.ietf-anima-brski-prm also includes required extensions to EST</c>
      <c>""</c>
      <c>cBRSKI</c>
      <c>rrm cose est</c>
      <c>I-D.ietf-anima-constrained-voucher</c>
      <c>&#160;</c>
      <c>prm-jose</c>
      <c>BRSKI-PLEDGE</c>
      <c>prm jose est</c>
      <c>I-D.ietf-anima-brski-prm</c>
      <c>&#160;</c>
</texttable>

</section>
</section>
<section anchor="brski-well-known-uris-fixes-opportunistic"><name>BRSKI Well-Known URIs fixes (opportunistic)</name>

<t>The following change requests to "https://www.iana.org/assignments/brski-parameters/brski-parameters.xhtml#brski-well-known-uris" are cosmetic in nature and are included in this document solely because support for Endpoint URIs is implied by the mechanisms specified in this document and the existing registry has these cosmetic issues.</t>

<t><list style="numbers">
  <t>IANA is asked to change the name of the first column of the table from "URI" to "URI Suffix". This is in alignment with other table columns with the same syntax/semantic, such as "https://www.iana.org/assignments/well-known-uris/well-known-uris.xhtml".</t>
  <t>IANA is asked to change the Reference from "RFC8995"  to "RFC8995, Section 8.3.1".</t>
  <t>IANA is asked to include the following "Note" text: The following table contains the assigned BRSKI protocol Endpoint URI suffixes under "/.well-known/brski"." - This note is added to introduce the term "Endpoint" into the registry table as that is the term commonly used (instead of URI) in several of the memos for which this discovery document was written. It is meant to help readers map the registry to the terminology used in those documents.</t>
</list></t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>In <xref target="BRSKI-PRM"/>, pledges are easier subject to DoS attacks than in <xref target="BRSKI"/>, because attackers
can be initiators and delay or prohibit enrollment of a pledge by opening so many connections to
the pledge that a valid Registrar-Agent's connection to the pledge may not be possible. Discovery
of the pledge via DNS-SD increases the ability of attackers to discover pledges against which such
DoS attacks can be attempted.</t>

<t>Especially when supporting DNS-SD browsing across unicast DNS,
pledges <bcp14>MUST</bcp14> implement DoS prevention measures, such as limiting the number and rate of accepted TCP
connections on a per-initiator basis. If feasible for the implementation, simultaneous connections
<bcp14>SHOULD</bcp14> be possible, so that an ongoing attacker connection will not delay a valid Registrar-Agent
connection. When accepting connections, a strategy such as LRU <bcp14>MAY</bcp14> be used to ensure that an attacker
will not be able to monopolize connections.</t>

<t>Browsing via DNS-SD, especially via unicast DNS which makes information available network-wide does
also introduce a perpass attack, gathering intelligence about the type and serial number of
devices are installed in the network. Whether or not this is seen as a relevant risk is highly
installation dependent. Networks <bcp14>SHOULD</bcp14> implement filtering measures at mDNS and/or DNS RR/services
level to prohibit such data collection if there is a risk, and this is seen as an undesirable attack
vector.</t>

<t>Service instance names as defined in <xref target="brski-pledge"/> are used to discover pledges
by their manufacturer-assigned serial numbers. Today, DNS-SD does not provide security
against impersonation of such service instance names. Instead, impersonation can and
will only be discovered after performing BRSKI connections to the pledge. It should
be noted, that the scheme used by <xref target="brski-pledge"/> could actually be used to protect
against impersonation when <xref target="DNSSD-SRP"/> with some security extension is used:
Pledges need to signal their IDevID for their SRP TLS connection, and the SRV server
needs to have the same manufacturer Service Instance Name schema and manufacturer
trust anchor information as BRSKI registrars and can then allow only the permissible
service instance name DNS-SD RRs for this pledge. In fact, the SRP server could
create all the necessary <xref target="brski-pledge"/> required DNS-SD RRs from the IDevID
information even if the pledge itself is not requesting them or is requesting other
DNS-SD RRs. Definition of these procedures is outside the scope of this specification
though.</t>

<t>None of the discovery mechanisms (DNS-SD, GRASP or CORE-LF) are necessarily secure. Instead,
it is a matter of their deployment, how trustworthy service announcements are. In an
unprotected deployment with DNS-SD via mDNS for example, an attacker could attract
connections from initiators by announcing itself with the best priority value. When a
deployment instead uses a secure domain deployment model, such as an <xref target="ACP"/>,
a secured wireless mesh technology, or discovery via a secured DNS server, then
service announcements are typically assumed to be trustworthy and with them their
service parameters. In those deployments, the security question is then primarily the
attack vectors to impair such a responder to make it behave in undesirable ways.</t>

</section>
<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>Many thanks for reviews by Arthur Hecker, Steffen Fries and discussions/feedbacks by Brian Carpenter, Michael Richardson, Michael Kovatsch. 
Special thanks to Amanda Barber for her IANA section review.</t>

<section anchor="change-log"><name>Change log</name>

<t>[RFC Editor: please remove this section.]</t>

<t>WG draft 10:</t>

<t>First run for Stuart Cheshire review: Run draft through claude.ai
prompt: "please fix up the english with minimum amount of changes in the following krmdown-rfc format file:.
50++ small fixes.
2 incorrect: "<bcp14>SHOULD</bcp14> not" -&gt; "<bcp14>SHOULD NOT</bcp14>". "perpass" -&gt; "passive".</t>

<t>WG draft 09:</t>

<t>Small editorial fix. Table incorrectly split by empty lines.</t>

<t>WG draft 08:</t>

<t>Overhauled IANA section after IANA early review. Changed tables so every table has only
 one key registered item which is usually in the first column. Eliminated formatting
based registration, eg.: no more "multi-line" registration - does not work because the
registries are databased. Removed optical beautification of keeping cells empty to
indicate repetition of previous row content. This too does not work for IANA registry
because they allow re-ordering of rows by column.</t>

<t>Also rewrote/shortened the Registry Data Model section to fit the new IANA section.
Put Discussions section before IANA discussion so it is clear it is part of the
overall data model, not the IANA representation.</t>

<t>Added updates to BRSKI-AE and BRSKI-PRM text that details how BRSKI Discovery is
to be used for both RFCs mechanisms. Also made this doc an update to BRSKI-AE to
ensure it is tracked that way.</t>

<t>Moved all other IANA consideration before the ask for the new BRSKI Discovery Parameters,
as this looks more logical - except for the opportunistic ask.</t>

<t>As a result of creating more tables and hence removing columns, the tables "should"
actually fit into the 72 character TXT rendering as soon as the I-D... draft
references in them are replaced by RFC references, which should happen in RFC
editor queue before this document gets published (hope, hope...).</t>

<t>Removed appendix "possible future variations"</t>

<t>Made document update to rfc6690 to allow formalizing request to update CORE RT= parameter range table with BRSKI entries, see section 4.1.1.</t>

<t>WG draft 07:</t>

<t>Defined document to be update to draft-ietf-anima-brski-prm (for the specification of IDevID derived DNS-SD discovery of pledges)</t>

<t>Resolved open Q text whether SRP allows discovery of SRP server. According to Stuart Cheshire this is supported.</t>

<t>Incorporated initial Feedback from Michael Kovatsch</t>

<t>Added section explaining that there is no spec for how to do pledge discovery via CORE-LF or GRASP.</t>

<t><list style="symbols">
  <t>Rewrote 2.1 Challenges to now be a more comprehensive set of 3 example deployment issues without this work.</t>
</list></t>

<t>Incorporated review by Arthur Hecker</t>

<t><list style="symbols">
  <t>Rewrote abstract to more comprehensively (and easier understandable) describe the scope of this document</t>
  <t>Simplified terminology: removed "variation context", now only calling it "context".</t>
  <t>changed name of BRSKI context in IANA registry to 'tBRSKI' (TCP BRSKI) - to make it easier to know when text refers to BRSKI
as an overall concept or specifically to the TCP based set of variations of BRSKI.</t>
  <t>Removed duplicate text paragraphs in proxy sections.</t>
  <t>Added note about (in)security of discovery mechanisms in general and how deployments typically defer to the "secure domain" context to overcome this issue.</t>
  <t>Large number of textual fixes (thanks a lot for the thorough read!).</t>
</list></t>

<t>WG draft 06:</t>

<t>Initial overview review feedback from Michael Kovatsch and Arthur Hecker</t>

<t>Made abstract and Challenges introduction hopefully better explaining the scope of
the document and motivate its need.</t>

<t>Review Steffen Fries:</t>

<t>Cleaned up terminology IP/IPv6 -&gt; IP/IPv4/IPv6.</t>

<t>CA -&gt; trust anchor</t>

<t>BRSKI proxy -&gt; Join Proxy for consistency with RFC8995.</t>

<t>Added mentioning of Registrar-Agent from BRSKI-PRM where appropriate</t>

<t>Rewrote 2.1.3 to make the functionality of variation agnostic proxying clearer (hopefully)</t>

<t>Rewrote 3.1.1 to more clearly define role and services and distinguish them.</t>

<t>Changed "cms" to "cmsj"(as well as derived variation strings) so that it is clear that this variation type does not mean all possible encoding options for CMS but only JSON.</t>

<t>Added explanation about the fact that a variation may introduce changes to a variation type component that shares the same name (3.1.6)</t>

<t>Noted that discovery of pledges does not apply in 3.2 which talks about redundant service discovery/selection.</t>

<t>removed last paragraph from 3.3.2.2 - duplicate from earlier section.</t>

<t>Improved 3.4.3 by better structuring the example figure and rewriting the explanation text as a step-by-step explanation how a Registrar-Agent would perform the steps.</t>

<t>Fixed small bugs in GRASP example section 3.5.2.2 but ended up improving examples a lot and make them more useful (registrar AND proxy )</t>

<t>Still can not figure out how to nicely get hotlinks to the terminology section definitions. They just
show up in text format as "Section 1" or the like. Giving up on the idea. TBD: Maybe ask RFC editor/RSWG.
Likewise, i can not have references to BRSKI RFCs both with a logical name like BRSKI-PRM and in other
places references with the RFC number. I need to define both as references and then the same RFC will
have two entries. Stupid. Now i only have logical references, but in all places where i need to
actually reference the RFC by number, such as IANA registries or pictures, i do not use references
anymore.</t>

<t>WG draft 05:</t>

<t>Major update to specify resilience aspects in selection of responders.</t>

<t>Major update/simplification of CORE-LF section.</t>

<t>WG draft 02/03:</t>

<t>Fix up tables to be correctly rendered by html output.</t>

<t>WG draft 01:</t>

<t>Core-LF improvements  / interim work.</t>

<t>WG draft 00:</t>

<t>Added section for CORE-LF. Still missing to update existing text with the CORE-LF definitions.</t>

<t>Individual version 01:</t>

<t>Various enhancements</t>

<t>Individual version 00:</t>

<t>Initial version.</t>

</section>
</section>


  </middle>

  <back>


    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2782">
  <front>
    <title>A DNS RR for specifying the location of services (DNS SRV)</title>
    <author fullname="A. Gulbrandsen" initials="A." surname="Gulbrandsen"/>
    <author fullname="P. Vixie" initials="P." surname="Vixie"/>
    <author fullname="L. Esibov" initials="L." surname="Esibov"/>
    <date month="February" year="2000"/>
    <abstract>
      <t>This document describes a DNS RR which specifies the location of the server(s) for a specific protocol and domain. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2782"/>
  <seriesInfo name="DOI" value="10.17487/RFC2782"/>
</reference>

<reference anchor="RFC3986">
  <front>
    <title>Uniform Resource Identifier (URI): Generic Syntax</title>
    <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
    <author fullname="R. Fielding" initials="R." surname="Fielding"/>
    <author fullname="L. Masinter" initials="L." surname="Masinter"/>
    <date month="January" year="2005"/>
    <abstract>
      <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="66"/>
  <seriesInfo name="RFC" value="3986"/>
  <seriesInfo name="DOI" value="10.17487/RFC3986"/>
</reference>

<reference anchor="RFC5280">
  <front>
    <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
    <author fullname="D. Cooper" initials="D." surname="Cooper"/>
    <author fullname="S. Santesson" initials="S." surname="Santesson"/>
    <author fullname="S. Farrell" initials="S." surname="Farrell"/>
    <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <author fullname="W. Polk" initials="W." surname="Polk"/>
    <date month="May" year="2008"/>
    <abstract>
      <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5280"/>
  <seriesInfo name="DOI" value="10.17487/RFC5280"/>
</reference>

<reference anchor="CORE-LF">
  <front>
    <title>Constrained RESTful Environments (CoRE) Link Format</title>
    <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
    <date month="August" year="2012"/>
    <abstract>
      <t>This specification defines Web Linking using a link format for use by constrained web servers to describe hosted resources, their attributes, and other relationships between links. Based on the HTTP Link Header field defined in RFC 5988, the Constrained RESTful Environments (CoRE) Link Format is carried as a payload and is assigned an Internet media type. "RESTful" refers to the Representational State Transfer (REST) architecture. A well-known URI is defined as a default entry point for requesting the links hosted by a server. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6690"/>
  <seriesInfo name="DOI" value="10.17487/RFC6690"/>
</reference>

<reference anchor="mDNS">
  <front>
    <title>Multicast DNS</title>
    <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
    <author fullname="M. Krochmal" initials="M." surname="Krochmal"/>
    <date month="February" year="2013"/>
    <abstract>
      <t>As networked devices become smaller, more portable, and more ubiquitous, the ability to operate with less configured infrastructure is increasingly important. In particular, the ability to look up DNS resource record data types (including, but not limited to, host names) in the absence of a conventional managed DNS server is useful.</t>
      <t>Multicast DNS (mDNS) provides the ability to perform DNS-like operations on the local link in the absence of any conventional Unicast DNS server. In addition, Multicast DNS designates a portion of the DNS namespace to be free for local use, without the need to pay any annual fee, and without the need to set up delegations or otherwise configure a conventional DNS server to answer for those names.</t>
      <t>The primary benefits of Multicast DNS names are that (i) they require little or no administration or configuration to set them up, (ii) they work when no infrastructure is present, and (iii) they work during infrastructure failures.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6762"/>
  <seriesInfo name="DOI" value="10.17487/RFC6762"/>
</reference>

<reference anchor="DNS-SD">
  <front>
    <title>DNS-Based Service Discovery</title>
    <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
    <author fullname="M. Krochmal" initials="M." surname="Krochmal"/>
    <date month="February" year="2013"/>
    <abstract>
      <t>This document specifies how DNS resource records are named and structured to facilitate service discovery. Given a type of service that a client is looking for, and a domain in which the client is looking for that service, this mechanism allows clients to discover a list of named instances of that desired service, using standard DNS queries. This mechanism is referred to as DNS-based Service Discovery, or DNS-SD.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6763"/>
  <seriesInfo name="DOI" value="10.17487/RFC6763"/>
</reference>

<reference anchor="RFC7390">
  <front>
    <title>Group Communication for the Constrained Application Protocol (CoAP)</title>
    <author fullname="A. Rahman" initials="A." role="editor" surname="Rahman"/>
    <author fullname="E. Dijk" initials="E." role="editor" surname="Dijk"/>
    <date month="October" year="2014"/>
    <abstract>
      <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for constrained devices and constrained networks. It is anticipated that constrained devices will often naturally operate in groups (e.g., in a building automation scenario, all lights in a given room may need to be switched on/off as a group). This specification defines how CoAP should be used in a group communication context. An approach for using CoAP on top of IP multicast is detailed based on existing CoAP functionality as well as new features introduced in this specification. Also, various use cases and corresponding protocol flows are provided to illustrate important concepts. Finally, guidance is provided for deployment in various network topologies.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7390"/>
  <seriesInfo name="DOI" value="10.17487/RFC7390"/>
</reference>

<reference anchor="GRASP">
  <front>
    <title>GeneRic Autonomic Signaling Protocol (GRASP)</title>
    <author fullname="C. Bormann" initials="C." surname="Bormann"/>
    <author fullname="B. Carpenter" initials="B." role="editor" surname="Carpenter"/>
    <author fullname="B. Liu" initials="B." role="editor" surname="Liu"/>
    <date month="May" year="2021"/>
    <abstract>
      <t>This document specifies the GeneRic Autonomic Signaling Protocol (GRASP), which enables autonomic nodes and Autonomic Service Agents to dynamically discover peers, to synchronize state with each other, and to negotiate parameter settings with each other. GRASP depends on an external security environment that is described elsewhere. The technical objectives and parameters for specific application scenarios are to be described in separate documents. Appendices briefly discuss requirements for the protocol and existing protocols with comparable features.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8990"/>
  <seriesInfo name="DOI" value="10.17487/RFC8990"/>
</reference>

<reference anchor="ACP">
  <front>
    <title>An Autonomic Control Plane (ACP)</title>
    <author fullname="T. Eckert" initials="T." role="editor" surname="Eckert"/>
    <author fullname="M. Behringer" initials="M." role="editor" surname="Behringer"/>
    <author fullname="S. Bjarnason" initials="S." surname="Bjarnason"/>
    <date month="May" year="2021"/>
    <abstract>
      <t>Autonomic functions need a control plane to communicate, which depends on some addressing and routing. This Autonomic Control Plane should ideally be self-managing and be as independent as possible of configuration. This document defines such a plane and calls it the "Autonomic Control Plane", with the primary use as a control plane for autonomic functions. It also serves as a "virtual out-of-band channel" for Operations, Administration, and Management (OAM) communications over a network that provides automatically configured, hop-by-hop authenticated and encrypted communications via automatically configured IPv6 even when the network is not configured or is misconfigured.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8994"/>
  <seriesInfo name="DOI" value="10.17487/RFC8994"/>
</reference>

<reference anchor="BRSKI">
  <front>
    <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
    <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
    <author fullname="M. Richardson" initials="M." surname="Richardson"/>
    <author fullname="T. Eckert" initials="T." surname="Eckert"/>
    <author fullname="M. Behringer" initials="M." surname="Behringer"/>
    <author fullname="K. Watsen" initials="K." surname="Watsen"/>
    <date month="May" year="2021"/>
    <abstract>
      <t>This document specifies automated bootstrapping of an Autonomic Control Plane. To do this, a Secure Key Infrastructure is bootstrapped. This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline. We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device. The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8995"/>
  <seriesInfo name="DOI" value="10.17487/RFC8995"/>
</reference>

<reference anchor="BRSKI-AE">
  <front>
    <title>BRSKI with Alternative Enrollment (BRSKI-AE)</title>
    <author fullname="D. von Oheimb" initials="D." role="editor" surname="von Oheimb"/>
    <author fullname="S. Fries" initials="S." surname="Fries"/>
    <author fullname="H. Brockhaus" initials="H." surname="Brockhaus"/>
    <date month="March" year="2025"/>
    <abstract>
      <t>This document defines enhancements to the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol, known as BRSKI with Alternative Enrollment (BRSKI-AE). BRSKI-AE extends BRSKI to support certificate enrollment mechanisms instead of the originally specified use of Enrollment over Secure Transport (EST). It supports certificate enrollment protocols such as the Certificate Management Protocol (CMP) that use authenticated self-contained signed objects for certification messages, allowing for flexibility in network device onboarding scenarios. The enhancements address use cases where the existing enrollment mechanism may not be feasible or optimal, providing a framework for integrating suitable alternative enrollment protocols. This document also updates the BRSKI reference architecture to accommodate these alternative methods, ensuring secure and scalable deployment across a range of network environments.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9733"/>
  <seriesInfo name="DOI" value="10.17487/RFC9733"/>
</reference>


<reference anchor="BRSKI-PRM">
   <front>
      <title>BRSKI with Pledge in Responder Mode (BRSKI-PRM)</title>
      <author fullname="Steffen Fries" initials="S." surname="Fries">
         <organization>Siemens AG</organization>
      </author>
      <author fullname="Thomas Werner" initials="T." surname="Werner">
         <organization>Siemens AG</organization>
      </author>
      <author fullname="Eliot Lear" initials="E." surname="Lear">
         <organization>Cisco Systems</organization>
      </author>
      <author fullname="Michael Richardson" initials="M." surname="Richardson">
         <organization>Sandelman Software Works</organization>
      </author>
      <date day="3" month="June" year="2025"/>
      <abstract>
	 <t>   This document defines enhancements to Bootstrapping Remote Secure Key
   Infrastructure (BRSKI, RFC8995) as BRSKI with Pledge in Responder
   Mode (BRSKI-PRM).  BRSKI-PRM supports the secure bootstrapping of
   devices, referred to as pledges, into a domain where direct
   communication with the registrar is either limited or not possible at
   all.  To facilitate interaction between a pledge and a domain
   registrar the registrar-agent is introduced as new component.  The
   registrar-agent supports the reversal of the interaction model from a
   pledge-initiated mode, to a pledge-responding mode, where the pledge
   is in a server role.  To establish the trust relation between pledge
   and registrar, BRSKI-PRM relies on object security rather than
   transport security.  This approach is agnostic to enrollment
   protocols that connect a domain registrar to a key infrastructure
   (e.g., domain Certification Authority).

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-anima-brski-prm-23"/>
   
</reference>


<reference anchor="cBRSKI">
   <front>
      <title>Constrained Bootstrapping Remote Secure Key Infrastructure (cBRSKI)</title>
      <author fullname="Michael Richardson" initials="M." surname="Richardson">
         <organization>Sandelman Software Works</organization>
      </author>
      <author fullname="Peter Van der Stok" initials="P." surname="Van der Stok">
         <organization>vanderstok consultancy</organization>
      </author>
      <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
         <organization>Cisco Systems</organization>
      </author>
      <author fullname="Esko Dijk" initials="E." surname="Dijk">
         <organization>IoTconsultancy.nl</organization>
      </author>
      <date day="27" month="February" year="2026"/>
      <abstract>
	 <t>   This document defines the Constrained Bootstrapping Remote Secure Key
   Infrastructure (cBRSKI) protocol, which provides a solution for
   secure zero-touch onboarding of resource-constrained (IoT) devices
   into the network of a domain owner.  This protocol is designed for
   constrained networks, which may have limited data throughput or may
   experience frequent packet loss. cBRSKI is a variant of the BRSKI
   protocol, which uses an artifact signed by the device manufacturer
   called the &quot;voucher&quot; which enables a new device and the owner&#x27;s
   network to mutually authenticate.  While the BRSKI voucher data is
   encoded in JSON, cBRSKI uses a compact CBOR-encoded voucher.  The
   BRSKI voucher data definition is extended with new data types that
   allow for smaller voucher sizes.  The Enrollment over Secure
   Transport (EST) protocol, used in BRSKI, is replaced with EST-over-
   CoAPS; and HTTPS used in BRSKI is replaced with DTLS-secured CoAP
   (CoAPS).  This document Updates RFC 8995 and RFC 9148.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-anima-constrained-voucher-30"/>
   
</reference>


<reference anchor="cPROXY">
   <front>
      <title>Join Proxy for Bootstrapping of Constrained Network Elements</title>
      <author fullname="Esko Dijk" initials="E." surname="Dijk">
         <organization>IoTconsultancy.nl</organization>
      </author>
      <author fullname="Michael Richardson" initials="M." surname="Richardson">
         <organization>Sandelman Software Works</organization>
      </author>
      <author fullname="Peter Van der Stok" initials="P." surname="Van der Stok">
         <organization>vanderstok consultancy</organization>
      </author>
      <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
         <organization>Cisco Systems</organization>
      </author>
      <date day="19" month="October" year="2025"/>
      <abstract>
	 <t>   This document extends the constrained Bootstrapping Remote Secure Key
   Infrastructures (cBRSKI) onboarding protocol by adding a new network
   function, the constrained Join Proxy.  This function can be
   implemented on a constrained node.  The goal of the Join Proxy is to
   help new constrained nodes (&quot;Pledges&quot;) securely onboard into a new IP
   network using the cBRSKI protocol.  It acts as a circuit proxy for
   User Datagram Protocol (UDP) packets that carry the onboarding
   messages.  The solution is extensible to support other UDP-based
   onboarding protocols as well.  The Join Proxy functionality is
   designed for use in constrained networks, including IPv6 over Low-
   Power Wireless Personal Area Networks (6LoWPAN) based networks in
   which the onboarding authority server (&quot;Registrar&quot;) may be multiple
   IP hops away from a Pledge.  Despite this distance, the Pledge only
   needs to use link-local communication to complete cBRSKI onboarding.
   Two modes of Join Proxy operation are defined, stateless and
   stateful, to allow different trade-offs regarding resource usage,
   implementation complexity and security.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-anima-constrained-join-proxy-18"/>
   
</reference>


<reference anchor="JWS-VOUCHER">
   <front>
      <title>JWS signed Voucher Artifacts for Bootstrapping Protocols</title>
      <author fullname="Thomas Werner" initials="T." surname="Werner">
         <organization>Siemens AG</organization>
      </author>
      <author fullname="Michael Richardson" initials="M." surname="Richardson">
         <organization>Sandelman Software Works</organization>
      </author>
      <date day="15" month="January" year="2025"/>
      <abstract>
	 <t>   This document introduces a variant of the RFC8366 voucher artifact in
   which CMS is replaced by the JSON Object Signing and Encryption
   (JOSE) mechanism described in RFC7515.  This supports deployments in
   which JOSE is preferred over CMS.  In addition to specifying the
   format, the &quot;application/voucher-jws+json&quot; media type is registered
   and examples are provided.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-anima-jws-voucher-16"/>
   
</reference>

<reference anchor="EST">
  <front>
    <title>Enrollment over Secure Transport</title>
    <author fullname="M. Pritikin" initials="M." role="editor" surname="Pritikin"/>
    <author fullname="P. Yee" initials="P." role="editor" surname="Yee"/>
    <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins"/>
    <date month="October" year="2013"/>
    <abstract>
      <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport. This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates. It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7030"/>
  <seriesInfo name="DOI" value="10.17487/RFC7030"/>
</reference>

<reference anchor="RFC8368">
  <front>
    <title>Using an Autonomic Control Plane for Stable Connectivity of Network Operations, Administration, and Maintenance (OAM)</title>
    <author fullname="T. Eckert" initials="T." role="editor" surname="Eckert"/>
    <author fullname="M. Behringer" initials="M." surname="Behringer"/>
    <date month="May" year="2018"/>
    <abstract>
      <t>Operations, Administration, and Maintenance (OAM), as per BCP 161, for data networks is often subject to the problem of circular dependencies when relying on connectivity provided by the network to be managed for the OAM purposes.</t>
      <t>Provisioning while bringing up devices and networks tends to be more difficult to automate than service provisioning later on. Changes in core network functions impacting reachability cannot be automated because of ongoing connectivity requirements for the OAM equipment itself, and widely used OAM protocols are not secure enough to be carried across the network without security concerns.</t>
      <t>This document describes how to integrate OAM processes with an autonomic control plane in order to provide stable and secure connectivity for those OAM processes. This connectivity is not subject to the aforementioned circular dependencies.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8368"/>
  <seriesInfo name="DOI" value="10.17487/RFC8368"/>
</reference>

<reference anchor="RFC9483">
  <front>
    <title>Lightweight Certificate Management Protocol (CMP) Profile</title>
    <author fullname="H. Brockhaus" initials="H." surname="Brockhaus"/>
    <author fullname="D. von Oheimb" initials="D." surname="von Oheimb"/>
    <author fullname="S. Fries" initials="S." surname="Fries"/>
    <date month="November" year="2023"/>
    <abstract>
      <t>This document aims at simple, interoperable, and automated PKI management operations covering typical use cases of industrial and Internet of Things (IoT) scenarios. This is achieved by profiling the Certificate Management Protocol (CMP), the related Certificate Request Message Format (CRMF), and transfer based on HTTP or Constrained Application Protocol (CoAP) in a succinct but sufficiently detailed and self-contained way. To make secure certificate management for simple scenarios and constrained devices as lightweight as possible, only the most crucial types of operations and options are specified as mandatory. More specialized or complex use cases are supported with optional features.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9483"/>
  <seriesInfo name="DOI" value="10.17487/RFC9483"/>
</reference>

<reference anchor="DNSSD-SRP">
  <front>
    <title>Service Registration Protocol for DNS-Based Service Discovery</title>
    <author fullname="T. Lemon" initials="T." surname="Lemon"/>
    <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
    <date month="June" year="2025"/>
    <abstract>
      <t>The Service Registration Protocol (SRP) for DNS-based Service Discovery (DNS-SD) uses the standard DNS Update mechanism to enable DNS-SD using only unicast packets. This makes it possible to deploy DNS-SD without multicast, which greatly improves scalability and improves performance on networks where multicast service is not an optimal choice, particularly IEEE 802.11 (Wi-Fi) and IEEE 802.15.4 networks. DNS-SD Service registration uses public keys and SIG(0) to allow services to defend their registrations.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9665"/>
  <seriesInfo name="DOI" value="10.17487/RFC9665"/>
</reference>

<reference anchor="RFC9148">
  <front>
    <title>EST-coaps: Enrollment over Secure Transport with the Secure Constrained Application Protocol</title>
    <author fullname="P. van der Stok" initials="P." surname="van der Stok"/>
    <author fullname="P. Kampanakis" initials="P." surname="Kampanakis"/>
    <author fullname="M. Richardson" initials="M." surname="Richardson"/>
    <author fullname="S. Raza" initials="S." surname="Raza"/>
    <date month="April" year="2022"/>
    <abstract>
      <t>Enrollment over Secure Transport (EST) is used as a certificate provisioning protocol over HTTPS. Low-resource devices often use the lightweight Constrained Application Protocol (CoAP) for message exchanges. This document defines how to transport EST payloads over secure CoAP (EST-coaps), which allows constrained devices to use existing EST functionality for provisioning certificates.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9148"/>
  <seriesInfo name="DOI" value="10.17487/RFC9148"/>
</reference>

<reference anchor="RFC9176">
  <front>
    <title>Constrained RESTful Environments (CoRE) Resource Directory</title>
    <author fullname="C. Amsüss" initials="C." role="editor" surname="Amsüss"/>
    <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
    <author fullname="M. Koster" initials="M." surname="Koster"/>
    <author fullname="C. Bormann" initials="C." surname="Bormann"/>
    <author fullname="P. van der Stok" initials="P." surname="van der Stok"/>
    <date month="April" year="2022"/>
    <abstract>
      <t>In many Internet of Things (IoT) applications, direct discovery of resources is not practical due to sleeping nodes or networks where multicast traffic is inefficient. These problems can be solved by employing an entity called a Resource Directory (RD), which contains information about resources held on other servers, allowing lookups to be performed for those resources. The input to an RD is composed of links, and the output is composed of links constructed from the information stored in the RD. This document specifies the web interfaces that an RD supports for web servers to discover the RD and to register, maintain, look up, and remove information on resources. Furthermore, new target attributes useful in conjunction with an RD are defined.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9176"/>
  <seriesInfo name="DOI" value="10.17487/RFC9176"/>
</reference>

<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>




    </references>

    <references title='Informative References' anchor="sec-informative-references">




<reference anchor="I-D.ietf-bess-evpn-fast-df-recovery">
   <front>
      <title>Fast Recovery for EVPN Designated Forwarder Election</title>
      <author fullname="Patrice Brissette" initials="P." surname="Brissette">
         <organization>Cisco</organization>
      </author>
      <author fullname="Ali Sajassi" initials="A." surname="Sajassi">
         <organization>Cisco</organization>
      </author>
      <author fullname="Luc André Burdet" initials="L. A." surname="Burdet">
         <organization>Cisco</organization>
      </author>
      <author fullname="John Drake" initials="J." surname="Drake">
         <organization>Independent</organization>
      </author>
      <author fullname="Jorge Rabadan" initials="J." surname="Rabadan">
         <organization>Nokia</organization>
      </author>
      <date day="20" month="November" year="2024"/>
      <abstract>
	 <t>   The Ethernet Virtual Private Network (EVPN) solution in RFC 7432
   provides Designated Forwarder (DF) election procedures for multihomed
   Ethernet Segments.  These procedures have been enhanced further by
   applying the Highest Random Weight (HRW) algorithm for Designated
   Forwarder election to avoid unnecessary DF status changes upon a
   failure.  This document improves these procedures by providing a fast
   Designated Forwarder election upon recovery of the failed link or
   node associated with the multihomed Ethernet Segment.  This document
   updates RFC 8584 by optionally introducing delays between some of the
   events therein.

   The solution is independent of the number of EVPN Instances (EVIs)
   associated with that Ethernet Segment and it is performed via a
   simple signaling in BGP between the recovered node and each of the
   other nodes in the multihoming group.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-bess-evpn-fast-df-recovery-12"/>
   
</reference>

<reference anchor="RFC5988">
  <front>
    <title>Web Linking</title>
    <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
    <date month="October" year="2010"/>
    <abstract>
      <t>This document specifies relation types for Web links, and defines a registry for them. It also defines the use of such links in HTTP headers with the Link header field. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5988"/>
  <seriesInfo name="DOI" value="10.17487/RFC5988"/>
</reference>

<reference anchor="COAP">
  <front>
    <title>The Constrained Application Protocol (CoAP)</title>
    <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
    <author fullname="K. Hartke" initials="K." surname="Hartke"/>
    <author fullname="C. Bormann" initials="C." surname="Bormann"/>
    <date month="June" year="2014"/>
    <abstract>
      <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
      <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7252"/>
  <seriesInfo name="DOI" value="10.17487/RFC7252"/>
</reference>

<reference anchor="RFC8894">
  <front>
    <title>Simple Certificate Enrolment Protocol</title>
    <author fullname="P. Gutmann" initials="P." surname="Gutmann"/>
    <date month="September" year="2020"/>
    <abstract>
      <t>This document specifies the Simple Certificate Enrolment Protocol (SCEP), a PKI protocol that leverages existing technology by using Cryptographic Message Syntax (CMS, formerly known as PKCS #7) and PKCS #10 over HTTP. SCEP is the evolution of the enrolment protocol sponsored by Cisco Systems, which enjoys wide support in both client and server implementations, as well as being relied upon by numerous other industry standards that work with certificates.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8894"/>
  <seriesInfo name="DOI" value="10.17487/RFC8894"/>
</reference>


<reference anchor="I-D.eckert-anima-grasp-dnssd">
   <front>
      <title>DNS-SD Compatible Service Discovery in GeneRic Autonomic Signaling Protocol (GRASP)</title>
      <author fullname="Toerless Eckert" initials="T. T." surname="Eckert">
         <organization>Futurewei Technologies USA
      Inc.</organization>
      </author>
      <author fullname="Mohamed Boucadair" initials="M." surname="Boucadair">
         <organization>Orange</organization>
      </author>
      <author fullname="Christian Jacquenet" initials="C." surname="Jacquenet">
         <organization>Orange</organization>
      </author>
      <author fullname="Michael H. Behringer" initials="M. H." surname="Behringer">
         </author>
      <date day="7" month="July" year="2025"/>
      <abstract>
	 <t>   DNS Service Discovery (DNS-SD) defines a framework for applications
   to announce and discover services.  This includes service names,
   service instance names, common parameters for selecting a service
   instance (weight or priority) as well as other service-specific
   parameters.  For the specific case of autonomic networks, GeneRic
   Autonomic Signaling Protocol (GRASP) intends to be used for service
   discovery in addition to the setup of basic connectivity.
   Reinventing advanced service discovery for GRASP with a similar set
   of features as DNS-SD would result in duplicated work.  To avoid
   that, this document defines how to use GRASP to announce and discover
   services relying upon DNS-SD features while maintaining the intended
   simplicity of GRASP.  To that aim, the document defines name
   discovery and schemes for reusable elements in GRASP objectives.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-eckert-anima-grasp-dnssd-08"/>
   
</reference>


<reference anchor="HRW98" target="https://www.microsoft.com/en-us/research/wp-content/uploads/2017/02/HRW98.pdf">
  <front>
    <title>Using Name-Based Mappings to Increase Hit Rates</title>
    <author initials="D. D." surname="Thaler" fullname="Dave D. Thaler">
      <organization></organization>
    </author>
    <author initials="C. V." surname="Ravishankar" fullname="Chinya V. Ravishankar">
      <organization></organization>
    </author>
    <date year="1998"/>
  </front>
</reference>


    </references>


<?line 2538?>


    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
        <name>Contributors</name>
    <contact initials="T." surname="Werner" fullname="Thomas Werner">
      <organization>Siemens AG</organization>
      <address>
        <postal>
          <country>Germany</country>
        </postal>
        <email>thomas-werner@siemens.com</email>
        <uri>https://www.siemens.com/</uri>
      </address>
    </contact>
    <contact initials="S." surname="Fries" fullname="Steffen Fries">
      <organization>Siemens AG</organization>
      <address>
        <postal>
          <country>Germany</country>
        </postal>
        <email>steffen.fries@siemens.com</email>
        <uri>https://www.siemens.com/</uri>
      </address>
    </contact>
    <contact initials="H." surname="Brockhaus" fullname="Hendrik Brockhaus">
      <organization>Siemens AG</organization>
      <address>
        <postal>
          <country>Germany</country>
        </postal>
        <email>hendrik.brockhaus@siemens.com</email>
        <uri>https://www.siemens.com/</uri>
      </address>
    </contact>
    <contact initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization></organization>
      <address>
        <postal>
          <country>Canada</country>
        </postal>
        <phone>+41 44 878 9200</phone>
        <email>mcr+ietf@sandelman.org</email>
      </address>
    </contact>
    <contact initials="D." surname="von&nbsp;Oheimb" fullname="David von&nbsp;Oheimb">
      <organization abbrev="Siemens">Siemens AG</organization>
      <address>
        <postal>
          <street>Otto-Hahn-Ring 6</street>
          <city>Munich</city>
          <code>81739</code>
          <country>Germany</country>
        </postal>
        <email>david.von.oheimb@siemens.com</email>
        <uri>https://www.siemens.com/</uri>
      </address>
    </contact>
    </section>

  </back>

<!-- ##markdown-source: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-->

</rfc>

