<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 3.3.8) -->
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<?rfc linkmailto="no"?>
<?rfc editing="no"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc rfcedstyle="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-anima-rfc8366bis-30" category="std" consensus="true" obsoletes="8366" updates="8995" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.32.0 -->
  <front>
    <title abbrev="Voucher Artifact">A Voucher Artifact for Bootstrapping Protocols</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-anima-rfc8366bis-30"/>
    <author initials="K." surname="Watsen" fullname="Kent Watsen">
      <organization>Watsen Networks</organization>
      <address>
        <email>kent+ietf@watsen.net</email>
      </address>
    </author>
    <author initials="M." surname="Richardson" fullname="Michael C. Richardson" role="editor">
      <organization>Sandelman Software</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
        <email>https://orcid.org/0000-0002-0773-8388</email>
        <uri>https://www.sandelman.ca/</uri>
      </address>
    </author>
    <author initials="E." surname="Dijk" fullname="Esko Dijk">
      <organization>IoTconsultancy.nl</organization>
      <address>
        <email>esko.dijk@iotconsultancy.nl</email>
      </address>
    </author>
    <author initials="T." surname="Eckert" fullname="Toerless Eckert">
      <organization>Futurewei Technologies Inc.</organization>
      <address>
        <postal>
          <street>2330 Central Expy</street>
          <city>Santa Clara</city>
          <code>95050</code>
          <country>United States of America</country>
        </postal>
        <email>tte@cs.fau.de</email>
      </address>
    </author>
    <author initials="Q." surname="Ma" fullname="Qiufang Ma">
      <organization>Huawei</organization>
      <address>
        <postal>
          <street>101 Software Avenue, Yuhua District</street>
          <city>Nanjing</city>
          <code>210012</code>
          <country>China</country>
        </postal>
        <email>maqiufang1@huawei.com</email>
      </address>
    </author>
    <date year="2026" month="April" day="22"/>
    <area>Operations</area>
    <workgroup>ANIMA Working Group</workgroup>
    <keyword>voucher</keyword>
    <abstract>
      <?line 135?>

<t>This document defines a strategy to securely assign a candidate device (Pledge) to an  Owner
using an artifact signed, directly or indirectly, by the Pledge's manufacturer.
This artifact is known as a "Voucher".</t>
      <t>This document defines an artifact format as a YANG-defined JSON or CBOR document
that has been signed using a variety of cryptographic systems.</t>
      <t>The Voucher Artifact is normally generated by
the Pledge's manufacturer (i.e., the Manufacturer Authorized Signing
Authority (MASA)).</t>
      <t>This document obsoletes RFC8366: it includes a number of desired extensions into the YANG module.
The Voucher Request YANG module defined in RFC8995 is also updated and now included in this document, as well as other YANG extensions needed for variants of RFC8995.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-anima-rfc8366bis/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        anima Working Group mailing list (<eref target="mailto:anima@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/anima/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/anima/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/anima-wg/voucher"/>.</t>
    </note>
  </front>
  <middle>
    <?line 152?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document defines a strategy to securely assign a candidate device
(Pledge) to an Owner using an artifact signed, directly or indirectly,
by the Pledge's manufacturer, i.e., the Manufacturer Authorized
Signing Authority (MASA).  This artifact is known as the "Voucher".</t>
      <t>The Voucher Artifact is a JSON <xref target="RFC8259"/> document that
conforms with a data model described by YANG <xref target="RFC7950"/>.
It may also be serialized to CBOR <xref target="CBOR"/>.
It is encoded using the rules defined in <xref target="RFC7951"/> or <xref target="RFC9254"/>, and
is signed using (by default) a CMS structure <xref target="RFC5652"/>.</t>
      <t>The primary purpose of a Voucher is to securely convey a trust anchor
that a Pledge can use to authenticate subsequent interactions.
The trust anchor may be in the form of a certificate (the '<tt>pinned-domain-cert</tt>' Attribute), a hash of a certificate, or it can be a raw public key (in constrained use cases).</t>
      <t>This trust anchor represents the authority of the Owner of a network.
Communicating this trust anchor securely to the Pledge is the job of the Voucher Artifact.
The act of communicating this trust anchor is known as pinning the trust anchor, as the Pledge can then use the resulting anchor to authenticate other actors who are part of the network.
The collection of all these actors is collectively known as the Domain.
(This is not related to the domain name system, but rather the term is of mathematical origin)</t>
      <t>A Voucher may be useful in several contexts, but the driving motivation herein is to support secure Onboarding mechanisms.
This is accomplished by assigning an Owner to the Pledge, enabling it to authenticate the network that it is connected to.</t>
      <t><xref target="RFC8366"/> originally defined the Voucher as the only Voucher Artifact, leaving the Voucher Request that is used in BRSKI to be defined in <xref target="RFC8995"/>.
This document includes both Voucher and Voucher Request obsoleting <xref target="RFC8366"/>, and updating <xref target="RFC8995"/>.</t>
      <t>YANG is not easily extended except by updating the YANG module definition.
Since <xref target="RFC8366"/> was written, the common pattern is to publish YANG modules as two documents: one with only the YANG module, and the other one with usage, motivation and further explanation.
This allows the YANG module to be updated without replacing all of the context.
This document does not follow that pattern, but future documents may update only the YANG module.</t>
      <t>This document introduces a mechanism to support future extensions without requiring the YANG module to be revised.
This includes both a new IETF standard mechanism for extensions modeled after the mechanism present in <xref target="RFC8520"/>, as well as a facility for manufacturer private extensions.</t>
      <t>The lifetimes of Vouchers may vary.
In some Onboarding protocols, the Vouchers may include a nonce restricting them to a single use,  whereas the Vouchers in other Onboarding protocols may have an
indicated lifetime.
In order to support long lifetimes, this document recommends using short lifetimes with programmatic renewal, see <xref target="renewal-over-revocation"/>.</t>
      <t>Some Onboarding protocols using the Voucher Artifact defined in
this document include: <xref target="ZERO-TOUCH"/>, <xref target="SECUREJOIN"/>, <xref target="RFC8995"/> and <xref target="cBRSKI"/>.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>This document uses and defines the following terms.
They are used in this document and related documents.</t>
      <dl>
        <dt>(Voucher) Artifact:</dt>
        <dd>
          <t>Used throughout this document to represent a Voucher or Voucher Request as instantiated in the form
of a signed datastructure. The payload of the signed datastructure is called the Voucher Data.</t>
        </dd>
        <dt>Attribute:</dt>
        <dd>
          <t>A single named data element that can be stored in Voucher Data. The element's name and data type are defined by
one of the YANG models as defined in this document.</t>
        </dd>
        <dt>Bootstrapping:</dt>
        <dd>
          <t>The process where a Pledge obtains cryptographic key material to identify
 and trust future interactions within a specific Domain network.
 Bootstrapping is based on imprinted key material provided during the
 manufacturing process (see: Imprint).
 This term was used in <xref target="RFC8366"/>, but has been supplanted by the term Onboarding.</t>
        </dd>
        <dt>Domain:</dt>
        <dd>
          <t>The set of entities or infrastructure under common administrative
control.
The goal of the Onboarding protocol is to enable a Pledge to
join a Domain and obtain domain-specific security credentials.
This term is not related to "DNS domain" <xref target="RFC9499"/> although a Domain might be associated to a specific DNS domain.</t>
        </dd>
        <dt>Imprint:</dt>
        <dd>
          <t>The process where a device obtains the cryptographic key material to
identify and trust future interactions generally as part of the manufacturing.
This term is taken from Konrad Lorenz's work in biology with new ducklings:
"during a critical period, the duckling would assume that anything
that looks like a mother duck is in fact their mother"
<xref target="Stajano99theresurrecting"/>. An equivalent for a device is to
obtain the fingerprint of the manufacturer's root certification authority (root CA)
certificate. A device that Imprints on an attacker suffers a similar
fate to a duckling that imprints on a hungry wolf. Imprinting is a
term from psychology and ethology, as described in <xref target="imprinting"/>.</t>
        </dd>
        <dt>Join Registrar (and Coordinator):</dt>
        <dd>
          <t>A representative of the Domain that is configured, perhaps
autonomically, to decide whether a new device is allowed to join the
Domain. The administrator of the Domain interfaces with a Join
Registrar (and Coordinator) to control this process.
Typically, a Join Registrar is "inside" its Domain. For simplicity,
this document often refers to this as just "Registrar".</t>
        </dd>
        <dt>MASA (Manufacturer Authorized Signing Authority):</dt>
        <dd>
          <t>The entity that, for the purpose of this document, issues and signs the
Vouchers for a manufacturer's Pledges and keeps logs of Pledge ownership.
In some Onboarding protocols, the MASA may have an Internet
presence and be integral to the Onboarding process, whereas in
other protocols the MASA may be an offline service that has no
active role in the Onboarding process.</t>
        </dd>
        <dt>Malicious Registrar:</dt>
        <dd>
          <t>An on-path active attacker that presents itself as a legitimate Registrar.</t>
        </dd>
        <dt>Onboarding:</dt>
        <dd>
          <t>Onboarding describes the process to provide necessary operational data to a Pledge
and to complete the process of bringing the Pledge into an operational state.
This data may include configuration data, but specifically deals with application-specific cryptographic
key material (application-specific security credentials).
Since <xref target="RFC8366"/>, this term has replaced the term Bootstrapping.</t>
        </dd>
        <dt>Owner:</dt>
        <dd>
          <t>The entity that controls the private key of the trust anchor conveyed by the Voucher.
Typically, the Owner is indicated by the '<tt>pinned-domain-cert</tt>' Attribute.</t>
        </dd>
        <dt>Pledge:</dt>
        <dd>
          <t>The prospective component/device attempting to find and securely join a Domain.
When shipped or in factory reset mode, it only trusts authorized representatives of the
manufacturer.</t>
        </dd>
        <dt>Registrar:</dt>
        <dd>
          <t>See Join Registrar. This term is not related to the term DNS Registrar <xref target="RFC9499"/>.</t>
        </dd>
        <dt>TOFU (Trust on First Use):</dt>
        <dd>
          <t>When a Pledge makes no security decisions but rather simply
trusts the first Domain entity it is contacted by.
Used similarly to <xref target="RFC7435"/>.
This is also known as the "resurrecting duckling" model <xref target="Stajano99theresurrecting"/>.</t>
        </dd>
        <dt>Voucher:</dt>
        <dd>
          <t>A Voucher Artifact, not a Voucher Request, that is a signed statement
from the MASA service that indicates to a Pledge
the cryptographic identity of the Domain it should trust.
When clarity is needed, it may be preceded by the type of the signature, such as CMS, JWS or COSE.</t>
        </dd>
        <dt>Voucher Data:</dt>
        <dd>
          <t>The raw (serialized) representation of the YANG data elements of a Voucher (Request) without any enclosing signature.
Current serialization formats include JSON and CBOR.</t>
        </dd>
        <dt>Voucher Request:</dt>
        <dd>
          <t>A signed artifact sent from the Pledge to the Registrar, or from the Registrar to the MASA, for Voucher acquisition.
When clarity is needed, it may be preceded by the type of the signature, such as CMS, JWS or COSE.</t>
        </dd>
        <dt>Pledge Voucher Request (PVR):</dt>
        <dd>
          <t>A signed artifact sent from the Pledge to the Registrar. It is a specific form of Voucher Request.</t>
        </dd>
        <dt>Registrar Voucher Request (RVR):</dt>
        <dd>
          <t>A signed artifact sent from the Registrar to the MASA. It is a specific form of Voucher Request.</t>
        </dd>
      </dl>
    </section>
    <section anchor="requirements-language">
      <name>Requirements Language</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="survey-of-voucher-types">
      <name>Survey of Voucher Types</name>
      <t>A Voucher is a cryptographically protected statement to the Pledge
authorizing a zero-touch Onboarding with the Join Registrar of the
Domain. The specific information a Voucher provides is influenced by the
Onboarding use case.</t>
      <t>The Voucher can convey the following information to
the Join Registrar and to the Pledge:</t>
      <dl>
        <dt>Assertion Basis:</dt>
        <dd>
          <t>Indicates the method that protects
the Onboarding (this is distinct from the Voucher signature that
protects the Voucher itself). Methods include
manufacturer-asserted ownership verification, assured
logging operations, or reliance on Pledge behavior
such as secure or measured boot.
The Join Registrar uses this information to make a determination as to whether to accept the Pledge into the network.
Only some methods are normatively defined in this
document. Other methods are left for future work.</t>
        </dd>
        <dt>Authentication of Join Registrar:</dt>
        <dd>
          <t>Indicates how the Pledge
can authenticate the Join Registrar.  This document defines
a mechanism to pin the Domain certificate, or a raw public key.
Pinning a symmetric key, or CN-ID (<xref target="RFC6125"/>) or DNS-ID
information (as defined in <xref target="RFC9525"/>) is left for future work.</t>
        </dd>
        <dt>Anti-Replay Protections:</dt>
        <dd>
          <t>Time- or nonce-based
information to constrain the Voucher to specific time periods or Onboarding
attempts.</t>
        </dd>
      </dl>
      <t>A number of Onboarding scenarios can be met using differing
combinations of this information. All scenarios address the primary
threat of an on-path active attacker (or MiTM) impersonating the Registrar.
If successful, this would gain control over the Pledge.
The following combinations are "types" of Vouchers:</t>
      <table anchor="voucher-types-table">
        <name>Overview of Voucher types</name>
        <thead>
          <tr>
            <th align="left">Voucher Type</th>
            <th align="right">Assertion</th>
            <th align="right"> </th>
            <th align="right">Registrar ID</th>
            <th align="right"> </th>
            <th align="right">Validity</th>
            <th align="right"> </th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left"> </td>
            <td align="right">Logged</td>
            <td align="right">Verified</td>
            <td align="right">Trust Anchor</td>
            <td align="right">CN-ID or DNS-ID</td>
            <td align="right">RTC</td>
            <td align="right">Nonce</td>
          </tr>
          <tr>
            <td align="left">Audit Voucher</td>
            <td align="right">X</td>
            <td align="right"> </td>
            <td align="right">X</td>
            <td align="right"> </td>
            <td align="right"> </td>
            <td align="right">X</td>
          </tr>
          <tr>
            <td align="left">Nonceless Audit</td>
            <td align="right">X</td>
            <td align="right"> </td>
            <td align="right">X</td>
            <td align="right"> </td>
            <td align="right">X</td>
            <td align="right"> </td>
          </tr>
          <tr>
            <td align="left">Owner Audit</td>
            <td align="right">X</td>
            <td align="right">X</td>
            <td align="right">X</td>
            <td align="right"> </td>
            <td align="right">X</td>
            <td align="right">X</td>
          </tr>
          <tr>
            <td align="left">Owner ID Voucher</td>
            <td align="right"> </td>
            <td align="right">X</td>
            <td align="right">X</td>
            <td align="right">X</td>
            <td align="right">X</td>
            <td align="right"> </td>
          </tr>
          <tr>
            <td align="left">Bearer Voucher</td>
            <td align="right">X</td>
            <td align="right"> </td>
            <td align="right">wildcard</td>
            <td align="right">wildcard</td>
            <td align="right">optional</td>
            <td align="right">opt</td>
          </tr>
        </tbody>
      </table>
      <t>NOTE: The "RTC" column denotes Voucher validation using a Real-Time Clock.</t>
      <t>NOTE: All Voucher types include a "Pledge ID <tt>serial-number</tt>" (column not shown for space reasons).</t>
      <dl>
        <dt>Audit Voucher:</dt>
        <dd>
          <t>An audit Voucher is named after the logging assertion mechanisms
that the Registrar then "audits" to enforce its local policy. The
Registrar mitigates the risk of a Malicious Registrar by auditing that no unknown Registrar, or
known Malicious Registrar, appears in the MASA's log entries for the Pledge.
This does not directly prevent a Malicious Registrar but provides a response mechanism that
ensures the on-path attack is unsuccessful.
An advantage is that actual ownership knowledge (i.e., sales integration providing an indication of who purchased the device) is not required on the MASA service.</t>
        </dd>
        <dt>Nonceless Audit Voucher:</dt>
        <dd>
          <t>An audit Voucher with a validity period statement, but no guarantee of freshness. Fundamentally,
it is the same as an audit Voucher except that it can be issued in
advance to support network partitions or to provide a permanent
Voucher for remote deployments.
Being issued in advance of the Pledge being online, the Pledge can not rely on a nonce to be included for freshness.
This compromise in reducing the freshness allows for the resulting Voucher to be carried across air-gapped infrastructure.
In addition, if the validity period has been set sufficiently long, the Voucher can be used after the manufacturer (and its delegates) has gone out of business.</t>
        </dd>
        <dt>Ownership Audit Voucher:</dt>
        <dd>
          <t>An audit Voucher where the MASA service has verified the Registrar
as the authorized Owner.
The MASA service mitigates a MiTM Registrar by refusing to generate
audit Vouchers for unauthorized Registrars. The Registrar uses audit
techniques to supplement the MASA. This provides an ideal sharing of
policy decisions and enforcement between the vendor and the Owner.</t>
        </dd>
        <dt>Ownership ID Voucher:</dt>
        <dd>
          <t>Named after inclusion of the Pledge's CN-ID or DNS-ID within the
Voucher. The MASA service mitigates a MiTM Registrar by identifying
the specific Registrar (via PKIX <xref target="RFC5280"/>) authorized to own the Pledge.</t>
        </dd>
        <dt>Bearer Voucher:</dt>
        <dd>
          <t>A bearer Voucher is named after the inclusion of a Registrar ID
wildcard. Because the Registrar identity is not indicated, this
Voucher type must be treated as a secret and protected from exposure
as any 'bearer' of the Voucher can claim the Pledge.
This variation is included in the above table in order to clearly
show how other Voucher types differ.
This specification does not support bearer Vouchers at this time.
There are other specifications in the industry which are equivalent though.
Publishing a nonceless bearer Voucher effectively turns the
specified Pledge into a TOFU device with minimal mitigation
against MiTM Registrars. Bearer Vouchers are therefore out of scope.</t>
        </dd>
      </dl>
    </section>
    <section anchor="changes-since-rfc8366">
      <name>Changes since RFC8366</name>
      <t>This document obsoletes <xref target="RFC8366"/>.</t>
      <section anchor="extendfail">
        <name>Attempts and motivation to extend RFC8366</name>
        <t><xref target="RFC8366"/> was published in 2018 during the development of <xref target="RFC8995"/>,
<xref target="ZERO-TOUCH"/> and other work-in-progress efforts.
Since then the industry has matured significantly, and the in-the-field activity which this document supports has become known as <em>Onboarding</em> rather than <em>Bootstrapping</em>.</t>
        <t>The focus of <xref target="RFC8995"/> was Onboarding of ISP and Enterprise owned wired routing and switching equipment, with IoT devices being a less important aspect.
<xref target="ZERO-TOUCH"/> has focused upon Onboarding of CPE equipment like cable modems and other larger IoT devices, again with smaller IoT devices being of lesser importance.</t>
        <t>Since <xref target="RFC8995"/> was published there is now a mature effort to do application-level Onboarding of constrained IoT devices defined by the Thread Group and the Fairhair Alliance (now OCF) <xref target="fairhair"/>.
The <xref target="cBRSKI"/> document has defined a version of <xref target="RFC8995"/> that is usable over constrained IEEE 802.15.4 6LoWPAN networks using CoAP and DTLS, while <xref target="I-D.ietf-lake-authz"/> provides for using CoAP and EDHOC on even more constrained devices with very constrained networks.</t>
        <t><xref target="PRM"/> has created a new methodology for Onboarding that does not depend upon a synchronous connection between the Pledge and the Registrar.
This mechanism uses a mobile Registrar agent that works to collect and transfer signed artifacts via physical travel from one network to another.</t>
        <t>Both <xref target="cBRSKI"/> and <xref target="PRM"/> require extensions to the Voucher Request and the resulting Voucher. The new Attributes are required to carry the additional data and describe the extended semantics.
In addition, <xref target="cBRSKI"/> uses the serialization mechanism described in <xref target="RFC9254"/> to produce significantly more compact artifacts.</t>
        <t>When the process to define <xref target="cBRSKI"/> and <xref target="PRM"/> was started, there was a belief that the appropriate process was to use the <xref target="RFC7950"/> <em>augment</em> mechanism to further extend both the Voucher Request <xref target="RFC8995"/> and Voucher <xref target="RFC8366"/> artifacts.
However, <xref target="PRM"/> needs to extend an enumerated type with additional values and <em>augment</em> can not do this, so that was initially the impetus for this document.</t>
        <t>An attempt was then made to determine what would happen if one wanted to have a constrained version of the <xref target="PRM"/> Voucher Artifact.
The result was invalid YANG, with multiple definitions of the core Attributes from the <xref target="RFC8366"/> Voucher Artifact.
After some discussion, it was determined that the <em>augment</em> mechanism did not work for this use case,
nor did it work better when the <xref target="RFC8040"/> "yang-data" extension was replaced with the <xref target="RFC8791"/> "structure" extension.</t>
        <t>After significant discussion the decision was made to simply roll all of the needed extensions into this document.</t>
      </section>
    </section>
    <section anchor="updates-to-rfc8995">
      <name>Updates to RFC8995</name>
      <t>This document represents a merge of YANG definitions of the Voucher from <xref target="RFC8366"/>, the Voucher Request from <xref target="RFC8995"/>, and extensions to each of these from <xref target="cBRSKI"/>, <xref target="CLOUD"/> and <xref target="PRM"/>.
The difficulty with this approach is that the semantics of the definitions needed for the other documents are not included in this document, but rather in the respective other documents.</t>
      <section anchor="updates-idevid-issuer">
        <name>Updates to the use of <tt>idevid-issuer</tt></name>
        <t>The <tt>voucher-request</tt> module definition that was in <xref target="RFC8995"/> Sections 3.2 (tree diagram) and 3.4 (YANG module) is now included in this document.
There is a change to it: the '<tt>idevid-issuer</tt>' Attribute <bcp14>MUST</bcp14> be included in a Registrar Voucher Request (RVR).
Like the '<tt>serial-number</tt>' value in the RVR, the '<tt>idevid-issuer</tt>' value in the RVR is to be taken from the Pledge's (IDevID) client certificate.
In some variations of BRSKI, such as <xref target="PRM"/>, there is no direct TLS connection between Pledge and Registrar.  Therefore, the Pledge's IDevID certificate cannot be extracted from the TLS connection, so those variations define a different channel binding process and may deviate from the above requirement.</t>
        <t>A Registrar <bcp14>MUST</bcp14> apply the following rules for the value of the '<tt>idevid-issuer</tt>' Attribute in the given order:</t>
        <ol spacing="normal" type="1"><li>
            <t>If the Authority Key Identifier (AKI) field is present in the Pledge's (IDevID) client certificate, the Registrar
copies the full data element as specified in <xref target="idevid-issuer-format"/>.</t>
          </li>
          <li>
            <t>Otherwise, the Registrar generates the full data element in the format specified in <xref target="idevid-issuer-format"/>, using the
SHA-1 hash of the public key of the Pledge's IDevID client certificate.
This is defined as method 1 in <xref section="4.2.1.2" sectionFormat="of" target="RFC5280"/>.</t>
          </li>
        </ol>
      </section>
      <section anchor="clarifications-on-the-use-of-idevid-issuer">
        <name>Clarifications on the use of <tt>idevid-issuer</tt></name>
        <t><xref target="RFC8366"/> and <xref target="RFC8995"/> define the '<tt>idevid-issuer</tt>' attribute for the '<tt>voucher</tt>' and '<tt>voucher-request</tt>' modules (respectively), but they summarily explain when to use it, and why it is used.</t>
        <t>The '<tt>idevid-issuer</tt>' Attribute is provided so that the serial number to which the issued Voucher pertains can be relative to the entity that issued the Pledge's IDevID.
In most cases there is a one to one relationship between the trust anchor that signs Vouchers (and is trusted by the Pledge), and the Certification Authority that signs the IDevID.
In that case, the '<tt>serial-number</tt>' in the Voucher Data must refer to the same device as the serial number that is in the IDevID certificate (in the '<tt>serialNumber</tt>' element of type '<tt>X520SerialNumber</tt>' per <xref section="2.3.1" sectionFormat="of" target="RFC8995"/>).</t>
        <t>However, there are situations where the one to one relationship may be broken.
This occurs whenever a manufacturer has a common MASA, but different products (on different assembly lines) are produced with identical serial numbers.
A system of serial numbers which is just a simple counter is a good example of this.
A system of serial numbers where there is some prefix relating the product type does not fit into this, even if the lower digits are a counter.</t>
        <t>Another situation occurs when multiple manufacturers share a common MASA.
In this case, any given serial number in the IDevID certificate may not be unique across all manufacturers.</t>
        <t>It is not possible for the Pledge or the Registrar to know which situation applies.
And because one the above situations may apply, or may occur in the future, there needs to be a contingency to allow uniquely identifying a Pledge regardless of the current or future situation.
This is realized by the '<tt>idevid-issuer</tt>' Attribute.</t>
        <t>It is clarified next, whether or not to include the '<tt>idevid-issuer</tt>' in the PVR, in the RVR and in the Voucher.</t>
        <t>Analysis of the situation shows that the Pledge never needs to include '<tt>idevid-issuer</tt>' Attribute in its PVR, because the Pledge's IDevID certificate is available to the Registrar, and the Authority Key Identifier needed to fill this Attribute is contained within that IDevID certificate.
The Pledge therefore has no need to repeat this.</t>
        <t>For the RVR, <xref target="updates-idevid-issuer"/> now normatively requires that the '<tt>idevid-issuer</tt>' Attribute must be included.</t>
        <t>For the Voucher, <xref target="voucher-yang-module"/> normatively requires ("must") that the '<tt>idevid-issuer</tt>' Attribute must be included by a MASA in case the MASA issues a Voucher with a serial number that is known to be not unique within the scope of all the serial numbers represented by the MASA.
If this rule does not apply, the MASA <bcp14>SHOULD NOT</bcp14> include the '<tt>idevid-issuer</tt>' Attribute in order to achieve a smaller Voucher size.</t>
      </section>
      <section anchor="idevid-issuer-format">
        <name>Clarifications on the format of <tt>idevid-issuer</tt></name>
        <t><xref target="RFC8366"/> and <xref target="RFC8995"/> were not fully clear on the required binary format of the '<tt>idevid-issuer</tt>' Attribute.
This gave rise to incompatible implementations.</t>
        <t>This section clarifies the format of the '<tt>idevid-issuer</tt>' Attribute, which contains the full Authority Key Identifier from an IDevID certificate.
The entire Authority Key Identifier object from the certificate i.e. the '<tt>extnValue</tt>' OCTET STRING is to be included, comprising the ASN.1 DER encoding of the '<tt>AuthorityKeyIdentifier</tt>' structure as defined in <xref section="4.2.1.1" sectionFormat="of" target="RFC5280"/>.
This includes the ASN.1 DER encoding of the SEQUENCE as well as the OCTET STRING element (tagged 0) that is named '<tt>keyIdentifier</tt>' with type '<tt>KeyIdentifier</tt>'.</t>
        <t>Note that per <xref target="IDEVID"/>, only the first optional element named '<tt>keyIdentifier</tt>' is expected to be found in an IDevID certificate, not the '<tt>authorityCertIssuer</tt>' or the '<tt>authorityCertSerialNumber</tt>'.
However, because of the above requirement to include the full '<tt>extnValue</tt>' OCTET STRING, even if the non-expected elements would be present, they would be included in the '<tt>idevid-issuer</tt>' value in a Voucher Request or Voucher.</t>
      </section>
      <section anchor="errata-closed">
        <name>Errata closed</name>
        <t>The above updates to <xref target="RFC8995"/> addresses errata <xref target="eid7263"/>.</t>
      </section>
    </section>
    <section anchor="signature-mechanisms">
      <name>Signature mechanisms</name>
      <t>Three signature systems have been defined for Vouchers Artifacts.</t>
      <t><xref target="cBRSKI"/> defines a mechanism that uses COSE <xref target="COSE"/>, with the Voucher Data encoded using <xref target="RFC9254"/>.
However, as the SID <xref target="RFC9254"/> allocation process requires up-to-date YANG, the SID values for this mechanism are presented in this document.</t>
      <t><xref target="jBRSKI"/> defines a mechanism that uses JSON <xref target="RFC8259"/> and <xref target="JWS"/>.</t>
      <t>The CMS signing mechanism first defined in <xref target="RFC8366"/> continues to be defined here.</t>
      <section anchor="cms-voucher">
        <name>CMS Format Voucher Artifact</name>
        <t>The IETF evolution of PKCS#7 is CMS <xref target="RFC5652"/>.
A CMS-signed Voucher, the default type, contains a ContentInfo
structure with the Voucher Data.
An OID for JSON-encoded Voucher Data is allocated in <xref target="iana-contenttype"/>, and
it is to be placed in the '<tt>eContentType</tt>' field in the ContentInfo.</t>
        <t>The signing structure is a CMS SignedData structure, as specified by
Section 5.1 of <xref target="RFC5652"/>, encoded using ASN.1 Distinguished Encoding
Rules (DER), as specified in ITU-T X.690 <xref target="ITU-T.X690.2015"/>.</t>
        <t><xref target="RFC5652"/> mandates that <tt>SignedAttributes</tt> <bcp14>MUST</bcp14> be present when the content type is not '<tt>id-data</tt>'.
This mitigates attacks on CMS as described in <xref target="I-D.vangeest-lamps-cms-euf-cma-signeddata"/>.
Decoders <bcp14>MUST</bcp14> verify that <tt>SignedAttributes</tt> are present.</t>
        <t>To facilitate interoperability, <xref target="vcj"/> the media type "application/voucher-cms+json" and the filename extension ".vcj" were registered by <xref target="RFC8366"/>.</t>
        <t>The CMS structure <bcp14>MUST</bcp14> contain a '<tt>signerInfo</tt>' structure, as
described in Section 5.1 of <xref target="RFC5652"/>, containing the
signature generated over the content using a private key
trusted by the recipient.
Normally, the recipient is the Pledge and the signer is the MASA.
In the Voucher Request, the signer is the Pledge (in the PVR), or the Registrar (in the RVR).</t>
        <t>Note that Section 5.1 of <xref target="RFC5652"/> includes a
discussion about how to validate a CMS object, which is really a
PKCS7 object (cmsVersion=1).  Intermediate systems (such as the
Bootstrapping Remote Secure Key Infrastructures <xref target="RFC8995"/> Registrar)
that might need to evaluate the Voucher in flight <bcp14>MUST</bcp14> be prepared for
such an older format.
No signaling of the format version is necessary, as the manufacturer knows the capabilities
of the Pledge and will use an appropriate format Voucher for each
Pledge.</t>
        <t>The CMS structure <bcp14>SHOULD</bcp14> also contain all of the certificates
leading up to and including the signer's trust anchor certificate
known to the recipient.  The inclusion of the trust anchor is
unusual in many applications, but third parties cannot accurately
audit the transaction without it.</t>
        <t>The CMS structure <bcp14>MAY</bcp14> also contain revocation objects for any
intermediate certificate authorities (CAs) between the
Voucher issuer and the trust anchor known to the recipient.
However, the use of CRLs and other validity mechanisms is
discouraged, as the Pledge is unlikely to be able to perform
online checks and is unlikely to have a trusted clock source.
As described below, the use of short-lived Vouchers and/or a
Pledge-provided nonce provides a freshness guarantee.</t>
      </section>
    </section>
    <section anchor="voucher">
      <name>Voucher Artifact</name>
      <t>The Voucher's primary purpose is to securely assign a Pledge to an
Owner.
The Voucher informs the Pledge which entity it should consider to be
its Owner.</t>
      <t>This document defines a Voucher Artifact that is a CMS-signed encoding of the
JSON-encoded Voucher Data as defined by the YANG module <xref target="voucher-yang-module"/>.
Also, this document defines Voucher Data that is CBOR-encoded based on the same YANG model.
The CBOR-encoded (signed) Voucher based on this CBOR Voucher Data is defined in <xref target="cBRSKI"/>.</t>
      <t>The Voucher Data format is described here as a practical basis for some uses (such
as in NETCONF), but more to clearly indicate what Vouchers look like
in practice.
This description also serves to validate the YANG data model.</t>
      <t><xref target="RFC8366"/> defined a media type and a filename extension for the
CMS-encoded JSON type.
The media type for JOSE format Vouchers is defined in <xref target="jBRSKI"/> and the media type for COSE format Vouchers is defined in <xref target="cBRSKI"/>.
Both include respective filename extensions.</t>
      <t>The media type is used by the Pledge (requesting to the Registrar) and by the Registrar (requesting to the MASA) to signal what Voucher format is expected.
Other aspects of the Voucher, such as it being nonceless or which kind of pinned anchor is used, are not part of the media type.</t>
      <t>Only the format of Voucher that is expected is signaled in the form of a (MIME) media
type in the HTTP "Accept" header <xref target="RFC9110"/>.</t>
      <t>For Vouchers stored/transferred via methods like a USB storage device (USB key), the Voucher format is usually signaled by a filename extension.</t>
      <section anchor="voucher-tree-diagram">
        <name>Tree Diagram</name>
        <t>The following tree diagram illustrates a high-level view of a Voucher
document.
The notation used in this diagram is described in <xref target="RFC8340"/>.
Each node in the diagram is fully described by the YANG module in
<xref target="voucher-yang-module"/>.
Please review the YANG module for a detailed description of the
Voucher format.</t>
        <artwork><![CDATA[
module: ietf-voucher

  structure voucher:
    +-- created-on?                      yang:date-and-time
    +-- extensions*                      union
    +-- manufacturer-private?            binary
    +-- assertion?                       enumeration
    +-- serial-number                    string
    +-- idevid-issuer?                   binary
    +-- pinned-domain-cert?              binary
    +-- pinned-domain-pubk?              binary
    +-- pinned-domain-pubk-sha256?       binary
    +-- domain-cert-revocation-checks?   boolean
    +-- last-renewal-date?               yang:date-and-time
    +-- expires-on?                      yang:date-and-time
    +-- nonce?                           binary
    +-- est-domain?                      ietf:uri
    +-- additional-configuration-url?    ietf:uri
]]></artwork>
      </section>
      <section anchor="voucher-examples">
        <name>Examples</name>
        <t>This section provides Voucher Data examples for illustration
purposes.  These examples conform to the JSON encoding rules
defined in <xref target="RFC8259"/>.</t>
        <t>The following example illustrates an ephemeral Voucher (uses a nonce).
The MASA generated this Voucher using the '<tt>logged</tt>' assertion type, knowing
that it would be suitable for the Pledge making the request.</t>
        <artwork><![CDATA[
{
  "ietf-voucher:voucher": {
    "created-on": "2016-10-07T19:31:42Z",
    "assertion": "logged",
    "serial-number": "JADA123456789",
    "idevid-issuer": "base64encodedvalue==",
    "pinned-domain-cert": "base64encodedvalue==",
    "nonce": "base64encodedvalue=="
  }
}
]]></artwork>
        <t>The following example illustrates a non-ephemeral Voucher (containing no nonce, or "nonceless").
While the Voucher itself expires after two weeks, it presumably can
be renewed for up to a year.   The MASA generated this Voucher
using the '<tt>verified</tt>' assertion type, which should satisfy all Pledges.</t>
        <artwork><![CDATA[
{
  "ietf-voucher:voucher": {
    "created-on": "2016-10-07T19:31:42Z",
    "expires-on": "2016-10-21T19:31:42Z",
    "assertion": "verified",
    "serial-number": "JADA123456789",
    "idevid-issuer": "base64encodedvalue==",
    "pinned-domain-cert": "base64encodedvalue==",
    "domain-cert-revocation-checks": true,
    "last-renewal-date": "2017-10-07T19:31:42Z"
  }
}
]]></artwork>
        <t>The final two examples illustrate a Voucher that includes an (example) extension per <xref target="voucher-ext"/>.
The hypothetical YANG module name of the extension is '<tt>example-my-extension</tt>'.
First, a JSON serialization is shown.</t>
        <artwork><![CDATA[
{
  "ietf-voucher:voucher": {
    "created-on": "2016-10-07T19:31:42Z",
    "assertion": "logged",
    "serial-number": "JADA123456789",
    "idevid-issuer": "base64encodedvalue==",
    "pinned-domain-cert": "base64encodedvalue==",
    "nonce": "base64encodedvalue==",
    "extensions": ["example-my-extension"],
    "extension:example-my-extension": {
      "my-ext-leaf1": "my-ext-leaf1-data"
    }
  }
}
]]></artwork>
        <t>Next, a CBOR serialization is shown in CBOR diagnostic notation.
This uses again the extension module '<tt>example-my-extension</tt>' and refers to it using its SID value 305823299950.
Note that for this example, long binary strings are abbreviated using the ellipsis (<tt>...</tt>) notation.</t>
        <artwork><![CDATA[
{
  2451: {                          / ietf-voucher:voucher  /
    2:  "2016-10-07T19:31:42Z",    / created-on            /
    1:  1,                         / assertion (logged)    /
    11: "JADA123456789",           / serial-number         /
    5:  h'04183016 ... 1736C3E0',  / idevid-issuer         /
    8:  h'30820122 ... 12328CFF',  / pinned-domain-cert    /
    7:  h'831D5198A6CA2C7F',       / nonce                 /
    17: [305823299950],            / extensions            /
    47(305823299950): {            / example-my-extension  /
      1: "my-ext-leaf1-data"       / my-ext-leaf1          /
    }
  }
}
]]></artwork>
        <t><xref section="8" sectionFormat="comma" target="jBRSKI"/> contains examples of Vouchers encoded in JSON, and signed with <xref target="JWS"/>.
<xref section="9" sectionFormat="comma" target="cBRSKI"/> contains examples of Vouchers encoded in CBOR, and signed with <xref target="COSE"/>.</t>
      </section>
      <section anchor="voucher-yang-module">
        <name>YANG Module</name>
        <t>During development of this merged YANG module, advice was given to better organize mutually exclusive Attributes such as '<tt>pinned-domain-cert</tt>' vs '<tt>pinned-domain-pubk</tt>', or '<tt>expires-on</tt>' vs '<tt>nonce</tt>'.
Unfortunately, <xref target="CORESID"/> does not explain how and why choice statements are assigned SID values,
and the tooling as of the end of 2025 is inconsistent with both the document, and the intuitive notions as to how this should work.
As the simplest way forward, the choice mechanisms that were introduced have been commented out in the YANG, allowing the SID values to be generated correctly.
As a result, the SID values presented in <xref target="voucher-sid-values"/> and <xref target="voucher-request-sid-values"/> are to be considered normative, rather than relying exclusively on the
".sid" file <xref target="CORESID"/> generated from the YANG modules.
The presented SID values are believed to be correct, but future reprocessing of the YANG module to a ".sid" file could result in changes as the tooling is fixed.
Any such changes will be recorded as errata on this document.</t>
        <sourcecode type="yang" markers="true" name="ietf-voucher@2025-12-18.yang"><![CDATA[
module ietf-voucher {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-voucher";
  prefix vch;

  import ietf-yang-types {
    prefix yang;
    reference
      "RFC 9911: Common YANG Data Types";
  }
  import ietf-inet-types {
    prefix ietf;
    reference
      "RFC 9911: Common YANG Data Types";
  }
  import ietf-yang-structure-ext {
    prefix sx;
    reference
      "RFC 8791: YANG Data Structure Extensions";
  }

  organization
    "IETF ANIMA Working Group";
  contact
    "WG Web:   <https://datatracker.ietf.org/wg/anima/>
     WG List:  <mailto:anima@ietf.org>
     Author:   Kent Watsen
               <mailto:kent+ietf@watsen.net>
     Author:   Michael Richardson
               <mailto:mcr+ietf@sandelman.ca>
     Author:   Toerless Eckert
               <mailto:tte@cs.fau.de>
     Author:   Qiufang Ma
               <mailto:maqiufang1@huawei.com>
     Author:   Esko Dijk
               <mailto:esko.dijk@iotconsultancy.nl>";
  description
    "This module defines the format for a Voucher, which is
     produced by a pledge's manufacturer or delegate (MASA)
     to securely assign a pledge to an 'owner', so that the
     pledge may establish a secure connection to the owner's
     network infrastructure.

     Copyright (c) 2023-2026 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject to
     the license terms contained in, the Revised BSD License set
     forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC XXXX
     (https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself
     for full legal notices.

     The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
     NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
     'MAY', and 'OPTIONAL' in this document are to be interpreted as
     described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
     they appear in all capitals, as shown here.";

  // RFCEDITOR: please replace XXXX in this entire code fragment
  // with the RFC number assigned and remove this notice.

  revision 2025-12-18 {
    description
      "Updates and additions described by RFC XXXX";
    reference
      "RFC XXXX: A Voucher Profile for Bootstrapping Protocols";
  }
  revision 2018-05-09 {
    description
      "Initial version";
    reference
      "RFC 8366: Voucher Profile for Bootstrapping Protocols";
  }

  grouping voucher-artifact {
    description
      "Grouping to allow reuse/extensions in future work.";
    leaf created-on {
      type yang:date-and-time;
      description
        "A value indicating the date this voucher was created.
         This node is primarily for human consumption and auditing.
         Future work MAY create verification requirements based on
         this node.";
    }
    leaf-list extensions {
      type union {
        type uint64; // when serialized to CBOR with SID
        type string; // when serialized to CBOR or JSON
      }
      description
        "A list of extension names that are used in this Voucher
         file.  Each name is registered with the IANA.  Standard
         extensions are described in an RFC, while vendor proprietary
         ones are not.";
    }
    leaf manufacturer-private {
      type binary;
      description
        "In CBOR serialization, this is a CBOR bstr containing any
         valid CBOR that the manufacturer wishes to share with its
         pledge.  In JSON serializations, this contains additional
         JSON instead, and it is base64URL encoded.";
    }
    leaf assertion {
      type enumeration {
        enum verified {
          value 0;
          description
            "Indicates that the ownership has been positively
             verified by the MASA (e.g., through sales channel
             integration).";
        }
        enum logged {
          value 1;
          description
            "Indicates that the voucher has been issued after
             minimal verification of ownership or control.  The
             issuance has been logged for detection of
             potential security issues (e.g., recipients of
             vouchers might verify for themselves that unexpected
             vouchers are not in the log).  This is similar to
             unsecured trust-on-first-use principles but with the
             logging providing a basis for detecting unexpected
             events.";
        }
        enum proximity {
          value 2;
          description
            "Indicates that the voucher has been issued after
             the MASA verified a proximity proof provided by the
             device and target domain.  The issuance has been
             logged for detection of potential security issues.";
        }
        enum agent-proximity {
          value 3;
          description
            "Mostly identical to proximity, but
             indicates that the voucher has been issued
             after the MASA has verified a statement that
             a registrar agent has made contact with the device.";
        }
      }
      description
        "The assertion is a statement from the MASA regarding how
         the owner was verified.  This statement enables pledges
         to support more detailed policy checks.  Pledges MUST
         ensure that the assertion provided is acceptable, per
         local policy, before processing the voucher.";
    }
    leaf serial-number {
      type string;
      mandatory true;
      description
        "The serial-number of the hardware.  When processing a
         voucher, a pledge MUST ensure that its serial-number
         matches this value.  If no match occurs, then the
         pledge MUST NOT process this voucher.";
    }
    leaf idevid-issuer {
      type binary;
      description
        "The Authority Key Identifier OCTET STRING (as defined in
         Section 4.2.1.1 of RFC 5280) from the pledge's IDevID
         certificate.  In the voucher, it is optional
         as some manufacturers know that all serial-numbers
         are unique within the scope of a MASA.
         In the voucher request, whether it is mandatory or optional depends
         upon which protocol is used, such as RFC8995 and variations.
         When processing a voucher, a pledge MUST ensure that its
         IDevID Authority Key Identifier matches this value.  If no
         match occurs, then the pledge MUST NOT process this
         voucher.
         When issuing a voucher, the MASA MUST ensure that this
         field is populated for serial-numbers that are not
         otherwise unique within the scope of the MASA.";
    }
    // choice pinning {
    //  description "One of these attributes is used by the
    //               MASA to pin the registrar identity";
    leaf pinned-domain-cert {
      type binary;
      description
        "An X.509 v3 certificate structure, as specified by
         RFC 5280, using Distinguished Encoding Rules (DER)
         encoding, as defined in [ITU-T.X690.2015].

         This certificate is used by a pledge to trust a Public Key
         Infrastructure in order to verify a domain certificate
         supplied to the pledge separately by the bootstrapping
         protocol.  The domain certificate MUST have this
         certificate somewhere in its chain of certificates.
         This certificate MAY be an end-entity certificate,
         including a self-signed entity.";
      reference
        "RFC 5280:
         Internet X.509 Public Key Infrastructure Certificate
         and Certificate Revocation List (CRL) Profile.
         ITU-T X.690:
         Information technology - ASN.1 encoding rules:
         Specification of Basic Encoding Rules (BER),
         Canonical Encoding Rules (CER) and Distinguished
         Encoding Rules (DER).";
    }
    leaf pinned-domain-pubk {
      type binary;
      description
        "The pinned-domain-pubk may replace the
         pinned-domain-cert in constrained uses of
         the voucher. The pinned-domain-pubk
         is the Raw Public Key of the registrar.
         This field is encoded as a Subject Public Key Info block
         as specified in RFC7250, in section 3.";
    }
    leaf pinned-domain-pubk-sha256 {
      type binary;
      description
        "The pinned-domain-pubk-sha256 is a second
         alternative to pinned-domain-cert.  In many cases the
         public key of the domain has already been transmitted
         during the key agreement process, and it is wasteful
         to transmit the public key another two times.
         The use of a hash of public key info, at 32-bytes for
         sha256 is a significant savings compared to an RSA
         public key, but is only a minor savings compared to
         a 256-bit ECDSA public-key.
         Algorithm agility is provided by extensions to this
         specification which can define a new leaf for another
         hash type.";
    }
    // }  choice pinning removed
    leaf domain-cert-revocation-checks {
      type boolean;
      description
        "A processing instruction to the pledge that it MUST (true)
         or MUST NOT (false) verify the revocation status for the
         pinned domain certificate.  If this field is not set, then
         normal PKIX behavior applies to validation of the domain
         certificate.";
    }
    leaf last-renewal-date {
      type yang:date-and-time;
      must '../expires-on';
      description
        "The date that the MASA projects to be the last date
         it will renew a voucher on. This field is merely
         informative; it is not processed by pledges.

         Circumstances may occur after a voucher is generated that
         may alter a voucher's validity period.  For instance,
         a vendor may associate validity periods with support
         contracts, which may be terminated or extended
         over time.";
    }
    //choice nonceless {
    //  description "Either a nonce must be present,
    //               or an expires-on header";
    leaf expires-on {
      type yang:date-and-time;
      description
        "A value indicating when this voucher expires.  The node is
         optional as not all pledges support expirations, such as
         pledges lacking a reliable clock.

         If this field exists, then the pledges MUST ensure that
         the expires-on time has not yet passed. A pledge without
         an accurate clock cannot meet this requirement.

         The expires-on value MUST NOT exceed the expiration date
         of any of the listed 'pinned-domain-cert' certificates.";
    }
    leaf nonce {
      type binary {
        length "8..32";
      }
      description
        "A value that can be used by a pledge in some bootstrapping
         protocols to enable anti-replay protection.  This node is
         optional because it is not used by all bootstrapping
         protocols.

         When present, the pledge MUST compare the provided nonce
         value with another value that the pledge randomly
         generated and sent to a bootstrap server in an earlier
         bootstrapping message.  If the value is present, but
         the values do not match, then the pledge MUST NOT process
         this voucher.";
    }
    // } choice nonceless
    leaf est-domain {
      type ietf:uri;
      description
        "The est-domain is a URL from which the pledge should
         continue doing enrollment rather than with the
         cloud registrar.
         The pinned-domain-cert contains a trust-anchor
         which is to be used to authenticate the server
         found at this URI.";
    }
    leaf additional-configuration-url {
      type ietf:uri;
      description
        "The additional-configuration attribute contains a
         URL to which the pledge can retrieve additional
         configuration information.
         The contents of this URL are manufacturer specific.
         This is intended to do things like configure
         a VoIP phone to point to the correct hosted
         PBX, for example.";
    }
  }

  // Top-level statement
  sx:structure voucher {
    uses voucher-artifact;
  }
}
]]></sourcecode>
      </section>
      <section anchor="voucher-sid-values">
        <name>ietf-voucher SID values</name>
        <t><xref target="RFC9254"/> explains how to serialize YANG into CBOR, and for this a series of SID values are required.
The below SID values are assigned to the '<tt>ietf-voucher</tt>' YANG module elements and are considered normative.</t>
        <t>The right column shows the schema-node path expression for the YANG data node to which the SID value is assigned.</t>
        <artwork><![CDATA[
SID  Assigned to
---- --------------------------------------------------
2450 module ietf-voucher
2451 data   /ietf-voucher:voucher
2452 data   /ietf-voucher:voucher/assertion
2453 data   /ietf-voucher:voucher/created-on
2454 data   /ietf-voucher:voucher/domain-cert-revocation-checks
2455 data   /ietf-voucher:voucher/expires-on
2456 data   /ietf-voucher:voucher/idevid-issuer
2457 data   /ietf-voucher:voucher/last-renewal-date
2458 data   /ietf-voucher:voucher/nonce
2459 data   /ietf-voucher:voucher/pinned-domain-cert
2460 data   /ietf-voucher:voucher/pinned-domain-pubk
2461 data   /ietf-voucher:voucher/pinned-domain-pubk-sha256
2462 data   /ietf-voucher:voucher/serial-number
2463 data   /ietf-voucher:voucher/additional-configuration-url
2464 data   /ietf-voucher:voucher/est-domain
2465 data   /ietf-voucher:voucher/manufacturer-private
2466 data   /ietf-voucher:voucher/extensions
]]></artwork>
        <t>The '<tt>assertion</tt>' Attribute is an enumerated type in <xref target="RFC8366"/>, but no values were provided as part of the enumeration.
This document provides enumerated values as part of the YANG module.</t>
        <t>In the JSON serialization, the literal strings from the enumerated types are used so there is no ambiguity.</t>
        <t>In the CBOR serialization, a small integer is used, and the enumeration values are repeated here for convenience.
However, the YANG module should be considered authoritative.
No IANA registry is provided or necessary because the YANG module (and this document) would be extended when there are new entries required.</t>
        <table anchor="assertion-enums">
          <name>CBOR integers for the 'assertion' Attribute enum value</name>
          <thead>
            <tr>
              <th align="left">CBOR Integer</th>
              <th align="left">Assertion Type</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">0</td>
              <td align="left">verified</td>
            </tr>
            <tr>
              <td align="left">1</td>
              <td align="left">logged</td>
            </tr>
            <tr>
              <td align="left">2</td>
              <td align="left">proximity</td>
            </tr>
            <tr>
              <td align="left">3</td>
              <td align="left">agent-proximity</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="voucher-ext">
        <name>Voucher Extensions</name>
        <t>An unstated assumption in <xref target="RFC8366"/> was that Vouchers could be extended in proprietary ways by manufacturers.
This allows for manufacturers to communicate new things from the MASA to the Pledge, and since both are under control of the same entity, it seemed perfectly fine, even though it would violate the strict definition of the YANG model.</t>
        <t>The JSON serialization of Vouchers implicitly accommodates the above, since the Voucher is just a map (or dictionary).
Map keys are just strings, and creating unique strings is easy to do by including the manufacturer's DNS domain name.</t>
        <t>In CBOR serialization <xref target="RFC9254"/>, the situation is not so easy when SID keys are used.
An extension might need to use "Private range" <xref target="CORESID"/> SID values, or acquire SID values for their own use.</t>
        <t>Where the process has become complex is when making standard extensions, as has happened recently, resulting in this document.
The processes which were anticipated to be useful (the YANG "augment" mechanism), turned out not to be, see <xref target="extendfail"/>.</t>
        <t>Instead, a process similar to what was done by <xref target="RFC8520"/> has been adopted.
In the Voucher Data, any extensions are listed in a list Attribute named '<tt>extensions</tt>'.
In JSON serialization, these extensions each require a unique name, and therefore this name <bcp14>MUST</bcp14> be allocated by IANA.
The name <bcp14>MUST</bcp14> be the same as the YANG extension module name.
The '<tt>extensions</tt>' list Attribute allows for new standard extensions to be defined without changes to the '<tt>ietf-voucher</tt>' YANG module.
Items within that list are either strings (in JSON serialization), or integers (in CBOR serialization using SIDs);
both are always defined in the entries of the Voucher Extensions Registry (see <xref target="voucher-ext-reg"/>).</t>
        <t>Extensions are full YANG modules, which are subject to the SID allocation process described in <xref target="RFC9254"/>.
When an extension is serialized, the extension is placed in a sub-map in the value of a new key/value pair in the '<tt>voucher</tt>' container element.
In JSON serialization, the corresponding key is the name of the extension, prefixed by the string "extension:".
In CBOR serialization, the corresponding key is the SID which is allocated as the YANG extension module SID.
This will typically require the absolute SID value Tag(47) to be applied to this key (see <xref section="4.2.1" sectionFormat="of" target="RFC9254"/>
or the final example in <xref target="voucher-examples"/>).</t>
        <t>Note that this differs from the mechanism described in <xref target="RFC8520"/>: there, a sub-map is not used.
Instead, keys are created by combining the module name and the Attribute as a string, as a result of using the YANG
"augment" mechanism.
The <xref target="RFC8520"/> mechanism uses more bytes, but is also not easily translatable to CBOR.</t>
        <t>As the Voucher Request YANG module is created by YANG augment of the Voucher YANG module, any extension defined for the Voucher is also valid for a Voucher Request.</t>
      </section>
      <section anchor="manufacturer-private-extensions">
        <name>Manufacturer Private Extensions</name>
        <t>A manufacturer might need to communicate content in the Voucher (or in the Voucher Request), which are never subject to standardization.
While they can use the Voucher extensions mechanism defined in <xref target="voucher-ext"/>, it does require allocation of a SID value in order to do minimal-sized encoding in case of CBOR Voucher Data.
Note that <xref target="RFC9254"/> does not strictly require use of SIDs: instead of a SID value, the full string name can always
be used. But this would significantly increase the size of the Voucher Data.</t>
        <t>Instead, a manufacturer <bcp14>MAY</bcp14> use the '<tt>manufacturer-private</tt>' Attribute to put any content they wish.
In CBOR serialization, if a plain CBOR map would be used, it would be subject to delta encoding: so use of this Attribute requires that the contents are bstr-encoded
Section <xref target="RFC8949" section="3.1" sectionFormat="bare"/> of RFC 8949 <xref target="CBOR"/> (Major type 2).
In JSON serialization, delta encoding does not get in the way, and the manufacturer <bcp14>MAY</bcp14> use any encoding that is convenient for them, but base64URL encoding <xref section="5" sectionFormat="comma" target="RFC4648"/> is <bcp14>RECOMMENDED</bcp14>.</t>
      </section>
    </section>
    <section anchor="voucher-request">
      <name>Voucher Request Artifact</name>
      <t><xref section="3" sectionFormat="comma" target="RFC8995"/> defined a "voucher-request" Artifact as an augmented Artifact from the "voucher" Artifact originally defined in <xref target="RFC8366"/>.
That definition has been moved to this document, and translated from the "yang-data" extension <xref target="RFC8040"/> to the "sx:structure" extension <xref target="RFC8791"/>.</t>
      <section anchor="voucher-request-tree-diagram">
        <name>Tree Diagram</name>
        <t>The following tree diagram illustrates a high-level view of a Voucher Request document.
The notation used in this diagram is described in <xref target="RFC8340"/>.
Each node in the diagram is fully described by the YANG module in
<xref target="voucher-request-yang-module"/>.</t>
        <artwork><![CDATA[
module: ietf-voucher-request

  structure voucher:
    +-- created-on?                                yang:date-and-time
    +-- extensions*                                union
    +-- manufacturer-private?                      binary
    +-- assertion?                                 enumeration
    +-- serial-number                              string
    +-- idevid-issuer?                             binary
    +-- pinned-domain-cert?                        binary
    +-- pinned-domain-pubk?                        binary
    +-- pinned-domain-pubk-sha256?                 binary
    +-- domain-cert-revocation-checks?             boolean
    +-- last-renewal-date?                         yang:date-and-time
    +-- expires-on?                                yang:date-and-time
    +-- nonce?                                     binary
    +-- est-domain?                                ietf:uri
    +-- additional-configuration-url?              ietf:uri
    +-- prior-signed-voucher-request?              binary
    +-- proximity-registrar-cert?                  binary
    +-- proximity-registrar-pubk?                  binary
    +-- proximity-registrar-pubk-sha256?           binary
    +-- agent-signed-data?                         binary
    +-- agent-provided-proximity-registrar-cert?   binary
    +-- agent-sign-cert?                           binary
]]></artwork>
      </section>
      <section anchor="voucher-request-yang-module">
        <name>"ietf-voucher-request" Module</name>
        <t>The '<tt>ietf-voucher-request</tt>' YANG module is derived from the '<tt>ietf-voucher</tt>' module.</t>
        <sourcecode type="yang" markers="true" name="ietf-voucher-request@2025-12-18.yang"><![CDATA[
module ietf-voucher-request {
  yang-version 1.1;
  namespace "urn:ietf:params:xml:ns:yang:ietf-voucher-request";
  prefix vcr;

  import ietf-yang-structure-ext {
    prefix sx;
    reference
      "RFC 8791: YANG Data Structure Extensions";
  }
  import ietf-voucher {
    prefix vch;
    description
      "This module defines the format for a Voucher,
       which is produced by a Pledge's manufacturer or
       delegate (MASA) to securely assign a Pledge to
       an 'Owner', so that the Pledge may establish a secure
       connection to the Owner's network infrastructure";
    reference
      "RFC XXXX: A Voucher Artifact for
       Bootstrapping Protocols";
  }

  organization
    "IETF ANIMA Working Group";
  contact
    "WG Web:   <https://datatracker.ietf.org/wg/anima/>
     WG List:  <mailto:anima@ietf.org>
     Author:   Kent Watsen
               <mailto:kent+ietf@watsen.net>
     Author:   Michael Richardson
               <mailto:mcr+ietf@sandelman.ca>
     Author:   Toerless Eckert
               <mailto:tte@cs.fau.de>
     Author:   Qiufang Ma
               <mailto:maqiufang1@huawei.com>
     Author:   Esko Dijk
               <mailto:esko.dijk@iotconsultancy.nl>";
  description
    "This module defines the format for a Voucher Request.
     It is a superset of the Voucher itself.
     It provides content to the MASA for consideration
     during a voucher request procedure and subsequent
     Voucher creation.

     Copyright (c) 2023-2026 IETF Trust and the persons identified as
     authors of the code.  All rights reserved.

     Redistribution and use in source and binary forms, with or
     without modification, is permitted pursuant to, and subject to
     the license terms contained in, the Revised BSD License set
     forth in Section 4.c of the IETF Trust's Legal Provisions
     Relating to IETF Documents
     (https://trustee.ietf.org/license-info).

     This version of this YANG module is part of RFC XXXX
     (https://www.rfc-editor.org/info/rfcXXXX); see the RFC itself
     for full legal notices.

     The key words 'MUST', 'MUST NOT', 'REQUIRED', 'SHALL', 'SHALL
     NOT', 'SHOULD', 'SHOULD NOT', 'RECOMMENDED', 'NOT RECOMMENDED',
     'MAY', and 'OPTIONAL' in this document are to be interpreted as
     described in BCP 14 (RFC 2119) (RFC 8174) when, and only when,
     they appear in all capitals, as shown here.";

  // RFCEDITOR: please replace XXXX in this entire code fragment
  // with the RFC number assigned and remove this notice.

  revision 2025-12-18 {
    description
      "Updates and additions described by RFC XXXX";
    reference
      "RFC XXXX: A Voucher Artifact for Bootstrapping Protocols";
  }
  revision 2021-05-20 {
    description
      "Initial version";
    reference
      "RFC 8995: Bootstrapping Remote Secure Key Infrastructure
       (BRSKI)";
  }

  grouping voucher-request {
    description
      "Grouping to allow reuse/extensions in future work.";
    uses vch:voucher-artifact {
      refine "last-renewal-date" {
        description
          "A last-renewal-date field
           is not valid in a voucher request, and
           any occurrence MUST be ignored";
      }
      refine "domain-cert-revocation-checks" {
        description
          "The domain-cert-revocation-checks field
           is not valid in a voucher request, and
           any occurrence MUST be ignored";
      }
      refine "assertion" {
        description
          "Any assertion included in registrar voucher
           requests SHOULD be ignored by the MASA.";
      }
      refine "idevid-issuer" {
        description
          "The idevid-issuer field MUST be included in
           a Registrar Voucher Request (RVR) (unless
           specified otherwise) per Section 6.1 of
           RFC XXXX.";
      }
    }
    leaf prior-signed-voucher-request {
      type binary;
      description
        "If it is necessary to change a voucher, or re-sign and
         forward a voucher request that was previously provided
         along a protocol path, then the previously signed
         voucher SHOULD be included in this field.

         For example, a pledge might sign a voucher request
         with a proximity-registrar-cert, and the registrar
         then includes it as the prior-signed-voucher-request
         field.  This is a simple mechanism for a chain of
         trusted parties to change a voucher request, while
         maintaining the prior signature information.

         The Registrar and MASA MAY examine the prior signed
         voucher information for the
         purposes of policy decisions. The MASA SHOULD remove
         all prior-signed-voucher-request information when
         signing a voucher for imprinting so as to minimize
         the final voucher size.";
    }
    leaf proximity-registrar-cert {
      type binary;
      description
        "An X.509 v3 certificate structure as specified by
         RFC 5280, Section 4 encoded using the ASN.1
         distinguished encoding rules (DER), as specified
         in [ITU.X690.2015].

         The first certificate in the Registrar TLS server
         certificate_list sequence  (the end-entity TLS
         certificate, see [RFC8446]) presented by the Registrar
         to the Pledge.
         This MUST be populated in a Pledge's voucher request
         when a proximity assertion is requested.";
    }
    leaf proximity-registrar-pubk {
      type binary;
      description
        "The proximity-registrar-pubk replaces
         the proximity-registrar-cert in constrained uses of
         the voucher-request.
         The proximity-registrar-pubk is the
         Raw Public Key of the Registrar. This field is encoded
         as specified in RFC7250, section 3.
         The ECDSA algorithm MUST be supported.
         The EdDSA algorithm as specified in
         draft-ietf-tls-rfc4492bis-17 SHOULD be supported.
         Support for the DSA algorithm is not recommended.
         Support for the RSA algorithm is a MAY, but due to
         size is discouraged.";
    }
    leaf proximity-registrar-pubk-sha256 {
      type binary;
      description
        "The proximity-registrar-pubk-sha256
         is an alternative to both
         proximity-registrar-pubk and pinned-domain-cert.
         In many cases the public key of the domain has already
         been transmitted during the key agreement protocol,
         and it is wasteful to transmit the public key another
         two times.
         The use of a hash of public key info, at 32-bytes for
         sha256 is a significant savings compared to an RSA
         public key, but is only a minor savings compared to
         a 256-bit ECDSA public-key.
         Algorithm agility is provided by extensions to this
         specification which may define a new leaf for another
         hash type.";
    }
    leaf agent-signed-data {
      type binary;
      description
        "The agent-signed-data field contains a data artifact
         provided by the Registrar-Agent to the Pledge for
         inclusion into the voucher request.

         This artifact is signed by the Registrar-Agent and contains
         data, which can be verified by the pledge and the registrar.
         This data contains the pledge's serial-number and a
         created-on information of the agent-signed-data.

         The format is intentionally defined as binary to allow
         the document using this leaf to determine the encoding.";
    }
    leaf agent-provided-proximity-registrar-cert {
      type binary;
      description
        "An X.509 v3 certificate structure, as specified by
         RFC 5280, Section 4, encoded using the ASN.1
         distinguished encoding rules (DER), as specified
         in ITU X.690.
         The first certificate in the registrar TLS server
         certificate_list sequence (the end-entity TLS
         certificate; see RFC 8446) presented by the
         registrar to the registrar-agent and provided to
         the pledge.
         This MUST be populated in a pledge's voucher-request
         when an agent-proximity assertion is requested.";
      reference
        "ITU X.690: Information Technology - ASN.1 encoding
         rules: Specification of Basic Encoding Rules (BER),
         Canonical Encoding Rules (CER) and Distinguished
         Encoding Rules (DER)
         RFC 5280: Internet X.509 Public Key Infrastructure
         Certificate and Certificate Revocation List (CRL)
         Profile
         RFC 8446: The Transport Layer Security (TLS)
         Protocol Version 1.3";
    }
    leaf agent-sign-cert {
      type binary;
      description
        "An X.509 v3 certificate structure, as specified by
         RFC 5280, Section 4, encoded using the ASN.1
         distinguished encoding rules (DER), as specified
         in ITU X.690.
         This certificate can be used by the pledge,
         the registrar, and the MASA to verify the signature
         of agent-signed-data. It is an optional component
         for the pledge-voucher request.
         This MUST be populated in a registrar's
         voucher-request when an agent-proximity assertion
         is requested.";
      reference
        "ITU X.690: Information Technology - ASN.1 encoding
         rules: Specification of Basic Encoding Rules (BER),
         Canonical Encoding Rules (CER) and Distinguished
         Encoding Rules (DER)
         RFC 5280: Internet X.509 Public Key Infrastructure
         Certificate and Certificate Revocation List (CRL)
         Profile";
    }
  }

  // Top-level statement: called "voucher" to match RFC8995
  sx:structure voucher {
    uses voucher-request;
  }
}
]]></sourcecode>
      </section>
      <section anchor="voucher-request-sid-values">
        <name>ietf-voucher-request SID values</name>
        <t><xref target="RFC9254"/> explains how to serialize YANG into CBOR, and for this a series of SID values are required.
The below SID values are assigned to the '<tt>ietf-voucher-request</tt>' YANG module elements and are considered normative.</t>
        <t>The right column shows the schema-node path expression for the YANG data node to which the SID value is assigned.</t>
        <artwork><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

SID  Assigned to
---- --------------------------------------------------
2500 module ietf-voucher-request
2501 data   /ietf-voucher-request:voucher
2502 data   /ietf-voucher-request:voucher/assertion
2503 data   /ietf-voucher-request:voucher/created-on
2504 data   /ietf-voucher-request:voucher/domain-cert-revocation-\
                                                               checks
2505 data   /ietf-voucher-request:voucher/expires-on
2506 data   /ietf-voucher-request:voucher/idevid-issuer
2507 data   /ietf-voucher-request:voucher/last-renewal-date
2508 data   /ietf-voucher-request:voucher/nonce
2509 data   /ietf-voucher-request:voucher/pinned-domain-cert
2510 data   /ietf-voucher-request:voucher/prior-signed-voucher-\
                                                              request
2511 data   /ietf-voucher-request:voucher/proximity-registrar-cert
2512 data   /ietf-voucher-request:voucher/proximity-registrar-pubk-\
                                                               sha256
2513 data   /ietf-voucher-request:voucher/proximity-registrar-pubk
2514 data   /ietf-voucher-request:voucher/serial-number
2515 data   /ietf-voucher-request:voucher/agent-provided-proximity-\
                                                       registrar-cert
2516 data   /ietf-voucher-request:voucher/agent-sign-cert
2517 data   /ietf-voucher-request:voucher/agent-signed-data
2518 data   /ietf-voucher-request:voucher/pinned-domain-pubk
2519 data   /ietf-voucher-request:voucher/pinned-domain-pubk-sha256
2520 data   /ietf-voucher-request:voucher/additional-configuration-\
                                                                  url
2521 data   /ietf-voucher-request:voucher/est-domain
2522 data   /ietf-voucher-request:voucher/extensions
2523 data   /ietf-voucher-request:voucher/manufacturer-private
]]></artwork>
        <t>The '<tt>assertion</tt>' Attribute is an enumerated type, and has values as defined in <xref target="assertion-enums"/>.</t>
      </section>
    </section>
    <section anchor="design-con">
      <name>Design Considerations</name>
      <section anchor="renewal-over-revocation">
        <name>Renewals Instead of Revocations</name>
        <t>The lifetimes of Vouchers may vary.  In some Onboarding protocols,
the Vouchers may be created and consumed immediately, whereas in other
Onboarding solutions, there may be a significant time delay between
when a Voucher is created and when it is consumed.
In cases when there is a time delay, there is a need for the Pledge
to ensure that the assertions made when the Voucher was created are
still valid.</t>
        <t>A revocation artifact is generally used to verify the continued validity
of an assertion such as a PKIX certificate <xref target="RFC5280"/>, web token, or Voucher.  With
this approach, a potentially long-lived assertion is paired with a reasonably
fresh revocation status check to ensure that the assertion is still valid.
However, this approach increases solution complexity, as it introduces the
need for additional protocols and code paths to distribute and process the
revocations.</t>
        <t>Addressing the shortcomings of revocations, this document recommends
instead the use of lightweight renewals of short-lived non-revocable
Vouchers.  That is, rather than issue a long-lived Voucher, where the
'<tt>expires-on</tt>' Attribute is set to some distant date, the expectation
is for the MASA to instead issue a short-lived Voucher, where the
'<tt>expires-on</tt>' Attribute is set to a relatively near date, along with a promise
(reflected in the '<tt>last-renewal-date</tt>' Attribute) to reissue the Voucher again
when needed.  Importantly, while issuing the initial Voucher may incur
heavyweight verification checks ("Are you who you say you are?" "Does the
Pledge actually belong to you?"), reissuing the Voucher should be a
lightweight process, as it ostensibly only updates the Voucher's
validity period.
With this approach, there is
only the one Artifact, and only one code path is needed to process
it; there is no possibility of a Pledge choosing to skip the
revocation status check because, for instance, the OCSP Responder (<xref target="RFC5280"/>) is
not reachable.</t>
        <t>While this document recommends issuing short-lived Vouchers, the
Voucher Artifact does not restrict the ability to create long-lived
Vouchers, if required; however, no revocation method is described.</t>
        <t>Note that a Voucher may be signed by a chain of intermediate CAs
leading up to the trust anchor CA known by the Pledge.  Even
though the Voucher itself is not revocable, it is still revoked,
per se, if one of the intermediate CA certificates is revoked.</t>
      </section>
      <section anchor="voucher-per-pledge">
        <name>Voucher Per Pledge</name>
        <t>The solution described herein originally enabled a single Voucher to
apply to many Pledges, using lists of regular expressions to represent
ranges of serial numbers.  However, it was determined that blocking the
renewal of a Voucher that applied to many devices would be excessive
when only the ownership for a single Pledge needed to be blocked.
Thus, the Voucher format now only supports a single serial number
to be listed.</t>
      </section>
    </section>
    <section anchor="sec-con">
      <name>Security Considerations</name>
      <section anchor="clock-sensitivity">
        <name>Clock Sensitivity</name>
        <t>An attacker could use an expired Voucher to gain control over
a device that has no understanding of time.  The device cannot
trust NTP as a time reference, as an attacker could control
the NTP stream.</t>
        <t>There are three things to defend against this: 1) devices are
required to verify that the '<tt>expires-on</tt>' Attribute has not yet passed,
2) devices without access to time can use nonces to
get ephemeral Vouchers, and 3) Vouchers without expiration times
may be used, which will appear in the audit log, informing the
security decision.</t>
        <t>This document defines a Voucher format that contains time values
for expirations, which require an accurate clock
in order to be processed correctly.  Vendors planning on
issuing Vouchers with expiration values must ensure that devices
have an accurate clock when shipped from manufacturing
facilities and take steps to prevent clock tampering.
If it is not possible to ensure clock accuracy, then
Vouchers with time values for expirations should not be issued.</t>
      </section>
      <section anchor="protect-masa-signing-key-in-hsm">
        <name>Protect MASA Signing Key in HSM</name>
        <t>Pursuant to the recommendation made in Section 6.1 for the MASA to be
deployed as an online Voucher signing service, it is <bcp14>RECOMMENDED</bcp14> that
the MASA's private key used for signing Vouchers is protected by
a hardware security module (HSM).</t>
      </section>
      <section anchor="test-domain-certificate-validity-when-signing">
        <name>Test Domain Certificate Validity When Signing</name>
        <t>If a Domain certificate is compromised, then any outstanding
Vouchers for that Domain could be used by the attacker.  In this case, the Domain
administrator is clearly expected to initiate revocation of any
Domain identity certificates (as is normal in PKIX <xref target="RFC5280"/> solutions).</t>
        <t>Similarly, they are expected to contact the MASA to indicate that
an outstanding (presumably short lifetime) Voucher should be blocked from
automated renewal.
Protocols for Voucher distribution are
<bcp14>RECOMMENDED</bcp14> to check for revocation of Domain identity certificates
before the signing of Vouchers.</t>
      </section>
      <section anchor="yang-module-security-considerations">
        <name>YANG Module Security Considerations</name>
        <t>The YANG modules specified in this document define the schema
for data that is subsequently encapsulated by secure signed-data structures,
such as the CMS signed-data described in <xref target="cms-voucher"/>.  As such,
all of the YANG-modeled data is protected from modification.</t>
        <t>Implementations should be aware that the signed data is only
protected from external modification; the data is still visible.
This potential disclosure of information doesn't affect security
so much as privacy.  In particular, adversaries can glean
information such as which devices belong to which organizations
and which CRL Distribution Point and/or OCSP Responder URLs are
accessed to validate the Vouchers.  When privacy is important,
the CMS signed-data content type <bcp14>SHOULD</bcp14> be encrypted, either by
conveying it via a mutually authenticated secure transport protocol
(e.g., TLS <xref target="RFC8446"/>) or by encapsulating the signed-data
content type with an enveloped-data content type (Section 6
of <xref target="RFC5652"/>), though details for how to do this are outside
the scope of this document.</t>
        <t>The use of YANG to define data structures, via the "sx:structure"
extension <xref target="RFC8791"/>, is relatively new and distinct from the conventional
use of
YANG to define an API accessed by network management protocols such as
NETCONF <xref target="RFC6241"/> and RESTCONF <xref target="RFC8040"/>. For this reason, this
security considerations section does not follow the template described
by Section 3.7 of <xref target="YANG-GUIDE"/>.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="the-ietf-xml-registry">
        <name>The IETF XML Registry</name>
        <t>This document updates two URIs in the "IETF XML Registry" <xref target="RFC3688"/>.</t>
        <t>IANA has registered the following based on <xref target="RFC8366"/> and <xref target="RFC8995"/> respectively:</t>
        <ul empty="true">
          <li>
            <dl spacing="compact">
              <dt>URI:</dt>
              <dd>
                <t>urn:ietf:params:xml:ns:yang:ietf-voucher</t>
              </dd>
              <dt>Registrant Contact:</dt>
              <dd>
                <t>The ANIMA WG of the IETF.</t>
              </dd>
              <dt>XML:</dt>
              <dd>
                <t>N/A, the requested URI is an XML namespace.</t>
              </dd>
            </dl>
          </li>
        </ul>
        <ul empty="true">
          <li>
            <dl spacing="compact">
              <dt>URI:</dt>
              <dd>
                <t>urn:ietf:params:xml:ns:yang:ietf-voucher-request</t>
              </dd>
              <dt>Registrant Contact:</dt>
              <dd>
                <t>The ANIMA WG of the IETF.</t>
              </dd>
              <dt>XML:</dt>
              <dd>
                <t>N/A, the requested URI is an XML namespace.</t>
              </dd>
            </dl>
          </li>
        </ul>
        <t>For both entries, the reference should be updated to point to this document.</t>
      </section>
      <section anchor="the-yang-module-names-registry">
        <name>The YANG Module Names Registry</name>
        <t>This document updates two entries in the "YANG Module Names"
registry <xref target="RFC6020"/>.</t>
        <t>IANA has registered the following based on <xref target="RFC8366"/>:</t>
        <ul empty="true">
          <li>
            <dl spacing="compact">
              <dt>name:</dt>
              <dd>
                <t>ietf-voucher</t>
              </dd>
              <dt>namespace:</dt>
              <dd>
                <t>urn:ietf:params:xml:ns:yang:ietf-voucher</t>
              </dd>
              <dt>prefix:</dt>
              <dd>
                <t>vch</t>
              </dd>
              <dt>reference:</dt>
              <dd>
                <t>RFC 8366</t>
              </dd>
            </dl>
          </li>
        </ul>
        <t>This reference should be updated to point to this document and the "File" entry should be updated to point to the
new module revision in <xref target="voucher-yang-module"/>.</t>
        <t>IANA has registered the following based on <xref target="RFC8995"/>:</t>
        <ul empty="true">
          <li>
            <dl spacing="compact">
              <dt>name:</dt>
              <dd>
                <t>ietf-voucher-request</t>
              </dd>
              <dt>namespace:</dt>
              <dd>
                <t>urn:ietf:params:xml:ns:yang:ietf-voucher-request</t>
              </dd>
              <dt>prefix:</dt>
              <dd>
                <t>vch</t>
              </dd>
              <dt>reference:</dt>
              <dd>
                <t>RFC 8995</t>
              </dd>
            </dl>
          </li>
        </ul>
        <t>This reference should also be updated to point to this document and the "File" entry should be updated to point to the
new module revision in <xref target="voucher-request-yang-module"/>.
Additionally, the "prefix" field should be updated as follows:</t>
        <ul empty="true">
          <li>
            <dl spacing="compact">
              <dt>prefix:</dt>
              <dd>
                <t>vcr</t>
              </dd>
            </dl>
          </li>
        </ul>
      </section>
      <section anchor="vcj">
        <name>The Media Types Registry</name>
        <t>IANA has registered the media type: <tt>application/voucher-cms+json</tt>, and this registration should be updated to point to this document.</t>
        <ul empty="true">
          <li>
            <dl spacing="compact">
              <dt>Type name:</dt>
              <dd>
                <t>application</t>
              </dd>
              <dt>Subtype name:</dt>
              <dd>
                <t>voucher-cms+json</t>
              </dd>
              <dt>Required parameters:</dt>
              <dd>
                <t>none</t>
              </dd>
              <dt>Optional parameters:</dt>
              <dd>
                <t>none</t>
              </dd>
              <dt>Encoding considerations:</dt>
              <dd>
                <t>CMS-signed JSON vouchers are ASN.1/DER  encoded.</t>
              </dd>
              <dt>Security considerations:</dt>
              <dd>
                <t>See <xref target="sec-con"/></t>
              </dd>
            </dl>
            <t>Interoperability considerations:  The format is designed to be
     broadly interoperable.</t>
            <dl>
              <dt>Published specification:</dt>
              <dd>
                <t>THISDOCUMENT</t>
              </dd>
              <dt>Applications that use this media type:</dt>
              <dd>
                <t>ANIMA, 6tisch, and NETCONF zero-touch imprinting systems.</t>
              </dd>
              <dt>Fragment identifier considerations:</dt>
              <dd>
                <t>none</t>
              </dd>
              <dt>Additional information:</dt>
              <dd>
                <t>Deprecated alias names for this type:  none</t>
              </dd>
              <dt/>
              <dd>
                <t>Magic number(s):  None</t>
              </dd>
              <dt/>
              <dd>
                <t>File extension(s):  .vcj</t>
              </dd>
              <dt/>
              <dd>
                <t>Macintosh file type code(s):  none</t>
              </dd>
              <dt>Person and email address to contact for further information:</dt>
              <dd>
                <t>IETF ANIMA WG</t>
              </dd>
              <dt>Intended usage:</dt>
              <dd>
                <t>LIMITED</t>
              </dd>
              <dt>Restrictions on usage:</dt>
              <dd>
                <t>NONE</t>
              </dd>
              <dt>Author:</dt>
              <dd>
                <t>ANIMA WG</t>
              </dd>
              <dt>Change controller:</dt>
              <dd>
                <t>IETF</t>
              </dd>
              <dt>Provisional registration? (standards tree only):</dt>
              <dd>
                <t>NO</t>
              </dd>
            </dl>
          </li>
        </ul>
      </section>
      <section anchor="iana-contenttype">
        <name>The SMI Security for S/MIME CMS Content Type Registry</name>
        <t>IANA has registered the OID 1.2.840.113549.1.9.16.1.40, '<tt>id-ct-animaJSONVoucher</tt>'.
This registration should be updated to point to this document.</t>
      </section>
      <section anchor="voucher-ext-reg">
        <name>The Voucher Extensions Registry</name>
        <t>IANA is asked to create a registry of Voucher extensions as follows:</t>
        <ul empty="true">
          <li>
            <dl spacing="compact">
              <dt>Registry name:</dt>
              <dd>
                <t>Voucher Extensions Registry</t>
              </dd>
              <dt>Registry policy:</dt>
              <dd>
                <t>First Come First Served</t>
              </dd>
              <dt>Reference:</dt>
              <dd>
                <t>an optional document</t>
              </dd>
              <dt>Extension name:</dt>
              <dd>
                <t>UTF-8-encoded string, not to exceed 40 characters.</t>
              </dd>
              <dt>Extension SID:</dt>
              <dd>
                <t>the YANG module SID value that defines the extension per <xref target="voucher-ext"/>.</t>
              </dd>
            </dl>
          </li>
        </ul>
        <t>Each extension <bcp14>MUST</bcp14> follow the rules specified in this specification.
As is usual, the IANA issues early allocations in accordance with <xref target="RFC7120"/>.</t>
        <t>Note that the SID module value is allocated as part of a <xref target="CORESID"/> process.
This may be from a SID range managed by IANA, or from any other MegaRange.
Future work may allow for PEN based allocations.
IANA does not need to separately allocate a SID value for this column.</t>
        <t>Extension name strings for standards track documents are single words, given by the YANG Module Name.
They do not contain dots.
For vendor proprietary extensions, the string <bcp14>SHOULD</bcp14> be made unique by putting the extension name in the form a fully-qualified domain name (FQDN) <xref target="RFC3696"/>, such as "fuubar.example.com"</t>
        <t>Vendor proprietary extensions do not need to be registered with IANA, but vendors <bcp14>MAY</bcp14> do so.</t>
        <t>Designated Experts should review for standards track documents for clarity, but the process is essentially tied to WG and IESG process:
There are no choices in the extension names (which is always the YANG module name), or SID value (which is from another IANA process).
For non-standards track extensions, the Designated Expert should review whatever document is provided, if any.
The stability of the reference may be of concern.  The Designated Expert should determine if the work overlaps with existing efforts; and if so suggest merging.
However, as registration is optional, the Designated Expert should not block any registrations.</t>
      </section>
      <section anchor="the-ietf-yang-sid-ranges-registry">
        <name>The IETF YANG-SID Ranges Registry</name>
        <t>IANA is requested to register the following entries in the IETF YANG-SID Ranges registry:</t>
        <table anchor="ietf-yang-sid-ranges-table">
          <name>Registered SID ranges</name>
          <thead>
            <tr>
              <th align="center">Entry Point</th>
              <th align="center">Size</th>
              <th align="left">Module Name</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="center">2450</td>
              <td align="center">50</td>
              <td align="left">ietf-voucher</td>
              <td align="left">[This RFC]</td>
            </tr>
            <tr>
              <td align="center">2500</td>
              <td align="center">50</td>
              <td align="left">ietf-voucher-request</td>
              <td align="left">[This RFC]</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="the-ietf-yang-sid-modules-registry">
        <name>The IETF YANG-SID Modules Registry</name>
        <t>IANA is requested to register the following YANG module in the IETF YANG-SID Modules registry, per
<xref section="6.5.1" sectionFormat="of" target="CORESID"/>:</t>
        <ul spacing="normal">
          <li>
            <t>YANG module name: <tt>ietf-voucher</tt></t>
          </li>
          <li>
            <t>URI for the ".yang" file: a pointer to the file defined in <xref target="voucher-yang-module"/></t>
          </li>
          <li>
            <t>URI for the ".sid" file: a pointer to the file defined in <xref target="voucher-sid-allocations"/></t>
          </li>
          <li>
            <t>Number of SIDs: 17</t>
          </li>
        </ul>
        <t>and also the following YANG module:</t>
        <ul spacing="normal">
          <li>
            <t>YANG module name: <tt>ietf-voucher-request</tt></t>
          </li>
          <li>
            <t>URI for the ".yang" file: a pointer to the file defined in <xref target="voucher-request-yang-module"/></t>
          </li>
          <li>
            <t>URI for the ".sid" file: a pointer to the file defined in <xref target="voucher-request-sid-allocations"/></t>
          </li>
          <li>
            <t>Number of SIDs: 24</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="yang-references">
      <name>YANG references</name>
      <t>RFC-editor, please remove.
This section just lists references present in YANG modules which otherwise do not get included in the references, like <xref target="RFC7250"/>.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC5280" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.5280.xml">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC5652">
          <front>
            <title>Cryptographic Message Syntax (CMS)</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="70"/>
          <seriesInfo name="RFC" value="5652"/>
          <seriesInfo name="DOI" value="10.17487/RFC5652"/>
        </reference>
        <reference anchor="RFC6020">
          <front>
            <title>YANG - A Data Modeling Language for the Network Configuration Protocol (NETCONF)</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="October" year="2010"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration and state data manipulated by the Network Configuration Protocol (NETCONF), NETCONF remote procedure calls, and NETCONF notifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6020"/>
          <seriesInfo name="DOI" value="10.17487/RFC6020"/>
        </reference>
        <reference anchor="RFC7950">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="RFC8259">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC9254">
          <front>
            <title>Encoding of Data Modeled with YANG in the Concise Binary Object Representation (CBOR)</title>
            <author fullname="M. Veillette" initials="M." role="editor" surname="Veillette"/>
            <author fullname="I. Petrov" initials="I." role="editor" surname="Petrov"/>
            <author fullname="A. Pelov" initials="A." surname="Pelov"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>YANG (RFC 7950) is a data modeling language used to model configuration data, state data, parameters and results of Remote Procedure Call (RPC) operations or actions, and notifications.</t>
              <t>This document defines encoding rules for YANG in the Concise Binary Object Representation (CBOR) (RFC 8949).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9254"/>
          <seriesInfo name="DOI" value="10.17487/RFC9254"/>
        </reference>
        <referencegroup anchor="CBOR" target="https://www.rfc-editor.org/info/std94">
          <reference anchor="RFC8949" target="https://www.rfc-editor.org/info/rfc8949">
            <front>
              <title>Concise Binary Object Representation (CBOR)</title>
              <author fullname="C. Bormann" initials="C." surname="Bormann"/>
              <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
              <date month="December" year="2020"/>
              <abstract>
                <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
                <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="94"/>
            <seriesInfo name="RFC" value="8949"/>
            <seriesInfo name="DOI" value="10.17487/RFC8949"/>
          </reference>
        </referencegroup>
        <reference anchor="CORESID">
          <front>
            <title>YANG Schema Item iDentifier (YANG SID)</title>
            <author fullname="M. Veillette" initials="M." role="editor" surname="Veillette"/>
            <author fullname="A. Pelov" initials="A." role="editor" surname="Pelov"/>
            <author fullname="I. Petrov" initials="I." role="editor" surname="Petrov"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <date month="July" year="2024"/>
            <abstract>
              <t>YANG Schema Item iDentifiers (YANG SIDs) are globally unique 63-bit unsigned integers used to identify YANG items. SIDs provide a more compact method for identifying those YANG items that can be used efficiently, notably in constrained environments (RFC 7228). This document defines the semantics, registration processes, and assignment processes for YANG SIDs for IETF-managed YANG modules. To enable the implementation of these processes, this document also defines a file format used to persist and publish assigned YANG SIDs.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9595"/>
          <seriesInfo name="DOI" value="10.17487/RFC9595"/>
        </reference>
        <reference anchor="cBRSKI">
          <front>
            <title>Constrained Bootstrapping Remote Secure Key Infrastructure (cBRSKI)</title>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Peter Van der Stok" initials="P." surname="Van der Stok">
              <organization>vanderstok consultancy</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Esko Dijk" initials="E." surname="Dijk">
              <organization>IoTconsultancy.nl</organization>
            </author>
            <date day="27" month="February" year="2026"/>
            <abstract>
              <t>   This document defines the Constrained Bootstrapping Remote Secure Key
   Infrastructure (cBRSKI) protocol, which provides a solution for
   secure zero-touch onboarding of resource-constrained (IoT) devices
   into the network of a domain owner.  This protocol is designed for
   constrained networks, which may have limited data throughput or may
   experience frequent packet loss. cBRSKI is a variant of the BRSKI
   protocol, which uses an artifact signed by the device manufacturer
   called the "voucher" which enables a new device and the owner's
   network to mutually authenticate.  While the BRSKI voucher data is
   encoded in JSON, cBRSKI uses a compact CBOR-encoded voucher.  The
   BRSKI voucher data definition is extended with new data types that
   allow for smaller voucher sizes.  The Enrollment over Secure
   Transport (EST) protocol, used in BRSKI, is replaced with EST-over-
   CoAPS; and HTTPS used in BRSKI is replaced with DTLS-secured CoAP
   (CoAPS).  This document Updates RFC 8995 and RFC 9148.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-constrained-voucher-30"/>
        </reference>
        <reference anchor="jBRSKI">
          <front>
            <title>JWS signed Voucher Artifacts for Bootstrapping Protocols</title>
            <author fullname="Thomas Werner" initials="T." surname="Werner">
              <organization>Siemens AG</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date day="15" month="January" year="2025"/>
            <abstract>
              <t>   This document introduces a variant of the RFC8366 voucher artifact in
   which CMS is replaced by the JSON Object Signing and Encryption
   (JOSE) mechanism described in RFC7515.  This supports deployments in
   which JOSE is preferred over CMS.  In addition to specifying the
   format, the "application/voucher-jws+json" media type is registered
   and examples are provided.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-jws-voucher-16"/>
        </reference>
        <reference anchor="ITU-T.X690.2015" target="https://www.itu.int/rec/T-REC-X.690/">
          <front>
            <title>Information Technology - ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author>
              <organization>International Telecommunication Union</organization>
            </author>
            <date year="2015" month="August"/>
          </front>
          <seriesInfo name="ITU-T Recommendation X.690," value="ISO/IEC 8825-1"/>
        </reference>
        <reference anchor="ZERO-TOUCH">
          <front>
            <title>Secure Zero Touch Provisioning (SZTP)</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="I. Farrer" initials="I." surname="Farrer"/>
            <author fullname="M. Abrahamsson" initials="M." surname="Abrahamsson"/>
            <date month="April" year="2019"/>
            <abstract>
              <t>This document presents a technique to securely provision a networking device when it is booting in a factory-default state. Variations in the solution enable it to be used on both public and private networks. The provisioning steps are able to update the boot image, commit an initial configuration, and execute arbitrary scripts to address auxiliary needs. The updated device is subsequently able to establish secure connections with other systems. For instance, a device may establish NETCONF (RFC 6241) and/or RESTCONF (RFC 8040) connections with deployment-specific network management systems.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8572"/>
          <seriesInfo name="DOI" value="10.17487/RFC8572"/>
        </reference>
        <reference anchor="RFC8995" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8995.xml">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="T. Eckert" initials="T." surname="Eckert"/>
            <author fullname="M. Behringer" initials="M." surname="Behringer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane. To do this, a Secure Key Infrastructure is bootstrapped. This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline. We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device. The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="PRM">
          <front>
            <title>BRSKI with Pledge in Responder Mode (BRSKI-PRM)</title>
            <author fullname="Steffen Fries" initials="S." surname="Fries">
              <organization>Siemens AG</organization>
            </author>
            <author fullname="Thomas Werner" initials="T." surname="Werner">
              <organization>Siemens AG</organization>
            </author>
            <author fullname="Eliot Lear" initials="E." surname="Lear">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date day="3" month="June" year="2025"/>
            <abstract>
              <t>   This document defines enhancements to Bootstrapping Remote Secure Key
   Infrastructure (BRSKI, RFC8995) as BRSKI with Pledge in Responder
   Mode (BRSKI-PRM).  BRSKI-PRM supports the secure bootstrapping of
   devices, referred to as pledges, into a domain where direct
   communication with the registrar is either limited or not possible at
   all.  To facilitate interaction between a pledge and a domain
   registrar the registrar-agent is introduced as new component.  The
   registrar-agent supports the reversal of the interaction model from a
   pledge-initiated mode, to a pledge-responding mode, where the pledge
   is in a server role.  To establish the trust relation between pledge
   and registrar, BRSKI-PRM relies on object security rather than
   transport security.  This approach is agnostic to enrollment
   protocols that connect a domain registrar to a key infrastructure
   (e.g., domain Certification Authority).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-brski-prm-23"/>
        </reference>
        <reference anchor="CLOUD">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI) Cloud Registrar</title>
            <author fullname="Owen Friel" initials="O." surname="Friel">
              <organization>Cisco</organization>
            </author>
            <author fullname="Rifaat Shekh-Yusef" initials="R." surname="Shekh-Yusef">
              <organization>Ciena</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date day="9" month="September" year="2025"/>
            <abstract>
              <t>   Bootstrapping Remote Secure Key Infrastructures (BRSKI) defines how
   to onboard a device securely into an operator-maintained
   infrastructure.  It assumes that there is local network
   infrastructure for the device to discover.  On networks without that,
   there is nothing present to help onboard the device.

   This document extends BRSKI and defines behavior for bootstrapping
   devices for deployments where no local infrastructure is available,
   such as in a home or remote office.  This document defines how the
   device can use a well-defined "call-home" mechanism to find the
   operator-maintained infrastructure.

   This document defines how to contact a well-known Cloud Registrar,
   and two ways in which the device may be redirected towards the
   operator-maintained infrastructure.  The Cloud Registrar enables
   discovery of the operator-maintained infrastructure, and may enable
   establishment of trust with operator-maintained infrastructure that
   does not support BRSKI mechanisms.

   This document updates RFC 8995 (BRSKI).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-brski-cloud-19"/>
        </reference>
        <reference anchor="IDEVID" target="https://1.ieee802.org/security/802-1ar/">
          <front>
            <title>IEEE 802.1AR Secure Device Identifier</title>
            <author>
              <organization>IEEE Standard</organization>
            </author>
            <date year="2018"/>
          </front>
        </reference>
        <reference anchor="RFC8791">
          <front>
            <title>YANG Data Structure Extensions</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Björklund" initials="M." surname="Björklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="June" year="2020"/>
            <abstract>
              <t>This document describes YANG mechanisms for defining abstract data structures with YANG.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8791"/>
          <seriesInfo name="DOI" value="10.17487/RFC8791"/>
        </reference>
        <reference anchor="eid7263" target="https://www.rfc-editor.org/errata/eid7263">
          <front>
            <title>Errata 7263, RFC8995</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC7951">
          <front>
            <title>JSON Encoding of Data Modeled with YANG</title>
            <author fullname="L. Lhotka" initials="L." surname="Lhotka"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>This document defines encoding rules for representing configuration data, state data, parameters of Remote Procedure Call (RPC) operations or actions, and notifications defined using YANG as JavaScript Object Notation (JSON) text.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7951"/>
          <seriesInfo name="DOI" value="10.17487/RFC7951"/>
        </reference>
        <reference anchor="RFC2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC7120">
          <front>
            <title>Early IANA Allocation of Standards Track Code Points</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <date month="January" year="2014"/>
            <abstract>
              <t>This memo describes the process for early allocation of code points by IANA from registries for which "Specification Required", "RFC Required", "IETF Review", or "Standards Action" policies apply. This process can be used to alleviate the problem where code point allocation is needed to facilitate desired or required implementation and deployment experience prior to publication of an RFC, which would normally trigger code point allocation. The procedures in this document are intended to apply only to IETF Stream documents.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="100"/>
          <seriesInfo name="RFC" value="7120"/>
          <seriesInfo name="DOI" value="10.17487/RFC7120"/>
        </reference>
        <reference anchor="RFC7250">
          <front>
            <title>Using Raw Public Keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="P. Wouters" initials="P." role="editor" surname="Wouters"/>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
            <author fullname="J. Gilmore" initials="J." surname="Gilmore"/>
            <author fullname="S. Weiler" initials="S." surname="Weiler"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>This document specifies a new certificate type and two TLS extensions for exchanging raw public keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS). The new certificate type allows raw public keys to be used for authentication.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7250"/>
          <seriesInfo name="DOI" value="10.17487/RFC7250"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC3688">
          <front>
            <title>The IETF XML Registry</title>
            <author fullname="M. Mealling" initials="M." surname="Mealling"/>
            <date month="January" year="2004"/>
            <abstract>
              <t>This document describes an IANA maintained registry for IETF standards which use Extensible Markup Language (XML) related items such as Namespaces, Document Type Declarations (DTDs), Schemas, and Resource Description Framework (RDF) Schemas.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="81"/>
          <seriesInfo name="RFC" value="3688"/>
          <seriesInfo name="DOI" value="10.17487/RFC3688"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC6125">
          <front>
            <title>Representation and Verification of Domain-Based Application Service Identity within Internet Public Key Infrastructure Using X.509 (PKIX) Certificates in the Context of Transport Layer Security (TLS)</title>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="J. Hodges" initials="J." surname="Hodges"/>
            <date month="March" year="2011"/>
            <abstract>
              <t>Many application technologies enable secure communication between two entities by means of Internet Public Key Infrastructure Using X.509 (PKIX) certificates in the context of Transport Layer Security (TLS). This document specifies procedures for representing and verifying the identity of application services in such interactions. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6125"/>
          <seriesInfo name="DOI" value="10.17487/RFC6125"/>
        </reference>
        <reference anchor="RFC6241">
          <front>
            <title>Network Configuration Protocol (NETCONF)</title>
            <author fullname="R. Enns" initials="R." role="editor" surname="Enns"/>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <author fullname="J. Schoenwaelder" initials="J." role="editor" surname="Schoenwaelder"/>
            <author fullname="A. Bierman" initials="A." role="editor" surname="Bierman"/>
            <date month="June" year="2011"/>
            <abstract>
              <t>The Network Configuration Protocol (NETCONF) defined in this document provides mechanisms to install, manipulate, and delete the configuration of network devices. It uses an Extensible Markup Language (XML)-based data encoding for the configuration data as well as the protocol messages. The NETCONF protocol operations are realized as remote procedure calls (RPCs). This document obsoletes RFC 4741. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6241"/>
          <seriesInfo name="DOI" value="10.17487/RFC6241"/>
        </reference>
        <reference anchor="RFC7435">
          <front>
            <title>Opportunistic Security: Some Protection Most of the Time</title>
            <author fullname="V. Dukhovni" initials="V." surname="Dukhovni"/>
            <date month="December" year="2014"/>
            <abstract>
              <t>This document defines the concept "Opportunistic Security" in the context of communications protocols. Protocol designs based on Opportunistic Security use encryption even when authentication is not available, and use authentication when possible, thereby removing barriers to the widespread use of encryption on the Internet.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7435"/>
          <seriesInfo name="DOI" value="10.17487/RFC7435"/>
        </reference>
        <reference anchor="RFC8040">
          <front>
            <title>RESTCONF Protocol</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes an HTTP-based protocol that provides a programmatic interface for accessing data defined in YANG, using the datastore concepts defined in the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8040"/>
          <seriesInfo name="DOI" value="10.17487/RFC8040"/>
        </reference>
        <reference anchor="RFC8340">
          <front>
            <title>YANG Tree Diagrams</title>
            <author fullname="M. Bjorklund" initials="M." surname="Bjorklund"/>
            <author fullname="L. Berger" initials="L." role="editor" surname="Berger"/>
            <date month="March" year="2018"/>
            <abstract>
              <t>This document captures the current syntax used in YANG module tree diagrams. The purpose of this document is to provide a single location for this definition. This syntax may be updated from time to time based on the evolution of the YANG language.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="215"/>
          <seriesInfo name="RFC" value="8340"/>
          <seriesInfo name="DOI" value="10.17487/RFC8340"/>
        </reference>
        <reference anchor="RFC8366" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8366.xml">
          <front>
            <title>A Voucher Artifact for Bootstrapping Protocols</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
            <author fullname="T. Eckert" initials="T." surname="Eckert"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>This document defines a strategy to securely assign a pledge to an owner using an artifact signed, directly or indirectly, by the pledge's manufacturer. This artifact is known as a "voucher".</t>
              <t>This document defines an artifact format as a YANG-defined JSON document that has been signed using a Cryptographic Message Syntax (CMS) structure. Other YANG-derived formats are possible. The voucher artifact is normally generated by the pledge's manufacturer (i.e., the Manufacturer Authorized Signing Authority (MASA)).</t>
              <t>This document only defines the voucher artifact, leaving it to other documents to describe specialized protocols for accessing it.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8366"/>
          <seriesInfo name="DOI" value="10.17487/RFC8366"/>
        </reference>
        <reference anchor="RFC8792">
          <front>
            <title>Handling Long Lines in Content of Internet-Drafts and RFCs</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="E. Auerswald" initials="E." surname="Auerswald"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <author fullname="Q. Wu" initials="Q." surname="Wu"/>
            <date month="June" year="2020"/>
            <abstract>
              <t>This document defines two strategies for handling long lines in width-bounded text content. One strategy, called the "single backslash" strategy, is based on the historical use of a single backslash ('\') character to indicate where line-folding has occurred, with the continuation occurring with the first character that is not a space character (' ') on the next line. The second strategy, called the "double backslash" strategy, extends the first strategy by adding a second backslash character to identify where the continuation begins and is thereby able to handle cases not supported by the first strategy. Both strategies use a self-describing header enabling automated reconstitution of the original content.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8792"/>
          <seriesInfo name="DOI" value="10.17487/RFC8792"/>
        </reference>
        <reference anchor="RFC9525">
          <front>
            <title>Service Identity in TLS</title>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="R. Salz" initials="R." surname="Salz"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>Many application technologies enable secure communication between two entities by means of Transport Layer Security (TLS) with Internet Public Key Infrastructure using X.509 (PKIX) certificates. This document specifies procedures for representing and verifying the identity of application services in such interactions.</t>
              <t>This document obsoletes RFC 6125.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9525"/>
          <seriesInfo name="DOI" value="10.17487/RFC9525"/>
        </reference>
        <referencegroup anchor="COSE" target="https://www.rfc-editor.org/info/std96">
          <reference anchor="RFC9052" target="https://www.rfc-editor.org/info/rfc9052">
            <front>
              <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
              <author fullname="J. Schaad" initials="J." surname="Schaad"/>
              <date month="August" year="2022"/>
              <abstract>
                <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
                <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="96"/>
            <seriesInfo name="RFC" value="9052"/>
            <seriesInfo name="DOI" value="10.17487/RFC9052"/>
          </reference>
          <reference anchor="RFC9338" target="https://www.rfc-editor.org/info/rfc9338">
            <front>
              <title>CBOR Object Signing and Encryption (COSE): Countersignatures</title>
              <author fullname="J. Schaad" initials="J." surname="Schaad"/>
              <date month="December" year="2022"/>
              <abstract>
                <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. CBOR Object Signing and Encryption (COSE) defines a set of security services for CBOR. This document defines a countersignature algorithm along with the needed header parameters and CBOR tags for COSE. This document updates RFC 9052.</t>
              </abstract>
            </front>
            <seriesInfo name="STD" value="96"/>
            <seriesInfo name="RFC" value="9338"/>
            <seriesInfo name="DOI" value="10.17487/RFC9338"/>
          </reference>
        </referencegroup>
        <reference anchor="JWS">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures. Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification. Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="SECUREJOIN">
          <front>
            <title>6tisch Zero-Touch Secure Join protocol</title>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date day="8" month="July" year="2019"/>
            <abstract>
              <t>   This document describes a Zero-touch Secure Join (ZSJ) mechanism to
   enroll a new device (the "pledge") into a IEEE802.15.4 TSCH network
   using the 6tisch signaling mechanisms.  The resulting device will
   obtain a domain specific credential that can be used with either
   802.15.9 per-host pair keying protocols, or to obtain the network-
   wide key from a coordinator.  The mechanism describe here is an
   augmentation to the one-touch mechanism described in
   [I-D.ietf-6tisch-minimal-security], and is a profile of the
   constrained voucher mechanism [I-D.ietf-anima-constrained-voucher].

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-6tisch-dtsecurity-zerotouch-join-04"/>
        </reference>
        <reference anchor="YANG-GUIDE">
          <front>
            <title>Guidelines for Authors and Reviewers of Documents Containing YANG Data Models</title>
            <author fullname="A. Bierman" initials="A." surname="Bierman"/>
            <date month="October" year="2018"/>
            <abstract>
              <t>This memo provides guidelines for authors and reviewers of specifications containing YANG modules. Recommendations and procedures are defined, which are intended to increase interoperability and usability of Network Configuration Protocol (NETCONF) and RESTCONF protocol implementations that utilize YANG modules. This document obsoletes RFC 6087.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="216"/>
          <seriesInfo name="RFC" value="8407"/>
          <seriesInfo name="DOI" value="10.17487/RFC8407"/>
        </reference>
        <reference anchor="Stajano99theresurrecting" target="https://www.cl.cam.ac.uk/research/dtg/www/files/publications/public/files/tr.1999.2.pdf">
          <front>
            <title>The Resurrecting Duckling: Security Issues for Ad-Hoc Wireless Networks</title>
            <author initials="F." surname="Stajano" fullname="Frank Stajano">
              <organization/>
            </author>
            <author initials="R." surname="Anderson" fullname="Ross Anderson">
              <organization/>
            </author>
            <date year="1999"/>
          </front>
        </reference>
        <reference anchor="imprinting" target="https://en.wikipedia.org/w/index.php?title=Imprinting_(psychology)&amp;oldid=1337280821">
          <front>
            <title>Wikipedia article: Imprinting (psychology)</title>
            <author>
              <organization>Wikipedia</organization>
            </author>
            <date year="2026" month="March" day="12"/>
          </front>
        </reference>
        <reference anchor="fairhair" target="https://openconnectivity.org/developer/specifications/fairhair/">
          <front>
            <title>Fairhair Specification</title>
            <author>
              <organization>Open Connectivity Foundation</organization>
            </author>
            <date year="2019" month="November" day="01"/>
          </front>
        </reference>
        <reference anchor="RFC8520" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8520.xml">
          <front>
            <title>Manufacturer Usage Description Specification</title>
            <author fullname="E. Lear" initials="E." surname="Lear"/>
            <author fullname="R. Droms" initials="R." surname="Droms"/>
            <author fullname="D. Romascanu" initials="D." surname="Romascanu"/>
            <date month="March" year="2019"/>
            <abstract>
              <t>This memo specifies a component-based architecture for Manufacturer Usage Descriptions (MUDs). The goal of MUD is to provide a means for end devices to signal to the network what sort of access and network functionality they require to properly function. The initial focus is on access control. Later work can delve into other aspects.</t>
              <t>This memo specifies two YANG modules, IPv4 and IPv6 DHCP options, a Link Layer Discovery Protocol (LLDP) TLV, a URL, an X.509 certificate extension, and a means to sign and verify the descriptions.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8520"/>
          <seriesInfo name="DOI" value="10.17487/RFC8520"/>
        </reference>
        <reference anchor="RFC9499">
          <front>
            <title>DNS Terminology</title>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
              <t>This document updates RFC 2308 by clarifying the definitions of "forwarder" and "QNAME". It obsoletes RFC 8499 by adding multiple terms and clarifications. Comprehensive lists of changed and new definitions can be found in Appendices A and B.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="219"/>
          <seriesInfo name="RFC" value="9499"/>
          <seriesInfo name="DOI" value="10.17487/RFC9499"/>
        </reference>
        <reference anchor="I-D.ietf-lake-authz">
          <front>
            <title>Lightweight Authorization using Ephemeral Diffie-Hellman Over COSE (ELA)</title>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Mališa Vučinić" initials="M." surname="Vučinić">
              <organization>INRIA</organization>
            </author>
            <author fullname="Geovane Fedrecheski" initials="G." surname="Fedrecheski">
              <organization>INRIA</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date day="2" month="March" year="2026"/>
            <abstract>
              <t>   Ephemeral Diffie-Hellman Over COSE (EDHOC) is a lightweight
   authenticated key exchange protocol intended for use in constrained
   scenarios.  This document specifies Lightweight Authorization using
   EDHOC (ELA).  The procedure allows authorizing enrollment of new
   devices using the extension point defined in EDHOC.  ELA is
   applicable to zero-touch onboarding of new devices to a constrained
   network leveraging trust anchors installed at manufacture time.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lake-authz-07"/>
        </reference>
        <reference anchor="I-D.vangeest-lamps-cms-euf-cma-signeddata">
          <front>
            <title>Best Practices for CMS SignedData with Regards to Signed Attributes</title>
            <author fullname="Daniel Van Geest" initials="D." surname="Van Geest">
              <organization>CryptoNext Security</organization>
            </author>
            <author fullname="Falko Strenzke" initials="F." surname="Strenzke">
              <organization>MTG AG</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>   The Cryptographic Message Syntax (CMS) has different signature
   verification behaviour based on whether signed attributes are present
   or not.  This results in a potential existential forgery
   vulnerability in CMS and protocols which use CMS.  This document
   describes the vulnerability and lists best practices and mitigations
   for such a vulnerability.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-vangeest-lamps-cms-euf-cma-signeddata-02"/>
        </reference>
        <reference anchor="RFC9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="RFC4648" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4648.xml">
          <front>
            <title>The Base16, Base32, and Base64 Data Encodings</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <date month="October" year="2006"/>
            <abstract>
              <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4648"/>
          <seriesInfo name="DOI" value="10.17487/RFC4648"/>
        </reference>
        <reference anchor="RFC3696">
          <front>
            <title>Application Techniques for Checking and Transformation of Names</title>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <date month="February" year="2004"/>
            <abstract>
              <t>Many Internet applications have been designed to deduce top-level domains (or other domain name labels) from partial information. The introduction of new top-level domains, especially non-country-code ones, has exposed flaws in some of the methods used by these applications. These flaws make it more difficult, or impossible, for users of the applications to access the full Internet. This memo discusses some of the techniques that have been used and gives some guidance for minimizing their negative impact as the domain name environment evolves. This document draws summaries of the applicable rules together in one place and supplies references to the actual standards. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3696"/>
          <seriesInfo name="DOI" value="10.17487/RFC3696"/>
        </reference>
      </references>
    </references>
    <?line 1869?>

<section anchor="examples">
      <name>Examples</name>
      <section anchor="key-pairs-associated-with-examples">
        <name>Key pairs associated with examples</name>
        <t>The following Voucher Request has been produced using the IDevID <xref target="IDEVID"/> public (certificate) and private key.
They are included so that other developers can match the same output.</t>
        <t>The private RSA key:</t>
        <artwork><![CDATA[
-----BEGIN EC PRIVATE KEY-----
MHcCAQEEIBHNh6r8QRevRuo+tEmBJeFjQKf6bpFA/9NGoltv+9sNoAoGCCqGSM49
AwEHoUQDQgAEA6N1Q4ezfMAKmoecrfb0OBMc1AyEH+BATkF58FsTSyBxs0SbSWLx
FjDOuwB9gLGn2TsTUJumJ6VPw5Z/TP4hJw==
-----END EC PRIVATE KEY-----
]]></artwork>
        <t>The IDevID certificate (public key):</t>
        <artwork><![CDATA[
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
]]></artwork>
        <t>The Certification Authority that created the IDevID:</t>
        <artwork><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 1016146354 (0x3c9129b2)
        Signature Algorithm: sha256WithRSAEncryption
        Issuer: CN = highway-test.example.com CA
        Validity
            Not Before: Apr  5 19:36:57 2021 GMT
            Not After : May  6 05:36:57 2021 GMT
        Subject: CN = highway-test.example.com CA
        Subject Public Key Info:
            Public Key Algorithm: rsaEncryption
                Public-Key: (3072 bit)
                Modulus:
                    00:b4:7b:27:42:49:9f:ed:85:47:74:ff:f6:50:cd:
                    5d:22:1a:64:38:22:f8:09:d2:d6:f3:60:d8:98:7f:
                    e5:84:52:1e:d9:ce:96:b4:dc:a6:43:74:67:27:d9:
                    9d:42:7d:bf:1a:43:92:9b:d1:dd:34:9b:41:d2:e3:
                    d5:59:b3:40:fc:b3:c9:e1:58:84:3f:87:f7:06:45:
                    25:26:4c:bf:a1:45:72:a0:0a:5b:86:41:d7:8e:be:
                    d3:38:b5:aa:66:69:bd:3a:fd:e9:b5:b8:a2:79:c4:
                    f0:a5:3c:9e:91:94:32:1e:9c:b0:7f:25:46:5b:76:
                    1d:86:23:85:b0:62:45:5c:a8:6f:fb:c5:26:e1:dd:
                    a8:f2:68:ab:c5:8c:b4:58:b4:2e:96:49:fa:fe:d2:
                    ea:a5:11:68:c2:8d:f4:58:ab:30:bd:dd:1b:29:97:
                    00:18:6f:59:40:9c:3a:2a:e4:96:25:bb:12:f4:1a:
                    11:72:6d:31:f6:b4:e1:cc:d8:9a:0c:aa:a8:aa:a4:
                    64:e3:f1:06:1c:c0:09:df:62:ba:04:cb:70:b0:c4:
                    f7:ca:35:22:ea:a9:c7:52:e1:ce:27:fb:6c:52:39:
                    b7:22:b3:5d:97:cb:0a:9f:75:a3:af:16:ef:e6:b2:
                    1b:6a:c3:0b:1d:15:fd:b8:d8:e7:8a:f6:f4:99:1c:
                    23:97:4b:80:e9:79:a3:85:16:f8:dd:bd:77:ef:3a:
                    3c:8e:e7:75:56:67:36:3a:dd:42:7b:84:2f:64:2f:
                    13:0e:fa:b0:3b:11:13:7e:ae:78:a6:2f:46:dd:4b:
                    11:88:e4:7b:19:ab:21:2d:1f:34:ba:61:cd:51:84:
                    a5:ec:6a:c1:90:20:70:e3:aa:f4:01:fd:0c:6e:cd:
                    04:47:99:31:70:79:6c:af:41:78:c1:04:2a:43:78:
                    84:8a:fe:c3:3d:f2:41:c8:2a:a1:10:e0:b7:b4:4f:
                    4e:e6:26:79:ac:49:64:cf:57:1e:2e:e3:2f:58:bd:
                    6f:30:00:67:d7:8b:d6:13:60:bf
                Exponent: 65537 (0x10001)
        X509v3 extensions:
            X509v3 Basic Constraints: critical
                CA:TRUE
            X509v3 Key Usage: critical
                Certificate Sign, CRL Sign
            X509v3 Subject Key Identifier: 
                33:12:45:B7:1B:10:BE:F3:CB:64:E5:4C:50:80:7C:9D:88:\
                                                             65:74:40
            X509v3 Authority Key Identifier: 
                33:12:45:B7:1B:10:BE:F3:CB:64:E5:4C:50:80:7C:9D:88:\
                                                             65:74:40
    Signature Algorithm: sha256WithRSAEncryption
    Signature Value:
        05:37:28:85:37:39:71:87:ec:5c:f0:51:19:55:4a:b7:e0:2a:
        e6:61:30:d4:e2:2b:ad:7a:db:12:fc:8a:a6:6e:15:82:80:10:
        fa:5d:67:60:e8:54:14:e3:89:d6:4e:60:89:98:5b:ab:fe:32:
        26:aa:02:35:68:4e:c6:2e:ce:08:36:d1:ea:a0:97:3d:76:38:
        6e:9d:4b:6f:33:d2:fa:c2:7e:b0:59:bc:75:97:17:d1:1b:c5:
        c4:58:ae:7b:7e:87:e5:87:2b:8b:6b:10:16:70:7c:c8:65:c7:
        d0:62:5d:f3:b5:06:af:03:8b:32:dd:88:f0:07:2b:5d:61:58:
        61:35:54:a6:ce:95:81:a2:6e:fa:b5:aa:25:e1:41:53:9d:e7:
        4b:7e:93:88:79:6b:dd:a3:6e:9a:0d:bd:85:b4:2d:66:b9:cc:
        01:13:f1:b5:d5:91:cc:86:5e:a7:c8:4a:8f:4d:9d:f8:17:31:
        32:7d:50:d5:c2:79:a0:41:a0:69:83:33:16:14:35:26:10:3b:
        23:eb:60:d9:28:68:99:d5:55:61:89:b5:35:5d:8b:fe:b1:96:
        32:69:3e:8b:c2:a2:4e:e1:d8:76:04:3c:87:91:5d:66:9e:81:
        a5:bf:18:2e:3e:39:da:4f:68:57:46:d2:1d:aa:81:51:3b:33:
        72:da:e9:7d:12:b6:a1:fc:c7:1d:c1:9c:bd:92:e8:1b:d2:06:
        e8:0b:82:2a:4f:23:5a:7a:fa:7b:86:a0:d7:c1:46:e7:04:47:
        77:11:cd:da:7c:50:32:d2:6f:fd:1e:0a:df:cf:b1:20:d2:86:
        ce:40:5a:27:61:49:2f:71:f5:04:ac:eb:c6:03:70:a4:70:13:
        4a:af:41:35:83:dc:55:c0:29:7f:12:4f:d0:f1:bb:f7:61:4a:
        9f:8d:61:b0:5e:89:46:49:e3:27:8b:42:82:5e:af:14:d5:d9:
        91:69:3d:af:11:70:5b:a3:92:3b:e3:c8:2a:a4:38:e5:88:f2:
        6f:09:f4:e5:04:3b
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
]]></artwork>
        <t>The private key for the Certification Authority that created the IDevID:</t>
        <artwork><![CDATA[
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
]]></artwork>
        <t>The MASA certificate that signs the Voucher:</t>
        <artwork><![CDATA[
-----BEGIN CERTIFICATE-----
MIIBcDCB9qADAgECAgQLhwoxMAoGCCqGSM49BAMCMCYxJDAiBgNVBAMMG2hpZ2h3
YXktdGVzdC5leGFtcGxlLmNvbSBDQTAeFw0yMTA0MTMyMTQwMTZaFw0yMzA0MTMy
MTQwMTZaMCgxJjAkBgNVBAMMHWhpZ2h3YXktdGVzdC5leGFtcGxlLmNvbSBNQVNB
MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEqgQVo0S54kT4yfkbBxumdHOcHrps
qbOpMKmiMln3oB1HAW25MJV+gqi4tMFfSJ0iEwt8kszfWXK4rLgJS2mnpaMQMA4w
DAYDVR0TAQH/BAIwADAKBggqhkjOPQQDAgNpADBmAjEArsthLdRcjW6GqgsGHcbT
YLoyczYl0yOFSYcczpQjeRqeQVUkHRUioUi7CsCrPBNzAjEAhjxns5Wi4uX5rfkd
nME0Mnj1z+rVRwOfAL/QWctRwpgEgSSKURNQsXWyL52otPS5
-----END CERTIFICATE-----
]]></artwork>
        <t>The private key for MASA certificate signs the Voucher:</t>
        <artwork><![CDATA[
-----BEGIN EC PRIVATE KEY-----
MHcCAQEEIFhdd0eDdzip67kXx72K+KHGJQYJHNy8pkiLJ6CcvxMGoAoGCCqGSM49
AwEHoUQDQgAEqgQVo0S54kT4yfkbBxumdHOcHrpsqbOpMKmiMln3oB1HAW25MJV+
gqi4tMFfSJ0iEwt8kszfWXK4rLgJS2mnpQ==
-----END EC PRIVATE KEY-----
]]></artwork>
      </section>
      <section anchor="example-cms-signed-voucher-request">
        <name>Example CMS-signed Voucher Request</name>
        <artwork><![CDATA[
MIIGjQYJKoZIhvcNAQcCoIIGfjCCBnoCAQExDTALBglghkgBZQMEAgEwggOl
BgkqhkiG9w0BBwGgggOWBIIDknsiaWV0Zi12b3VjaGVyLXJlcXVlc3Q6dm91
Y2hlciI6eyJhc3NlcnRpb24iOiJwcm94aW1pdHkiLCJjcmVhdGVkLW9uIjoi
MjAyMi0wNy0xMFQxNzowODoxOC41OTgtMDQ6MDAiLCJzZXJpYWwtbnVtYmVy
IjoiMDAtRDAtRTUtRjItMDAtMDIiLCJub25jZSI6IjR2VHNwcFMyQ2VxQnpo
RWRvaWZNMmciLCJwcm94aW1pdHktcmVnaXN0cmFyLWNlcnQiOiJNSUlDRURD
Q0FaYWdBd0lCQWdJRVlGYTZaVEFLQmdncWhrak9QUVFEQWpCdE1SSXdFQVlL
Q1pJbWlaUHlMR1FCR1JZQ1kyRXhHVEFYQmdvSmtpYUprL0lzWkFFWkZnbHpZ
VzVrWld4dFlXNHhQREE2QmdOVkJBTU1NMlp2ZFc1MFlXbHVMWFJsYzNRdVpY
aGhiWEJzWlM1amIyMGdWVzV6ZEhKMWJtY2dSbTkxYm5SaGFXNGdVbTl2ZENC
RFFUQWVGdzB5TVRFeE1qUXhPVFF6TURWYUZ3MHlNekV4TWpReE9UUXpNRFZh
TUZNeEVqQVFCZ29Ka2lhSmsvSXNaQUVaRmdKallURVpNQmNHQ2dtU0pvbVQ4
aXhrQVJrV0NYTmhibVJsYkcxaGJqRWlNQ0FHQTFVRUF3d1pabTkxYm5SaGFX
NHRkR1Z6ZEM1bGVHRnRjR3hsTG1OdmJUQlpNQk1HQnlxR1NNNDlBZ0VHQ0Nx
R1NNNDlBd0VIQTBJQUJKWmxVSEkwdXAvbDNlWmY5dkNCYitsSW5vRU1FZ2M3
Um8rWFpDdGpBSTBDRDFmSmZKUi9oSXl5RG1IV3lZaU5GYlJDSDlmeWFyZmt6
Z1g0cDB6VGl6cWpQakE4TUNvR0ExVWRKUUVCL3dRZ01CNEdDQ3NHQVFVRkJ3
TWNCZ2dyQmdFRkJRY0RBZ1lJS3dZQkJRVUhBd0V3RGdZRFZSMFBBUUgvQkFR
REFnZUFNQW9HQ0NxR1NNNDlCQU1DQTJnQU1HVUNNUUNkU1pSSjgzTU5SQ3ph
Myt2T0JhMDFoNHFadjJsS2hkK0RmaEI0WURodkdwa1dvbFplSEh3TmI3QXRC
Q010YlV3Q01Ib054b2lrK3hXN0F0MWhYRWhwMy9NY1hpQWR6blpicFZxK3hK
RVppaFhVMzZJQmp2WWdXREY5aXZxeEpwRGJ5dz09In19oIIBszCCAa8wggE1
oAMCAQICBB8Y/ucwCgYIKoZIzj0EAwIwJjEkMCIGA1UEAwwbaGlnaHdheS10
ZXN0LmV4YW1wbGUuY29tIENBMCAXDTIxMDQyNzE4MjkzMFoYDzI5OTkxMjMx
MDAwMDAwWjAcMRowGAYDVQQFExEwMC1EMC1FNS1GMi0wMC0wMjBZMBMGByqG
SM49AgEGCCqGSM49AwEHA0IABAOjdUOHs3zACpqHnK329DgTHNQMhB/gQE5B
efBbE0sgcbNEm0li8RYwzrsAfYCxp9k7E1CbpielT8OWf0z+ISejWTBXMB0G
A1UdDgQWBBRFiMyWlgBkN7C6I2VkZFQIBmxWrTAJBgNVHRMEAjAAMCsGCCsG
AQUFBwEgBB8WHWhpZ2h3YXktdGVzdC5leGFtcGxlLmNvbTo5NDQzMAoGCCqG
SM49BAMCA2gAMGUCMGIq27409xvLhd4mjkMA+Q2IyHeo3TwIQFS87D223HAr
w3/KGSGaoKvFUY6q3zbeiwIxALJdWfhHx+0Dl6jAx6iB+qiG7WdkN1F6bpyj
gk1trbzzNZ6daqJtf38lHAPv8LqbcTGCAQQwggEAAgEBMC4wJjEkMCIGA1UE
AwwbaGlnaHdheS10ZXN0LmV4YW1wbGUuY29tIENBAgQfGP7nMAsGCWCGSAFl
AwQCAaBpMBgGCSqGSIb3DQEJAzELBgkqhkiG9w0BBwEwHAYJKoZIhvcNAQkF
MQ8XDTIyMDcxMDIxMDgxOFowLwYJKoZIhvcNAQkEMSIEIFc4jO6OnilTLkM/
fcc9p5au4ANjvJvjRXsAKK6+RcTvMAoGCCqGSM49BAMCBEcwRQIhAOjoOdgh
Sr+Hk2r2APsfs1+QJba0uRf/+zXA70yb6mRCAiB9aS6Wj8kBcWEvvfsDue41
KWo0ukOBQxdPGpJqg+GAMw==
]]></artwork>
      </section>
      <section anchor="example-cms-signed-voucher-from-masa">
        <name>Example CMS-signed Voucher from MASA</name>
        <artwork><![CDATA[
MIIGPQYJKoZIhvcNAQcCoIIGLjCCBioCAQExDTALBglghkgBZQMEAgEwggOU
BgkqhkiG9w0BBwGgggOFBIIDgXsiaWV0Zi12b3VjaGVyOnZvdWNoZXIiOnsi
YXNzZXJ0aW9uIjoibG9nZ2VkIiwiY3JlYXRlZC1vbiI6IjIwMjItMDctMTBU
MTc6MDg6MTguNzIwLTA0OjAwIiwic2VyaWFsLW51bWJlciI6IjAwLUQwLUU1
LUYyLTAwLTAyIiwibm9uY2UiOiI0dlRzcHBTMkNlcUJ6aEVkb2lmTTJnIiwi
cGlubmVkLWRvbWFpbi1jZXJ0IjoiTUlJQ0VEQ0NBWmFnQXdJQkFnSUVZRmE2
WlRBS0JnZ3Foa2pPUFFRREFqQnRNUkl3RUFZS0NaSW1pWlB5TEdRQkdSWUNZ
MkV4R1RBWEJnb0praWFKay9Jc1pBRVpGZ2x6WVc1a1pXeHRZVzR4UERBNkJn
TlZCQU1NTTJadmRXNTBZV2x1TFhSbGMzUXVaWGhoYlhCc1pTNWpiMjBnVlc1
emRISjFibWNnUm05MWJuUmhhVzRnVW05dmRDQkRRVEFlRncweU1URXhNalF4
T1RRek1EVmFGdzB5TXpFeE1qUXhPVFF6TURWYU1GTXhFakFRQmdvSmtpYUpr
L0lzWkFFWkZnSmpZVEVaTUJjR0NnbVNKb21UOGl4a0FSa1dDWE5oYm1SbGJH
MWhiakVpTUNBR0ExVUVBd3daWm05MWJuUmhhVzR0ZEdWemRDNWxlR0Z0Y0d4
bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUFCSlps
VUhJMHVwL2wzZVpmOXZDQmIrbElub0VNRWdjN1JvK1haQ3RqQUkwQ0QxZkpm
SlIvaEl5eURtSFd5WWlORmJSQ0g5ZnlhcmZremdYNHAwelRpenFqUGpBOE1D
b0dBMVVkSlFFQi93UWdNQjRHQ0NzR0FRVUZCd01jQmdnckJnRUZCUWNEQWdZ
SUt3WUJCUVVIQXdFd0RnWURWUjBQQVFIL0JBUURBZ2VBTUFvR0NDcUdTTTQ5
QkFNQ0EyZ0FNR1VDTVFDZFNaUko4M01OUkN6YTMrdk9CYTAxaDRxWnYybEto
ZCtEZmhCNFlEaHZHcGtXb2xaZUhId05iN0F0QkNNdGJVd0NNSG9OeG9payt4
VzdBdDFoWEVocDMvTWNYaUFkem5aYnBWcSt4SkVaaWhYVTM2SUJqdllnV0RG
OWl2cXhKcERieXc9PSJ9faCCAXQwggFwMIH2oAMCAQICBAuHCjEwCgYIKoZI
zj0EAwIwJjEkMCIGA1UEAwwbaGlnaHdheS10ZXN0LmV4YW1wbGUuY29tIENB
MB4XDTIxMDQxMzIxNDAxNloXDTIzMDQxMzIxNDAxNlowKDEmMCQGA1UEAwwd
aGlnaHdheS10ZXN0LmV4YW1wbGUuY29tIE1BU0EwWTATBgcqhkjOPQIBBggq
hkjOPQMBBwNCAASqBBWjRLniRPjJ+RsHG6Z0c5weumyps6kwqaIyWfegHUcB
bbkwlX6CqLi0wV9InSITC3ySzN9ZcrisuAlLaaeloxAwDjAMBgNVHRMBAf8E
AjAAMAoGCCqGSM49BAMCA2kAMGYCMQCuy2Et1FyNboaqCwYdxtNgujJzNiXT
I4VJhxzOlCN5Gp5BVSQdFSKhSLsKwKs8E3MCMQCGPGezlaLi5fmt+R2cwTQy
ePXP6tVHA58Av9BZy1HCmASBJIpRE1CxdbIvnai09LkxggEEMIIBAAIBATAu
MCYxJDAiBgNVBAMMG2hpZ2h3YXktdGVzdC5leGFtcGxlLmNvbSBDQQIEC4cK
MTALBglghkgBZQMEAgGgaTAYBgkqhkiG9w0BCQMxCwYJKoZIhvcNAQcBMBwG
CSqGSIb3DQEJBTEPFw0yMjA3MTAyMTA4MThaMC8GCSqGSIb3DQEJBDEiBCBA
77EhoAybh5R6kK89jDefpxRy8Q6rDo1cnlwgvCzXbzAKBggqhkjOPQQDAgRH
MEUCIQD4RnuXwKvYVvwamwVq3VYv7dXcM7bzLg7FXTkhvYqPzwIgXTJxVV5a
cLMAroeHgThS5JU5QA2PJMLGF82UcSNTsEY=
]]></artwork>
      </section>
      <section anchor="example-jws-signed-voucher-from-masa">
        <name>Example JWS-signed Voucher from MASA</name>
        <t>These examples are folded according to the <xref target="RFC8792"/> Single Backslash rule.</t>
        <figure anchor="ExampleVoucherJWSfigure">
          <name>Example JWS Voucher</name>
          <artwork align="left"><![CDATA[
{
  "payload": "eyJpZXRmLXZvdWNoZXI6dm91Y2hlciI6eyJhc3NlcnRpb24iOiJwcm\
94aW1pdHkiLCJzZXJpYWwtbnVtYmVyIjoiY2FmZmUtOTg3NDUiLCJub25jZSI6IjYyYT\
JlNzY5M2Q4MmZjZGEyNjI0ZGU1OGZiNjcyMmU1IiwiY3JlYXRlZC1vbiI6IjIwMjUtMT\
AtMTVUMDA6MDA6MDBaIiwicGlubmVkLWRvbWFpbi1jZXJ0IjoiTUlJQmd6Q0NBU3FnQX\
dJQkFnSUdBV09XZTBSRk1Bb0dDQ3FHU000OUJBTUNNRFV4RXpBUkJnTlZCQW9NQ2sxNV\
FuVnphVzVsYzNNeERUQUxCZ05WQkFjTUJGTnBkR1V4RHpBTkJnTlZCQU1NQmxSbGMzUk\
RRVEFlRncweE9EQTFNalV3T0RRM016QmFGdzB5T0RBMU1qVXdPRFEzTXpCYU1EVXhFek\
FSQmdOVkJBb01DazE1UW5WemFXNWxjM014RFRBTEJnTlZCQWNNQkZOcGRHVXhEekFOQm\
dOVkJBTU1CbFJsYzNSRFFUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDlBd0VIQTBJQU\
JIOUVCdXVXVjdJS09ya040YjdsYTVJb2J5dFduV1p3Rm5QdHVsMDlhd3dVSEZQZStOWW\
M1WjVwdUo2ZEFuK0FrVzFnY1poQlhWR0JBM0crSXlSV1VXU2pKakFrTUJJR0ExVWRFd0\
VCL3dRSU1BWUJBZjhDQVFBd0RnWURWUjBQQVFIL0JBUURBZ0lFTUFvR0NDcUdTTTQ5Qk\
FNQ0EwY0FNRVFDSURlWlc2SWZjeUsvLzBBVFk2S21NYjRNMFFJU1FTZFVGVjdQNzlLWV\
ZJWVVBaUJRMVYrd0xSM1Uzd2NJWnhHSE1ISGx0N2M3ZzFDaFdNRVkveEFoU1NZaWlnPT\
0ifX0",
  "signatures": [
    {
      "protected": "eyJ4NWMiOlsiTUlJQmNEQ0I5cUFEQWdFQ0FnUUxod294TUFv\
R0NDcUdTTTQ5QkFNQ01DWXhKREFpQmdOVkJBTU1HMmhwWjJoM1lYa3RkR1Z6ZEM1bGVH\
RnRjR3hsTG1OdmJTQkRRVEFlRncweU1UQTBNVE15TVRRd01UWmFGdzB5TXpBME1UTXlN\
VFF3TVRaYU1DZ3hKakFrQmdOVkJBTU1IV2hwWjJoM1lYa3RkR1Z6ZEM1bGVHRnRjR3hs\
TG1OdmJTQk5RVk5CTUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFcWdR\
Vm8wUzU0a1Q0eWZrYkJ4dW1kSE9jSHJwc3FiT3BNS21pTWxuM29CMUhBVzI1TUpWK2dx\
aTR0TUZmU0owaUV3dDhrc3pmV1hLNHJMZ0pTMm1ucGFNUU1BNHdEQVlEVlIwVEFRSC9C\
QUl3QURBS0JnZ3Foa2pPUFFRREFnTnBBREJtQWpFQXJzdGhMZFJjalc2R3Fnc0dIY2JU\
WUxveWN6WWwweU9GU1ljY3pwUWplUnFlUVZVa0hSVWlvVWk3Q3NDclBCTnpBakVBaGp4\
bnM1V2k0dVg1cmZrZG5NRTBNbmoxeityVlJ3T2ZBTC9RV2N0UndwZ0VnU1NLVVJOUXNY\
V3lMNTJvdFBTNSJdLCJ0eXAiOiJ2b3VjaGVyLWp3cytqc29uIiwiYWxnIjoiRVMyNTYi\
fQ",
      "signature": "s_gJM_4qzz1bxDtqh6Ybip42J_0_Y4CMdrMFb8lpPsAhDHVR\
AESNRL3n6M_F8dGQHm1fu66x83cK9E5cPtEdag"
    }
  ]
}
]]></artwork>
        </figure>
      </section>
    </section>
    <section removeInRFC="true" anchor="sid-allocations">
      <name>SID Allocations</name>
      <t>It is temporarily included for review purposes, following the guidelines in <xref section="6.4.3" sectionFormat="of" target="CORESID"/>.</t>
      <section anchor="voucher-sid-allocations">
        <name>SID Allocations for Voucher</name>
        <sourcecode type="yang-sid+json" markers="true" name="ietf-voucher@2025-12-18.sid"><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

{
  "ietf-sid-file:sid-file": {
    "module-name": "ietf-voucher",
    "module-revision": "2025-12-18",
    "sid-file-version": 5,
    "sid-file-status": "unpublished",
    "dependency-revision": [
      {
        "module-name": "ietf-yang-types",
        "module-revision": "2013-07-15"
      },
      {
        "module-name": "ietf-inet-types",
        "module-revision": "2013-07-15"
      },
      {
        "module-name": "ietf-yang-structure-ext",
        "module-revision": "2020-06-17"
      }
    ],
    "assignment-range": [
      {
        "entry-point": "2450",
        "size": "50"
      }
    ],
    "item": [
      {
        "namespace": "module",
        "identifier": "ietf-voucher",
        "sid": "2450"
      },
      {
        "namespace": "data",
        "identifier": "/ietf-voucher:voucher",
        "sid": "2451"
      },
      {
        "namespace": "data",
        "identifier": "/ietf-voucher:voucher/assertion",
        "sid": "2452"
      },
      {
        "namespace": "data",
        "identifier": "/ietf-voucher:voucher/created-on",
        "sid": "2453"
      },
      {
        "namespace": "data",
        "identifier": "/ietf-voucher:voucher/domain-cert-revocation-\
                                                             checks",
        "sid": "2454"
      },
      {
        "namespace": "data",
        "identifier": "/ietf-voucher:voucher/expires-on",
        "status": "unstable",
        "sid": "2455"
      },
      {
        "namespace": "data",
        "identifier": "/ietf-voucher:voucher/idevid-issuer",
        "sid": "2456"
      },
      {
        "namespace": "data",
        "identifier": "/ietf-voucher:voucher/last-renewal-date",
        "sid": "2457"
      },
      {
        "namespace": "data",
        "identifier": "/ietf-voucher:voucher/nonce",
        "sid": "2458"
      },
      {
        "namespace": "data",
        "identifier": "/ietf-voucher:voucher/pinned-domain-cert",
        "status": "unstable",
        "sid": "2459"
      },
      {
        "namespace": "data",
        "identifier": "/ietf-voucher:voucher/pinned-domain-pubk",
        "status": "unstable",
        "sid": "2460"
      },
      {
        "namespace": "data",
        "identifier": "/ietf-voucher:voucher/pinned-domain-pubk-\
                                                             sha256",
        "status": "unstable",
        "sid": "2461"
      },
      {
        "namespace": "data",
        "identifier": "/ietf-voucher:voucher/serial-number",
        "sid": "2462"
      },
      {
        "namespace": "data",
        "identifier": "/ietf-voucher:voucher/additional-\
                                                  configuration-url",
        "status": "unstable",
        "sid": "2463"
      },
      {
        "namespace": "data",
        "identifier": "/ietf-voucher:voucher/est-domain",
        "status": "unstable",
        "sid": "2464"
      },
      {
        "namespace": "data",
        "identifier": "/ietf-voucher:voucher/manufacturer-private",
        "status": "unstable",
        "sid": "2465"
      },
      {
        "namespace": "data",
        "identifier": "/ietf-voucher:voucher/extensions",
        "status": "unstable",
        "sid": "2466"
      }
    ]
  }
}
]]></sourcecode>
      </section>
      <section anchor="voucher-request-sid-allocations">
        <name>SID Allocations for Voucher Request</name>
        <sourcecode type="yang-sid+json" markers="true" name="ietf-voucher-request@2025-12-18.sid"><![CDATA[
=============== NOTE: '\' line wrapping per RFC 8792 ================

{
  "ietf-sid-file:sid-file": {
    "module-name": "ietf-voucher-request",
    "module-revision": "2025-12-18",
    "sid-file-version": 11,
    "sid-file-status": "unpublished",
    "dependency-revision": [
      {
        "module-name": "ietf-yang-structure-ext",
        "module-revision": "2020-06-17"
      },
      {
        "module-name": "ietf-voucher",
        "module-revision": "2025-12-18"
      }
    ],
    "assignment-range": [
      {
        "entry-point": "2500",
        "size": "50"
      }
    ],
    "item": [
      {
        "namespace": "module",
        "identifier": "ietf-voucher-request",
        "sid": "2500"
      },
      {
        "namespace": "data",
        "identifier": "/ietf-voucher-request:voucher",
        "sid": "2501",
        "status": "unstable"
      },
      {
        "namespace": "data",
        "identifier": "/ietf-voucher-request:voucher/assertion",
        "sid": "2502"
      },
      {
        "namespace": "data",
        "identifier": "/ietf-voucher-request:voucher/created-on",
        "sid": "2503"
      },
      {
        "namespace": "data",
        "identifier": "/ietf-voucher-request:voucher/domain-cert-\
                                                  revocation-checks",
        "sid": "2504"
      },
      {
        "namespace": "data",
        "identifier": "/ietf-voucher-request:voucher/expires-on",
        "sid": "2505"
      },
      {
        "namespace": "data",
        "identifier": "/ietf-voucher-request:voucher/idevid-issuer",
        "sid": "2506"
      },
      {
        "namespace": "data",
        "identifier": "/ietf-voucher-request:voucher/last-renewal-\
                                                               date",
        "sid": "2507"
      },
      {
        "namespace": "data",
        "identifier": "/ietf-voucher-request:voucher/nonce",
        "sid": "2508"
      },
      {
        "namespace": "data",
        "identifier": "/ietf-voucher-request:voucher/pinned-domain-\
                                                               cert",
        "status": "unstable",
        "sid": "2509"
      },
      {
        "namespace": "data",
        "identifier": "/ietf-voucher-request:voucher/prior-signed-\
                                                    voucher-request",
        "sid": "2510"
      },
      {
        "namespace": "data",
        "identifier": "/ietf-voucher-request:voucher/proximity-\
                                                     registrar-cert",
        "status": "unstable",
        "sid": "2511"
      },
      {
        "namespace": "data",
        "identifier": "/ietf-voucher-request:voucher/proximity-\
                                              registrar-pubk-sha256",
        "status": "unstable",
        "sid": "2512"
      },
      {
        "namespace": "data",
        "identifier": "/ietf-voucher-request:voucher/proximity-\
                                                     registrar-pubk",
        "sid": "2513"
      },
      {
        "namespace": "data",
        "identifier": "/ietf-voucher-request:voucher/serial-number",
        "sid": "2514"
      },
      {
        "namespace": "data",
        "identifier": "/ietf-voucher-request:voucher/agent-provided-\
                                           proximity-registrar-cert",
        "status": "unstable",
        "sid": "2515"
      },
      {
        "namespace": "data",
        "identifier": "/ietf-voucher-request:voucher/agent-sign-cert\
                                                                   ",
        "sid": "2516"
      },
      {
        "namespace": "data",
        "identifier": "/ietf-voucher-request:voucher/agent-signed-\
                                                               data",
        "sid": "2517"
      },
      {
        "namespace": "data",
        "identifier": "/ietf-voucher-request:voucher/pinned-domain-\
                                                               pubk",
        "status": "unstable",
        "sid": "2518"
      },
      {
        "namespace": "data",
        "identifier": "/ietf-voucher-request:voucher/pinned-domain-\
                                                        pubk-sha256",
        "status": "unstable",
        "sid": "2519"
      },
      {
        "namespace": "data",
        "identifier": "/ietf-voucher-request:voucher/additional-\
                                                  configuration-url",
        "status": "unstable",
        "sid": "2520"
      },
      {
        "namespace": "data",
        "identifier": "/ietf-voucher-request:voucher/est-domain",
        "status": "unstable",
        "sid": "2521"
      },
      {
        "namespace": "data",
        "identifier": "/ietf-voucher-request:voucher/extensions",
        "status": "unstable",
        "sid": "2522"
      },
      {
        "namespace": "data",
        "identifier": "/ietf-voucher-request:voucher/manufacturer-\
                                                            private",
        "status": "unstable",
        "sid": "2523"
      }
    ]
  }
}
]]></sourcecode>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>The authors would like to thank the following people for
lively discussions on list and in the halls (ordered
by last name):
<contact fullname="William Atwood"/>,
<contact fullname="Michael H. Behringer"/>,
<contact fullname="Steffen Fries"/>,
<contact fullname="Sheng Jiang"/>,
<contact fullname="Thomas Werner"/>.</t>
      <t>This document received directorate reviews from <contact fullname="Tim Wicinkski"/>,
<contact fullname="Thomas Fossati"/>, and <contact fullname="Michal Vaško"/>.
It was shepherded by <contact fullname="Sheng Jiang"/>.</t>
      <t><contact fullname="Max Pritikin"/> and <contact fullname="Kent Watsen"/> were instrumental in creating the original <xref target="RFC8366"/>.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
