Internet DRAFT - draft-eckert-anima-brski-discovery

draft-eckert-anima-brski-discovery







ANIMA                                                     T. Eckert, Ed.
Internet-Draft                                                 Futurewei
Intended status: Standards Track                           D. von Oheimb
Expires: 25 April 2024                                           Siemens
                                                                 E. Dijk
                                                       IoTconsultancy.nl
                                                         23 October 2023


                     Discovery for BRSKI variations
                 draft-eckert-anima-brski-discovery-01

Abstract

   This document specifies how BRSKI entities, such as registrars,
   proxies, pledges or others that are acting as responders, can be
   discovered and selected by BRSKI entities acting as initiators.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on 25 April 2024.

Copyright Notice

   Copyright (c) 2023 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents (https://trustee.ietf.org/
   license-info) in effect on the date of publication of this document.
   Please review these documents carefully, as they describe your rights
   and restrictions with respect to this document.  Code Components
   extracted from this document must include Revised BSD License text as
   described in Section 4.e of the Trust Legal Provisions and are
   provided without warranty as described in the Revised BSD License.



Eckert, et al.            Expires 25 April 2024                 [Page 1]

Internet-Draft               BRSKI-discovery                October 2023


Table of Contents

   1.  Terminology . . . . . . . . . . . . . . . . . . . . . . . . .   3
   2.  Overview  . . . . . . . . . . . . . . . . . . . . . . . . . .   5
   3.  Specification . . . . . . . . . . . . . . . . . . . . . . . .   6
     3.1.  Abstracted BRSKI discovery and selection  . . . . . . . .   6
     3.2.  Variation Contexts  . . . . . . . . . . . . . . . . . . .   6
     3.3.  Variation Types and Choices . . . . . . . . . . . . . . .   7
     3.4.  Variations  . . . . . . . . . . . . . . . . . . . . . . .   8
     3.5.  BRSKI Variations Discovery Registry . . . . . . . . . . .   8
       3.5.1.  BRSKI Variation Contexts table  . . . . . . . . . . .   8
       3.5.2.  BRSKI Variation Type Choices table  . . . . . . . . .   9
       3.5.3.  BRSKI Discoverable Variations table . . . . . . . . .  10
       3.5.4.  Extending or modifying the registry . . . . . . . . .  11
     3.6.  BRSKI Join Proxies support for Variations . . . . . . . .  11
       3.6.1.  Permissible Variations  . . . . . . . . . . . . . . .  12
       3.6.2.  Join Proxy support for Variations . . . . . . . . . .  12
       3.6.3.  Co-location of Proxy and Registrar  . . . . . . . . .  13
     3.7.  BRSKI Pledges support for Variations  . . . . . . . . . .  14
       3.7.1.  BRSKI-PLEDGE context  . . . . . . . . . . . . . . . .  14
     3.8.  Variation signaling and encoding rules for different
           discovery mechanisms  . . . . . . . . . . . . . . . . . .  18
       3.8.1.  DNS-SD  . . . . . . . . . . . . . . . . . . . . . . .  18
       3.8.2.  GRASP . . . . . . . . . . . . . . . . . . . . . . . .  21
       3.8.3.  CORE-LF . . . . . . . . . . . . . . . . . . . . . . .  23
   4.  Updates to existing RFCs  . . . . . . . . . . . . . . . . . .  24
     4.1.  RFC8995 . . . . . . . . . . . . . . . . . . . . . . . . .  24
   5.  IANA considerations . . . . . . . . . . . . . . . . . . . . .  24
     5.1.  BRSKI Variations Discovery Registry (section) . . . . . .  24
     5.2.  Service Names Registry  . . . . . . . . . . . . . . . . .  28
     5.3.  BRSKI Well-Known URIs fixes (opportunistic) . . . . . . .  29
   6.  Security Considerations . . . . . . . . . . . . . . . . . . .  29
   7.  Acknowledgments . . . . . . . . . . . . . . . . . . . . . . .  30
   8.  Draft considerations  . . . . . . . . . . . . . . . . . . . .  30
     8.1.  Open Issues . . . . . . . . . . . . . . . . . . . . . . .  30
     8.2.  Change log  . . . . . . . . . . . . . . . . . . . . . . .  30
   9.  References  . . . . . . . . . . . . . . . . . . . . . . . . .  30
     9.1.  Normative References  . . . . . . . . . . . . . . . . . .  30
     9.2.  Informative References  . . . . . . . . . . . . . . . . .  32
   Appendix A.  Discovery for constrained BRSKI  . . . . . . . . . .  33
     A.1.  Current constrained text for GRASP  . . . . . . . . . . .  33
       A.1.1.  Issues and proposed change  . . . . . . . . . . . . .  35
   Contributors  . . . . . . . . . . . . . . . . . . . . . . . . . .  35
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  36







Eckert, et al.            Expires 25 April 2024                 [Page 2]

Internet-Draft               BRSKI-discovery                October 2023


1.  Terminology

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in
   BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
   capitals, as shown here.

   This document relies on the terminology defined in Section 1.  The
   following terms are described partly in addition.

   Context:  See Variation Context.

   Initiator:  A host that is using an IP transport protocol to initiate
      a connection or transaction to another host called the responder.

   Initiator socket:  A socket consisting of an initiators IP or IPv6
      address, protocol and protocol port number from which it initiates
      connections or transactions to a responder (typically UDP or TCP).

   Objective Name:  See Service Name.

   Resource Type:  See Service Name.

   Responder:  A host that is using an IP transport protocol to respond
      to transaction or connection requests from an Initiator.

   Responder socket:  A socket consisting of a responders IP or IPv6
      address, protocol and protocol port number on which it responds to
      requests of the protocol (typically UDP or TCP).

   Role:  In the context of this document, a type of entity in a
      variation of BRSKI that can act as a responder and whose supported
      variations can be discovered.  BRSKI roles relevant in this
      document include Join Registrar, Join Proxy and Pledge.  The IANA
      registry defined by this document allows to specify variations for
      any roles.  See also Variation Context.

   Socket:  The combination of am IP or IPv6 address, an IP protocol
      that utilizes a port number (such as TCP or UDP) and a port number
      of that protocol.

   Service Name:  The name for (a subset of) the functionality/API
      provided by a discoverable responder socket.  This term is
      inherited from Section 1 but unless otherwise specified also used
      in this document to apply to any other discovery functionality/
      API.  The terminology used by other mechanisms typically differs.
      For example, when Section 1 is used to discover a responder socket



Eckert, et al.            Expires 25 April 2024                 [Page 3]

Internet-Draft               BRSKI-discovery                October 2023


      for BRSKI, the Objective Name carries the equivalent to the
      service name.  In Section 1, the Resource Type (rt=) carries the
      equivalent of the service name.

   Type:  See Variation Type.

   Variation:  A combination one one variation choice each for every
      variation type applicable to the variation context of one
      discoverable BRSKI communications.  For example, in the context of
      BRSKI, a variation is one choice for "mode", one choice for
      "enroll" and once choice for "vformat".

   Variation Context:  A set of Services for whom the same set of
      variations applies

   Variation Type:  The name for one aspect of a protocol for which two
      or more choices exist (or may exist in the future), and where the
      choice can technically be combined orthogonal to other variation
      types.  This document defined the BRSKI variation types "mode",
      "enroll" and "vformat".

   Variation Type Choice:  The name for different values that a
      particular variation type may have.  For example, this document
      does defines the choices "rrm" and "prm" for the BRSKI variation
      "mode".

   ACP:  "An Autonomic Control Plane", [RFC8994].

   BRSKI:  "Bootstrapping Remote Secure Key Infrastructure", [RFC8995].

   BRSKI-AE:  "Alternative Enrollment Protocols in Section 1",
      [I-D.ietf-anima-brski-ae].

   BRSKI-PRM:  "Section 1 with Pledge in Responder Mode",
      [I-D.ietf-anima-brski-prm].

   cBRSKI:  "Constrained Bootstrapping Remote Secure Key Infrastructure
      (Section 1)", [I-D.ietf-anima-constrained-voucher].

   COAP:  "The Constrained Application Protocol (CoAP)", [RFC7252].

   CORE-LF:  "Constrained RESTful Environments (CoRE) Link Format",
      [RFC6690].

   cPROXY:  "Constrained Join Proxy for Bootstrapping Protocols",
      [I-D.ietf-anima-constrained-join-proxy].

   DNS-SD:  "DNS-Based Service Discovery", [RFC6763].



Eckert, et al.            Expires 25 April 2024                 [Page 4]

Internet-Draft               BRSKI-discovery                October 2023


   EST:  "Enrollment over Secure Transport", [RFC7030].

   GRASP:  "GeneRic Autonomic Signaling Protocol", [RFC8990].

   GRASP-DNSSD:  "DNS-SD Compatible Service Discovery in GeneRic
      Autonomic Signaling Protocol (GRASP)",
      [I-D.eckert-anima-grasp-dnssd].

   JWS-VOUCHER:  "JWS signed Voucher Artifacts for Bootstrapping
      Protocols", [I-D.ietf-anima-jws-voucher].

   lwCMP:  "Lightweight Certificate Management Protocol (CMP) Profile",
      [I-D.ietf-lamps-lightweight-cmp-profile].

   mDNS:  "multicast DNS", [RFC6762].

   SCEP:  "Simple Certificate Enrolment Protocol", [RFC8894].

2.  Overview

   The mechanisms described in this document are intended to help solve
   the following challenges.

   Signaling BRSKI variation for responder selection.

   When an initiator such as a proxy or pledge uses a mechanism such as
   Section 1 to discover an instance of a role it intends to connect to,
   such as a registrar, it may discover more than one such instance.  In
   the presence of variations of the BRSKI mechanisms that impact
   interoperability, performance or security, not all discovered
   instances may support exactly what the initiator needs to achieve
   interoperability and/or best performance, security or other metrics.
   In this case, the service announcement mechanism needs to carry the
   necessary additional information beside the name that indicates the
   service to aid the initiator in selecting an instance that it can
   inter operate and achieve best performance with.

   Easier use of additional discovery mechanisms.

   In the presence of different discovery mechanisms, such as Section 1,
   Section 1, Section 1 or others, the details of how to apply each of
   these mechanisms are usually specified individually for each
   mechanism, easily resulting in inconsistencies.  Deriving as much as
   possible the details of discovery from a common specification and
   registries can reduce such inconsistencies and easy introduction of
   additional discovery mechanisms.





Eckert, et al.            Expires 25 April 2024                 [Page 5]

Internet-Draft               BRSKI-discovery                October 2023


   Generalization of principles related to discovery and operation of
   proxies.

   Because of the unified approach to discovery of BRSKI Variations
   described in this document, it also allows to use Section 1 for
   document for Section 1 and Section 1, which may be of interest in
   networks such as Thread, which use Section 1.

3.  Specification

3.1.  Abstracted BRSKI discovery and selection

   In the abstract model of discovery used by this document and intended
   to apply to all described discovery mechanisms, an entity operating
   as an initiator of a transport connection for a particular BRSKI
   protocol role, such as a pledge, discovers one or more responder
   sockets (IP/IPv6-address, responder-port, IP-protocol) of entities
   acting as responders for the peer BRSKI role, such as registrar.  The
   initiator uses some discovery mechanism such as Section 1, Section 1
   or Section 1.  In the the initiator looks for a particular
   combination of a Service Name and an IP-protocol, and in return
   learns about responder sockets from one or more responders that use
   this IP-protocol and serve the requested Service Name type service
   across it.  It also learns the BRSKI variation(s) supported on the
   socket.

   Service Name is the name of the protocol element used in Section 1,
   unless explicitly specified, it is used as a placeholder for the
   equivalent protocol elements in other discovery mechanisms.  In
   Section 1, it is called objective-name, in Section 1 it is called
   Resource Type.

   Upon discovery of the available sockets, the initiator selects one,
   whose supported variation(s) best match the expectations of the
   initiator, including performance, security or other preferences.
   Selection may also include attempting to establish a connection to
   the responder socket, and upon connection failure to attempt
   connecting to the next best responder socket.  This is for example
   necessary when discovery information may not be updated in real-time,
   and the best responder has gone offline.

3.2.  Variation Contexts

   A Variation Context is a set of (Discover Mechanism, Service Names,
   IP-protocols) across which this document and the registry of
   variations defines a common set of variations.  The initial registry
   defined in this document defines two variation contexts.




Eckert, et al.            Expires 25 April 2024                 [Page 6]

Internet-Draft               BRSKI-discovery                October 2023


   BRSKI context:  context for discovery of BRSKI registrar and proxy
      variations by proxies, pledges or agents (as defined in Section 1)
      via the Service Names defined for Section 1 and Section 1 via TCP
      and hence (by default) TLS (version 1.2 or higher according to
      Section 1).

   cBRSKI context (constrained BRSKI):  context for discovery of BRSKI
      registrar and proxy variations by proxies, pledges via the Service
      Names defined for Section 1, Section 1 and Section 1 via UDP, and
      hence (by default) secure COAP.

   Note that the Service Names for cBRSKI include the same Section 1
   Service Names as for the BRSKI context, hence enabling the use of
   Section 1 with cBRSKI.

   This document does not define variations for different end-to-end
   encryption mechanisms, so only the "(by default)" options exist at
   the time of writing this document.  However, the mechanisms described
   here can also be used to introduce backward incompatible new secure
   transport options.  For example when responders start to support only
   TLS 1.3 or higher in the presence of TLS 1.2 only initiators, then
   new variations can be added, such that those initiators will not
   select those responders.

   This document does not introduce variation contexts for discovery of
   other BRSKI roles, such as discovery of pledges by agents (as defined
   in Section 1), or discovery of MASA by registrars.  However, the
   registry introduced by this document is defined such that it can be
   extended by such additional contexts through future documents.

3.3.  Variation Types and Choices

   A Variation Type is a variation in one aspect of the BRSKI connection
   between initiator and responder that ideally orthogonal from
   variations in other aspects of the BRSKI connection.

   A Variation Type Choice is one alternative (aka: value) for its
   Variation Type.

   This document, and the initial registry documenting the variation
   types introduces three variation types as follows:

   mode:  A variation in the basic sequence of URI endpoints








Eckert, et al.            Expires 25 April 2024                 [Page 7]

Internet-Draft               BRSKI-discovery                October 2023


      communicated.  This document introduces the choices of "rrm" to
      indicate the endpoints and sequence as defined in Section 1 and
      "prm" to indicate the endpoints and sequence as defined in
      Section 1.  Note that registrars also act as responders in "prm".
      "rrm" was chosen because the more logical "pim" (pledge initiator
      mode) term was feared to cause confusion with other technologies
      that use that term.

   vformat (voucher format):  A variation in the encoding format of the
      voucher communicated between registrar and pledge.  This document
      introduces the choices "cms" as defined in Section 1, "cose" as
      defined in Section 1 and "jose" as defined in Section 1.

   enroll:  A variation in the URI endpoints used for enrollment of the
      pledge with keying material (trust anchors and certificate
      (chain)).  This document introduces the following :choices

      *  "est" as introduced by Section 1 to indicate the Section 1
         protocol, which is default

      *  "cmp" to indicate the CMP protocol according to the Lightweight
         CMP profile (Section 1).  The respective adaptations to BRSKI
         have been introduced by Section 1.

      *  "scep" to indicate Section 1.  This is only a reservation,
         because no specification for the use of Section 1 with BRSKI
         exists.

3.4.  Variations

   A Variation is the combination of one Choice each for every Variation
   Type applicable to the Variation Context.  In other words, a
   variation is a possible instance of BRSKI if supported by initiator
   and responder.  In Section 1, the default variation is "registrar
   responder mode" (rrm) and use of the "cms voucher format" (cms).

3.5.  BRSKI Variations Discovery Registry

   The IANA "BRSKI Variations Registry" as specified by this document,
   see Section 5.1 specifies the defined parameters for discovery of
   BRSKI variations.

3.5.1.  BRSKI Variation Contexts table

   This table, Table 1, defines the BRSKI Variations Contexts.






Eckert, et al.            Expires 25 April 2024                 [Page 8]

Internet-Draft               BRSKI-discovery                October 2023


   The "Applicable Variation Types" lists the Variation Types from whose
   choices a Variation for this context is formed.  The "Service
   Name(s)" column lists the discovery mechanisms and their Service
   Name(s) that constitute the context.

3.5.2.  BRSKI Variation Type Choices table

   This table, Table 2, defines the Variations Type Choices.

   The "Context" column lists the BRSKI Variation Context(s) to which
   this line applies.  If it is empty, then the same Context(s) apply as
   that of the last prior line with a non-empty Context column.

   The "Variation Type" column lists the BRSKI Variation Type to which
   this line applies.  If it is empty, then the same Variation Type
   applies as that of the last prior line with a non-empty Variation
   Type column.  Variation Types MUST the listed in the order in which
   the Variation Types are listed in the Applicable Variation Types
   column of the BRSKI Variation Contexts table.

   The "Variation Type Choice" column defines a Variation Type Choice
   term within the Context(s) of the line.  To allow the most flexible
   encodings of variations, all Variation Types and Variation Type
   Choices MUST be unique strings (across all Variation Types).  This
   allows to encode Variation Type Choices in a discovery mechanism
   without indicating their Variation Type.  Variation Types and
   Variation Type Choices and MUST be strings from lowercase letters a-z
   and digits 0-9 and MUST start with a letter.  The maximum length of a
   Variation Type Choice is 12 characters.

   The "Reference" column specifies the documents which describe the
   Variation Type Choice.  Relevant specification includes those that
   only specify the semantics without referring to the aspects of
   discovery and/or those that specify only the Discovery aspects.
   Current RFCs for BRSKI variations preceding this RFC typically only
   specify the semantics, and this document adds the discovery aspects.

   The "Dflt" Flag specifies a Variation Type Choice that is assumed to
   be the default Choice for the Context, such as "rrm" for the BRSKI
   context.  Such a Variation Type Choice is to be assumed to be
   supported in discovery if discovery is performed without indication
   of any or an empty signaling element to carry the Variation or
   Variation Choices.  For example, Section 1 specifies the empty string
   "" as the objective-value in Section 1 discovery.  Because "rrm",
   "est" and "cms" are default in the BRSKI context, this Discovery
   signaling indicates the support for those Variation Type Choices.





Eckert, et al.            Expires 25 April 2024                 [Page 9]

Internet-Draft               BRSKI-discovery                October 2023


   The "Dflt_" Flag specifies a Variation Type Choice that is only
   default in a subset of Discovery options in a context.  The Note(s)
   column has then to explain which subset this is.  Like for "Dflt",
   the signaling in this subset of Discovery options can then forego
   indication of the "Dflt_" Variation Type Choice.

   The "Rsvd" Flag specifies a Variation Type Choice for which no
   complete specification exist on how to use it within BRSKI (or more
   specifically the context), but which is known to be of potential
   interest.  "Rsvd" Variation Type Choices MUST NOT be considered for
   the Discoverable Variations table.  They are documented primarily to
   reserve the Variation Type Choice term.

   The Note(s) section expands the Variation Type Choice terms and
   provides additional beneficial specification references beyond the
   "Reference" column.

3.5.3.  BRSKI Discoverable Variations table

   This table Table 3 enumerates the Discoverable Variations and
   categorizes them.

   The "Context" column lists the BRSKI Variation Context(s) to which
   this line applies.  If it is empty, then the same Context(s) apply as
   that of the last prior line with a non-empty Context column.

   The "Spec / Applicability" lists the document(s) that specify the
   variation, if the variation is explicitly described.  If the
   variation is not described explicitly, but rather a combination of
   Variation Type Choices from more than one BRSKI related
   specification, then this column will indicate "-" if by expert
   opinion it is assumed that this variation should work, or "NA", if by
   expert opinion, this variation could not work.  The "Explanations"
   column includes references to the relevant documents and as necessary
   additional explanation.

   The "Variation" column lists the Variation Type Choices that form the
   Variation.  The Variation Type Choices MUST be listed in the order in
   which the Variation Types are listed in the Applicable Variation
   Types column of the BRSKI Variation Contexts table.

   The "Variation String" column has the string term used to indicate
   the variation when using the simple encoding of BRSKI Variation
   Discovery for GRASP as described in Section 1.  It is formed by
   concatenating the Choices term from the Variation column with the "-"
   character, excluding those Choices terms (and "-" concatenator) which
   are Default for the Context.  If this procedure ends up with the
   empty string, then this is indicated as "" in the column.



Eckert, et al.            Expires 25 April 2024                [Page 10]

Internet-Draft               BRSKI-discovery                October 2023


   The "Explanations" column explains the "Spec / Applicability" status
   of the Variation.

3.5.4.  Extending or modifying the registry

   Unless otherwise specified below, extension or changes to the
   registry require standards action.

   Additional Variation Type Choices and Variation Context discovery
   mechanism Service Names including additional discovery mechanisms
   require (only) specification and expert review if they refer to non
   standard action protocols and/or protocol variation aspects.  For
   example, a specification how to use Section 1 with BRSKI would fall
   under this clause as it is an informational RFC.

   Non standards action Variation Type Choices can not be Default(Dflt).
   They can only be Dflt* for non standards action (sub)Contexts.

   Reservation of additional Variation Type Choices requires (only)
   expert review.

   Additional Contexts MUST be added at the end of the BRSKI Variation
   Contexts table.

   Additional Variation Types MUST be added at the end of the Applicable
   Variation Types column of the BRSKI Variation Contexts table and at
   the end of existing lines for the Context in the BRSKI Variation Type
   Choices.  Additional Variation Types MUST be introduced with a
   Default (Dflt) Variation Type Choice.  These rules ensures that the
   rule to create the Variation String for GRASP (and as desired by
   other discovery mechanism), and it also enables to add new Variation
   Type and Choices without changing pre-existing Variation Strings: Any
   Variations String implicitly include the Default Choice for any
   future Variation Types.

   When a new Variation Type is added, their Default Choice SHOULD be
   added to the Variation Column of existing applicable lines in the
   BRSKI Discoverable Variations table.  Variations that include new
   non-Default Variation Type Choices SHOULD be added at the end of the
   existing lines for the Context.

3.6.  BRSKI Join Proxies support for Variations









Eckert, et al.            Expires 25 April 2024                [Page 11]

Internet-Draft               BRSKI-discovery                October 2023


3.6.1.  Permissible Variations

   Variations according to the terminology of this document are those
   that do not require changes to BRSKI join proxy operations, but that
   can transparently pass across existing join proxies without changes
   to them - as long as they support the rules outlined in this
   document.

   Different choices for e.g.: pledge to registrar encryption
   mechanisms, voucher format (vformat), use of different URI endpoints
   or enrollment protocol endpoints (mode) are all transparent to join
   proxies, and hence join proxies can not only support existing, well-
   defined Choices of these Variation Types, but without changes to the
   proxies also future ones - and only those are permitted to become
   Variation Type Choices.

   Changes to the BRSKI mechanism that do require additional changes to
   join proxies are not considered Variations according to this document
   and MUST NOT use the same discovery protocol signaling elements as
   those defined for variations by this document.  Instead, they SHOULD
   use different combinations of Service Name and Protocol (e.g.: TCP
   vs. UDP).

   For example, the stateless join proxy mode defined by Section 1 is
   such a mechanism that requires explicit join proxy support.
   Therefore, registrars sockets that support circuit proxy mode use the
   GRASP objective "AN_join_registrar", and registrar sockets that
   support stateless join proxy mode use the GRASP objective
   "AN_join_registrar_rjp".  This enables join proxies to select the
   registrar and socket according to what the join proxy supports and
   prefers.  By not using the same signaling element(s) for variations,
   join proxies can support discovery of all variations independent of
   their support for stateless join proxy operations.

3.6.2.  Join Proxy support for Variations

   Join proxies supporting the mechanisms of this document MUST signal
   for each socket they announce to initiators via a discovery mechanism
   the Variation(s) supported on the socket.  These Variation(s) MUST
   all be supported by the registrar that the join proxy then uses for
   the connection from the initiator (e.g.: pledge).  Pledges SHOULD
   announce sockets to initiators so that all Variations that are
   supported by registrars that the join proxy can interoperate with are
   also available to the initiators connecting to the join proxy.

   To meet these requirements, join proxies can employ different
   implementation option.  In the most simple one, a join proxy
   allocates a separate responder socket for every Variation for which



Eckert, et al.            Expires 25 April 2024                [Page 12]

Internet-Draft               BRSKI-discovery                October 2023


   it discovers one or more registrars supporting this Variation.  It
   then announces that socket with only that one Variation in the
   discovery mechanism, even if the Registrar(s) are all announcing
   their socket with multiple Variations.  When the join proxy operates
   in circuit mode, it can then select one of the registrars supporting
   the variation for every new initiator connection based on policies as
   specified by BRSKI specifications and/or discovery parameters, such
   as priority and weight when Section 1 is used, and redundant
   registrars include those parameters.

   TBD: insert example of received Registrar announcement and created
   proxy announcement ??

   Join proxies MAY reduce the number of sockets announced to initiators
   by using a single socket for all Variations for which they have the
   same set of registrar sockets supporting those Variations.  This
   primarily helps to reduce the size of the discovery messages to
   initiators and can save socket resources on the join proxy.

   Join proxies MAY create multiple sockets in support of other
   discovery options, even for the same Variation(s).  For example, if
   Section 1 is used by two registrars, both announcing the same
   priority but different weights, then the join proxy may create a
   separate socket for each of these registrars - and their variations,
   so that the join proxy can equally announce the same priority and
   weight for both sockets to initiators.  This allows to maintain the
   desired weights of use of registrars, even when the join proxy
   operates in stateless mode, in which it can not select a separate
   registrar for every client initiating a connection.

3.6.3.  Co-location of Proxy and Registrar

   In networks using Section 1 and Section 1, registrars must have a co-
   located proxy, because pledges can only use single-hop discovery
   (DULL-GRASP) and will only discover proxies, but not registrar.  Such
   a co-located proxy does not constitute additional processing/code on
   a registrar supporting circuit mode, it simply implies that the
   registrars BRSKI services(s) are announced with a proxy Service Name,
   to support pledges, and the registrar service name, to support join
   proxies.

   To ease consistency of deployment models in the face of different
   discovery mechanisms, Variations and non-Variation enhancements to
   BRSKI, it is RECOMMENDED that all future options to BRSKI do always
   have a Service Name for proxies and a separate Service Name in
   support of pledge or other initiators.  Pledges and other initiators
   SHOULD always only look for the proxy Service Name, and only Proxies
   should look for a registrar Service Name.  Registrars therefore



Eckert, et al.            Expires 25 April 2024                [Page 13]

Internet-Draft               BRSKI-discovery                October 2023


   SHOULD always include the proxy functionality according to the prior
   paragraph.  This only involves additional code on the registrar
   beyond the service announcement in case the Registrar would otherwise
   not implement circuit mode.

3.7.  BRSKI Pledges support for Variations

3.7.1.  BRSKI-PLEDGE context

   BRSKI-PLEDGE is the context for discovery of pledges by nodes such as
   registrar-agents.  Pledges supporting Section 1 MUST support it.  It
   may also be used by other variations of BRSKI when supported by
   pledges.

   Pledges supporting BRSKI-PLEDGE MUST support DNS-SD for discovery via
   mDNS, using link-local scope.  For DNS-SD discovery beyond link-local
   scope, pledges SHOULD support DNS-SD via [I-D.ietf-dnssd-srp].

   TBD: Is there sufficient auto-configuration support in
   [I-D.ietf-dnssd-srp], that pledges without any configuration can use
   it, and if so, do we need to raise specific additional requirements
   to enable this in pledges ?

   These DNS-SD requirements are defaults.  Specifications for specific
   deployment contexts such as specific type of radio network solutions
   may need to specify their own requirements overriding or amending
   these requirements.

   Pledges MUST support to be discoverable via their service instance
   name.  They MAY be discoverable via DNS-SD browsing, so that
   registrar-agents can find even unexpected pledges through DNS-SD
   browsing.

   Support for browsing is required to discover over the network pledges
   supporting only Section 1, but not Section 1 if they have no known
   serial-number information from which their service instance name can
   be constructed, so it is a crucial feature for robust enrollment.
   See Section 6 for more details about discovery and BRSKI-PLEDGE.

   When pledges are discoverable vis DNS-SD browsing, they MUST expect
   that a large number of pledges exist in the network at the same time,
   such as in the order of 100 or more, and schedule their responses
   according to the procedures in Section 1 and Section 1 to avoid
   simultaneous reply from all pledges.

   TBD: What is the best section in mDNS/DNS-SD to point to for this
   timed reply to scale ?




Eckert, et al.            Expires 25 April 2024                [Page 14]

Internet-Draft               BRSKI-discovery                October 2023


   Browsing via DNS-SD for a pledge is circumvented by the pledge not
   announcing its PTR RR for "brski-registrar".  Technically, the
   remaining RR may not constitute full DNS-SD service, but they do
   provide the required discovery for the known service instance name of
   the pledge.

   counter measures such as limiting the number and rate of PRM connects
   that they accept, ideally on a per-initiator basis (assuming that
   DDoS attacks are more harder to mount than single attacker DoS
   attacks).

3.7.1.1.  Service Instance Name

   The service instance name chosen by a BRSKI pledge MUST be composed
   from information which is

   *  Easily known by BRSKI operations, such as the operational
      personnel or software automation, specifically sales integration,

   *  Available to the pledges BRSKI software itself, for example by
      being encoded in some attribute of the IDevID.

   Typically, a customer will know the serial number of a product from
   sales information, or even from bar-code/QR-codes on the product
   itself.  If this serial number is used as the service instance name
   to discover a pledge from a registrar-agent, then this may lead to
   possible duplicate replies from two or more pledges having the same
   serial number, such as in the following cases:

   1.  A manufacturer has different product lines and re-uses serial-
       numbers across them.

   2.  Two different manufacturer re-use the same serial-numbers.

   If pledges enable browsing of their service instance name, they MAY
   support Section 1 specified procedures to create unique service
   instance names when they discover such clashes, by appending a space
   and serial number, starting with 2 to the service instance name:
   "<service-instance-name> (2)", as described in Section 1 Appendix D.

   Nevertheless, this approach to resolving conflicts is not desirable:

   *  If browsing of DNS-SD service instance name is not supported,
      registrar-agents would have to always (and mostly wrongly) guess
      that there is a clash and (mostly unnecessarily) search for
      "<service-instance-name> (2)".





Eckert, et al.            Expires 25 April 2024                [Page 15]

Internet-Draft               BRSKI-discovery                October 2023


   *  If a clash exists between pledges from the same manufacturer, and
      even if the registrar-agent then attempts to start enrolling all
      pledges with the same clashing service instance name, it may not
      have enough information to determine which the correct pledge is.
      This would happen especially if the IDevID from both devices (of
      different product type), had the same serial number, and the CA of
      both was the same (because they come from the same manufacturer).
      Even if some other IDevID field was used to distinguish their
      device model, the registrar-agent would not be able to determine
      that difference without additional vendor specific programming.

   In result:

   *  Vendors MUST document a scheme how their pledges form a service
      instance name from information available to the customer of the
      pledge.

   *  These service instance names MUST be unique across all IDevID of
      the manufacturer that share the same CA.

   The following mechanisms are recommended:

   *  Pledges SHOULD encode manufacturer unique product instance
      information in their subject name serialNumber.  [RFC5280] calls
      this the X520SerialNumber.

   *  Pledges SHOULD make this serialNumber information consistent with
      easily accessible product instance information when in physical
      possession of the pledge, such as product type code and serial
      number on bar-code/QR-code to enable Section 1 discovery without
      additional backend sales integration.  Note that discovery alone
      does not allow for enrollment!

   *  Pledges SHOULD construct their service instance name by
      concatenating their X520SerialNumber with a domain name prefix
      that is used by the manufacturer and thus allows to disambiguate
      devices from different manufacturer using the same serialNumber
      scheme, and hence the likelihood of service instance name clashes.













Eckert, et al.            Expires 25 April 2024                [Page 16]

Internet-Draft               BRSKI-discovery                October 2023


Service Instance Name:
  "PID:Model-0815 SN:WLDPC2117A99.example.com"

Manufacturer published Service Instance Name schema:
 PID:\<PID>\\ SN:\<SN>.example.com

Pledge IDevID certificate information:
  ; Format as shown by e.g.: openssh
  Subject: serialNumber = "PID:Model-0815 SN:WLDPC2117A99",
    O = Example, CN = Model-0815

DNS-SD RR for the pledge:
  ; PTR RR to support browsing / discovery of service instance name
  _brski-pledge._tcp.local  IN PTR
    PID:Model-0815\\ SN:WLDPC2117A99\\.example\\.com._brski-pledge._tcp.local

  ; SRC and TXT RR for the service instance name
  PID:Model-0815\\ SN:WLDPC2117A99\\.example\\.com._brski-pledge._tcp.local
    IN SRV 1 1
    PID:Model-0815\\ SN:WLDPC2117A99\\.example\\.com.local
  PID:Model-0815\\ SN:WLDPC2117A99\\.example\\.com._brski-pledge._tcp.local
    IN TXT ""

  ; AAAA address resolution for the target host name
  PID:Model-0815\\ SN:WLDPC2117A99\\.example\\.com.local
    IN AAAA fda3:79a6:f6ee:0000::0200:0000:6400:00a1

             Figure 1: Example service instance name data

   In Figure 1, the manufacturer "example" identifies device instances
   through a product identifier <PID> and a serial number <SN>.  Both
   are printed on labels on the product/packaging and/or communicated
   during purchase of the product.

   The service instance name of pledges from this manufacturer are using
   the string "PID:<PID> SN:<SN>.example.com". "example.com" is assumed
   to be a domain owned by this manufacturer. <PID> and <SN> are
   replaced by the actual strings.

   The IDevID encodes the service instance name without the domain
   ending (".example.com") in the X520SerialNumber field.  Other fields
   of the IDevID are not used.

   The resulting DNS-SD RRs that the pledge announces are shown in the
   example. " " and "." characters are escaped as recommended by
   Section 1.





Eckert, et al.            Expires 25 April 2024                [Page 17]

Internet-Draft               BRSKI-discovery                October 2023


   In this example, the same string as constructed for the service
   instance name is also used as the target host name.  This is of
   course not necessary, but unless the pledge already obtains a host
   name through other DNS means, re-using the same name allows to avoid
   coming up with a second method to construct a unique name.

3.8.  Variation signaling and encoding rules for different discovery
      mechanisms

3.8.1.  DNS-SD

3.8.1.1.  Signaling

   The following definitions apply to any instantiation of DNS-SD
   including DNS-SD via mDNS as defined in Section 1, but also via
   unicast DNS, for example by registering the necessary DNS-SD Resource
   Records (RR) via [I-D.ietf-dnssd-srp] (SRP).

   The requirements in this document do not guarantee interoperability
   when using DNS-SD, instead, they need to be amended with deployment
   specific specifications / requirements as to which signaling
   variation, such as mDNS or unicast DNS with SRP is to be supported
   between initiator and responder.  When using unicast DNS (with SRP),
   additional mechanisms are required to learn the IP / IPv6 address(es)
   of feasible DNS and SRP servers, and deployment may also need
   agreements for the (default) domain they want to use in unicast DNS.
   Hence, a mandatory to implement (MTI) profile is not feasible because
   of the wide range of variations to deploy DNS-SD.

   TBD: We could say that mDNS MUST be supported, unless the network
   context defines an interoperable mode to support DNS-SD without mDNS
   ???

3.8.1.2.  Encoding

   Variation Type Choices defined in the IANA registry Table 3 are
   encoded as Section 1 Keys with a value of 1 in the DNS-SD service
   instances TXT RR.  This is possible because all Variation Type
   Choices are required to be unique across all Variation Types.  It
   also allows to shorten the encoding from "key=1" to just "key" for
   every Variation Type Choice, so that the TXT-DATA encoding can be
   more compact.

   If the TXT Record does not contain a Variation Type Choice for a
   particular applicable Variation Type, then this indicates support for
   the Default Choice of this Variation Type in the context of the DNS-
   SD Service Name.  For example, if the TXT Record is "jose", then this
   indicates support for "rrm" and "est", if the Service Name is brski-



Eckert, et al.            Expires 25 April 2024                [Page 18]

Internet-Draft               BRSKI-discovery                October 2023


   registrar or brski-proxy and the protocol is TCP (BRSKI Context), but
   also when the protocol is UDP (cBRSKI context), because "rrm" and
   "est" are defaults in both contexts.

   If multiple Variation Type Choices for the same Variation Type are
   indicated, then this implies that either of these Variation Type
   Choices is supported in conjunction with any of the other Variation
   Type Choices in the same TXT Record.  For example, if the TXT Record
   is "prm" "rrm" "cms" "jose", then this implies support for rrm-cms-
   est, rrm-jose-est, prm-cms-est and prm-jose-est.  This example also
   shows that if the default Variation Type Choice, such as "rrm" and
   another Choice of the same Variation Type ("prm") are to be indicated
   as supported, then both need to be included in the TXT Record.

   In Section 1, a responder does not only indicate a Service Name, but
   also its Service Instance Name, which needs to be unique across the
   domain to support initiators selecting a responder.  This
   specification makes no recommendation for choosing the Instance
   portion of that name.  Usually it is the same, or derived from some
   form of pre-existing system name.

   Registrars SHOULD support support their configuration without
   specifying a name to use in the Service Instance Name to minimize the
   amount of configuration required.  Registrars SHOULD support the
   configuration of such a name.

   If the responder needs to indicate different sockets for different
   (set of) Variations, for example, when operating as a proxy,
   according to Section 3.6.2, then it needs to signal for each socket a
   separate Service Instance Name with the appropriate port information
   in its SRV Record and the supported Variations for that socket in the
   TXT Record of that Service Instance Name.  In this case, it is
   RECOMMENDED that the Instance Name includes the Variation it
   supports, such as in the format specified in Section 3.5.3 and used
   in the Variation String column of the Table 3 table.
















Eckert, et al.            Expires 25 April 2024                [Page 19]

Internet-Draft               BRSKI-discovery                October 2023


                  _brski-registrar._tcp.local
                  IN PTR  0200:0000:7400._brski-registrar._tcp.local
   0200:0000:7400._brski-registrar._tcp.local
                   IN SRV  1 2 4555 0200:0000:7400.local
   0200:0000:7400._brski-registrar._tcp.local IN TXT  "rrm" "prm"
   0200:0000:7400.local
                   IN AAAA  fda3:79a6:f6ee:0000::0200:0000:6400:0001

                  _brski-registrar._udp.local
                   IN PTR  0200:0000:7400._brski-registrar._udp.local
   0200:0000:7400._brski-registrar._udp.local
                   IN SRV  1 2 5684 0200:0000:7400.local
   0200:0000:7400._brski-registrar._udp.local IN TXT  ""

          Figure 2: DNS-SD for a simple BRSKI and cBRSKI registrar

   In the above example Figure 3, a registrar supports BRSKI with "rrm"
   and "prm" modes across the same TCP socket, port 4555.  It uses "cms"
   voucher format and "est" enrollment, which are not included in the
   TXT strings because both are default for _brski-registrar._tcp.  The
   registrar also offers cBRSKI with "rrm" mode, "cose" voucher and
   "est" enrollment on UDP port 5684, the COAP over DTLS default port.
   The TXT RR for this has only an empty string because "rrm", "cose"
   and "est" are default for cBRSKI.

   As the instance name, the registrar uses in this example the MAC
   address "0200:0000:7400", which is MAC address of the interface on
   which the registrar has the IPv6 address
   "fda3:79a6:f6ee:0000::0200:0000:6400:0001".  The registrar should
   know that this MAC address is globally unique (assigned by IEEE).
   Else it should instead use its IPv6 address as the Instance Name.
   For example, if the registrar is just a software application not
   knowing the specifics of the hardware it is running on, the MAC
   address MUST NOT be used.  If only mDNS is used (as in this example),
   then the IPv6 link-local address would also suffice as the Instance
   Name.

   In this example, a single Instance Name suffices, because BRSKI and
   cBRSKI are two separate service contexts: they are distinguished by
   different protocols: TCP vs. UDP.











Eckert, et al.            Expires 25 April 2024                [Page 20]

Internet-Draft               BRSKI-discovery                October 2023


  0123456789012345678901234567890123456789012345678901234567890123456789
                     _brski-registrar._tcp.local
                 IN PTR  0200:0000:7400-rrm._brski-registrar._tcp.local
  0200:0000:7400-rrm._brski-registrar._tcp.local
                 IN SRV  1 2 4555 0200:0000:7400-rrm.local
  0200:0000:7400-rrm._brski-registrar._tcp.local IN TXT ""
  0200:0000:7400-rrm.local
                 IN AAAA fda3:79a6:f6ee:0000::0200:0000:6400:0001

                     _brski-registrar._tcp.local
                 IN PTR 0200:0000:7400-prm._brski-registrar._tcp.local
  0200:0000:7400-prm._brski-registrar._tcp.local
                 IN SRV 1 2 4555 0200:0000:7400-prm.local
  0200:0000:7400-prm._brski-registrar._tcp.local
                 IN TXT "prm" "cmp"
  0200:0000:7400-prm.local
                 IN AAAA fda3:79a6:f6ee:0000::0200:0000:6400:0001

      Figure 3: DNS-SD for a BRSKI registrar supporting RRM and PRM

   In the second example Figure 3, a registrar needs to use two
   different Instance Names, because both share the same service
   context: BRSKI - TCP with service name brski-registrar.  In this
   example, the registrar offers "rrm" mode with "cms" voucher and "est"
   enrollment.  It also offers "prm" mode with "cms" voucher, but (only)
   with "cmp" enrollment protocol.  Because the registrar does not offer
   "rrm" with "cmp", or "prm" with "est", it is not possible to coalesce
   all variations under one Instance Name, so instead, two Instance
   Names have to be created, and with them the necessary (duplicate) RR.

   Note that the "-rrm" and "-prm" in the Instance Names are only
   explanatory and could be any mutually unique strings - as is true for
   the whole Instance Name.

   Note too, that because both Instances share the same port number 4555
   (and hence TCP socket), they both have to be provided by the same
   BRSKI application.  If two separate applications where to be started
   on the dame host, one for "rrm", the other for "prm", then they would
   have separate sockets and hence port numbers.

3.8.2.  GRASP










Eckert, et al.            Expires 25 April 2024                [Page 21]

Internet-Draft               BRSKI-discovery                October 2023


3.8.2.1.  Signaling

   This document does not specify a mandatory to implement set of
   signaling options to guarantee interoperability of discovery between
   initiator and responders when using GRASP.  Like for the other
   discovery mechanisms, these requirements will have to come from other
   specifications that outline what in Section 1 is called the "security
   and transport substrate" to be used for GRASP.

   [RFC8994] specifies one such "security and transport substrate",
   which is zero-touch deployable.  It is mandatory to support for
   initiators and responders implementing the so-called "Autonomic
   Network Infrastructure" (ANI).  DULL GRASP is used for link-local
   discovery of proxies, and the ACP is used to automatically and
   securely build the connectivity for multi-hop discovery of registrars
   by proxies.

3.8.2.2.  Encoding

   To announce protocol variations with Section 1, the supported
   Variation is indicated in the objective-value field of the GRASP
   objective, using the method of forming the Variation string term in
   Section 3.5.3, and listed in the Variation String column of the
   Table 3 table.

   If more than one Variation is supported, then multiple objectives
   have to be announced, each with a different objective-value, but the
   same location information if the different Variations are supported
   across the same socket.  Different sockets require different
   objective structures in GRASP anyhow.

   Compared to DNS-SD, the choice of encoding for GRASP optimizes for
   minimum parsing effort, whereas the DNS-SD encoding is optimized for
   most compact encoding given the limit for DNS-SD TXT records.

   [M_FLOOD, 12340815, h'fe800000000000000000000000000001', 180000,
       [["AN_Proxy", 4, 1, "",
        [O_IPv6_LOCATOR,
        h'fe800000000000000000000000000001', IPPROTO_TCP, 4443],
        ["AN_Proxy", 4, 1, "prm",
        [O_IPv6_LOCATOR,
        h'fe800000000000000000000000000001', IPPROTO_TCP, 4443],
        ["AN_Proxy", 4, 1, "",
        [O_IPv6_LOCATOR,
        h'fe800000000000000000000000000001', IPPROTO_UDP, 4684]]
   ]

    Figure 4: GRASP example for a BRSKI registrar supporting RRM and PRM



Eckert, et al.            Expires 25 April 2024                [Page 22]

Internet-Draft               BRSKI-discovery                October 2023


   Figure 4 is an example for a GRASP service announcement for
   "AN_Proxy" in support of BRSKI with both "rrm" and "prm" supported on
   the same socket (TCP port number) and for cBRSKI with COAP over DTLS.

   Note that one or more complete service instances (in the example 3)
   can be contained within a single GRASP message without the need for
   any equivalent to the Service Instance Name of the DNS-SD PTR RR or
   the Target name of the DNS-SD SRV RR.  DNS-SD requires them because
   its encoding is decomposed into different RR, but it also
   intentionally introduces the Service Instance Name as an element for
   human interaction with selection (browsing and/or diagnostics of
   selection), something that the current GRASP objective-value encoding
   does not support.

   Because this GRASP encoding does not support service instance name,
   examples such as

   [M_FLOOD, 12340815, h'fe800000000000000000000000000001', 180000,
       [["AN_Proxy", 4, 1, "",
        [O_IPv6_LOCATOR,
        h'fe800000000000000000000000000001', IPPROTO_TCP, 4443],
        ["AN_Proxy", 4, 1, "",
        [O_IPv6_LOCATOR,
        h'fe800000000000000000000000000001', IPPROTO_UDP, 4684]]
   ]

   [M_FLOOD, 42310815, h'fe800000000000000000000000000001', 180000,
       [["AN_Proxy", 4, 1, "prm",
        [O_IPv6_LOCATOR,
        h'fe800000000000000000000000000001', IPPROTO_TCP, 44000]]
   ]

            Figure 5: GRASP example with two different processes

   In Figure 5, A separate application process supports "prm" and hence
   uses a separate socket, with example TCP port 44000.  In this case,
   there is no need nor significant benefit to merge all service
   instance announcements into a single GRASP message.  Instead, the
   BRSKI-"rrm"/cBRSKI process would be able to generate and send its
   own, first, message shown in the example, and the second process
   would send its own, second message in the example.

   For a more extensive, DNS-SD compatible encoding of the objective-
   value that also support Service Instance Names, see
   [I-D.eckert-anima-grasp-dnssd].

3.8.3.  CORE-LF




Eckert, et al.            Expires 25 April 2024                [Page 23]

Internet-Draft               BRSKI-discovery                October 2023


3.8.3.1.  Signaling

   "Web Linking", [RFC5988] defines defines a format, originally for use
   with HTTP headers, to link a HTTP document against other URIs.  Web
   linking is not a stand alone method for discovery of services for use
   with HTTP.

   "Constrained RESTful Environments (CoRE) Link Format", Section 1
   introduces a stand alone method to discover services instances
   (called resources in CORE-LF).  An initiator connects to a previously
   discovered initiator and uses CORE-LF to discover the available
   service instances and their COAP parameters, such as their endpoints
   and service parameters.

4.  Updates to existing RFCs

4.1.  RFC8995

   TBD.

5.  IANA considerations

5.1.  BRSKI Variations Discovery Registry (section)

   This document requests a new section named "BRSKI Variations
   Discovery Parameters" in the "Bootstrapping Remote Secure Key
   Infrastructures (BRSKI) Parameters" registry
   (https://www.iana.org/assignments/brski-parameters/brski-
   parameters.xhtml).  Its initial content is as follows.

   [ RFC editor.  Please remove the following sentence.  Note: This
   section contains three tables according to the specifications of this
   document.  If it is not possible to introduce more than one table per
   section, then we will modify the request accordingly for three
   sections, but given how the three tables are tightly linked, that
   would be unfortunate. ]

   Registration Procedure(s): Standards action or expert review based on
   registration.  See ThisRFC.

   Experts: TBD.

   Reference: ThisRFC.

   Notes:

   Dflt flag:  Indicates a Variation Type Choice that is assumed to be




Eckert, et al.            Expires 25 April 2024                [Page 24]

Internet-Draft               BRSKI-discovery                October 2023


      used if the service discover/selection mechanism does not indicate
      any variation.

   Rsvd Flag:  Indicates a Variation Type Choice that is reserved for
      use with the mechanism described in the Note(s) column, but for
      which no specification yet exists.

   Spec / Applicability:  A "-" indicates that the variation is
      considered to be feasible through existing specifications, but not
      explicitly mentioned in them.  An "NA" indicates that the
      combination is assumed to be not working with the currently
      available specifications.

   +==============+============+===========+===========================+
   | Context      | Applicable | Discovery | Service Name(s)           |
   |              | Variation  | Mechanism |                           |
   |              | Types      |           |                           |
   +==============+============+===========+===========================+
   | BRSKI        | mode       | GRASP     | "AN_join_registrar" /     |
   |              | vformat    |           | "AN_Proxy"                |
   |              | enroll     |           | with IPPROTO_TCP          |
   +--------------+------------+-----------+---------------------------+
   |              |            | DNS-SD    | "brski-registrar" /       |
   |              |            |           | "brski-proxy"             |
   |              |            |           | with TCP                  |
   +--------------+------------+-----------+---------------------------+
   | cBRSKI       | mode       | GRASP     | "AN_join_registrar" /     |
   |              | vformat    |           | "AN_join_registrar_rjp"   |
   |              | enroll     |           | /                         |
   |              |            |           | "AN_Proxy"                |
   |              |            |           | with IPPROTO_UDP          |
   +--------------+------------+-----------+---------------------------+
   |              |            | DNS-SD    | "brski-registrar" /       |
   |              |            |           | "brski-proxy"             |
   |              |            |           | with UDP                  |
   +--------------+------------+-----------+---------------------------+
   |              |            | CORE-LF   | rt=brski.*                |
   +--------------+------------+-----------+---------------------------+
   | BRSKI-PLEDGE | mode       | DNS-SD    | "brski-pledge" with TCP   |
   |              | vformat    |           |                           |
   |              | enroll     |           |                           |
   +--------------+------------+-----------+---------------------------+

                     Table 1: BRSKI Variation Contexts







Eckert, et al.            Expires 25 April 2024                [Page 25]

Internet-Draft               BRSKI-discovery                October 2023


   +=======+=========+=========+=========+=====+========================================+
   |Context|Variation|Variation|Reference|Flags|Note(s)                                 |
   |       |Type     |Type     |         |     |                                        |
   |       |         |Choice   |         |     |                                        |
   +=======+=========+=========+=========+=====+========================================+
   |BRSKI, |mode     |rrm      |[RFC8995]|Dflt |Registrar Responder Mode                |
   |cBRSKI |         |         |ThisRFC  |     |the mode specified in [RFC8995]         |
   +-------+---------+---------+---------+-----+----------------------------------------+
   |       |         |prm      |ThisRFC  |     |Pledge Responder Mode                   |
   |       |         |         |         |     |[I-D.ietf-anima-brski-prm]              |
   +-------+---------+---------+---------+-----+----------------------------------------+
   |BRSKI  |vformat  |cms      |[RFC8368]|Dflt |CMS-signed JSON Voucher                 |
   |       |         |         |ThisRFC  |     |                                        |
   +-------+---------+---------+---------+-----+----------------------------------------+
   |       |         |cose     |ThisRFC  |     |CBOR with COSE signature                |
   +-------+---------+---------+---------+-----+----------------------------------------+
   |cBRSKI |         |cose     |ThisRFC  |Dflt |CBOR with COSE signature                |
   |       |         |         |         |     |[I-D.ietf-anima-constrained-voucher]    |
   +-------+---------+---------+---------+-----+----------------------------------------+
   |       |         |cms      |[RFC8368]|     |CMS-signed JSON Voucher                 |
   |       |         |         |ThisRFC  |     |                                        |
   +-------+---------+---------+---------+-----+----------------------------------------+
   |BRSKI, |         |jose     |ThisRFC  |Dflt*|JOSE-signed JSON, Default when prm is   |
   |cBRSKI |         |         |         |     |used                                    |
   |       |         |         |         |     |[I-D.ietf-anima-jws-voucher],           |
   |       |         |         |         |     |[I-D.ietf-anima-brski-ae]               |
   +-------+---------+---------+---------+-----+----------------------------------------+
   |BRSKI- |mode     |prm      |ThisRFC  |Dflt |Pledge responder Mode                   |
   |PLEDGE |         |         |         |     |[I-D.ietf-anima-brski-prm]              |
   +-------+---------+---------+---------+-----+----------------------------------------+
   |       |vformat  |jose     |ThisRFC  |Dflt |JOSE-signed JSON, Default when prm is   |
   |       |         |         |         |     |used                                    |
   |       |         |         |         |     |[I-D.ietf-anima-jws-voucher],           |
   |       |         |         |         |     |[I-D.ietf-anima-brski-ae]               |
   +-------+---------+---------+---------+-----+----------------------------------------+
   |       |         |cms      |ThisRFC  |Rsvd |CMS-signed JSON Voucher, not specified. |
   +-------+---------+---------+---------+-----+----------------------------------------+
   |       |         |cose     |ThisRFC  |Rsvd |CBOR with COSE signature, not specified.|
   +-------+---------+---------+---------+-----+----------------------------------------+
   |BRSKI, |enroll   |est      |[RFC8995]|Dflt |Enroll via EST                          |
   |cBRSKI,|         |         |[RFC7030]|     |as specified in [RFC8995], extension for|
   |BRSKI- |         |         |         |     |Section 1 when used in context BRSKI-   |
   |PLEDGE |         |         |         |     |PLEDGE                                  |
   +-------+---------+---------+---------+-----+----------------------------------------+
   |       |         |cmp      |ThisRFC  |     |Lightweight CMP Profile                 |
   |       |         |         |         |     |{I-D.ietf-anima-brski-ae}},             |
   |       |         |         |         |     |[I-D.ietf-lamps-lightweight-cmp-profile]|
   +-------+---------+---------+---------+-----+----------------------------------------+



Eckert, et al.            Expires 25 April 2024                [Page 26]

Internet-Draft               BRSKI-discovery                October 2023


   |       |         |scep     |ThisRFC  |Rsvd |[RFC8894]                               |
   +-------+---------+---------+---------+-----+----------------------------------------+

                   Table 2: BRSKI Variation Type Choices

   Note 1:  The Variation String "EST-TLS" is equivalent to the
      Variation String "" and is required and only permitted for the
      AN_join_registrar objective value in GRASP for backward
      compatibility with RFC8995, where it is used for this variation.
      Note that AN_proxy uses "".

   +=======+====================================+=========+=========+========================================+
   |Context|Spec / Applicability                |Variation|Variation|Explanations / Notes                    |
   |       |                                    |String   |         |                                        |
   +=======+====================================+=========+=========+========================================+
   |BRSKI  |[RFC8995]                           |"" /     |rrm cms  |Note 1                                  |
   |       |                                    |"EST-TLS"|est      |                                        |
   +-------+------------------------------------+---------+---------+----------------------------------------+
   |       |[I-D.ietf-anima-brski-ae]           |cmp      |rrm cms  |                                        |
   |       |                                    |         |cmp      |                                        |
   +-------+------------------------------------+---------+---------+----------------------------------------+
   |       |[I-D.ietf-anima-brski-prm]          |prm      |prm jose |                                        |
   |       |                                    |         |est      |                                        |
   +-------+------------------------------------+---------+---------+----------------------------------------+
   +-------+------------------------------------+---------+---------+----------------------------------------+
   |       |-                                   |jose     |rrm jose |possible variation of [RFC8995] with    |
   |       |                                    |         |est      |voucher according to                    |
   |       |                                    |         |         |[I-D.ietf-anima-jws-voucher]            |
   +-------+------------------------------------+---------+---------+----------------------------------------+
   |       |-                                   |jose-cmp |rrm jose |possible variation of [RFC8995] with    |
   |       |                                    |         |cmp      |voucher according to                    |
   |       |                                    |         |         |[I-D.ietf-anima-jws-voucher] and        |
   |       |                                    |         |         |enrollment according to                 |
   |       |                                    |         |         |[I-D.ietf-lamps-lightweight-cmp-profile]|
   +-------+------------------------------------+---------+---------+----------------------------------------+
   |       |-                                   |cose     |rrm cose |possible variation of [RFC8995] with    |
   |       |                                    |         |est      |voucher according to                    |
   |       |                                    |         |         |[I-D.ietf-anima-constrained-voucher]    |
   +-------+------------------------------------+---------+---------+----------------------------------------+
   |       |-                                   |cose-cmp |rrm cose |possible variation of [RFC8995] with    |
   |       |                                    |         |cmp      |voucher according to                    |
   |       |                                    |         |         |[I-D.ietf-anima-constrained-voucher] and|
   |       |                                    |         |         |enrollment according to                 |
   |       |                                    |         |         |[I-D.ietf-lamps-lightweight-cmp-profile]|
   +-------+------------------------------------+---------+---------+----------------------------------------+
   |       |-                                   |prm-cmp  |prm jose |possible variation of                   |
   |       |                                    |         |cmp      |[I-D.ietf-anima-brski-prm] and          |
   |       |                                    |         |         |[I-D.ietf-anima-brski-ae]               |



Eckert, et al.            Expires 25 April 2024                [Page 27]

Internet-Draft               BRSKI-discovery                October 2023


   +-------+------------------------------------+---------+---------+----------------------------------------+
   |       |-                                   |prm-cose |prm cose |possible variation of                   |
   |       |                                    |         |est      |[I-D.ietf-anima-brski-prm] and          |
   |       |                                    |         |         |[I-D.ietf-anima-constrained-voucher]    |
   +-------+------------------------------------+---------+---------+----------------------------------------+
   |       |-                                   |prm-cose-|prm cose |possible variation of                   |
   |       |                                    |cmp      |cmp      |[I-D.ietf-anima-brski-prm],             |
   |       |                                    |         |         |[I-D.ietf-anima-constrained-voucher] and|
   |       |                                    |         |         |[I-D.ietf-anima-brski-ae]               |
   +-------+------------------------------------+---------+---------+----------------------------------------+
   +-------+------------------------------------+---------+---------+----------------------------------------+
   |cBRSKI |[I-D.ietf-anima-constrained-voucher]|""       |rrm cose |                                        |
   |       |                                    |         |est      |                                        |
   +-------+------------------------------------+---------+---------+----------------------------------------+
   +-------+------------------------------------+---------+---------+----------------------------------------+
   |       |-                                   |         |         |TBD: all the possible variations as for |
   |       |                                    |         |         |BRSKI ???                               |
   +-------+------------------------------------+---------+---------+----------------------------------------+

                                  Table 3

5.2.  Service Names Registry

   IANA is asked to modify and amend the "Service Name and Transport
   Protocol Port Number Registry" registry
   (https://www.iana.org/assignments/service-names-port-numbers/service-
   names-port-numbers.txt) as follows:

   brski-proxy and brski-registrar are to be added as Service Names for
   the "udp" protocol using ThisRFC as the reference.

   The registrations for brski-proxy and brski-registrar for the "tcp"
   protocol are to be updated to also include ThisRFC as their
   reference.

   The Defined TXT keys column for brski-proxy and brski-registrar for
   both "tcp" and "udp" protocols are to state the following text:

   See ThisRFC and the "BRSKI Variation Type Choices" table in the
   "Bootstrapping Remote Secure Key Infrastructures (BRSKI) Parameters"
   registry.

   TBD: This request likely does not include all the necessary
   formatting.







Eckert, et al.            Expires 25 April 2024                [Page 28]

Internet-Draft               BRSKI-discovery                October 2023


5.3.  BRSKI Well-Known URIs fixes (opportunistic)

   The following change requests to "https://www.iana.org/assignments/
   brski-parameters/brski-parameters.xhtml#brski-well-known-uris" are
   cosmetic in nature and are included in this document solely because
   support for Endpoint URIs is implied by the mechanisms specified in
   this document and the existing registry has these cosmetic issues.

   1.  IANA is asked to change the name of the first column of the table
       from "URI" to "URI Suffix".  This is in alignment with other
       table columns with the same syntax/semantic, such as
       "https://www.iana.org/assignments/well-known-uris/well-known-
       uris.xhtml".

   2.  IANA is asked to change the Reference from [RFC8995] to
       [RFC8995], Section 8.3.1.

   3.  IANA is asked to include the following "Note" text: The following
       table contains the assigned BRSKI protocol Endpoint URI suffixes
       under "/.well-known/brski"." - This note is added to introduce
       the term "Endpoint" into the registry table as that is the term
       commonly used (instead of URI) in several of the memos for which
       this discovery document was written.  It is meant to help readers
       map the registry to the terminology used in those documents.

6.  Security Considerations

   In Section 1, pledges are easier subject to DoS attacks than in
   Section 1, because attackers can be initiators and delay or prohibit
   enrollment of a pledge by opening so many connections to the pledge
   that a valid registrar-agents connection to the pledge may not be
   possible.  Discovery of the pledge via DNS-SD increases the ability
   of attackers to discover pledges against which such DoS attacks can
   be attempted.

   Especially when supporting DNS-SD browsing across unicast DNS,
   Pledges MUST implement DoS prevention measures, such as limiting the
   number and rate of accepted TCP connections on a per-initiator basis.
   If feasible for the implementation, simultaneous connections SHOULD
   be possible, so that an ongoing attacker connection will not delay a
   valid registrar-agent connection.  When accepting connections, a
   strategy such as LRU MAY be used to ensure that an attacker will not
   be able to monopolize connections.

   Browsing via DNS-SD, especially via unicast DNS which makes
   information available network-wide does also introduce a perpass
   attack, gathering intelligence against what type and serial number of
   devices are installed in the network.  Whether or not this is seen as



Eckert, et al.            Expires 25 April 2024                [Page 29]

Internet-Draft               BRSKI-discovery                October 2023


   a relevant risk is highly installation dependent.  Networks SHOULD
   implement filtering measures at mDNS and/or DNS RR/services level to
   prohibit such data collection if there is a risk, and this is seen as
   an undesirable attack vector.

7.  Acknowledgments

   TBD.

8.  Draft considerations

8.1.  Open Issues

   Questions to the DNS-SD community, potential review with

   TBD

8.2.  Change log

   [RFC Editor: please remove this section.]

   Individual version 00:

   Initial version.

9.  References

9.1.  Normative References

   [I-D.ietf-anima-brski-ae]
              von Oheimb, D., Fries, S., and H. Brockhaus, "BRSKI-AE:
              Alternative Enrollment Protocols in BRSKI", Work in
              Progress, Internet-Draft, draft-ietf-anima-brski-ae-06, 20
              October 2023, <https://datatracker.ietf.org/doc/html/
              draft-ietf-anima-brski-ae-06>.

   [I-D.ietf-anima-brski-prm]
              Fries, S., Werner, T., Lear, E., and M. Richardson, "BRSKI
              with Pledge in Responder Mode (BRSKI-PRM)", Work in
              Progress, Internet-Draft, draft-ietf-anima-brski-prm-10,
              23 October 2023, <https://datatracker.ietf.org/doc/html/
              draft-ietf-anima-brski-prm-10>.









Eckert, et al.            Expires 25 April 2024                [Page 30]

Internet-Draft               BRSKI-discovery                October 2023


   [I-D.ietf-anima-constrained-join-proxy]
              Richardson, M., Van der Stok, P., and P. Kampanakis,
              "Constrained Join Proxy for Bootstrapping Protocols", Work
              in Progress, Internet-Draft, draft-ietf-anima-constrained-
              join-proxy-14, 26 April 2023,
              <https://datatracker.ietf.org/doc/html/draft-ietf-anima-
              constrained-join-proxy-14>.

   [I-D.ietf-anima-constrained-voucher]
              Richardson, M., Van der Stok, P., Kampanakis, P., and E.
              Dijk, "Constrained Bootstrapping Remote Secure Key
              Infrastructure (BRSKI)", Work in Progress, Internet-Draft,
              draft-ietf-anima-constrained-voucher-21, 7 July 2023,
              <https://datatracker.ietf.org/doc/html/draft-ietf-anima-
              constrained-voucher-21>.

   [I-D.ietf-anima-jws-voucher]
              Werner, T. and M. Richardson, "JWS signed Voucher
              Artifacts for Bootstrapping Protocols", Work in Progress,
              Internet-Draft, draft-ietf-anima-jws-voucher-09, 29 August
              2023, <https://datatracker.ietf.org/doc/html/draft-ietf-
              anima-jws-voucher-09>.

   [I-D.ietf-dnssd-srp]
              Lemon, T. and S. Cheshire, "Service Registration Protocol
              for DNS-Based Service Discovery", Work in Progress,
              Internet-Draft, draft-ietf-dnssd-srp-23, 4 August 2023,
              <https://datatracker.ietf.org/doc/html/draft-ietf-dnssd-
              srp-23>.

   [I-D.ietf-lamps-lightweight-cmp-profile]
              Brockhaus, H., von Oheimb, D., and S. Fries, "Lightweight
              Certificate Management Protocol (CMP) Profile", Work in
              Progress, Internet-Draft, draft-ietf-lamps-lightweight-
              cmp-profile-21, 17 February 2023,
              <https://datatracker.ietf.org/doc/html/draft-ietf-lamps-
              lightweight-cmp-profile-21>.

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <https://www.rfc-editor.org/rfc/rfc2119>.

   [RFC5280]  Cooper, D., Santesson, S., Farrell, S., Boeyen, S.,
              Housley, R., and W. Polk, "Internet X.509 Public Key
              Infrastructure Certificate and Certificate Revocation List
              (CRL) Profile", RFC 5280, DOI 10.17487/RFC5280, May 2008,
              <https://www.rfc-editor.org/rfc/rfc5280>.



Eckert, et al.            Expires 25 April 2024                [Page 31]

Internet-Draft               BRSKI-discovery                October 2023


   [RFC6690]  Shelby, Z., "Constrained RESTful Environments (CoRE) Link
              Format", RFC 6690, DOI 10.17487/RFC6690, August 2012,
              <https://www.rfc-editor.org/rfc/rfc6690>.

   [RFC6762]  Cheshire, S. and M. Krochmal, "Multicast DNS", RFC 6762,
              DOI 10.17487/RFC6762, February 2013,
              <https://www.rfc-editor.org/rfc/rfc6762>.

   [RFC6763]  Cheshire, S. and M. Krochmal, "DNS-Based Service
              Discovery", RFC 6763, DOI 10.17487/RFC6763, February 2013,
              <https://www.rfc-editor.org/rfc/rfc6763>.

   [RFC7030]  Pritikin, M., Ed., Yee, P., Ed., and D. Harkins, Ed.,
              "Enrollment over Secure Transport", RFC 7030,
              DOI 10.17487/RFC7030, October 2013,
              <https://www.rfc-editor.org/rfc/rfc7030>.

   [RFC8174]  Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
              2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
              May 2017, <https://www.rfc-editor.org/rfc/rfc8174>.

   [RFC8368]  Eckert, T., Ed. and M. Behringer, "Using an Autonomic
              Control Plane for Stable Connectivity of Network
              Operations, Administration, and Maintenance (OAM)",
              RFC 8368, DOI 10.17487/RFC8368, May 2018,
              <https://www.rfc-editor.org/rfc/rfc8368>.

   [RFC8990]  Bormann, C., Carpenter, B., Ed., and B. Liu, Ed., "GeneRic
              Autonomic Signaling Protocol (GRASP)", RFC 8990,
              DOI 10.17487/RFC8990, May 2021,
              <https://www.rfc-editor.org/rfc/rfc8990>.

   [RFC8994]  Eckert, T., Ed., Behringer, M., Ed., and S. Bjarnason, "An
              Autonomic Control Plane (ACP)", RFC 8994,
              DOI 10.17487/RFC8994, May 2021,
              <https://www.rfc-editor.org/rfc/rfc8994>.

   [RFC8995]  Pritikin, M., Richardson, M., Eckert, T., Behringer, M.,
              and K. Watsen, "Bootstrapping Remote Secure Key
              Infrastructure (BRSKI)", RFC 8995, DOI 10.17487/RFC8995,
              May 2021, <https://www.rfc-editor.org/rfc/rfc8995>.

9.2.  Informative References

   [I-D.eckert-anima-grasp-dnssd]
              Eckert, T. T., Boucadair, M., Jacquenet, C., and M. H.
              Behringer, "DNS-SD Compatible Service Discovery in GeneRic
              Autonomic Signaling Protocol (GRASP)", Work in Progress,



Eckert, et al.            Expires 25 April 2024                [Page 32]

Internet-Draft               BRSKI-discovery                October 2023


              Internet-Draft, draft-eckert-anima-grasp-dnssd-05, 10 July
              2023, <https://datatracker.ietf.org/doc/html/draft-eckert-
              anima-grasp-dnssd-05>.

   [RFC5988]  Nottingham, M., "Web Linking", RFC 5988,
              DOI 10.17487/RFC5988, October 2010,
              <https://www.rfc-editor.org/rfc/rfc5988>.

   [RFC7252]  Shelby, Z., Hartke, K., and C. Bormann, "The Constrained
              Application Protocol (CoAP)", RFC 7252,
              DOI 10.17487/RFC7252, June 2014,
              <https://www.rfc-editor.org/rfc/rfc7252>.

   [RFC8894]  Gutmann, P., "Simple Certificate Enrolment Protocol",
              RFC 8894, DOI 10.17487/RFC8894, September 2020,
              <https://www.rfc-editor.org/rfc/rfc8894>.

Appendix A.  Discovery for constrained BRSKI

   This appendix section is intended to describe the current issues with
   Section 1 and Section 1 as of 08/2023, which make both drafts
   incompatible with this document.  It will be removed if/when those
   issues will be fixed.

A.1.  Current constrained text for GRASP

   The following is the current encodings from Section 1.

   *  The transport-proto is IPPROTO_UDP

   *  the objective is AN_join_registrar, identical to Section 1.

   *  the objective name is "BRSKI_RJP".

   Here is an example M_FLOOD announcing the Registrar on example port
   5685, which is a port number chosen by the Registrar.

   [M_FLOOD, 51804231, h'fda379a6f6ee00000200000064000001', 180000,
   [["AN_join_registrar", 4, 255, "BRSKI_RJP"],
   [O_IPv6_LOCATOR,
   h'fda379a6f6ee00000200000064000001', IPPROTO_UDP, 5685]]]

     Figure 6: cBRSKI Fig 5: Example of Registrar announcement message

   Most Registrars will announce both a JPY-stateless and stateful
   ports, and may also announce an HTTPS/TLS service:





Eckert, et al.            Expires 25 April 2024                [Page 33]

Internet-Draft               BRSKI-discovery                October 2023


   [M_FLOOD, 51840231, h'fda379a6f6ee00000200000064000001', 180000,
   [["AN_join_registrar", 4, 255, ""],
    [O_IPv6_LOCATOR,
     h'fda379a6f6ee00000200000064000001', IPPROTO_TCP, 8443],
    ["AN_join_registrar", 4, 255, "BRSKI_JP"],
    [O_IPv6_LOCATOR,
     h'fda379a6f6ee00000200000064000001', IPPROTO_UDP, 5684],
    ["AN_join_registrar", 4, 255, "BRSKI_RJP"],
    [O_IPv6_LOCATOR,
     h'fda379a6f6ee00000200000064000001', IPPROTO_UDP, 5685]]]

                                  Figure 7

   The following is the current text from Section 1.

   *  The transport-proto is IPPROTO_UDP

   *  the objective is AN_join_registrar, identical to Section 1.

   *  the objective name is "BRSKI_RJP".

   Here is an example M_FLOOD announcing the Registrar on example port
   5685, which is a port number chosen by the Registrar.

      [M_FLOOD, 51804231, h'fda379a6f6ee00000200000064000001', 180000,
      [["AN_join_registrar", 4, 255, "BRSKI_RJP"],
       [O_IPv6_LOCATOR,
        h'fda379a6f6ee00000200000064000001', IPPROTO_UDP, 5685]]]

            Figure 8: Example of Registrar announcement message

   Most Registrars will announce both a JPY-stateless and stateful
   ports, and may also announce an HTTPS/TLS service:

      [M_FLOOD, 51840231, h'fda379a6f6ee00000200000064000001', 180000,
      [["AN_join_registrar", 4, 255, ""],
       [O_IPv6_LOCATOR,
        h'fda379a6f6ee00000200000064000001', IPPROTO_TCP, 8443],
       ["AN_join_registrar", 4, 255, "BRSKI_JP"],
       [O_IPv6_LOCATOR,
        h'fda379a6f6ee00000200000064000001', IPPROTO_UDP, 5684],
       ["AN_join_registrar", 4, 255, "BRSKI_RJP"],
       [O_IPv6_LOCATOR,
        h'fda379a6f6ee00000200000064000001', IPPROTO_UDP, 5685]]]

           Figure 9: Example of Registrar announcing two services





Eckert, et al.            Expires 25 April 2024                [Page 34]

Internet-Draft               BRSKI-discovery                October 2023


A.1.1.  Issues and proposed change

   One goal of this document is to define variations such that proxies
   can deal with existing and future variations.  This only works for
   variations for which proxies would need to perform specific
   processing other than passing on data between pledge and registrar.

   Changes in protocol that require specific new behavior of proxies
   must therefore not be variations signaled via the objective-value
   field of GRASP objectives.

   In result, this document recommends the following changes to the
   encoding for Section 1 and Section 1.

   [M_FLOOD, 51840231, h'fda379a6f6ee00000200000064000001', 180000,
   [["AN_join_registrar", 4, 255, ""],
    [O_IPv6_LOCATOR,
     h'fda379a6f6ee00000200000064000001', IPPROTO_TCP, 8443],
    ["AN_join_registrar", 4, 255, ""],
    [O_IPv6_LOCATOR,
     h'fda379a6f6ee00000200000064000001', IPPROTO_UDP, 5684],
    ["AN_join_registrar_rjp", 4, 255, ""],
    [O_IPv6_LOCATOR,
     h'fda379a6f6ee00000200000064000001', IPPROTO_UDP, 5685]]]

          Figure 10: Proposed Encoding of registrar announcements

   In summary:

   *  Circuit proxy operation is indicted with objective-name
      "AN_join_registrar" and IPPROTO_UDP.  The default for
      AN_join_registrar/UDP is the use of COAPs and CBOR encoded
      voucher.  For this default, the objective-value is "".

   *  Stateless JPY proxy operations is indicated with objective-name
      "AN_join_registrar_rjp" and IPPROTO_UDP.  The default for
      AN_join_registrar/UDP is the use of COAPs and CBOR encoded
      voucher.  For this default, the objective-value is "".

Contributors

   Thomas Werner
   Siemens AG
   Germany
   Email: thomas-werner@siemens.com
   URI:   https://www.siemens.com/





Eckert, et al.            Expires 25 April 2024                [Page 35]

Internet-Draft               BRSKI-discovery                October 2023


   Steffen Fries
   Siemens AG
   Germany
   Email: steffen.fries@siemens.com
   URI:   https://www.siemens.com/


   Hendrik Brockhaus
   Siemens AG
   Germany
   Email: hendrik.brockhaus@siemens.com
   URI:   https://www.siemens.com/


   Michael Richardson
   Canada
   Phone: +41 44 878 9200
   Email: mcr+ietf@sandelman.org


Authors' Addresses

   Toerless Eckert (editor)
   Futurewei USA
   United States of America
   Email: tte@cs.fau.de


   David von Oheimb
   Siemens AG
   Otto-Hahn-Ring 6
   81739 Munich
   Germany
   Email: david.von.oheimb@siemens.com
   URI:   https://www.siemens.com/


   Esko Dijk
   IoTconsultancy.nl
   Email: esko.dijk@iotconsultancy.nl











Eckert, et al.            Expires 25 April 2024                [Page 36]