<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-anima-constrained-voucher-30" category="std" consensus="true" submissionType="IETF" updates="8995, 9148" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Constrained BRSKI (cBRSKI)">Constrained Bootstrapping Remote Secure Key Infrastructure (cBRSKI)</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-anima-constrained-voucher-30"/>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <author initials="P." surname="van der Stok" fullname="Peter van der Stok">
      <organization>vanderstok consultancy</organization>
      <address>
        <email>stokcons@kpnmail.nl</email>
      </address>
    </author>
    <author initials="P." surname="Kampanakis" fullname="Panos Kampanakis">
      <organization>Cisco Systems</organization>
      <address>
        <email>pkampana@cisco.com</email>
      </address>
    </author>
    <author initials="E." surname="Dijk" fullname="Esko Dijk">
      <organization>IoTconsultancy.nl</organization>
      <address>
        <email>esko.dijk@iotconsultancy.nl</email>
      </address>
    </author>
    <date year="2026" month="February" day="27"/>
    <area>Internet</area>
    <workgroup>anima Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 119?>

<t>This document defines the Constrained Bootstrapping Remote Secure Key Infrastructure (cBRSKI) protocol,
which provides a solution for secure zero-touch onboarding of resource-constrained (IoT) devices into the network
of a domain owner. This protocol is designed for constrained networks, which may have limited data throughput or may
experience frequent packet loss. cBRSKI is a variant of the BRSKI protocol, which uses an artifact signed by the
device manufacturer called the "voucher" which enables a new device and the owner's network to mutually authenticate.
While the BRSKI voucher data is encoded in JSON, cBRSKI uses a compact CBOR-encoded voucher.
The BRSKI voucher data definition is extended with new data types that allow for smaller voucher sizes.
The Enrollment over Secure Transport (EST) protocol, used in BRSKI, is replaced with EST-over-CoAPS;
and HTTPS used in BRSKI is replaced with DTLS-secured CoAP (CoAPS).
This document Updates RFC 8995 and RFC 9148.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-anima-constrained-voucher/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        anima Working Group mailing list (<eref target="mailto:anima@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/anima/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/anima/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/anima-wg/constrained-voucher"/>.</t>
    </note>
  </front>
  <middle>
    <?line 132?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Secure enrollment of new nodes into constrained networks with constrained nodes presents unique challenges.
As explained in <xref target="RFC7228"/>, such networks may have limited data throughput or may
experience frequent packet loss. In addition, its nodes may be constrained by energy availability, memory space, and code size.</t>
      <t>The Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol described in <xref target="RFC8995"/>
provides a solution for secure zero-touch (automated) onboarding of new (unconfigured) devices.
These new devices are called "Pledges", equipped with a factory-installed Initial Device Identifier (IDevID) (see <xref target="ieee802-1AR"/>).
Using the IDevID, a Pledge is securely enrolled into a network.</t>
      <t>The BRSKI solution described in <xref target="RFC8995"/> was designed to be modular, and this document describes a version scaled to the constraints of IoT deployments.
This document uses the constrained voucher and voucher request artifacts defined in <xref target="RFC8366bis"/> for a constrained
version of the BRSKI protocol: cBRSKI.
The cBRSKI protocol uses the CoAP-based version of EST (EST-coaps from <xref target="RFC9148"/>) rather than the EST over HTTPS <xref target="RFC7030"/>. 
cBRSKI is itself scalable to multiple resource levels through the definition of optional functions. <xref target="appendix-pledge-profiles"/> illustrates this.</t>
      <t>In BRSKI, the <xref target="RFC8366bis"/> voucher data is by default serialized to JSON with a signature in CMS <xref target="RFC5652"/>.
cBRSKI uses the CBOR <xref target="RFC8949"/> voucher data serialization defined by <xref target="RFC8366bis"/>, and applies a new COSE <xref target="RFC9052"/> signature format as
defined in <xref target="artifacts"/>.</t>
      <t>This COSE-signed CBOR-encoded voucher is transported using both secured CoAP <xref target="RFC7252"/> and HTTPS.
The CoAP connection (between Pledge and Registrar) is to be protected by DTLS (CoAPS).
The HTTP connection (between Registrar and MASA) is to be protected using TLS (HTTPS).</t>
      <t><xref target="overview"/> to <xref target="discovery"/> define the default cBRSKI protocol, by means of additions to and modifications of regular BRSKI.
<xref target="discovery-considerations"/> considers some variations of the protocol, specific to particular deployments or IoT networking technologies.
Next in <xref target="design-considerations"/>, some considerations for the design and implementation of cBRSKI components are provided.</t>
      <t><xref target="rpk-considerations"/> introduces a variant of cBRSKI for the most-constrained Pledges, using Raw Public Keys (RPK).
This variant achieves smaller sizes of data objects and avoids doing certain costly PKIX verification operations on the Pledge.</t>
      <t><xref target="pledge-discovery-on-registrar"/> provides more details on how a Pledge may discover the various onboarding/enrollment options that a 
Registrar provides. Implementing these methods is optional for a Pledge.</t>
    </section>
    <section anchor="Terminology">
      <name>Terminology</name>
      <t>The following terms are defined in <xref target="RFC8366bis"/>, and are used identically as in that document:
Artifact, Attribute, Domain, Join Registrar and Coordinator (JRC), Malicious Registrar, Manufacturer Authorized Signing Authority
(MASA), Pledge, Registrar, Onboarding, Owner, Voucher Data, Voucher Request and Voucher.</t>
      <t>The protocol described in this document is referred to as cBRSKI, the constrained version of BRSKI <xref target="RFC8995"/>.</t>
      <t>The following terms from <xref target="RFC8995"/> are used identically as in that document:
Domain CA, enrollment, IDevID, Join Proxy, LDevID, manufacturer, nonced, nonceless, PKIX.</t>
      <t>The following terms from <xref target="RFC7030"/> are used identically as in that document:
Explicit Trust Anchor (TA), Explicit TA database, Third-party TA.</t>
      <t>The following terms from <xref target="RFC7252"/> are used identically as in that document:
Confirmable (CON), Acknowledgement (ACK), Endpoint, ETag, Client, Server, Piggybacked Response, resource, Resource Discovery, Content-Format.</t>
      <t>The term Pledge Voucher Request, or acronym PVR, is introduced to refer to the voucher request between the Pledge and the Registrar.</t>
      <t>The term Registrar Voucher Request, or acronym RVR, is introduced to refer to the voucher request between the Registrar and the MASA.</t>
      <t>The terms "PKIX Certificate" and "certificate" both refer to the X.509v3 profile described in <xref target="RFC5280"/>.</t>
      <t>The term "base resource" is defined as a CoAP resource that can be used as a base
to append an additional path segment to, where this segment is a short resource name ('short-name') as defined in
<xref target="resource-discovery"/> and <xref target="brski-est-short-uri-table"/>.</t>
      <t>In code examples, the string "&lt;CODE BEGINS&gt;" denotes the start of a code example and "&lt;CODE ENDS&gt;" the end of the code example.
"lf added" means that extra linefeed characters were added to an example to make lines fit in this document.</t>
      <t>The ellipsis ("...") in a CBOR diagnostic notation byte string denotes a further sequence of bytes that is not shown for brevity.
This notation is defined in <xref target="I-D.ietf-cbor-edn-literals"/>.</t>
    </section>
    <section anchor="reqlang">
      <name>Requirements Language</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
      </t>
    </section>
    <section anchor="overview">
      <name>Overview of Protocol</name>
      <t><xref target="RFC8366bis"/> defines a voucher that can assert proximity, authenticates the Registrar, and can offer varying levels of anti-replay protection.
The proximity proof provided by a voucher is an assertion that the Pledge and the Registrar are believed to be close together, from a network topology point of view.
Similar to BRSKI <xref target="RFC8995"/>, proximity is proven by making a DTLS connection between a Pledge and a Registrar.
The Pledge initiates this connection using a link-local source address.</t>
      <t>The secure DTLS connection is then used by the Pledge to send a Pledge Voucher Request (PVR). The Registrar then includes the PVR into its own
Registrar Voucher Request (RVR), which is sent to an agent (MASA) of the Pledge's manufacturer. The MASA verifies the PVR and RVR and issues a signed voucher.
The voucher provides an authorization statement from the manufacturer indicating that the Registrar is the intended owner of the Pledge.
The voucher refers to the Registrar through pinning of the Registrar's identity.</t>
      <t>After verification of the voucher, the Pledge enrolls into the Registrar's domain by obtaining a certificate using the EST-coaps <xref target="RFC9148"/> protocol, suitable for
constrained devices. Once the Pledge has obtained its domain identity (LDevID) in this manner, it can use this identity to obtain network access credentials,
which are used to join the local IP network. The method to obtain such credentials depends on the particular network technology used and is outside the scope of this document.</t>
      <t>The two main parts of the BRSKI protocol are named separately in this document: BRSKI-EST (<xref target="brski-est"/>) for the protocol between Pledge and Registrar, and BRSKI-MASA (<xref target="brski-masa"/>) for the
protocol between the Registrar and the MASA.</t>
      <t>Time-based vouchers are supported, but given that constrained devices are unlikely to have accurate time, their use will be uncommon.
Most Pledges using constrained vouchers will be online during enrollment and will use live nonces to provide anti-replay protection rather than expiry times.</t>
      <t><xref target="RFC8366bis"/> defines the CBOR voucher data encoding for the constrained voucher and the constrained voucher request, which are used by cBRSKI.</t>
      <t>The constrained voucher request MUST be signed by the Pledge. COSE <xref target="RFC9052"/> is used for signing as defined in <xref target="VR-COSE"/>.
It signs using the private key of its IDevID.
The constrained voucher MUST be signed by the MASA. Also in this case, COSE is used for signing.</t>
      <t>For the constrained voucher request (PVR) the default method for the Pledge to identify the Registrar is using the 
Registrar's full PKIX certificate. But when operating PKIX-less
as described in <xref target="rpk-considerations"/>, the Registrar's Raw Public Key (RPK) is used for this.</t>
      <t>For the constrained voucher the default method to indicate ("pin") a trusted domain identity is the domain's PKIX CA certificate,
but when operating PKIX-less instead the RPK of the Registrar is pinned.</t>
      <t>For certificates, cBRSKI currently uses the X.509 format, like BRSKI. The protocol and data formats are defined such that future extension to other certificate formats is enabled. For example, CBOR-encoded and COSE-signed 
C509 certificates (<xref target="I-D.ietf-cose-cbor-encoded-cert"/>) may provide data size savings as well as code sharing benefits with CBOR/COSE libraries, when applied to cBRSKI.</t>
      <t>The BRSKI architecture mandates that the MASA be aware of the capabilities of the Pledge.
This is not a drawback as a Pledge is constructed by a manufacturer which also arranges for the MASA to be aware of the inventory of devices.
The MASA therefore knows if the Pledge supports PKIX operations, or if it is limited to RPK operations only.
Based upon this, the MASA can select which attributes to use in the voucher for certain operations, like the pinning of the Registrar or domain identity.</t>
    </section>
    <section anchor="updates-to-rfc-8995-and-rfc-9148">
      <name>Updates to RFC 8995 and RFC 9148</name>
      <t>This section details the ways in which this document updates other RFCs.</t>
      <t>This document Updates <xref target="RFC8995"/> because it:</t>
      <ul spacing="normal">
        <li>
          <t>clarifies how pinning in vouchers is done (<xref target="pinning"/>),</t>
        </li>
        <li>
          <t>clarifies the use of TLS Server Name Indicator (SNI) (<xref target="sni"/>, <xref target="sni-masa"/>),</t>
        </li>
        <li>
          <t>clarifies when new trust anchors should be retrieved by a Pledge (<xref target="brski-est-extensions-pledge"/>),</t>
        </li>
        <li>
          <t>clarifies what kinds of Extended Key Usage attributes are appropriate for each certificate (<xref target="registrar-certificate-requirement-server"/>, <xref target="registrar-certificate-requirement-client"/>),</t>
        </li>
        <li>
          <t>extends BRSKI with the use of CoAP,</t>
        </li>
        <li>
          <t>makes some BRSKI messages optional to send if the results can be inferred from other validations (<xref target="brski-est-extensions"/>),</t>
        </li>
        <li>
          <t>extends the BRSKI-EST/BRSKI-MASA protocols (<xref target="brski-est"/>, <xref target="brski-masa"/>, <xref target="VR-COSE"/>) to carry the new <tt>application/voucher+cose</tt> format.</t>
        </li>
      </ul>
      <t>This document Updates <xref target="RFC9148"/> because it:</t>
      <ul spacing="normal">
        <li>
          <t>defines stricter DTLS requirements (<xref target="brski-est-dtls"/>)),</t>
        </li>
        <li>
          <t>details how an EST-coaps client handles certificate renewal and re-enrollment (<xref target="brski-est-extensions"/>),</t>
        </li>
        <li>
          <t>details how an EST-coaps server processes a "CA certificates" request for content-format 287 (<tt>application/pkix-cert</tt>) (<xref target="brski-extensions-registrar"/>).</t>
        </li>
        <li>
          <t>adds enrollment status telemetry to the certificate renewal procedure (<xref target="est-reenrollment"/>),</t>
        </li>
        <li>
          <t>adds support for the media type <tt>application/multipart-core</tt> for the CA certificates (<tt>/crts</tt>) resource (<xref target="multipart-core"/>),</t>
        </li>
        <li>
          <t>defines a resource type ('<tt>rt</tt>') attribute value "<tt>ace.est</tt>" for the EST-coaps base resource (<xref target="iana-core-rt"/>).</t>
        </li>
      </ul>
    </section>
    <section anchor="brski-est">
      <name>BRSKI-EST Protocol</name>
      <t>This section describes the extensions to both BRSKI <xref target="RFC8995"/> and EST-coaps <xref target="RFC9148"/> operations between Pledge and Registrar.</t>
      <section anchor="brski-est-dtls">
        <name>DTLS Connection</name>
        <t>A DTLS connection is established between the Pledge and the Registrar, similar to the TLS connection
described in <xref section="5.1" sectionFormat="of" target="RFC8995"/>. This may occur via a Join Proxy as described in <xref target="joinproxy"/>.
Regardless of the Join Proxy presence or particular mechanism used, the DTLS connection should operate identically.
The cBRSKI and EST-coaps requests and responses for onboarding are carried over this DTLS connection.</t>
        <section anchor="dtls-version">
          <name>DTLS Version</name>
          <t>DTLS version 1.3 <xref target="RFC9147"/> SHOULD be used in any implementation of this specification. An exception case where DTLS 1.2 <xref target="RFC6347"/> MAY
be used is in a Pledge that uses a software platform where a DTLS 1.3 client is not available (yet). This may occur for example if a legacy
device gets software-upgraded to support cBRSKI. For this reason, a Registrar MUST by default support both DTLS 1.3 and DTLS 1.2
client connections. However, for security reasons the Registrar MAY be administratively configured to support only a particular DTLS version or higher.</t>
          <t>An EST-coaps server <xref target="RFC9148"/> (if present as a separate entity from above Registrar) that implements this specification also MUST support both DTLS 1.3 and DTLS 1.2 client connections by default.
However, for security reasons the EST-coaps server MAY be administratively configured to support only a particular DTLS version or higher.</t>
        </section>
        <section anchor="tls-client-certificates-idevid-authentication">
          <name>TLS Client Certificates: IDevID authentication</name>
          <t>As described in <xref section="5.1" sectionFormat="of" target="RFC8995"/>, the Pledge makes a connection to the Registrar using a TLS Client Certificate for authentication.
This is the Pledge's IDevID certificate.</t>
          <t>Subsequently the Pledge will send a Pledge Voucher Request (PVR). Further elements of Pledge authentication may be present in the PVR,
as detailed in <xref target="VR-COSE"/>.</t>
        </section>
        <section anchor="dtls-fragments">
          <name>DTLS Handshake Fragmentation Considerations</name>
          <t>DTLS includes a mechanism to fragment handshake messages. This is described in <xref section="4.4" sectionFormat="of" target="RFC9147"/>.
cBRSKI will often be used with a Join Proxy, described in <xref target="joinproxy"/>, which relays each DTLS message to the Registrar.
A stateless Join Proxy will need some additional space to wrap each DTLS message inside a Join Proxy UDP message, while the wrapped result needs to fit in the maximum IPv6
MTU guaranteed on 6LoWPAN <xref target="RFC6282"/> networks, which is 1280 bytes.</t>
          <t>For this reason it is RECOMMENDED that a PMTU of 1024 bytes be assumed for the DTLS handshake and appropriate DTLS fragmentation is used.
It is unlikely that any ICMPv6 Packet Too Big indications (<xref target="RFC4443"/>) will be relayed by the Join Proxy back to the Pledge.</t>
          <t>During the operation of the EST-coaps protocol, the CoAP Block-wise transfer mechanism <xref target="RFC7959"/> will be automatically used when message sizes exceed the PMTU.
A Pledge/EST-client on a constrained network MUST use the (D)TLS maximum fragment length extension ('<tt>max_fragment_length</tt>') defined in <xref section="4" sectionFormat="of" target="RFC6066"/> with the maximum fragment length set to a value of either 2^9 or 2^10,
when operating as a DTLS 1.2 client.</t>
          <t>A Pledge/EST-client operating as DTLS 1.3 client, MUST use the (D)TLS record size limit extensions ('<tt>record_size_limit</tt>')
defined in <xref section="4" sectionFormat="of" target="RFC8449"/>, with RecordSizeLimit set to a value between 512 and 1024 (inclusive).</t>
        </section>
        <section anchor="sni">
          <name>Registrar and the Server Name Indicator (SNI)</name>
          <t>The SNI issue described below affects <xref target="RFC8995"/> as well, and is reported in errata: <eref target="https://www.rfc-editor.org/errata/eid6648">https://www.rfc-editor.org/errata/eid6648</eref></t>
          <t>As the Registrar is discovered by IP address, and typically connected via a Join Proxy, the hostname of the Registrar is not known to the Pledge.
Therefore, it cannot do DNS-ID validation (<xref target="RFC9525"/>) on the Registrar's certificate.
Instead, it must do validation using the voucher.</t>
          <t>Without knowing the hostname, the Pledge cannot put any reasonable value into the <xref target="RFC6066"/> Server Name Indicator (SNI) extension.
Therefore the Pledge SHOULD omit the SNI extension as per <xref section="9.2" sectionFormat="of" target="RFC8446"/>.</t>
          <t>In some cases, particularly while testing BRSKI, a Pledge may be given the hostname of a particular Registrar to connect to directly.
Such a bypass of the discovery process may result in the Pledge taking a different code branch to establish a DTLS connection, and may result in the SNI being inserted by a library.
For this reason, the Registrar MUST ignore any SNI it receives from a Pledge.</t>
          <t>A primary motivation for making the SNI ubiquitous in the public web is because it allows for multi-tenant hosting of HTTPS sites on a single (scarce) IPv4 address.
This consideration does not apply to the server function in the Registrar because:</t>
          <ul spacing="normal">
            <li>
              <t>it uses DTLS and CoAP, not HTTPS;</t>
            </li>
            <li>
              <t>it typically uses IPv6, often <xref target="RFC4193"/> Unique Local Address, which are plentiful;</t>
            </li>
            <li>
              <t>the server port number is typically discovered, so multiple tenants can be accommodated via unique UDP port numbers.</t>
            </li>
          </ul>
        </section>
        <section anchor="registrar-certificate-requirement-server">
          <name>Registrar Server Certificate Requirements</name>
          <t>As per <xref section="3.6.1" sectionFormat="of" target="RFC7030"/>, the Registrar certificate MUST have the Extended Key Usage (EKU) id-kp-cmcRA.
This certificate is also used as a TLS Server Certificate, so it MUST also have the EKU id-kp-serverAuth.</t>
          <t>See <xref target="cosesign-registrar-cert"/> for an example of a Registrar certificate with these EKUs set.
See <xref target="registrar-certificate-requirement-client"/> for Registrar client certificate requirements.</t>
        </section>
      </section>
      <section anchor="joinproxy">
        <name>cBRSKI Join Proxy</name>
        <t><xref target="I-D.ietf-anima-constrained-join-proxy"/> specifies the details for a stateful or stateless constrained Join Proxy which is equivalent to the BRSKI Proxy defined in <xref section="4" sectionFormat="comma" target="RFC8995"/>.
See also <xref target="discovery"/> for more details on discovery of a Join Proxy by a Pledge, and discovery of a Registrar by a Join Proxy.</t>
      </section>
      <section anchor="resource-discovery">
        <name>Request URIs, Resource Discovery and Content-Formats</name>
        <t>cBRSKI operates using CoAP over DTLS, with request URIs using the coaps scheme. The Pledge operates in CoAP client role.
To keep the protocol messages small the EST-coaps and cBRSKI request URIs are shorter than the respective EST and BRSKI URIs.</t>
        <t>During the cBRSKI onboarding on an IPv6 network these request URIs have the following form:</t>
        <artwork><![CDATA[
  coaps://[<link-local-ipv6>]:<port>/.well-known/brski/<short-name>
  coaps://[<link-local-ipv6>]:<port>/.well-known/est/<short-name>
]]></artwork>
        <t>where &lt;<tt>link-local-ipv6</tt>&gt; is the discovered link-local IPv6 address of a Join Proxy, and &lt;<tt>port</tt>&gt; is the discovered port of the Join Proxy that is
used to offer the cBRSKI proxy functionality.</t>
        <t>&lt;<tt>short-name</tt>&gt; is the short resource name for the cBRSKI and EST-coaps resources. For EST-coaps, <xref section="5.1" sectionFormat="of" target="RFC9148"/> defines the CoAP &lt;<tt>short-name</tt>&gt; resource names.
For cBRSKI, this document defines the short resource names based on the <xref target="RFC8995"/> long HTTP resource names.
See <xref target="brski-est-short-uri-table"/> for a summary of these resource names.</t>
        <t><xref target="discovery-considerations"/> details how the Pledge discovers a Join Proxy link-local address and port in different deployment scenarios.</t>
        <t>The request URI formats defined here enable the Pledge to perform onboarding/enrollment without requiring discovery of the available onboarding options, voucher formats, 
BRSKI/EST resources, enrollment protocols, and so on. This is helpful for the majority of constrained Pledges that would support only a single set of these options. However, for Pledges that do support multiple options, 
<xref target="I-D.ietf-anima-brski-discovery"/> will define discovery methods so that a Pledge can select the optimal set of options for the current onboarding operation.</t>
        <t>Alternatively, a Pledge could also send CoAP discovery queries (<xref section="7" sectionFormat="of" target="RFC7252"/>) to the Registrar to discover
detailed options for onboarding and/or enrollment functions. Supporting these queries is
OPTIONAL for both the Pledge and the Registrar. To clarify which options in particular can be discovered, <xref target="pledge-discovery-on-registrar"/> provides an informative overview of what can be 
discovered and how to discover it.</t>
        <t>Because a Pledge only has indirect access to the Registrar via a single port on the Join Proxy, the Registrar MUST host all cBRSKI/EST-coaps resources on the same (UDP) server IP address and port.
This is the address and port where a Join Proxy would relay DTLS records from the Pledge to.</t>
        <t>Although the request URI templates include IP address, scheme and port, in practice the CoAP request message sent over the secure DTLS connection only encodes the URI path explicitly.
For example, a Pledge that skips resource discovery operations just sends the initial CoAP voucher request as follows:</t>
        <artwork><![CDATA[
  REQ: POST /.well-known/brski/rv
    Content-Format: 836 (application/voucher+cose)
    Payload       : (COSE-signed Pledge Voucher Request, PVR)
]]></artwork>
        <t>Note that only content-format 836 (<tt>application/voucher+cose</tt>) is defined in this document for the payload sent to the voucher request resource (<tt>/rv</tt>).
Content-format 836 MUST be supported by the Registrar for the <tt>/rv</tt> resource and it MAY support additional formats.
The Pledge MAY also indicate in the request the desired format of the (voucher) response, using the Accept Option. An example of using this option in the request is as follows:</t>
        <artwork><![CDATA[
  REQ: POST /.well-known/brski/rv
    Content-Format: 836 (application/voucher+cose)
    Accept        : 836 (application/voucher+cose)
    Payload       : (COSE-signed Pledge Voucher Request, PVR)
]]></artwork>
        <t>If the Accept Option is omitted in the request, the response format follows from the request payload format (which is 836).</t>
        <t>Note that this specification allows for <tt>application/voucher+cose</tt> format requests and vouchers to be transported over HTTPS,
as well as for <tt>application/voucher-cms+json</tt> and other formats yet to be defined over CoAP.
The burden for this flexibility is placed upon the Registrar.
A Pledge on constrained hardware is expected to support a single format only.</t>
        <t>The Pledge and MASA need to support one or more formats (at least format 836) for the voucher and for the voucher request.
The MASA needs to support all formats that the Pledge supports.</t>
        <section anchor="telemetry">
          <name>Status Telemetry Returns</name>
          <t><xref target="RFC8995"/> defines two telemetry returns from the Pledge which are sent to the Registrar.
These are the BRSKI Status Telemetry <xref section="5.7" sectionFormat="comma" target="RFC8995"/> and the Enrollment Status Telemetry <xref section="5.9.4" sectionFormat="comma" target="RFC8995"/>.
These are two CoAP POST requests made the by Pledge at two key steps in the process.</t>
          <t><xref target="RFC8995"/> defines the content of these POST operations in CDDL, which are serialized as JSON.
This document extends this with an additional CBOR format, derived using the CDDL rules in <xref target="RFC8610"/>.</t>
          <t>The new CBOR telemetry format has CoAP content-format 60 (<tt>application/cbor</tt>) and MUST be supported by the Registrar for both the <tt>/vs</tt> and <tt>/es</tt> resources.
The existing JSON format has CoAP content-format 50 (<tt>application/json</tt>) and MAY also be supported by the Registrar.
A Pledge MUST use the new CBOR format to send telemetry messages.</t>
        </section>
        <section anchor="coap-resources-table">
          <name>CoAP Resources Table</name>
          <t>cBRSKI inherits EST-coaps <xref target="RFC9148"/> functions:
specifically, the mandatory Simple (Re-)Enrollment (<tt>/sen</tt> and <tt>/sren</tt>) and Certification Authority certificates request (<tt>/crts</tt>).
Support for CSR Attributes Request (<tt>/att</tt>) and server-side key generation (<tt>/skg</tt>, <tt>/skc</tt>) remains optional for the EST-coaps server.</t>
          <t><xref target="brski-est-short-uri-table"/> summarizes the resources used in cBRSKI.
It includes both the short-name cBRSKI resources and the EST-coaps resources.</t>
          <!-- Table order can be changed -->

<table anchor="brski-est-short-uri-table">
            <name>BRSKI/EST resource name mapping to cBRSKI/EST-coaps short resource name</name>
            <thead>
              <tr>
                <th align="left">BRSKI + EST name</th>
                <th align="left">cBRSKI + EST-coaps &lt;short-name&gt;</th>
                <th align="left">Well-known URI namespace</th>
                <th align="left">Required for Registrar?</th>
              </tr>
            </thead>
            <tbody>
              <tr>
                <td align="left">
                  <tt>/enrollstatus</tt></td>
                <td align="left">
                  <tt>/es</tt></td>
                <td align="left">brski</td>
                <td align="left">MUST</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>/requestvoucher</tt></td>
                <td align="left">
                  <tt>/rv</tt></td>
                <td align="left">brski</td>
                <td align="left">MUST</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>/voucher_status</tt></td>
                <td align="left">
                  <tt>/vs</tt></td>
                <td align="left">brski</td>
                <td align="left">MUST</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>/cacerts</tt></td>
                <td align="left">
                  <tt>/crts</tt></td>
                <td align="left">est</td>
                <td align="left">MUST</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>/csrattrs</tt></td>
                <td align="left">
                  <tt>/att</tt></td>
                <td align="left">est</td>
                <td align="left">MAY</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>/simpleenroll</tt></td>
                <td align="left">
                  <tt>/sen</tt></td>
                <td align="left">est</td>
                <td align="left">MUST</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>/simplereenroll</tt></td>
                <td align="left">
                  <tt>/sren</tt></td>
                <td align="left">est</td>
                <td align="left">MUST</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>/serverkeygen</tt></td>
                <td align="left">
                  <tt>/skg</tt></td>
                <td align="left">est</td>
                <td align="left">MAY</td>
              </tr>
              <tr>
                <td align="left">
                  <tt>/serverkeygen</tt></td>
                <td align="left">
                  <tt>/skc</tt></td>
                <td align="left">est</td>
                <td align="left">MAY</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section anchor="coap-uri-path-abbreviation">
          <name>CoAP Uri-Path Abbreviation</name>
          <t>To minimize the size of CoAP request packets on constrained networks, the CoAP Uri-Path-Abbrev Option
defined in <xref target="I-D.ietf-core-uri-path-abbrev"/> MUST be supported by the Registrar.</t>
        </section>
      </section>
      <section anchor="brski-coap-responses">
        <name>CoAP Responses</name>
        <t><xref section="5" sectionFormat="comma" target="RFC8995"/> defines a number of HTTP response codes that the Registrar is to return when certain conditions occur.</t>
        <t>The 401, 403, 404, 406 and 415 response codes map directly to CoAP codes 4.01, 4.03, 4.04, 4.06 and 4.15 respectively.</t>
        <t>The 202 Retry process which may occur in the voucher request, is to be handled in the same way as the <xref section="5.7" sectionFormat="of" target="RFC9148"/> process for Delayed Responses.</t>
      </section>
      <section anchor="brski-est-extensions">
        <name>Extensions to EST-coaps</name>
        <t>This section defines extensions to EST-coaps for Pledges (during initial onboarding), EST-coaps clients (after initial onboarding) and Registrars (that implement an EST-coaps server).
Note that a device that is already onboarded is not called "Pledge" in this section: it now acts in the role of an EST-coaps client.</t>
        <section anchor="brski-est-extensions-pledge">
          <name>Pledge Enrollment Procedure</name>
          <t>This section defines optimizations for the EST-coaps protocol as used by a Pledge. These aim to reduce payload sizes and the number of messages (round-trips) required for the initial EST enrollment.</t>
          <t>A Pledge SHOULD NOT perform the optional EST-coaps "CSR attributes request" (<tt>/att</tt>). Instead, the Pledge selects the attributes to include in the CSR as specified below.</t>
          <t>One or more Subject Distinguished Name fields MUST be included in the CSR.
If the Pledge has no specific information on what attributes/fields are desired in the CSR, which is the common case, it MUST use the Subject Distinguished Name fields from its IDevID unmodified.
Note that a Pledge MAY receive such specific information via the voucher data (encoded in a vendor-specific way, or as defined by a future specification) or via some other, out-of-band means.</t>
          <t>A Pledge uses the following optimized EST-coaps procedure:</t>
          <ol spacing="normal" type="1"><li>
              <t>If the voucher, that validates the current Registrar, contains a single pinned domain CA certificate, the Pledge provisionally considers this certificate as the EST trust anchor, as if it were the result of a "CA certificates request" (<tt>/crts</tt>) to the Registrar.</t>
            </li>
            <li>
              <t>Using this CA certificate as trust anchor it proceeds with EST simple enrollment (<tt>/sen</tt>) to obtain a provisionally trusted LDevID certificate.</t>
            </li>
            <li>
              <t>If the Pledge determines that the pinned domain CA is (1) a root CA certificate and (2) signer of the LDevID certificate, the Pledge accepts the pinned domain CA certificate as the legitimate trust anchor root CA for the Registrar's domain. It also accepts the LDevID certificate as its new LDevID identity. And steps 4 and 5 are skipped.</t>
            </li>
            <li>
              <t>Otherwise, if the step 3 condition was not met, the Pledge MUST perform a "CA certificates request" (<tt>/crts</tt>) to the EST server to obtain the full set of EST CA trust anchors. It then MUST attempt to chain the LDevID certificate to one of the CAs in the set.</t>
            </li>
            <li>
              <t>If the Pledge cannot obtain the set of CA certificates, or it is unable to create the chain as defined in step 4, the Pledge MUST abort the enrollment process and report the error using the enrollment status telemetry (<tt>/es</tt>).</t>
            </li>
          </ol>
        </section>
        <section anchor="est-renewal-crts">
          <name>Renewal of CA certificates</name>
          <t>An EST-coaps client that has an idea of the current time (internally, or via Network Time Protocol) SHOULD consider the validity time of the trust anchor CA(s), and MAY begin requesting new trust anchor certificates(s) using the <tt>/crts</tt> request when the CA has 50% of it's validity time (notAfter - notBefore) left.
A client without access to the current time cannot decide if trust anchor CA(s) have expired, and SHOULD poll periodically for a new trust anchor certificate(s) using the <tt>/crts</tt> request at an interval of approximately 1 month.
An EST-coaps server SHOULD include the CoAP ETag Option (<xref section="5.10.6" sectionFormat="comma" target="RFC7252"/>)in every response to a <tt>/crts</tt> request, to enable clients to perform low-overhead validation whether their trust anchor CA is still valid.
The EST-coaps client SHOULD store the ETag resulting from a <tt>/crts</tt> response in memory and SHOULD use this value in an ETag Option in its next GET <tt>/crts</tt> request.</t>
        </section>
        <section anchor="change-of-domain-trust-anchors">
          <name>Change of Domain Trust Anchor(s)</name>
          <t>The domain trust anchor(s) may change over time. Such a change may happen due to relocation of the client device to a new domain, a new subdomain, or due to a key update of 
a trust anchor as described in <xref section="4.4" sectionFormat="comma" target="RFC4210"/>.</t>
          <t>From the client's viewpoint, a trust anchor change happens during EST-coaps re-enrollment: since a change of domain CA requires all devices 
operating under the old domain CA to acquire a new LDevID certificate issued by the new domain CA. A client's re-enrollment may be triggered by various events, such as an instruction to re-enroll sent by a domain entity, or an imminent expiry of its LDevID certificate, or other.
How the re-enrollment is explicitly triggered on the client by a domain entity, such as a commissioner or a Registrar, is out of scope of this specification.</t>
          <t>The mechanism described in <xref section="4.1.3" sectionFormat="comma" target="RFC7030"/> and <xref section="4.4" sectionFormat="comma" target="RFC4210"/> for root CA key update requires four certificates: OldWithOld, OldWithNew, NewWithOld, and NewWithNew. Of these four, the OldWithOld certificate is already
stored in the client's Explicit TA database. The other certificates will be provided to the client in a <tt>/crts</tt> response, during the EST-coaps re-enrollment procedure.</t>
        </section>
        <section anchor="est-reenrollment">
          <name>Re-enrollment Procedure</name>
          <t>For re-enrollment, the EST-coaps client MUST support the following EST-coaps procedure. During this procedure the EST-coaps server MAY re-enroll the client into a new domain or into a new sub-CA within a larger domain.</t>
          <ol spacing="normal" type="1"><li>
              <t>The client connects with DTLS to the EST-coaps server, and authenticates with its present domain certificate (LDevID) as usual. The EST-coaps server authenticates itself with its domain RA certificate that
is currently trusted by the client, i.e. it chains to a trust anchor CA that the client has stored in its Explicit TA database. This is the OldWithOld trust anchor. 
The client checks that the server is a Registration Authority (RA) of the domain as required by <xref section="3.6.1" sectionFormat="of" target="RFC7030"/> before proceeding.</t>
            </li>
            <li>
              <t>The client performs the simple re-enrollment request (<tt>/sren</tt>) and upon success it obtains a new LDevID certificate.</t>
            </li>
            <li>
              <t>The client verifies the new LDevID certificate against its Explicit TA database. If the new LDevID chains successfully to a TA, this means trust anchors did not significantly change and the client MAY skip retrieving the current CA certificates using the "CA certificates request" (<tt>/crts</tt>). If it does not chain successfully, it means trust anchor(s) were changed significantly and the client MUST retrieve the new domain trust anchors using the "CA certificates request" (<tt>/crts</tt>).</t>
            </li>
            <li>
              <t>If the client retrieved new trust anchor(s) in step 3, then it MUST verify that the new LDevID certificate it obtained in step 2 chains with the new trust anchor(s). If it chains successfully, the client stores the new trust anchor(s) in its Explicit TA database, accepts the new LDevID certificate and stops using its prior LDevID certificate. If it does not chain successfully, the client MUST NOT update its LDevID certificate, and it MUST NOT update its Explicit TA database, and the client MUST abort the enrollment process and MUST attempt to report the error to the EST-coaps server using enrollment status telemetry (<tt>/es</tt>).</t>
            </li>
          </ol>
          <t>Note that even though the EST-coaps client may skip the <tt>/crts</tt> request in step 3 at this time, it SHOULD still support renewal of the trust anchors as detailed in <xref target="est-renewal-crts"/>.</t>
          <t>Note that an EST-coaps server that is also a Registrar will already support the enrollment status telemetry resource (<tt>/es</tt>) in step 4, while an EST-coaps server that purely implements <xref target="RFC9148"/>, and not the present specification, will not support this resource.</t>
        </section>
        <section anchor="multipart-core">
          <name>Multipart Content-Format for CA certificates (<tt>/crts</tt>) Resource</name>
          <t>In EST-coaps <xref target="RFC9148"/> the PKCS#7 container format is used for CA certificates distribution. Because the PKCS#7 format is only used as a certificate container and no additional security is applied on the container, it 
becomes attractive to replace this format by something simpler, on a constrained Pledge: so that additional PKCS#7 code is avoided. Therefore, this document defines a container format using the <xref target="RFC8710"/>
            <tt>application/multipart-core</tt> media type (CoAP content-format 62). This is beneficial since a Pledge necessarily already supports CBOR parsing, so there is little code overhead to support this CBOR-based
container format.</t>
          <t>A Registrar or EST-coaps server MUST support content-format 62 for the <tt>/crts</tt> resource.
The multipart collection MUST contain the individual CA certificates, each encoded as an <tt>application/pkix-cert</tt> (287) representation. Future documents may define other certificate formats: the multipart collection can handle any future types.
The order of CA certificates MUST be in the CA hierarchy order starting from the issuer of the client's LDevID first, up to the highest-level domain CA, then optionally followed by any further CA certificates that are not part of this hierarchy.
These further CA certificates may be Third-party TAs as defined in <xref target="RFC7030"/>. The highest-level domain CA may or may not be a root CA certificate.</t>
          <t>As an example, for the two-level CA domain PKI of <xref target="fig-twoca"/> the multipart container will contain two representations:</t>
          <artwork><![CDATA[
[ <domain sub-CA cert (2)> , <domain CA cert (1)> ]
]]></artwork>
          <t>Encoded as an <tt>application/multipart-core</tt> CBOR array this is (shown in CBOR diagnostic notation):</t>
          <artwork><![CDATA[
[ 287, h'3082' ... 'd713', 287, h'3082' ... 'a034' ]
]]></artwork>
          <t>The total number of CA certificates SHOULD be 1, 2 or 3 and not higher to prevent constrained Pledges from running out of memory for the trust anchor storage (Explicit TA database).
However if a domain operator can guarantee that any Pledges enrolled in its network can support larger sets of CA certificates, the total number MAY be configured as higher than 3.
To facilitate a reliable transfer of large payloads over constrained networks, the server MUST support CoAP Block-wise transfer for the <tt>/crts</tt> response. The server MUST also support
the Size2 Option <xref target="RFC7959"/> to provide the total resource length in bytes, when requested by a client.</t>
          <t>Implementation notes: a client that receives the first block of payload data from the server, can already inspect the total number of CA certificates by decoding the first byte of the payload.
In CBOR encoding, the respective first bytes 0x81-0x97 represent an array with length 1-23, respectively.
Furthermore, the length in bytes of the first CA certificate can be already determined by decoding the first bytes of the second element, because the CBOR encoding for binary string includes the length of this string.
A client that requires an estimate of the total resource size (to be returned as part of the first Block2 response from the server) can use a Size2 Option with value 0 in its request.
Knowing the overall progress of the data transfer may be helpful in certain cases, e.g. when a Pledge provides visual progress information on the onboarding progress.</t>
        </section>
      </section>
      <section anchor="brski-extensions-registrar">
        <name>Registrar Extensions</name>
        <t>Before a Registrar forwards a COSE-signed voucher from MASA to the Pledge, it MUST remove any '<tt>x5bag</tt>' or '<tt>x5chain</tt>'
unprotected COSE header attributes (which are defined in <xref target="RFC9360"/>).
The contents of these unprotected attributes are solely for validation/logging use by the Registrar.
Removing these attributes reduces the voucher size on the constrained network path to the Pledge.</t>
        <t>The content-format 60 (<tt>application/cbor</tt>) MUST be supported by the Registrar for the <tt>/vs</tt> and <tt>/es</tt> resources.</t>
        <t>Content-format 836 (<tt>application/voucher+cose</tt>) MUST be supported by the Registrar for the <tt>/rv</tt> resource for CoAP POST requests, both as request payload and as response payload.</t>
        <t>Content-format 287 (<tt>application/pkix-cert</tt>) MUST be supported by the Registrar as a response payload for the <tt>/sen</tt> and <tt>/sren</tt> resources.</t>
        <t>When a Registrar receives a "CA certificates request" (<tt>/crts</tt>) request with a CoAP Accept Option with value 287 (<tt>application/pkix-cert</tt>) it MUST return only the
single CA certificate that is the envisioned or actual CA authority for the current, authenticated Pledge making the request. An exception to this rule is when 
the domain has been configured to operate with multiple CA trust anchors exclusively: then the Registrar returns a 4.06 Not Acceptable error to signal to the client that it
needs to request another content-format that supports retrieval of multiple CA certificates.</t>
      </section>
    </section>
    <section anchor="brski-masa">
      <name>BRSKI-MASA Protocol</name>
      <t>This section describes extensions to and clarifications of the BRSKI-MASA protocol between Registrar and MASA.</t>
      <section anchor="brski-masa-protocol-format">
        <name>Protocol and Formats</name>
        <t><xref section="5.4" sectionFormat="of" target="RFC8995"/> describes a connection between the Registrar and the MASA as being a normal TLS connection using HTTPS.
This document does not change that.</t>
        <t>The MASA only needs to support formats for which it has constructed Pledges that use that format.</t>
        <t>The Registrar MUST use the same format for the RVR as the Pledge used for its PVR.
Specifically, the Registrar MUST use the media type <tt>application/voucher+cose</tt> for its voucher request to MASA,
when the Pledge used content-format 836 in the payload of its request to the Registrar.</t>
        <t>The Registrar indicates the voucher format (by media type) it wants to receive from MASA using the HTTP Accept header.
This format MUST be the same as the format of the PVR, so that the Pledge can parse the resulting voucher.</t>
        <t>At the moment of writing the creation of CoAPS based MASAs is deemed unrealistic and unnecessary.
The use of CoAP for the BRSKI-MASA connection is out of scope but can be the subject of another document.
Some consideration was made to specify CoAP support for consistency, but:</t>
        <ul spacing="normal">
          <li>
            <t>the Registrar is not expected to be so constrained that it cannot support HTTPS client connections.</t>
          </li>
          <li>
            <t>the technology and experience to build Internet-scale HTTPS responders (which the MASA is) is common, while the experience doing the same for CoAP is much less common.</t>
          </li>
          <li>
            <t>a Registrar is likely to provide onboarding services to both constrained and non-constrained devices.  Such a Registrar would need to speak HTTPS anyway.</t>
          </li>
          <li>
            <t>a manufacturer is likely to offer both constrained and non-constrained devices, so there may in practice be no situation
in which the MASA could be CoAP-only.
Additionally, as the MASA is intended to be a function that can easily be outsourced to a third-party service provider,
reducing the complexity would also seem to reduce the cost of that function.</t>
          </li>
          <li>
            <t>security-related considerations: see <xref target="security-masa-coaps"/>.</t>
          </li>
        </ul>
      </section>
      <section anchor="brski-masa-rvr">
        <name>Registrar Voucher Request</name>
        <t>If the PVR contains a proximity assertion, the Registrar MUST propagate this assertion into the RVR by including the '<tt>assertion</tt>' attribute with the value "proximity".
This conforms to the example in <xref section="3.3" sectionFormat="of" target="RFC8995"/> of carrying the assertion forward.</t>
      </section>
      <section anchor="sni-masa">
        <name>MASA and the Server Name Indicator (SNI)</name>
        <t>A TLS/HTTPS connection is established between the Registrar and MASA.</t>
        <t><xref section="5.4" sectionFormat="of" target="RFC8995"/> explains this process, and there are no externally visible changes made by this document.
A MASA that supports the unconstrained voucher formats should be able to support constrained voucher formats equally well.</t>
        <t>There is no requirement that a single MASA be used for both constrained and unconstrained voucher requests:
the choice of MASA is determined by the id-mod-MASAURLExtn2016 extension contained in the IDevID, so it can be
determined by the manufacturer.</t>
        <t>The Registrar MUST do DNS-ID checks (<xref target="RFC9525"/>) on the contents of the certificate provided by the MASA during the
TLS handshake.</t>
        <t>In contrast to the Pledge/Registrar situation, the Registrar always knows the name of the MASA, and MUST always include
an <xref target="RFC6066"/> Server Name Indicator.
The SNI is optional in TLS 1.2, but common.
The SNI is considered mandatory with TLS 1.3.</t>
        <t>The presence of the SNI extension is required by the MASA, in order for the MASA's server to host multiple tenants
(for different customers).</t>
      </section>
      <section anchor="registrar-certificate-requirement-client">
        <name>Registrar Client Certificate Requirements</name>
        <t>The Registrar SHOULD use a TLS Client Certificate to authenticate to the MASA per <xref section="5.4.1" sectionFormat="of" target="RFC8995"/>.
If the certificate that the Registrar uses is marked as a id-kp-cmcRA certificate, via Extended Key Usage, then it MUST also have the id-kp-clientAuth EKU attribute set.</t>
        <t>In summary, for typical Registrar use, where a single Registrar certificate is used for both client and server roles,
the certificate MUST have an EKU set with at least all of id-kp-cmcRA, id-kp-serverAuth, and id-kp-clientAuth.</t>
      </section>
    </section>
    <section anchor="pinning">
      <name>Pinning in Voucher Artifacts</name>
      <t>The voucher is a statement by the MASA for use by the Pledge that provides the identity of the Pledge's owner.
This section describes how the owner's identity is determined and how it is specified within the voucher.</t>
      <section anchor="registrar-identity">
        <name>Registrar Identity Selection and Encoding</name>
        <t><xref section="5.5" sectionFormat="of" target="RFC8995"/> describes BRSKI policies for selection of the owner identity. It indicates some of the
flexibility enabled for the Registrar, and recommends the Registrar to include only
certificates in the voucher request (CMS) signing structure that participate in the certificate chain that is to be pinned.</t>
        <t>The MASA is expected to evaluate the certificates included in an RVR, forming them into a chain with the Registrar's
(signing) identity on one end.
Then, it pins a certificate selected from this chain according to its pinning policy (<xref target="masa-pinning-policy"/>).</t>
        <t>For instance, for a domain with a two-level certification authority (see <xref target="fig-twoca"/>), where the RVR has been signed by "domain Registrar",
the RVR includes the chain formed by the domain Registrar EE certificate, the domain Sub-CA certificate, and the domain CA trust anchor certificate.
The arrows in the figure indicate the issuing of a certificate, i.e. author of (1) issued (2) and author of (2) issued (3).</t>
        <figure anchor="fig-twoca">
          <name>Two-Level CA PKI</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="320" width="168" viewBox="0 0 168 320" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
                <path d="M 8,32 L 8,80" fill="none" stroke="black"/>
                <path d="M 16,224 L 16,288" fill="none" stroke="black"/>
                <path d="M 32,128 L 32,176" fill="none" stroke="black"/>
                <path d="M 88,88 L 88,120" fill="none" stroke="black"/>
                <path d="M 88,184 L 88,216" fill="none" stroke="black"/>
                <path d="M 136,128 L 136,176" fill="none" stroke="black"/>
                <path d="M 152,224 L 152,288" fill="none" stroke="black"/>
                <path d="M 160,32 L 160,80" fill="none" stroke="black"/>
                <path d="M 8,32 L 160,32" fill="none" stroke="black"/>
                <path d="M 8,80 L 160,80" fill="none" stroke="black"/>
                <path d="M 32,128 L 136,128" fill="none" stroke="black"/>
                <path d="M 32,176 L 136,176" fill="none" stroke="black"/>
                <path d="M 16,224 L 152,224" fill="none" stroke="black"/>
                <path d="M 16,288 L 152,288" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="96,216 84,210.4 84,221.6" fill="black" transform="rotate(90,88,216)"/>
                <polygon class="arrowhead" points="96,120 84,114.4 84,125.6" fill="black" transform="rotate(90,88,120)"/>
                <g class="text">
                  <text x="52" y="52">domain</text>
                  <text x="92" y="52">CA</text>
                  <text x="120" y="52">(1)</text>
                  <text x="48" y="68">trust</text>
                  <text x="100" y="68">anchor</text>
                  <text x="68" y="148">domain</text>
                  <text x="112" y="148">(2)</text>
                  <text x="68" y="164">Sub-CA</text>
                  <text x="68" y="244">domain</text>
                  <text x="64" y="260">Registrar</text>
                  <text x="120" y="260">(3)</text>
                  <text x="36" y="276">EE</text>
                  <text x="96" y="276">certificate</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
 .------------------.
 |  domain CA (1)   |
 |  trust anchor    |
 '------------------'
           |
           v
    .------------.
    | domain (2) |
    | Sub-CA     |
    '------------'
           |
           v
  .----------------.
  |   domain       |
  | Registrar (3)  |
  | EE certificate |
  '----------------'
]]></artwork>
          </artset>
        </figure>
        <t>When the Registrar is using a COSE-signed RVR, the COSE_Sign1 object contains a protected and an unprotected header.
The Registrar MUST place all the certificates needed by MASA to validate the signature chain for its RVR in an
 '<tt>x5bag</tt>' attribute in either the protected or the unprotected header as defined in <xref section="2" sectionFormat="of" target="RFC9360"/>.</t>
      </section>
      <section anchor="masa-pinning-policy">
        <name>MASA Pinning Policy</name>
        <t>The MASA, having assembled and verified the certificate chain that signed the RVR then needs to select a certificate to pin.
(For the case that only the Registrar's End-Entity certificate is included, only this certificate can be selected and this section does not apply.)
The BRSKI policy for pinning by the MASA as described in <xref section="5.5.2" sectionFormat="of" target="RFC8995"/> leaves much flexibility to the manufacturer.</t>
        <t>The present document adds the following rules to the MASA pinning policy to reduce the network load on the constrained network side:</t>
        <ol spacing="normal" type="1"><li>
            <t>for a voucher containing a nonce, it SHOULD pin the most specific (lowest-level) CA certificate in the chain.</t>
          </li>
          <li>
            <t>for a nonceless voucher, it SHOULD pin the least-specific (highest-level) CA certificate in the chain that is allowed under the MASA's policy for this specific domain.</t>
          </li>
        </ol>
        <t>The rationale for 1. is that in case of a voucher with nonce, the voucher is valid only in scope of the present DTLS connection between Pledge and Registrar anyway, so there is no
benefit to pin a higher-level CA. By pinning the most specific CA the constrained Pledge can validate its DTLS connection using less crypto operations. The
rationale for pinning a CA instead of the Registrar's End-Entity certificate directly is based on the following benefit on constrained networks: the pinned certificate in the voucher
can in common cases be re-used as a Domain CA trust anchor during the EST enrollment and during the operational phase that follows after EST enrollment, as explained in <xref target="brski-est-extensions-pledge"/>.</t>
        <t>The rationale for 2. follows from the flexible BRSKI trust model for, and purpose of, nonceless vouchers (Sections 5.5.* and 7.4.1 of <xref target="RFC8995"/>).</t>
        <t>Referring to the example of <xref target="fig-twoca"/> of a domain with a two-level certification authority, the most specific CA ("Sub-CA") is the
identity that is pinned by MASA in a nonced voucher.</t>
        <t>In case of a nonceless voucher, depending on the trust level, the MASA pins the "Registrar" certificate (low trust in customer), or the "Sub-CA" certificate (in case of
medium trust, implying that any Registrar of that sub-domain is acceptable), or even the "domain CA" certificate (in case of high trust in the customer, and possibly a pre-agreed need of the
customer to obtain flexible long-lived vouchers).</t>
      </section>
      <section anchor="pinned-with-rpk">
        <name>Pinning of Raw Public Keys (RPK)</name>
        <t>Specifically for the most-constrained use cases, the pinning of the raw public key (RPK) of the Registrar is also supported in the constrained voucher, instead of a PKIX certificate.
This is used by the RPK variant of cBRSKI described in <xref target="rpk-considerations"/>, but it can also be used in the default cBRSKI flow as a means to reduce voucher size.</t>
        <t>For both cases, if an RPK is pinned, it MUST be the RPK of the Registrar, which equals the public key of the Registrar's EE certificate.</t>
        <t>When the Pledge is known by MASA to support the RPK variant only, the voucher produced by the MASA pins the RPK of the Registrar in either the '<tt>pinned-domain-pubk</tt>'
or '<tt>pinned-domain-pubk-sha256</tt>' attribute of the voucher data.
This is described in more detail in <xref target="RFC8366bis"/> and <xref target="rpk-considerations"/>.</t>
        <t>When the Pledge is known by MASA to support PKIX operations, the '<tt>pinned-domain-cert</tt>' attribute present in a voucher normally pins a domain certificate.
That can be either the End-Entity certificate of the Registrar, or the certificate of a domain CA, as specified in <xref target="masa-pinning-policy"/>.
However, if the Pledge is known by MASA to also support RPK pinning and the MASA policy intends to pin the Registrar in the voucher (and not a CA), then MASA SHOULD pin the
RPK (RPK3 in <xref target="fig-pinning"/>) of the Registrar instead of the Registrar's End-Entity certificate to save space in the voucher.</t>
        <figure anchor="fig-pinning">
          <name>Raw Public Key (RPK) pinning examples</name>
          <artset>
            <artwork type="svg" align="center"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="288" width="472" viewBox="0 0 472 288" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px">
                <path d="M 8,208 L 8,256" fill="none" stroke="black"/>
                <path d="M 16,48 L 16,80" fill="none" stroke="black"/>
                <path d="M 16,128 L 16,160" fill="none" stroke="black"/>
                <path d="M 72,88 L 72,120" fill="none" stroke="black"/>
                <path d="M 72,168 L 72,200" fill="none" stroke="black"/>
                <path d="M 120,48 L 120,80" fill="none" stroke="black"/>
                <path d="M 120,128 L 120,160" fill="none" stroke="black"/>
                <path d="M 128,208 L 128,256" fill="none" stroke="black"/>
                <path d="M 176,208 L 176,256" fill="none" stroke="black"/>
                <path d="M 184,112 L 184,160" fill="none" stroke="black"/>
                <path d="M 240,168 L 240,200" fill="none" stroke="black"/>
                <path d="M 296,112 L 296,160" fill="none" stroke="black"/>
                <path d="M 296,208 L 296,256" fill="none" stroke="black"/>
                <path d="M 344,32 L 344,80" fill="none" stroke="black"/>
                <path d="M 344,128 L 344,160" fill="none" stroke="black"/>
                <path d="M 344,208 L 344,256" fill="none" stroke="black"/>
                <path d="M 400,88 L 400,120" fill="none" stroke="black"/>
                <path d="M 400,168 L 400,200" fill="none" stroke="black"/>
                <path d="M 448,128 L 448,160" fill="none" stroke="black"/>
                <path d="M 456,32 L 456,80" fill="none" stroke="black"/>
                <path d="M 464,208 L 464,256" fill="none" stroke="black"/>
                <path d="M 344,32 L 456,32" fill="none" stroke="black"/>
                <path d="M 16,48 L 120,48" fill="none" stroke="black"/>
                <path d="M 16,80 L 120,80" fill="none" stroke="black"/>
                <path d="M 344,80 L 456,80" fill="none" stroke="black"/>
                <path d="M 184,112 L 296,112" fill="none" stroke="black"/>
                <path d="M 16,128 L 120,128" fill="none" stroke="black"/>
                <path d="M 344,128 L 448,128" fill="none" stroke="black"/>
                <path d="M 16,160 L 120,160" fill="none" stroke="black"/>
                <path d="M 184,160 L 296,160" fill="none" stroke="black"/>
                <path d="M 344,160 L 448,160" fill="none" stroke="black"/>
                <path d="M 8,208 L 128,208" fill="none" stroke="black"/>
                <path d="M 176,208 L 296,208" fill="none" stroke="black"/>
                <path d="M 344,208 L 464,208" fill="none" stroke="black"/>
                <path d="M 8,256 L 128,256" fill="none" stroke="black"/>
                <path d="M 176,256 L 296,256" fill="none" stroke="black"/>
                <path d="M 344,256 L 464,256" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="408,200 396,194.4 396,205.6" fill="black" transform="rotate(90,400,200)"/>
                <polygon class="arrowhead" points="408,120 396,114.4 396,125.6" fill="black" transform="rotate(90,400,120)"/>
                <polygon class="arrowhead" points="248,200 236,194.4 236,205.6" fill="black" transform="rotate(90,240,200)"/>
                <polygon class="arrowhead" points="80,200 68,194.4 68,205.6" fill="black" transform="rotate(90,72,200)"/>
                <polygon class="arrowhead" points="80,120 68,114.4 68,125.6" fill="black" transform="rotate(90,72,120)"/>
                <g class="text">
                  <text x="384" y="52">private</text>
                  <text x="52" y="68">pub-CA</text>
                  <text x="96" y="68">(1)</text>
                  <text x="384" y="68">root-CA</text>
                  <text x="432" y="68">(1)</text>
                  <text x="224" y="132">private</text>
                  <text x="52" y="148">sub-CA</text>
                  <text x="96" y="148">(2)</text>
                  <text x="224" y="148">root-CA</text>
                  <text x="272" y="148">(1)</text>
                  <text x="380" y="148">sub-CA</text>
                  <text x="424" y="148">(2)</text>
                  <text x="68" y="228">Registrar(3)</text>
                  <text x="236" y="228">Registrar(3)</text>
                  <text x="404" y="228">Registrar(3)</text>
                  <text x="60" y="244">RPK3</text>
                  <text x="228" y="244">RPK3</text>
                  <text x="396" y="244">RPK3</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
                                          .-------------.
 .------------.                           | private     |
 | pub-CA (1) |                           | root-CA (1) |
 '------------'                           '-------------'
        |                                        |       
        v             .-------------.            v       
 .------------.       | private     |     .------------. 
 | sub-CA (2) |       | root-CA (1) |     | sub-CA (2) | 
 '------------'       '-------------'     '------------' 
        |                    |                   |       
        v                    v                   v       
.--------------.     .--------------.     .--------------.
| Registrar(3) |     | Registrar(3) |     | Registrar(3) |
|    RPK3      |     |    RPK3      |     |    RPK3      |
'--------------'     '--------------'     '--------------'
                                      
]]></artwork>
          </artset>
        </figure>
      </section>
    </section>
    <section anchor="artifacts">
      <name>Artifacts</name>
      <t>The YANG (<xref target="RFC7950"/>) module and CBOR serialization for the constrained voucher as used by cBRSKI are described in <xref target="RFC8366bis"/>.
That document also assigns SID values to YANG elements in accordance with <xref target="RFC9254"/> and <xref target="RFC9595"/>.
The present section provides some examples of these artifacts and defines a new signature format for these, using COSE.</t>
      <t>Compared to the first voucher request definition done in <xref target="RFC8995"/>, the constrained voucher request adds the attributes
'<tt>proximity-registrar-pubk</tt>' and '<tt>proximity-registrar-pubk-sha256</tt>'.
One of these is optionally used to replace the '<tt>proximity-registrar-cert</tt>' attribute, for a smaller voucher request data size -
useful for the most constrained cases.</t>
      <t>The constrained voucher adds the attributes '<tt>pinned-domain-pubk</tt>' and '<tt>pinned-domain-pubk-sha256</tt>' to pin an RPK.
One of these is optionally used instead of the '<tt>pinned-domain-cert</tt>' attribute, for a smaller voucher data size.</t>
      <section anchor="example-artifacts">
        <name>Example Artifacts</name>
        <section anchor="example-pvr">
          <name>Example Pledge Voucher Request (PVR) Artifact</name>
          <t>Below, example voucher data from a constrained voucher request (PVR) from a Pledge to a Registrar is shown in CBOR diagnostic notation.
Long CBOR byte strings have been shortened for readability, using the ellipsis ("...") to indicate elided bytes. This notation is 
defined in <xref target="I-D.ietf-cbor-edn-literals"/>. The enum value of the assertion attribute is
2 for the '<tt>proximity</tt>' assertion as defined in <xref section="8.3" sectionFormat="of" target="RFC8366bis"/>.</t>
          <sourcecode type="cbor-diag"><![CDATA[
{ 
 2501: {          / SID=2501, ietf-voucher-request:voucher|voucher /
   1: 2,                      / SID=2502, assertion 2 = "proximity"/
   7: h'831D5198A6CA2C7F',    / SID=2508, nonce                    /
  12: h'30593013' ... '9A54', / SID=2513, proximity-registrar-pubk /    
  13: "JADA123456789"         / SID=2514, serial-number            /
 }
}

]]></sourcecode>
          <t>The Pledge has included the attribute '<tt>proximity-registrar-pubk</tt>' which carries the public key of the Registrar, instead of including the full Registrar certificate in
a '<tt>proximity-registrar-cert</tt>' attribute. This is done to reduce the size of the PVR. Also note that the Pledge did not include the '<tt>created-on</tt>' attribute since it lacks an
internal real-time clock and has no knowledge of the current time at the moment of performing the onboarding.</t>
        </section>
        <section anchor="example-rvr">
          <name>Example Registrar Voucher Request (RVR) Artifact</name>
          <t>Next, example voucher data from a constrained voucher request (RVR) from a Registrar to a MASA is shown in CBOR diagnostic notation.
The Registrar has created this request triggered by the reception of the Pledge voucher request (PVR) of the previous example.
Again, long CBOR byte strings have been shortened for readability.</t>
          <sourcecode type="cbor-diag"><![CDATA[
{
 "ietf-voucher-request:voucher": {
    "assertion":     2, 
    "created-on":    "2022-12-05T19:19:19.536Z", 
    "nonce":         h'831D5198A6CA2C7F', 
    "idevid-issuer": h'04183016' ... '1736C3E0', 
    "serial-number": "JADA123456789", 
    "prior-signed-voucher-request": h'A11909' ... '373839'
 }
}

]]></sourcecode>
          <t>Note that the Registrar uses here the string data type for all key names, instead of the more compact SID integer keys. This is fine for any use cases where the
network between Registrar and MASA is an unconstrained network where data size is not critical.
The constrained voucher request format supports both the string and SID key types, for PVR as well as RVR.</t>
        </section>
        <section anchor="example-voucher">
          <name>Example Voucher Artifacts</name>
          <t>Below, an example of constrained voucher data is shown in CBOR diagnostic notation. It was created by a MASA in response to
receiving the Registrar Voucher Request (RVR) shown in <xref target="example-rvr"/>. The enum value of the '<tt>assertion</tt>' attribute is set to "proximity" (2),
to acknowledge to both the Pledge and the Registrar that the proximity of the Pledge to the Registrar is considered proven.</t>
          <sourcecode type="cbor-diag"><![CDATA[
{
 2451: {               / SID = 2451, ietf-voucher:voucher|voucher /
   1: 2,                      / SID = 2452, assertion "proximity" /
   2: "2022-12-05T19:19:23Z", / SID = 2453, created-on            /
   3: false,       / SID = 2454, domain-cert-revocation-checks    /
   7: h'831D5198A6CA2C7F',    / SID = 2508, nonce                 /
   8: h'308201' ... '8CFF',   / SID = 2459, pinned-domain-cert    /
  11: "JADA123456789"         / SID = 2462, serial-number         /
 }
}

]]></sourcecode>
          <t>While the above example voucher data includes the nonce from the PVR, the next example is for a nonce-less voucher. Instead of a nonce, it
includes an '<tt>expires-on</tt>' attribute with the date and time on which the voucher expires. Because the MASA did not verify the proximity of
the Pledge and Registrar in this case, the '<tt>assertion</tt>' attribute contains a weaker assertion of "verified" (0).
This indicates that the MASA verified the domain's ownership of the Pledge via some other means.</t>
          <sourcecode type="cbor-diag"><![CDATA[
{
 2451: {               / SID = 2451, ietf-voucher:voucher|voucher /
   1: 0,                      / SID = 2452, assertion "verified"  /
   2: "2022-12-06T10:15:32Z", / SID = 2453, created-on            /
   3: false,          / SID = 2454, domain-cert-revocation-checks /
   4: "2022-12-13T10:15:32Z", / SID = 2455, expires-on            /
   8: h'308201F8' ... 'FF',   / SID = 2459, pinned-domain-cert    /
  11: "JADA123456789"         / SID = 2462, serial-number         /
 }
}

]]></sourcecode>
          <t>The voucher is valid for one week. To verify the voucher's validity, the Pledge would either need an internal real-time clock
or some external means of obtaining the current time, such as Network Time Protocol (NTP) or a radio time signal receiver.</t>
        </section>
      </section>
      <section anchor="VR-COSE">
        <name>Signing Voucher and Voucher Request Artifacts with COSE</name>
        <t>The COSE_Sign1 structure is discussed in <xref section="4.2" sectionFormat="of" target="RFC9052"/>.
The CBOR object that carries the body, the signature, and the information about the body and signature is called the COSE_Sign1 structure.
It is used when only one signature is used on the body.</t>
        <t>Support for ECDSA with SHA2-256 using curve secp256r1 (aka prime256k1) is RECOMMENDED.
Most current low power hardware has support for acceleration of this algorithm.
Future hardware designs could omit this in favour of a newer algorithms.
This is the ES256 (-7) keytype from Table 1 of <xref target="RFC9053"/>.
Support for curve secp256k1 is OPTIONAL.</t>
        <t>Support for EdDSA using Curve 25519 is RECOMMENDED in new designs if hardware support is available.
This is keytype EDDSA (-8) from Table 2 of <xref target="RFC9053"/>.
A '<tt>crv</tt>' parameter is necessary to specify the Curve, for example value Ed25519 (6) from Table 18 of <xref target="RFC9053"/>.
The '<tt>kty</tt>' field MUST be present, and it MUST be "OKP" (Table 17 of <xref target="RFC9053"/>).</t>
        <t>A transition towards EdDSA is occurring in the industry.
Some hardware can accelerate only some algorithms with specific curves, other hardware can accelerate any curve, and still other kinds of hardware provide a tool kit for acceleration of any elliptic curve algorithm.</t>
        <t>In general, the Pledge is expected to support only a single algorithm, while the Registrar, usually not constrained, is expected to support a wide variety of algorithms: both legacy ones and up-and-coming ones via regular software updates.</t>
        <t>An example of the supported COSE_Sign1 object structure containing a Pledge Voucher Request (PVR) is shown below.</t>
        <sourcecode type="cbor-diag"><![CDATA[
18(                   / tag for COSE_Sign1                       /
 [
   h'A10126',         / protected COSE header encoding: {1: -7}  /
                      /            which means { "alg": ES256 }  /
   {},                / unprotected COSE header parameters       /
   h'A119' ... '3839', / PVR payload wrapped in CBOR byte string /
   h'4567' ... '1234'  / PVR binary Sign1 signature              /
 ]
)
]]></sourcecode>
        <t>The <xref target="COSE-registry"/> specifies the integers/encoding for the '<tt>alg</tt>' field. The '<tt>alg</tt>'
field restricts the key usage for verification of this COSE object to a particular cryptographic algorithm.</t>
        <section anchor="signing-of-registrar-voucher-request-rvr">
          <name>Signing of Registrar Voucher Request (RVR)</name>
          <t>A Registrar MUST include a COSE '<tt>x5bag</tt>' structure in the RVR as explained in <xref target="registrar-identity"/>.
Below, an example Registrar Voucher Request (RVR) is shown that includes the '<tt>x5bag</tt>' unprotected
header parameter (32). The bag contains two certificates in this case.</t>
          <sourcecode type="cbor-diag"><![CDATA[
18(                    / tag for COSE_Sign1                      /
 [
   h'A10126',          / protected COSE header encoding: {1: -7} /
                       /            which means { "alg": ES256 } /
   {                   / unprotected COSE header/
     32: [h'308202' ... '20AE', h'308201' ... '8CFF']    / x5bag /
   },
   h'A178' ... '7FED', / RVR payload wrapped in CBOR byte string /
   h'E1B7' ... '2925'  / RVR binary Sign1 signature              /
 ]
)
]]></sourcecode>
          <t>Besides storing the Registrar's own RVR-signing certificate chain (per <xref target="registrar-identity"/>), the Registrar MUST
include in the same '<tt>x5bag</tt>' structure all the certificates that the Pledge used to identify
itself in the Pledge/Registrar DTLS handshake, including the End-Entity (IDevID) certificate and all CAs up to the
root CA.
This serves two purposes:</t>
          <ol spacing="normal" type="1"><li>
              <t>A MASA that does not store the IDevIDs for all Pledges and their related sub-CAs is still able to reconstruct the
certificate chain for a given Pledge and validate the Pledge's signature on the PVR based purely on the root CA of
the Pledge's manufacturer that the MASA is storing.</t>
            </li>
            <li>
              <t>Diagnostic/debugging purposes: since the PVR's COSE signature does not store any certificates related to the signer,
but only the signature itself, it can be useful for the MASA to log or inspect the Pledge's certificate chain in
case the onboarding attempt fails.
Having the complete signing certificate chain at hand facilitates finding the root cause of the problem and helps
in the communication with the customer.</t>
            </li>
          </ol>
          <t>A '<tt>kid</tt>' (key ID) field is OPTIONAL in the unprotected COSE header parameters map of a COSE object.
If present, it identifies the public key of the key pair that was used to sign the
COSE message. The value of the key identifier '<tt>kid</tt>' parameter may be in any format agreed between signer and verifier.
Usually a hash of the public key is used to identify the public key; but the choice of key identifier method is
vendor-specific.</t>
          <t>By default, a Registrar does not include a '<tt>kid</tt>' parameter in the RVR since the signing key
is already identified by the signing certificates chain included in the COSE '<tt>x5bag</tt>' structure.
A Registrar nevertheless MAY use a '<tt>kid</tt>' parameter in its RVR to identify its signing key/identity.</t>
          <t>The method of generating such '<tt>kid</tt>' value is vendor-specific and SHOULD be configurable in the Registrar to
support commonly used methods. In order to support future business cases and supply chain integrations,
a Registrar using the '<tt>kid</tt>' field MUST be configurable, on a per-manufacturer basis,
to select a particular method for generating the '<tt>kid</tt>' value such that it is compatible with the method that
the manufacturer expects. Note that the '<tt>kid</tt>' field always has a CBOR byte string (bstr) format.</t>
          <t>In <xref target="rvr-example"/> a further example of a signed RVR is shown.</t>
        </section>
        <section anchor="signing-of-pledge-voucher-request-pvr">
          <name>Signing of Pledge Voucher Request (PVR)</name>
          <t>Like in the RVR, a '<tt>kid</tt>' (key ID) field is also OPTIONAL in the PVR. It can be used to identify the signing key/identity
to the MASA.</t>
          <t>A Pledge by default SHOULD NOT use a '<tt>kid</tt>' parameter in its PVR, because its signing key is already identified
by the Pledge's unique serial number that is included in the PVR and (by the Registrar) in the RVR. This achieves the smallest possible
PVR data size while still enabling the MASA to fully verify the PVR.
Still, when required the Pledge MAY use a '<tt>kid</tt>' parameter in its PVR to help the MASA identify the right public key to verify against. This can occur
for example if a Pledge has multiple IDevID identities. The '<tt>kid</tt>' parameter in this case may be an integer byte identifying one out of N identities
present, or it may be a hash of the public key, or anything else the Pledge vendor decides.
A Registrar normally SHOULD ignore a '<tt>kid</tt>' parameter used in a received PVR, as this information is intended for the MASA.
In other words, there is no need for the Registrar to verify the contents of this field, but it may include it in an audit log.</t>
          <t>The example below shows a PVR with '<tt>kid</tt>' present as an unprotected header parameter.</t>
          <sourcecode type="cbor-diag"><![CDATA[
18(                    / tag for COSE_Sign1                      /
 [
   h'A10126',          / protected COSE header encoding: {1: -7} /
                       /            which means { "alg": ES256 } /
   {
      4: h'59AB3E'     / COSE "kid" header parameter             /
   },
   h'A119' ... '3839', / PVR payload wrapped in CBOR byte string /
   h'5678' ... '7890'  / PVR binary Sign1 signature              /
 ]
)
]]></sourcecode>
          <t>The Pledge SHOULD NOT use the '<tt>x5bag</tt>' or '<tt>x5chain</tt>' COSE header parameters in the PVR.
A Registrar that processes a PVR with such a structure MUST ignore
it, and MUST use only the TLS Client Certificate extension for
authentication of the Pledge.</t>
          <t>A situation where the Pledge MAY use the '<tt>x5bag</tt>' or '<tt>x5chain</tt>' structure is for communication
of certificate chains to the MASA.  This would arise in some vendor-
specific situations involving outsourcing of MASA functionality, or
rekeying of the IDevID certification authority.</t>
          <t>In <xref target="pvr-example"/> a further example of a signed PVR is shown.</t>
        </section>
        <section anchor="sign-voucher-masa">
          <name>Signing of Voucher by MASA</name>
          <t>The MASA SHOULD NOT use a '<tt>kid</tt>' parameter in the voucher response, because the MASA's signing
key is already known to the Pledge. Still, where needed the MASA MAY use
a '<tt>kid</tt>' parameter in the voucher response to help the Pledge identify the right MASA public key
to verify against. This can occur for example if a Pledge has multiple IDevID identities.</t>
          <t>The MASA SHOULD NOT include an '<tt>x5bag</tt>' or '<tt>x5chain</tt>' attribute in the protected header of the voucher response, because
normally a Pledge already stores the required public key for validation of the signed voucher.
The exception case is if the MASA knows that the Pledge doesn't pre-store the MASA's public key used for signing, and thus the MASA needs to provide
a certificate or certificate chain that will enable linking the signing identity to a pre-stored Trust Anchor (CA) in the Pledge.
This approach is not recommended, because including certificates in the protected '<tt>x5bag</tt>' or '<tt>x5chain</tt>' COSE header parameters will
significantly increase the size of the voucher which impacts cBRSKI operation on constrained networks.</t>
          <t>For example, if the MASA signing key is based upon a PKI (see <xref target="I-D.richardson-anima-masa-considerations"/> Section 2.3), and the Pledge
only pre-stores a manufacturer (root) CA identity in its Trust Store which is not the identity that signs the voucher,
then a certificate chain needs to be included with the voucher in order for the Pledge to validate the MASA signing CA's signature
by validating the chain up to the CA in its Trust Store.
In BRSKI CMS signed vouchers <xref target="RFC8995"/>, the CMS structure has a place for such a certificate chain.
In cBRSKI COSE-signed vouchers, the '<tt>x5bag</tt>' attribute <xref target="RFC9360"/> placed in the
COSE protected header parameters is used to contain the needed certificates for the Pledge to form the chain.</t>
          <t>To signal the complete chain of the MASA's signing identity to the Registrar, the MASA MUST include the complete
chain of signing certificates in an '<tt>x5bag</tt>' attribute in the unprotected header of the voucher.
This allows the Registrar to optionally validate the voucher before forwarding it to the Pledge, or to validate it for
logging purposes.
There is no voucher size impact of including this certificate chain in an unprotected '<tt>x5bag</tt>' COSE header parameter for
constrained networks, because the Registrar will remove this unprotected attribute prior to forwarding the voucher
response to the Pledge, as defined in <xref target="brski-extensions-registrar"/>.</t>
          <t>Note that cBRSKI currently does not support signing the voucher with an RPK for which there is no corresponding
certificate at all.
If the MASA wants to sign a voucher with an RPK that is not part of any PKIX hierarchy, it creates
a single self-signed "placeholder" root CA certificate that uses the designated RPK as the public key.
This "placeholder" certificate is then included as the sole certificate in an unprotected '<tt>x5bag</tt>' header parameter,
as defined in the previous paragraph.</t>
          <t>Below, an example is shown of a COSE-signed voucher as created by MASA.
This example shows the common case where a protected '<tt>x5bag</tt>' (32) attribute is not used, while an unprotected
'<tt>x5bag</tt>' (32) attribute is used to communicate the MASA's signature certificate chain to the Registrar.
The bag contains two certificates in this example. One of these is the identity of the signer of the
COSE_Sign1 object, whose signature is stored as the last CBOR array element in the below example.</t>
          <sourcecode type="cbor-diag"><![CDATA[
18(                    / tag for COSE_Sign1                        /
 [
   h'A10126',          / protected COSE header encoding: {1: -7}   /
                       /            which means { "alg": ES256 }   /
   {                   / unprotected COSE header parameters        /
     32: [h'308202' ... '20AE', h'308201' ... '8CFF']      / x5bag /
   },
   h'A119' ... '3839', / voucher payload wrapped in CBOR byte str  /
   h'2A2C' ... '7FBF'  / voucher binary Sign1 signature by MASA    /
 ]
)
]]></sourcecode>
          <t>In <xref target="voucher-example"/> a further example of a signed voucher is shown.</t>
        </section>
        <section anchor="optional-validation-of-voucher-by-registrar">
          <name>Optional Validation of Voucher by Registrar</name>
          <t>For a Registrar, validation of the voucher and/or the signature of the voucher is optional, per <xref section="5.6" sectionFormat="of" target="RFC8995"/>.
However, if a Registrar does perform the validation of the signature chain, communicated in the '<tt>x5bag</tt>' unprotected
COSE header parameter (see <xref target="sign-voucher-masa"/>)), it MUST validate that one of the below cases hold:</t>
          <ol spacing="normal" type="1"><li>
              <t>The signature chain is a single self-signed root CA certificate with a correct signature; and the public key in
this certificate is also the public key that signed the voucher. This represents the case where a voucher has been
effectively signed with an RPK.</t>
            </li>
            <li>
              <t>The signature chain consists of one or more certificates that can be chained to a known (preconfigured) trust root
in the Registrar.</t>
            </li>
          </ol>
          <t>The above validation elements are needed only for cases where (nonceless) vouchers are communicated over potentially
unsecure channels to the Registrar. Since the '<tt>x5bag</tt>' header parameter is not protected by the voucher's COSE
signature, it could have been modified in transit.</t>
        </section>
        <section anchor="additional-information-in-the-cose-header">
          <name>Additional Information in the COSE Header</name>
          <t>The COSE header of the signed voucher can contain COSE header parameters with additional information,
to be used by the Pledge.
This information is additional to, and separate from, the voucher data defined by <xref target="RFC8366bis"/>.</t>
          <t>An example of how this additional information can be used is adding a CBOR Web Token (CWT, <xref target="RFC8392"/>) claim in the COSE
header as defined by <xref target="RFC9597"/>, to encode the COSE signing time as an integer value in an '<tt>iat</tt>' (Issued At) CWT claim.
This information in an integer format may be useful for a Pledge that does not have date/time parsing functions, so
it is unable to parse the date/time string value contained in the voucher.
Many other types of CWT claims can be included in a voucher in the same way, as needed for particular use cases.</t>
          <t>Such additional information can also be included in a COSE header of a voucher request by a Pledge, to be used by the MASA.</t>
        </section>
      </section>
    </section>
    <section anchor="discovery">
      <name>Extensions to Discovery</name>
      <t>It is assumed that a Join Proxy (<xref target="joinproxy"/>) seamlessly provides a relayed DTLS connection between the Pledge and the Registrar.
To use a Join Proxy, a Pledge needs to discover it. For Pledge discovery of a Join Proxy, this section extends Section 4.1 of <xref target="RFC8995"/> for the cBRSKI case.</t>
      <t>In general, the Pledge may be one or more hops away from the Registrar, where one hop means the Registrar is a direct link-local neighbor of the Pledge.
The case of one hop away can be considered as a degenerate case, because a Join Proxy is not really needed then.</t>
      <t>The degenerate case would be unusual in constrained wireless network deployments, because a Registrar would typically not have a wireless network interface of the type used by constrained devices.
Rather, it would have a high-speed network interface.
Nevertheless, the situation where the Registrar is one hop away from the Pledge could occur in various cases like wired IoT networks or in wireless constrained networks where the Pledge is in radio range of a 6LoWPAN Border Router (6LBR) (<xref target="RFC6775"/>)and the 6LBR happens to host a Registrar.</t>
      <t>In order to support the degenerate case, the Registrar SHOULD announce itself as if it were a Join Proxy -- though it would actually announce its real (stateful) Registrar CoAPS endpoint.
No actual Join Proxy functionality is then required on the Registrar.</t>
      <t>That way, a Pledge only needs to discover a Join Proxy, regardless of whether it is one or more than one hop away from a relevant Registrar.
It first discovers the link-local address and the UDP join-port of a Join Proxy.
The Pledge then follows the cBRSKI procedure of initiating a DTLS connection using the link-local address and join-port of the Join Proxy.</t>
      <t>Once enrolled, a Pledge itself may function as a Join Proxy.
The decision whether or not to provide this functionality depends upon many factors and is out of scope for this document.
Such a decision might depend upon the amount of energy available to the device, the network bandwidth available, as well as CPU and memory availability.</t>
      <t>The process by which a Pledge discovers the Join Proxy, and how a Join Proxy discovers the location of the Registrar, are the subject of the remainder of this section.
Further details on both these topics are provided in <xref target="I-D.ietf-anima-constrained-join-proxy"/>.</t>
      <section anchor="discovery-operations-by-a-pledge">
        <name>Discovery Operations by a Pledge</name>
        <t>The Pledge must discover the address/port and optionally the protocol with which to communicate. The present document only defines coaps (CoAP over DTLS) as the default protocol for cBRSKI, 
therefore protocol discovery is out of scope.</t>
        <t>For the discovery method, this section only defines unsecured CoAP discovery per <xref section="7" sectionFormat="of" target="RFC7252"/> as the default method. This uses CoRE Link Format <xref target="RFC6690"/> payloads.</t>
        <t><xref target="discovery-considerations"/> briefly mentions other methods that apply to specific deployment types or technologies.
Details about these deployment-specific methods, or yet other methods, new payload formats, or more elaborate CoAP-based methods, may be defined in future documents such as <xref target="I-D.ietf-anima-brski-discovery"/>.
The more elaborate methods for example may include discovering only Join Proxies that support a particular desired onboarding protocol, voucher format, or cBRSKI variant.</t>
        <t>Note that identifying the format of the voucher request and the voucher is currently not a required part of the Pledge's discovery operation.
It is assumed that all Registrars support all relevant voucher(-request) formats, while the Pledge only supports a single format.
A Pledge that makes a voucher request to a Registrar that does not support that format will receive a CoAP 4.06 Not Acceptable status code and the onboarding attempt will fail.</t>
        <t>Using CoAP discovery, a Pledge can discover a Join Proxy by sending a link-local multicast discovery message to the All CoAP Nodes address FF02::FD.
Zero, one, or multiple Join Proxies may respond.
The handling of multiple responses and absence of responses cases follow the guidelines of <xref section="4" sectionFormat="of" target="RFC8995"/>.
The discovery message is a CoAP GET request on the URI path <tt>/.well-known/core</tt> using a URI query "<tt>rt=brski.jp</tt>". This resource type ('<tt>rt</tt>') is defined
in <xref section="8.1" sectionFormat="of" target="I-D.ietf-anima-constrained-join-proxy"/>.</t>
        <t>Responding Join Proxies return a CoRE Link Format document with one or more links.
Each link indicates one CoAPS endpoint that offers cBRSKI Join Proxy functionality.
Formally, each link indicates a CoAP root resource (<tt>/</tt>) tagged with the "<tt>brski.jp</tt>" type, hosted on a CoAPS endpoint.</t>
        <t>In case a Pledge selects a particular Join Proxy for cBRSKI onboarding, it MUST use the link-local source address of
the Join Proxy's discovery response as the destination IP address for its subsequent onboarding attempt.
This implies that the UTF-8 encoded link-local address literal that appears in the host subcomponent of each returned
link is not used for determining the destination IP address of the onboarding attempt.</t>
        <section anchor="pledge-discovery-examples">
          <name>Examples</name>
          <t>Below, a typical example is provided showing the Pledge's CoAP request and the Join Proxy's CoAP response. The Join Proxy responds with a link-local
source address, which is the same address as indicated in the URI-reference element (<xref target="RFC6690"/>) in the link in the discovery response payload.
The Join Proxy has a dedicated UDP port 8485 open for DTLS connections of Pledges:</t>
          <artwork><![CDATA[
  REQ: GET coap://[ff02::fd]/.well-known/core?rt=brski.jp

  RES: 2.05 Content
    Content-Format: 40 (application/link-format)
    Payload:
      <coaps://[fe80::c78:e3c4:58a0:a4ad]:8485>;rt=brski.jp
]]></artwork>
          <t>Note that the Pledge would use the port number from the link in this response, but not the IPv6 literal in the host
subcomponent (<tt>[fe80::c78:e3c4:58a0:a4ad]</tt>), as defined by the above discovery operation steps.</t>
          <t>The next example shows a Join Proxy that uses the default CoAPS port 5684 for DTLS connections of Pledges. In this case, the Join Proxy host
is not using port 5684 for any other purposes, so it has the port available exclusively for accepting DTLS connections
of Pledges.</t>
          <artwork><![CDATA[
  REQ: GET coap://[ff02::fd]/.well-known/core?rt=brski.jp

  RES: 2.05 Content
    Content-Format: 40 (application/link-format)
    Payload:
      <coaps://[fe80::c78:e3c4:58a0:a4ad]>;rt=brski.jp
]]></artwork>
          <t>In the following example, two Join Proxies respond to the multicast query. The Join Proxies each use a slightly different CoRE Link Format
'<tt>rt</tt>' value encoding. While the first encoding is more compact, both encodings are allowed per <xref target="RFC6690"/>. The Pledge may now select one of the
two Join Proxies for initiating its DTLS connection.</t>
          <artwork><![CDATA[
  REQ: GET coap://[ff02::fd]/.well-known/core?rt=brski*

  RES: 2.05 Content
    Content-Format: 40 (application/link-format)
    Payload:
      <coaps://[fe80::c78:e3c4:58a0:a4ad]:8485>;rt=brski.jp

  RES: 2.05 Content
    Content-Format: 40 (application/link-format)
    Payload:
      <coaps://[fe80::d359:3813:f382:3b23]:63245>;rt="brski.jp"
]]></artwork>
          <t>In the final example, a single Join Proxy host responds with two distinct cBRSKI endpoints.
The Pledge may now select one of the two CoAP endpoints for initiating its DTLS connection.</t>
          <artwork><![CDATA[
  REQ: GET coap://[ff02::fd]/.well-known/core?rt=brski*

  RES: 2.05 Content
    Content-Format: 40 (application/link-format)
    Payload:
      <coaps://[fe80::d359:3813:f382:3b23]:61616>;rt=brski.jp
      <coaps://[fe80::d359:3813:f382:3b23]:61617>;rt=brski.jp;
                                                  var="c509 v2"
]]></artwork>
          <t>The first endpoint on port 61616 supports only the cBRSKI protocol as defined by this document.
The second endpoint, on port 61617, supports the same cBRSKI protocol as well as additional variations or extensions.
In this example, these variations/extensions are encoded using string values in a single attribute '<tt>var</tt>'.
This information may be also encoded using other attributes defined by a future specification.</t>
          <t>A Pledge not aware of these variations can safely ignore these values, because the base cBRSKI protocol is supported
by both endpoints, as indicated by the resource type ('<tt>rt</tt>').
If however a Pledge is aware of these variations, it can select the endpoint with the variation it prefers, in case multiple options are discovered.
The use of attributes with a single base resource type allows future extensibility of cBRSKI, and enables the
Join Proxies to support cBRSKI variants that are unknown to them.</t>
        </section>
      </section>
      <section anchor="discovery-operations-by-a-join-proxy">
        <name>Discovery Operations by a Join Proxy</name>
        <t>A Join Proxy needs to discover a Registrar, either at the moment it needs to relay data (of a Pledge) towards the Registrar, or prior to that moment. For example, it may start Registrar 
discovery as soon as it is requested to be enabled in a Join Proxy role. It may periodically redo this discovery, or periodically or on-demand check that the Registrar is still available 
in the network at the discovered IP address.</t>
        <t>As shown in the final example in <xref target="pledge-discovery-examples"/>, a Join Proxy can discover multiple Registrars in its network
and present these options to the Pledge.
Each of these Registrars may support specific variations/extensions of cBRSKI - which may be defined in future documents.
It is up to the administrator of the network how many Registrars are enabled.</t>
        <t>Further details on CoAP discovery of the Registrar by a Join Proxy are provided in <xref section="5.1.1" sectionFormat="of" target="I-D.ietf-anima-constrained-join-proxy"/>.</t>
      </section>
    </section>
    <section anchor="discovery-considerations">
      <name>Deployment-specific Discovery Considerations</name>
      <t>This section details how discovery of a Join Proxy is done by the Pledge in specific deployment scenarios.
Future work such as <xref target="I-D.ietf-anima-brski-discovery"/> may define more details on discovery operations in
the specific deployments listed here.</t>
      <section anchor="tisch-deployments">
        <name>6TiSCH Deployments</name>
        <t>In 6TiSCH networks, the Constrained Join Protocol (CoJP) is used as described in <xref target="RFC9031"/>.
Such networks are expected to use EDHOC <xref target="RFC9528"/> for key management, which is out of scope of this document.
The IEEE 802.15.4 Enhanced Beacon has been extended in <xref target="RFC9032"/> to allow for discovery of a 6TiSCH-compliant Join Proxy.</t>
      </section>
      <section anchor="ip-networks-using-grasp">
        <name>IP networks using GRASP</name>
        <t>In IP networks that support GRASP <xref target="RFC8990"/>, a Pledge can discover a Join Proxy by listening for GRASP messages.
GRASP supports mesh networks, and can also be used over unencrypted Wi-Fi.</t>
        <t>Details of GRASP discovery of constrained Join Proxies are out of scope of this document and may be defined in
future work.</t>
      </section>
      <section anchor="ip-networks-using-mdns">
        <name>IP networks using mDNS</name>
        <t><xref target="RFC8995"/> defines a mechanism for the Pledge to discover a Join Proxy by sending mDNS <xref target="RFC6762"/> queries.
This mechanism can be used on any IP network which does not have another recommended mechanism.
It can be used over unencrypted Wi-Fi.
This mechanism does support link-local Join Proxy discovery in mesh networks. However, it does not support Registrar
discovery by Join Proxies in mesh networks, because the Registrar is typically not reachable by link-local communication
in that case. For this, another mechanism is needed, which is out of scope of this document and may be defined in 
future work.</t>
        <t>A Pledge uses an mDNS PTR query for the name "<tt>_brski-proxy._udp.local.</tt>" to discover link-local constrained Join Proxies.
The label "<tt>_udp</tt>" here indicates a query for cBRSKI constrained Join Proxies, as opposed to "<tt>_tcp</tt>" defined in <xref target="RFC8995"/>
which is for discovering BRSKI Proxies.</t>
      </section>
      <section anchor="thread-networks-using-mesh-link-establishment-mle">
        <name>Thread Networks using Mesh Link Establishment (MLE)</name>
        <t>Thread <xref target="Thread"/> is a wireless mesh network protocol based on 6LoWPAN <xref target="RFC6282"/> and other IETF protocols. In Thread, a new device
discovers potential Thread networks and Thread nodes to join by using the Mesh Link Establishment (MLE) <xref target="I-D.ietf-6lo-mesh-link-establishment"/> protocol.
MLE uses the UDP port number 19788.</t>
        <t>The new device sends discovery requests on different IEEE 802.15.4 radio channels, to which Thread nodes
(if any present) respond with a discovery response containing information about their respective network.
The MLE discovery response message contains UDP port information to signal the new device which UDP port to use for its
DTLS connection to the Join Proxy function.
The link-local IPv6 source address of the MLE response message indicates the address of the Join Proxy.</t>
        <t>Once a suitable Thread node is selected as its Join Proxy, the new device initiates a DTLS transport-layer secured
connection to the network's commissioning application, over a link-local single radio hop to the selected Join Proxy.
This link is not yet secured at the radio/MAC link layer: link-layer security will be set up once the new device is
approved by the commissioning application to join the Thread network, and it gets provisioned with
network access credentials.</t>
        <t>A Thread node that is capable to act as a Join Proxy will only enable this role if the network-wide configuration data
indicates that new device commissioning is allowed.</t>
      </section>
    </section>
    <section anchor="design-considerations">
      <name>Design and Implementation Considerations</name>
      <section anchor="voucher-format-and-encoding">
        <name>Voucher Format and Encoding</name>
        <t>The design considerations for vouchers from <xref section="10" sectionFormat="of" target="RFC8366bis"/> apply. Specifically for CBOR encoding of voucher data,
one key difference with JSON encoding is that the names of the leaves in the YANG definition do not affect the size of the resulting CBOR,
if the SID (<xref target="RFC9254"/>, <xref target="RFC9595"/>) translation process is used that assigns integers to the names.</t>
        <t>To obtain the lowest code size and RAM use on the Pledge, it is recommended that a Pledge is designed to only process/generate these SID integers and not the lengthy strings.
The MASA in that case is required to generate the voucher data for that Pledge using only SID integers.
Yet, this MASA MUST still support both SID integers and strings, to be able to process attribute (string)
names in the RVR which the Registrar may use.</t>
      </section>
      <section anchor="coap-usage">
        <name>CoAP Usage</name>
        <t>A successful POST request to the Registrar's telemetry resources (<tt>/vs</tt>, <tt>/es</tt>) returns a 2.04 Changed response with empty payload.</t>
        <t>A CoAP client sending a request should be aware that the server, even in case of an empty payload, may use either a piggybacked
CoAP response (for example ACK with code 2.04) but may also respond with a separate CoAP response.
This is first an ACK message with code 0.0 that acknowledges the reception of the request.
It is followed by a CON message with a code 2.04 response in a separate CoAP message.
See <xref target="RFC7252"/> for details.</t>
      </section>
      <section anchor="use-of-cbrski-with-https">
        <name>Use of cBRSKI with HTTPS</name>
        <t>This specification contains two major extensions to <xref target="RFC8995"/>: a constrained voucher format (COSE), and a constrained transfer protocol (CoAP).</t>
        <t>On constrained networks with constrained devices, it make senses to use both together.
However, this document does not mandate that this be the only way.</t>
        <t>A given constrained device design and software may be re-used for multiple device models, such as a model having only an IEEE 802.15.4 radio, or a model
having only an IEEE 802.11 (Wi-Fi) radio, or a model having both these radios.
A manufacturer of such device models may wish to have code only for the use of the constrained voucher format (COSE), and use it on all supported radios
including the IEEE 802.11 radio. For this radio, the software stack to support HTTP/TLS may be already integrated into the radio module hence it is
attractive for the manufacturer to reuse this. This type of approach is supported by this document.
In the case that HTTPS is used, the regular long <xref target="RFC8995"/> resource names are used, together with the new <tt>application/voucher+cose</tt> media type described in this document.
For status telemetry requests, the format and requirements defined in <xref target="telemetry"/> remain unchanged.</t>
        <t>Other combinations are possible, but they are not enumerated here.
New work such as <xref target="I-D.ietf-anima-jws-voucher"/> provides new formats that may be usable over a number of different transports.
In general, sending larger payloads over constrained networks makes less sense,
while sending smaller payloads over unconstrained networks is perfectly acceptable.</t>
        <t>The Pledge will in most cases support a single voucher format, which it uses without negotiation i.e. without discovery of formats supported.
The Registrar, being unconstrained, is expected to support all voucher formats.
There will be cases where a Registrar does not support a new format that a new Pledge uses, and this is an unfortunate situation that will result in lack of interoperation.</t>
        <t>The responsibility for supporting new formats is on the Registrar.</t>
      </section>
    </section>
    <section anchor="rpk-considerations">
      <name>Raw Public Key Variant</name>
      <section anchor="introduction-and-scope">
        <name>Introduction and Scope</name>
        <t>This section introduces a cBRSKI variant to further reduce the data volume and complexity of the cBRSKI onboarding.
The use of a raw public key (RPK) in the pinning process can significantly reduce the number of bytes sent over the wire and the number of round trips, and reduce the code footprint in a Pledge.
But it comes with a few significant operational limitations.</t>
        <t>One simplification that comes with RPK use is that a Pledge can avoid doing PKIX operations, such as certificate chain validation.</t>
      </section>
      <section anchor="dtls-connection-and-registrar-trust-anchor">
        <name>DTLS Connection and Registrar Trust Anchor</name>
        <t>When the Pledge first connects to the Registrar, the connection to the Registrar is provisional, as explained in <xref section="5.6.2" sectionFormat="of" target="RFC8995"/>.
The Registrar normally provides its public key in a TLSServerCertificate, and the Pledge uses that to validate that integrity of the DTLS connection, but it does not validate the identity of
the provided certificate.</t>
        <t>As the TLSServerCertificate object is never verified directly by the Pledge, sending it can be considered superfluous.
So instead of using a (TLSServer)Certificate of type X509 (see <xref section="4.4.2" sectionFormat="of" target="RFC8446"/>),
a RawPublicKey object (as defined by <xref target="RFC7250"/>) is used.</t>
        <t>A Registrar operating in a mixed environment can determine whether to send a PKIX certificate chain or a Raw Public Key to the Pledge: this is signaled by the Pledge.
In the case the Pledge needs an RPK, it includes the server_certificate_type of RawPublicKey.
This is shown in <xref section="5" sectionFormat="of" target="RFC7250"/>.</t>
        <t>The Pledge MUST send a client_certificate_type of X509 (not an RPK), so that the Registrar can properly identify the Pledge and distill the MASA URI information from its IDevID certificate.</t>
      </section>
      <section anchor="the-pledge-voucher-request">
        <name>The Pledge Voucher Request</name>
        <t>The Pledge puts the Registrar's public key into the '<tt>proximity-registrar-pubk</tt>' attribute of the Pledge Voucher Request (PVR).
The '<tt>proximity-registrar-pubk-sha256</tt>' can alternatively be used for efficiency, if the 32-bytes of a SHA256 hash turns out to be smaller than a typical ECDSA key.</t>
        <t>As the format of the '<tt>proximity-registrar-pubk</tt>' attribute is identical to the TLS RawPublicKey data object, no manipulation at all is needed to insert this attribute into the PVR.
This approach reduces the size of the PVR significantly, compared to including the full certificate.</t>
      </section>
      <section anchor="the-voucher-response">
        <name>The Voucher Response</name>
        <t>A returned voucher will have a '<tt>pinned-domain-pubk</tt>' attribute with the identical key as was found in the '<tt>proximity-registrar-pubk</tt>' attribute above, as well as being identical to the
Registrar's RPK in the currently active DTLS connection.
(Or alternatively the MASA may include the '<tt>pinned-domain-pubk-sha256</tt>' attribute if it knows the Pledge supports this attribute.)</t>
        <t>Validation of this key by the Pledge is what takes the DTLS connection out of the provisional state; see <xref section="5.6.2" sectionFormat="of" target="RFC8995"/> for more details.</t>
        <t>The received voucher needs to be validated by the Pledge.
The Pledge needs to have a public key to validate the signature from the MASA on the voucher.</t>
        <t>The MASA's public key counterpart of the (private) MASA signing key MUST be already installed in the Pledge at manufacturing time.
Otherwise, the Pledge cannot validate the voucher's signature.</t>
      </section>
      <section anchor="the-enrollment-phase">
        <name>The Enrollment Phase</name>
        <t>A Pledge that does not support PKIX operations cannot use EST to enroll; it has to use
another method for enrollment without certificates and the Registrar has to support this method also. For example, an enrollment process that 
records an RPK owned by the Pledge as a legitimate entity that is part of the domain.</t>
        <t>It is possible that the Pledge will not enroll after obtaining a valid voucher, but instead will do only a network join operation (see for example <xref target="RFC9031"/>).
How the Pledge discovers this method and details of such enrollment methods are out of scope of this document.</t>
      </section>
    </section>
    <section anchor="security">
      <name>Security Considerations</name>
      <section anchor="duplicate-serial-numbers">
        <name>Duplicate Serial Numbers</name>
        <t>If a manufacturer sold products with duplicated serial numbers, that use the same MASA CA as their root of trust, a
customer of one of these products can potentially perform an attack where it uses a voucher created for product 1 to
onboard product 2. This attack only works for nonceless vouchers.</t>
        <t>Note that such a situation could only arise due to manufacturer mis-management or oversight.</t>
        <t>For example, imagine the same manufacturer makes light bulbs as well as gas centrifuges,
and said manufacturer does not uniquely allocate product serial numbers.
The attacker has obtained a light bulb which happens to have the same serial number as an operational gas centrifuge which it wishes to obtain access to.
The attacker performs a normal BRSKI onboarding for the light bulb, but then uses the resulting nonceless voucher to onboard the gas centrifuge.
The attack requires that the gas centrifuge be returned to a state where it is willing to perform a new onboarding operation.
For example, a factory reset.</t>
        <t>This attack is normally prevented by the mechanisms of using different trust root CAs for different product lines, and/or
using unique serial numbers within a single MASA CA scope.</t>
        <t><xref section="6.2" sectionFormat="of" target="RFC8366bis"/> discusses cases of duplicated serial numbers in products across different CAs and the role of
the '<tt>idevid-issuer</tt>' attribute in the RVR and in the voucher to disambiguate these products.</t>
      </section>
      <section anchor="idevid-security-in-the-pledge">
        <name>IDevID Security in the Pledge</name>
        <t>The security of this protocol depends upon the Pledge identifying itself to the Registrar using its manufacturer installed certificate: the IDevID certificate.
Associated with this certificate is the IDevID private key, known only to the Pledge.
Disclosure of this private key to an attacker would permit the attacker to impersonate the Pledge towards the Registrar, probably gaining access credentials to that Registrar's network.</t>
        <t>If the IDevID private key disclosure is known to the manufacturer, there is little recourse other than recall of the relevant part numbers.
The process for communicating this recall would be within the BRSKI-MASA protocol.
Neither this specification nor <xref target="RFC8995"/> provides for consultation of a Certification Revocation List (CRL) or Open Certificate Status Protocol (OCSP) by a Registrar when evaluating an IDevID certificate.
However, the BRSKI-MASA protocol submits the IDevID from the Registrar to the manufacturer's MASA and a manufacturer would have an opportunity to decline to issue a voucher for a device which they believe has become compromised.</t>
        <t>It may be difficult for a manufacturer to determine when an IDevID private key has been disclosed.
Two situations present themselves: in the first situation a compromised private key might be reused in a counterfeit device, which is sold to another customer.
This would present itself as an onboarding of the same device in two different networks.
The manufacturer may become suspicious seeing two voucher requests for the same device from different Registrars.
Such activity could be indistinguishable from a device which has been resold from one operator to another, or re-deployed by an operator from one location to another.</t>
        <t>In the second situation, an attacker having compromised the IDevID private key of a device might then install malware into the same device and attempt to return it to service.
The device, now blank, would go through a second onboarding process with the original Registrar.
Such a Registrar could notice that the device has been "factory reset" and alert the operator to this situation.
One remedy against the presence of malware is through the use of Remote Attestation such as described in <xref target="RFC9334"/>.
Future work will need to specify a background-check Attestation flow as part of the voucher request/response process.
Attestation may still require access to a private key (e.g. IDevID private key) in order to sign Evidence, so a primary goal should be to keep any private key safe within the Pledge.</t>
        <t>In larger, more expensive, systems there is budget (power, space, and bill of materials) to include more specific defenses for a private key.
For instance, this includes putting the IDevID private key in a Trusted Platform Module (TPM), or use of Trusted Execution Environments (TEE) for access to the key.
On smaller IoT devices, the cost and power budget for an extra part is often prohibitive.</t>
        <t>It is becoming more and more common for CPUs to have an internal set of one-time fuses that can be programmed (often they are "burnt" by a laser) at the factory.
This section of memory is only accessible in some privileged CPU state.
The use of this kind of CPU is appropriate as it provides significant resistance against key disclosure even when the device can be disassembled by an attacker.</t>
        <t>In a number of industry verticals, there is increasing concern about counterfeit parts.
These may be look-alike parts created in a different factory, or parts which are created in the same factory during an illegal night-shift, but which are not subject to the appropriate level of quality control.
The use of a manufacturer-signed IDevID certificate provides for discovery of the pedigree of each part, and this often justifies the cost of the security measures associated with storing the private key.</t>
      </section>
      <section anchor="security-masa-coaps">
        <name>Security of the BRSKI-MASA Protocol</name>
        <t><xref target="brski-masa-protocol-format"/> explains why no CoAPS version of the BRSKI-MASA protocol is specified.
The connection from the Registrar to the MASA continues to be HTTPS as in <xref target="RFC8995"/>.</t>
        <t>This choice enables the BRSKI-MASA protocol, which operates over the open Internet, to be secured using standard
solutions that are commonly used for HTTPS over the Internet.
The use of UDP protocols across the Internet is sometimes fraught with security challenges.
Denial-of-service attacks against UDP based protocols are trivial as there is no three-way handshake as done for TCP.
The three-way handshake of TCP guarantees that the node sending the connection request is reachable using the origin IP address.
While DTLS contains an option to do a stateless challenge -- a process actually stronger than that done by TCP -- it is not yet common for this mechanism to be available in hardware at multigigabit speeds.</t>
        <t>Also, in many enterprise networks outgoing UDP connections can be treated as suspicious, which could effectively block CoAP connections for some firewall configurations.
Reducing the complexity of MASA (i.e. less protocols supported) also reduces its potential attack surface, which is relevant since the MASA is 24/7 exposed on the Internet and accepting (untrusted) incoming connections.</t>
      </section>
      <section anchor="registrar-certificate-may-be-self-signed">
        <name>Registrar Certificate May Be Self-signed</name>
        <t>The provisional (D)TLS connection formed by the Pledge with the Registrar does not authenticate the Registrar's identity.
This Registrar's identity is validated by the <xref target="RFC8366bis"/> voucher that is issued by the MASA, signed with a trust anchor that was built-in to the Pledge.</t>
        <t>The Registrar may therefore use any certificate, including a self-signed one.
The only restrictions on the certificate is that it MUST have EKU bits set as detailed in <xref target="registrar-certificate-requirement-server"/> and <xref target="registrar-certificate-requirement-client"/>.</t>
      </section>
      <section anchor="use-of-rpk-alternatives-to-proximity-registrar-cert">
        <name>Use of RPK Alternatives to '<tt>proximity-registrar-cert</tt>'</name>
        <t>In <xref section="9" sectionFormat="of" target="RFC8366bis"/> two compact alternative attributes for '<tt>proximity-registrar-cert</tt>' are defined that include an RPK: '<tt>proximity-registrar-pubk</tt>' and '<tt>proximity-registrar-pubk-sha256</tt>'.
The Pledge can use these attributes in its PVR to identify the Registrar based on its public key only. Since the full certificate of the proximate Registrar is not included, use of these attributes
by a Pledge implies that a Registrar could insert another certificate with the same public key identity into the RVR. For example, an older or a newer version of its certificate.
The MASA will not be able to detect such act by the Registrar. But since any certificate the Registrar could insert in this way still encodes its own identity the additional risk
of using the RPK alternatives is negligible.</t>
        <t>When a Registrar sees a PVR that uses one of '<tt>proximity-registrar-pubk</tt>' or '<tt>proximity-registrar-pubk-sha256</tt>' attributes, this implies the Registrar must include the certificate identified by these attributes into its RVR.
Otherwise, the MASA is unable to verify proximity. This requirement is already implied by the "MUST" requirement in <xref target="registrar-identity"/>.</t>
      </section>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <section anchor="iana-core-rt">
        <name>Resource Type Link Target Attribute Values Registry</name>
        <t>Additions to the "Resource Type (rt=) Link Target Attribute Values" IANA registry, within the "CoRE Parameters"
registry group are specified below.</t>
        <t>Reference: [This RFC]</t>
        <table anchor="iana-core-rt-values">
          <name>Resource Type (rt) link target attribute values for cBRSKI and EST-coaps</name>
          <thead>
            <tr>
              <th align="left">Value</th>
              <th align="left">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <tt>brski</tt></td>
              <td align="left">Base resource of all Bootstrapping Remote Secure Key Infrastructure (cBRSKI) resources</td>
            </tr>
            <tr>
              <td align="left">
                <tt>brski.rv</tt></td>
              <td align="left">cBRSKI request voucher resource</td>
            </tr>
            <tr>
              <td align="left">
                <tt>brski.vs</tt></td>
              <td align="left">cBRSKI voucher status telemetry resource</td>
            </tr>
            <tr>
              <td align="left">
                <tt>brski.es</tt></td>
              <td align="left">cBRSKI enrollment status telemetry resource</td>
            </tr>
            <tr>
              <td align="left">
                <tt>ace.est</tt></td>
              <td align="left">Base resource of all Enrollment over Secure Transport CoAPS (EST-coaps) resources</td>
            </tr>
          </tbody>
        </table>
        <t>Note that the resource type "<tt>brski</tt>" identifies a base resource in a resource hierarchy on a CoAP server, where its
sub-resources each have one of the resource types "<tt>brski.*</tt>" as defined by this specification.
Similarly, the resource type "<tt>ace.est</tt>" identifies a base resource in a resource hierarchy, where its
sub-resources each have one of the resource types "<tt>ace.est.*</tt>" as defined by <xref target="RFC9148"/>.</t>
      </section>
      <section anchor="iana-media-types">
        <name>Media Types Registry</name>
        <t>This section registers the media type <tt>application/voucher+cose</tt> in the "Media Types" IANA registry.
This media type is used to indicate that the content is a CBOR voucher or voucher request
signed with a COSE_Sign1 structure <xref target="RFC9052"/> as defined in this document.</t>
        <section anchor="applicationvouchercose">
          <name><tt>application/voucher+cose</tt></name>
          <artwork><![CDATA[
Type name:  application
Subtype name:  voucher+cose
Required parameters:  N/A
Optional parameters:  N/A
Encoding considerations:  binary (CBOR)
Security considerations:  Section 14 of [This RFC], and Section 12
  of [RFC 9052] for the COSE_Sign1 structured that is used.
Interoperability considerations:  Section 15.2.2 of [This RFC]
Published specification:  [This RFC]
Applications that use this media type:  cBRSKI/ANIMA, 6TiSCH, and 
  other zero-touch onboarding systems
Fragment identifier considerations: N/A
Additional information:
  Deprecated alias names for this type: N/A
  Magic number(s):  N/A
  File extension(s):  .vch
  Macintosh file type code(s):  N/A
Person & email address to contact for further information:  IETF
  ANIMA Working Group (anima@ietf.org) or IETF Operations and
  Management Area Working Group (opsawg@ietf.org)
Intended usage:  COMMON
Restrictions on usage:  N/A
Author:  ANIMA WG
Change controller:  IETF
Provisional registration? (standards tree only):  NO
]]></artwork>
        </section>
        <section anchor="interoperability-considerations-for-applicationvouchercose">
          <name>Interoperability Considerations for <tt>application/voucher+cose</tt></name>
          <t>The media type defined here does not have any parameter to indicate whether names are used, or SID integers are used,
or both can be mixed within a voucher data item.
In absence of any specific further knowledge about this, a mixed use of SID integers and names MUST be assumed, which
is equivalent to the <tt>application/yang-data+cbor</tt> media type (<xref target="RFC9254"/>) without the optional '<tt>id</tt>' parameter.</t>
          <t>Furthermore,</t>
          <ul spacing="normal">
            <li>
              <t>a Registrar assumes that mixed SIDs/names MAY be present in a received PVR or voucher;</t>
            </li>
            <li>
              <t>a MASA assumes that mixed SIDs/names MAY be present in a received RVR;</t>
            </li>
            <li>
              <t>a Pledge assumes, depending on its implementation, that SIDs are present only, or names are present only, or mixed
SIDs/names are present in a received voucher.</t>
            </li>
          </ul>
          <t>Because the MASA and Pledge are under control (either directly or by contract) of the same manufacturer, they can be
co-developed regarding the type of identifiers produced and identifiers consumed in order to guarantee interoperability.</t>
        </section>
      </section>
      <section anchor="coap-content-formats-registry">
        <name>CoAP Content-Formats Registry</name>
        <t>IANA has allocated ID 836 from the "CoAP Content-Formats" registry as shown below.</t>
        <table anchor="coap-cf-registry-additions">
          <name>Additions to the IANA CoAP Content-Formats Registry</name>
          <thead>
            <tr>
              <th align="left">Media type</th>
              <th align="left">Encoding</th>
              <th align="left">ID</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <tt>application/voucher+cose</tt></td>
              <td align="left">-</td>
              <td align="left">836</td>
              <td align="left">[This RFC]</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="iana-brski-param-registry">
        <name>Update to BRSKI Well-Known URIs Registry</name>
        <t>This section updates the "BRSKI Well-Known URIs" IANA registry of the Bootstrapping Remote Secure Key Infrastructures
(BRSKI) Parameters Registry group, by adding a new column "Short Path Segment", clarifying existing "Description" values,
and renaming the column "URI" to "Path Segment".</t>
        <t>The new "Short Path Segment" entry denotes a shorter alternative to Path Segment for the resource that can be used by a client
in a CoAP request on a well-known BRSKI resource.
A value "N/A" can be registered to denote that there is no short path segment defined.</t>
        <t>The contents of the registry with these changes applied are as follows:</t>
        <table anchor="brski-wellknown-uri-registry">
          <name>Update of the IANA BRSKI Well-Known URIs Registry</name>
          <thead>
            <tr>
              <th align="left">Path Segment</th>
              <th align="left">Short Path Segment</th>
              <th align="left">Description</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <tt>requestvoucher</tt></td>
              <td align="left">
                <tt>rv</tt></td>
              <td align="left">Request voucher: Pledge to Registrar, and Registrar to MASA</td>
              <td align="left">
                <xref target="RFC8995"/>, [This RFC]</td>
            </tr>
            <tr>
              <td align="left">
                <tt>voucher_status</tt></td>
              <td align="left">
                <tt>vs</tt></td>
              <td align="left">Voucher status telemetry: Pledge to Registrar</td>
              <td align="left">
                <xref target="RFC8995"/>, [This RFC]</td>
            </tr>
            <tr>
              <td align="left">
                <tt>requestauditlog</tt></td>
              <td align="left">
                <tt>N/A</tt></td>
              <td align="left">Request audit log: Registrar to MASA</td>
              <td align="left">
                <xref target="RFC8995"/></td>
            </tr>
            <tr>
              <td align="left">
                <tt>enrollstatus</tt></td>
              <td align="left">
                <tt>es</tt></td>
              <td align="left">Enrollment status telemetry: Pledge to Registrar</td>
              <td align="left">
                <xref target="RFC8995"/>, [This RFC]</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="structured-syntax-suffixes-registry">
        <name>Structured Syntax Suffixes Registry</name>
        <t>This section registers the "+cose" suffix in the "Structured Syntax Suffixes" IANA Registry based on the <xref target="RFC6838"/> procedure.</t>
        <artwork><![CDATA[
Name:       CBOR Object Signing and Encryption (COSE) object   
+suffix:    +cose
References: the application/cose media type [RFC9052]
Encoding considerations: binary (CBOR)
Interoperability considerations:
  the application/cose media type has an optional parameter
  "cose-type". Any new media type that uses the +cose suffix
  and allows use of this parameter MUST specify this 
  explicitly, per Section 4.3 of [RFC6838]. If the parameter 
  "cose-type" is allowed, its usage MUST be identical to the 
  usage defined for the application/cose media type in
  Section 2 of [RFC9052]. 
  A COSE processor handling a media type foo+cose and which
  does not know the specific type "foo" SHOULD use the 
  cose-type COSE tag, if present, or cose-type parameter, if
  present, to determine the specific COSE object type during  
  processing. If the specific type cannot be determined, 
  it MUST assume only the generic COSE object structure and 
  it MUST NOT perform security-critical operations using the 
  COSE object.
Fragment identifier considerations: N/A
Security considerations: see [RFC9052]
Contact:   
  IETF COSE Working Group (cose@ietf.org) or
  IESG (iesg@ietf.org)
Author/Change controller: 
  IETF ANIMA Working Group (anima@ietf.org).
  IESG has change control over this registration.
]]></artwork>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC4193">
          <front>
            <title>Unique Local IPv6 Unicast Addresses</title>
            <author fullname="R. Hinden" initials="R." surname="Hinden"/>
            <author fullname="B. Haberman" initials="B." surname="Haberman"/>
            <date month="October" year="2005"/>
            <abstract>
              <t>This document defines an IPv6 unicast address format that is globally unique and is intended for local communications, usually inside of a site. These addresses are not expected to be routable on the global Internet. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4193"/>
          <seriesInfo name="DOI" value="10.17487/RFC4193"/>
        </reference>
        <reference anchor="RFC4210">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate Management Protocol (CMP)</title>
            <author fullname="C. Adams" initials="C." surname="Adams"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="T. Kause" initials="T." surname="Kause"/>
            <author fullname="T. Mononen" initials="T." surname="Mononen"/>
            <date month="September" year="2005"/>
            <abstract>
              <t>This document describes the Internet X.509 Public Key Infrastructure (PKI) Certificate Management Protocol (CMP). Protocol messages are defined for X.509v3 certificate creation and management. CMP provides on-line interactions between PKI components, including an exchange between a Certification Authority (CA) and a client system. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4210"/>
          <seriesInfo name="DOI" value="10.17487/RFC4210"/>
        </reference>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC6066">
          <front>
            <title>Transport Layer Security (TLS) Extensions: Extension Definitions</title>
            <author fullname="D. Eastlake 3rd" initials="D." surname="Eastlake 3rd"/>
            <date month="January" year="2011"/>
            <abstract>
              <t>This document provides specifications for existing TLS extensions. It is a companion document for RFC 5246, "The Transport Layer Security (TLS) Protocol Version 1.2". The extensions specified are server_name, max_fragment_length, client_certificate_url, trusted_ca_keys, truncated_hmac, and status_request. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6066"/>
          <seriesInfo name="DOI" value="10.17487/RFC6066"/>
        </reference>
        <reference anchor="RFC6347">
          <front>
            <title>Datagram Transport Layer Security Version 1.2</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="January" year="2012"/>
            <abstract>
              <t>This document specifies version 1.2 of the Datagram Transport Layer Security (DTLS) protocol. The DTLS protocol provides communications privacy for datagram protocols. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. The DTLS protocol is based on the Transport Layer Security (TLS) protocol and provides equivalent security guarantees. Datagram semantics of the underlying transport are preserved by the DTLS protocol. This document updates DTLS 1.0 to work with TLS version 1.2. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6347"/>
          <seriesInfo name="DOI" value="10.17487/RFC6347"/>
        </reference>
        <reference anchor="RFC6690">
          <front>
            <title>Constrained RESTful Environments (CoRE) Link Format</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <date month="August" year="2012"/>
            <abstract>
              <t>This specification defines Web Linking using a link format for use by constrained web servers to describe hosted resources, their attributes, and other relationships between links. Based on the HTTP Link Header field defined in RFC 5988, the Constrained RESTful Environments (CoRE) Link Format is carried as a payload and is assigned an Internet media type. "RESTful" refers to the Representational State Transfer (REST) architecture. A well-known URI is defined as a default entry point for requesting the links hosted by a server. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6690"/>
          <seriesInfo name="DOI" value="10.17487/RFC6690"/>
        </reference>
        <reference anchor="RFC6762">
          <front>
            <title>Multicast DNS</title>
            <author fullname="S. Cheshire" initials="S." surname="Cheshire"/>
            <author fullname="M. Krochmal" initials="M." surname="Krochmal"/>
            <date month="February" year="2013"/>
            <abstract>
              <t>As networked devices become smaller, more portable, and more ubiquitous, the ability to operate with less configured infrastructure is increasingly important. In particular, the ability to look up DNS resource record data types (including, but not limited to, host names) in the absence of a conventional managed DNS server is useful.</t>
              <t>Multicast DNS (mDNS) provides the ability to perform DNS-like operations on the local link in the absence of any conventional Unicast DNS server. In addition, Multicast DNS designates a portion of the DNS namespace to be free for local use, without the need to pay any annual fee, and without the need to set up delegations or otherwise configure a conventional DNS server to answer for those names.</t>
              <t>The primary benefits of Multicast DNS names are that (i) they require little or no administration or configuration to set them up, (ii) they work when no infrastructure is present, and (iii) they work during infrastructure failures.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6762"/>
          <seriesInfo name="DOI" value="10.17487/RFC6762"/>
        </reference>
        <reference anchor="RFC7030">
          <front>
            <title>Enrollment over Secure Transport</title>
            <author fullname="M. Pritikin" initials="M." role="editor" surname="Pritikin"/>
            <author fullname="P. Yee" initials="P." role="editor" surname="Yee"/>
            <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport. This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates. It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7030"/>
          <seriesInfo name="DOI" value="10.17487/RFC7030"/>
        </reference>
        <reference anchor="RFC7250">
          <front>
            <title>Using Raw Public Keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="P. Wouters" initials="P." role="editor" surname="Wouters"/>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
            <author fullname="J. Gilmore" initials="J." surname="Gilmore"/>
            <author fullname="S. Weiler" initials="S." surname="Weiler"/>
            <author fullname="T. Kivinen" initials="T." surname="Kivinen"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>This document specifies a new certificate type and two TLS extensions for exchanging raw public keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS). The new certificate type allows raw public keys to be used for authentication.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7250"/>
          <seriesInfo name="DOI" value="10.17487/RFC7250"/>
        </reference>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC7959">
          <front>
            <title>Block-Wise Transfers in the Constrained Application Protocol (CoAP)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="Z. Shelby" initials="Z." role="editor" surname="Shelby"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a RESTful transfer protocol for constrained nodes and networks. Basic CoAP messages work well for small payloads from sensors and actuators; however, applications will need to transfer larger payloads occasionally -- for instance, for firmware updates. In contrast to HTTP, where TCP does the grunt work of segmenting and resequencing, CoAP is based on datagram transports such as UDP or Datagram Transport Layer Security (DTLS). These transports only offer fragmentation, which is even more problematic in constrained nodes and networks, limiting the maximum size of resource representations that can practically be transferred.</t>
              <t>Instead of relying on IP fragmentation, this specification extends basic CoAP with a pair of "Block" options for transferring multiple blocks of information from a resource representation in multiple request-response pairs. In many important cases, the Block options enable a server to be truly stateless: the server can handle each block transfer separately, with no need for a connection setup or other server-side memory of previous block transfers. Essentially, the Block options provide a minimal way to transfer larger representations in a block-wise fashion.</t>
              <t>A CoAP implementation that does not support these options generally is limited in the size of the representations that can be exchanged, so there is an expectation that the Block options will be widely used in CoAP implementations. Therefore, this specification updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7959"/>
          <seriesInfo name="DOI" value="10.17487/RFC7959"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8449">
          <front>
            <title>Record Size Limit Extension for TLS</title>
            <author fullname="M. Thomson" initials="M." surname="Thomson"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>An extension to Transport Layer Security (TLS) is defined that allows endpoints to negotiate the maximum size of protected records that each will send the other.</t>
              <t>This replaces the maximum fragment length extension defined in RFC 6066.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8449"/>
          <seriesInfo name="DOI" value="10.17487/RFC8449"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC8710">
          <front>
            <title>Multipart Content-Format for the Constrained Application Protocol (CoAP)</title>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This memo defines application/multipart-core, an application-independent media type that can be used to combine representations of zero or more different media types (each with a Constrained Application Protocol (CoAP) Content-Format identifier) into a single representation, with minimal framing overhead.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8710"/>
          <seriesInfo name="DOI" value="10.17487/RFC8710"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC8995">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="T. Eckert" initials="T." surname="Eckert"/>
            <author fullname="M. Behringer" initials="M." surname="Behringer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane. To do this, a Secure Key Infrastructure is bootstrapped. This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline. We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device. The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="RFC9031">
          <front>
            <title>Constrained Join Protocol (CoJP) for 6TiSCH</title>
            <author fullname="M. Vučinić" initials="M." role="editor" surname="Vučinić"/>
            <author fullname="J. Simon" initials="J." surname="Simon"/>
            <author fullname="K. Pister" initials="K." surname="Pister"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes the minimal framework required for a new device, called a "pledge", to securely join a 6TiSCH (IPv6 over the Time-Slotted Channel Hopping mode of IEEE 802.15.4) network. The framework requires that the pledge and the JRC (Join Registrar/Coordinator, a central entity), share a symmetric key. How this key is provisioned is out of scope of this document. Through a single CoAP (Constrained Application Protocol) request-response exchange secured by OSCORE (Object Security for Constrained RESTful Environments), the pledge requests admission into the network, and the JRC configures it with link-layer keying material and other parameters. The JRC may at any time update the parameters through another request-response exchange secured by OSCORE. This specification defines the Constrained Join Protocol and its CBOR (Concise Binary Object Representation) data structures, and it describes how to configure the rest of the 6TiSCH communication stack for this join process to occur in a secure manner. Additional security mechanisms may be added on top of this minimal framework.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9031"/>
          <seriesInfo name="DOI" value="10.17487/RFC9031"/>
        </reference>
        <reference anchor="RFC9032">
          <front>
            <title>Encapsulation of 6TiSCH Join and Enrollment Information Elements</title>
            <author fullname="D. Dujovne" initials="D." role="editor" surname="Dujovne"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>In the Time-Slotted Channel Hopping (TSCH) mode of IEEE Std 802.15.4, opportunities for broadcasts are limited to specific times and specific channels. Routers in a TSCH network transmit Enhanced Beacon (EB) frames to announce the presence of the network. This document provides a mechanism by which additional information critical for new nodes (pledges) and long-sleeping nodes may be carried within the EB in order to conserve use of broadcast opportunities.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9032"/>
          <seriesInfo name="DOI" value="10.17487/RFC9032"/>
        </reference>
        <reference anchor="RFC9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC9053">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines a set of algorithms that can be used with the CBOR Object Signing and Encryption (COSE) protocol (RFC 9052).</t>
              <t>This document, along with RFC 9052, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9053"/>
          <seriesInfo name="DOI" value="10.17487/RFC9053"/>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9148">
          <front>
            <title>EST-coaps: Enrollment over Secure Transport with the Secure Constrained Application Protocol</title>
            <author fullname="P. van der Stok" initials="P." surname="van der Stok"/>
            <author fullname="P. Kampanakis" initials="P." surname="Kampanakis"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="S. Raza" initials="S." surname="Raza"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>Enrollment over Secure Transport (EST) is used as a certificate provisioning protocol over HTTPS. Low-resource devices often use the lightweight Constrained Application Protocol (CoAP) for message exchanges. This document defines how to transport EST payloads over secure CoAP (EST-coaps), which allows constrained devices to use existing EST functionality for provisioning certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9148"/>
          <seriesInfo name="DOI" value="10.17487/RFC9148"/>
        </reference>
        <reference anchor="RFC9254">
          <front>
            <title>Encoding of Data Modeled with YANG in the Concise Binary Object Representation (CBOR)</title>
            <author fullname="M. Veillette" initials="M." role="editor" surname="Veillette"/>
            <author fullname="I. Petrov" initials="I." role="editor" surname="Petrov"/>
            <author fullname="A. Pelov" initials="A." surname="Pelov"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>YANG (RFC 7950) is a data modeling language used to model configuration data, state data, parameters and results of Remote Procedure Call (RPC) operations or actions, and notifications.</t>
              <t>This document defines encoding rules for YANG in the Concise Binary Object Representation (CBOR) (RFC 8949).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9254"/>
          <seriesInfo name="DOI" value="10.17487/RFC9254"/>
        </reference>
        <reference anchor="RFC9360">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Header Parameters for Carrying and Referencing X.509 Certificates</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="February" year="2023"/>
            <abstract>
              <t>The CBOR Object Signing and Encryption (COSE) message structure uses references to keys in general. For some algorithms, additional properties are defined that carry parameters relating to keys as needed. The COSE Key structure is used for transporting keys outside of COSE messages. This document extends the way that keys can be identified and transported by providing attributes that refer to or contain X.509 certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9360"/>
          <seriesInfo name="DOI" value="10.17487/RFC9360"/>
        </reference>
        <reference anchor="RFC9525">
          <front>
            <title>Service Identity in TLS</title>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="R. Salz" initials="R." surname="Salz"/>
            <date month="November" year="2023"/>
            <abstract>
              <t>Many application technologies enable secure communication between two entities by means of Transport Layer Security (TLS) with Internet Public Key Infrastructure using X.509 (PKIX) certificates. This document specifies procedures for representing and verifying the identity of application services in such interactions.</t>
              <t>This document obsoletes RFC 6125.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9525"/>
          <seriesInfo name="DOI" value="10.17487/RFC9525"/>
        </reference>
        <reference anchor="RFC8366bis">
          <front>
            <title>A Voucher Artifact for Bootstrapping Protocols</title>
            <author fullname="Kent Watsen" initials="K." surname="Watsen">
              <organization>Watsen Networks</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software</organization>
            </author>
            <author fullname="Esko Dijk" initials="E." surname="Dijk">
              <organization>IoTconsultancy.nl</organization>
            </author>
            <author fullname="Toerless Eckert" initials="T. T." surname="Eckert">
              <organization>Futurewei Technologies Inc.</organization>
            </author>
            <author fullname="Qiufang Ma" initials="Q." surname="Ma">
              <organization>Huawei</organization>
            </author>
            <date day="26" month="February" year="2026"/>
            <abstract>
              <t>   This document defines a strategy to securely assign a Pledge to an
   Owner using an artifact signed, directly or indirectly, by the
   Pledge's manufacturer.  This artifact is known as a "Voucher".

   This document defines an artifact format as a YANG-defined JSON or
   CBOR document that has been signed using a variety of cryptographic
   systems.

   The Voucher Artifact is normally generated by the Pledge's
   manufacturer (i.e., the Manufacturer Authorized Signing Authority
   (MASA)).

   This document updates RFC8366: it includes a number of desired
   extensions into the YANG module.  The Voucher Request YANG module
   defined in RFC8995 is also updated and now included in this document,
   as well as other YANG extensions needed for variants of BRSKI/
   RFC8995.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-rfc8366bis-27"/>
        </reference>
        <reference anchor="I-D.ietf-anima-constrained-join-proxy">
          <front>
            <title>Join Proxy for Bootstrapping of Constrained Network Elements</title>
            <author fullname="Esko Dijk" initials="E." surname="Dijk">
              <organization>IoTconsultancy.nl</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Peter Van der Stok" initials="P." surname="Van der Stok">
              <organization>vanderstok consultancy</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>Cisco Systems</organization>
            </author>
            <date day="19" month="October" year="2025"/>
            <abstract>
              <t>   This document extends the constrained Bootstrapping Remote Secure Key
   Infrastructures (cBRSKI) onboarding protocol by adding a new network
   function, the constrained Join Proxy.  This function can be
   implemented on a constrained node.  The goal of the Join Proxy is to
   help new constrained nodes ("Pledges") securely onboard into a new IP
   network using the cBRSKI protocol.  It acts as a circuit proxy for
   User Datagram Protocol (UDP) packets that carry the onboarding
   messages.  The solution is extensible to support other UDP-based
   onboarding protocols as well.  The Join Proxy functionality is
   designed for use in constrained networks, including IPv6 over Low-
   Power Wireless Personal Area Networks (6LoWPAN) based networks in
   which the onboarding authority server ("Registrar") may be multiple
   IP hops away from a Pledge.  Despite this distance, the Pledge only
   needs to use link-local communication to complete cBRSKI onboarding.
   Two modes of Join Proxy operation are defined, stateless and
   stateful, to allow different trade-offs regarding resource usage,
   implementation complexity and security.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-constrained-join-proxy-18"/>
        </reference>
        <reference anchor="I-D.ietf-core-uri-path-abbrev">
          <front>
            <title>URI-Path abbreviation in CoAP</title>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>   Applications built on CoAP face a conflict between the technical need
   for short message sizes and the interoperability requirement of
   following BCP190 and thus registering (relatively verbose) well-known
   URI paths.  This document introduces an option that allows expressing
   well-known paths in as little as two bytes.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-uri-path-abbrev-02"/>
        </reference>
        <reference anchor="ieee802-1AR" target="https://standards.ieee.org/ieee/802.1AR/6995/">
          <front>
            <title>IEEE 802.1AR Secure Device Identity</title>
            <author>
              <organization/>
            </author>
            <date year="2018"/>
          </front>
          <refcontent>IEEE Standards Association</refcontent>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4443">
          <front>
            <title>Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification</title>
            <author fullname="A. Conta" initials="A." surname="Conta"/>
            <author fullname="S. Deering" initials="S." surname="Deering"/>
            <author fullname="M. Gupta" initials="M." role="editor" surname="Gupta"/>
            <date month="March" year="2006"/>
            <abstract>
              <t>This document describes the format of a set of control messages used in ICMPv6 (Internet Control Message Protocol). ICMPv6 is the Internet Control Message Protocol for Internet Protocol version 6 (IPv6). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="89"/>
          <seriesInfo name="RFC" value="4443"/>
          <seriesInfo name="DOI" value="10.17487/RFC4443"/>
        </reference>
        <reference anchor="RFC5652">
          <front>
            <title>Cryptographic Message Syntax (CMS)</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="September" year="2009"/>
            <abstract>
              <t>This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message content. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="70"/>
          <seriesInfo name="RFC" value="5652"/>
          <seriesInfo name="DOI" value="10.17487/RFC5652"/>
        </reference>
        <reference anchor="RFC6282">
          <front>
            <title>Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks</title>
            <author fullname="J. Hui" initials="J." role="editor" surname="Hui"/>
            <author fullname="P. Thubert" initials="P." surname="Thubert"/>
            <date month="September" year="2011"/>
            <abstract>
              <t>This document updates RFC 4944, "Transmission of IPv6 Packets over IEEE 802.15.4 Networks". This document specifies an IPv6 header compression format for IPv6 packet delivery in Low Power Wireless Personal Area Networks (6LoWPANs). The compression format relies on shared context to allow compression of arbitrary prefixes. How the information is maintained in that shared context is out of scope. This document specifies compression of multicast addresses and a framework for compressing next headers. UDP header compression is specified within this framework. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6282"/>
          <seriesInfo name="DOI" value="10.17487/RFC6282"/>
        </reference>
        <reference anchor="RFC6775">
          <front>
            <title>Neighbor Discovery Optimization for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs)</title>
            <author fullname="Z. Shelby" initials="Z." role="editor" surname="Shelby"/>
            <author fullname="S. Chakrabarti" initials="S." surname="Chakrabarti"/>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="November" year="2012"/>
            <abstract>
              <t>The IETF work in IPv6 over Low-power Wireless Personal Area Network (6LoWPAN) defines 6LoWPANs such as IEEE 802.15.4. This and other similar link technologies have limited or no usage of multicast signaling due to energy conservation. In addition, the wireless network may not strictly follow the traditional concept of IP subnets and IP links. IPv6 Neighbor Discovery was not designed for non- transitive wireless links, as its reliance on the traditional IPv6 link concept and its heavy use of multicast make it inefficient and sometimes impractical in a low-power and lossy network. This document describes simple optimizations to IPv6 Neighbor Discovery, its addressing mechanisms, and duplicate address detection for Low- power Wireless Personal Area Networks and similar networks. The document thus updates RFC 4944 to specify the use of the optimizations defined here. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6775"/>
          <seriesInfo name="DOI" value="10.17487/RFC6775"/>
        </reference>
        <reference anchor="RFC6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC7228">
          <front>
            <title>Terminology for Constrained-Node Networks</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="M. Ersue" initials="M." surname="Ersue"/>
            <author fullname="A. Keranen" initials="A." surname="Keranen"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory, and processing resources, creating constrained-node networks. This document provides a number of basic terms that have been useful in the standardization work for constrained-node networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7228"/>
          <seriesInfo name="DOI" value="10.17487/RFC7228"/>
        </reference>
        <reference anchor="RFC7950">
          <front>
            <title>The YANG 1.1 Data Modeling Language</title>
            <author fullname="M. Bjorklund" initials="M." role="editor" surname="Bjorklund"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>YANG is a data modeling language used to model configuration data, state data, Remote Procedure Calls, and notifications for network management protocols. This document describes the syntax and semantics of version 1.1 of the YANG language. YANG version 1.1 is a maintenance release of the YANG language, addressing ambiguities and defects in the original specification. There are a small number of backward incompatibilities from YANG version 1. This document also specifies the YANG mappings to the Network Configuration Protocol (NETCONF).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7950"/>
          <seriesInfo name="DOI" value="10.17487/RFC7950"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="RFC8990">
          <front>
            <title>GeneRic Autonomic Signaling Protocol (GRASP)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="B. Carpenter" initials="B." role="editor" surname="Carpenter"/>
            <author fullname="B. Liu" initials="B." role="editor" surname="Liu"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies the GeneRic Autonomic Signaling Protocol (GRASP), which enables autonomic nodes and Autonomic Service Agents to dynamically discover peers, to synchronize state with each other, and to negotiate parameter settings with each other. GRASP depends on an external security environment that is described elsewhere. The technical objectives and parameters for specific application scenarios are to be described in separate documents. Appendices briefly discuss requirements for the protocol and existing protocols with comparable features.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8990"/>
          <seriesInfo name="DOI" value="10.17487/RFC8990"/>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="RFC9528">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a very compact and lightweight authenticated Diffie-Hellman key exchange with ephemeral keys. EDHOC provides mutual authentication, forward secrecy, and identity protection. EDHOC is intended for usage in constrained scenarios, and a main use case is to establish an Object Security for Constrained RESTful Environments (OSCORE) security context. By reusing CBOR Object Signing and Encryption (COSE) for cryptography, Concise Binary Object Representation (CBOR) for encoding, and Constrained Application Protocol (CoAP) for transport, the additional code size can be kept very low.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9528"/>
          <seriesInfo name="DOI" value="10.17487/RFC9528"/>
        </reference>
        <reference anchor="RFC9595">
          <front>
            <title>YANG Schema Item iDentifier (YANG SID)</title>
            <author fullname="M. Veillette" initials="M." role="editor" surname="Veillette"/>
            <author fullname="A. Pelov" initials="A." role="editor" surname="Pelov"/>
            <author fullname="I. Petrov" initials="I." role="editor" surname="Petrov"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <date month="July" year="2024"/>
            <abstract>
              <t>YANG Schema Item iDentifiers (YANG SIDs) are globally unique 63-bit unsigned integers used to identify YANG items. SIDs provide a more compact method for identifying those YANG items that can be used efficiently, notably in constrained environments (RFC 7228). This document defines the semantics, registration processes, and assignment processes for YANG SIDs for IETF-managed YANG modules. To enable the implementation of these processes, this document also defines a file format used to persist and publish assigned YANG SIDs.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9595"/>
          <seriesInfo name="DOI" value="10.17487/RFC9595"/>
        </reference>
        <reference anchor="RFC9597">
          <front>
            <title>CBOR Web Token (CWT) Claims in COSE Headers</title>
            <author fullname="T. Looker" initials="T." surname="Looker"/>
            <author fullname="M.B. Jones" initials="M.B." surname="Jones"/>
            <date month="June" year="2024"/>
            <abstract>
              <t>This document describes how to include CBOR Web Token (CWT) claims in the header parameters of any CBOR Object Signing and Encryption (COSE) structure. This functionality helps to facilitate applications that wish to make use of CWT claims in encrypted COSE structures and/or COSE structures featuring detached signatures, while having some of those claims be available before decryption and/or without inspecting the detached payload. Another use case is using CWT claims with payloads that are not CWT Claims Sets, including payloads that are not CBOR at all.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9597"/>
          <seriesInfo name="DOI" value="10.17487/RFC9597"/>
        </reference>
        <reference anchor="I-D.ietf-6lo-mesh-link-establishment">
          <front>
            <title>Mesh Link Establishment</title>
            <author fullname="Richard Kelsey" initials="R." surname="Kelsey">
              <organization>Silicon Labs</organization>
            </author>
            <date day="1" month="December" year="2015"/>
            <abstract>
              <t>   This document defines the mesh link establishment (MLE) protocol for
   establishing and configuring secure radio links in IEEE 802.15.4
   radio mesh networks.  MLE extends IEEE 802.15.4 for use in multihop
   mesh networks by adding three capabilities: 1) dynamically
   configuring and securing radio connections between neighboring
   devices, 2) enabling network-wide changes to shared radio parameters,
   and 3) allowing the determination of radio link quality prior to
   configuration.  MLE operates below the routing layer, insulating it
   from the details of configuring, securing, and maintaining individual
   radio links within a larger mesh network.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-6lo-mesh-link-establishment-00"/>
        </reference>
        <reference anchor="I-D.richardson-anima-masa-considerations">
          <front>
            <title>Operational Considerations for Voucher infrastructure for BRSKI MASA</title>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Wei Pan" initials="W." surname="Pan">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="22" month="January" year="2025"/>
            <abstract>
              <t>   This document describes a number of operational modes that a BRSKI
   Manufacturer Authorized Signing Authority (MASA) may take on.

   Each mode is defined, and then each mode is given a relevance within
   an over applicability of what kind of organization the MASA is
   deployed into.  This document does not change any protocol
   mechanisms.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-richardson-anima-masa-considerations-09"/>
        </reference>
        <reference anchor="I-D.ietf-anima-jws-voucher">
          <front>
            <title>JWS signed Voucher Artifacts for Bootstrapping Protocols</title>
            <author fullname="Thomas Werner" initials="T." surname="Werner">
              <organization>Siemens AG</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date day="15" month="January" year="2025"/>
            <abstract>
              <t>   This document introduces a variant of the RFC8366 voucher artifact in
   which CMS is replaced by the JSON Object Signing and Encryption
   (JOSE) mechanism described in RFC7515.  This supports deployments in
   which JOSE is preferred over CMS.  In addition to specifying the
   format, the "application/voucher-jws+json" media type is registered
   and examples are provided.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-jws-voucher-16"/>
        </reference>
        <reference anchor="I-D.ietf-cbor-edn-literals">
          <front>
            <title>CBOR Extended Diagnostic Notation (EDN)</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date day="16" month="October" year="2025"/>
            <abstract>
              <t>   This document formalizes and consolidates the definition of the
   Extended Diagnostic Notation (EDN) of the Concise Binary Object
   Representation (CBOR), addressing implementer experience.

   Replacing EDN's previous informal descriptions, it updates RFC 8949,
   obsoleting its Section 8, and RFC 8610, obsoleting its Appendix G.

   It also specifies and uses registry-based extension points, using one
   to support text representations of epoch-based dates/times and of IP
   addresses and prefixes.


   // (This cref will be removed by the RFC editor:) The present -19
   // includes the definition of the cri'' application- extension. cri''
   // was previously defined in draft-ietf-core-href; however the latter
   // document overtook the present document in the approval process.
   // As the definition of cri'' is dependent on the present document
   // (and conversely has essentially no dependency on the technical
   // content of draft-ietf-core-href beyond its mere existence), the
   // text (including IANA considerations) has been moved here. -19 is
   // intended for use at the CBOR WG meeting at IETF 124.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cbor-edn-literals-19"/>
        </reference>
        <reference anchor="I-D.ietf-anima-brski-discovery">
          <front>
            <title>BRSKI discovery and variations</title>
            <author fullname="Toerless Eckert" initials="T. T." surname="Eckert">
              <organization>Futurewei USA</organization>
            </author>
            <author fullname="Esko Dijk" initials="E." surname="Dijk">
              <organization>IoTconsultancy.nl</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>   This document specifies how to make BRSKI communications
   autoconfiguring, extensible and resilient in the face of simultaneous
   use of different variations of the BRSKI protocol (BRSKI, BRSKI-AE,
   BRSKI-PRM, constrained BRSKI, stateless constrained BRSKI proxies).
   This document specifies a data model, IANA registry and BRSKI
   component procedures to achieve this.

   This document does not define any new discovery methods.  Instead,
   its data model allows to signal all current (and future) variations
   of the BRSKI family of protocols consistently via different existing
   network discovery mechanisms: DNS-SD, CoAP discovery (CORE-LF) and
   GRASP.  Additional/future discovery mechanisms can also be supported
   through the IANA registry.

   Automatic resiliency and load-sharing are enabled through the use of
   discovery mechanisms and the provisioning of multiple instances of
   BRSKI components such as registrars and Join Proxies.  This document
   specifies the procedures to support load-sharing and (fast) failover
   under failure and recovery of redundant components.

   Future proof deployments of BRSKI requires Join Proxies that
   automatically support any current and future BRSKI variation.  This
   document specifies the procedures how Join Proxies can support this
   through specific Join Proxy protocol behavior and the use of
   discovery mechanisms.

   The specification for discovery of pledges by their IDevID as
   introduced by BRSKI-PRM is refined in this document.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-brski-discovery-09"/>
        </reference>
        <reference anchor="I-D.ietf-cose-cbor-encoded-cert">
          <front>
            <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Shahid Raza" initials="S." surname="Raza">
              <organization>University of Glasgow</organization>
            </author>
            <author fullname="Joel Höglund" initials="J." surname="Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Martin Furuhed" initials="M." surname="Furuhed">
              <organization>IN Groupe</organization>
            </author>
            <date day="25" month="January" year="2026"/>
            <abstract>
              <t>   This document specifies a CBOR encoding of X.509 certificates.  The
   resulting certificates are called C509 certificates.  The CBOR
   encoding supports a large subset of RFC 5280, common certificate
   profiles and is extensible.

   Two types of C509 certificates are defined.  One type is an
   invertible CBOR re-encoding of DER encoded X.509 certificates with
   the signature field copied from the DER encoding.  The other type is
   identical except that the signature is over the CBOR encoding instead
   of the DER encoding, avoiding the use of ASN.1.  Both types of
   certificates have the same semantics as X.509 and the same reduced
   size compared to X.509.

   The document also specifies CBOR encoded data structures for
   certificate (signing) requests and certificate request templates, new
   COSE headers, as well as a TLS certificate type and a file format for
   C509.  This document updates RFC 6698; the TLSA selectors registry is
   extended to include C509 certificates.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-16"/>
        </reference>
        <reference anchor="COSE-registry" target="https://www.iana.org/assignments/cose/cose.xhtml">
          <front>
            <title>CBOR Object Signing and Encryption (COSE) registry group</title>
            <author initials="" surname="IANA">
              <organization/>
            </author>
            <date year="2017" month="January" day="11"/>
          </front>
        </reference>
        <reference anchor="Thread" target="https://www.threadgroup.org/">
          <front>
            <title>Thread Group website</title>
            <author initials="" surname="Thread Group, Inc">
              <organization/>
            </author>
            <date year="2026" month="February"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 1603?>

<section anchor="software-and-library-support-for-cbrski">
      <name>Software and Library Support for cBRSKI</name>
      <t>This appendix lists software and security libraries that may be useful for implementing cBRSKI functionality.</t>
      <section anchor="open-source-cbrski-implementations">
        <name>Open Source cBRSKI Implementations</name>
        <t>There are a few ongoing open source projects to support cBRSKI development and testing. These include:</t>
        <ul spacing="normal">
          <li>
            <t>OpenThread Registrar (OT Registrar) - a cBRSKI Registrar, test MASA server, and test Pledge written in Java.
<eref target="https://github.com/EskoDijk/ot-registrar">Link</eref></t>
          </li>
          <li>
            <t>OpenThread CCM (pre-alpha) - a cBRSKI Pledge and Join Proxy for OpenThread-based IoT nodes, written in C/C++. OpenThread nodes implement the <xref target="Thread"/> protocol.
<eref target="https://github.com/EskoDijk/openthread/pull/7">Link</eref></t>
          </li>
          <li>
            <t>OpenThread Network Simulator v2 (OTNS2) - a CLI + GUI simulator for OpenThread IoT nodes in 6LoWPAN <xref target="RFC6282"/> mesh networks, able to accurately simulate cBRSKI Pledges onboarding (pre-alpha functionality) to a Thread mesh network via an OT Registrar.
<eref target="https://github.com/EskoDijk/ot-ns/pull/165">Link</eref></t>
          </li>
          <li>
            <t>Fountain - a BRSKI/6TiSCH Registrar with support for COSE-signed vouchers, written in Ruby.
<eref target="https://github.com/AnimaGUS-minerva/fountain">Link</eref></t>
          </li>
        </ul>
      </section>
      <section anchor="libsup">
        <name>Security Library Support</name>
        <t>For the implementation of BRSKI/cBRSKI, the use of a software library to manipulate PKIX certificates, establish secure (D)TLS connections, and use crypto algorithms is often beneficial. Two C-based examples are OpenSSL and mbedtls. Others more targeted to specific platforms or languages exist. It is important to realize that the library interfaces differ significantly between libraries.</t>
        <t>Libraries do not support all known crypto algorithms. Before deciding on a library, it is important to look at their supported crypto algorithms and the roadmap for future support. Apart from availability, the library footprint, and the required execution cycles should be investigated beforehand.</t>
        <t>The handling of certificates usually includes the checking of a certificate chain. In some libraries, chains are constructed and verified on the basis of a set of certificates, the trust anchor (usually a self signed root CA), and the target certificate. In other libraries, the chain must be constructed beforehand and obey ordering criteria. Verification always includes the checking of the signatures. Less frequent is the checking the validity of the dates or checking the existence of a revoked certificate in the chain against a set of revoked certificates. Checking the chain on the consistency of the certificate extensions which specify the use of the certificate usually needs to be programmed explicitly.</t>
        <t>A library can be used to construct a (D)TLS connection. It is useful to realize that differences between (D)TLS implementations will occur due to the differences in the certificate checks supported by the library. On top of that, checks between client and server certificates enforced by (D)TLS are not always helpful for a BRSKI implementation. For example, the certificates of Pledge and Registrar are usually not related when the BRSKI protocol is started. It must be verified that checks on the relation between client and server certificates do not hamper a succeful DTLS connection establishment.</t>
        <section anchor="opensssl-example-code">
          <name>OpensSSL Example Code</name>
          <t>From OpenSSL's apps/verify.c :</t>
          <sourcecode type="c"><![CDATA[
<CODE BEGINS>
X509 *x = NULL;
int i = 0, ret = 0;
X509_STORE_CTX *csc;
STACK_OF(X509) *chain = NULL;
int num_untrusted;

x = load_cert(file, "certificate file");
if (x == NULL)
    goto end;

csc = X509_STORE_CTX_new();
if (csc == NULL) {
    BIO_printf(bio_err, "error %s: X.509 store context"
               "allocation failed\n",
               (file == NULL) ? "stdin" : file);
    goto end;
}

X509_STORE_set_flags(ctx, vflags);
if (!X509_STORE_CTX_init(csc, ctx, x, uchain)) {
    X509_STORE_CTX_free(csc);
    BIO_printf(bio_err,
               "error %s: X.509 store context"
               "initialization failed\n",
               (file == NULL) ? "stdin" : file);
    goto end;
}
if (tchain != NULL)
    X509_STORE_CTX_set0_trusted_stack(csc, tchain);
if (crls != NULL)
    X509_STORE_CTX_set0_crls(csc, crls);

i = X509_verify_cert(csc);
X509_STORE_CTX_free(csc);

<CODE ENDS>
]]></sourcecode>
        </section>
        <section anchor="mbedtls-example-code">
          <name>mbedTLS Example Code</name>
          <sourcecode type="c"><![CDATA[
<CODE BEGINS>
mbedtls_x509_crt cert;
mbedtls_x509_crt caCert;
uint32_t         certVerifyResultFlags;
// ...
int result = mbedtls_x509_crt_verify(&cert, &caCert, NULL, NULL,
                             &certVerifyResultFlags, NULL, NULL);

<CODE ENDS>
]]></sourcecode>
        </section>
      </section>
      <section anchor="appendix-gencerts">
        <name>Generating Certificates with OpenSSL</name>
        <t>This informative appendix shows example Bash shell scripts to generate test PKIX certificates for the Pledge IDevID, the Registrar and the MASA.
The shell scripts cannot be run stand-alone because they depend on input files which are not all included in this appendix. Nevertheless,
these scripts may provide guidance on how OpenSSL can be configured for generating cBRSKI certificates.</t>
        <t>The scripts were tested with OpenSSL 3.0.2. Older versions may not work -- OpenSSL 1.1.1 for example does not support all extensions used.</t>
        <sourcecode type="bash"><![CDATA[
<CODE BEGINS>
#!/bin/bash
# File: create-cert-Pledge.sh
# Create new cert for: Pledge IDevID

# days certificate is valid - try to get close to the 802.1AR 
# specified 9999-12-31 end date.
SECONDS1=`date +%s` # time now
SECONDS2=`date --date="9999-12-31 23:59:59Z" +%s` # target end time
let VALIDITY="(${SECONDS2}-${SECONDS1})/(24*3600)"
echo "Using validity param -days ${VALIDITY}"

NAME=pledge

# create csr for device
# conform to 802.1AR guidelines, using only CN + serialNumber when 
# manufacturer is already present as CA.
# CN is not even mandatory, but just good practice.
openssl req -new -key keys/privkey_pledge.pem -out $NAME.csr -subj \
             "/CN=Stok IoT sensor Y-42/serialNumber=JADA123456789"

# sign csr - it uses faketime only to get endtime to 23:59:59Z
faketime '23:59:59Z' \
openssl x509 -set_serial 32429 -CAform PEM -CA output/masa_ca.pem \
  -CAkey keys/privkey_masa_ca.pem -extfile x509v3.ext -extensions \
  pledge_ext -req -in $NAME.csr -out output/$NAME.pem \
  -days $VALIDITY -sha256

# Note: alternative method using 'ca' command. Currently 
# doesn't work without 'country' subject field.
# openssl ca -rand_serial -enddate 99991231235959Z -certform PEM \
#  -cert output/masa_ca.pem -keyfile keys/privkey_masa_ca.pem \
#  -extfile x509v3.ext -extensions pledge_ext -in $NAME.csr \ 
#  -out $NAME.pem -outdir output

# delete temp files
rm -f $NAME.csr

# convert to .der format
openssl x509 -in output/$NAME.pem -inform PEM -out output/$NAME.der \
             -outform DER

<CODE ENDS>
]]></sourcecode>
        <sourcecode type="pseudocode"><![CDATA[
<CODE BEGINS>
# File: x509v3.ext
# This file contains all X509v3 extension definitions for OpenSSL
# certificate generation. Each certificate has its own _ext 
# section below.

[ req ]
prompt = no

[ masa_ca_ext ]
subjectAltName=email:info@masa.stok.nl
keyUsage = critical,digitalSignature, keyCertSign, cRLSign
basicConstraints = critical,CA:TRUE,pathlen:3
subjectKeyIdentifier=hash
authorityKeyIdentifier=keyid

[ pledge_ext ]
keyUsage = critical,digitalSignature, nonRepudiation, \
           keyEncipherment, dataEncipherment
# basicConstraints for a non-CA cert MAY be marked either 
# non-critical or critical.
basicConstraints = CA:FALSE
# Don't include subjectKeyIdentifier (SKI) - see 802.1AR-2018
subjectKeyIdentifier = none
authorityKeyIdentifier=keyid
# Include the MASA URI
1.3.6.1.5.5.7.1.32 = ASN1:IA5STRING:masa.stok.nl

[ domain_ca_ext ]
subjectAltName=email:help@custom-er.example.com
keyUsage = critical, keyCertSign, digitalSignature, cRLSign
basicConstraints=critical,CA:TRUE
# RFC 5280 4.2.1.1 : AKI MAY be omitted, and MUST be non-critical; 
# SKI MUST be non-critical
subjectKeyIdentifier=hash

[ registrar_ext ]
keyUsage = critical, digitalSignature, nonRepudiation, \
           keyEncipherment, dataEncipherment
basicConstraints=CA:FALSE
subjectKeyIdentifier=hash
authorityKeyIdentifier=keyid
# Set Registrar 'RA' flag along with TLS client/server usage
#  see draft-ietf-anima-constrained-voucher#section-7.3
#  see tools.ietf.org/html/rfc6402#section-2.10
#  see www.openssl.org/docs/man1.1.1/man5/x509v3_config.html
extendedKeyUsage = critical,1.3.6.1.5.5.7.3.28, serverAuth, \
                   clientAuth

<CODE ENDS>
]]></sourcecode>
        <sourcecode type="bash"><![CDATA[
<CODE BEGINS>
#!/bin/bash
# File: create-cert-Registrar.sh
# Create new cert for: Registrar in a company domain

# days certificate is valid
VALIDITY=1095

# cert filename
NAME=registrar

# create csr
openssl req -new -key keys/privkey_registrar.pem -out $NAME.csr \
 -subj "/CN=Custom-ER Registrar/OU=Office dept/O=Custom-ER, Inc./\
L=Ottowa/ST=ON/C=CA"

# sign csr
openssl x509 -set_serial 0xC3F62149B2E30E3E -CAform PEM -CA \
 output/domain_ca.pem -extfile x509v3.ext -extensions registrar_ext \
 -req -in $NAME.csr -CAkey keys/privkey_domain_ca.pem \
 -out output/$NAME.pem -days $VALIDITY -sha256

# delete temp files
rm -f $NAME.csr

# convert to .der format
openssl x509 -in output/$NAME.pem -inform PEM -out output/$NAME.der \
             -outform DER

<CODE ENDS>
]]></sourcecode>
        <sourcecode type="bash"><![CDATA[
<CODE BEGINS>
#!/bin/bash
# File: create-cert-MASA.sh
# Create new cert for: MASA CA, self-signed CA certificate

# days certificate is valid
VALIDITY=3650

NAME=masa_ca

# create csr
openssl req -new -key keys/privkey_masa_ca.pem -out $NAME.csr \
            -subj "/CN=masa.stok.nl/O=vanderstok/L=Helmond/C=NL"

# sign csr
mkdir output >& /dev/null
openssl x509 -set_serial 0xE39CDA17E1386A0A  -extfile x509v3.ext \
 -extensions masa_ca_ext -req -in $NAME.csr \
 -signkey keys/privkey_masa_ca.pem -out output/$NAME.pem \
 -days $VALIDITY -sha256

# delete temp files
rm -f $NAME.csr

# convert to .der format
openssl x509 -in output/$NAME.pem -inform PEM -out output/$NAME.der \
             -outform DER

<CODE ENDS>
]]></sourcecode>
      </section>
    </section>
    <section anchor="cbrski-message-examples">
      <name>cBRSKI Message Examples</name>
      <t>This appendix extends the EST-coaps message examples from Appendix A of <xref target="RFC9148"/> with cBRSKI messages.
The CoAP headers are only fully worked out for the first example, enrollstatus.</t>
      <section anchor="es">
        <name>enrollstatus</name>
        <t>A coaps enrollstatus message from Pledge to Registrar can be as follows:</t>
        <artwork><![CDATA[
  REQ: POST /b/es
    Content-Format: 60 (application/cbor)
    Payload: <binary CBOR encoding of an enrollstatus map>
]]></artwork>
        <t>The corresponding CoAP header fields for this request are shown below.</t>
        <artwork><![CDATA[
  Ver = 1
  T = 0 (CON)
  TKL = 1
  Code = 0x02 (0.02 is POST method)
  Message ID = 0xab0f
  Token = 0x4d
  Options
   Option  (Uri-Path)
     Option Delta = 0xb   (option nr = 11)
     Option Length = 0x1
     Option Value = "b"
   Option  (Uri-Path)
     Option Delta = 0x0   (option nr = 11)
     Option Length = 0x2
     Option Value = "es"
   Option  (Content-Format)
     Option Delta = 0x1   (option nr = 12)
     Option Length = 0x1
     Option Value = 60    (application/cbor)
  Payload Marker = 0xFF
  Payload = A26776657273696F6E0166737461747573F5 (18 bytes binary)
]]></artwork>
        <t>The Uri-Host and Uri-Port Options are omitted because they coincide with the transport protocol (UDP) destination address and port respectively.</t>
        <t>The above binary CBOR enrollstatus payload looks as follows in CBOR diagnostic notation, for the case of enrollment success:</t>
        <sourcecode type="cbor-diag"><![CDATA[
  {
    "version": 1,
    "status": true
   }
]]></sourcecode>
        <t>Alternatively the payload could look as follows in case of enrollment failure, using the '<tt>reason</tt>' map item value to describe the failure:</t>
        <artwork><![CDATA[
  Payload = A36776657273696F6E0166737461747573F466726561736F6E782A3C
            496E666F726D61746976652068756D616E207265616461626C652065
            72726F72206D6573736167653E    (69 bytes binary)
]]></artwork>
        <sourcecode type="cbor-diag"><![CDATA[
  {
    "version": 1,
    "status": false,
    "reason": "<Informative human readable error message>"
  }
]]></sourcecode>
        <t>To indicate successful reception of the enrollmentstatus telemetry report, a response from the Registrar may then be:</t>
        <artwork><![CDATA[
  2.04 Changed
]]></artwork>
        <t>Which in case of a piggybacked response has the following CoAP header fields:</t>
        <artwork><![CDATA[
  Ver=1
  T=2 (ACK)
  TKL=1
  Code = 0x44 (2.04 Changed)
  Message ID = 0xab0f
  Token = 0x4d
]]></artwork>
      </section>
      <section anchor="voucherstatus">
        <name>voucher_status</name>
        <t>A coaps voucher_status message from Pledge to Registrar can be as follows:</t>
        <artwork><![CDATA[
  REQ: POST /.well-known/brski/vs
    Content-Format: 60 (application/cbor)
    Payload:
    A46776657273696F6E0166737461747573F466726561736F6E7828496E66
    6F726D61746976652068756D616E2D7265616461626C65206572726F7220
    6D6573736167656E726561736F6E2D636F6E74657874A100764164646974
    696F6E616C20696E666F726D6174696F6E

]]></artwork>
        <t>The request payload above is binary CBOR but represented here in hexadecimal for readability. Below is the equivalent CBOR diagnostic format.</t>
        <sourcecode type="cbor-diag"><![CDATA[
  {
    "version": 1, 
    "status": false,
    "reason": "Informative human-readable error message",
    "reason-context": { 0: "Additional information" } 
  }
]]></sourcecode>
        <t>A success response without payload will then be sent by the Registrar back to the Pledge to indicate reception of the telemetry report:</t>
        <artwork><![CDATA[
  RES: 2.04 Changed
]]></artwork>
      </section>
    </section>
    <section anchor="cosesign">
      <name>COSE-signed Voucher (Request) Examples</name>
      <t>This appendix provides examples of COSE-signed voucher requests and vouchers. First, the used test keys and PKIX certificates are described, followed by examples of
a constrained PVR, RVR and voucher.</t>
      <section anchor="pledge-registrar-and-masa-keys">
        <name>Pledge, Registrar and MASA Keys</name>
        <t>This section documents the public and private keys used for all examples in this appendix. These keys are not used in any
production system, and must only be used for testing purposes.</t>
        <section anchor="pledgepriv">
          <name>Pledge IDevID Private Key</name>
          <sourcecode type="x509"><![CDATA[
-----BEGIN EC PRIVATE KEY-----
MHcCAQEEIMv+C4dbzeyrEH20qkpFlWIH2FFACGZv9kW7rNWtSlYtoAoGCCqGSM49
AwEHoUQDQgAESH6OUiYFRhfIgWl4GG8jHoj8a+8rf6t5s1mZ/4SePlKom39GQ34p
VYryJ9aHmboLLfz69bzICQFKbkoQ5oaiew==
-----END EC PRIVATE KEY-----
]]></sourcecode>
          <sourcecode type="x509"><![CDATA[
Private-Key: (256 bit)
priv:
    cb:fe:0b:87:5b:cd:ec:ab:10:7d:b4:aa:4a:45:95:
    62:07:d8:51:40:08:66:6f:f6:45:bb:ac:d5:ad:4a:
    56:2d
pub:
    04:48:7e:8e:52:26:05:46:17:c8:81:69:78:18:6f:
    23:1e:88:fc:6b:ef:2b:7f:ab:79:b3:59:99:ff:84:
    9e:3e:52:a8:9b:7f:46:43:7e:29:55:8a:f2:27:d6:
    87:99:ba:0b:2d:fc:fa:f5:bc:c8:09:01:4a:6e:4a:
    10:e6:86:a2:7b
ASN1 OID: prime256v1
NIST CURVE: P-256

]]></sourcecode>
        </section>
        <section anchor="jrcpriv">
          <name>Registrar Private Key</name>
          <sourcecode type="x509"><![CDATA[
-----BEGIN PRIVATE KEY-----
MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgYJ/MP0dWA9BkYd4W
s6oRY62hDddaEmrAVm5dtAXE/UGhRANCAAQgMIVb6EaRCz7LFcr4Vy0+tWW9xlSh
Xvr27euqi54WCMXJEMk6IIaPyFBNNw8bJvqXWfZ5g7t4hj7amsvqUST2
-----END PRIVATE KEY-----
]]></sourcecode>
          <sourcecode type="x509"><![CDATA[
Private-Key: (256 bit)
priv:
    60:9f:cc:3f:47:56:03:d0:64:61:de:16:b3:aa:11:
    63:ad:a1:0d:d7:5a:12:6a:c0:56:6e:5d:b4:05:c4:
    fd:41
pub:
    04:20:30:85:5b:e8:46:91:0b:3e:cb:15:ca:f8:57:
    2d:3e:b5:65:bd:c6:54:a1:5e:fa:f6:ed:eb:aa:8b:
    9e:16:08:c5:c9:10:c9:3a:20:86:8f:c8:50:4d:37:
    0f:1b:26:fa:97:59:f6:79:83:bb:78:86:3e:da:9a:
    cb:ea:51:24:f6
ASN1 OID: prime256v1
NIST CURVE: P-256

]]></sourcecode>
        </section>
        <section anchor="masapriv">
          <name>MASA Private Key</name>
          <sourcecode type="x509"><![CDATA[
-----BEGIN PRIVATE KEY-----
MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgrbJ1oU+HIJ2SWYAk
DkBTL+YNPxQG+gwsMsZB94N8mZ2hRANCAASS9NVlWJdztwNY81yPlH2UODYWhlYA
ZfsqnEPSFZKnq8mq8gF78ZVbYi6q2FEg8kkORY/rpIU/X7SQsRuD+wMW
-----END PRIVATE KEY-----
]]></sourcecode>
          <sourcecode type="x509"><![CDATA[
Private-Key: (256 bit)
priv:
    ad:b2:75:a1:4f:87:20:9d:92:59:80:24:0e:40:53:
    2f:e6:0d:3f:14:06:fa:0c:2c:32:c6:41:f7:83:7c:
    99:9d
pub:
    04:92:f4:d5:65:58:97:73:b7:03:58:f3:5c:8f:94:
    7d:94:38:36:16:86:56:00:65:fb:2a:9c:43:d2:15:
    92:a7:ab:c9:aa:f2:01:7b:f1:95:5b:62:2e:aa:d8:
    51:20:f2:49:0e:45:8f:eb:a4:85:3f:5f:b4:90:b1:
    1b:83:fb:03:16
ASN1 OID: prime256v1
NIST CURVE: P-256

]]></sourcecode>
        </section>
      </section>
      <section anchor="pledge-registrar-domain-ca-and-masa-certificates">
        <name>Pledge, Registrar, Domain CA and MASA Certificates</name>
        <t>All keys and PKIX certificates used for the examples have been generated with OpenSSL - see <xref target="appendix-gencerts"/> for more details on certificate generation.
Below the certificates are listed that accompany the keys shown above. Each certificate description is followed by the hexadecimal representation of the X.509 ASN.1 DER encoded certificate.
This representation can be for example decoded using an online ASN.1 decoder.</t>
        <section anchor="pledge-idevid-certificate">
          <name>Pledge IDevID Certificate</name>
          <sourcecode type="x509"><![CDATA[
Certificate:
Data:
 Version: 3 (0x2)
 Serial Number: 32429 (0x7ead)
 Signature Algorithm: ecdsa-with-SHA256
 Issuer: CN = masa.stok.nl, O = vanderstok, L = Helmond, 
         C = NL
 Validity
   Not Before: Dec  9 12:50:47 2022 GMT
   Not After : Dec 31 12:50:47 9999 GMT
 Subject: CN = Stok IoT sensor Y-42, serialNumber = JADA123456789
 Subject Public Key Info:
   Public Key Algorithm: id-ecPublicKey
     Public-Key: (256 bit)
     pub:
       04:48:7e:8e:52:26:05:46:17:c8:81:69:78:18:6f:
       23:1e:88:fc:6b:ef:2b:7f:ab:79:b3:59:99:ff:84:
       9e:3e:52:a8:9b:7f:46:43:7e:29:55:8a:f2:27:d6:
       87:99:ba:0b:2d:fc:fa:f5:bc:c8:09:01:4a:6e:4a:
       10:e6:86:a2:7b
     ASN1 OID: prime256v1
     NIST CURVE: P-256
 X509v3 extensions:
   X509v3 Key Usage: critical
     Digital Signature, Non Repudiation, Key Encipherment, 
             Data Encipherment
   X509v3 Basic Constraints: 
     CA:FALSE
   X509v3 Authority Key Identifier: 
     CB:8D:98:CA:74:C5:1B:58:DD:E7:AC:EF:86:9A:94:43:A8:D6:66:A6
   1.3.6.1.5.5.7.1.32: 
      hl=2 l=  12 prim: IA5STRING     :masa.stok.nl

Signature Algorithm: ecdsa-with-SHA256
Signature Value:
 30:45:02:20:4d:89:90:7e:03:fb:52:56:42:0c:3f:c1:b1:f1:
 47:b5:b3:93:65:45:2e:be:50:db:67:85:8f:23:89:a2:3f:9e:
 02:21:00:95:33:69:d1:c6:db:f0:f1:f6:52:24:59:d3:0a:95:
 4e:b2:f4:96:a1:31:3c:7b:d9:2f:28:b3:29:71:bb:60:df

]]></sourcecode>
          <t>Below is the hexadecimal representation of the binary X.509 DER-encoded certificate:</t>
          <sourcecode type="pseudocode"><![CDATA[
308201CE30820174A00302010202027EAD300A06082A8648CE3D040302304B31
15301306035504030C0C6D6173612E73746F6B2E6E6C31133011060355040A0C
0A76616E64657273746F6B3110300E06035504070C0748656C6D6F6E64310B30
09060355040613024E4C3020170D3232313230393132353034375A180F393939
39313233313132353034375A3037311D301B06035504030C1453746F6B20496F
542073656E736F7220592D3432311630140603550405130D4A41444131323334
35363738393059301306072A8648CE3D020106082A8648CE3D03010703420004
487E8E5226054617C8816978186F231E88FC6BEF2B7FAB79B35999FF849E3E52
A89B7F46437E29558AF227D68799BA0B2DFCFAF5BCC809014A6E4A10E686A27B
A35A3058300E0603551D0F0101FF0404030204F030090603551D130402300030
1F0603551D23041830168014CB8D98CA74C51B58DDE7ACEF869A9443A8D666A6
301A06082B06010505070120040E160C6D6173612E73746F6B2E6E6C300A0608
2A8648CE3D040302034800304502204D89907E03FB5256420C3FC1B1F147B5B3
9365452EBE50DB67858F2389A23F9E022100953369D1C6DBF0F1F6522459D30A
954EB2F496A1313C7BD92F28B32971BB60DF

]]></sourcecode>
        </section>
        <section anchor="cosesign-registrar-cert">
          <name>Registrar Certificate</name>
          <sourcecode type="x509"><![CDATA[
Certificate:
Data:
 Version: 3 (0x2)
 Serial Number:
   c3:f6:21:49:b2:e3:0e:3e
 Signature Algorithm: ecdsa-with-SHA256
 Issuer: CN = Custom-ER Global CA, OU = IT, O = "Custom-ER, Inc.", 
         L = San Jose, ST = CA, C = US
 Validity
   Not Before: Dec  9 12:50:47 2022 GMT
   Not After : Dec  8 12:50:47 2025 GMT
 Subject: CN = Custom-ER Registrar, OU = Office dept, O = "Custom-ER, 
         Inc.", L = Ottowa, ST = ON, C = CA
 Subject Public Key Info:
   Public Key Algorithm: id-ecPublicKey
     Public-Key: (256 bit)
     pub:
       04:20:30:85:5b:e8:46:91:0b:3e:cb:15:ca:f8:57:
       2d:3e:b5:65:bd:c6:54:a1:5e:fa:f6:ed:eb:aa:8b:
       9e:16:08:c5:c9:10:c9:3a:20:86:8f:c8:50:4d:37:
       0f:1b:26:fa:97:59:f6:79:83:bb:78:86:3e:da:9a:
       cb:ea:51:24:f6
     ASN1 OID: prime256v1
     NIST CURVE: P-256
 X509v3 extensions:
   X509v3 Key Usage: critical
     Digital Signature, Non Repudiation, Key Encipherment, 
             Data Encipherment
   X509v3 Basic Constraints: 
     CA:FALSE
   X509v3 Subject Key Identifier: 
     C9:08:0B:38:7D:8D:D8:5B:3A:59:E7:EC:10:0B:86:63:93:A9:CA:4C
   X509v3 Authority Key Identifier: 
     92:EA:76:40:40:4A:8F:AB:4F:27:0B:F3:BC:37:9D:86:CD:72:80:F8
   X509v3 Extended Key Usage: critical
     CMC Registration Authority, TLS Web Server Authentication, 
             TLS Web Client Authentication
Signature Algorithm: ecdsa-with-SHA256
Signature Value:
 30:45:02:21:00:d8:4a:7c:69:2f:f9:58:6e:82:22:87:18:f6:
 3b:c3:05:f0:ae:b8:ae:ec:42:78:82:38:79:81:2a:5d:15:61:
 64:02:20:08:f2:3c:13:69:13:b0:2c:e2:63:09:d5:99:4f:eb:
 75:70:af:af:ed:98:cd:f1:12:11:c0:37:f7:18:4d:c1:9d

]]></sourcecode>
          <t>Below is the hexadecimal representation of the binary X.509 DER-encoded certificate:</t>
          <sourcecode type="pseudocode"><![CDATA[
3082026D30820213A003020102020900C3F62149B2E30E3E300A06082A8648CE
3D0403023072311C301A06035504030C13437573746F6D2D455220476C6F6261
6C204341310B3009060355040B0C02495431183016060355040A0C0F43757374
6F6D2D45522C20496E632E3111300F06035504070C0853616E204A6F7365310B
300906035504080C024341310B3009060355040613025553301E170D32323132
30393132353034375A170D3235313230383132353034375A3079311C301A0603
5504030C13437573746F6D2D4552205265676973747261723114301206035504
0B0C0B4F6666696365206465707431183016060355040A0C0F437573746F6D2D
45522C20496E632E310F300D06035504070C064F74746F7761310B3009060355
04080C024F4E310B30090603550406130243413059301306072A8648CE3D0201
06082A8648CE3D030107034200042030855BE846910B3ECB15CAF8572D3EB565
BDC654A15EFAF6EDEBAA8B9E1608C5C910C93A20868FC8504D370F1B26FA9759
F67983BB78863EDA9ACBEA5124F6A3818A308187300E0603551D0F0101FF0404
030204F030090603551D1304023000301D0603551D0E04160414C9080B387D8D
D85B3A59E7EC100B866393A9CA4C301F0603551D2304183016801492EA764040
4A8FAB4F270BF3BC379D86CD7280F8302A0603551D250101FF0420301E06082B
0601050507031C06082B0601050507030106082B06010505070302300A06082A
8648CE3D0403020348003045022100D84A7C692FF9586E82228718F63BC305F0
AEB8AEEC4278823879812A5D156164022008F23C136913B02CE26309D5994FEB
7570AFAFED98CDF11211C037F7184DC19D

]]></sourcecode>
        </section>
        <section anchor="cose-example-domain-ca-cert">
          <name>Domain CA Certificate</name>
          <t>The Domain CA certificate is the CA of the owner's domain. It has signed the Registrar (RA) certificate.</t>
          <sourcecode type="x509"><![CDATA[
Certificate:
Data:
 Version: 3 (0x2)
 Serial Number: 3092288576548618702 (0x2aea0413a42dc1ce)
 Signature Algorithm: ecdsa-with-SHA256
 Issuer: CN = Custom-ER Global CA, OU = IT, O = "Custom-ER, Inc.", 
         L = San Jose, ST = CA, C = US
 Validity
   Not Before: Dec  9 12:50:47 2022 GMT
   Not After : Dec  6 12:50:47 2032 GMT
 Subject: CN = Custom-ER Global CA, OU = IT, O = "Custom-ER, Inc.", 
         L = San Jose, ST = CA, C = US
 Subject Public Key Info:
   Public Key Algorithm: id-ecPublicKey
     Public-Key: (256 bit)
     pub:
       04:97:b1:ed:96:91:64:93:09:85:bb:b8:ac:9a:2a:
       f9:45:5c:df:ee:a4:b1:1d:e2:e7:9d:06:8b:fa:80:
       39:26:b4:00:52:51:b3:4f:1c:08:15:a4:cb:e0:3f:
       bd:1b:bc:b6:35:f6:43:1a:22:de:78:65:3b:87:b9:
       95:37:ec:e1:6c
     ASN1 OID: prime256v1
     NIST CURVE: P-256
 X509v3 extensions:
   X509v3 Subject Alternative Name: 
     email:help@custom-er.example.com
   X509v3 Key Usage: critical
     Digital Signature, Certificate Sign, CRL Sign
   X509v3 Basic Constraints: critical
     CA:TRUE
   X509v3 Subject Key Identifier: 
     92:EA:76:40:40:4A:8F:AB:4F:27:0B:F3:BC:37:9D:86:CD:72:80:F8
Signature Algorithm: ecdsa-with-SHA256
Signature Value:
 30:44:02:20:66:15:df:c3:70:11:f6:73:78:d8:fd:1c:2a:3f:
 bd:d1:3f:51:f6:b6:6f:2d:7c:e2:7a:13:18:21:bb:70:f0:c0:
 02:20:69:86:d8:d2:28:b2:92:6e:23:9e:19:0b:8f:18:25:c9:
 c1:4c:67:95:ff:a0:b3:24:bd:4d:ac:2e:cb:68:d7:13

]]></sourcecode>
          <t>Below is the hexadecimal representation of the binary X.509 DER-encoded certificate:</t>
          <sourcecode type="pseudocode"><![CDATA[
30820242308201E9A00302010202082AEA0413A42DC1CE300A06082A8648CE3D
0403023072311C301A06035504030C13437573746F6D2D455220476C6F62616C
204341310B3009060355040B0C02495431183016060355040A0C0F437573746F
6D2D45522C20496E632E3111300F06035504070C0853616E204A6F7365310B30
0906035504080C024341310B3009060355040613025553301E170D3232313230
393132353034375A170D3332313230363132353034375A3072311C301A060355
04030C13437573746F6D2D455220476C6F62616C204341310B3009060355040B
0C02495431183016060355040A0C0F437573746F6D2D45522C20496E632E3111
300F06035504070C0853616E204A6F7365310B300906035504080C024341310B
30090603550406130255533059301306072A8648CE3D020106082A8648CE3D03
01070342000497B1ED969164930985BBB8AC9A2AF9455CDFEEA4B11DE2E79D06
8BFA803926B4005251B34F1C0815A4CBE03FBD1BBCB635F6431A22DE78653B87
B99537ECE16CA369306730250603551D11041E301C811A68656C704063757374
6F6D2D65722E6578616D706C652E636F6D300E0603551D0F0101FF0404030201
86300F0603551D130101FF040530030101FF301D0603551D0E0416041492EA76
40404A8FAB4F270BF3BC379D86CD7280F8300A06082A8648CE3D040302034700
304402206615DFC37011F67378D8FD1C2A3FBDD13F51F6B66F2D7CE27A131821
BB70F0C002206986D8D228B2926E239E190B8F1825C9C14C6795FFA0B324BD4D
AC2ECB68D713

]]></sourcecode>
        </section>
        <section anchor="masa-certificate">
          <name>MASA Certificate</name>
          <t>The MASA CA certificate is the CA that signed the Pledge's IDevID certificate.</t>
          <sourcecode type="x509"><![CDATA[
Certificate:
Data:
 Version: 3 (0x2)
 Serial Number:
   e3:9c:da:17:e1:38:6a:0a
 Signature Algorithm: ecdsa-with-SHA256
 Issuer: CN = masa.stok.nl, O = vanderstok, L = Helmond, 
         C = NL
 Validity
   Not Before: Dec  9 12:50:47 2022 GMT
   Not After : Dec  6 12:50:47 2032 GMT
 Subject: CN = masa.stok.nl, O = vanderstok, L = Helmond, 
         C = NL
 Subject Public Key Info:
   Public Key Algorithm: id-ecPublicKey
     Public-Key: (256 bit)
     pub:
       04:92:f4:d5:65:58:97:73:b7:03:58:f3:5c:8f:94:
       7d:94:38:36:16:86:56:00:65:fb:2a:9c:43:d2:15:
       92:a7:ab:c9:aa:f2:01:7b:f1:95:5b:62:2e:aa:d8:
       51:20:f2:49:0e:45:8f:eb:a4:85:3f:5f:b4:90:b1:
       1b:83:fb:03:16
     ASN1 OID: prime256v1
     NIST CURVE: P-256
 X509v3 extensions:
   X509v3 Subject Alternative Name: 
     email:info@masa.stok.nl
   X509v3 Key Usage: critical
     Digital Signature, Certificate Sign, CRL Sign
   X509v3 Basic Constraints: critical
     CA:TRUE, pathlen:3
   X509v3 Subject Key Identifier: 
     CB:8D:98:CA:74:C5:1B:58:DD:E7:AC:EF:86:9A:94:43:A8:D6:66:A6
Signature Algorithm: ecdsa-with-SHA256
Signature Value:
 30:46:02:21:00:94:3f:a5:26:51:68:16:38:5b:78:9a:d8:c3:
 af:8e:49:28:22:60:56:26:43:4a:14:98:3e:e1:e4:81:ad:ca:
 1b:02:21:00:ba:4d:aa:fd:fa:68:42:74:03:2b:a8:41:6b:e2:
 90:0c:9e:7b:b8:c0:9c:f7:0e:3f:b4:36:8a:b3:9c:3e:31:0e

]]></sourcecode>
          <t>Below is the hexadecimal representation of the binary X.509 DER-encoded certificate:</t>
          <sourcecode type="pseudocode"><![CDATA[
308201F130820196A003020102020900E39CDA17E1386A0A300A06082A8648CE
3D040302304B3115301306035504030C0C6D6173612E73746F6B2E6E6C311330
11060355040A0C0A76616E64657273746F6B3110300E06035504070C0748656C
6D6F6E64310B3009060355040613024E4C301E170D3232313230393132353034
375A170D3332313230363132353034375A304B3115301306035504030C0C6D61
73612E73746F6B2E6E6C31133011060355040A0C0A76616E64657273746F6B31
10300E06035504070C0748656C6D6F6E64310B3009060355040613024E4C3059
301306072A8648CE3D020106082A8648CE3D0301070342000492F4D565589773
B70358F35C8F947D9438361686560065FB2A9C43D21592A7ABC9AAF2017BF195
5B622EAAD85120F2490E458FEBA4853F5FB490B11B83FB0316A3633061301C06
03551D11041530138111696E666F406D6173612E73746F6B2E6E6C300E060355
1D0F0101FF04040302018630120603551D130101FF040830060101FF02010330
1D0603551D0E04160414CB8D98CA74C51B58DDE7ACEF869A9443A8D666A6300A
06082A8648CE3D0403020349003046022100943FA526516816385B789AD8C3AF
8E492822605626434A14983EE1E481ADCA1B022100BA4DAAFDFA684274032BA8
416BE2900C9E7BB8C09CF70E3FB4368AB39C3E310E

]]></sourcecode>
        </section>
      </section>
      <section anchor="pvr-example">
        <name>COSE-signed Pledge Voucher Request (PVR)</name>
        <t>In this example, the voucher request (PVR) has been signed by the Pledge using the IDevID private key of <xref target="pledgepriv"/>,
and has been sent to the link-local constrained Join Proxy (JP) over CoAPS to JP's join port. The join port happens to
use the default CoAPS UDP port 5684.</t>
        <artwork><![CDATA[
  REQ: POST coaps://[JP-link-local-address]/b/rv
    Content-Format: 836 (application/voucher+cose)
    Payload: <signed_pvr>
]]></artwork>
        <t>When the Join Proxy receives the DTLS handshake messages from the Pledge, it will relay these messages to the Registrar.
The payload signed_voucher_request is shown as hexadecimal dump (with lf added) below:</t>
        <sourcecode type="pseudocode"><![CDATA[
D28443A10126A0587EA11909C5A40102074823BFBBC9C2BCF2130C585B305930
1306072A8648CE3D020106082A8648CE3D030107034200042030855BE846910B
3ECB15CAF8572D3EB565BDC654A15EFAF6EDEBAA8B9E1608C5C910C93A20868F
C8504D370F1B26FA9759F67983BB78863EDA9ACBEA5124F60D6D4A4144413132
33343536373839584068987DE8B007F4E9416610BBE2D48E1D7EA1032092B8BF
CE611421950F45B22F17E214820C07E777ADF86175E25D3205568404C25FCEEC
1B817C7861A6104B3D

]]></sourcecode>
        <t>The representation of signed_pvr in CBOR diagnostic format (with lf added) is:</t>
        <sourcecode type="cbor-diag"><![CDATA[
18([h'A10126', {}, h'A11909C5A40102074823BFBBC9C2BCF2130C585B3059301
306072A8648CE3D020106082A8648CE3D030107034200042030855BE846910B3ECB1
5CAF8572D3EB565BDC654A15EFAF6EDEBAA8B9E1608C5C910C93A20868FC8504D370
F1B26FA9759F67983BB78863EDA9ACBEA5124F60D6D4A41444131323334353637383
9', h'68987DE8B007F4E9416610BBE2D48E1D7EA1032092B8BFCE611421950F45B2
2F17E214820C07E777ADF86175E25D3205568404C25FCEEC1B817C7861A6104B3D']
)

]]></sourcecode>
        <t>The COSE payload is the PVR voucher data, encoded as a CBOR byte string. The diagnostic representation of it is shown below:</t>
        <sourcecode type="cbor-diag"><![CDATA[
{2501: {1: 2, 7: h'23BFBBC9C2BCF213', 12: h'3059301306072A8648CE3D02
0106082A8648CE3D030107034200042030855BE846910B3ECB15CAF8572D3EB565BD
C654A15EFAF6EDEBAA8B9E1608C5C910C93A20868FC8504D370F1B26FA9759F67983
BB78863EDA9ACBEA5124F6', 13: "JADA123456789"}}

]]></sourcecode>
        <t>The Pledge uses the '<tt>proximity</tt>' (key '1', SID 2502, enum value 2) assertion together with an included
'<tt>proximity-registrar-pubk</tt>' attribute (key '12', SID 2513) to inform MASA about its proximity to the specific Registrar.</t>
      </section>
      <section anchor="rvr-example">
        <name>COSE-signed Registrar Voucher Request (RVR)</name>
        <t>In this example the Registrar's voucher request has been signed by the JRC (Registrar) using the private key from
<xref target="jrcpriv"/>.  Contained within this voucher request is the voucher request PVR that was made by the Pledge to JRC.
Note that the RVR uses the HTTPS protocol (not CoAP) and corresponding long URI path names as defined in <xref target="RFC8995"/>.
The Content-Type and Accept headers indicate the constrained voucher format that is defined in the present document.
Because the Pledge used this format in the PVR, the JRC must also use this format in the RVR.</t>
        <artwork><![CDATA[
  REQ: POST https://masa.stok.nl/.well-known/brski/requestvoucher
    Content-Type: application/voucher+cose
    Accept: application/voucher+cose
    Body: <signed_rvr>
]]></artwork>
        <t>The payload signed_rvr is shown as hexadecimal dump (with lf added):</t>
        <sourcecode type="pseudocode"><![CDATA[
D28443A10126A11820825902843082028030820225A003020102020900C3F621
49B2E30E3E300A06082A8648CE3D0403023072311C301A06035504030C134375
73746F6D2D455220476C6F62616C204341310B3009060355040B0C0249543118
3016060355040A0C0F437573746F6D2D45522C20496E632E3111300F06035504
070C0853616E204A6F7365310B300906035504080C024341310B300906035504
0613025553301E170D3232313230363131333735395A170D3235313230353131
333735395A30818D3131302F06035504030C28437573746F6D2D455220436F6D
6D65726369616C204275696C64696E6773205265676973747261723113301106
0355040B0C0A4F6666696365206F707331183016060355040A0C0F437573746F
6D2D45522C20496E632E310F300D06035504070C064F74746F7761310B300906
035504080C024F4E310B30090603550406130243413059301306072A8648CE3D
020106082A8648CE3D030107034200042030855BE846910B3ECB15CAF8572D3E
B565BDC654A15EFAF6EDEBAA8B9E1608C5C910C93A20868FC8504D370F1B26FA
9759F67983BB78863EDA9ACBEA5124F6A3818730818430090603551D13040230
00300B0603551D0F0404030204F0301D0603551D0E04160414C9080B387D8DD8
5B3A59E7EC100B866393A9CA4C301F0603551D2304183016801492EA7640404A
8FAB4F270BF3BC379D86CD7280F8302A0603551D250101FF0420301E06082B06
01050507031C06082B0601050507030106082B06010505070302300A06082A86
48CE3D040302034900304602210091A2033692EB81503D53505FFC8DA326B1EE
7DEA96F29174F0B3341A07812201022100FF7339288108B712F418530A18025A
895408CC45E0BB678B46FBAB37DDB4D36B59024730820243308201E9A0030201
0202082AEA0413A42DC1CE300A06082A8648CE3D0403023072311C301A060355
04030C13437573746F6D2D455220476C6F62616C204341310B3009060355040B
0C02495431183016060355040A0C0F437573746F6D2D45522C20496E632E3111
300F06035504070C0853616E204A6F7365310B300906035504080C024341310B
3009060355040613025553301E170D3232313230363131333735395A170D3332
313230333131333735395A3072311C301A06035504030C13437573746F6D2D45
5220476C6F62616C204341310B3009060355040B0C0249543118301606035504
0A0C0F437573746F6D2D45522C20496E632E3111300F06035504070C0853616E
204A6F7365310B300906035504080C024341310B300906035504061302555330
59301306072A8648CE3D020106082A8648CE3D0301070342000497B1ED969164
930985BBB8AC9A2AF9455CDFEEA4B11DE2E79D068BFA803926B4005251B34F1C
0815A4CBE03FBD1BBCB635F6431A22DE78653B87B99537ECE16CA3693067300F
0603551D130101FF040530030101FF30250603551D11041E301C811A68656C70
40637573746F6D2D65722E6578616D706C652E636F6D300E0603551D0F0101FF
040403020186301D0603551D0E0416041492EA7640404A8FAB4F270BF3BC379D
86CD7280F8300A06082A8648CE3D0403020348003045022100D6D813B390BD3A
7B4E85424BCB1ED933AD1E981F2817B59083DD6EC1C5E3FADF02202CEE440619
2BC767E98D7CFAE044C6807481AD8564A7D569DCA3D1CDF1E5E843590124A119
09C5A60102027818323032322D31322D30365432303A30343A31352E3735345A
05581A041830168014CB8D98CA74C51B58DDE7ACEF869A9443A8D666A6074823
BFBBC9C2BCF2130958C9D28443A10126A0587EA11909C5A40102074823BFBBC9
C2BCF2130C585B3059301306072A8648CE3D020106082A8648CE3D0301070342
00042030855BE846910B3ECB15CAF8572D3EB565BDC654A15EFAF6EDEBAA8B9E
1608C5C910C93A20868FC8504D370F1B26FA9759F67983BB78863EDA9ACBEA51
24F60D6D4A414441313233343536373839584068987DE8B007F4E9416610BBE2
D48E1D7EA1032092B8BFCE611421950F45B22F17E214820C07E777ADF86175E2
5D3205568404C25FCEEC1B817C7861A6104B3D0D6D4A41444131323334353637
38395840B1DD40B10787437588AEAC9036899191C16CCDBECA31C197855CCB6B
BA142D709FE329CBC3F76297D6063ACB6759EAB98E96EA4C4AA2135AA48A247B
AC1D6A3F

]]></sourcecode>
        <t>The representation of signed_rvr in CBOR diagnostic format (with lf added) is:</t>
        <sourcecode type="cbor-diag"><![CDATA[
18([h'A10126', {32: [h'3082028030820225A003020102020900C3F62149B2E30
E3E300A06082A8648CE3D0403023072311C301A06035504030C13437573746F6D2D4
55220476C6F62616C204341310B3009060355040B0C02495431183016060355040A0
C0F437573746F6D2D45522C20496E632E3111300F06035504070C0853616E204A6F7
365310B300906035504080C024341310B3009060355040613025553301E170D32323
13230363131333735395A170D3235313230353131333735395A30818D3131302F060
35504030C28437573746F6D2D455220436F6D6D65726369616C204275696C64696E6
7732052656769737472617231133011060355040B0C0A4F6666696365206F7073311
83016060355040A0C0F437573746F6D2D45522C20496E632E310F300D06035504070
C064F74746F7761310B300906035504080C024F4E310B30090603550406130243413
059301306072A8648CE3D020106082A8648CE3D030107034200042030855BE846910
B3ECB15CAF8572D3EB565BDC654A15EFAF6EDEBAA8B9E1608C5C910C93A20868FC85
04D370F1B26FA9759F67983BB78863EDA9ACBEA5124F6A3818730818430090603551
D1304023000300B0603551D0F0404030204F0301D0603551D0E04160414C9080B387
D8DD85B3A59E7EC100B866393A9CA4C301F0603551D2304183016801492EA7640404
A8FAB4F270BF3BC379D86CD7280F8302A0603551D250101FF0420301E06082B06010
50507031C06082B0601050507030106082B06010505070302300A06082A8648CE3D0
40302034900304602210091A2033692EB81503D53505FFC8DA326B1EE7DEA96F2917
4F0B3341A07812201022100FF7339288108B712F418530A18025A895408CC45E0BB6
78B46FBAB37DDB4D36B', h'30820243308201E9A00302010202082AEA0413A42DC1
CE300A06082A8648CE3D0403023072311C301A06035504030C13437573746F6D2D45
5220476C6F62616C204341310B3009060355040B0C02495431183016060355040A0C
0F437573746F6D2D45522C20496E632E3111300F06035504070C0853616E204A6F73
65310B300906035504080C024341310B3009060355040613025553301E170D323231
3230363131333735395A170D3332313230333131333735395A3072311C301A060355
04030C13437573746F6D2D455220476C6F62616C204341310B3009060355040B0C02
495431183016060355040A0C0F437573746F6D2D45522C20496E632E3111300F0603
5504070C0853616E204A6F7365310B300906035504080C024341310B300906035504
06130255533059301306072A8648CE3D020106082A8648CE3D0301070342000497B1
ED969164930985BBB8AC9A2AF9455CDFEEA4B11DE2E79D068BFA803926B4005251B3
4F1C0815A4CBE03FBD1BBCB635F6431A22DE78653B87B99537ECE16CA3693067300F
0603551D130101FF040530030101FF30250603551D11041E301C811A68656C704063
7573746F6D2D65722E6578616D706C652E636F6D300E0603551D0F0101FF04040302
0186301D0603551D0E0416041492EA7640404A8FAB4F270BF3BC379D86CD7280F830
0A06082A8648CE3D0403020348003045022100D6D813B390BD3A7B4E85424BCB1ED9
33AD1E981F2817B59083DD6EC1C5E3FADF02202CEE4406192BC767E98D7CFAE044C6
807481AD8564A7D569DCA3D1CDF1E5E843']}, h'A11909C5A601020278183230323
22D31322D30365432303A30343A31352E3735345A05581A041830168014CB8D98CA7
4C51B58DDE7ACEF869A9443A8D666A6074823BFBBC9C2BCF2130958C9D28443A1012
6A0587EA11909C5A40102074823BFBBC9C2BCF2130C585B3059301306072A8648CE3
D020106082A8648CE3D030107034200042030855BE846910B3ECB15CAF8572D3EB56
5BDC654A15EFAF6EDEBAA8B9E1608C5C910C93A20868FC8504D370F1B26FA9759F67
983BB78863EDA9ACBEA5124F60D6D4A414441313233343536373839584068987DE8B
007F4E9416610BBE2D48E1D7EA1032092B8BFCE611421950F45B22F17E214820C07E
777ADF86175E25D3205568404C25FCEEC1B817C7861A6104B3D0D6D4A41444131323
3343536373839', h'B1DD40B10787437588AEAC9036899191C16CCDBECA31C19785
5CCB6BBA142D709FE329CBC3F76297D6063ACB6759EAB98E96EA4C4AA2135AA48A24
7BAC1D6A3F'])

]]></sourcecode>
      </section>
      <section anchor="voucher-example">
        <name>COSE-signed Voucher from MASA</name>
        <t>The resulting voucher is created by the MASA and returned to the Registrar:</t>
        <artwork><![CDATA[
  RES: 200 OK
    Content-Type: application/voucher+cose
    Body: <signed_voucher>
]]></artwork>
        <t>The Registrar then returns the voucher to the Pledge:</t>
        <artwork><![CDATA[
  RES: 2.04 Changed
    Content-Format: 836 (application/voucher+cose)
    Payload: <signed_voucher>
]]></artwork>
        <t>It is signed by the MASA's private key (see <xref target="masapriv"/>) and can be
verified by the Pledge using the MASA's public key that it stores.</t>
        <t>Below is the binary signed_voucher, encoded in hexadecimal (with lf added):</t>
        <sourcecode type="pseudocode"><![CDATA[
D28443A10126A0590288A1190993A60102027818323032322D31322D30365432
303A32333A33302E3730385A03F4074857EED786AD4049070859024730820243
308201E9A00302010202082AEA0413A42DC1CE300A06082A8648CE3D04030230
72311C301A06035504030C13437573746F6D2D455220476C6F62616C20434131
0B3009060355040B0C02495431183016060355040A0C0F437573746F6D2D4552
2C20496E632E3111300F06035504070C0853616E204A6F7365310B3009060355
04080C024341310B3009060355040613025553301E170D323231323036313133
3735395A170D3332313230333131333735395A3072311C301A06035504030C13
437573746F6D2D455220476C6F62616C204341310B3009060355040B0C024954
31183016060355040A0C0F437573746F6D2D45522C20496E632E3111300F0603
5504070C0853616E204A6F7365310B300906035504080C024341310B30090603
550406130255533059301306072A8648CE3D020106082A8648CE3D0301070342
000497B1ED969164930985BBB8AC9A2AF9455CDFEEA4B11DE2E79D068BFA8039
26B4005251B34F1C0815A4CBE03FBD1BBCB635F6431A22DE78653B87B99537EC
E16CA3693067300F0603551D130101FF040530030101FF30250603551D11041E
301C811A68656C7040637573746F6D2D65722E6578616D706C652E636F6D300E
0603551D0F0101FF040403020186301D0603551D0E0416041492EA7640404A8F
AB4F270BF3BC379D86CD7280F8300A06082A8648CE3D04030203480030450221
00D6D813B390BD3A7B4E85424BCB1ED933AD1E981F2817B59083DD6EC1C5E3FA
DF02202CEE4406192BC767E98D7CFAE044C6807481AD8564A7D569DCA3D1CDF1
E5E8430B6D4A4144413132333435363738395840DF31B21A6AD3F5AC7F4C8B02
6F551BD28FBCE62330D3E262AC170F6BFEDDBA5F2E8FBAA2CAACFED9E8614EAC
5BF2450DADC53AC29DFA30E8787A1400B2E7C832

]]></sourcecode>
        <t>The representation of signed_voucher in CBOR diagnostic format (with lf added) is:</t>
        <sourcecode type="cbor-diag"><![CDATA[
18([h'A10126', {}, h'A1190993A60102027818323032322D31322D30365432303
A32333A33302E3730385A03F4074857EED786AD4049070859024730820243308201E
9A00302010202082AEA0413A42DC1CE300A06082A8648CE3D0403023072311C301A0
6035504030C13437573746F6D2D455220476C6F62616C204341310B3009060355040
B0C02495431183016060355040A0C0F437573746F6D2D45522C20496E632E3111300
F06035504070C0853616E204A6F7365310B300906035504080C024341310B3009060
355040613025553301E170D3232313230363131333735395A170D333231323033313
1333735395A3072311C301A06035504030C13437573746F6D2D455220476C6F62616
C204341310B3009060355040B0C02495431183016060355040A0C0F437573746F6D2
D45522C20496E632E3111300F06035504070C0853616E204A6F7365310B300906035
504080C024341310B30090603550406130255533059301306072A8648CE3D0201060
82A8648CE3D0301070342000497B1ED969164930985BBB8AC9A2AF9455CDFEEA4B11
DE2E79D068BFA803926B4005251B34F1C0815A4CBE03FBD1BBCB635F6431A22DE786
53B87B99537ECE16CA3693067300F0603551D130101FF040530030101FF302506035
51D11041E301C811A68656C7040637573746F6D2D65722E6578616D706C652E636F6
D300E0603551D0F0101FF040403020186301D0603551D0E0416041492EA7640404A8
FAB4F270BF3BC379D86CD7280F8300A06082A8648CE3D0403020348003045022100D
6D813B390BD3A7B4E85424BCB1ED933AD1E981F2817B59083DD6EC1C5E3FADF02202
CEE4406192BC767E98D7CFAE044C6807481AD8564A7D569DCA3D1CDF1E5E8430B6D4
A414441313233343536373839', h'DF31B21A6AD3F5AC7F4C8B026F551BD28FBCE6
2330D3E262AC170F6BFEDDBA5F2E8FBAA2CAACFED9E8614EAC5BF2450DADC53AC29D
FA30E8787A1400B2E7C832'])

]]></sourcecode>
        <t>In the above, the third element in the array is the voucher data encoded as a CBOR byte string.
When decoded, it can be represented by the following CBOR diagnostic notation:</t>
        <sourcecode type="cbor-diag"><![CDATA[
{2451: {1: 2, 2: "2022-12-06T20:23:30.708Z", 3: false, 7: h'57EED786
AD404907', 8: h'30820243308201E9A00302010202082AEA0413A42DC1CE300A06
082A8648CE3D0403023072311C301A06035504030C13437573746F6D2D455220476C
6F62616C204341310B3009060355040B0C02495431183016060355040A0C0F437573
746F6D2D45522C20496E632E3111300F06035504070C0853616E204A6F7365310B30
0906035504080C024341310B3009060355040613025553301E170D32323132303631
31333735395A170D3332313230333131333735395A3072311C301A06035504030C13
437573746F6D2D455220476C6F62616C204341310B3009060355040B0C0249543118
3016060355040A0C0F437573746F6D2D45522C20496E632E3111300F06035504070C
0853616E204A6F7365310B300906035504080C024341310B30090603550406130255
533059301306072A8648CE3D020106082A8648CE3D0301070342000497B1ED969164
930985BBB8AC9A2AF9455CDFEEA4B11DE2E79D068BFA803926B4005251B34F1C0815
A4CBE03FBD1BBCB635F6431A22DE78653B87B99537ECE16CA3693067300F0603551D
130101FF040530030101FF30250603551D11041E301C811A68656C7040637573746F
6D2D65722E6578616D706C652E636F6D300E0603551D0F0101FF040403020186301D
0603551D0E0416041492EA7640404A8FAB4F270BF3BC379D86CD7280F8300A06082A
8648CE3D0403020348003045022100D6D813B390BD3A7B4E85424BCB1ED933AD1E98
1F2817B59083DD6EC1C5E3FADF02202CEE4406192BC767E98D7CFAE044C6807481AD
8564A7D569DCA3D1CDF1E5E843', 11: "JADA123456789"}}

]]></sourcecode>
        <t>The largest element in the voucher is identified by key 8, which decodes to SID 2459 (pinned-domain-cert) based
on the delta encoding defined by <xref target="RFC9254"/>.
It contains the complete PKIX (DER-encoded X.509v3) certificate of the Registrar's domain CA. This certificate is
shown in <xref target="cose-example-domain-ca-cert"/>.</t>
      </section>
    </section>
    <section anchor="appendix-pledge-profiles">
      <name>Pledge Device Class Profiles</name>
      <t>cBRSKI allows implementers to select between various functional options for the Pledge,
yielding different code size footprints and different requirements on Pledge hardware.
Thus for each product type an optimal trade-off between functionality, development/maintenance cost and hardware cost can be made.</t>
      <t>This appendix illustrates different selection outcomes by means of defining different example "profiles" of constrained Pledges. In the following
subsections, these profiles are defined and a comparison is provided.</t>
      <section anchor="profile-min">
        <name>Minimal Pledge</name>
        <t>The Minimal Pledge profile (Min) aims to reduce code size and hardware cost to a minimum. This comes with some severe functional restrictions, in particular:</t>
        <ul spacing="normal">
          <li>
            <t>No support for EST re-enrollment: whenever this would be needed, a factory reset followed by a new onboarding process is required.</t>
          </li>
          <li>
            <t>No support for change of Registrar: for this case, a factory reset followed by a new onboarding process is required.</t>
          </li>
        </ul>
        <t>This profile would be appropriate for single-use devices which must be replaced rather than re-deployed.
That might  include medical devices, but also sensors used during construction, such as concrete temperature  sensors.</t>
      </section>
      <section anchor="profile-typ">
        <name>Typical Pledge</name>
        <t>The Typical Pledge profile (Typ) aims to support a typical cBRSKI feature set including EST re-enrollment support and Registrar changes.</t>
      </section>
      <section anchor="profile-full">
        <name>Full-featured Pledge</name>
        <t>The Full-featured Pledge profile (Full) illustrates a Pledge category that supports multiple onboarding methods, hardware real-time clock, BRSKI/EST resource discovery, and
CSR Attributes request/response. It also supports most of the optional features defined in this specification.</t>
      </section>
      <section anchor="comparison-chart-of-pledge-classes">
        <name>Comparison Chart of Pledge Classes</name>
        <t>The below table specifies the functions implemented in the three example Pledge classes Min (<xref target="profile-min"/>), Typ (<xref target="profile-typ"/>) and Full (<xref target="profile-full"/>).</t>
        <table anchor="comparison-pledge-classes-table">
          <name>Comparison Chart of Pledge Classes Min, Typ and Full</name>
          <thead>
            <tr>
              <th align="left">Functions Implemented</th>
              <th align="center">Min</th>
              <th align="center">Typ</th>
              <th align="center">Full</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <strong>General</strong></td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center"> </td>
            </tr>
            <tr>
              <td align="left">Support cBRSKI onboarding</td>
              <td align="center">Y</td>
              <td align="center">Y</td>
              <td align="center">Y</td>
            </tr>
            <tr>
              <td align="left">Support other onboarding method(s)</td>
              <td align="center">-</td>
              <td align="center">-</td>
              <td align="center">Y</td>
            </tr>
            <tr>
              <td align="left">Real-time clock and cert time checks</td>
              <td align="center">-</td>
              <td align="center">-</td>
              <td align="center">Y</td>
            </tr>
            <tr>
              <td align="left">
                <strong>cBRSKI</strong></td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center"> </td>
            </tr>
            <tr>
              <td align="left">CoAP discovery for <tt>rt=brski*</tt></td>
              <td align="center">-</td>
              <td align="center">-</td>
              <td align="center">Y</td>
            </tr>
            <tr>
              <td align="left">Support pinned Registrar public key (RPK)</td>
              <td align="center">Y</td>
              <td align="center">-</td>
              <td align="center">Y</td>
            </tr>
            <tr>
              <td align="left">Support pinned Registrar certificate</td>
              <td align="center">-</td>
              <td align="center">Y</td>
              <td align="center">Y</td>
            </tr>
            <tr>
              <td align="left">Support pinned Domain CA</td>
              <td align="center">-</td>
              <td align="center">Y</td>
              <td align="center">Y</td>
            </tr>
            <tr>
              <td align="left">
                <strong>EST-coaps</strong></td>
              <td align="center"> </td>
              <td align="center"> </td>
              <td align="center"> </td>
            </tr>
            <tr>
              <td align="left">Explicit TA database size (#certs)</td>
              <td align="center">0</td>
              <td align="center">3</td>
              <td align="center">8</td>
            </tr>
            <tr>
              <td align="left">CoAP discovery for <tt>rt=ace.est*</tt></td>
              <td align="center">-</td>
              <td align="center">-</td>
              <td align="center">Y</td>
            </tr>
            <tr>
              <td align="left">GET <tt>/att</tt> and response parsing</td>
              <td align="center">-</td>
              <td align="center">-</td>
              <td align="center">Y</td>
            </tr>
            <tr>
              <td align="left">GET <tt>/crts</tt> format 62 (multiple CA certs)</td>
              <td align="center">-</td>
              <td align="center">Y</td>
              <td align="center">Y</td>
            </tr>
            <tr>
              <td align="left">GET <tt>/crts</tt> format 281 (multiple CA certs)</td>
              <td align="center">-</td>
              <td align="center">-</td>
              <td align="center">Y</td>
            </tr>
            <tr>
              <td align="left">ETag handling support for GET <tt>/crts</tt></td>
              <td align="center">-</td>
              <td align="center">Y</td>
              <td align="center">Y</td>
            </tr>
            <tr>
              <td align="left">Re-enrollment supported</td>
              <td align="center">- (*)</td>
              <td align="center">Y</td>
              <td align="center">Y</td>
            </tr>
            <tr>
              <td align="left">
                <xref target="brski-est-extensions-pledge"/> optimized procedure</td>
              <td align="center">Y</td>
              <td align="center">Y</td>
              <td align="center">-</td>
            </tr>
            <tr>
              <td align="left">Pro-active re-enrollment at own initiative</td>
              <td align="center">-</td>
              <td align="center">-</td>
              <td align="center">Y</td>
            </tr>
            <tr>
              <td align="left">Periodic trust anchor retrieval GET <tt>/crts</tt></td>
              <td align="center">- (*)</td>
              <td align="center">Y</td>
              <td align="center">Y</td>
            </tr>
            <tr>
              <td align="left">Supports change of Registrar identity</td>
              <td align="center">- (*)</td>
              <td align="center">Y</td>
              <td align="center">Y</td>
            </tr>
          </tbody>
        </table>
        <t>Notes: (*) means only possible via a factory-reset followed by a new cBRSKI onboarding procedure.</t>
      </section>
    </section>
    <section anchor="pledge-discovery-on-registrar">
      <name>Pledge Discovery of Onboarding and Enrollment Options</name>
      <t>The discovery functionality described in this section is informative only:
it derives from the normative CoRE documents <xref target="RFC6690"/>, <xref target="RFC7252"/> and from <xref target="RFC9148"/>.
In typical cases, for a constrained Pledge that only supports a single onboarding and enrollment method, this functionality is not needed.</t>
      <t>Note that the full-featured Pledge class defined in <xref target="profile-full"/> does support CoAP discovery functionality.</t>
      <section anchor="pledge-discovery-query-for-all-cbrski-resources">
        <name>Pledge Discovery Query for All cBRSKI Resources</name>
        <t>A Pledge that wishes to discover the available cBRSKI onboarding options/formats can do a discovery
operation using CoAP discovery per <xref section="7" sectionFormat="of" target="RFC7252"/> and <xref section="4" sectionFormat="of" target="RFC6690"/>. It first sends a CoAP discovery query to the Registrar over the secured DTLS connection.
The Registrar then responds with a CoRE Link Format payload containing the requested resources, if any.</t>
        <t>For example, if the Registrar supports a cBRSKI base resource <tt>/b</tt> in addition to the longer <tt>/.well-known/brski</tt> base
resource, and supports only the voucher format <tt>application/voucher+cose</tt> (836), and status reporting in both
CBOR (60) and JSON (50) formats, a CoAP resource discovery request and response may look as follows:</t>
        <artwork><![CDATA[
  REQ: GET /.well-known/core?rt=brski*

  RES: 2.05 Content
    Content-Format: 40 (application/link-format)
    Payload:
      </b>;rt=brski,
      </b/rv>;rt=brski.rv;ct=836,
      </b/vs>;rt=brski.vs;ct="50 60",
      </b/es>;rt=brski.es;ct="50 60"
]]></artwork>
        <t>In this case, the Registrar returns only the shorter URI paths matching the query filter, which are located under the
<tt>/b</tt> base resource. The <tt>/.well-known/brski</tt> based URI paths are not returned, as these are assumed to be well-known
(i.e. mandatory to support for a Registrar that offers this functionality under <tt>/b</tt>.)</t>
        <t>The Registrar is however under no obligation to provide the shorter URLs under <tt>/b</tt>, and may respond to this query with
only the <tt>/.well-known/brski/\&lt;short-name\&gt;</tt> resources for the short names as defined in
<xref target="brski-est-short-uri-table"/>, if these resources are not hosted anywhere else. This case is shown in the below interaction:</t>
        <artwork><![CDATA[
  REQ: GET /.well-known/core?rt=brski*

  RES: 2.05 Content
    Content-Format: 40 (application/link-format)
    Payload:
      </.well-known/brski>;rt=brski,
      </.well-known/brski/rv>;rt=brski.rv;ct=836,
      </.well-known/brski/vs>;rt=brski.vs;ct="50 60",
      </.well-known/brski/es>;rt=brski.es;ct="50 60"
]]></artwork>
        <t>When responding to a discovery request for cBRSKI resources, the Registrar may return the full resource paths for all
 &lt;short-name&gt; resources and the content-formats supported by these resources (using ct attributes) as shown in the above examples.
This is useful when multiple content-formats are supported for a particular resource on the Registrar and the discovering Pledge also supports multiple.</t>
        <t>Registrars that have implemented any cBRSKI or EST-coaps URI paths outside of <tt>/.well-known</tt> must process a request on
the corresponding <tt>/.well-known/brski/\&lt;short-name\&gt;</tt> or <tt>/.well-known/est/\&lt;short-name\&gt;</tt> URI paths identically.
In particular, a Pledge may use the longer (well-known) and shorter URI paths in any combination.</t>
        <t>A Registrar may also be implemented without support for the (optional) CoAP discovery.
In that case, it may for example return a 4.04 Not Found as shown in the example below, in case the Registrar does not
host the resource <tt>/.well-known/core</tt> at all.
In such case, the Pledge cannot discover any onboarding/enrollment options and so it has to rely on the default cBRSKI
resources under <tt>/.well-known/brski/...</tt> and <tt>/.well-known/est/...</tt>.</t>
        <artwork><![CDATA[
  REQ: GET /.well-known/core?rt=brski*

  RES: 4.04 Not Found
]]></artwork>
      </section>
      <section anchor="pledge-discovery-query-for-the-cbrski-base-resource">
        <name>Pledge Discovery Query for the cBRSKI Base Resource</name>
        <t>In case the client queries for only <tt>rt=brski</tt> type resources, the Registrar responds with only the base path for the cBRSKI
resources (<tt>rt=brski</tt>, resource <tt>/b</tt> in earlier examples) and no others.
(So, the query is "<tt>rt=brski</tt>", without the wildcard character.)
This is shown in the below example.
The Pledge in this case requests only the cBRSKI base resource of type <tt>rt=brski</tt> to check if cBRSKI is supported by the
Registrar and if a shorter-length cBRSKI base resource path is supported or not.
In this case, the Pledge is not interested to check what voucher request formats, or status telemetry formats --
other than the mandatory default formats -- are supported.
The compact response below then shows that the Registrar indeed supports a cBRSKI resource at <tt>/b</tt>:</t>
        <artwork><![CDATA[
  REQ: GET /.well-known/core?rt=brski

  RES: 2.05 Content
    Content-Format: 40 (application/link-format)
    Payload:
      </b>;rt=brski
]]></artwork>
        <t>The Pledge can now start using any of the cBRSKI resources <tt>/b/\&lt;short-name\&gt;</tt> in a next CoAP request to the Registrar.
In above example, again the well-known resource present under <tt>/.well-known/brski</tt> is not returned because this is
assumed to be well-known to the Pledge and mandatory to support for a Registrar that offers this functionality under <tt>/b</tt>.</t>
        <t>As a follow-up example, the Pledge can now start the onboarding by sending its PVR:</t>
        <artwork><![CDATA[
  REQ: POST /b/rv
    Content-Format: 836 (application/voucher+cose)
    Accept: 836 (application/voucher+cose)
    Payload: <binary COSE-signed PVR>
]]></artwork>
      </section>
      <section anchor="usage-of-ct-attribute">
        <name>Usage of <tt>ct</tt> Attribute</name>
        <t>The return of multiple content-formats in the '<tt>ct</tt>' link format attribute by the Registrar allows the Pledge to choose the most appropriate one for a particular operation, and allows extension with new voucher formats.
Note that only content-format 836 (<tt>application/voucher+cose</tt>) is defined in this document for the voucher request resource (<tt>/rv</tt>), both as request payload and as response payload.
If the '<tt>ct</tt>' attribute is not indicated for the <tt>/rv</tt> resource in the CoRE Link Format description, this implies that at least format 836 is supported and maybe more.</t>
        <t>Note that this specification allows for <tt>application/voucher+cose</tt> payloads to be transmitted over HTTPS, as well as for
<tt>application/voucher-cms+json</tt> and other formats yet to be defined over CoAP.
The burden for this flexibility is placed upon the Registrar.
A Pledge on constrained hardware is expected to support a single format only.</t>
        <t>The Pledge needs to support one or more formats for the PVR and resulting voucher.
The MASA needs to support all formats that the associated Pledges use.</t>
        <t>In the below example, a Pledge queries specifically for the <tt>brski.rv</tt> resource type to learn what voucher formats are supported:</t>
        <artwork><![CDATA[
  REQ: GET /.well-known/core?rt=brski.rv

  RES: 2.05 Content
    Content-Format: 40 (application/link-format)
    Payload:
      </b/rv>;rt=brski.rv;ct="836 65123 65124"
]]></artwork>
        <t>The Registrar returns 3 supported voucher formats: 836, 65123, and 65124.
The first is the mandatory <tt>application/voucher+cose</tt>. The other two are numbers from the Experimental Use number range
of the CoAP Content-Formats sub-registry, which are used as mere examples. The Pledge can now make a selection between the supported formats.</t>
        <t>Note that if the Registrar only supports the default content-formats for each cBRSKI resource as specified by this document,
it may omit the ct attributes in the discovery query response.
For example as in the following interaction:</t>
        <artwork><![CDATA[
  REQ: GET /.well-known/core?rt=brski*

  RES: 2.05 Content
    Content-Format: 40 (application/link-format)
    Payload:
      </b>;rt=brski,
      </b/rv>;rt=brski.rv,
      </b/vs>;rt=brski.vs,
      </b/es>;rt=brski.es
]]></artwork>
      </section>
      <section anchor="est-coaps-resource-discovery">
        <name>EST-coaps Resource Discovery</name>
        <t>The Pledge can also use CoAP discovery to identify enrollment options, for example enrollment using EST-coaps or other methods.
The below example shows a Pledge that wants to identify EST-coaps enrollment options by sending a discovery query.
This is done either before or after the voucher has been validated.</t>
        <artwork><![CDATA[
  REQ: GET /.well-known/core?rt=ace.est*

  RES: 2.05 Content
    Content-Format: 40 (application/link-format)
    Payload:
      </e/crts>;rt=ace.est.crts;ct="62 281 287",
      </e/sen>;rt=ace.est.sen;ct="281 287",
      </e/sren>;rt=ace.est.sren;ct="281 287",
      </e/att>;rt=ace.est.att,
      </e/skg>;rt=ace.est.skg,
      </e/skc>;rt=ace.est.skc
]]></artwork>
        <t>The response from the Registrar indicates that EST-coaps enrollment (<tt>/sen</tt>) and re-enrollment (<tt>/sren</tt>) is supported,
with a choice of two content-formats for the response payload:
either a PKCS#7 container with a single LDevID certificate (<tt>application/pkcs7-mime;smime-type=certs-only</tt>, content-format 281)
which is the BRSKI <xref target="RFC8995"/> encoding, or just a single LDevID certificate (<tt>application/pkix-cert</tt>, content-format 287)
which is the default cBRSKI encoding.</t>
        <t>For the EST <tt>cacerts</tt> resource (<tt>/crts</tt>) there are three content-formats supported:
an <tt>application/multipart-core</tt> container (62) per <xref target="multipart-core"/>, a PKCS#7 container with all CA certificates (287),
or a single (most relevant) CA certificate (281).</t>
        <t>The Pledge can now send a CoAP request to one of the discovered resources, with the Accept Option to indicate
which return payload content-format the Pledge wants to receive.</t>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>We are very grateful to   <contact initials="J." surname="Schaad" fullname="Jim Schaad"/>
 for explaining COSE/CMS choices and for correcting early versions of the COSE_Sign1 objects.
</t>
      <t>
  <contact initials="M." surname="Veillette" fullname="Michel Veillette"/>
 did extensive work on _pyang_ to extend it to support the SID allocation process, and this document was among its first users.
</t>
      <t>
  <contact initials="R." surname="Housley" fullname="Russ Housley"/>
,   <contact initials="D." surname="Franke" fullname="Daniel Franke"/>
,   <contact initials="H." surname="Birkholtz" fullname="Henk Birkholtz"/>
,
  <contact initials="K." surname="Moriarty" fullname="Kathleen Moriarty"/>
,   <contact initials="X." surname="Liu" fullname="Xufeng Liu"/>

and   <contact initials="C." surname="Moberg" fullname="Karl Moberg"/>
 provided review feedback.
</t>
      <t>
The BRSKI design team has met on many Tuesdays and Thursdays for document review.
The team includes the authors and:   <contact initials="A." surname="Schellenbaum" fullname="Aurelio Schellenbaum"/>
,   <contact initials="D." surname="von Oheimb" fullname="David von Oheimb"/>
,   <contact initials="S." surname="Fries" fullname="Steffen Fries"/>
,   <contact initials="T." surname="Werner" fullname="Thomas Werner"/>
,   <contact initials="W." surname="Atwood" fullname="Bill Atwood"/>
 and   <contact initials="T." surname="Eckert" fullname="Toerless Eckert"/>
.
</t>
      <t>
  <contact initials="D." surname="Miller" fullname="Darrel Miller"/>
,   <contact initials="O." surname="Steele" fullname="Orie Steele"/>
 and   <contact initials="M." surname="Sporny" fullname="Manu Sporny"/>
 provided review feedback on the registration of the +cose structured syntax suffix.
</t>
      <t>
  <contact initials="C." surname="Bormann" fullname="Carsten Bormann"/>
 suggested the use of CBOR Web Token (CWT) claims in the voucher's COSE header.
</t>
    </section>
    <section numbered="false" anchor="changelog">
      <name>Changelog</name>
      <t>-30:
    Require Pledge's DTLS cert chain to be included in RVR '<tt>x5bag</tt>' (#343).
    Add support for CoAP Uri-Path-Abbrev Option (#336).
    Move 'idevid-issuer' clarification text to draft-8366bis.
    Update the duplicate serial number attack to focus only on the case where the attack could be successful (equal CAs).
    Update section references draft-ietf-anima-8366bis to latest version.
    Remove reference to the to-be-deprecated RFC 8366.
    Align terms and notation with draft-ietf-anima-8366bis.
    Editorial (wording) updates.</t>
      <t>-29:
    Clarify that each brski.jp link indicates a root resource (<tt>/</tt>) (#335).
    Clarify that Pledge uses IP link-local address of JP's discovery response, instead of the UTF-8 encoded IP address literal (#334).
    Add example of Join Proxy offering multiple Registrars (endpoints) (#333).
    Updated CoAP request/response formatting of examples.
    Updated acknowledgements (#331).
    Editorial updates.</t>
      <t>-28:
    Cleanup of normative/informative references, setting each to right category.
    Bugfix and clarification in text around EdDSA Curve selection.
    Added section on additional information in COSE header with '<tt>iat</tt>' CWT timestamp example.
    Updates to BRSKI Well-Known URIs registry, including a rename of the "URI" column (#326).
    Unify COSE header parameters terminology (#330).
    Text formatting and editorial updates.</t>
      <t>-27:
    Clarify x5bag for storing signing chain and Registrar removes unprotected x5bag/x5chain (#324, #323, #230).
    Clarify RPK use with "placeholder" certificate.
    Merged the very similar BRSKI-MASA security considerations sections (#312).
    Require CBOR format for Pledge's/EST-client's telemetry (#309, #317).
    Removed figure captions from code examples for consistency (#315).
    Add base resource type (<tt>rt</tt>) for "<tt>ace.est</tt>" and related terminology (#314).
    Update IEEE 802.1AR reference to 2018 version (#313).
    Editorial updates.</t>
      <t>-26:
    Updated I-D/RFC references to newer versions.
    Corrected "sub-registry" term to official "registry", in IANA section.
    Explicitly imported terminology from <xref target="RFC7252"/>.
    Corrected "router" term in Thread/MLE section, with clarifications, and <xref target="Thread"/> reference fix.
    Moved references between "Informative" and "Normative" based on what's required to implement all the optional features.
    Removal of some lingering legacy text.
    Editorial improvements, bugfixes and typo corrections.</t>
      <t>-25:
    Moved all software/library support info into Appendix A and added "open source" section;
    Removed use of formal Extends/Amends Update-tags (#303, #304);
    Moved Section 14 to Appendix E (#302);
    Editorial improvements.</t>
      <t>-24:
    Rephrased well-known URL requirement in 14.1 (#292, #293);
    Added paragraph on future certificate formats like C509 (#281, #294);
    Add formal specification for CoAP discovery of Join Proxy by Pledge, instead of only showing examples (#296, #300);
    Enable mDNS discovery of Join Proxy by Pledge (also in mesh networks) and list service name to use (#297, #299);
    Add requirement to support content-format 287 in <tt>/sen</tt> and <tt>/sren</tt> response (#295, #298).</t>
      <t>-23:
    Removed Update tag for RFC 8366 (#285, #288);
    Introduced cBRSKI acronym (#284, #286);
    Added Update tag for RFC 9148 (#283, #289);
    Keep CoAP discovery as only mechanism and refer to future discovery work (#279, #282, #290);
    Introduce formal CBOR diagnostics ellipsis elision syntax (#281, #287);
    Support for multi-tier CAs by introducing multipart-core <tt>/crts</tt> format (#275, #291);
    Terminology updated for consistency with RFC 8366-bis (#274, #280);
    Rename voucher media type to <tt>application/voucher+cose</tt> and register +cose SSS (#264, #277);
    Editorial changes including section restructuring.</t>
      <t>-22:
    Streamlined text to focus mostly on the default flow, with optional functions moved to their own sections (#269, #273);
    For DTLS 1.3 client, use the record_size_limit extensions RFC 8449 (#270);
    Editorial updates;
    Reference rfc6125bis updated to RFC 9525.</t>
      <t>-11 to -21:
    (For change details see GitHub issues https://github.com/anima-wg/constrained-voucher/issues , related Pull Requests and commits.)</t>
      <t>-10:
    Design considerations extended; Examples made consistent.</t>
      <t>-08:
    Examples for cose_sign1 are completed and improved.</t>
      <t>-06:
    New SID values assigned; regenerated examples.</t>
      <t>-04:
    voucher and request-voucher MUST be signed;
    examples for signed request are added in appendix;
    IANA SID registration is updated;
    SID values in examples are aligned;
    signed cms examples aligned with new SIDs.</t>
      <t>-03:
    Examples are inverted.</t>
      <t>-02:
    Example of requestvoucher with unsigned <tt>application/cbor</tt> is added;
    attributes of voucher "refined" to optional;
    CBOR serialization of vouchers improved;
    Discovery port numbers are specified.</t>
      <t>-01:
    <tt>application/json</tt> is optional, <tt>application/cbor</tt> is compulsory;
    Cms and cose mediatypes are introduced.</t>
      <t>-00:
    Initial version.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
