Here is my feedback / review of -06:

Thanks a lot for this work. Looks good. Now if we could just split up all the
hard work into simple small docs like this ;-))

Couple of hopefully easy to fix text nits. two simple process 'majors',
only maybe somewhat a point of discussion is to upgrade all refs from rfc8366 to
rfc8366bis - to make this JWS work immediately applicable to any extensions that
rfc8366 will bring.

Comments inline using output of idnits.

Cheers
    Toerless

---
idnits 2.17.1 

draft-ietf-anima-jws-voucher-06.txt:
-(579): Line appears to be too long, but this could be caused by non-ascii 
characters in UTF-8 encoding

  Checking boilerplate required by RFC 5378 and the IETF Trust (see
  https://trustee.ietf.org/license-info):
  ----------------------------------------------------------------------------

     No issues found here.

  Checking nits according to https://www.ietf.org/id-info/1id-guidelines.txt:
  ----------------------------------------------------------------------------

  == There is 1 instance of lines with non-ascii characters in the document.


  Checking nits according to https://www.ietf.org/id-info/checklist :
  ----------------------------------------------------------------------------

  ** The abstract seems to contain references ([RFC7515], [RFC8366]), which
     it shouldn't.  Please replace those with straight textual mentions of the
     documents in question.

  == The 'Updates: ' line in the draft header should list only the _numbers_
     of the RFCs which will be updated by this document (if approved); it
     should not include the word 'RFC' in the list.


  Miscellaneous warnings:
  ----------------------------------------------------------------------------

  -- The document date (22 February 2023) is 21 days in the past.  Is this
     intentional?


  Checking references for intended status: Proposed Standard
  ----------------------------------------------------------------------------

     (See RFCs 3967 and 4897 for information about using normative references
     to lower-maturity documents in RFCs)

  == Missing Reference: 'THIS RFC' is mentioned on line 265, but not defined

  == Missing Reference: 'RFCxxxx' is mentioned on line 291, but not defined

  == Missing Reference: 'THING' is mentioned on line 291, but not defined

  == Outdated reference: A later version (-08) exists of
     draft-ietf-anima-brski-prm-07

  == Outdated reference: A later version (-20) exists of
     draft-ietf-anima-constrained-voucher-19


     Summary: 1 error (**), 0 flaws (~~), 7 warnings (==), 1 comment (--).

     Run idnits with the --verbose option for more detailed information about
     the items above.

--------------------------------------------------------------------------------


2       anima Working Group                                            T. Werner
3       Internet-Draft                                                Siemens AG
4       Updates: RFC8366 (if approved)                             M. Richardson
5       Intended status: Standards Track                Sandelman Software Works
6       Expires: 26 August 2023                                 22 February 2023

8               JWS signed Voucher Artifacts for Bootstrapping Protocols
9                           draft-ietf-anima-jws-voucher-06

11      Abstract

13         [RFC8366] defines a digital artifact called voucher as a YANG-defined
14         JSON document that is signed using a Cryptographic Message Syntax
15         (CMS) structure.  This document introduces a variant of the voucher
16         artifact in which CMS is replaced by the JSON Object Signing and
17         Encryption (JOSE) mechanism described in [RFC7515] to support
18         deployments in which JOSE is preferred over CMS.

20         In addition to explaining how the format is created, the
21         "application/voucher-jws+json" media type is registered and examples
22         are provided.

nit: i think this second paragraph (20-22) is redundant here. Remove.

24      Status of This Memo

26         This Internet-Draft is submitted in full conformance with the
27         provisions of BCP 78 and BCP 79.

29         Internet-Drafts are working documents of the Internet Engineering
30         Task Force (IETF).  Note that other groups may also distribute
31         working documents as Internet-Drafts.  The list of current Internet-
32         Drafts is at https://datatracker.ietf.org/drafts/current/.

34         Internet-Drafts are draft documents valid for a maximum of six months
35         and may be updated, replaced, or obsoleted by other documents at any
36         time.  It is inappropriate to use Internet-Drafts as reference
37         material or to cite them other than as "work in progress."

39         This Internet-Draft will expire on 26 August 2023.

41      Copyright Notice

43         Copyright (c) 2023 IETF Trust and the persons identified as the
44         document authors.  All rights reserved.

46         This document is subject to BCP 78 and the IETF Trust's Legal
47         Provisions Relating to IETF Documents (https://trustee.ietf.org/
48         license-info) in effect on the date of publication of this document.
49         Please review these documents carefully, as they describe your rights
50         and restrictions with respect to this document.  Code Components
51         extracted from this document must include Revised BSD License text as
52         described in Section 4.e of the Trust Legal Provisions and are
53         provided without warranty as described in the Revised BSD License.

55      Table of Contents

57         1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
58         2.  Terminology . . . . . . . . . . . . . . . . . . . . . . . . .   3
59         3.  Voucher Artifact with JSON Web Signature  . . . . . . . . . .   3
60           3.1.  Voucher Representation in General JWS JSON Serialization
61                 Syntax  . . . . . . . . . . . . . . . . . . . . . . . . .   4
62           3.2.  JWS Payload of Voucher in General JWS JSON
63                 Serialization . . . . . . . . . . . . . . . . . . . . . .   4
64           3.3.  JWS Protected Header of Voucher in General JWS JSON
65                 Serialization . . . . . . . . . . . . . . . . . . . . . .   5
66         4.  Privacy Considerations  . . . . . . . . . . . . . . . . . . .   5
67         5.  Security Considerations . . . . . . . . . . . . . . . . . . .   6
68         6.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .   6
69           6.1.  Media-Type Registry . . . . . . . . . . . . . . . . . . .   6
70             6.1.1.  application/voucher-jws+json  . . . . . . . . . . . .   6
71         7.  Acknowledgments . . . . . . . . . . . . . . . . . . . . . . .   7
72         8.  Changelog [RFC Editor: please delete] . . . . . . . . . . . .   7
73         9.  Examples  . . . . . . . . . . . . . . . . . . . . . . . . . .   7
74           9.1.  Example Pledge Voucher Request - PVR (from Pledge to
75                 Registrar)  . . . . . . . . . . . . . . . . . . . . . . .   7
76           9.2.  Example Parboiled Registrar Voucher Request - RVR (from
77                 Registrar to MASA)  . . . . . . . . . . . . . . . . . . .   9
78           9.3.  Example Voucher Response (from MASA to Pledge, via
79                 Registrar)  . . . . . . . . . . . . . . . . . . . . . . .  11
80         10. References  . . . . . . . . . . . . . . . . . . . . . . . . .  12
81           10.1.  Normative References . . . . . . . . . . . . . . . . . .  12
82           10.2.  Informative References . . . . . . . . . . . . . . . . .  13
83         Contributors  . . . . . . . . . . . . . . . . . . . . . . . . . .  14
84         Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  15

86      1.  Introduction

88         "A Voucher Artifact for Bootstrapping Protocols" [RFC8366] defines a
89         YANG-based data structure used in "Bootstrapping Remote Secure Key
                                    ^
nit: Full stop, start new sentence: "It is ..".

Always good when coming from a german background to try to split sentences into
shorter ones or thinking about shorter sentences in english - and useful to do
re-reading acros any whole draft (not that i am the expert on this, i just
have been beaten over the head very often by reviewers for this).

90         Infrastructure" [BRSKI] and "Secure Zero Touch Provisioning" [SZTP]
91         to transfer ownership of a device from a manufacturer to a new owner
92         (site domain).  That document provides a serialization of the voucher
93         to JSON [RFC8259] with a signature according to the Cryptographic
94         Message Syntax (CMS) [RFC5652].  The resulting voucher artifact has
95         the media type "application/voucher-cms+json".

nit: I would move the sentence explaining where it's used to the end of the
paragraph as it interrupts the flow of explaining what it is..

97         [I-D.ietf-anima-constrained-voucher] provides a serialization of the
98         voucher to CBOR [RFC8949] with the signature format of COSE [RFC8812]
99         and the media type "application/voucher-cose+cbor".

nit: These reference will just be RFC numbers, one this draft turns RFC, so it
will be a lot harder to immediately guess that the reason for this draft is to
support constrained environments. Suggest you add a sentence or two to explain
the purpose of this work in this respect.

nit: Its also not clear why this is mentioned here. E.g.: whats the relevance
to this draft ? Add another sentence or two.

101        This document provides a serialization of the voucher to JSON
102        [RFC8259] with the signature in form of JSON Web Signature (JWS)
103        [RFC7515] and the media type "application/voucher-jws+json".  The
104        encoding specified in this document is used by
105        [I-D.ietf-anima-brski-prm] and may be more handy for use cases
106        requiring signed JSON objects.

nit: Up to this point, and with quick lookahead through the rest of the 
document,
i think it is missing a good hard justification for this work.

Is there a good/hard example for JWS to reduce the need for otherwise 
unnecessary
CMS libraries ? I am not sure about this given how i think we always need CMS
for parsing of certificates - which i think we can never avoid ? Aka: Whatver
the best explanation is of reduction in code in this respect might be one useful
justification.

JWS using the sameencoding mechanisms as the voucher, hence reducing the
number of encodings == "programming languages" that need to be understood/used
by developers and operators troubleshooting. I guess this true but needs to be
put into better sentence(s).

In general: whatever benefits of this mechanism are that could help other 
adopters of solution
pick this option over other BRSKI option.

108        This document does not extend the YANG definition of [RFC8366].

nit: s/extend/change/

110        With the availability of different encoded vouchers, 

nit: differently

110        it is up to an
111        industry specific application statement to indicate/decide which
112        voucher signature format is to be used.  There is no provision across
113        the different voucher signature formats that a receiver could safely
114        recognize which format it uses unless additional context is provided.
115        For example, [BRSKI] provides this context via the media type for the
116        voucher artifact.

nit: would suggest rewording 110-116 as follows:

applications that use voucher must either assume one specific voucher encoding
or indicate which voucher encoding is used through mechanism such as the
aforementioned media-types which are defined for all voucher encodings.

nit: i think "voucher and signature format" is better

116        This document utilizes the optional "typ" (Type)
117        Header Parameter of JWS [RFC7515] to provide information about the
118        signed object.

nit: I think this is "introduces", but not "utilizes". As in: code right now
could ignore this field, right ?

nit: Migh want to write a sentence avbout what the Type field offers as benefit.
I guess it does allow to distinguish different Types while still keeping the
same media-type, but that does not help much if the mechanism to request/reply
a particular voucher format can only negotiate based on media-type. In that 
case,
every different JWS voucher option we want to invent might need a separate
media-type.

120        This document should be considered an update to [RFC8366] in the
121        category of "See Also" as per [I-D.kuehlewind-update-tag].  TODO:
122        double check with RFC8366bis

major: I don't think this is an update to RFC8366 or RFC8366bis according to the
currently active semantic of update. This is because we are not changing any
encoding/extension point or the like of vouchers according to rfc8366. Instead
we are creating a derived "JWS Format Voucher Artefact". Maybe this is the 
wording
that cold be used in the initial explanation text. Something like

'rfc8366bis defines a "CMS Format Voucher Artefact" (RFC8366, Section 6.5). The
voucher is defined via YANG and CMS is the signature format. This document
defined a "JWS Format Voucher Artefact" using the voucher YANG definitions of
RFC866bis and replacing the CMS signature with a JWS signature.

Aka: Lets forget to even reference RFC8366 but only RFC8366. This allows us not
to have to explain how RFC8366bis is a superset/evolution of RFC8366 and how
even if we immediately only need RFC8366 YANG model for PRM, it of course is a 
lot
more flexible to specify applicability of the JWS signature for the whole 
RFC8366bis
superset of YANG options.

This is of course only best and true if there are not any incompatibilities 
between
JWS and any RFC8366bis YANG model details... But i couldn't think of what that 
could
be. Aka: should all be correct.

124     2.  Terminology

126        The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
127        "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
128        "OPTIONAL" in this document are to be interpreted as described in
129        BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
130        capitals, as shown here.

132     3.  Voucher Artifact with JSON Web Signature

134        [RFC7515] defines the following serializations for JWS:

136        1.  "JWS Compact Serialization" in Section 7.1 of [RFC7515]

138        2.  "JWS JSON Serialization" in Section 7.2 of [RFC7515] - "General
139            JWS JSON Serialization Syntax" in Section 7.2.1 of [RFC7515]
140            - "Flattened JWS JSON Serialization Syntax" in Section 7.2.2 of
141            [RFC7515]

143        This document makes use of the "General JWS JSON Serialization
144        Syntax" to support multiple signatures, as already supported by
145        [RFC8366] for CMS-signed vouchers.

nit: do you need 134-141 ? You could simple write in 144: 
  Syntax" according to Section 7.2.1 of [RFC7517], 

147        The [RFC8366] voucher data structure consists of a nested map, the
148        outer map of which is:

150            { "ietf-voucher:voucher" : { inner map }}

nit: All those things said with rfc8366 would be nice to upgrade to rfc8366 and 
check
if thats still all correct.  I think it is, but Michael would best have to ack.
 
152        This outer map is considered the JWS Payload as described in
153        Section 3 of [RFC7515].  A "JWS JSON Serialization Overview" is given
154        in Section 3.2 of [RFC7515] and more details on the JWS
155        serializations in Section 7 of [RFC7515].

157     3.1.  Voucher Representation in General JWS JSON Serialization Syntax

159        The following figure gives an overview of the Voucher representation

nit: how is this "gives an overview" ? Isn't this "specifies the Voucher 
representation in compliance with the "General JWS JSON Serialization Syntax"

aka: you are allocating/defining "ietf-voucher:voucher" here, so it is a 
specification... ?! (i think)

160        in "General JWS JSON Serialization Syntax":

162            {
163              "payload": "BASE64URL(ietf-voucher:voucher)",
164              "signatures": [
165                {
166                  "protected": "BASE64URL(UTF8(JWS Protected Header))",
167                  "signature": "base64encodedvalue=="

nit: i think you need to copy some notational text from rfc8366bis into some
earlier sections of this document to define the format BASE64URL and 
base64encodedvalue
before using them here.

168                }
169              ]
170            }

172                 Figure 1: Voucher Representation in General JWS JSON
173                                 Serialization Syntax

nit: I think this caption should be somthing like

       Voucher representation using the General JWS JSON Serialization in JSON 
Syntax

175     3.2.  JWS Payload of Voucher in General JWS JSON Serialization

177        The following figure depicts the decoded JWS Payload in JSON syntax:

nit: depicts an example of a decoded ??

179            {
180              "ietf-voucher:voucher": {
181                "assertion": "logged",
182                "serial-number": "0123456789",
183                "nonce": "5742698422680472",
184                "created-on": "2022-07-08T03:01:24.618Z",
185                "pinned-domain-cert": "base64encodedvalue=="
186              }
187            }

189                     Figure 2: Decoded JWS Payload in JSON Syntax

191     3.3.  JWS Protected Header of Voucher in General JWS JSON Serialization

193        The standard header parameters "typ" and "alg" as described in
194        [RFC7515] are utilized in the protected header.  The "alg" header
195        MUST contain the algorithm type used to create the signature, e.g.,
196        "ES256".  The "typ" header SHOULD contain the value "TODO: voucher-
197        jws+json", if present.

major: I don't think we should go with a "TODO" here past WGLC, please come up 
with a proposal.

199        If X.509 (PKIX) certificates [RFC5280] are used, then the "x5c"
200        parameter defined in Section 4.1.6 of [RFC7515] SHOULD be used to
201        contain the certificate and chain.  Vouchers will often need all
202        certificates in the chain, including what would be considered the
203        trust anchor certificate, because intermediate devices (such as the
204        Registrar) may need to audit the artifact, or end systems may need to
205        pin a trust anchor for future operations.  Note, a trust anchor
206        SHOULD be provided differently to be trusted.  This is consistent

nit: Sentence does not parse. "provided differently" - differently from what ?

207        with Section 5.5.2 of [BRSKI].

209        The following figure gives the decoded JWS Protected Header in JSON
210        syntax:

nit: is this example or specification ? Seems like we want to specify the 
"voucher-jws+json" field,
but not suer about "alg". Seems like an example ? Maybe split into a spec 
picture and an
example picture, even if they just differ by "alg".

212            {
213              "alg": "ES256",
214              "typ": "voucher-jws+json",
215              "x5c": [
216                "base64encodedvalue1==",
217                "base64encodedvalue2=="
218              ]
219            }

221                    Figure 3: JWS Protected Header in JSON Syntax

223     4.  Privacy Considerations

225        The Voucher Request reveals the IDevID of the component (Pledge) that

nit: s/The/A/

226        is in the process of bootstrapping.

228        This request occurs via HTTP-over-TLS, however, for the Pledge-to-
229        Registrar TLS connection, the Pledge is provisinally accepting the
                                                   ^^^^^^^^^^^^
230        Registrar server certificate.  Hence it is subject to disclosure by a
231        Dolev-Yao attacker (a "malicious messenger")[onpath], as explained in

nit: If you want to include such fancy name-calling for an attack, you should 
also
add a reference for it. 

nit: Please make this explanation conditional, e.g.:will reveal the IDevID... 
if a
signaling mechanism such as that of BRSKI is used.

Aka: Exposure is not a property of the voucher concept but of the signaling 
using to
retrieve a voucher-request.

232        Section 10.2 of [BRSKI].

234        The use of a JWS header brings no new privacy considerations.

nit: s/header/signature/

nit: ... compared to the use of CMS signaure.

236     5.  Security Considerations

238        The issues of how [RFC8366] vouchers are used in a [BRSKI] system is
239        addressed in Section 11 of [BRSKI].  This document does not change
240        any of those issues, it just changes the signature technology used
241        for voucher request and response artifacts.

243        Section 9 of [SZTP] deals with voucher use in Secure Zero Touch
244        Provisioning, for which this document also makes no changes to
245        security.

nit: add reference  to section in BRSKI-PRM which likely is most important 
because
that is where JWS voucher is actually planned to be used, and its security
considerations are somewhat different from BRSKI if i remember  correctly.

247     6.  IANA Considerations

249     6.1.  Media-Type Registry

251        This section registers the "application/voucher-jws+json" in the
252        "Media Types" registry.

254     6.1.1.  application/voucher-jws+json

I don't think you need to sub-section the request into 6.1.1, keep it in 6.1

But replace 251-252 with something like:

This document registers a new media type in the "Media Types"
registry [RFC6838].  IANA is asked to register the following:

256        Type name:  application
257        Subtype name:  voucher-jws+json
258        Required parameters:  none
259        Optional parameters:  none
260        Encoding considerations:  JWS+JSON vouchers are JOSE objects
261                                  signed with one or multiple signers.
262        Security considerations:  See section [Security Considerations]
263        Interoperability considerations:  The format is designed to be
264          broadly interoperable.
265        Published specification:  [THIS RFC].
266        Applications that use this media type:  ANIMA, 6tisch, and other
267          zero-touch bootstrapping/provisioning solutions
268        Additional information:
269          Magic number(s):  None
270          File extension(s):  .vjj
271          Macintosh file type code(s):  none
272        Person & email address to contact for further information:  IETF
273          ANIMA WG
274        Intended usage:  LIMITED
275        Restrictions on usage:  NONE
276        Author:  ANIMA WG
277        Change controller:  IETF
278        Provisional registration? (standards tree only):  NO

280     7.  Acknowledgments

282        We would like to thank the various reviewers for their input, in
283        particular Steffen Fries, Ingo Wenda, ...TODO Support in PoC
284        implementations Hong Rui Li and He Peng Jia, ...TODO

nit: Remove TODO. Once you get additional reviews, e.g.: IESG, AD and the like,
i have started to put in parenthesis the role from which the review was done
No need to include names of foks you've listed below as contributors (e.g.: 
Steffen, myself)

286        [RFC Editor: please delete] TODO: ...

288     8.  Changelog [RFC Editor: please delete]

290        *  Added adoption call comments from Toerless.  Changed from
291           [RFCxxxx] to [THING] style for some key references.

293        *  Updated references "I-D.ietf-anima-brski-async-enroll" switched to
294           "I-D.ietf-anima-brski-prm"

296        *  Switch from "JWS Compact Serialization" to "General JWS JSON
297           Serialization", as focus is now on "General JWS JSON
298           Serialization"

300        *  Include Voucher representation in "General JWS JSON Serialization"
301           syntax

303        *  Include examples A1, A2, A3 using "General JWS JSON Serialization"

305        *  Added optional "typ": "voucher-jws+json" header parameter to JWS
306           objects

308        *  Examples folded according to RFC8792, Single Backslash rule

310        *  Restructuring and clean-up, preparation for WGLC

312        *  Included feedback from shepherd review

314        -- back

316     9.  Examples

318        These examples are folded according to [RFC8792] Single Backslash
319        rule.

321     9.1.  Example Pledge Voucher Request - PVR (from Pledge to Registrar)

323        The following is an example request sent from a Pledge to the
324        Registrar, in "General JWS JSON Serialization".

326        =============== NOTE: '\' line wrapping per RFC 8792 ================

328        {
329          "payload": "eyJpZXRmLXZvdWNoZXItcmVxdWVzdDp2b3VjaGVyIjp7InNlcmlhbC\
330        1udW1iZXIiOiIwMTIzNDU2Nzg5Iiwibm9uY2UiOiI2R3RuK1pRS04ySHFERlZrQkV4Wk\
331        xRPT0iLCJjcmVhdGVkLW9uIjoiMjAyMi0wNy0wOFQwODo0MDo0Mi44MjBaIiwicHJveG\
332        ltaXR5LXJlZ2lzdHJhci1jZXJ0IjoiTUlJQjRqQ0NBWWlnQXdJQkFnSUdBWFk3MmJiWk\
333        1Bb0dDQ3FHU000OUJBTUNNRFV4RXpBUkJnTlZCQW9NQ2sxNVFuVnphVzVsYzNNeERUQU\
334        xCZ05WQkFjTUJGTnBkR1V4RHpBTkJnTlZCQU1NQmxSbGMzUkRRVEFlRncweU1ERXlNRG\
335        N3TmpFNE1USmFGdzB6TURFeU1EY3dOakU0TVRKYU1ENHhFekFSQmdOVkJBb01DazE1UW\
336        5WemFXNWxjM014RFRBTEJnTlZCQWNNQkZOcGRHVXhHREFXQmdOVkJBTU1EMFJ2YldGcG\
337        JsSmxaMmx6ZEhKaGNqQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDlBd0VIQTBJQUJCaz\
338        E2Sy9pNzlvUmtLNVliZVBnOFVTUjgvdXMxZFBVaVpITXRva1NkcUtXNWZuV3NCZCtxUk\
339        w3V1JmZmVXa3lnZWJvSmZJbGx1cmNpMjV3bmhpT1ZDR2plekI1TUIwR0ExVWRKUVFXTU\
340        JRR0NDc0dBUVVGQndNQkJnZ3JCZ0VGQlFjREhEQU9CZ05WSFE4QkFmOEVCQU1DQjRBd1\
341        NBWURWUjBSQkVFd1A0SWRjbVZuYVhOMGNtRnlMWFJsYzNRdWMybGxiV1Z1Y3kxaWRDNX\
342        VaWFNDSG5KbFoybHpkSEpoY2kxMFpYTjBOaTV6YVdWdFpXNXpMV0owTG01bGREQUtCZ2\
343        dxaGtqT1BRUURBZ05JQURCRkFpQnhsZEJoWnEwRXY1SkwyUHJXQ3R5UzZoRFlXMXlDTy\
344        9SYXVicEM3TWFJRGdJaEFMU0piZ0xuZ2hiYkFnMGRjV0ZVVm8vZ0dOMC9qd3pKWjBTbD\
345        JoNHhJWGsxIn19",
346          "signatures": [{
347            "protected": "eyJ4NWMiOlsiTUlJQitUQ0NBYUNnQXdJQkFnSUdBWG5WanNVNU\
348        1Bb0dDQ3FHU000OUJBTUNNRDB4Q3pBSkJnTlZCQVlUQWtGUk1SVXdFd1lEVlFRS0RBeE\
349        thVzVuU21sdVowTnZjbkF4RnpBVkJnTlZCQU1NRGtwcGJtZEthVzVuVkdWemRFTkJNQ0\
350        FYRFRJeE1EWXdOREExTkRZeE5Gb1lEems1T1RreE1qTXhNak0xT1RVNVdqQlNNUXN3Q1\
351        FZRFZRUUdFd0pCVVRFVk1CTUdBMVVFQ2d3TVNtbHVaMHBwYm1kRGIzSndNUk13RVFZRF\
352        ZRUUZFd293TVRJek5EVTJOemc1TVJjd0ZRWURWUVFEREE1S2FXNW5TbWx1WjBSbGRtbG\
353        paVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUFCQzc5bGlhUmNCalpjRU\
354        VYdzdyVWVhdnRHSkF1SDRwazRJNDJ2YUJNc1UxMWlMRENDTGtWaHRVVjIxbXZhS0N2TX\
355        gyWStTTWdROGZmd0wyM3ozVElWQldqZFRCek1Dc0dDQ3NHQVFVRkJ3RWdCQjhXSFcxaG\
356        MyRXRkR1Z6ZEM1emFXVnRaVzV6TFdKMExtNWxkRG81TkRRek1COEdBMVVkSXdRWU1CYU\
357        FGRlFMak56UFwvU1wva291alF3amc1RTVmdndjWWJNQk1HQTFVZEpRUU1NQW9HQ0NzR0\
358        FRVUZCd01DTUE0R0ExVWREd0VCXC93UUVBd0lIZ0RBS0JnZ3Foa2pPUFFRREFnTkhBRE\
359        JFQWlCdTN3UkJMc0pNUDVzTTA3MEgrVUZyeU5VNmdLekxPUmNGeVJST2xxcUhpZ0lnWE\
360        NtSkxUekVsdkQycG9LNmR4NmwxXC91eW1UbmJRRERmSmxhdHVYMlJvT0U9Il0sInR5cC\
361        I6InZvdWNoZXItandzK2pzb24iLCJhbGciOiJFUzI1NiJ9",
362            "signature": "abVg4TDGzSTjVHkQlNeIW3ABu5ZXdMl1cEqwcIAlHFW4BrlGbO\
363        -DRTKfyCOGxSW49-ktJcrVlYgKqC4xmZoy0Q"
364          }]
365        }

367                    Figure 4: Example Pledge Voucher Request - PVR

369     9.2.  Example Parboiled Registrar Voucher Request - RVR (from Registrar
370           to MASA)

372        The term parboiled refers to food which is partially cooked.  In
373        [BRSKI], the term refers to a Pledge voucher-request (PVR) which has
374        been received by the Registrar, and then has been processed by the
375        Registrar ("cooked"), and is now being forwarded to the MASA.

377        The following is an example Registrar voucher-request (RVR) sent from
378        the Registrar to the MASA, in "General JWS JSON Serialization".  Note
379        that the previous PVR can be seen in the payload as "prior-signed-
380        voucher-request".

382        =============== NOTE: '\' line wrapping per RFC 8792 ================

384        {
385          "payload": "eyJpZXRmLXZvdWNoZXItcmVxdWVzdDp2b3VjaGVyIjp7InNlcmlhbC\
386        1udW1iZXIiOiIwMTIzNDU2Nzg5IiwiaWRldmlkLWlzc3VlciI6IkJCZ3dGb0FVVkF1TT\
387        NNLzlMK1NpNk5EQ09Ea1RsKy9CeGhzPSIsIm5vbmNlIjoiNkd0bitaUUtOMkhxREZWa0\
388        JFeFpMUT09IiwicHJpb3Itc2lnbmVkLXZvdWNoZXItcmVxdWVzdCI6ImV5SndZWGxzYj\
389        JGa0lqb2laWGxLY0ZwWVVtMU1XRnAyWkZkT2IxcFlTWFJqYlZaNFpGZFdlbVJFY0RKaU\
390        0xWnFZVWRXZVVscWNEZEpiazVzWTIxc2FHSkRNWFZrVnpGcFdsaEphVTlwU1hkTlZFbD\
391        ZUa1JWTWs1Nlp6VkphWGRwWW0wNWRWa3lWV2xQYVVreVVqTlNkVXN4Y0ZKVE1EUjVVMG\
392        hHUlZKc1duSlJhMVkwVjJ0NFVsQlVNR2xNUTBwcVkyMVdhR1JIVm10TVZ6bDFTV3B2YV\
393        UxcVFYbE5hVEIzVG5rd2QwOUdVWGRQUkc4d1RVUnZNRTFwTkRSTmFrSmhTV2wzYVdOSV\
394        NuWmxSMngwWVZoU05VeFlTbXhhTW14NlpFaEthR05wTVdwYVdFb3dTV3B2YVZSVmJFcF\
395        JhbEp4VVRCT1FsZFhiRzVSV0dSS1VXdEdibE5WWkVKWFJtc3pUVzFLYVZkck1VSmlNR1\
396        JFVVROR1NGVXdNREJQVlVwQ1ZGVk9UbEpHVmpSU1dIQkNWV3RLYmxSc1drTlJWemxPVV\
397        RKemVFNVdSblZXYm5Cb1ZucFdjMWw2VGs1bFJWSlZVVlY0UTFvd05WZFJhMFpxVkZWS1\
398        IxUnVRbXRTTVZZMFVraHdRbFJyU201VWJGcERVVlV4VGxGdGVGTmlSMDE2Vld0U1VsWk\
399        ZSbXhTYm1OM1pWVXhSVkpZYkU1U1IwNHpWRzF3Ums1Rk1WVlRiVVpIWkhwQ05sUlZVa1\
400        psVlRGRldUTmtUMkZyVlRCVVZsSkxXVlV4UlU1SWFFWmxhMFpUVVcxa1QxWnJTa0ppTU\
401        RGRVlYcEZNVlZYTlZkbGJVWllUbGQ0YWswd01UUlNSbEpDVkVWS2JsUnNXa05SVjA1T1\
402        VXdGFUMk5IVWtoV1dHaElVa1ZHV0ZGdFpFOVdhMHBDVkZVeFJVMUdTakpaYkdSSFkwZE\
403        tjMU50ZUdGTmJYZzJXa1ZvUzJGSFRuRlJiSEJPVVdzeFNGRnViSGhTTVU1T1RrUnNRbG\
404        93VmtoUk1FNTRVakZPVGs1RWJFSmtNRlpKVVZSQ1NsRlZTa05oZWtVeVUzazVjRTU2Yk\
405        haVmJYUk1UbFpzYVZwV1FtNVBSbFpVVldwbmRtUllUWGhhUmtKV1lWWndTVlJZVW5aaE\
406        1VNXJZMVYwV0U1WFduVldNMDVEV2tOMGVGVnJkek5XTVVwdFdtMVdXR0V6Ykc1YVYwcD\
407        JVMjFhU21KSGVERmpiVTV3VFdwV00ySnRhSEJVTVZwRVVqSndiR1ZyU1RGVVZVbDNVak\
408        JGZUZaWFVrdFZWa1pZVkZWS1VsSXdUa1JqTUdSQ1ZWWldSMUZ1WkU1UmEwcHVXak5LUT\
409        Fvd1ZrZFJiRVpxVWtWb1JWRlZPVU5hTURWWFUwWkZORkZyUm0xUFJWWkRVVlV4UkZGcV\
410        VrSmtNVTVDVjFWU1YxVnFRbE5SYTFaR1pERkJNRk5YVW1waVZscDFXVlpvVDAxSFRuUl\
411        NibXhOVjBaS2MxbDZUbEprVjAxNVlrZDRhVll4V2pGWk0ydDRZVmRTUkU1WVZtRlhSaz\
412        VFVTBjMVMySkdiM2xpU0hCclUwVndiMWt5YTNoTlJuQlpWR3BDVDJGVVZqWlpWbVJYWk\
413        Vad1dFNVljRTFXTUc5M1ZFY3dNV0pIVWtWUlZYUkRXakprZUdGSGRIRlVNVUpTVlZWU1\
414        Fsb3dOVXBSVlZKRFVtdEdjRkZ1YUhOYVJVcHZWMjVGZDFKWVdURlRhM2Q1VlVoS1dGRX\
415        pValZWZWxwdlVrWnNXRTFZYkVSVWVUbFRXVmhXYVdORlRUTlVWMFpLVWtka1NtRkZSaz\
416        FWTUhCcFdqQjRkVm95YUdsWmEwWnVUVWRTYWxZd1dsWldiVGgyV2pCa1QwMURPWEZrTT\
417        NCTFYycENWR0pFU205T1NHaEtWMGR6ZUVsdU1Ua2lMQ0p6YVdkdVlYUjFjbVZ6SWpwYm\
418        V5SndjbTkwWldOMFpXUWlPaUpsZVVvMFRsZE5hVTlzYzJsVVZXeEtVV2wwVlZFd1RrSl\
419        pWVTV1VVZoa1NsRnJSbTVUVldSQ1YwYzFWMkZ1VGxaT1ZURkNZakJrUkZFelJraFZNRE\
420        F3VDFWS1FsUlZUazVTUkVJMFVUTndRbE5yU201VWJGcERVVlpzVlZGWGRFZFZhekZUVm\
421        xoa1JtUXhiRVZXYkVaU1V6QlNRbVZGZEdoV2VsWjFWVEl4YzJSV2IzZFVibHBxWW10R0\
422        5GSnVjRUpXYTBwdVZHeGFRMUZWTVU1U1IzUjNZMGRLZEZwRmRHaFdlbFoxVm10a1YyVn\
423        RVa1pVYTBwT1VUQkdXVkpHVWtwbFJURkZWMWhrVDFKRlJYaFVhMUphWlVVMVIySXhiRV\
424        ZsYlhNeFZERlNjbVZGTVhGVVdHaE9ZV3N3ZUZReFVsWk9WbVJ4VVd4T1RsVllUak5STV\
425        VaYVVrWmFVbFZWWkVaa01IQkRWbFpTUmxack1VTlVWV1JDVFZaV1JsRXlaRE5VVms1MF\
426        lraFdZVTFJUW5kWmJURnJVa2RKZWxOdVpFNVZhekV6VWxaR1dsSkdXbEpWVlZwR1pEST\
427        VNMVJXVWtwbGF6VkZWbFJLVDJWdFl6RlVWa3BxWkRCYVVsZFZVbGRWVmtaRlVrVkZNVk\
428        15UmxoT1Z6VlVZbGQ0TVZkcVFsTmlSMUowWWtkd1lWWkZTbUZVVlVwT1VqQktOV05WWk\
429        ZSVVZGRTFVVmRrUmxJd1RrUmpWV1JVVkZSUk5WRllaRVpUUlVWM1UxVkdRMUY2WXpWaV\
430        IyeG9WVzFPUTJGc2NHcFNWVlpaWkhwa2VWWlhWbWhrYmxKSVUydEdNVk5FVW5kaGVsSk\
431        tUa1JLTWxsVlNrNWpNVlY0VFZkc1RWSkZUa1JVUjNSWFlVaFNWbFpxU1hoaVdGcG9Vek\
432        JPTWxSWVozbFhVM1JVVkZka1VrOUhXbTFrTUhkNVRUTnZlbFpGYkZkUmJHUnhXa1pTUT\
433        JWck1VUmpNR1JFVVROT1NGRldSbFpTYTBvelVsZGtRMUZxYUZoVFJtTjRZVWROZVZKWV\
434        VtdFNNVm8yV2tWTk1XVnRSbGhXYmxKaFZucFdObFJHWkV0TlJYaDBUbGQ0YTFKSE9ERl\
435        VhMUpTWldzeFEwOUZaRUpOVmxaclUxaGtVbGRWTVVOWlZVWkhVbXhHVFdGck5UWlZSbm\
436        QyVlRGM2RtRXlPVEZoYkVZellXMWpNVkpVVm0xa2JtUnFWMWRLVGxGck1VaFJWRVpXV2\
437        tWd1VsVlZNVTVSVnpsSVVUQk9lbEl3UmxKV1ZWcERaREF4UkZSVlJUQlNNRVY0VmxkU1\
438        JXUXdWa05ZUXprelZWVldRbVF3YkVsYU1GSkNVekJLYmxvelJtOWhNbkJRVlVaR1VsSk\
439        ZSbTVVYTJoQ1VrVktSbEZYYkVOa1ZFNHpWV3RLVFdNd2NFNVZSRlo2VkZSQk0wMUZaM0\
440        pXVlZwNVpWVTFWazV0WkV4bGEzaFFWVzFPUjJWV1NsTlVNbmg0WTFWb2NGb3diRzVYUl\
441        U1MFUydDRWV1ZyVm5Oa2ExRjVZMGM1VEU1dFVqUk9iWGQ0V0VNNU1XVlhNVlZpYlVwU1\
442        VrVlNiVk50ZUdoa1NGWlpUV3hLZGxRd1ZUbEpiREJ6U1c1U05XTkRTVFpKYmxwMlpGZE\
443        9iMXBZU1hSaGJtUjZTekp3ZW1JeU5HbE1RMHBvWWtkamFVOXBTa1pWZWtreFRtbEtPU0\
444        lzSW5OcFoyNWhkSFZ5WlNJNkltRmlWbWMwVkVSSGVsTlVhbFpJYTFGc1RtVkpWek5CUW\
445        5VMVdsaGtUV3d4WTBWeGQyTkpRV3hJUmxjMFFuSnNSMkpQTFVSU1ZFdG1lVU5QUjNoVF\
446        Z6UTVMV3QwU21OeVZteFpaMHR4UXpSNGJWcHZlVEJSSW4xZGZRPT0iLCJjcmVhdGVkLW\
447        9uIjoiMjAyMi0wNy0wOFQwODo0MDo0Mi44NDhaIn19",
448          "signatures": [{
449            "protected": "eyJ4NWMiOlsiTUlJQm96Q0NBVXFnQXdJQkFnSUdBVzBlTHVJRk\
450        1Bb0dDQ3FHU000OUJBTUNNRFV4RXpBUkJnTlZCQW9NQ2sxNVFuVnphVzVsYzNNeERUQU\
451        xCZ05WQkFjTUJGTnBkR1V4RHpBTkJnTlZCQU1NQmxSbGMzUkRRVEFlRncweE9UQTVNVE\
452        V3TWpNM016SmFGdzB5T1RBNU1URXdNak0zTXpKYU1GUXhFekFSQmdOVkJBb01DazE1UW\
453        5WemFXNWxjM014RFRBTEJnTlZCQWNNQkZOcGRHVXhMakFzQmdOVkJBTU1KVkpsWjJsem\
454        RISmhjaUJXYjNWamFHVnlJRkpsY1hWbGMzUWdVMmxuYm1sdVp5QkxaWGt3V1RBVEJnY3\
455        Foa2pPUFFJQkJnZ3Foa2pPUFFNQkJ3TkNBQVQ2eFZ2QXZxVHoxWlVpdU5XaFhwUXNrYV\
456        B5N0FISFFMd1hpSjBpRUx0NnVOUGFuQU4wUW5XTVlPXC8wQ0RFaklrQlFvYnc4WUtxan\
457        R4SkhWU0dUajlLT295Y3dKVEFUQmdOVkhTVUVEREFLQmdnckJnRUZCUWNESERBT0JnTl\
458        ZIUThCQWY4RUJBTUNCNEF3Q2dZSUtvWkl6ajBFQXdJRFJ3QXdSQUlnWXIyTGZxb2FDS0\
459        RGNFJBY01tSmkrTkNacWRTaXVWdWdJU0E3T2hLUnEzWUNJRHhuUE1NbnBYQU1UclBKdV\
460        BXeWNlRVIxMVB4SE9uKzBDcFNIaTJxZ3BXWCIsIk1JSUJwRENDQVVtZ0F3SUJBZ0lHQV\
461        cwZUx1SCtNQW9HQ0NxR1NNNDlCQU1DTURVeEV6QVJCZ05WQkFvTUNrMTVRblZ6YVc1bG\
462        MzTXhEVEFMQmdOVkJBY01CRk5wZEdVeER6QU5CZ05WQkFNTUJsUmxjM1JEUVRBZUZ3MH\
463        hPVEE1TVRFd01qTTNNekphRncweU9UQTVNVEV3TWpNM016SmFNRFV4RXpBUkJnTlZCQW\
464        9NQ2sxNVFuVnphVzVsYzNNeERUQUxCZ05WQkFjTUJGTnBkR1V4RHpBTkJnTlZCQU1NQm\
465        xSbGMzUkRRVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUFCT2t2a1RIdT\
466        hRbFQzRkhKMVVhSTcrV3NIT2IwVVMzU0FMdEc1d3VLUURqaWV4MDZcL1NjWTVQSmlidm\
467        dIVEIrRlwvUVRqZ2VsSEd5MVlLcHdjTk1jc1N5YWpSVEJETUJJR0ExVWRFd0VCXC93UU\
468        lNQVlCQWY4Q0FRRXdEZ1lEVlIwUEFRSFwvQkFRREFnSUVNQjBHQTFVZERnUVdCQlRvWk\
469        lNelFkc0RcL2pcLytnWFwvN2NCSnVjSFwvWG1qQUtCZ2dxaGtqT1BRUURBZ05KQURCR0\
470        FpRUF0eFEzK0lMR0JQSXRTaDRiOVdYaFhOdWhxU1A2SCtiXC9MQ1wvZlZZRGpRNm9DSV\
471        FERzJ1UkNIbFZxM3loQjU4VFhNVWJ6SDgrT2xoV1V2T2xSRDNWRXFEZGNRdz09Il0sIn\
472        R5cCI6InZvdWNoZXItandzK2pzb24iLCJhbGciOiJFUzI1NiJ9",
473            "signature": "0fzuqVdyhemWsu_HQeF-CmQwJeLp9IStNf-bWZwz6SojrEOR4a\
474        Dq6VStyG8eWXjGHNZiRyyLJo7RP1rKatuS2w"
475          }]
476        }

478             Figure 5: Example Parboiled Registrar Voucher Request - RVR

480     9.3.  Example Voucher Response (from MASA to Pledge, via Registrar)

482        The following is an example voucher response from MASA to Pledge via
483        Registrar, in "General JWS JSON Serialization".

485        =============== NOTE: '\' line wrapping per RFC 8792 ================

487        {
488          "payload": "eyJpZXRmLXZvdWNoZXI6dm91Y2hlciI6eyJhc3NlcnRpb24iOiJsb2\
489        dnZWQiLCJzZXJpYWwtbnVtYmVyIjoiMDEyMzQ1Njc4OSIsIm5vbmNlIjoiZGRoSGQ4Ml\
490        FpUGtzMDBTck1USTlEUT09IiwiY3JlYXRlZC1vbiI6IjIwMjItMDctMDdUMTc6NDc6MD\
491        EuODkwWiIsInBpbm5lZC1kb21haW4tY2VydCI6Ik1JSUJwRENDQVVtZ0F3SUJBZ0lHQV\
492        cwZUx1SCtNQW9HQ0NxR1NNNDlCQU1DTURVeEV6QVJCZ05WQkFvTUNrMTVRblZ6YVc1bG\
493        MzTXhEVEFMQmdOVkJBY01CRk5wZEdVeER6QU5CZ05WQkFNTUJsUmxjM1JEUVRBZUZ3MH\
494        hPVEE1TVRFd01qTTNNekphRncweU9UQTVNVEV3TWpNM016SmFNRFV4RXpBUkJnTlZCQW\
495        9NQ2sxNVFuVnphVzVsYzNNeERUQUxCZ05WQkFjTUJGTnBkR1V4RHpBTkJnTlZCQU1NQm\
496        xSbGMzUkRRVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUFCT2t2a1RIdT\
497        hRbFQzRkhKMVVhSTcrV3NIT2IwVVMzU0FMdEc1d3VLUURqaWV4MDYvU2NZNVBKaWJ2Z0\
498        hUQitGL1FUamdlbEhHeTFZS3B3Y05NY3NTeWFqUlRCRE1CSUdBMVVkRXdFQi93UUlNQV\
499        lCQWY4Q0FRRXdEZ1lEVlIwUEFRSC9CQVFEQWdJRU1CMEdBMVVkRGdRV0JCVG9aSU16UW\
500        RzRC9qLytnWC83Y0JKdWNIL1htakFLQmdncWhrak9QUVFEQWdOSkFEQkdBaUVBdHhRMy\
501        tJTEdCUEl0U2g0YjlXWGhYTnVocVNQNkgrYi9MQy9mVllEalE2b0NJUURHMnVSQ0hsVn\
502        EzeWhCNThUWE1VYnpIOCtPbGhXVXZPbFJEM1ZFcURkY1F3PT0ifX0",
503          "signatures": [{
504            "protected": "eyJ4NWMiOlsiTUlJQmt6Q0NBVGlnQXdJQkFnSUdBV0ZCakNrWU\
505        1Bb0dDQ3FHU000OUJBTUNNRDB4Q3pBSkJnTlZCQVlUQWtGUk1SVXdFd1lEVlFRS0RBeE\
506        thVzVuU21sdVowTnZjbkF4RnpBVkJnTlZCQU1NRGtwcGJtZEthVzVuVkdWemRFTkJNQj\
507        RYRFRFNE1ERXlPVEV3TlRJME1Gb1hEVEk0TURFeU9URXdOVEkwTUZvd1R6RUxNQWtHQT\
508        FVRUJoTUNRVkV4RlRBVEJnTlZCQW9NREVwcGJtZEthVzVuUTI5eWNERXBNQ2NHQTFVRU\
509        F3d2dTbWx1WjBwcGJtZERiM0p3SUZadmRXTm9aWElnVTJsbmJtbHVaeUJMWlhrd1dUQV\
510        RCZ2NxaGtqT1BRSUJCZ2dxaGtqT1BRTUJCd05DQUFTQzZiZUxBbWVxMVZ3NmlRclJzOF\
511        IwWlcrNGIxR1d5ZG1XczJHQU1GV3diaXRmMm5JWEgzT3FIS1Z1OHMyUnZpQkdOaXZPS0\
512        dCSEh0QmRpRkVaWnZiN294SXdFREFPQmdOVkhROEJBZjhFQkFNQ0I0QXdDZ1lJS29aSX\
513        pqMEVBd0lEU1FBd1JnSWhBSTRQWWJ4dHNzSFAyVkh4XC90elVvUVwvU3N5ZEwzMERRSU\
514        5FdGNOOW1DVFhQQWlFQXZJYjNvK0ZPM0JUbmNMRnNhSlpSQWtkN3pPdXNuXC9cL1pLT2\
515        FFS2JzVkRpVT0iXSwidHlwIjoidm91Y2hlci1qd3MranNvbiIsImFsZyI6IkVTMjU2In\
516        0",
517            "signature": "y1HLYBFlwouf42XWSKUWjeYQHnG2Q6A4bjA7hvTkB3z1dPwTUl\
518        jPHtuN2Qex6gDxTfaSiKeoXGsOD4JWOgQJPg"
519          }]
520        }

522                          Figure 6: Example Voucher Response

524     10.  References

526     10.1.  Normative References

528        [BRSKI]    Pritikin, M., Richardson, M., Eckert, T., Behringer, M.,
529                   and K. Watsen, "Bootstrapping Remote Secure Key
530                   Infrastructure (BRSKI)", RFC 8995, DOI 10.17487/RFC8995,
531                   May 2021, <https://www.rfc-editor.org/rfc/rfc8995>.

533        [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
534                   Requirement Levels", BCP 14, RFC 2119,
535                   DOI 10.17487/RFC2119, March 1997,
536                   <https://www.rfc-editor.org/rfc/rfc2119>.

538        [RFC7515]  Jones, M., Bradley, J., and N. Sakimura, "JSON Web
539                   Signature (JWS)", RFC 7515, DOI 10.17487/RFC7515, May
540                   2015, <https://www.rfc-editor.org/rfc/rfc7515>.

542        [RFC8174]  Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
543                   2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
544                   May 2017, <https://www.rfc-editor.org/rfc/rfc8174>.

546        [RFC8259]  Bray, T., Ed., "The JavaScript Object Notation (JSON) Data
547                   Interchange Format", STD 90, RFC 8259,
548                   DOI 10.17487/RFC8259, December 2017,
549                   <https://www.rfc-editor.org/rfc/rfc8259>.

551        [RFC8366]  Watsen, K., Richardson, M., Pritikin, M., and T. Eckert,
552                   "A Voucher Artifact for Bootstrapping Protocols",
553                   RFC 8366, DOI 10.17487/RFC8366, May 2018,
554                   <https://www.rfc-editor.org/rfc/rfc8366>.

556        [SZTP]     Watsen, K., Farrer, I., and M. Abrahamsson, "Secure Zero
557                   Touch Provisioning (SZTP)", RFC 8572,
558                   DOI 10.17487/RFC8572, April 2019,
559                   <https://www.rfc-editor.org/rfc/rfc8572>.

561     10.2.  Informative References

563        [I-D.ietf-anima-brski-prm]
564                   Fries, S., Werner, T., Lear, E., and M. Richardson, "BRSKI
565                   with Pledge in Responder Mode (BRSKI-PRM)", Work in
566                   Progress, Internet-Draft, draft-ietf-anima-brski-prm-07,
567                   21 February 2023, <https://datatracker.ietf.org/doc/html/
568                   draft-ietf-anima-brski-prm-07>.

570        [I-D.ietf-anima-constrained-voucher]
571                   Richardson, M., Van der Stok, P., Kampanakis, P., and E.
572                   Dijk, "Constrained Bootstrapping Remote Secure Key
573                   Infrastructure (BRSKI)", Work in Progress, Internet-Draft,
574                   draft-ietf-anima-constrained-voucher-19, 2 January 2023,
575                   <https://datatracker.ietf.org/doc/html/draft-ietf-anima-
576                   constrained-voucher-19>.

578        [I-D.kuehlewind-update-tag]
579                   Kühlewind, M. and S. Krishnan, "Definition of new tags for
580                   relations between RFCs", Work in Progress, Internet-Draft,
581                   draft-kuehlewind-update-tag-04, 12 July 2021,
582                   <https://datatracker.ietf.org/doc/html/draft-kuehlewind-
583                   update-tag-04>.

585        [onpath]   "can an on-path attacker drop traffic?", n.d.,
586                   <https://mailarchive.ietf.org/arch/msg/saag/
587                   m1r9uo4xYznOcf85Eyk0Rhut598/>.

589        [RFC5280]  Cooper, D., Santesson, S., Farrell, S., Boeyen, S.,
590                   Housley, R., and W. Polk, "Internet X.509 Public Key
591                   Infrastructure Certificate and Certificate Revocation List
592                   (CRL) Profile", RFC 5280, DOI 10.17487/RFC5280, May 2008,
593                   <https://www.rfc-editor.org/rfc/rfc5280>.

595        [RFC5652]  Housley, R., "Cryptographic Message Syntax (CMS)", STD 70,
596                   RFC 5652, DOI 10.17487/RFC5652, September 2009,
597                   <https://www.rfc-editor.org/rfc/rfc5652>.

599        [RFC8792]  Watsen, K., Auerswald, E., Farrel, A., and Q. Wu,
600                   "Handling Long Lines in Content of Internet-Drafts and
601                   RFCs", RFC 8792, DOI 10.17487/RFC8792, June 2020,
602                   <https://www.rfc-editor.org/rfc/rfc8792>.

604        [RFC8812]  Jones, M., "CBOR Object Signing and Encryption (COSE) and
605                   JSON Object Signing and Encryption (JOSE) Registrations
606                   for Web Authentication (WebAuthn) Algorithms", RFC 8812,
607                   DOI 10.17487/RFC8812, August 2020,
608                   <https://www.rfc-editor.org/rfc/rfc8812>.

610        [RFC8949]  Bormann, C. and P. Hoffman, "Concise Binary Object
611                   Representation (CBOR)", STD 94, RFC 8949,
612                   DOI 10.17487/RFC8949, December 2020,
613                   <https://www.rfc-editor.org/rfc/rfc8949>.

615     Contributors

617        Toerless Eckert
618        Futurewei Technologies Inc.
619        Email: [email protected]

Please remove the "+ietf", that was an old idea that didn't work out too well.

621        Esko Dijk
622        Email: [email protected]

624        Steffen Fries
625        Siemens AG
626        Email: [email protected]

628     Authors' Addresses

630        Thomas Werner
631        Siemens AG
632        Email: [email protected]

634        Michael Richardson
635        Sandelman Software Works
636        Email: [email protected]


Thank you so much.
EOF






_______________________________________________
Anima mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/anima

Reply via email to