This new version contains a "bag of changes":

* Clarify use of x5bag for storing signing chain and Registrar removes 
unprotected x5bag/x5chain 
* Clarify how RPK is used with above x5bag, with self-signed "placeholder" 
certificate.  Also details added of how a Registrar can validate the RPK 
(voucher validation by the Registrar is optional in BRSKI).
* Merged the very similar BRSKI-MASA security considerations sections.  
* To avoid needless variation, require CBOR format for Pledge's/EST-client's 
telemetry.  
* Removed figure captions from code examples for consistency.  
* Add base resource type (rt) for "ace.est" and related terminology.    
* Update IEEE 802.1AR reference to the more recent 2018 version.  
* Editorial updates.

The diff shows the differences well:
https://author-tools.ietf.org/iddiff?url2=draft-ietf-anima-constrained-voucher-27

In the draft itself, Section 17 points to the details with Github issue/PR 
numbers.

Esko

-----Original Message-----
From: internet-dra...@ietf.org <internet-dra...@ietf.org> 
Sent: maandag 3 maart 2025 23:04
To: i-d-annou...@ietf.org
Cc: anima@ietf.org
Subject: [Anima] I-D Action: draft-ietf-anima-constrained-voucher-27.txt

Internet-Draft draft-ietf-anima-constrained-voucher-27.txt is now available.
It is a work item of the Autonomic Networking Integrated Model and Approach
(ANIMA) WG of the IETF.

   Title:   Constrained Bootstrapping Remote Secure Key Infrastructure (cBRSKI)
   Authors: Michael Richardson
            Peter van der Stok
            Panos Kampanakis
            Esko Dijk
   Name:    draft-ietf-anima-constrained-voucher-27.txt
   Pages:   91
   Dates:   2025-03-03

Abstract:

   This document defines the Constrained Bootstrapping Remote Secure Key
   Infrastructure (cBRSKI) protocol, which provides a solution for
   secure zero-touch onboarding of resource-constrained (IoT) devices
   into the network of a domain owner.  This protocol is designed for
   constrained networks, which may have limited data throughput or may
   experience frequent packet loss. cBRSKI is a variant of the BRSKI
   protocol, which uses an artifact signed by the device manufacturer
   called the "voucher" which enables a new device and the owner's
   network to mutually authenticate.  While the BRSKI voucher data is
   encoded in JSON, cBRSKI uses a compact CBOR-encoded voucher.  The
   BRSKI voucher data definition is extended with new data types that
   allow for smaller voucher sizes.  The Enrollment over Secure
   Transport (EST) protocol, used in BRSKI, is replaced with EST-over-
   CoAPS; and HTTPS used in BRSKI is replaced with DTLS-secured CoAP
   (CoAPS).  This document Updates RFC 8995 and RFC 9148.

The IETF datatracker status page for this Internet-Draft is:
https://datatracker.ietf.org/doc/draft-ietf-anima-constrained-voucher/

There is also an HTML version available at:
https://www.ietf.org/archive/id/draft-ietf-anima-constrained-voucher-27.html

A diff from the previous version is available at:
https://author-tools.ietf.org/iddiff?url2=draft-ietf-anima-constrained-voucher-27

Internet-Drafts are also available by rsync at:
rsync.ietf.org::internet-drafts


_______________________________________________
Anima mailing list -- anima@ietf.org
To unsubscribe send an email to anima-le...@ietf.org
_______________________________________________
Anima mailing list -- anima@ietf.org
To unsubscribe send an email to anima-le...@ietf.org

Reply via email to