I-D Action: draft-ietf-anima-constrained-voucher-17.txt
internet-drafts@ietf.org Thu, 07 April 2022 14:57 UTC
Return-Path: <internet-drafts@ietf.org>
X-Original-To: i-d-announce@ietf.org
Delivered-To: i-d-announce@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1])
by ietfa.amsl.com (Postfix) with ESMTP id B84443A07A9;
Thu, 7 Apr 2022 07:57:16 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: anima@ietf.org
Subject: I-D Action: draft-ietf-anima-constrained-voucher-17.txt
X-Test-IDTracker: no
X-IETF-IDTracker: 7.46.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: anima@ietf.org
Message-ID: <164934343668.10923.10487973680952896592@ietfa.amsl.com>
Date: Thu, 07 Apr 2022 07:57:16 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/i-d-announce/qoZ8S64Ov4I1h2LKqRmB2ydVUmU>
X-BeenThere: i-d-announce@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Internet Draft Announcements only <i-d-announce.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i-d-announce>,
<mailto:i-d-announce-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i-d-announce/>
List-Post: <mailto:i-d-announce@ietf.org>
List-Help: <mailto:i-d-announce-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i-d-announce>,
<mailto:i-d-announce-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Apr 2022 14:57:17 -0000
A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Autonomic Networking Integrated Model and Approach WG of the IETF.
Title : Constrained Bootstrapping Remote Secure Key Infrastructure (BRSKI)
Authors : Michael Richardson
Peter van der Stok
Panos Kampanakis
Esko Dijk
Filename : draft-ietf-anima-constrained-voucher-17.txt
Pages : 80
Date : 2022-04-07
Abstract:
This document defines the Constrained Bootstrapping Remote Secure Key
Infrastructure (Constrained BRSKI) protocol, which provides a
solution for secure zero-touch bootstrapping of resource-constrained
(IoT) devices into the network of a domain owner. This protocol is
designed for constrained networks, which may have limited data
throughput or may experience frequent packet loss. Constrained BRSKI
is a variant of the BRSKI protocol, which uses an artifact signed by
the device manufacturer called the "voucher" which enables a new
device and the owner's network to mutually authenticate. While the
BRSKI voucher is typically encoded in JSON, Constrained BRSKI defines
a compact CBOR-encoded voucher. The BRSKI voucher is extended with
new data types that allow for smaller voucher sizes. The Enrollment
over Secure Transport (EST) protocol, used in BRSKI, is replaced with
EST-over-CoAPS; and HTTPS used in BRSKI is replaced with CoAPS.
The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-anima-constrained-voucher/
There is also an HTML version available at:
https://www.ietf.org/archive/id/draft-ietf-anima-constrained-voucher-17.html
A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-anima-constrained-voucher-17
Internet-Drafts are also available by rsync at rsync.ietf.org::internet-drafts
- I-D Action: draft-ietf-anima-constrained-voucher-… internet-drafts