Hi all, This latest version of draft-ietf-anima-constrained-voucher fixes a couple of minor issues and has editorial improvements. There are some open work items that will have a larger impact on the text; but these are not concluded yet so will be integrated into a future version. (Overview here: https://github.com/anima-wg/constrained-voucher/issues)
Full details of the commits and PRs applied can be found here: https://github.com/anima-wg/constrained-voucher/commits/master best regards Esko -----Original Message----- From: [email protected] <[email protected]> Sent: Friday, July 7, 2023 10:36 To: Esko Dijk <[email protected]>; Michael Richardson <[email protected]>; Panos Kampanakis <[email protected]>; Peter van der Stok <[email protected]> Subject: New Version Notification for draft-ietf-anima-constrained-voucher-21.txt A new version of I-D, draft-ietf-anima-constrained-voucher-21.txt has been successfully submitted by Esko Dijk and posted to the IETF repository. Name: draft-ietf-anima-constrained-voucher Revision: 21 Title: Constrained Bootstrapping Remote Secure Key Infrastructure (BRSKI) Document date: 2023-07-07 Group: anima Pages: 84 URL: https://www.ietf.org/archive/id/draft-ietf-anima-constrained-voucher-21.txt Status: https://datatracker.ietf.org/doc/draft-ietf-anima-constrained-voucher/ Html: https://www.ietf.org/archive/id/draft-ietf-anima-constrained-voucher-21.html Htmlized: https://datatracker.ietf.org/doc/html/draft-ietf-anima-constrained-voucher Diff: https://author-tools.ietf.org/iddiff?url2=draft-ietf-anima-constrained-voucher-21 Abstract: This document defines the Constrained Bootstrapping Remote Secure Key Infrastructure (Constrained BRSKI) protocol, which provides a solution for secure zero-touch bootstrapping of resource-constrained (IoT) devices into the network of a domain owner. This protocol is designed for constrained networks, which may have limited data throughput or may experience frequent packet loss. Constrained BRSKI is a variant of the BRSKI protocol, which uses an artifact signed by the device manufacturer called the "voucher" which enables a new device and the owner's network to mutually authenticate. While the BRSKI voucher is typically encoded in JSON, Constrained BRSKI uses a compact CBOR-encoded voucher. The BRSKI voucher is extended with new data types that allow for smaller voucher sizes. The Enrollment over Secure Transport (EST) protocol, used in BRSKI, is replaced with EST- over-CoAPS; and HTTPS used in BRSKI is replaced with CoAPS. This document Updates RFC 8366 and RFC 8995. The IETF Secretariat _______________________________________________ Anima mailing list [email protected] https://www.ietf.org/mailman/listinfo/anima
