Hi all,

This latest version of draft-ietf-anima-constrained-voucher fixes a couple of 
minor issues and has editorial improvements.
There are some open work items that will have a larger impact on the text; but 
these are not concluded yet so will be integrated into a future version.  
(Overview here: https://github.com/anima-wg/constrained-voucher/issues)

Full details of the commits and PRs applied can be found here:
https://github.com/anima-wg/constrained-voucher/commits/master

best regards
Esko

-----Original Message-----
From: [email protected] <[email protected]> 
Sent: Friday, July 7, 2023 10:36
To: Esko Dijk <[email protected]>; Michael Richardson 
<[email protected]>; Panos Kampanakis <[email protected]>; Peter van der 
Stok <[email protected]>
Subject: New Version Notification for 
draft-ietf-anima-constrained-voucher-21.txt


A new version of I-D, draft-ietf-anima-constrained-voucher-21.txt
has been successfully submitted by Esko Dijk and posted to the
IETF repository.

Name:           draft-ietf-anima-constrained-voucher
Revision:       21
Title:          Constrained Bootstrapping Remote Secure Key Infrastructure 
(BRSKI)
Document date:  2023-07-07
Group:          anima
Pages:          84
URL:            
https://www.ietf.org/archive/id/draft-ietf-anima-constrained-voucher-21.txt
Status:         
https://datatracker.ietf.org/doc/draft-ietf-anima-constrained-voucher/
Html:           
https://www.ietf.org/archive/id/draft-ietf-anima-constrained-voucher-21.html
Htmlized:       
https://datatracker.ietf.org/doc/html/draft-ietf-anima-constrained-voucher
Diff:           
https://author-tools.ietf.org/iddiff?url2=draft-ietf-anima-constrained-voucher-21

Abstract:
   This document defines the Constrained Bootstrapping Remote Secure Key
   Infrastructure (Constrained BRSKI) protocol, which provides a
   solution for secure zero-touch bootstrapping of resource-constrained
   (IoT) devices into the network of a domain owner.  This protocol is
   designed for constrained networks, which may have limited data
   throughput or may experience frequent packet loss.  Constrained BRSKI
   is a variant of the BRSKI protocol, which uses an artifact signed by
   the device manufacturer called the "voucher" which enables a new
   device and the owner's network to mutually authenticate.  While the
   BRSKI voucher is typically encoded in JSON, Constrained BRSKI uses a
   compact CBOR-encoded voucher.  The BRSKI voucher is extended with new
   data types that allow for smaller voucher sizes.  The Enrollment over
   Secure Transport (EST) protocol, used in BRSKI, is replaced with EST-
   over-CoAPS; and HTTPS used in BRSKI is replaced with CoAPS.  This
   document Updates RFC 8366 and RFC 8995.

                                                                                
  


The IETF Secretariat


_______________________________________________
Anima mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/anima

Reply via email to