This update reflects the work that was done earlier (August) to restructure the 
content of "cBRSKI". Now the default, simplest flow is highlighted and optional 
extras are moved into separate sections: in particular, the extended discovery 
now in Section 14.
Some content has been reorganized as well. This version will be used as a base 
to do further text updates, e.g. the discovery related proposal that was made 
at IETF 118.

Current work items are reflected in Github: 
https://github.com/anima-wg/constrained-voucher/issues

Esko

-----Original Message-----
From: Anima <[email protected]> On Behalf Of [email protected]
Sent: Tuesday, November 21, 2023 17:54
To: [email protected]
Cc: [email protected]
Subject: [Anima] I-D Action: draft-ietf-anima-constrained-voucher-22.txt

Internet-Draft draft-ietf-anima-constrained-voucher-22.txt is now available.
It is a work item of the Autonomic Networking Integrated Model and Approach
(ANIMA) WG of the IETF.

   Title:   Constrained Bootstrapping Remote Secure Key Infrastructure (BRSKI)
   Authors: Michael Richardson
            Peter van der Stok
            Panos Kampanakis
            Esko Dijk
   Name:    draft-ietf-anima-constrained-voucher-22.txt
   Pages:   86
   Dates:   2023-11-21

Abstract:

   This document defines the Constrained Bootstrapping Remote Secure Key
   Infrastructure (Constrained BRSKI) protocol, which provides a
   solution for secure zero-touch bootstrapping of resource-constrained
   (IoT) devices into the network of a domain owner.  This protocol is
   designed for constrained networks, which may have limited data
   throughput or may experience frequent packet loss.  Constrained BRSKI
   is a variant of the BRSKI protocol, which uses an artifact signed by
   the device manufacturer called the "voucher" which enables a new
   device and the owner's network to mutually authenticate.  While the
   BRSKI voucher is typically encoded in JSON, Constrained BRSKI uses a
   compact CBOR-encoded voucher.  The BRSKI voucher definition is
   extended with new data types that allow for smaller voucher sizes.
   The Enrollment over Secure Transport (EST) protocol, used in BRSKI,
   is replaced with EST-over-CoAPS; and HTTPS used in BRSKI is replaced
   with DTLS-secured CoAP (CoAPS).  This document Updates RFC 8366 and
   RFC 8995.

The IETF datatracker status page for this Internet-Draft is:
https://datatracker.ietf.org/doc/draft-ietf-anima-constrained-voucher/

There is also an HTML version available at:
https://www.ietf.org/archive/id/draft-ietf-anima-constrained-voucher-22.html

A diff from the previous version is available at:
https://author-tools.ietf.org/iddiff?url2=draft-ietf-anima-constrained-voucher-22

Internet-Drafts are also available by rsync at:
rsync.ietf.org::internet-drafts


_______________________________________________
Anima mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/anima

_______________________________________________
Anima mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/anima

Reply via email to