Skip to main content

Content-Centric Networking (CCNx) Messages in TLV Format
draft-irtf-icnrg-ccnxmessages-09

Revision differences

Document history

Date Rev. By Action
2019-07-08
09 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2019-06-20
09 David Oran
The CCNx specs have been under development since the inception of the ICNRG. They are highly mature and ready for publication as Experimental RFCs. They …
The CCNx specs have been under development since the inception of the ICNRG. They are highly mature and ready for publication as Experimental RFCs. They have strong RG consensus, and have undergone careful editing by the authors, review by the IRSG, and furhter refinement by the RFC Editor. The final text is under review by the shepherd.

2019-06-20
09 David Oran Notification list changed to David Oran <daveoran@orandom.net>
2019-06-20
09 David Oran Document shepherd changed to David R. Oran
2019-05-13
09 (System) RFC Editor state changed to AUTH48 from RFC-EDITOR
2019-04-22
09 (System) RFC Editor state changed to RFC-EDITOR from AUTH
2019-04-01
09 (System) RFC Editor state changed to AUTH from EDIT
2019-02-21
09 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2019-02-21
09 (System) IANA Action state changed to Waiting on RFC Editor from In Progress
2019-02-21
09 (System) IANA Action state changed to In Progress from Waiting on Authors
2019-02-12
09 (System) IANA Action state changed to Waiting on Authors from In Progress
2019-01-31
09 (System) RFC Editor state changed to EDIT
2019-01-31
09 (System) IANA Action state changed to In Progress
2019-01-31
09 Allison Mankin IRTF state changed to Sent to the RFC Editor from In IESG Review
2019-01-31
09 Allison Mankin Sent request for publication to the RFC Editor
2019-01-31
09 Amanda Baber IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed
2019-01-24
09 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed
2019-01-24
09 Marc Mosko New version available: draft-irtf-icnrg-ccnxmessages-09.txt
2019-01-24
09 (System) New version approved
2019-01-24
09 (System) Request for posting confirmation emailed to previous authors: Christopher Wood , Marc Mosko , Ignacio Solis
2019-01-24
09 Marc Mosko Uploaded new revision
2019-01-09
08 Amanda Baber IANA Review state changed to IANA OK - Actions Needed from IANA - Not OK
2019-01-08
08 (System) IANA Review state changed to IANA - Not OK from IANA OK - Actions Needed
2019-01-03
08 (System) IANA Review state changed to IANA - Not OK
2019-01-03
08 Amanda Baber
(Via drafts-eval@iana.org): IESG/Authors/WG Chairs:

We have reviewed draft-irtf-icnrg-ccnxmessages-08 and understand that it requires 10 registry actions. However, we have several questions.

IANA QUESTION --> …
(Via drafts-eval@iana.org): IESG/Authors/WG Chairs:

We have reviewed draft-irtf-icnrg-ccnxmessages-08 and understand that it requires 10 registry actions. However, we have several questions.

IANA QUESTION --> will the IESG be the organization that designates an expert for the Expert Review/Specification Required registries?

IANA NOTE --> RFC 8126 uses the term "Specification Required" to describe the registration procedure that requires both expert review and the provision of a public, readily accessible specification.

IANA QUESTION --> The first paragraph of the IANA Considerations section states, "Each type registry can be updated by incrementally expanding the type space, i.e., by allocating and reserving new types." Does this refer to allocating and reserving new registries or new registrations? It isn't clear what the term "reserve" would mean in the former context.

We understand that when this document is sent to us for processing, it will require the following actions:

ACTION 1:

The following registry will be created under the heading "CCNx":

Registry Name: CCNx Packet Types
Reference: [This document]
Registration Procedure: RFC Required

Type Name Reference
0 PT_INTEREST [This document, Section 3.2]
1 PT_CONTENT [This document, Section 3.2]
2 PT_RETURN [This document, Section 3.2]
3-255 Unassigned

ACTION 2:

The following registry will be created under the heading "CCNx":

Registry Name: CCNx Interest Return Codes
Reference: [This document]
Registration Procedure: Expert Review
Note: Registration request should include public standard leading to RFC.

Type Name Reference
0 ?
1 T_RETURN_NO_ROUTE [This document, Section 3.2.3.3]
2 T_RETURN_LIMIT_EXCEEDED [This document, Section 3.2.3.3]
3 T_RETURN_NO_RESOURCES [This document, Section 3.2.3.3]
4 T_RETURN_PATH_ERROR [This document, Section 3.2.3.3]
5 T_RETURN_PROHIBITED [This document, Section 3.2.3.3]
6 T_RETURN_CONGESTED [This document, Section 3.2.3.3]
7 T_RETURN_MTU_TOO_LARGE [This document, Section 3.2.3.3]
8 T_RETURN_UNSUPPORTED_HASH_RESTRICTION [This document, Section 3.2.3.3]
9 T_RETURN_MALFORMED_INTEREST [This document, Section 3.2.3.3]
10-255 Unassigned

IANA QUESTION --> Should value 0 be listed as "Reserved" (i.e. unavailable for assignment, per RFC 8126), listed as "Unassigned" (i.e. available for assignment), or left out of the registry?

ACTION 3:

The following registry will be created under the heading "CCNx":

Registry Name: CCNx Hop-by-Hop Types
Reference: [This document]
Registration Procedure: RFC Required

Type Name Reference
0 ?
1 T_INTLIFE [This document, Section 3.4]
2 T_CACHETIME [This document, Section 3.4]
3 T_MSGHASH [This document, Section 3.4]
4-7 Reserved [This document]
8-4093 Unassigned
4094 T_PAD [This document, Section 3.3.1]
4095 T_ORG [This document, Section 3.3.2]
4096-8191 Reserved for Experimental Use [This document, Section 3]
8192-65535 Unasssigned

IANA QUESTION --> Should value 0 be listed as "Reserved" (i.e. unavailable for assignment, per RFC 8126), listed as "Unassigned" (i.e. available for assignment), or left out of the registry?

IANA QUESTION --> The document uses both hex and decimal numbering in this registry. In the future, it may be possible to display more than one method in an IANA registry, but we need to use a consistent method when creating the registry. Should we use hex instead of decimal here?

ACTION 4:

The following registry will be created under the heading "CCNx":

Registry Name: CCNx Top-Level Types
Reference: [This document]
Registration Procedure: RFC Required

Type Name Reference
0 ?
1 T_INTEREST [This document, Section 3.5]
2 T_OBJECT [This document, Section 3.5]
3 T_VALIDATION_ALG [This document, Section 3.5]
4 T_VALIDATION_PAYLOAD [This document, Section 3.5]
5-65535 Unasssigned

IANA QUESTION --> Should value 0 be listed as "Reserved" (i.e. unavailable for assignment, per RFC 8126), listed as "Unassigned" (i.e. available for assignment), or left out of the registry?

ACTION 5:

The following registry will be created under the heading "CCNx":

Registry Name: CCNx Name Segment Types
Reference: [This document]
Registration Procedure: Specification Required

Type Name Reference
0 ?
1 T_NAMESEGMENT [This document, Section 3.6.1]
2 T_IPID [This document, Section 3.6.1]
3-15 Unassigned
16-19 Reserved [This document]
20-4094 Unassigned
4095 T_ORG [This document, Section 3.3.2]
4096-8191 T_APP:00 - T_APP:4096 [This document, Section 3.6.1]
8192-65535 Unasssigned

IANA QUESTION --> Should value 0 be listed as "Reserved" (i.e. unavailable for assignment, per RFC 8126), listed as "Unassigned" (i.e. available for assignment), or left out of the registry?

IANA QUESTION --> In the document, this registry uses both hex and decimal numbering. Should the IANA registry use hex or decimal?

IANA QUESTION --> The registration procedure listed in the IANA Considerations section, "Expert Review with public specification," appears to match the RFC 8126 term "Specification Required," which requires expert review. Is this correct? If so, this should be changed in the document.

ACTION 6:

The following registry will be created under the heading "CCNx":

Registry Name: CCNx Message Types
Reference: [This document]
Registration Procedure: RFC Required

Type Name Reference
0 T_NAME [This document, Section 3.6]
1 T_PAYLOAD [This document, Section 3.6]
2 T_KEYIDRESTR [This document, Section 3.6]
3 T_OBJHASHRESTR [This document, Section 3.6]
4 Unassigned
5 T_PAYLDTYPE [This document, Section 3.6.2.2]
6 T_EXPIRY [This document, Section 3.6.2.2]
7-12 Reserved [This document]
8-4093 Unassigned
4094 T_PAD [This document, Section 3.3.1]
4095 T_ORG [This document, Section 3.3.2]
4096-8191 Reserved for Experimental Use [This document, Section 3]
8192-65535 Unasssigned

IANA QUESTION --> Should value 0 be listed as "Reserved" (i.e. unavailable for assignment, per RFC 8126), listed as "Unassigned" (i.e. available for assignment), or left out of the registry?

IANA QUESTION --> In the document, this registry uses both hex and decimal numbering. Should the IANA registry use hex or decimal?

ACTION 7:

The following registry will be created under the heading "CCNx":

Registry Name: CCNx PayloadType
Reference: [This document]
Registration Procedure: Specification Required

Type Name Reference
0 T_PAYLOADTYPE_DATA [This document, Section 3.6.2.2.1]
1 T_PAYLOADTYPE_KEY [This document, Section 3.6.2.2.1]
2 T_PAYLOADTYPE_LINK [This document, Section 3.6.2.2.1]

IANA QUESTION --> Does this registry have a maximum available value (e.g. 255, 65535, etc.)?

IANA QUESTION --> The registration procedure listed in the IANA Considerations section, "Expert Review with public specification," appears to match the RFC 8126 term "Specification Required," which requires expert review. Is this correct? If so, this should be changed in the document.

ACTION 8:

The following registry will be created under the heading "CCNx":

Registry Name: CCNx Validation Algorithm Types
Reference: [This document]
Registration Procedure: Specification Required

Type Name Reference
0 ?
1 Unassigned
2 T_CRC32C [This document, Section 3.6.4.1]
3 Unassigned
4 T_HMAC-SHA256 [This document, Section 3.6.4.1]
5 T_RSA-SHA256 [This document, Section 3.6.4.1]
6 EC-SECP-256K1 [This document, Section 3.6.4.1]
7 EC-SECP-384R1 [This document, Section 3.6.4.1]
8-4093 Unassigned
4094 T_PAD [This document, Section 3.3.1]
4095 T_ORG [This document, Section 3.3.2]
4096-8191 Reserved for Experimental Use [This document, Section 3]
8192-65535 Unasssigned

IANA QUESTION --> Should value 0 be listed as "Reserved" (i.e. unavailable for assignment, per RFC 8126), listed as "Unassigned" (i.e. available for assignment), or left out of the registry?

IANA QUESTION --> In the document, this registry uses both hex and decimal numbering. Should the IANA registry use hex or decimal?

IANA QUESTION --> The registration procedure listed in the IANA Considerations section, "Expert Review with public specification," appears to match the RFC 8126 term "Specification Required," which requires expert review. Is this correct? If so, this should be changed in the document.

IANA QUESTION --> If the registration procedure is listed as "Specification Required," should there also be a note at the top of the registry that reads "Note: registration requires public specification of the algorithm"?

ACTION 9:

The following registry will be created under the heading "CCNx":

Registry Name: CCNx Validation Dependent Data Types
Reference: [This document]
Registration Procedure: RFC Required

Type Name Reference
0 ?
1-8 Unassigned
9 T_KEYID [This document, Section 3.6.4.1.4]
10 T_PUBLICKEYLOC [This document, Section 3.6.4.1.4]
11 T_PUBLICKEY [This document, Section 3.6.4.1.4]
12 T_CERT [This document, Section 3.6.4.1.4]
13 T_LINK [This document, Section 3.6.4.1.4]
14 T_KEYLINK [This document, Section 3.6.4.1.4]
15 T_SIGTIME [This document, Section 3.6.4.1.4]
16-4094 Unassigned
4095 T_ORG [This document, Section 3.3.2]
4096-8191 Reserved for Experimental Use [This document, Section 3]
8192-65535 Unasssigned

IANA QUESTION --> Should value 0 be listed as "Reserved" (i.e. unavailable for assignment, per RFC 8126), listed as "Unassigned" (i.e. available for assignment), or left out of the registry?

IANA QUESTION --> In the document, this registry uses both hex and decimal numbering. Should the IANA registry use hex or decimal?

ACTION 10:

The following registry will be created under the heading "CCNx":

Registry Name: CCNx Hash Function Types
Reference: [This document]
Registration Procedure: Specification Required

Type Name Reference
0 ?
1 T_SHA-256 [This document, Section 3.3.3]
2 T_SHA-512 [This document, Section 3.3.3]
3-4094 Unassigned
4095 T_ORG [This document, Section 3.3.2]
4096-8191 Reserved for Experimental Use [This document, Section 3]
8192-65535 Unasssigned

IANA QUESTION --> Should value 0 be listed as "Reserved" (i.e. unavailable for assignment, per RFC 8126), listed as "Unassigned" (i.e. available for assignment), or left out of the registry?

IANA QUESTION --> In the document, this registry uses both hex and decimal numbering. Should the IANA registry use hex or decimal?

IANA QUESTION --> The registration procedure listed in the IANA Considerations section, "Expert Review with public specification," appears to match the RFC 8126 term "Specification Required," which requires expert review. Is this correct? If so, this should be changed in the document.

IANA QUESTION --> If the registration procedure is listed as "Specification Required," should there also be a note at the top of the registry that reads "Note: registration requires public specification of the hash function"?

Thank you,

Amanda Baber
Lead IANA Services Specialist
2019-01-03
08 (System) Document has expired
2018-12-06
08 Allison Mankin IETF conflict review initiated - see conflict-review-irtf-icnrg-ccnxmessages
2018-12-06
08 Allison Mankin Changed consensus to Yes from Unknown
2018-12-06
08 Allison Mankin IRTF state changed to In IESG Review from Waiting for IRTF Chair
2018-07-02
08 Marc Mosko New version available: draft-irtf-icnrg-ccnxmessages-08.txt
2018-07-02
08 (System) New version approved
2018-07-02
08 (System) Request for posting confirmation emailed to previous authors: Christopher Wood , Marc Mosko , Ignacio Solis
2018-07-02
08 Marc Mosko Uploaded new revision
2018-04-10
07 Allison Mankin Look at the revisions and then pass to IESG
2018-04-10
07 Allison Mankin Tag AD Followup cleared.
2018-04-10
07 Allison Mankin IRTF state changed to Waiting for IRTF Chair from In IRSG Poll
2018-03-19
07 David Oran Added to session: IETF-101: icnrg  Tue-1550
2018-03-19
07 (System) Sub state has been changed to AD Followup from Revised ID Needed
2018-03-19
07 Marc Mosko New version available: draft-irtf-icnrg-ccnxmessages-07.txt
2018-03-19
07 (System) New version approved
2018-03-19
07 (System) Request for posting confirmation emailed to previous authors: Christopher Wood , Marc Mosko , Ignacio Solis
2018-03-19
07 Marc Mosko Uploaded new revision
2018-03-05
06 Allison Mankin Revision expected during or soon after IETF 101
2018-02-10
06 Allison Mankin Upon revision, we will get secdir review.
2018-02-10
06 Allison Mankin Tag Revised I-D Needed set.
2017-11-16
06 Allison Mankin Combine with reviews
2017-11-16
06 Allison Mankin IRTF state changed to In IRSG Poll from Awaiting IRSG Reviews
2017-10-29
06 Christopher Wood New version available: draft-irtf-icnrg-ccnxmessages-06.txt
2017-10-29
06 (System) New version approved
2017-10-29
06 (System) Request for posting confirmation emailed to previous authors: Christopher Wood , Marc Mosko , Ignacio Solis
2017-10-29
06 Christopher Wood Uploaded new revision
2017-09-12
05 Christopher Wood New version available: draft-irtf-icnrg-ccnxmessages-05.txt
2017-09-12
05 (System) New version approved
2017-09-11
05 (System) Request for posting confirmation emailed to previous authors: Christopher Wood , Marc Mosko , Ignacio Solis
2017-09-11
05 Christopher Wood Uploaded new revision
2017-07-20
04 David Oran IRTF state changed to Awaiting IRSG Reviews from In RG Last Call
2017-06-27
04 David Oran Added to session: interim-2017-icnrg-02
2017-06-27
04 David Oran IRTF state changed to In RG Last Call
2017-06-27
04 David Oran Intended Status changed to Experimental from None
2017-03-17
Jasmine Magallanes Posted related IPR disclosure: Cisco's Statement about IPR related to draft-irtf-icnrg-ccnxmessages and draft-irtf-icnrg-ccnxsemantics
2017-03-13
04 Christopher Wood New version available: draft-irtf-icnrg-ccnxmessages-04.txt
2017-03-13
04 (System) New version approved
2017-03-13
04 (System)
Request for posting confirmation emailed to previous authors: Christopher Wood , Ignacio Solis
Internet-Draft              Voucher Profile        …
Request for posting confirmation emailed to previous authors: Christopher Wood , Ignacio Solis
Internet-Draft              Voucher Profile                  June 2017

  The voucher artifact is a JSON document, conforming to a data model
  described by YANG [RFC7950], that has been signed using a PKCS#7
  structure.

  A voucher may be useful in several contexts, but the driving
  motivation herein is to support secure bootstrapping mechanisms.
  Assigning ownership is important to bootstrapping mechanisms so that
  the pledge can authenticate the network that's trying to take control
  of it.

  The lifetimes of vouchers may vary.  In some bootstrapping protocols
  the vouchers may be ephemeral, whereas in others the vouchers may be
  potentially long-lived.  In order to support the second category of
  vouchers, this document recommends using short-life vouchers with
  programatic renewal, enabling the MASA to communicate the ongoing
  validity of vouchers.

  This document only defines the voucher artifact, leaving it to other
  documents to describe specialized protocols for accessing it.  Some
  bootstrapping protocols using the voucher artifact defined in this
  draft include: [I-D.ietf-netconf-zerotouch],
  [I-D.ietf-6tisch-dtsecurity-secure-join], and
  [I-D.ietf-anima-bootstrapping-keyinfra]).

2.  Terminology

  Imprint:  The process where a device obtains the cryptographic key
      material to identify and trust future interactions with a network.
      This term is taken from Konrad Lorenz's work in biology with new
      ducklings: "during a critical period, the duckling would assume
      that anything that looks like a mother duck is in fact their
      mother."  An equivalent for a device is to obtain the fingerprint
      of the network's root certification authority certificate.  A
      device that imprints on an attacker suffers a similar fate to a
      duckling that imprints on a hungry wolf.  Securely imprinting is a
      primary focus of this document.[imprinting].  The analogy to
      Lorenz's work was first noted in [Stajano99theresurrecting].

  Domain:  The set of entities or infrastructure under common
      administrative control.  The goal of the bootstrapping protocol is
      to enable a Pledge to discover and join a Domain.

  Join Registrar (and Coordinator):  A representative of the domain
      that is configured, perhaps autonomically, to decide whether a new
      device is allowed to join the domain.  The administrator of the
      domain interfaces with a Join Registrar (and Coordinator) to
      control this process. i Typically a Join Registrar is "inside" its

Watsen, et al.          Expires December 9, 2017                [Page 3]
Internet-Draft              Voucher Profile                  June 2017

      domain.  For simplicity this document often refers to this as just
      "Registrar".

  MASA:  The Manufacturer Authorized Signing Authority (MASA) service
      that signs vouchers.  In some bootstrapping protocols, the MASA
      may have Internet presence and be integral to the bootstrapping
      process, whereas in other protocols the MASA may be an offline
      service that has no active role in the bootstrapping process.

  Pledge:  The prospective device attempting to find and securely join
      a domain.  When shipped it only trusts authorized representatives
      of the manufacturer.

  Registrar  See Join Registrar

  TOFU:  Trust on First Use. This is where a Pledge device makes no
      security decisions but rather simply trusts the first Domain
      entity it is contacted by.  Used similarly to [RFC7435].  This is
      also known as the "resurrecting duckling" model.

  Voucher:  A signed statement from the MASA service that indicates to
      a Pledge the cryptographic identity of the Domain it should trust.

3.  Requirements Language

  The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
  "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in the
  sections below are to be interpreted as described in RFC 2119
  [RFC2119].

4.  Survey of Voucher Types

  A voucher is a cryptographically protected statement to the Pledge
  device authorizing a zero-touch "imprint" on the Join Registrar of
  the domain.  The specific information a voucher provides is
  influenced by the bootstrapping use case.

  The voucher can impart the following information to the Join
  Registrar and Pledge:

  Assertion Basis:  Indicates the method that protects the imprint
      (this is distinct from the voucher signature that protects the
      voucher itself).  This might include manufacturer asserted
      ownership verification, assured logging operations or reliance on
      Pledge endpoint behavior such as secure root of trust of
      measurement.  The Join Registrar might use this information.  Only
      some methods are normatively defined in this document.  Other
      methods are left for future work.

Watsen, et al.          Expires December 9, 2017                [Page 4]
Internet-Draft              Voucher Profile                  June 2017

  Authentication of Join Registrar:  Indicates how the Pledge can
      authenticate the Join Registrar.  This might include an indication
      of the private PKIX trust anchor used by the Registrar, or an
      indication of a public PKIX trust anchor and additional CN-ID or
      DNS-ID information to complete authentication.  Symmetric key or
      other methods are left for future work.

  Anti-Replay Protections:  Time or nonce based information to
      constrain the voucher to time periods or bootstrap attempts.

  A number of bootstrapping scenarios can be met using differing
  combinations of this information.  All scenarios address the primary
  threat of a Man-in-The-Middle Registrar gaining control over the
  Pledge device.  The following combinations are "types" of vouchers:

                |Assertion  |Registrar ID    | Validity    |
  Voucher      |Log-|Veri-  |Trust  |CN-ID or| RTC | Nonce |
  Name        | ged|  fied |Anchor |DNS-ID  |    |      |
  ---------------------------------------------------------|
  Audit        |  X |      | X    |        |    | X    |
  -------------|----|-------|-------|--------|-----|-------|
  Nonceless    |  X |      | X    |        | X  |      |
  Audit        |    |      |      |        |    |      |
  -------------|----|-------|-------|--------|-----|-------|
  Owner Audit  |  X |  X  | X    |        | X  | X    |
  -------------|----|-------|-------|--------|-----|-------|
  Owner ID    |    |  X  | X    |  X    | X  |      |
  -------------|----|-------|----------------|-----|-------|
  Bearer      |  X |      |  wildcard    | optional    |
  out-of-scope |    |      |                |            |
  -------------|----|-------|----------------|-------------|

  NOTE: All voucher types include a 'Pledge ID serial number'
        (Not shown for space reasons)

  Audit Voucher:  An Audit Voucher is named after the logging assertion
      mechanisms that the Registrar then "audits" to enforce local
      policy.  The Registrar mitigates a MiTM Registrar by auditing that
      an unknown MiTM registrar does not appear in the log entries.
      This does not direct prevent the MiTM but provides a response
      mechanism that ensures the MiTM is unsuccessful.  This advantage
      is that actual ownership knowledge is not required on the MASA
      service.

  Nonceless Audit Voucher:  An Audit Voucher without a validity period
      statement.  Fundamentally the same as an Audit Voucher except that
      it can be issued in advance to support network partitions or to
      provide a permanent voucher for remote deployments.

Watsen, et al.          Expires December 9, 2017                [Page 5]
Internet-Draft              Voucher Profile                  June 2017

  Ownership Audit Voucher:  An Audit Voucher where the MASA service has
      verified the Registrar as the authorized owner.  The MASA service
      mitigates a MiTM Registrar by refusing to generate Audit Voucher's
      for unauthorized Registrars.  The Registrar uses audit techniques
      to supplement the MASA.  This provides an ideal sharing of policy
      decisions and enforcement between the vendor and the owner.

  Ownership ID Voucher:  An Ownership ID Voucher is named after
      inclusion of the Pledge's CN-ID or DNS-ID within the voucher.  The
      MASA service mitigates a MiTM Registrar by identifying the
      specific Registrar (via WebPKI) authorized to own the Pledge.

  Bearer Voucher:  A Bearer Voucher is named after the inclusion of a
      Registrar ID wildcard.  Because the Registrar identity is not
      indicated this voucher type must be treated as a secret and
      protected from exposure as any 'bearer' of the voucher can claim
      the Pledge device.  Publishing a nonceless bearer voucher
      effectively turns the specified Pledge into a "TOFU" device with
      minimal mitigation against MiTM Registrars.  Bearer vouchers are
      out-of-scope.

5.  Voucher

  The voucher's purpose is to securely assign a pledge to an owner.
  The voucher informs the pledge which entity it should consider to be
  its owner.

  The voucher is signed a PKCS#7 SignedData structure, as specified by
  Section 9.1 of [RFC2315], encoded using ASN.1 distinguished encoding
  rules (DER), as specified in ITU-T X.690.

  The PKCS#7 structure MUST contain JSON-encoded content conforming to
  the YANG module specified in Section 5.3.

  The PKCS#7 structure MUST also contain a 'signerInfo' structure, as
  described in Section 9.1 of [RFC2315], containing the signature
  generated over the content using the MASA's private key.

  The PKCS#7 structure SHOULD also contain all of the certificates
  leading up to and including the MASA&, irtf-chair@irtf.org, " marc.mosko@parc.com" , icnrg-chairs@ietf.org
2017-03-13
04 Christopher Wood Uploaded new revision
2016-12-30
03 (System) Document has expired
2016-06-28
03 Marc Mosko New version available: draft-irtf-icnrg-ccnxmessages-03.txt
2016-04-04
02 Marc Mosko New version available: draft-irtf-icnrg-ccnxmessages-02.txt
2016-01-11
01 Marc Mosko New version available: draft-irtf-icnrg-ccnxmessages-01.txt
2015-08-26
Naveen Khan
Posted related IPR disclosure: Palo Alto Research Center's Statement about IPR related to draft-irtf-icnrg-ccnxsemantics, draft-irtf-icnrg-ccnxmessages, and Presentations by PARC @ IETF 93, 94, …
Posted related IPR disclosure: Palo Alto Research Center's Statement about IPR related to draft-irtf-icnrg-ccnxsemantics, draft-irtf-icnrg-ccnxmessages, and Presentations by PARC @ IETF 93, 94, and interim meetings
2015-07-14
Naveen Khan Posted related IPR disclosure: Palo Alto Research Center's Statement about IPR related to draft-irtf-icnrg-ccnxmessages, draft-irtf-icnrg-ccnxsemantics, and Presentations by PARC @ IETF 93
2015-06-29
00 laura.hill@parc.com New version available: draft-irtf-icnrg-ccnxmessages-00.txt