<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.3.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-anima-masa-considerations-02" category="info" tocInclude="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.32.0 -->
  <front>
    <title abbrev="MASA Considerations">Operational Considerations for Voucher infrastructure for BRSKI MASA</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-anima-masa-considerations-02"/>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <author initials="T." surname="Werner" fullname="Thomas Werner">
      <organization>Siemens AG</organization>
      <address>
        <email>thomas-werner@siemens.com</email>
      </address>
    </author>
    <author fullname="Chunchi Peter Liu">
      <organization>Huawei</organization>
      <address>
        <email>liuchunchi@huawei.com</email>
      </address>
    </author>
    <date year="2026" month="March" day="26"/>
    <area>Internet</area>
    <workgroup>anima Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 110?>

<t>This document describes a number of operational modes that a
BRSKI Manufacturer Authorized Signing Authority (MASA) may take on.</t>
      <t>Each mode is defined, and then each mode is given a relevance
within an over applicability of what kind of organization the
MASA is deployed into.  This document does not change any
protocol mechanisms.</t>
    </abstract>
  </front>
  <middle>
    <?line 120?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="RFC8995"/> introduces a mechanism for
new devices (called pledges) to be onboarded into a network without
intervention from an expert operator.</t>
      <t>This mechanism leverages the pre-existing relationship between a device and
the manufacturer that built the device.  There are two aspects to this
relationship: the provision of an identity for the device by the
manufacturer (the IDevID), and a mechanism which convinces the device to
trust the new owner (the <xref target="RFC8366"/> voucher).</t>
      <t>The manufacturer, or their designate, is involved in both aspects of this
process.  This requires the manufacturer (or designate) to maintain on online presence.</t>
      <t>This document offers a number of operational considerations recommendations for operating this online presence.</t>
      <t>The first aspect is the device identity in the form of an <xref target="ieee802-1AR"/>
certificate that is installed at manufacturing time in the device.
Some of the background for the operational considerations of building this public key infrastructure is described in <xref target="I-D.irtf-t2trg-taxonomy-manufacturer-anchors"/>.</t>
      <t>The second aspect is the use of the Manufacturer Authorized Signing Authority
(MASA), as described in <xref target="RFC8995"/> section 2.5.4.   The device needs to have
the MASA anchor built in; the exact nature of the anchor is open to a number of
possibilities which are explained in this document.
This document primarily deals with a number of options for architecting the security of the MASA relationship.</t>
      <t>There are some additional considerations for a MASA that deals with
constrained vouchers as described in <xref target="I-D.ietf-anima-constrained-voucher"/>.
In particular in the COSE signed version, there may be no PKI structure included in the voucher mechanism, so cryptographic hygiene needs a different set of tradeoffs.</t>
    </section>
    <section anchor="operational-considerations-for-manufacturer-authorized-signing-authority-masa">
      <name>Operational Considerations for Manufacturer Authorized Signing Authority (MASA)</name>
      <t>The manufacturer needs to make a Signing Authority available to new owners so that
they may obtain <xref target="RFC8366"/> format vouchers to prove ownership.  This section initially
assumes that the manufacturer will provide this Authority internally, but
subsequent sections deal with some adjustments when the authority is
externally run.</t>
      <t>The MASA is a public facing web system.  It will be subject to network load from
legitimate users when a network is bootstrapped for the first time.
The legitimate load will be proportional to sales.</t>
      <t>The MASA will also be subject to a malicious load.</t>
      <section anchor="deflecting-unwanted-tls-traffic-with-client-certificates">
        <name>Deflecting unwanted TLS traffic with Client Certificates</name>
        <t>One way to deflect unwanted users from the application framework backend is to require TLS Client Certificates for  all connections.
As described in Section 5.5.4 of <xref target="RFC8995"/>, the Registrar may be authenticated with a TLS Client Certificate.</t>
        <t>This offloads much of the defense to what is typically a hardware TLS termination system.
This can be effective even if the hardware is unable to do the actual validation of the TLS Client Certificate, as validation of the certificate occurs prior to any communication with the application server.</t>
        <t><xref target="I-D.ietf-httpbis-client-cert-field"/> is a critical addition to any use of TLS offload, as the certificate used needs to be communicated to the application framework for detailed authorization.</t>
        <t>This increases the effort requires for attackers, and if they repeat the same certificate then it becomes easier to reject such attackers if a list of invalid/unwanted clients is cached.</t>
        <t>The use of a client certificate forces attackers to generate new key pairs and certificates for each attack.</t>
      </section>
      <section anchor="web-framework-architecture">
        <name>Web framework architecture</name>
        <t>Web framework three-tier mechanisms are a very common architecture.
See <xref target="threetier"/> for an overview.
There are Internet scale frameworks exist for Ruby (RubyOnRails), Python (Django), Java (J2EE),  GO, PHP and others.
The methods of deploying them and dealing with expected scale are common in most enterprise IT departments.</t>
        <t>Consideration should be made to deploying the presentation layer into multiple data centers in order to provide resiliency against distributed denial of service (DDoS) attacks that affect all tenants of that data center.</t>
        <t>Consideration should also be given to the use of a cloud front end to mitigate attacks, however, such a system needs to be able to securely transmit the TLS Client Certificates, if the MASA wants to identify Registrars at the TLS connection time.</t>
        <t>The middle (application) tier needs to be scalable, but it is unlikely that it needs to scale very much on a per-minute or even per-hour basis.
It is probably easier and more reliable to have application tiers do database operations across the Internet or via VPN to a single location database cluster than it is to handle asynchronous database operations resulting from geographically dispersed multi-master database systems.</t>
        <t>But, these are local design decisions which web deployment make on a regular basis.
The MASA functionality is not different than other public facing systems.</t>
        <t>The database tables that the MASA uses scale linearly with the number of products sold,
but as they are mostly read-only, they could be easily replicated in a read-only manner from a sales database.</t>
        <t>Direct integration with a sales system could be considered, but would involve a more significant security impact analysis, so a process where the sales data is extracted to a less sensitive system is RECOMMENDED.</t>
        <t>In any case, the manufacturer SHOULD plan for a situation where the manufacturer is no longer able or interested in running the Authority: this does not have to an unhappy situation!
While the case of the manufacturer going out of business is discussed in <xref target="escrow"/>, there are more happy events which should be prepared for.
For instance, if a manufacturer goes through a merge or acquisition and it makes sense to consolidate the Signing Authority in another part of the organization.</t>
        <t>Business continuity plan should include backing up the voucher signing keys.
This may involve multiple Hardware Security Modules, and secret splitting mechanisms
SHOULD be employed.
For large value items, customers are going to need to review the plan as part of their contingency audits.
The document <xref target="I-D.irtf-t2trg-taxonomy-manufacturer-anchors"/> can provide some common basis for this kind of evaluation.</t>
        <t>The trust anchors needs to validate <xref target="RFC8366"/> vouchers will typically be part of the firmware loaded inot the devie firmware.</t>
        <t>There are many models to manage these trust anchors, but in order having only a single key, a PKI infrastructure is appropriate, but not required.</t>
        <t>On constrained devices without code space to parse and validate a public key certificate chain require different considerations, a single key may be necessary.
This document does not (yet) provide appropriate considerations for that case.</t>
        <t>What follows are a number of ways to construct a resilient PKI to sign vouchers.</t>
      </section>
      <section anchor="self-contained-multi-product-masa-no-pki">
        <name>Self-contained multi-product MASA, no PKI</name>
        <t>The simplest situation is to create a self-signed End Entity certificate.
That is, a public/private key pair.
The certificate/public key is embedded in the products to validate vouchers, and the private part is kept online to sign vouchers.</t>
        <t>This situation has very low security against theft of a key from the MASA.
Such a theft would result in recall of all products that have not yet been onboarded.
It is very simple to operate.</t>
      </section>
      <section anchor="self-contained-multi-product-masa-with-one-level-pki">
        <name>Self-contained multi-product MASA, with one-level PKI</name>
        <t>A simple way is to create an new offline certification authority (CA), have it periodically sign a new End-Entity (EE) identity's certificate.
This End-Entity identity has a private key kept online, and it uses that to sign voucher requests.
Note that the entity used to sign <xref target="RFC8366"/> format vouchers does not need to be a certificate authority.</t>
        <t>If the public key of this offline CA is then built-in to the firmware of the device,
then the devices do not need any further anchors.</t>
        <t>There is no requirement for this CA to be signed by any other certification authority.
That is, it may be a root CA.
There is also no prohibition against it.</t>
        <t>If this offline CA signs any other certificates, then it is important that the device know which End-Entity certificates may sign vouchers.
This is an authorization step, and it may be accomplished it a number of ways:</t>
        <ol spacing="normal" type="1"><li>
            <t>the Distinguished Name (DN) of the appropriate End-Entity certificate can be built-in to the firmware</t>
          </li>
          <li>
            <t>a particular policy OID may be included in certificates intended to sign vouchers</t>
          </li>
        </ol>
        <t>A voucher created for one product could be used to sign a voucher for another product.
This situation is also mitigated by never repeating serialNumbers across product lines.</t>
        <t>An End-Entity certificate used to sign the voucher is included in the certificate set in the CMS structure that is used to sign the voucher.
The root CA's trust anchor should <em>also</em> be included, even though it is self-signed, as this permits auditing elements in a Registrar to validate the End-Entity Certificate.</t>
        <t>The inclusion of the full chain also supports a Trust-on-First-Use (TOFU) workflow for the manager of the Registrar: they can see the trust anchor chain and can compare a fingerprint displayed on their screen with one that could be included in packaging or other sales channel information.</t>
        <t>When building the MASA public key into a device, only the public key contents matter, not the structure of the self-signed certificate itself.
Using only the public key enables a MASA architecture to evolve from a single self-contained system into a more complex architecture later on.</t>
      </section>
      <section anchor="perproduct">
        <name>Self-contained per-product MASA</name>
        <t>A simple enhancement to the previous scenario is to have a unique MASA offline key for each product line.
This has a few advantages:</t>
        <ul spacing="normal">
          <li>
            <t>if the private keys are kept separately (under different encryption keys), then compromise of a single product lines MASA does not compromise all products.</t>
          </li>
          <li>
            <t>if a product line is sold to another entity, or if it has to go through an escrow process due to the product going out of production, then the process affects only a single product line.</t>
          </li>
          <li>
            <t>it is safe to have serialNumber duplicated among different product lines since a voucher for one product line would not validate on another product line.</t>
          </li>
        </ul>
        <t>The disadvantage is that it requires a private key to be stored per product line, and most large OEMs have many dozens of product lines.
If the keys are stored in a single Hardware Security Module (HSM), with the access to it split across the same parties, then some of the cryptographic advantages of different private keys will go away, as a compromise of one key likely compromises them all.
Given a HSM, the most likely way a key is compromised is by an attacker getting authorization on the HSM through theft or coercion.</t>
        <t>The use of per-product MASA signing keys is encouraged.</t>
      </section>
      <section anchor="per-product-masa-keys-intertwined-with-idevid-pki">
        <name>Per-product MASA keys intertwined with IDevID PKI</name>
        <t>The IDevID certificate chain (the intermediate CA and root CA that signed the IDevID certificate) should be included in the device firmware so that they can be communicated during the BRSKI-EST exchange.</t>
        <t>Since they are already present, could they be used as the MASA trust anchor as well?</t>
        <t>In order to do this there is an attack that needs to mitigated.
Since the root-CA that creates IDevIDs and the root-CA that creates vouchers are the same, when validating a voucher, a pledge needs to make sure that it is signed by a key authorized to sign vouchers.
In other scenarios any key signed by the voucher-signing-root-CA would be valid, but in this scenario that would also include any IDevID, such as would be installed in any other device.
Without an additional signal as to which keys can sign vouchers, and which keys are just IDevID keys, then it would be possible to sign vouchers with any IDevID private key, rather than just the designated voucher-signing key.
An attacker that could extract a private key from even one instance of a product, could use that to sign vouchers, and impersonate the MASA.</t>
        <t>The challenge with combining it into the IDevID PKI is making sure that only an authorized entity can sign the vouchers.
The solution is that it can not be the same intermediate CA that is used to sign the IDevID, since that CA should have the authority to sign vouchers.</t>
        <t>The PKI root CA therefore needs to sign an intermediate CA, or End-Entity certificate with an extension OID that is specific for Voucher Authorization.
This is easy to do as policy OIDs can be created from Private Enterprise Numbers.
There is no need for standardization, as the entity doing the signing is also creating the verification code.
If the entire PKI operation was outsource, then there would be a benefit for standardization.</t>
      </section>
      <section anchor="rotatingkeys">
        <name>Rotating MASA authorization keys</name>
        <t>As a variation of the scenario described in <xref target="perproduct"/>, there could be multiple Signing Authority keys per product line.
They could be rotated though in some deterministic order.
For instance, serial numbers ending in 0 would have MASA key 0 embedded in them at manufacturing time.
The asset database would have to know which key that corresponded to, and it would have to produce vouchers using that key.</t>
        <t>There are significant downsides to this mechanism:</t>
        <ul spacing="normal">
          <li>
            <t>all of the MASA signing keys need to be online and available in order to respond to any voucher request</t>
          </li>
          <li>
            <t>it is necessary to keep track of which device trust which key in the asset database</t>
          </li>
        </ul>
        <t>There is no obvious advantage to doing this if all the MASA signing private keys are kept in the same device, under control of the same managers.
But if the keys are spread out to multiple locations and are under control of different people, then there may be some advantage.
A single MASA signing authority key compromise does not cause a recall of all devices, but only the portion that had that key embedded in it.</t>
        <t>The relationship between signing key and device could be temporal: all devices made on Tuesday could have the same key, there could be hundreds of keys, each one used only for a few hundred devices.
There are many variations possible.</t>
        <t>The major advantage comes with the COSE signed constrained-vouchers described in <xref target="I-D.ietf-anima-constrained-voucher"/>.
In this context, where there isn't space in the voucher for a certificate chain, nor is there code in the device to validate a certificate chain,  a raw public key can sign the voucher.
The (public) key used to sign is embedded directly in the firmware of each device without the benefit of any public key infrastructure, which would allow indirection of the key.</t>
      </section>
    </section>
    <section anchor="operational-considerations-for-constrained-masa">
      <name>Operational Considerations for Constrained MASA</name>
      <t>TBD</t>
    </section>
    <section anchor="operational-considerations-for-creating-nonceless-vouchers">
      <name>Operational Considerations for creating Nonceless vouchers</name>
      <t>TBD</t>
    </section>
    <section anchor="escrow">
      <name>Business Continuity and Escow Considerations</name>
      <t>A number of jurisdictions have legal requirements for businesses to have contingency plans in order to continue operating after an incident or disaster.
Specifications include <xref target="iso22301_2019"/>, but the problem of continuity goes back over 40 years.</t>
      <t>The <xref target="holman2012"/> document defined an eight tier process to understand how data would be backed up.
Tier 0 is "no off-site data", and would be inappropriate for the MASA's signing key.
The question as to how much delay (downtime) is tolerable during a disaster for activating new devices.
The consideration should depend upon the type of the device, and what kind of disasters are being planned for.
Given current technologies for replicating databases online, a tier-4 ("Point-in-time copies") or better solution may be quite economically deployed.</t>
      <t>A key aspect of the MASA is that it was designed as a component that can be outsourced to a third party, and this third party can leverage economies of scale to provide more resilient systems at much lower costs.</t>
      <t>The PKI components that are used to provision the IDevID certificiates into new devices need to be operational only when the factory that produces the devices is active.
The business continuity planning needs to include provision for backing up the private keys used within the PKI.
It may be enough to backup just the root CA key: the rest of the levels of the PKI can be regenerated in another location if necessary.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>YYY</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>ZZZ</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document makes no IANA requests.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Hello.</t>
    </section>
    <section anchor="changelog">
      <name>Changelog</name>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8366" target="https://www.rfc-editor.org/info/rfc8366" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8366.xml">
          <front>
            <title>A Voucher Artifact for Bootstrapping Protocols</title>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
            <author fullname="T. Eckert" initials="T." surname="Eckert"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>This document defines a strategy to securely assign a pledge to an owner using an artifact signed, directly or indirectly, by the pledge's manufacturer. This artifact is known as a "voucher".</t>
              <t>This document defines an artifact format as a YANG-defined JSON document that has been signed using a Cryptographic Message Syntax (CMS) structure. Other YANG-derived formats are possible. The voucher artifact is normally generated by the pledge's manufacturer (i.e., the Manufacturer Authorized Signing Authority (MASA)).</t>
              <t>This document only defines the voucher artifact, leaving it to other documents to describe specialized protocols for accessing it.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8366"/>
          <seriesInfo name="DOI" value="10.17487/RFC8366"/>
        </reference>
        <reference anchor="I-D.ietf-anima-constrained-voucher" target="https://datatracker.ietf.org/doc/html/draft-ietf-anima-constrained-voucher-30">
          <front>
            <title>Constrained Bootstrapping Remote Secure Key Infrastructure (cBRSKI)</title>
            <author initials="M." surname="Richardson" fullname="Michael Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author initials="P." surname="Van der Stok" fullname="Peter Van der Stok">
              <organization>vanderstok consultancy</organization>
            </author>
            <author initials="P." surname="Kampanakis" fullname="Panos Kampanakis">
              <organization>Cisco Systems</organization>
            </author>
            <author initials="E." surname="Dijk" fullname="Esko Dijk">
              <organization>IoTconsultancy.nl</organization>
            </author>
            <date month="February" day="27" year="2026"/>
            <abstract>
              <t>   This document defines the Constrained Bootstrapping Remote Secure Key
   Infrastructure (cBRSKI) protocol, which provides a solution for
   secure zero-touch onboarding of resource-constrained (IoT) devices
   into the network of a domain owner.  This protocol is designed for
   constrained networks, which may have limited data throughput or may
   experience frequent packet loss. cBRSKI is a variant of the BRSKI
   protocol, which uses an artifact signed by the device manufacturer
   called the "voucher" which enables a new device and the owner's
   network to mutually authenticate.  While the BRSKI voucher data is
   encoded in JSON, cBRSKI uses a compact CBOR-encoded voucher.  The
   BRSKI voucher data definition is extended with new data types that
   allow for smaller voucher sizes.  The Enrollment over Secure
   Transport (EST) protocol, used in BRSKI, is replaced with EST-over-
   CoAPS; and HTTPS used in BRSKI is replaced with DTLS-secured CoAP
   (CoAPS).  This document Updates RFC 8995 and RFC 9148.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-constrained-voucher-30"/>
        </reference>
        <reference anchor="RFC8995" target="https://www.rfc-editor.org/info/rfc8995" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8995.xml">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="M. Pritikin" initials="M." surname="Pritikin"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="T. Eckert" initials="T." surname="Eckert"/>
            <author fullname="M. Behringer" initials="M." surname="Behringer"/>
            <author fullname="K. Watsen" initials="K." surname="Watsen"/>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane. To do this, a Secure Key Infrastructure is bootstrapped. This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline. We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device. The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="I-D.richardson-anima-registrar-considerations" target="https://datatracker.ietf.org/doc/html/draft-richardson-anima-registrar-considerations-09" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.richardson-anima-registrar-considerations.xml">
          <front>
            <title>Operational Considerations for BRSKI Registrar</title>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Wei Pan" initials="W." surname="Pan">
              <organization>Huawei Technologies</organization>
            </author>
            <date day="22" month="January" year="2025"/>
            <abstract>
              <t>This document describes a number of operational modes that a BRSKI Registration Authority (Registrar) may take on. Each mode is defined, and then each mode is given a relevance within an over applicability of what kind of organization the Registrar is deployed into. This document does not change any protocol mechanisms. This document includes operational advice about avoiding unwanted consequences.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-richardson-anima-registrar-considerations-09"/>
        </reference>
        <reference anchor="I-D.moskowitz-ecdsa-pki" target="https://datatracker.ietf.org/doc/html/draft-moskowitz-ecdsa-pki-10" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.moskowitz-ecdsa-pki.xml">
          <front>
            <title>Guide for building an ECC pki</title>
            <author fullname="Robert Moskowitz" initials="R." surname="Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Liang Xia" initials="L." surname="Xia">
              <organization>Huawei</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date day="31" month="January" year="2021"/>
            <abstract>
              <t>This memo provides a guide for building a PKI (Public Key Infrastructure) using openSSL. All certificates in this guide are ECDSA, P-256, with SHA256 certificates. Along with common End Entity certificates, this guide provides instructions for creating IEEE 802.1AR iDevID Secure Device certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-moskowitz-ecdsa-pki-10"/>
        </reference>
        <reference anchor="threetier" target="https://en.wikipedia.org/wiki/Multitier_architecture">
          <front>
            <title>Multitier architecture</title>
            <author initials="" surname="Wikipedia">
              <organization/>
            </author>
            <date year="2019" month="December"/>
          </front>
        </reference>
        <reference anchor="ieee802-1AR" target="https://standards.ieee.org/ieee/802.1AR/6995/">
          <front>
            <title>IEEE 802.1AR Secure Device Identifier</title>
            <author initials="" surname="IEEE Standard">
              <organization/>
            </author>
            <date year="2009"/>
          </front>
        </reference>
        <reference anchor="I-D.irtf-t2trg-taxonomy-manufacturer-anchors" target="https://datatracker.ietf.org/doc/html/draft-irtf-t2trg-taxonomy-manufacturer-anchors-15" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.irtf-t2trg-taxonomy-manufacturer-anchors.xml">
          <front>
            <title>A Taxonomy of operational security considerations for manufacturer installed keys and Trust Anchors</title>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date day="14" month="March" year="2026"/>
            <abstract>
              <t>This document provides a taxonomy of methods used by manufacturers of silicon and devices to secure private keys and public trust anchors. This deals with two related activities: how trust anchors and private keys are installed into devices during manufacturing, and how the related manufacturer held private keys are secured against disclosure. This document does not evaluate the different mechanisms, but rather just serves to name them in a consistent manner in order to aid in communication.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-t2trg-taxonomy-manufacturer-anchors-15"/>
        </reference>
        <reference anchor="I-D.ietf-httpbis-client-cert-field" target="https://datatracker.ietf.org/doc/html/draft-ietf-httpbis-client-cert-field-06" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-httpbis-client-cert-field.xml">
          <front>
            <title>Client-Cert HTTP Header Field</title>
            <author fullname="Brian Campbell" initials="B." surname="Campbell">
              <organization>Ping Identity</organization>
            </author>
            <author fullname="Mike Bishop" initials="M." surname="Bishop">
              <organization>Akamai</organization>
            </author>
            <date day="17" month="March" year="2023"/>
            <abstract>
              <t>This document describes HTTP extension header fields that allow a TLS terminating reverse proxy to convey the client certificate information of a mutually authenticated TLS connection to the origin server in a common and predictable manner.</t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-httpbis-client-cert-field-06"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7030" target="https://www.rfc-editor.org/info/rfc7030" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7030.xml">
          <front>
            <title>Enrollment over Secure Transport</title>
            <author fullname="M. Pritikin" initials="M." role="editor" surname="Pritikin"/>
            <author fullname="P. Yee" initials="P." role="editor" surname="Yee"/>
            <author fullname="D. Harkins" initials="D." role="editor" surname="Harkins"/>
            <date month="October" year="2013"/>
            <abstract>
              <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport. This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates. It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7030"/>
          <seriesInfo name="DOI" value="10.17487/RFC7030"/>
        </reference>
        <reference anchor="BedOfNails" target="https://en.wikipedia.org/wiki/In-circuit_test#Bed_of_nails_tester">
          <front>
            <title>In-circuit test</title>
            <author>
              <organization>Wikipedia</organization>
            </author>
            <date year="2019"/>
          </front>
        </reference>
        <reference anchor="RambusCryptoManager" target="https://www.rambus.com/qualcomm-licenses-rambus-cryptomanager-key-and-feature-management-security-solution/">
          <front>
            <title>Qualcomm Licenses Rambus CryptoManager Key and Feature Management Security Solution</title>
            <author>
              <organization>Qualcomm press release</organization>
            </author>
            <date year="2014"/>
          </front>
        </reference>
        <reference anchor="kskceremony" target="https://www.iana.org/dnssec/dps/zsk-operator/dps-zsk-operator-v2.0.pdf">
          <front>
            <title>DNSSEC Practice Statement for the Root Zone ZSK Operator</title>
            <author>
              <organization>Verisign</organization>
            </author>
            <date year="2017"/>
          </front>
        </reference>
        <reference anchor="rootkeyceremony" target="https://cryptography.fandom.com/wiki/Root_Key_Ceremony">
          <front>
            <title>Root Key Ceremony, Cryptography Wiki</title>
            <author>
              <organization>Community</organization>
            </author>
            <date year="2020" month="April"/>
          </front>
        </reference>
        <reference anchor="keyceremony2" target="http://www.digi-sign.com/compliance/key%20ceremony/index">
          <front>
            <title>SAS 70 Key Ceremony</title>
            <author>
              <organization>Digi-Sign</organization>
            </author>
            <date year="2020" month="April"/>
          </front>
        </reference>
        <reference anchor="nistsp800-57" target="https://csrc.nist.gov/publications/detail/sp/800-57-part-1/rev-4/final">
          <front>
            <title>SP 800-57 Part 1 Rev. 4 Recommendation for Key Management, Part 1: General</title>
            <author>
              <organization>NIST</organization>
            </author>
            <date year="2016" month="January" day="01"/>
          </front>
        </reference>
        <reference anchor="iso22301_2019" target="https://www.iso.org/standard/75106.html">
          <front>
            <title>ISO 22301: Societal security — Business continuity management systems — Requirements</title>
            <author>
              <organization>ISO</organization>
            </author>
            <date year="2019" month="January" day="01"/>
          </front>
        </reference>
        <reference anchor="holman2012" target="https://share.confex.com/share/118/webprogram/Handout/Session10387/Session%2010387%20Business%20Continuity%20Soloution%20Selection%20Methodology%2003-7-2012.pdf">
          <front>
            <title>A Business Continuity Solution Selection Methodology</title>
            <author initials="E." surname="Holman" fullname="Ellis Holman">
              <organization>IBM Corp</organization>
            </author>
            <date year="2012" month="March" day="13"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 369?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
