<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.6.4 (Ruby 2.6.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-richardson-anima-masa-considerations-07" category="std" consensus="true" tocInclude="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.12.4 -->
  <front>
    <title abbrev="MASA Considerations">Operatonal Considerations for Voucher infrastructure for BRSKI MASA</title>
    <seriesInfo name="Internet-Draft" value="draft-richardson-anima-masa-considerations-07"/>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <author initials="W." surname="Pan" fullname="Wei Pan">
      <organization>Huawei Technologies</organization>
      <address>
        <email>william.panwei@huawei.com</email>
      </address>
    </author>
    <date year="2022" month="July" day="11"/>
    <area>Internet</area>
    <workgroup>anima Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document describes a number of operational modes that a
BRSKI Manufacturer Authorized Signing Authority (MASA) may take on.</t>
      <t>Each mode is defined, and then each mode is given a relevance
within an over applicability of what kind of organization the
MASA is deployed into.  This document does not change any
protocol mechanisms.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="RFC8995"/> introduces a mechanism for
new devices (called pledges) to be onboarded into a network without
intervention from an expert operator.</t>
      <t>This mechanism leverages the pre-existing relationship between a device and
the manufacturer that built the device.  There are two aspects to this
relationship: the provision of an identity for the device by the
manufacturer (the IDevID), and a mechanism which convinces the device to
trust the new owner (the <xref target="RFC8366"/> voucher).</t>
      <t>The manufacturer, or their designate, is involved in both aspects of this
process.  This requires the manufacturer (or designate) to maintain on online presence.</t>
      <t>This document offers a number of operational considerations recommendations for operating this online presence.</t>
      <t>The first aspect is the device identity in the form of an <xref target="ieee802-1AR"/>
certificate that is installed at manufacturing time in the device.
Some of the background for the operational considerations of building this public key infrastructure is described in <xref target="I-D.richardson-t2trg-idevid-considerations"/>.</t>
      <t>The second aspect is the use of the Manufacturer Authorized Signing Authority
(MASA), as described in <xref target="RFC8995"/> section 2.5.4.   The device needs to have
the MASA anchor built in; the exact nature of the anchor is open to a number of
possibilities which are explained in this document.
This document primarily deals with a number of options for architecting the security of the MASA relationship.</t>
      <t>There are some additional considerations for a MASA that deals with
constrained vouchers as described in <xref target="I-D.ietf-anima-constrained-voucher"/>.
In particular in the COSE signed version, there may be no PKI structure included in the voucher mechanism, so cryptographic hygiene needs a different set of tradeoffs.</t>
    </section>
    <section anchor="operational-considerations-for-manufacturer-authorized-signing-authority-masa">
      <name>Operational Considerations for Manufacturer Authorized Signing Authority (MASA)</name>
      <t>The manufacturer needs to make a Signing Authority available to new owners so that
they may obtain <xref target="RFC8366"/> format vouchers to prove ownership.  This section initially
assumes that the manufacturer will provide this Authority internally, but
subsequent sections deal with some adjustments when the authority is
externally run.</t>
      <t>The MASA is a public facing web system.  It will be subject to network load from
legitimate users when a network is bootstrapped for the first time.
The legitimate load will be proportional to sales.</t>
      <t>The MASA will also be subject to a malicious load.</t>
      <section anchor="deflecting-unwanted-tls-traffic-with-client-certificates">
        <name>Deflecting unwanted TLS traffic with Client Certificates</name>
        <t>One way to deflect unwanted users from the application framework backend is to require TLS Client Certificates for  all connections.
As described in <xref section="5.5.4" sectionFormat="of" target="RFC8995"/>, the Registrar may be authenticated with a TLS Client Certificate.</t>
        <t>This offloads much of the defense to what is typically a hardware TLS termination system.
This can be effective even if the hardware is unable to do the actual validation of the TLS Client Certificate, as validation of the certificate occurs prior to any communication with the application server.</t>
        <t>This increases the effort requires for attackers, and if they repeat the same certificate then it becomes easier to reject such attackers if a list of invalid/unwanted clients is cached.</t>
        <t>The use of a client certificate forces attackers to generate new key pairs and certificates for each attack.</t>
      </section>
      <section anchor="web-framework-architecture">
        <name>Web framework architecture</name>
        <t>Web framework three-tier mechanisms are a very common architecture.
See <xref target="threetier"/> for an overview.
There are Internet scale frameworks exist for Ruby (RubyOnRails), Python (Django), Java (J2EE),  GO, PHP and others.
The methods of deploying them and dealing with expected scale are common in most enterprise IT departments.</t>
        <t>Consideration should be made to deploying the presentation layer into multiple data centers in order to provide resiliency against distributed denial of service (DDoS) attacks that affect all tenants of that data center.</t>
        <t>Consideration should also be given to the use of a cloud front end to mitigate attacks, however, such a system needs to be able to securely transmit the TLS Client Certificates, if the MASA wants to identify Registrars at the TLS connection time.</t>
        <t>The middle (application) tier needs to be scalable, but it is unlikely that it needs to scale very much on a per-minute or even per-hour basis.
It is probably easier and more reliable to have application tiers do database operations across the Internet or via VPN to a single location database cluster than it is to handle asynchronous database operations resulting from geographically dispersed multi-master database systems.</t>
        <t>But, these are local design decisions which web deployment make on a regular basis.
The MASA functionality is not different than other public facing systems.</t>
        <t>The database tables that the MASA uses scale linearly with the number of products sold,
but as they are mostly read-only, they could be easily replicated in a read-only manner from a sales database.</t>
        <t>Direct integration with a sales system could be considered, but would involve a more significant security impact analysis, so a process where the sales data is extracted to a less sensitive system is RECOMMENDED.</t>
        <t>In any case, the manufacturer SHOULD plan for a situation where the manufacturer is no longer able or interested in running the Authority: this does not have to an unhappy situation!
While the case of the manufacturer going out of business is discussed in <xref target="escrow"/>, there are more happy events which should be prepared for.
For instance, if a manufacturer goes through a merge or acquisition and it makes sense to consolidate the Signing Authority in another part of the organization.</t>
        <t>Business continuity plan should include backing up the voucher signing keys.
This may involve multiple Hardware Security Modules, and secret splitting mechanisms
SHOULD be employed.
For large value items, customers are going to need to review the plan as part of their contingency audits.
The document <xref target="I-D.richardson-t2trg-idevid-considerations"/> can provide some common basis for this kind of evaluation.</t>
        <t>The trust anchors needs to validate <xref target="RFC8366"/> vouchers will typically be part of the firmware loaded inot the devie firmware.</t>
        <t>There are many models to manage these trust anchors, but in order having only a single key, a PKI infrastructure is appropriate, but not required.</t>
        <t>On constrained devices without code space to parse and validate a public key certificate chain require different considerations, a single key may be necessary.
This document does not (yet) provide appropriate considerations for that case.</t>
        <t>What follows are a number of ways to construct a resilient PKI to sign vouchers.</t>
      </section>
      <section anchor="self-contained-multi-product-masa-no-pki">
        <name>Self-contained multi-product MASA, no PKI</name>
        <t>The simplest situation is to create a self-signed End Entity certificate.
That is, a public/private key pair.
The certificate/public key is embedded in the products to validate vouchers, and the private part is kept online to sign vouchers.</t>
        <t>This situation has very low security against theft of a key from the MASA.
Such a theft would result in recall of all products that have not yet been onboarded.
It is very simple to operate.</t>
      </section>
      <section anchor="self-contained-multi-product-masa-with-one-level-pki">
        <name>Self-contained multi-product MASA, with one-level PKI</name>
        <t>A simple way is to create an new offline certification authority (CA), have it periodically sign a new End-Entity (EE) identity's certificate.
This End-Entity identity has a private key kept online, and it uses that to sign voucher requests.
Note that the entity used to sign <xref target="RFC8366"/> format vouchers does not need to be a certificate authority.</t>
        <t>If the public key of this offline CA is then built-in to the firmware of the device,
then the devices do not need any further anchors.</t>
        <t>There is no requirement for this CA to be signed by any other certification authority.
That is, it may be a root CA.
There is also no prohibition against it.</t>
        <t>If this offline CA signs any other certificates, then it is important that the device know which End-Entity certificates may sign vouchers.
This is an authorization step, and it may be accomplished it a number of ways:</t>
        <ol spacing="normal" type="1"><li>the Distinguished Name (DN) of the appropriate End-Entity certificate can be built-in to the firmware</li>
          <li>a particular policy OID may be included in certificates intended to sign vouchers</li>
        </ol>
        <t>A voucher created for one product could be used to sign a voucher for another product.
This situation is also mitigated by never repeating serialNumbers across product lines.</t>
        <t>An End-Entity certificate used to sign the voucher is included in the certificate set in the CMS structure that is used to sign the voucher.
The root CA's trust anchor should <em>also</em> be included, even though it is self-signed, as this permits auditing elements in a Registrar to validate the End-Entity Certificate.</t>
        <t>The inclusion of the full chain also supports a Trust-on-First-Use (TOFU) workflow for the manager of the Registrar: they can see the trust anchor chain and can compare a fingerprint displayed on their screen with one that could be included in packaging or other sales channel information.</t>
        <t>When building the MASA public key into a device, only the public key contents matter, not the structure of the self-signed certificate itself.
Using only the public key enables a MASA architecture to evolve from a single self-contained system into a more complex architecture later on.</t>
      </section>
      <section anchor="perproduct">
        <name>Self-contained per-product MASA</name>
        <t>A simple enhancement to the previous scenario is to have a unique MASA offline key for each product line.
This has a few advantages:</t>
        <ul spacing="normal">
          <li>if the private keys are kept separately (under different encryption keys), then compromise of a single product lines MASA does not compromise all products.</li>
          <li>if a product line is sold to another entity, or if it has to go through an escrow process due to the product going out of production, then the process affects only a single product line.</li>
          <li>it is safe to have serialNumber duplicated among different product lines since a voucher for one product line would not validate on another product line.</li>
        </ul>
        <t>The disadvantage is that it requires a private key to be stored per product line, and most large OEMs have many dozens of product lines.
If the keys are stored in a single Hardware Security Module (HSM), with the access to it split across the same parties, then some of the cryptographic advantages of different private keys will go away, as a compromise of one key likely compromises them all.
Given a HSM, the most likely way a key is compromised is by an attacker getting authorization on the HSM through theft or coercion.</t>
        <t>The use of per-product MASA signing keys is encouraged.</t>
      </section>
      <section anchor="per-product-masa-keys-intertwined-with-idevid-pki">
        <name>Per-product MASA keys intertwined with IDevID PKI</name>
        <t>The IDevID certificate chain (the intermediate CA and root CA that signed the IDevID certificate) should be included in the device firmware so that they can be communicated during the BRSKI-EST exchange.</t>
        <t>Since they are already present, could they be used as the MASA trust anchor as well?</t>
        <t>In order to do this there is an attack that needs to mitigated.
Since the root-CA that creates IDevIDs and the root-CA that creates vouchers are the same, when validating a voucher, a pledge needs to make sure that it is signed by a key authorized to sign vouchers.
In other scenarios any key signed by the voucher-signing-root-CA would be valid, but in this scenario that would also include any IDevID, such as would be installed in any other device.
Without an additional signal as to which keys can sign vouchers, and which keys are just IDevID keys, then it would be possible to sign vouchers with any IDevID private key, rather than just the designated voucher-signing key.
An attacker that could extract a private key from even one instance of a product, could use that to sign vouchers, and impersonate the MASA.</t>
        <t>The challenge with combining it into the IDevID PKI is making sure that only an authorized entity can sign the vouchers.
The solution is that it can not be the same intermediate CA that is used to sign the IDevID, since that CA should have the authority to sign vouchers.</t>
        <t>The PKI root CA therefore needs to sign an intermediate CA, or End-Entity certificate with an extension OID that is specific for Voucher Authorization.
This is easy to do as policy OIDs can be created from Private Enterprise Numbers.
There is no need for standardization, as the entity doing the signing is also creating the verification code.
If the entire PKI operation was outsource, then there would be a benefit for standardization.</t>
      </section>
      <section anchor="rotatingkeys">
        <name>Rotating MASA authorization keys</name>
        <t>As a variation of the scenario described in <xref target="perproduct"/>, there could be multiple Signing Authority keys per product line.
They could be rotated though in some deterministic order.
For instance, serial numbers ending in 0 would have MASA key 0 embedded in them at manufacturing time.
The asset database would have to know which key that corresponded to, and it would have to produce vouchers using that key.</t>
        <t>There are significant downsides to this mechanism:</t>
        <ul spacing="normal">
          <li>all of the MASA signing keys need to be online and available in order to respond to any voucher request</li>
          <li>it is necessary to keep track of which device trust which key in the asset database</li>
        </ul>
        <t>There is no obvious advantage to doing this if all the MASA signing private keys are kept in the same device, under control of the same managers.
But if the keys are spread out to multiple locations and are under control of different people, then there may be some advantage.
A single MASA signing authority key compromise does not cause a recall of all devices, but only the portion that had that key embedded in it.</t>
        <t>The relationship between signing key and device could be temporal: all devices made on Tuesday could have the same key, there could be hundreds of keys, each one used only for a few hundred devices.
There are many variations possible.</t>
        <t>The major advantage comes with the COSE signed constrained-vouchers described in <xref target="I-D.ietf-anima-constrained-voucher"/>.
In this context, where there isn't space in the voucher for a certificate chain, nor is there code in the device to validate a certificate chain,  a raw public key can sign the voucher.
The (public) key used to sign is embedded directly in the firmware of each device without the benefit of any public key infrastructure, which would allow indirection of the key.</t>
      </section>
    </section>
    <section anchor="operational-considerations-for-constrained-masa">
      <name>Operational Considerations for Constrained MASA</name>
      <t>TBD</t>
    </section>
    <section anchor="operational-considerations-for-creating-nonceless-vouchers">
      <name>Operational Considerations for creating Nonceless vouchers</name>
      <t>TBD</t>
    </section>
    <section anchor="escrow">
      <name>Business Continuity and Escow Considerations</name>
      <t>A number of jurisdictions have legal requirements for businesses to have contingency plans in order to continue operating after an incident or disaster.
Specifications include <xref target="iso22301_2019"/>, but the problem of continuity goes back over 40 years.</t>
      <t>The <xref target="holman2012"/> document defined an eight tier process to understand how data would be backed up.
Tier 0 is "no off-site data", and would be inappropriate for the MASA's signing key.
The question as to how much delay (downtime) is tolerable during a disaster for activating new devices.
The consideration should depend upon the type of the device, and what kind of disasters are being planned for.
Given current technologies for replicating databases online, a tier-4 ("Point-in-time copies") or better solution may be quite economically deployed.</t>
      <t>A key aspect of the MASA is that it was designed as a component that can be outsourced to a third party, and this third party can leverage economies of scale to provide more resilient systems at much lower costs.</t>
      <t>The PKI components that are used to provision the IDevID certificiates into new devices need to be operational only when the factory that produces the devices is active.
The business continuity planning needs to include provision for backing up the private keys used within the PKI.
It may be enough to backup just the root CA key: the rest of the levels of the PKI can be regenerated in another location if necessary.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>YYY</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>ZZZ</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document makes no IANA requests.</t>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Hello.</t>
    </section>
    <section anchor="changelog">
      <name>Changelog</name>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC8366" target="https://www.rfc-editor.org/info/rfc8366" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8366.xml">
          <front>
            <title>A Voucher Artifact for Bootstrapping Protocols</title>
            <author initials="K." surname="Watsen" fullname="K. Watsen">
              <organization/>
            </author>
            <author initials="M." surname="Richardson" fullname="M. Richardson">
              <organization/>
            </author>
            <author initials="M." surname="Pritikin" fullname="M. Pritikin">
              <organization/>
            </author>
            <author initials="T." surname="Eckert" fullname="T. Eckert">
              <organization/>
            </author>
            <date year="2018" month="May"/>
            <abstract>
              <t>This document defines a strategy to securely assign a pledge to an owner using an artifact signed, directly or indirectly, by the pledge's manufacturer.  This artifact is known as a "voucher".</t>
              <t>This document defines an artifact format as a YANG-defined JSON document that has been signed using a Cryptographic Message Syntax (CMS) structure.  Other YANG-derived formats are possible.  The voucher artifact is normally generated by the pledge's manufacturer (i.e., the Manufacturer Authorized Signing Authority (MASA)).</t>
              <t>This document only defines the voucher artifact, leaving it to other documents to describe specialized protocols for accessing it.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8366"/>
          <seriesInfo name="DOI" value="10.17487/RFC8366"/>
        </reference>
        <reference anchor="I-D.richardson-t2trg-idevid-considerations" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.richardson-t2trg-idevid-considerations.xml" target="https://www.ietf.org/archive/id/draft-richardson-t2trg-idevid-considerations-06.txt">
          <front>
            <title>A Taxonomy of operational security considerations for manufacturer installed keys and Trust Anchors</title>
            <author fullname="Michael Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date month="February" day="3" year="2022"/>
            <abstract>
              <t>   This document provides a taxonomy of methods used by manufacturers of
   silicon and devices to secure private keys and public trust anchors.
   This deals with two related activities: how trust anchors and private
   keys are installed into devices during manufacturing, and how the
   related manufacturer held private keys are secured against
   disclosure.

   This document does not evaluate the different mechanisms, but rather
   just serves to name them in a consistent manner in order to aid in
   communication.

   RFCEDITOR: please remove this paragraph.  This work is occurring in
   https://github.com/mcr/idevid-security-considerations

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-richardson-t2trg-idevid-considerations-06"/>
        </reference>
        <reference anchor="I-D.ietf-anima-constrained-voucher" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-anima-constrained-voucher.xml" target="https://www.ietf.org/archive/id/draft-ietf-anima-constrained-voucher-17.txt">
          <front>
            <title>Constrained Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author fullname="Michael Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Peter van der Stok">
              <organization>vanderstok consultancy</organization>
            </author>
            <author fullname="Panos Kampanakis">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Esko Dijk">
              <organization>IoTconsultancy.nl</organization>
            </author>
            <date month="April" day="7" year="2022"/>
            <abstract>
              <t>   This document defines the Constrained Bootstrapping Remote Secure Key
   Infrastructure (Constrained BRSKI) protocol, which provides a
   solution for secure zero-touch bootstrapping of resource-constrained
   (IoT) devices into the network of a domain owner.  This protocol is
   designed for constrained networks, which may have limited data
   throughput or may experience frequent packet loss.  Constrained BRSKI
   is a variant of the BRSKI protocol, which uses an artifact signed by
   the device manufacturer called the "voucher" which enables a new
   device and the owner's network to mutually authenticate.  While the
   BRSKI voucher is typically encoded in JSON, Constrained BRSKI defines
   a compact CBOR-encoded voucher.  The BRSKI voucher is extended with
   new data types that allow for smaller voucher sizes.  The Enrollment
   over Secure Transport (EST) protocol, used in BRSKI, is replaced with
   EST-over-CoAPS; and HTTPS used in BRSKI is replaced with CoAPS.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-constrained-voucher-17"/>
        </reference>
        <reference anchor="RFC8995" target="https://www.rfc-editor.org/info/rfc8995" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8995.xml">
          <front>
            <title>Bootstrapping Remote Secure Key Infrastructure (BRSKI)</title>
            <author initials="M." surname="Pritikin" fullname="M. Pritikin">
              <organization/>
            </author>
            <author initials="M." surname="Richardson" fullname="M. Richardson">
              <organization/>
            </author>
            <author initials="T." surname="Eckert" fullname="T. Eckert">
              <organization/>
            </author>
            <author initials="M." surname="Behringer" fullname="M. Behringer">
              <organization/>
            </author>
            <author initials="K." surname="Watsen" fullname="K. Watsen">
              <organization/>
            </author>
            <date year="2021" month="May"/>
            <abstract>
              <t>This document specifies automated bootstrapping of an Autonomic Control Plane.  To do this, a Secure Key Infrastructure is bootstrapped.  This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline.  We call this process the Bootstrapping Remote Secure Key Infrastructure (BRSKI) protocol. Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device.  The established secure connection can be used to deploy a locally issued certificate to the device as well.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8995"/>
          <seriesInfo name="DOI" value="10.17487/RFC8995"/>
        </reference>
        <reference anchor="I-D.richardson-anima-registrar-considerations" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.richardson-anima-registrar-considerations.xml" target="https://www.ietf.org/archive/id/draft-richardson-anima-registrar-considerations-05.txt">
          <front>
            <title>Operational Considerations for BRSKI Registrar</title>
            <author fullname="Michael Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Wei Pan">
              <organization>Huawei Technologies</organization>
            </author>
            <date month="March" day="6" year="2022"/>
            <abstract>
              <t>   This document describes a number of operational modes that a BRSKI
   Registration Authority (Registrar) may take on.

   Each mode is defined, and then each mode is given a relevance within
   an over applicability of what kind of organization the Registrar is
   deployed into.  This document does not change any protocol
   mechanisms.

   This document includes operational advice about avoiding unwanted
   consequences.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-richardson-anima-registrar-considerations-05"/>
        </reference>
        <reference anchor="I-D.moskowitz-ecdsa-pki" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.moskowitz-ecdsa-pki.xml" target="https://www.ietf.org/archive/id/draft-moskowitz-ecdsa-pki-10.txt">
          <front>
            <title>Guide for building an ECC pki</title>
            <author fullname="Robert Moskowitz">
              <organization>HTT Consulting</organization>
            </author>
            <author fullname="Henk Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Liang Xia">
              <organization>Huawei</organization>
            </author>
            <author fullname="Michael C. Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <date month="January" day="31" year="2021"/>
            <abstract>
              <t>   This memo provides a guide for building a PKI (Public Key
   Infrastructure) using openSSL.  All certificates in this guide are
   ECDSA, P-256, with SHA256 certificates.  Along with common End Entity
   certificates, this guide provides instructions for creating IEEE
   802.1AR iDevID Secure Device certificates.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-moskowitz-ecdsa-pki-10"/>
        </reference>
        <reference anchor="threetier" target="https://en.wikipedia.org/wiki/Multitier_architecture">
          <front>
            <title>Multitier architecture</title>
            <author initials="" surname="Wikipedia">
              <organization/>
            </author>
            <date year="2019" month="December"/>
          </front>
        </reference>
        <reference anchor="ieee802-1AR" target="http://standards.ieee.org/findstds/standard/802.1AR-2009.html">
          <front>
            <title>IEEE 802.1AR Secure Device Identifier</title>
            <author initials="" surname="IEEE Standard">
              <organization/>
            </author>
            <date year="2009"/>
          </front>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC7030" target="https://www.rfc-editor.org/info/rfc7030" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7030.xml">
          <front>
            <title>Enrollment over Secure Transport</title>
            <author initials="M." surname="Pritikin" fullname="M. Pritikin" role="editor">
              <organization/>
            </author>
            <author initials="P." surname="Yee" fullname="P. Yee" role="editor">
              <organization/>
            </author>
            <author initials="D." surname="Harkins" fullname="D. Harkins" role="editor">
              <organization/>
            </author>
            <date year="2013" month="October"/>
            <abstract>
              <t>This document profiles certificate enrollment for clients using Certificate Management over CMS (CMC) messages over a secure transport.  This profile, called Enrollment over Secure Transport (EST), describes a simple, yet functional, certificate management protocol targeting Public Key Infrastructure (PKI) clients that need to acquire client certificates and associated Certification Authority (CA) certificates.  It also supports client-generated public/private key pairs as well as key pairs generated by the CA.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7030"/>
          <seriesInfo name="DOI" value="10.17487/RFC7030"/>
        </reference>
        <reference anchor="BedOfNails" target="https://en.wikipedia.org/wiki/In-circuit_test#Bed_of_nails_tester">
          <front>
            <title>In-circuit test</title>
            <author>
              <organization>Wikipedia</organization>
            </author>
            <date year="2019"/>
          </front>
        </reference>
        <reference anchor="RambusCryptoManager" target="https://www.rambus.com/qualcomm-licenses-rambus-cryptomanager-key-and-feature-management-security-solution/">
          <front>
            <title>Qualcomm Licenses Rambus CryptoManager Key and Feature Management Security Solution</title>
            <author>
              <organization>Qualcomm press release</organization>
            </author>
            <date year="2014"/>
          </front>
        </reference>
        <reference anchor="kskceremony" target="https://www.iana.org/dnssec/dps/zsk-operator/dps-zsk-operator-v2.0.pdf">
          <front>
            <title>DNSSEC Practice Statement for the Root Zone ZSK Operator</title>
            <author>
              <organization>Verisign</organization>
            </author>
            <date year="2017"/>
          </front>
        </reference>
        <reference anchor="rootkeyceremony" target="https://cryptography.fandom.com/wiki/Root_Key_Ceremony">
          <front>
            <title>Root Key Ceremony, Cryptography Wiki</title>
            <author>
              <organization>Community</organization>
            </author>
            <date year="2020" month="April"/>
          </front>
        </reference>
        <reference anchor="keyceremony2" target="http://www.digi-sign.com/compliance/key%20ceremony/index">
          <front>
            <title>SAS 70 Key Ceremony</title>
            <author>
              <organization>Digi-Sign</organization>
            </author>
            <date year="2020" month="April"/>
          </front>
        </reference>
        <reference anchor="nistsp800-57" target="https://csrc.nist.gov/publications/detail/sp/800-57-part-1/rev-4/final">
          <front>
            <title>SP 800-57 Part 1 Rev. 4 Recommendation for Key Management, Part 1: General</title>
            <author>
              <organization>NIST</organization>
            </author>
            <date year="2016" month="January" day="01"/>
          </front>
        </reference>
        <reference anchor="iso22301_2019" target="https://www.iso.org/standard/75106.html">
          <front>
            <title>ISO 22301: Societal security — Business continuity management systems — Requirements</title>
            <author>
              <organization>ISO</organization>
            </author>
            <date year="2019" month="January" day="01"/>
          </front>
        </reference>
        <reference anchor="holman2012" target="https://share.confex.com/share/118/webprogram/Handout/Session10387/Session%2010387%20Business%20Continuity%20Soloution%20Selection%20Methodology%2003-7-2012.pdf">
          <front>
            <title>A Business Continuity Solution Selection Methodology</title>
            <author initials="E." surname="Holman" fullname="Ellis Holman">
              <organization>IBM Corp</organization>
            </author>
            <date year="2012" month="March" day="13"/>
          </front>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
