<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.15 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-acme-authority-token-tnauthlist-07" category="std">

  <front>
    <title abbrev="ACME TNAuthList Auth Token">TNAuthList profile of ACME Authority Token</title>

    <author initials="C." surname="Wendt" fullname="Chris Wendt">
      <organization>Comcast</organization>
      <address>
        <postal>
          <street>One Comcast Center</street>
          <city>Philadelphia, PA  19103</city>
          <country>USA</country>
        </postal>
        <email>chris-ietf@chriswendt.net</email>
      </address>
    </author>
    <author initials="D." surname="Hancock" fullname="David Hancock">
      <organization>Comcast</organization>
      <address>
        <email>davidhancock.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="M." surname="Barnes" fullname="Mary Barnes">
      <organization>Independent</organization>
      <address>
        <email>mary.ietf.barnes@gmail.com</email>
      </address>
    </author>
    <author initials="J." surname="Peterson" fullname="Jon Peterson">
      <organization>Neustar Inc.</organization>
      <address>
        <postal>
          <street>1800 Sutter St Suite 570</street>
          <city>Concord, CA  94520</city>
          <country>US</country>
        </postal>
        <email>jon.peterson@neustar.biz</email>
      </address>
    </author>

    <date year="2021" month="February" day="22"/>

    <area>sec</area>
    
    <keyword>STIR</keyword>

    <abstract>


<t>This document defines a profile of the Automated Certificate Management Environment (ACME) Authority Token for the automated and authorized creation of certificates for VoIP Telephone Providers to support Secure Telephony Identity (STI) using the TNAuthList defined by STI certificates.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t><xref target="RFC8555"/> is a mechanism for automating certificate management on the Internet. It enables administrative entities to prove effective control over resources like domain names, and automates the process of generating and issuing certificates. <xref target="I-D.ietf-acme-authority-token"/> extends ACME to provide a general method of extending the authority and authorization of entities to control a resource via a third party Token Authority beyond the Certification Authority.</t>

<t>This document addresses the STIR problem statement <xref target="RFC7340"/> which identifies the need for Internet credentials that can attest authority for the originator of VoIP calls in order to detect impersonation, which is currently an enabler for common attacks associated with illegal robocalling, voicemail hacking, and swatting.  These credentials are used to sign PASSporTs <xref target="RFC8225"/>, which can be carried in using protocols such as SIP <xref target="RFC8224"/>.  Currently, the only defined credentials for this purpose are the certificates specified in <xref target="RFC8226"/>.</t>

<t><xref target="RFC8226"/> describes certificate extensions suitable for associating telephone numbers and service provider codes with certificates.  Specifically, the TN Authorization List defined in <xref target="RFC8226"/> Section 9, defines the ability to associate a STI certificate with a specific set of Service Provider Codes (SPCs), Telephone Numbers (TNs), or Telephone Number ranges (TN ranges).  Typically, these identifiers have been assigned to a Communications Service Provider (CSP) that is authorized to use a set of telephone numbers or telephone number ranges in association with a Service Provider Code as defined in <xref target="RFC8226"/>.  The SPC is a unique code or string managed by a national regulatory body that has the authority over those code-to-CSP associations.</t>

<t>This document also describes the ability for a telephone authority to authorize the creation of CA types of certificates for delegation as defined in <xref target="I-D.ietf-stir-cert-delegation"/>.</t>

</section>
<section anchor="terminology" title="Terminology">

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL
NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “MAY”, and “OPTIONAL” in this
document are to be interpreted as described in <xref target="RFC2119"/>.</t>

</section>
<section anchor="acme-new-order-identifiers-for-tnauthlist" title="ACME new-order identifiers for TNAuthList">

<t>In <xref target="RFC8555"/>, Section 7.4 defines the procedure that an ACME client uses to order a new certificate from a Certification Authority. The new-order request contains an identifier field that specifies the identifier objects the order corresponds to.  This draft defines a new type of identifier object called TNAuthList. A TNAuthList identifier contains the identity information to be populated in the TN Authorization List of the new certificate. For the TNAuthList identifier, the new-order request MUST include a type set to the string “TNAuthList”. The value of the TNAuthList identifier MUST be set to the details of the TNAuthList requested.</t>

<t>The format of the string that represents the TNAuthList MUST be constructed as a base64 <xref target="RFC4648"/> encoding of the TN Authorization List certificate extension ASN.1 object.  The TN Authorization List certificate extension ASN.1 syntax is defined in <xref target="RFC8226"/> section 9.</t>

<t>An example of an ACME order object “identifiers” field containing a TNAuthList certificate would look as follows,</t>

<figure><artwork><![CDATA[
 "identifiers": [{"type":"TNAuthList","value":"F83n2a...avn27DN3=="}]
]]></artwork></figure>

<t>where the “value” object string represents the arbitrary length base64 encoded string.</t>

<t>A full new-order request would look as follows,</t>

<figure><artwork><![CDATA[
POST /acme/new-order HTTP/1.1
Host: example.com
Content-Type: application/jose+json

{
  "protected": base64url({
    "alg": "ES256",
    "kid": "https://example.com/acme/acct/1",
    "nonce": "5XJ1L3lEkMG7tR6pA00clA",
    "url": "https://example.com/acme/new-order"
  }),
  "payload": base64url({
    "identifiers": [{"type:"TNAuthList","value":"F83n...n27DN3=="}],
    "notBefore": "2021-01-01T00:00:00Z",
    "notAfter": "2021-01-08T00:00:00Z"
  }),
  "signature": "H6ZXtGjTZyUnPeKn...wEA4TklBdh3e454g"
}
]]></artwork></figure>

<t>On receiving a valid new-order request, the CA creates an authorization object containing the challenge that the ACME client must satisfy to demonstrate authority for the identifiers specified by the new order (in this case, the TNAuthList identifier). The CA adds the authorization object URL to the “authorizations” field of the order object, and returns the order object to the ACME client in the body of a 201 (Created) response.</t>

<figure><artwork><![CDATA[
HTTP/1.1 201 Created
Replay-Nonce: MYAuvOpaoIiywTezizk5vw
Location: https://example.com/acme/order/1234

{
  "status": "pending",
  "expires": "2015-03-01T14:09:00Z",

  "notBefore": "2021-01-01T00:00:00Z",
  "notAfter": "2021-01-08T00:00:00Z",
  "identifiers":[{"type:"TNAuthList",
                 "value":"F83n2a...avn27DN3=="}],

  "authorizations": [
   "https://example.com/acme/authz/1234"
  ],
  "finalize": "https://example.com/acme/order/1234/finalize"
}
]]></artwork></figure>

</section>
<section anchor="tnauthlist-identifier-authorization" title="TNAuthList Identifier Authorization">

<t>On receiving the new-order response, the ACME client queries the referenced authorization object to obtain the challenges for the identifier contained in the new-order request as shown in the following example request and response.</t>

<figure><artwork><![CDATA[
POST /acme/authz/1234 HTTP/1.1
    Host: example.com
    Content-Type: application/jose+json

    {
      "protected": base64url({
        "alg": "ES256",
        "kid": " https://example.com/acme/acct/1",
        "nonce": "uQpSjlRb4vQVCjVYAyyUWg",
        "url": "https://example.com/acme/authz/1234",
      }),
      "payload": "",
      "signature": "nuSDISbWG8mMgE7H...QyVUL68yzf3Zawps"
    }
]]></artwork></figure>

<figure><artwork><![CDATA[
HTTP/1.1 200 OK
Content-Type: application/json
Link: <https://example.com/acme/some-directory>;rel="index"

{
  "status": "pending",
  "expires": "2018-03-03T14:09:00Z",

  "identifier": {
    "type:"TNAuthList",
    "value":"F83n2a...avn27DN3=="
  },

  "challenges": [
    {
      "type": "tkauth-01",
      "tkauth-type": "atc",
      "token-authority": "https://authority.example.org/authz",
      "url": "https://boulder.example.com/authz/asdf/0"
      "token": "IlirfxKKXAsHtmzK29Pj8A"
    }
  ]
}
]]></artwork></figure>

<t>When processing a certificate order containing an identifier of type “TNAuthList”, a CA MUST use the Authority Token challenge type of “tkauth-01” with a “tkauth-type” of “atc” in <xref target="I-D.ietf-acme-authority-token"/> to verify that the requesting ACME client has authenticated and authorized control over the requested resources represented by the “TNAuthList” value.</t>

<t>The challenge “token-authority” parameter is optional and only used in cases where the VoIP telephone network requires the CA to identify the Token Authority. This is currently not the case for the SHAKEN <xref target="ATIS-1000080"/> certificate framework governance, but may be used by other frameworks. If a “token-authority” parameter is present, then the ACME client MAY use the “token-authority” value to identify the URL representing the Token Authority that will provide the TNAuthList Authority Token response to the challenge. If the “token-authority” parameter is not present, then the ACME client MUST identify the Token Authority based on locally configured information or local policies.</t>

<t>The ACME client MUST respond to the challenge by posting the TNAuthList Authority Token to the challenge URL identified in the returned ACME authorization object, an example of which follows.</t>

<figure><artwork><![CDATA[
POST /acme/authz/asdf/0 HTTP/1.1
Host: boulder.example.com
Content-Type: application/jose+json

{
  "protected": base64url({
  "alg": "ES256",
  "kid": "https://example.com/acme/acct/1",
  "nonce": "Q_s3MWoqT05TrdkM2MTDcw",
  "url": "https://boulder.example.com/acme/authz/asdf/0"
  }),
  "payload": base64url({
  "atc": "DGyRejmCefe7v4N...vb29HhjjLPSggwiE"
  }),
  "signature": "9cbg5JO1Gf5YLjjz...SpkUfcdPai9uVYYQ"
}
]]></artwork></figure>

<t>The specifics of the construction of the TNAuthList specific “atc” token is defined in the next section.</t>

</section>
<section anchor="tnauthlist-authority-token" title="TNAuthList Authority Token">

<t>The Telephone Number Authority List Authority Token (TNAuthList Authority Token) is an extension of the ACME Authority Token defined in <xref target="I-D.ietf-acme-authority-token"/>.</t>

<t>The TNAuthList Authority Token Protected header MUST comply with the Authority Token Protected header as defined in <xref target="I-D.ietf-acme-authority-token"/>.</t>

<t>The TNAuthList Authority Token Payload MUST include the mandatory claims “exp”, “jti”, and “atc”, and MAY include the optional claims defined for the Authority Token detailed in the next subsections.</t>

<section anchor="iss-claim" title="“iss” claim">

<t>The “iss” claim is an optional claim.  It can be used as a URL identifying the Token Authority that issued the TNAuthList Authority Token beyond the “x5u” Header claim that identifies the location of the certificate of the Token Authority used to validate the TNAuthList Authority Token.</t>

</section>
<section anchor="exp-claim" title="“exp” claim">

<t>The “exp” claim contains the DateTime value of the ending date and time that the TNAuthList Authority Token expires.</t>

</section>
<section anchor="jti-claim" title="“jti” claim">

<t>The “jti” claim contains a unique identifier for this TNAuthList Authority Token transaction.</t>

</section>
<section anchor="atc-claim" title="“atc” claim">

<t>The “atc” claim is the only claim specifically defined in this document.  It contains a JSON object of three elements.</t>

<t><list style="symbols">
  <t>a “tktype” key that is required with a string value equal to “TNAuthList” to represent a TNAuthList profile of the authority token <xref target="I-D.ietf-acme-authority-token"/> defined by this document.</t>
  <t>a “tkvalue” key with a string value equal to the TNAuthList identifier “value” string which MUST contain the base64 encoding of the TN Authorization List certificate extension ASN.1 object. “tkvalue” is a required key and MUST be included.</t>
  <t>a “ca” key with a boolean value set to either true when the requested certificate is allowed to be a CA cert for delegation uses or false when the requested certificate MUST NOT be a CA cert and only an end-entity certificate. “ca” is an optional key, if it not included the “ca” value is considered false by default.</t>
  <t>a “fingerprint” key with a fingerprint value equal to the fingerprint, as defined in <xref target="RFC4949"/>, of the ACME account credentials. Specifically, the fingerprint value is a secure one-way hash of the Distinguished Encoding Rules (DER) form of the public key corresponding to the key pair the SP used to create the account with the ACME server. The fingerprint value consists of the name of the hash function, which shall be ‘SHA256’ for this specification, followed by the hash value itself.  The hash value is represented as a sequence of uppercase hexadecimal bytes, separated by colons. The number of bytes is defined by the hash function. “fingerprint” is a required key and MUST be included.</t>
</list></t>

<t>An example of the TNAuthList Authority Token is as follows,</t>

<figure><artwork><![CDATA[
{
  "protected": base64url({
    "typ":"JWT",
    "alg":"ES256",
    "x5u":https://authority.example.org/cert
  }),
  "payload": base64url({
    "iss":"https://authority.example.org/authz",
    "exp":1300819380,
    "jti":"id6098364921",
    "atc":{"tktype":"TNAuthList",
      "tkvalue":"F83n2a...avn27DN3==",
      "ca":false,
      "fingerprint":"SHA256 56:3E:CF:AE:83:CA:4D:15:B0:29:FF:1B:71:
       D3:BA:B9:19:81:F8:50:9B:DF:4A:D4:39:72:E2:B1:F0:B9:38:E3"}
  }),
  "signature": "9cbg5JO1Gf5YLjjz...SpkUfcdPai9uVYYQ"
}
]]></artwork></figure>

</section>
<section anchor="acquiring-the-token-from-the-token-authority" title="Acquiring the token from the Token Authority">

<t>Following <xref target="I-D.ietf-acme-authority-token"/> Section 5, the authority token should be acquired using a RESTful HTTP POST transaction as follows</t>

<figure><artwork><![CDATA[
  POST /at/account/:id/token HTTP/1.1
  Host: authority.example.com
  Content-Type: application/json
]]></artwork></figure>

<t>The request will pass the account id as a string in the request parameter “id”.  This string will be managed as an identifier specific to the Token Authority’s relationship with a CSP. There is assumed to also be a corresponding authentication procedure that can be verified for the success of this transaction. For example, an HTTP authorization header containing a valid authorization credentials as defined in <xref target="RFC7231"/> Section 14.8.</t>

<t>The body of the POST request MUST contain the “atc” JSON object that should be embedded in the token that is requested, for example the body should contain a JSON object as shown:</t>

<figure><artwork><![CDATA[
 {
   "atc":{"tktype":"TNAuthList",
     "tkvalue":"F83n2a...avn27DN3==",
     "ca":false,
     "fingerprint":"SHA256 56:3E:CF:AE:83:CA:4D:15:B0:29:FF:1B:71:D3
     :BA:B9:19:81:F8:50:9B:DF:4A:D4:39:72:E2:B1:F0:B9:38:E3"}
 }
]]></artwork></figure>

<t>The response to the POST request if successful MUST return a 200 OK with a JSON body that contains, at a minimum, the TNAuthList Authority Token as a JSON object with a key of “token” and the base64 encoded string representing the atc token. JSON is easily extensible, so users of this specification may want to pass other pieces of information relevant to a specific application, however, the “token” key MUST be passed at a minimum.</t>

<t>An example successful response would be as follows:</t>

<figure><artwork><![CDATA[
HTTP/1.1 200 OK
Content-Type: application/json

{"token": "DGyRejmCefe7v4N...vb29HhjjLPSggwiE"}
]]></artwork></figure>

<t>If the request is not successful, the response should indicate the error condition.  Specifically, for the case that the authorization credentials are invalid, the response code MUST be 403 - Forbidden.  If the Account ID provided does not exist or does not match credentials in Authorization header, the response MUST be 404 - Invalid account ID.  Other 4xx and 5xx responses SHOULD follow standard <xref target="RFC7231"/> HTTP error condition conventions.</t>

</section>
<section anchor="token-authority-responsibilities" title="Token Authority Responsibilities">

<t>When the Token Authority creates the TNAuthList Authority Token, it is the responsibility of the Token Authority to validate that the information contained in the ASN.1 TNAuthList accurately represents the SPC or telephone number resources the ACME client is authorized to represent.</t>

</section>
<section anchor="scope-of-the-tnauthlist-token-authority" title="Scope of the TNAuthList token authority">

<t>Because this specification specifically involves the TNAuthList defined in <xref target="RFC8226"/> which involves SPC, TNBlock, and individual TNs, the client may also request an Authority Token with some subset of its own authority the TNAuthList provided in the “tkvalue” element in the “atc” JSON object. Generally, the scope of authority representing a communications service provider is represented by a particular SPC (e.g. in North America, an OCN or SPID) which is associated with a particular set of different TN Blocks and/or TNs, although more often the former typically through a set of regulated authoritative registries or databases. TNAuthList can be constructed to define a limited scope of the TNBlocks or TNs either associated with an SPC or with the scope of TN Blocks or TNs the client has authority over.</t>

</section>
</section>
<section anchor="validating-the-tnauthlist-authority-token" title="Validating the TNAuthList Authority Token">

<t>Upon receiving a response to the challenge, the ACME server MUST perform the following steps to determine the validity of the response.</t>

<t><list style="symbols">
  <t>Verify that the token contained in the Payload “atc” field is an TNAuthList Authority Token.</t>
  <t>Verify the TNAuthList Authority Token signature using the public key of the certificate referenced by the token’s “x5u” parameter.</t>
  <t>Verify that “atc” claim contains an identifier type of “TNAuthList”.</t>
  <t>Verify that the “atc” claim contains the equivalent base64 encoded TNAuthList certificate extension string value as the Identifier specified in the original challenge.</t>
  <t>Verify that the remaining claims are valid (e.g., verify that token has not expired)</t>
  <t>Verify that the “atc” claim “fingerprint” is valid</t>
  <t>Verify that the “ca” claim boolean corresponds to the CSR request for either CA certificate or end-entity certificate</t>
</list></t>

<t>If all steps in the token validation process pass, then the CA MUST set the challenge object “status” to “valid”. If any step of the validation process fails, the “status” in the challenge object MUST be set to “invalid”.</t>

</section>
<section anchor="usage-considerations" title="Usage Considerations">

<section anchor="large-number-of-non-contiguous-tnauthlist-values" title="Large number of Non-contiguous TNAuthList values">

<t>There are many scenarios and reasons to have various combinations of SPCs, TNs, and TN Ranges.  <xref target="RFC8226"/> has provided a somewhat unbounded set of combinations.  It’s possible that a complex non-contiguous set of telephone numbers are being managed by a CSP.  Best practice may be simply to split a set of non-contiguous numbers under management into multiple STI certificates to represent the various contiguous parts of the greater non-contiguous set of TNs, particularly if length of the set of values in identifier object grows to be too large.</t>

</section>
</section>
<section anchor="security_considerations" title="Security Considerations">

<t>The token represented by this document has the credentials to represent the scope of a telephone number, a block of telephone numbers, or an entire set of telephone numbers represented by a SPC. The creation, transport, and any storage of this token MUST follow the strictest of security best practices beyond the recommendations of the use of encrypted transport protocols in this document to protect it from getting in the hands of bad actors with illegitimate intent to impersonate telephone numbers.</t>

<t>This document inherits the security properties of <xref target="I-D.ietf-acme-authority-token"/>.</t>

</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>This document requests the addition of a new identifier object type to the “ACME Identifier Types” registry defined in Section 9.7.7 of <xref target="RFC8555"/>.</t>

<figure><artwork><![CDATA[
                         +------------+-----------+
                         |   Label    | Reference |
                         +------------+-----------+
                         | TNAuthList |  RFCThis  |
                         +------------+-----------+
]]></artwork></figure>

</section>
<section anchor="acknowledgements" title="Acknowledgements">

<t>We would like to thank Richard Barnes and Russ Housley for valuable contributions to this document.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference anchor="I-D.ietf-acme-authority-token">
<front>
<title>ACME Challenges Using an Authority Token</title>

<author initials='J' surname='Peterson' fullname='Jon Peterson'>
    <organization />
</author>

<author initials='M' surname='Barnes' fullname='Mary Barnes'>
    <organization />
</author>

<author initials='D' surname='Hancock' fullname='David Hancock'>
    <organization />
</author>

<author initials='C' surname='Wendt' fullname='Chris Wendt'>
    <organization />
</author>

<date month='March' day='9' year='2020' />

<abstract><t>Some proposed extensions to the Automated Certificate Management Environment (ACME) rely on proving eligibility for certificates through consulting an external authority that issues a token according to a particular policy.  This document specifies a generic Authority Token challenge for ACME which supports subtype claims for different identifiers or namespaces that can be defined separately for specific applications.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-acme-authority-token-05' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-acme-authority-token-05.txt' />
</reference>



<reference anchor="I-D.ietf-stir-cert-delegation">
<front>
<title>STIR Certificate Delegation</title>

<author initials='J' surname='Peterson' fullname='Jon Peterson'>
    <organization />
</author>

<date month='July' day='13' year='2020' />

<abstract><t>The Secure Telephone Identity Revisited (STIR) certificate profile provides a way to attest authority over telephone numbers and related identifiers for the purpose of preventing telephone number spoofing. This specification details how that authority can be delegated from a parent certificate to a subordinate certificate.  This supports a number of use cases, including those where service providers grant credentials to enterprises or other customers capable of signing calls with STIR.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-stir-cert-delegation-03' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-stir-cert-delegation-03.txt' />
</reference>



<reference  anchor="RFC4648" target='https://www.rfc-editor.org/info/rfc4648'>
<front>
<title>The Base16, Base32, and Base64 Data Encodings</title>
<author initials='S.' surname='Josefsson' fullname='S. Josefsson'><organization /></author>
<date year='2006' month='October' />
<abstract><t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes.  It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4648'/>
<seriesInfo name='DOI' value='10.17487/RFC4648'/>
</reference>



<reference  anchor="RFC7231" target='https://www.rfc-editor.org/info/rfc7231'>
<front>
<title>Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content</title>
<author initials='R.' surname='Fielding' fullname='R. Fielding' role='editor'><organization /></author>
<author initials='J.' surname='Reschke' fullname='J. Reschke' role='editor'><organization /></author>
<date year='2014' month='June' />
<abstract><t>The Hypertext Transfer Protocol (HTTP) is a stateless \%application- level protocol for distributed, collaborative, hypertext information systems.  This document defines the semantics of HTTP/1.1 messages, as expressed by request methods, request header fields, response status codes, and response header fields, along with the payload of messages (metadata and body content) and mechanisms for content negotiation.</t></abstract>
</front>
<seriesInfo name='RFC' value='7231'/>
<seriesInfo name='DOI' value='10.17487/RFC7231'/>
</reference>



<reference  anchor="RFC8224" target='https://www.rfc-editor.org/info/rfc8224'>
<front>
<title>Authenticated Identity Management in the Session Initiation Protocol (SIP)</title>
<author initials='J.' surname='Peterson' fullname='J. Peterson'><organization /></author>
<author initials='C.' surname='Jennings' fullname='C. Jennings'><organization /></author>
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /></author>
<author initials='C.' surname='Wendt' fullname='C. Wendt'><organization /></author>
<date year='2018' month='February' />
<abstract><t>The baseline security mechanisms in the Session Initiation Protocol (SIP) are inadequate for cryptographically assuring the identity of the end users that originate SIP requests, especially in an interdomain context.  This document defines a mechanism for securely identifying originators of SIP requests.  It does so by defining a SIP header field for conveying a signature used for validating the identity and for conveying a reference to the credentials of the signer.</t><t>This document obsoletes RFC 4474.</t></abstract>
</front>
<seriesInfo name='RFC' value='8224'/>
<seriesInfo name='DOI' value='10.17487/RFC8224'/>
</reference>



<reference  anchor="RFC8225" target='https://www.rfc-editor.org/info/rfc8225'>
<front>
<title>PASSporT: Personal Assertion Token</title>
<author initials='C.' surname='Wendt' fullname='C. Wendt'><organization /></author>
<author initials='J.' surname='Peterson' fullname='J. Peterson'><organization /></author>
<date year='2018' month='February' />
<abstract><t>This document defines a method for creating and validating a token that cryptographically verifies an originating identity or, more generally, a URI or telephone number representing the originator of personal communications.  The Personal Assertion Token, PASSporT, is cryptographically signed to protect the integrity of the identity of the originator and to verify the assertion of the identity information at the destination.  The cryptographic signature is defined with the intention that it can confidently verify the originating persona even when the signature is sent to the destination party over an insecure channel.  PASSporT is particularly useful for many personal-communications applications over IP networks and other multi-hop interconnection scenarios where the originating and destination parties may not have a direct trusted relationship.</t></abstract>
</front>
<seriesInfo name='RFC' value='8225'/>
<seriesInfo name='DOI' value='10.17487/RFC8225'/>
</reference>



<reference  anchor="RFC8226" target='https://www.rfc-editor.org/info/rfc8226'>
<front>
<title>Secure Telephone Identity Credentials: Certificates</title>
<author initials='J.' surname='Peterson' fullname='J. Peterson'><organization /></author>
<author initials='S.' surname='Turner' fullname='S. Turner'><organization /></author>
<date year='2018' month='February' />
<abstract><t>In order to prevent the impersonation of telephone numbers on the Internet, some kind of credential system needs to exist that cryptographically asserts authority over telephone numbers.  This document describes the use of certificates in establishing authority over telephone numbers, as a component of a broader architecture for managing telephone numbers as identities in protocols like SIP.</t></abstract>
</front>
<seriesInfo name='RFC' value='8226'/>
<seriesInfo name='DOI' value='10.17487/RFC8226'/>
</reference>



<reference  anchor="RFC8555" target='https://www.rfc-editor.org/info/rfc8555'>
<front>
<title>Automatic Certificate Management Environment (ACME)</title>
<author initials='R.' surname='Barnes' fullname='R. Barnes'><organization /></author>
<author initials='J.' surname='Hoffman-Andrews' fullname='J. Hoffman-Andrews'><organization /></author>
<author initials='D.' surname='McCarney' fullname='D. McCarney'><organization /></author>
<author initials='J.' surname='Kasten' fullname='J. Kasten'><organization /></author>
<date year='2019' month='March' />
<abstract><t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names.  Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate.  As of this writing, this verification is done through a collection of ad hoc mechanisms.  This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance.  The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t></abstract>
</front>
<seriesInfo name='RFC' value='8555'/>
<seriesInfo name='DOI' value='10.17487/RFC8555'/>
</reference>




    </references>

    <references title='Informative References'>

<reference anchor="ATIS-1000080" >
  <front>
    <title>Signature-based Handling of Asserted information using toKENs (SHAKEN) Governance Model and Certificate Management &lt;https://access.atis.org/apps/group_public/download.php/32237/ATIS-1000080.pdf&gt;</title>
    <author >
      <organization>ATIS/SIP Forum NNI Task Group</organization>
    </author>
    <date year="2017" month="July"/>
  </front>
</reference>




<reference  anchor="RFC2119" target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference  anchor="RFC4949" target='https://www.rfc-editor.org/info/rfc4949'>
<front>
<title>Internet Security Glossary, Version 2</title>
<author initials='R.' surname='Shirey' fullname='R. Shirey'><organization /></author>
<date year='2007' month='August' />
<abstract><t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='FYI' value='36'/>
<seriesInfo name='RFC' value='4949'/>
<seriesInfo name='DOI' value='10.17487/RFC4949'/>
</reference>



<reference  anchor="RFC7340" target='https://www.rfc-editor.org/info/rfc7340'>
<front>
<title>Secure Telephone Identity Problem Statement and Requirements</title>
<author initials='J.' surname='Peterson' fullname='J. Peterson'><organization /></author>
<author initials='H.' surname='Schulzrinne' fullname='H. Schulzrinne'><organization /></author>
<author initials='H.' surname='Tschofenig' fullname='H. Tschofenig'><organization /></author>
<date year='2014' month='September' />
<abstract><t>Over the past decade, Voice over IP (VoIP) systems based on SIP have replaced many traditional telephony deployments.  Interworking VoIP systems with the traditional telephone network has reduced the overall level of calling party number and Caller ID assurances by granting attackers new and inexpensive tools to impersonate or obscure calling party numbers when orchestrating bulk commercial calling schemes, hacking voicemail boxes, or even circumventing multi-factor authentication systems trusted by banks.  Despite previous attempts to provide a secure assurance of the origin of SIP communications, we still lack effective standards for identifying the calling party in a VoIP session.  This document examines the reasons why providing identity for telephone numbers on the Internet has proven so difficult and shows how changes in the last decade may provide us with new strategies for attaching a secure identity to SIP sessions.  It also gives high-level requirements for a solution in this space.</t></abstract>
</front>
<seriesInfo name='RFC' value='7340'/>
<seriesInfo name='DOI' value='10.17487/RFC7340'/>
</reference>




    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

