<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.15 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-acme-authority-token-tnauthlist-08" category="std">

  <front>
    <title abbrev="ACME TNAuthList Auth Token">TNAuthList profile of ACME Authority Token</title>

    <author initials="C." surname="Wendt" fullname="Chris Wendt">
      <organization>Comcast</organization>
      <address>
        <postal>
          <street>One Comcast Center</street>
          <city>Philadelphia, PA  19103</city>
          <country>USA</country>
        </postal>
        <email>chris-ietf@chriswendt.net</email>
      </address>
    </author>
    <author initials="D." surname="Hancock" fullname="David Hancock">
      <organization>Comcast</organization>
      <address>
        <email>davidhancock.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="M." surname="Barnes" fullname="Mary Barnes">
      <organization>Independent</organization>
      <address>
        <email>mary.ietf.barnes@gmail.com</email>
      </address>
    </author>
    <author initials="J." surname="Peterson" fullname="Jon Peterson">
      <organization>Neustar Inc.</organization>
      <address>
        <postal>
          <street>1800 Sutter St Suite 570</street>
          <city>Concord, CA  94520</city>
          <country>US</country>
        </postal>
        <email>jon.peterson@neustar.biz</email>
      </address>
    </author>

    <date year="2021" month="March" day="26"/>

    <area>sec</area>
    
    <keyword>STIR</keyword>

    <abstract>


<t>This document defines a profile of the Automated Certificate Management Environment (ACME) Authority Token for the automated and authorized creation of certificates for VoIP Telephone Providers to support Secure Telephony Identity (STI) using the TNAuthList defined by STI certificates.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t><xref target="RFC8555"/> is a mechanism for automating certificate management on the Internet. It enables administrative entities to prove effective control over resources like domain names, and automates the process of generating and issuing certificates. <xref target="I-D.ietf-acme-authority-token"/> extends ACME to provide a general method of extending the authority and authorization of entities to control a resource via a third party Token Authority beyond the Certification Authority.</t>

<t>This document addresses the STIR problem statement <xref target="RFC7340"/> which identifies the need for Internet credentials that can attest authority for the originator of VoIP calls in order to detect impersonation, which is currently an enabler for common attacks associated with illegal robocalling, voicemail hacking, and swatting.  These credentials are used to sign PASSporTs <xref target="RFC8225"/>, which can be carried in using protocols such as SIP <xref target="RFC8224"/>.  Currently, the only defined credentials for this purpose are the certificates specified in <xref target="RFC8226"/>.</t>

<t>This document also describes the ability for a telephone authority to authorize the creation of CA types of certificates for delegation as defined in <xref target="I-D.ietf-stir-cert-delegation"/>.</t>

</section>
<section anchor="terminology" title="Terminology">

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL
NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “MAY”, and “OPTIONAL” in this
document are to be interpreted as described in <xref target="RFC2119"/>.</t>

</section>
<section anchor="acme-new-order-identifiers-for-tnauthlist" title="ACME new-order identifiers for TNAuthList">

<t>In <xref target="RFC8555"/>, Section 7 defines the procedure that an ACME client uses to order a new certificate from a Certification Authority. The new-order request contains an identifier field that specifies the identifier objects the order corresponds to.  This draft defines a new type of identifier object called TNAuthList. A TNAuthList identifier contains the identity information to be populated in the TN Authorization List of the new certificate. For the TNAuthList identifier, the new-order request includes a type set to the string “TNAuthList”. The value of the TNAuthList identifier MUST be set to the details of the TNAuthList requested.</t>

<t>The format of the string that represents the TNAuthList MUST be constructed as a base64 <xref target="RFC4648"/> encoding of the TN Authorization List certificate extension ASN.1 object.  The TN Authorization List certificate extension ASN.1 syntax is defined in <xref target="RFC8226"/> section 9.</t>

<t>An example of an ACME order object “identifiers” field containing a TNAuthList certificate would look as follows,</t>

<figure><artwork><![CDATA[
 "identifiers": [{"type":"TNAuthList","value":"F83n2a...avn27DN3=="}]
]]></artwork></figure>

<t>where the “value” object string represents the arbitrary length base64 encoded string.</t>

<t>A full new-order request would look as follows,</t>

<figure><artwork><![CDATA[
POST /acme/new-order HTTP/1.1
Host: example.com
Content-Type: application/jose+json

{
  "protected": base64url({
    "alg": "ES256",
    "kid": "https://example.com/acme/acct/1",
    "nonce": "5XJ1L3lEkMG7tR6pA00clA",
    "url": "https://example.com/acme/new-order"
  }),
  "payload": base64url({
    "identifiers": [{"type:"TNAuthList","value":"F83n...n27DN3=="}],
    "notBefore": "2021-01-01T00:00:00Z",
    "notAfter": "2021-01-08T00:00:00Z"
  }),
  "signature": "H6ZXtGjTZyUnPeKn...wEA4TklBdh3e454g"
}
]]></artwork></figure>

<t>On receiving a valid new-order request, the CA creates an authorization object, <xref target="RFC8555"/> Section 7.1.4, containing the challenge that the ACME client must satisfy to demonstrate authority for the identifiers specified by the new order (in this case, the TNAuthList identifier). The CA adds the authorization object URL to the “authorizations” field of the order object, and returns the order object to the ACME client in the body of a 201 (Created) response.</t>

<figure><artwork><![CDATA[
HTTP/1.1 201 Created
Replay-Nonce: MYAuvOpaoIiywTezizk5vw
Location: https://example.com/acme/order/1234

{
  "status": "pending",
  "expires": "2015-03-01T14:09:00Z",

  "notBefore": "2021-01-01T00:00:00Z",
  "notAfter": "2021-01-08T00:00:00Z",
  "identifiers":[{"type:"TNAuthList",
                 "value":"F83n2a...avn27DN3=="}],

  "authorizations": [
   "https://example.com/acme/authz/1234"
  ],
  "finalize": "https://example.com/acme/order/1234/finalize"
}
]]></artwork></figure>

</section>
<section anchor="tnauthlist-identifier-authorization" title="TNAuthList Identifier Authorization">

<t>On receiving the new-order response, the ACME client queries the referenced authorization object to obtain the challenges for the identifier contained in the new-order request as shown in the following example request and response.</t>

<figure><artwork><![CDATA[
POST /acme/authz/1234 HTTP/1.1
    Host: example.com
    Content-Type: application/jose+json

    {
      "protected": base64url({
        "alg": "ES256",
        "kid": " https://example.com/acme/acct/1",
        "nonce": "uQpSjlRb4vQVCjVYAyyUWg",
        "url": "https://example.com/acme/authz/1234",
      }),
      "payload": "",
      "signature": "nuSDISbWG8mMgE7H...QyVUL68yzf3Zawps"
    }
]]></artwork></figure>

<figure><artwork><![CDATA[
HTTP/1.1 200 OK
Content-Type: application/json
Link: <https://example.com/acme/some-directory>;rel="index"

{
  "status": "pending",
  "expires": "2018-03-03T14:09:00Z",

  "identifier": {
    "type:"TNAuthList",
    "value":"F83n2a...avn27DN3=="
  },

  "challenges": [
    {
      "type": "tkauth-01",
      "tkauth-type": "atc",
      "token-authority": "https://authority.example.org/authz",
      "url": "https://boulder.example.com/authz/asdf/0"
      "token": "IlirfxKKXAsHtmzK29Pj8A"
    }
  ]
}
]]></artwork></figure>

<t>When processing a certificate order containing an identifier of type “TNAuthList”, a CA uses the Authority Token challenge type of “tkauth-01” with a “tkauth-type” of “atc” in <xref target="I-D.ietf-acme-authority-token"/> to verify that the requesting ACME client has authenticated and authorized control over the requested resources represented by the “TNAuthList” value.</t>

<t>The challenge “token-authority” parameter is only used in cases where the VoIP telephone network requires the CA to identify the Token Authority. This is currently not the case for the SHAKEN <xref target="ATIS-1000080"/> certificate framework governance, but may be used by other frameworks. If a “token-authority” parameter is present, then the ACME client MAY use the “token-authority” value to identify the URL representing the Token Authority that will provide the TNAuthList Authority Token response to the challenge. If the “token-authority” parameter is not present, then the ACME client MUST identify the Token Authority based on locally configured information or local policies.</t>

<t>The ACME client responds to the challenge by posting the TNAuthList Authority Token to the challenge URL identified in the returned ACME authorization object, an example of which follows.</t>

<figure><artwork><![CDATA[
POST /acme/authz/asdf/0 HTTP/1.1
Host: boulder.example.com
Content-Type: application/jose+json

{
  "protected": base64url({
  "alg": "ES256",
  "kid": "https://example.com/acme/acct/1",
  "nonce": "Q_s3MWoqT05TrdkM2MTDcw",
  "url": "https://boulder.example.com/acme/authz/asdf/0"
  }),
  "payload": base64url({
  "atc": "DGyRejmCefe7v4N...vb29HhjjLPSggwiE"
  }),
  "signature": "9cbg5JO1Gf5YLjjz...SpkUfcdPai9uVYYQ"
}
]]></artwork></figure>

<t>The specifics of the construction of the TNAuthList specific “atc” token is defined in the next section.</t>

</section>
<section anchor="tnauthlist-authority-token" title="TNAuthList Authority Token">

<t>The Telephone Number Authority List Authority Token (TNAuthList Authority Token) is an extension of the ACME Authority Token defined in <xref target="I-D.ietf-acme-authority-token"/>.</t>

<t>The TNAuthList Authority Token Protected header MUST comply with the Authority Token Protected header as defined in <xref target="I-D.ietf-acme-authority-token"/>.</t>

<t>The TNAuthList Authority Token Payload MUST include the mandatory claims “exp”, “jti”, and “atc”, and MAY include the optional claims defined for the Authority Token detailed in the next subsections.</t>

<section anchor="iss-claim" title="“iss” claim">

<t>The “iss” claim is an optional claim.  It can be used as a URL identifying the Token Authority that issued the TNAuthList Authority Token beyond the “x5u” Header claim that identifies the location of the certificate of the Token Authority used to validate the TNAuthList Authority Token.</t>

</section>
<section anchor="exp-claim" title="“exp” claim">

<t>The “exp” claim MUST be included and contains the DateTime value of the ending date and time that the TNAuthList Authority Token expires.</t>

</section>
<section anchor="jti-claim" title="“jti” claim">

<t>The “jti” claim MUST be included and contains a unique identifier for this TNAuthList Authority Token transaction.</t>

</section>
<section anchor="atc-claim" title="“atc” claim">

<t>The “atc” claim MUST be included and is the only claim specifically defined in this document.  It contains a JSON object of three elements.</t>

<t><list style="symbols">
  <t>a “tktype” key that is required with a string value equal to “TNAuthList” to represent a TNAuthList profile of the authority token <xref target="I-D.ietf-acme-authority-token"/> defined by this document.</t>
  <t>a “tkvalue” key with a string value equal to the TNAuthList identifier “value” string which contains the base64 encoding of the TN Authorization List certificate extension ASN.1 object. “tkvalue” is a required key and MUST be included.</t>
  <t>a “ca” key with a boolean value set to either true when the requested certificate is allowed to be a CA cert for delegation uses or false when the requested certificate is not intended to be a CA cert, only an end-entity certificate. “ca” is an optional key, if it not included the “ca” value is considered false by default.</t>
  <t>a “fingerprint” key with a fingerprint value equal to the fingerprint, as defined in <xref target="RFC4949"/>, of the ACME account credentials. Specifically, the fingerprint value is a secure one-way hash of the Distinguished Encoding Rules (DER) form of the public key corresponding to the key pair the SP used to create the account with the ACME server. The fingerprint value consists of the name of the hash function, which shall be ‘SHA256’ for this specification, followed by the hash value itself.  The hash value is represented as a sequence of uppercase hexadecimal bytes, separated by colons. The number of bytes is defined by the hash function. “fingerprint” is a required key and MUST be included.</t>
</list></t>

<t>An example of the TNAuthList Authority Token is as follows,</t>

<figure><artwork><![CDATA[
{
  "protected": base64url({
    "typ":"JWT",
    "alg":"ES256",
    "x5u":https://authority.example.org/cert
  }),
  "payload": base64url({
    "iss":"https://authority.example.org/authz",
    "exp":1300819380,
    "jti":"id6098364921",
    "atc":{"tktype":"TNAuthList",
      "tkvalue":"F83n2a...avn27DN3==",
      "ca":false,
      "fingerprint":"SHA256 56:3E:CF:AE:83:CA:4D:15:B0:29:FF:1B:71:
       D3:BA:B9:19:81:F8:50:9B:DF:4A:D4:39:72:E2:B1:F0:B9:38:E3"}
  }),
  "signature": "9cbg5JO1Gf5YLjjz...SpkUfcdPai9uVYYQ"
}
]]></artwork></figure>

</section>
<section anchor="acquiring-the-token-from-the-token-authority" title="Acquiring the token from the Token Authority">

<t>Following <xref target="I-D.ietf-acme-authority-token"/> Section 5, the authority token should be acquired using a RESTful HTTP POST transaction as follows</t>

<figure><artwork><![CDATA[
  POST /at/account/:id/token HTTP/1.1
  Host: authority.example.com
  Content-Type: application/json
]]></artwork></figure>

<t>The request will pass the account id as a string in the request parameter “id”.  This string will be managed as an identifier specific to the Token Authority’s relationship with a CSP. There is assumed to also be a corresponding authentication procedure that can be verified for the success of this transaction. For example, an HTTP authorization header containing a valid authorization credentials as defined in <xref target="RFC7231"/> Section 14.8.</t>

<t>The body of the POST request MUST contain the “atc” JSON object that should be embedded in the token that is requested, for example the body should contain a JSON object as shown:</t>

<figure><artwork><![CDATA[
 {
   "atc":{"tktype":"TNAuthList",
     "tkvalue":"F83n2a...avn27DN3==",
     "ca":false,
     "fingerprint":"SHA256 56:3E:CF:AE:83:CA:4D:15:B0:29:FF:1B:71:D3
     :BA:B9:19:81:F8:50:9B:DF:4A:D4:39:72:E2:B1:F0:B9:38:E3"}
 }
]]></artwork></figure>

<t>The response to the POST request if successful returns a 200 OK with a JSON body that contains, at a minimum, the TNAuthList Authority Token as a JSON object with a key of “token” and the base64 encoded string representing the atc token. JSON is easily extensible, so users of this specification may want to pass other pieces of information relevant to a specific application.</t>

<t>An example successful response would be as follows:</t>

<figure><artwork><![CDATA[
HTTP/1.1 200 OK
Content-Type: application/json

{"token": "DGyRejmCefe7v4N...vb29HhjjLPSggwiE"}
]]></artwork></figure>

<t>If the request is not successful, the response should indicate the error condition.  Specifically, for the case that the authorization credentials are invalid, the response code MUST be 403 - Forbidden.  If the Account ID provided does not exist or does not match credentials in Authorization header, the response MUST be 404 - Invalid account ID.  Other 4xx and 5xx responses MUST follow standard <xref target="RFC7231"/> HTTP error condition conventions.</t>

</section>
<section anchor="token-authority-responsibilities" title="Token Authority Responsibilities">

<t>When the Token Authority creates the TNAuthList Authority Token, it is the responsibility of the Token Authority to validate that the information contained in the ASN.1 TNAuthList accurately represents the SPC or telephone number resources the ACME client is authorized to represent.</t>

</section>
<section anchor="scope-of-the-tnauthlist-token-authority" title="Scope of the TNAuthList token authority">

<t>Because this specification specifically involves the TNAuthList defined in <xref target="RFC8226"/> which involves SPC, TNBlock, and individual TNs, the client may also request an Authority Token with some subset of its own authority the TNAuthList provided in the “tkvalue” element in the “atc” JSON object. Generally, the scope of authority representing a communications service provider is represented by a particular SPC (e.g. in North America, an OCN or SPID) which is associated with a particular set of different TN Blocks and/or TNs, although more often the former typically through a set of regulated authoritative registries or databases. TNAuthList can be constructed to define a limited scope of the TNBlocks or TNs either associated with an SPC or with the scope of TN Blocks or TNs the client has authority over.</t>

</section>
</section>
<section anchor="validating-the-tnauthlist-authority-token" title="Validating the TNAuthList Authority Token">

<t>Upon receiving a response to the challenge, the ACME server MUST perform the following steps to determine the validity of the response.</t>

<t><list style="symbols">
  <t>Verify that the token contained in the Payload “atc” field is a valid TNAuthList Authority Token.</t>
  <t>Verify the TNAuthList Authority Token signature using the public key of the certificate referenced by the token’s “x5u” parameter.</t>
  <t>Verify that “atc” claim contains an identifier type of “TNAuthList”.</t>
  <t>Verify that the “atc” claim contains the equivalent base64 encoded TNAuthList certificate extension string value as the Identifier specified in the original challenge.</t>
  <t>Verify that the remaining claims are valid (e.g., verify that token has not expired)</t>
  <t>Verify that the “atc” claim “fingerprint” is valid</t>
  <t>Verify that the “ca” claim boolean corresponds to the CSR request for either CA certificate or end-entity certificate</t>
</list></t>

<t>If all steps in the token validation process pass, then the CA MUST set the challenge object “status” to “valid”. If any step of the validation process fails, the “status” in the challenge object MUST be set to “invalid”.</t>

</section>
<section anchor="usage-considerations" title="Usage Considerations">

<section anchor="large-number-of-non-contiguous-tnauthlist-values" title="Large number of Non-contiguous TNAuthList values">

<t>There are many scenarios and reasons to have various combinations of SPCs, TNs, and TN Ranges.  <xref target="RFC8226"/> has provided a somewhat unbounded set of combinations.  It’s possible that a complex non-contiguous set of telephone numbers are being managed by a CSP.  Best practice may be simply to split a set of non-contiguous numbers under management into multiple STI certificates to represent the various contiguous parts of the greater non-contiguous set of TNs, particularly if length of the set of values in identifier object grows to be too large.</t>

</section>
</section>
<section anchor="security_considerations" title="Security Considerations">

<t>The token represented by this document has the credentials to represent the scope of a telephone number, a block of telephone numbers, or an entire set of telephone numbers represented by a SPC. The creation, transport, and any storage of this token MUST follow the strictest of security best practices beyond the recommendations of the use of encrypted transport protocols in this document to protect it from getting in the hands of bad actors with illegitimate intent to impersonate telephone numbers.</t>

<t>This document inherits the security properties of <xref target="I-D.ietf-acme-authority-token"/>.</t>

</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>This document requests the addition of a new identifier object type to the “ACME Identifier Types” registry defined in Section 9.7.7 of <xref target="RFC8555"/>.</t>

<figure><artwork><![CDATA[
                         +------------+-----------+
                         |   Label    | Reference |
                         +------------+-----------+
                         | TNAuthList |  RFCThis  |
                         +------------+-----------+
]]></artwork></figure>

</section>
<section anchor="acknowledgements" title="Acknowledgements">

<t>We would like to thank Richard Barnes and Russ Housley for valuable contributions to this document.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference anchor="I-D.ietf-acme-authority-token">
<front>
<title>ACME Challenges Using an Authority Token</title>

<author initials='J' surname='Peterson' fullname='Jon Peterson'>
    <organization />
</author>

<author initials='M' surname='Barnes' fullname='Mary Barnes'>
    <organization />
</author>

<author initials='D' surname='Hancock' fullname='David Hancock'>
    <organization />
</author>

<author initials='C' surname='Wendt' fullname='Chris Wendt'>
    <organization />
</author>

<date month='March' day='9' year='2020' />

<abstract><t>Some proposed extensions to the Automated Certificate Management Environment (ACME) rely on proving eligibility for certificates through consulting an external authority that issues a token according to a particular policy.  This document specifies a generic Authority Token challenge for ACME which supports subtype claims for different identifiers or namespaces that can be defined separately for specific applications.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-acme-authority-token-05' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-acme-authority-token-05.txt' />
</reference>



<reference anchor="I-D.ietf-stir-cert-delegation">
<front>
<title>STIR Certificate Delegation</title>

<author initials='J' surname='Peterson' fullname='Jon Peterson'>
    <organization />
</author>

<date month='July' day='13' year='2020' />

<abstract><t>The Secure Telephone Identity Revisited (STIR) certificate profile provides a way to attest authority over telephone numbers and related identifiers for the purpose of preventing telephone number spoofing. This specification details how that authority can be delegated from a parent certificate to a subordinate certificate.  This supports a number of use cases, including those where service providers grant credentials to enterprises or other customers capable of signing calls with STIR.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-stir-cert-delegation-03' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-stir-cert-delegation-03.txt' />
</reference>



<reference  anchor="RFC4648" target='https://www.rfc-editor.org/info/rfc4648'>
<front>
<title>The Base16, Base32, and Base64 Data Encodings</title>
<author initials='S.' surname='Josefsson' fullname='S. Josefsson'><organization /></author>
<date year='2006' month='October' />
<abstract><t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes.  It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4648'/>
<seriesInfo name='DOI' value='10.17487/RFC4648'/>
</reference>



<reference  anchor="RFC7231" target='https://www.rfc-editor.org/info/rfc7231'>
<front>
<title>Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content</title>
<author initials='R.' surname='Fielding' fullname='R. Fielding' role='editor'><organization /></author>
<author initials='J.' surname='Reschke' fullname='J. Reschke' role='editor'><organization /></author>
<date year='2014' month='June' />
<abstract><t>The Hypertext Transfer Protocol (HTTP) is a stateless \%application- level protocol for distributed, collaborative, hypertext information systems.  This document defines the semantics of HTTP/1.1 messages, as expressed by request methods, request header fields, response status codes, and response header fields, along with the payload of messages (metadata and body content) and mechanisms for content negotiation.</t></abstract>
</front>
<seriesInfo name='RFC' value='7231'/>
<seriesInfo name='DOI' value='10.17487/RFC7231'/>
</reference>



<reference  anchor="RFC8224" target='https://www.rfc-editor.org/info/rfc8224'>
<front>
<title>Authenticated Identity Management in the Session Initiation Protocol (SIP)</title>
<author initials='J.' surname='Peterson' fullname='J. Peterson'><organization /></author>
<author initials='C.' surname='Jennings' fullname='C. Jennings'><organization /></author>
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /></author>
<author initials='C.' surname='Wendt' fullname='C. Wendt'><organization /></author>
<date year='2018' month='February' />
<abstract><t>The baseline security mechanisms in the Session Initiation Protocol (SIP) are inadequate for cryptographically assuring the identity of the end users that originate SIP requests, especially in an interdomain context.  This document defines a mechanism for securely identifying originators of SIP requests.  It does so by defining a SIP header field for conveying a signature used for validating the identity and for conveying a reference to the credentials of the signer.</t><t>This document obsoletes RFC 4474.</t></abstract>
</front>
<seriesInfo name='RFC' value='8224'/>
<seriesInfo name='DOI' value='10.17487/RFC8224'/>
</reference>



<reference  anchor="RFC8225" target='https://www.rfc-editor.org/info/rfc8225'>
<front>
<title>PASSporT: Personal Assertion Token</title>
<author initials='C.' surname='Wendt' fullname='C. Wendt'><organization /></author>
<author initials='J.' surname='Peterson' fullname='J. Peterson'><organization /></author>
<date year='2018' month='February' />
<abstract><t>This document defines a method for creating and validating a token that cryptographically verifies an originating identity or, more generally, a URI or telephone number representing the originator of personal communications.  The Personal Assertion Token, PASSporT, is cryptographically signed to protect the integrity of the identity of the originator and to verify the assertion of the identity information at the destination.  The cryptographic signature is defined with the intention that it can confidently verify the originating persona even when the signature is sent to the destination party over an insecure channel.  PASSporT is particularly useful for many personal-communications applications over IP networks and other multi-hop interconnection scenarios where the originating and destination parties may not have a direct trusted relationship.</t></abstract>
</front>
<seriesInfo name='RFC' value='8225'/>
<seriesInfo name='DOI' value='10.17487/RFC8225'/>
</reference>



<reference  anchor="RFC8226" target='https://www.rfc-editor.org/info/rfc8226'>
<front>
<title>Secure Telephone Identity Credentials: Certificates</title>
<author initials='J.' surname='Peterson' fullname='J. Peterson'><organization /></author>
<author initials='S.' surname='Turner' fullname='S. Turner'><organization /></author>
<date year='2018' month='February' />
<abstract><t>In order to prevent the impersonation of telephone numbers on the Internet, some kind of credential system needs to exist that cryptographically asserts authority over telephone numbers.  This document describes the use of certificates in establishing authority over telephone numbers, as a component of a broader architecture for managing telephone numbers as identities in protocols like SIP.</t></abstract>
</front>
<seriesInfo name='RFC' value='8226'/>
<seriesInfo name='DOI' value='10.17487/RFC8226'/>
</reference>



<reference  anchor="RFC8555" target='https://www.rfc-editor.org/info/rfc8555'>
<front>
<title>Automatic Certificate Management Environment (ACME)</title>
<author initials='R.' surname='Barnes' fullname='R. Barnes'><organization /></author>
<author initials='J.' surname='Hoffman-Andrews' fullname='J. Hoffman-Andrews'><organization /></author>
<author initials='D.' surname='McCarney' fullname='D. McCarney'><organization /></author>
<author initials='J.' surname='Kasten' fullname='J. Kasten'><organization /></author>
<date year='2019' month='March' />
<abstract><t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names.  Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate.  As of this writing, this verification is done through a collection of ad hoc mechanisms.  This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance.  The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t></abstract>
</front>
<seriesInfo name='RFC' value='8555'/>
<seriesInfo name='DOI' value='10.17487/RFC8555'/>
</reference>




    </references>

    <references title='Informative References'>

<reference anchor="ATIS-1000080" >
  <front>
    <title>Signature-based Handling of Asserted information using toKENs (SHAKEN) Governance Model and Certificate Management &lt;https://access.atis.org/apps/group_public/download.php/32237/ATIS-1000080.pdf&gt;</title>
    <author >
      <organization>ATIS/SIP Forum NNI Task Group</organization>
    </author>
    <date year="2017" month="July"/>
  </front>
</reference>




<reference  anchor="RFC2119" target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference  anchor="RFC4949" target='https://www.rfc-editor.org/info/rfc4949'>
<front>
<title>Internet Security Glossary, Version 2</title>
<author initials='R.' surname='Shirey' fullname='R. Shirey'><organization /></author>
<date year='2007' month='August' />
<abstract><t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed.  This memo provides information for the Internet community.</t></abstract>
</front>
<seriesInfo name='FYI' value='36'/>
<seriesInfo name='RFC' value='4949'/>
<seriesInfo name='DOI' value='10.17487/RFC4949'/>
</reference>



<reference  anchor="RFC7340" target='https://www.rfc-editor.org/info/rfc7340'>
<front>
<title>Secure Telephone Identity Problem Statement and Requirements</title>
<author initials='J.' surname='Peterson' fullname='J. Peterson'><organization /></author>
<author initials='H.' surname='Schulzrinne' fullname='H. Schulzrinne'><organization /></author>
<author initials='H.' surname='Tschofenig' fullname='H. Tschofenig'><organization /></author>
<date year='2014' month='September' />
<abstract><t>Over the past decade, Voice over IP (VoIP) systems based on SIP have replaced many traditional telephony deployments.  Interworking VoIP systems with the traditional telephone network has reduced the overall level of calling party number and Caller ID assurances by granting attackers new and inexpensive tools to impersonate or obscure calling party numbers when orchestrating bulk commercial calling schemes, hacking voicemail boxes, or even circumventing multi-factor authentication systems trusted by banks.  Despite previous attempts to provide a secure assurance of the origin of SIP communications, we still lack effective standards for identifying the calling party in a VoIP session.  This document examines the reasons why providing identity for telephone numbers on the Internet has proven so difficult and shows how changes in the last decade may provide us with new strategies for attaching a secure identity to SIP sessions.  It also gives high-level requirements for a solution in this space.</t></abstract>
</front>
<seriesInfo name='RFC' value='7340'/>
<seriesInfo name='DOI' value='10.17487/RFC7340'/>
</reference>




    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

