<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.15 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-stir-passport-rcd-07" category="std">

  <front>
    <title abbrev="RCD">PASSporT Extension for Rich Call Data</title>

    <author initials="J." surname="Peterson" fullname="Jon Peterson">
      <organization>Neustar Inc.</organization>
      <address>
        <postal>
          <street>1800 Sutter St Suite 570</street>
          <city>Concord, CA  94520</city>
          <country>US</country>
        </postal>
        <email>jon.peterson@neustar.biz</email>
      </address>
    </author>
    <author initials="C." surname="Wendt" fullname="Chris Wendt">
      <organization>Comcast</organization>
      <address>
        <postal>
          <street>Comcast Technology Center</street>
          <city>Philadelphia, PA  19103</city>
          <country>USA</country>
        </postal>
        <email>chris-ietf@chriswendt.net</email>
      </address>
    </author>

    <date year="2020" month="November" day="02"/>

    <area>art</area>
    
    <keyword>Identity</keyword>

    <abstract>


<t>This document extends PASSporT, a token for conveying cryptographically-signed call information about personal communications, to include rich meta-data about a call and caller that can be signed and integrity protected, transmitted, and subsequently rendered to users. This framework is intended to extend caller and call specific information beyond human-readable display name comparable to the “Caller ID” function common on the telephone network. The JSON element defined for this purpose, Rich Call Data (RCD), is an extensible object defined to either be used as part of STIR or with SIP Call-Info to include related information about calls that helps people decide whether to pick up the phone. This signing of the RCD information is also enhanced with a integrity mechanism that is designed to protect the authoring and transport of this information between authoritative and non-authoritative parties authoring and signing the Rich Call Data for support of different usage and content policies.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>PASSporT <xref target="RFC8225"/> is a token format based on JWT <xref target="RFC7519"/> for conveying cryptographically-signed information about the people involved in personal communications; it is used to convey a signed assertion of the identity of the participants in real-time communications established via a protocol like SIP <xref target="RFC8224"/>. The STIR problem statement <xref target="RFC7340"/> declared securing the display name of callers outside of STIR’s initial scope, so baseline STIR provides no features for caller name. This specification documents an optional mechanism for PASSporT and the associated STIR procedures which extend PASSporT objects to carry additional elements conveying richer information: information that is intended to be rendered to an end user to assist a called party in determining whether to accept or trust incoming communications. This includes the name of the person on one side of a communications session, the traditional “Caller ID” of the telephone network, along with related display information that would be rendered to the called party during alerting, or potentially used by an automaton to determine whether and how to alert a called party.</t>

<t>Traditional telephone network signaling protocols have long supported delivering a ‘calling name’ from the originating side, though in practice, the terminating side is often left to derive a name from the calling party number by consulting a local address book or an external database. SIP similarly can carry this information in a ‘display-name’ in the From header field value from the originating to terminating side, or alternatively in the Call-Info header field. However, both are unsecured fields that really can not be trusted in most interconnected SIP deployments, and therefore is a good starting point for a framework that utilizes STIR techniques and procedures for protecting call related information including but not limited to calling name.</t>

<t>As such, the baseline use-case for this document will be extending PASSporT to provide cryptographic protection for the “display-name” field of SIP requests as well as further “rich call data” (RCD) about the caller, which includes the contents of the Call-Info header field or other data structures that can be added to the PASSporT. This document furthermore specifies a third-party profile that would allow external authorities to convey rich information associated with a calling number via a new type of PASSporT. Finally, this document describes how to preserve the integrity of the RCD in scenarios where there may be non-authoritative users that may be initiating and signing RCD and therefore a constraint on the RCD data that a PASSporT can attest via certificate-level controls.</t>

</section>
<section anchor="terminology" title="Terminology">

<t>In this document, the key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”, “MAY”, and “OPTIONAL” are to be interpreted as described in <xref target="RFC2119"/> and <xref target="RFC6919"/>.</t>

</section>
<section anchor="overview-of-the-use-of-the-rich-call-data-passport-extension" title="Overview of the use of the Rich Call Data PASSporT extension">

<t>The main intended use of the signing of Rich Call Data (RCD) using STIR <xref target="RFC8224"/> and as a PASSporT extension <xref target="RFC8225"/> is from an entity that is associated with the origination of a call. Either directly the caller themselves, if they are authoritative, or a service provider or third-party service that may be authoritative over the rich call data on behalf of the caller.</t>

<t>The RCD described in this document is of two main categories. The first data is a more traditional set of info about a caller associated with “display-name” in SIP <xref target="RFC3261"/> and typically is the calling name that is a textual description of the caller. The second data is a set of RCD that is defined as part of the jCard definitions or extensions to that data. <xref target="I-D.ietf-sipcore-callinfo-rcd"/> describes the optional use of jCard in Call-Info header field as RCD with the “jcard” Call-Info purpose token. Either or both of these two types of data can be incorporated into a “rcd” claim defined in this document.</t>

<t>Additionally, <xref target="I-D.ietf-sipcore-callinfo-rcd"/> also describes a “reason” parameter intended for description of the intent or reason for a particular call. A new claim “crn”, or call reason, can contain the string or object that describes the intent of the call. This claim is intentionally kept separate from the “rcd” claim because it is envisioned that call reason is not the same as information associated with the caller and may change on a more frequent, per call, type of basis.</t>

<t>In addition to the type of RCD that can be signed, there are three modes of use of the signing of Rich Call Data (RCD). The first and simplest mode is exclusively for when all RCD content is directly included as part of the claims (i.e. no URIs are included in the content). In this mode the set of claims is signed via standard PASSporT <xref target="RFC8225"/> and SIP identity header <xref target="RFC8224"/> procedures. The second mode is an extension of the first where a “rcd” claim is included and the content includes a URI identifying external resources. In this mode, a “rcdi” integrity claim MUST be included. This integrity claim is defined later in this document and provides a digest of the content so that, particularly for the case where there is URI references in the RCD, the content of that RCD can be comprehensively validated that it was received as intended by the signer of the PASSporT. The third mode is an extension to both the first and second modes and incorporates the ability to include the digest of the integrity claim as a required value, using JWT Constraints as defined in <xref target="RFC8226"/>, in the certificate used to create the PASSporT digital signature. This mode allows for cases where there is a different authoritative entity responsible for the content of the RCD, separate from the signer of the PASSporT itself allowing the ability to have policy around the content and potential review or pre-determination of allowed RCD content.</t>

<t>More generally, either of the claims defined in this or future specifications content can be protected by the authoritative certificate creators by inclusion in the <xref target="RFC8226"/> defined certificate’s JWT Constraints.</t>

</section>
<section anchor="overview-of-rich-call-data-integrity" title="Overview of Rich Call Data integrity">

<t>When incorporating call data that represents a user, even in traditional calling name services today, often there is policy and restrictions around what data is allowed to be used. Whether preventing offensive language or icons or enforcing uniqueness, potential copyright violations or other policy enforcement, there will likely be the desire to pre-certify the specific use of rich call data. This document defines a mechanism that allows for an indirect party that controls the policy to approve or certify the content, create a cryptographic digest that can be used to validate that data and applies a constraint in the certificate to allow the recipient and verifier to validate that the specific content of the RCD is as intended at its creation and approval or certification.</t>

<t>The integrity mechanism is a process of generating a sufficiently strong cryptographic digest for both the “rcd” claim contents (e.g. “nam” and “jcd”) defined below and the resources defined by one or more globally unique HTTPS URLs referenced by the contents (e.g. an image file referenced by “jcd”). This mechanism is inspired and based on the W3C Subresource Integrity specification (http://www.w3.org/TR/SRI/). This mechanism additionally defines the ability to constrain the digest and RCD integrity mechanism to be mandatory without modification using JWT Constraints defined in <xref target="RFC8226"/>.</t>

</section>
<section anchor="passport-claims" title="PASSporT Claims">

<section anchor="syntax" title="PASSporT “rcd” Claim">

<t>This specification defines a new JSON Web Token claim for “rcd”, Rich Call Data, the value of which is a JSON object that can contain one or more key value pairs. This document defines a default set of key values.</t>

<section anchor="nam-key" title="“nam” key">

<t>The “nam” key value is a display name, associated with the originator of personal communications, which may for example derive from the display-name component of the From header field value of a SIP request, or a similar field in other PASSporT using protocols. This key MUST be included once and MUST be included as part of the “rcd” claim value JSON object. If there is no string associated with a display name, the claim value SHOULD then be an empty string.</t>

</section>
<section anchor="jcd-key" title="“jcd” key">

<t>The “jcd” key value is defined to contain a value of a jCard <xref target="RFC7095"/> JSON object. This jCard object is intended to represent and derives from the Call-Info header field value defined in <xref target="I-D.ietf-sipcore-callinfo-rcd"/> with a type of “jcard”. As also defined in <xref target="I-D.ietf-sipcore-callinfo-rcd"/>, format of the jCard and properties used should follow the normative usage and formatting rules and procedures. It is an extensible object where the calling party can provide both the standard types of information defined in jCard or can use the built-in extensibility of the jCard specification to add additional information. The “jcd” is optional. If included, this key MUST only be included once in the “rcd” JSON object and SHOULD NOT be included if there is a “jcl” key included. The “jcd” and “jcl” keys should be mutually exclusive.</t>

<t>Note: even though we refer to <xref target="I-D.ietf-sipcore-callinfo-rcd"/> as the definition of the jcard properties for usage in a “rcd” PASSporT, other protocols can be adapted for use of “jcd” (or similarly “jcl” below) key beyond SIP and Call-Info.</t>

</section>
<section anchor="jcl-key" title="“jcl” key">

<t>The “jcl” key value is defined to contain a HTTPS URL that refers the recipient to a jCard <xref target="RFC7095"/> JSON object hosted on a HTTPS enabled web server. This link may derive from the Call-Info header field value defined in <xref target="I-D.ietf-sipcore-callinfo-rcd"/> with a type of “jcard”. As also defined in <xref target="I-D.ietf-sipcore-callinfo-rcd"/>, format of the jCard and properties used should follow the normative usage and formatting rules and procedures. The “jcl” key is optional. If included, this key MUST only be included once in the “rcd” JSON object and MUST NOT be included if there is a “jcd” key included. The “jcd” and “jcl” keys MUST be used mutually exclusively.</t>

</section>
<section anchor="rcdi-rcd-integrity-claim" title="“rcdi” RCD integrity Claim">

<t>The “rcdi” claim is an optional claim that SHOULD be included if the application requires integrity to be applied to the content of the “rcd” claim and if included MUST be included only once with a corresponding “rcd” claim. The value of the “rcdi” key pair should contain a string that is defined as follows.</t>

<t>The first part of the string should define the crypto algorithm used to generate the digest. For RCD, implementations MUST support the following hash algorithms, “SHA256”, “SHA384”, or “SHA512”. The SHA-256, SHA-384, and SHA-512 are part of the SHA-2 set of cryptographic hash functions defined by the NIST. Implementations MAY support additional algorithms, but MUST NOT support known weak algorithms such as MD5 or SHA-1. In the future, the list of algorithms may re-evaluated based on security best practices. The algorithms MUST be represented in the text by “sha256”, “sha384”, or “sha512”. The character following the algorithm string MUST be a minus character, “-“. The subsequent characters MUST be the base64 encoded digest of a canonicalized and concatenated string based on the “rcd” claim and the URLs contained in the claim. The details of the creation of this string are defined in the next section.</t>

<figure><artwork><![CDATA[
Example:
"rcdi" : "sha256-H8BRh8j48O9oYatfu5AZzq6A9RINQZngK7T62em8MUt1FLm52"
]]></artwork></figure>

</section>
<section anchor="creation-of-the-rcd-digest" title="Creation of the “rcd” digest">

<t>In order to facilitate proper verification of the digest and whether the “rcd” content was modified, the input to the digest must be completely deterministic at three points in the process. First, at the certification point where the content is evaluated to conform to the application policy and the JWT Claim Constraints is applied to the certificate containing the digest. Second, when the call is signed at the Authentication Service, there may be a local policy to verify that the provided “rcd” claim corresponds to the digest. Third, when the “rcd” data is verified at the Verification Service, it MUST verify the digest by constructing the “rcd” input digest string.</t>

<t>The procedures for the creation of the “rcd” input digest string is as follows.</t>

<t><list style="numbers">
  <t>Arrange the keys in the “rcd” claim value to be in lexicographic order.</t>
  <t>Serialize the resulting “rcd” claim value JSON object to remove all white space and line breaks. The procedures of this deterministic JSON serialization is defined in <xref target="RFC8225"/>, Section 9.</t>
  <t>Identify, in order of where they appear in the serialized string, all of the URLs referencing external resource files.</t>
  <t>Construct the “rcd” input string by first inserting the serialized “rcd” claim value.</t>
  <t>If there is at least one URL identified, insert a semicolon character at the end of the “rcd” serialized string.</t>
  <t>Follow the semicolon with the Base64 encoded contents of resource file referenced by the first URL.</t>
  <t>Repeat steps 5 and 6 for any additionally identified corresponding URLs including URLs contained in resources referenced by other URLs. When or if these nested URLs occur in the contents referred to by a parent URL, the insertion of the Base64 encoded contents should be included for all child URLs before moving to any subsequent parent URL.</t>
</list></t>

<t>Once the input serialized string has been created, use this string to create the base64 encoded digest output that can be inserted into the “rcdi” claim as discussed in the last section.</t>

<figure><artwork><![CDATA[
Example "rcd" claim with URL:
"rcd": { "nam" : "James Bond",
         "jcl" : "https://example.org/james_bond.json"
       }

Example "rcd" input digest string (with line breaks for readability):
{"nam":"James Bond","jcl":"https://example.org/james_bond.json"};
ONG##*NCCCDJK123...KLJASlkJlkjsadlf2e3

Example "rcdi" claim:
"rcdi":"sha256-u5AZzq6A9RINQZngK7T62em8M"
]]></artwork></figure>

</section>
<section anchor="jwt-constraint-for-rcdi-claim" title="JWT Constraint for “rcdi” claim">

<t>Once both the contents of the “rcd” claim is certified and the construction of the “rcdi” claim is complete, the “rcdi” digest is linked to the STIR certificate associated with the signature in the PASSporT via JWT Claim Constraints as defined in <xref target="RFC8226"/> Section 8.</t>

<t>The certificate JWT Claims Constraint MUST include both of the following:</t>

<t><list style="symbols">
  <t>a “mustInclude” for the “rcd” claim</t>
  <t>a “mustInclude” for the “rcdi” claim and a “permittedValues” equal to the created “rcdi” claim value string.</t>
</list></t>

<t>The “permitedValues” for the “rcdi” claim may contain multiple entries, to support the case where the certificate holder is authorized to use different sets of rich call data.</t>

</section>
</section>
<section anchor="passport-crn-claim-call-reason" title="PASSporT “crn” claim - Call Reason">

<t>This specification defines a new JSON Web Token claim for “crn”, Call Reason, the value of which is a single string or object that can contains information as defined in <xref target="I-D.ietf-sipcore-callinfo-rcd"/> corresponding to the “reason” parameter for the Call-Info header. This claim is optional.</t>

<figure><artwork><![CDATA[
Example "crn" claim with "rcd":
"rcd": { "nam" : "James Bond",
         "jcl" : "https://example.org/james_bond.json"
       },
“crn” : “For your ears only”
]]></artwork></figure>

<section anchor="jwt-constraint-for-cdn-claim" title="JWT Constraint for “cdn” claim">

<t>The integrity of the “crn” claim can optionally be protected by the authoritative certificate creator using JWT Constraints in the certificate.</t>

</section>
</section>
</section>
<section anchor="rcd-and-crn-claims-usage" title="“rcd” and “crn” Claims Usage">

<t>Either the “rcd” or “crn” claim may appear in any PASSporT claims object as an optional element. The creator of a PASSporT MAY also add a “ppt” value of “rcd” to the header of a PASSporT as well, in which case the PASSporT claims MUST contain either a “rcd” or “crn” claim, and any entities verifying the PASSporT object will be required to understand the “ppt” extension in order to process the PASSporT in question. A PASSporT header with the “ppt” included will look as follows:</t>

<figure><artwork><![CDATA[
{ "typ":"passport",
  "ppt":"rcd",
  "alg":"ES256",
  "x5u":"https://www.example.com/cert.cer" }
]]></artwork></figure>

<t>The PASSporT claims object will then contain the “rcd” key with its corresponding value. The value of “rcd” is an array of JSON objects, of which one, the “nam” object, is mandatory. The key syntax of “nam” follows the display-name ABNF given in <xref target="RFC3261"/>.</t>

<t>After the header and claims PASSporT objects have been constructed, their signature is generated normally per the guidance in <xref target="RFC8225"/>.</t>

<section anchor="example-rcd-passports" title="Example “rcd” PASSporTs">

<t>An example of a “nam” only PASSporT claims obejct is shown next (with line breaks for readability only).</t>

<figure><artwork><![CDATA[
{  "orig":{"tn":"12025551000"},
   "dest":{"tn":"12025551001"},
   "iat":1443208345,
   "rcd":{"nam":"James Bond"} }
]]></artwork></figure>

<t>An example of a “nam” only PASSporT claims object with an “rcdi” claim is shown next (with line breaks for readability only).</t>

<figure><artwork><![CDATA[
{  "orig":{"tn":"12025551000"},
   "dest":{"tn":"12025551001"},
   "iat":1443208345,
   "rcd":{"nam":"James Bond"}
   "rcdi":"sha256-H8BRh8j48O9oYatfu5AZzq6A9R6dQZngK7T62em8MUt1FLm52"
}
]]></artwork></figure>

<t>An example of a PASSporT claims object that includes the “jcd” which is optional, but will also include the mandatory “nam” object is shown next (with line breaks for readability only).</t>

<figure><artwork><![CDATA[
{  "orig":{"tn":"12025551000"},
   "dest":{"tn":"12155551001"},
   "iat":1443208345,
   "rcd":{"nam":"James Bond","jcd":["vcard",[["version",{},"text",
       "4.0"],
       ["fn",{},"text", "James Bond"],
       ["n",{},"text",["Bond","James","","","Mr."]],
       ["adr",{"type":"work"},"text",
         ["","","3100 Massachusetts Avenue NW","Washington","DC",
         "20008","USA"]
       ],
       ["email",{},"text","007@mi6-hq.com"],
       ["tel",{"type":["voice","text","cell"],"pref":"1"},"uri",
        "tel:+1-202-555-1000"],
       ["tel",{"type":["fax"]},"uri","tel:+1-202-555-1001"],
       ["bday",{},"date","19241116"],
       ["logo",{},"uri",
       "https://upload.wikimedia.org/wikipedia/en/c/c5
        /Fleming007impression.jpg"
       ]]]}}
]]></artwork></figure>

<t>In an example PASSporT where a jCard is linked via HTTPS URL and “jcl” a jCard file served at a particular URL will be created.</t>

<t>An example jCard JSON file is shown as follows:</t>

<figure><artwork><![CDATA[
["vcard",
  [
    ["version", {}, "text", "4.0"],
    ["fn", {}, "text", "James Bond"],
    ["n", {}, "text", ["Bond", "James", "", "", "Mr."]],
    ["adr", {"type":"work"}, "text",
      ["", "", "3100 Massachusetts Avenue NW", "Washington", "DC",
      "20008", "USA"]
    ],
    ["email", {}, "text", "007@mi6-hq.com"],
    ["tel", { "type": ["voice", "text", "cell"], "pref": "1" },
      "uri", "tel:+1-202-555-1000"],
    ["tel", { "type": ["fax"] }, "uri", "tel:+1-202-555-1001"],
    ["bday", {}, "date", "19241116"]
    ["logo", {}, "uri",
    "https://upload.wikimedia.org/wikipedia/en/c/c5
      /Fleming007impression.jpg"]
  ]
]
]]></artwork></figure>

<t>If that jCard is hosted at the example address of “https://example.org/james_bond.json”, the corresponding PASSporT claims object would be as follows (with line breaks for readability only):</t>

<figure><artwork><![CDATA[
{  "orig":{"tn":"12025551000"},
   "dest":{"tn":"12155551001"},
   "iat":1443208345,
   "rcd":{"nam":"James Bond","jcl":"https://example.org/jb.json"}
   }
]]></artwork></figure>

<t>If we were to add a “rcdi” integrity claim to the last example, the corresponding PASSporT claims object would be as follows (with line breaks for readability only):</t>

<figure><artwork><![CDATA[
{  "orig":{"tn":"12025551000"},
   "dest":{"tn":"12155551001"},
   "iat":1443208345,
   "rcd":{"nam":"James Bond","jcl":"https://example.org/jb.json"}
   "rcdi":"sha256-H8BRh8j48O9oYatfu5AZzq6A9R6dQZngK7T62em8MUt1FLm"
   }
]]></artwork></figure>

</section>
</section>
<section anchor="compact-form-of-rcd-passport" title="Compact form of “rcd” PASSporT">

<section anchor="compact-form-of-the-rcd-passport-claim" title="Compact form of the “rcd” PASSporT claim">

<t>Compact form of an “rcd” PASSporT claim has some restrictions but mainly follows standard PASSporT compact form procedures. For re-construction of the “nam” claim the string for the display-name in the From header field. For re-construction of the “jcl”, the Call-Info header as with purpose “jcard” defined in <xref target="I-D.ietf-sipcore-callinfo-rcd"/> MUST be used. “jcd” claim MAY NOT be used as part of compact form.</t>

</section>
<section anchor="compact-form-of-the-rcdi-passport-claim" title="Compact form of the “rcdi” PASSporT claim">

<t>Compact form of an “rcdi” PASSPorT claim shall be re-constructed following the same “rcdi” defined digest procedures in this document of all of the content and referenced URI content once downloaded.</t>

</section>
<section anchor="compact-form-of-the-crn-passport-claim" title="Compact form of the “crn” PASSporT claim">

<t>Compact form of a “crn” PASSporT claim shall be re-constructed using the “reason” parameter of a Call-Info header as defined by <xref target="I-D.ietf-sipcore-callinfo-rcd"/>.</t>

</section>
</section>
<section anchor="extend" title="Further Information Associated with Callers">

<t>Beyond naming information and the information that can be contained in a jCard <xref target="RFC7095"/> object, there may be additional human-readable information about the calling party that should be rendered to the end user in order to help the called party decide whether or not to pick up the phone. This is not limited to information about the caller, but includes information about the call itself, which may derive from analytics that determine based on call patterns or similar data if the call is likely to be one the called party wants to receive. Such data could include:</t>

<t><list style="symbols">
  <t>information related to the location of the caller, or</t>
  <t>any organizations or institutions that the caller is associated with, or even categories of institutions (is this a government agency, or a bank, or what have you), or</t>
  <t>hyperlinks to images, such as logos or pictures of faces, or to similar external profile information, or</t>
  <t>information that will be processed by an application before rendering it to a user, like social networking data that shows that an unknown caller is a friend-of-a-friend, or reputation scores derived from crowdsourcing, or confidence scores based on broader analytics about the caller and callee.</t>
</list></t>

<t>All of these data elements would benefit from the secure attestations provided by the STIR and PASSporT frameworks. A new IANA registry has been defined to hold potential values of the “rcd” array; see <xref target="rcdtypes"/>. Specific extensions to the “rcd” PASSporT claim are left for future specification.</t>

<t>While in the traditional telephone network, the business relationship between calling customers and their telephone service providers is the ultimate root of information about a calling party’s name, some other forms of data like crowdsourced reputation scores might derive from third parties. It is more likely that when those elements are present, they will be in a third-party “rcd” PASSporT.</t>

</section>
<section anchor="parties" title="Third-Party Uses">

<t>While rich data about the call can be provided by an originating authentication service, an intermediary in the call path could also acquire rich call data by querying a third-party service. Such a service effectively acts as a STIR Authentication Service, generating its own PASSporT, and that PASSporT could be attached to a SIP call by either the originating or terminating side. This third-party PASSporT attests information about the calling number, rather than the call or caller itself, and as such its RCD MUST NOT be used when a call lacks a first-party PASSporT that assures verification services that the calling party number is not spoofed. It is intended to be used in cases when the originating side does not supply a display-name for the caller, so instead some entity in the call path invokes a third-party service to provide rich caller data for a call.</t>

<t>In telephone operations today, a third-party information service is commonly queried with the calling party’s number in order to learn the name of the calling party, and potentially other helpful information could also be passed over that interface. The value of using a PASSporT to convey this information from third parties lies largely in the preservation of the original authority’s signature over the data, and the potential for the PASSporT to be conveyed from intermediaries to endpoint devices. Effectively, these use cases form a sub-case of out-of-band <xref target="I-D.ietf-stir-oob"/> use cases. The manner in which third-party services are discovered is outside the scope of this document.</t>

<t>An intermediary use case might look as follows: a SIP INVITE carries a display name in its From header field value and an initial PASSporT object without the “rcd” claim. When the a terminating verification service implemented at a SIP proxy server receives this request, and determines that the signature is valid, it might query a third-party service that maps telephone numbers to calling party names. Upon receiving the PASSport in a response from that third-party service, the terminating side could add a new Identity header field to the request for the “rcd” PASSporT object provided by the third-party service. It would then forward the INVITE to the terminating user agent. If the display name in the “rcd” PASSporT object matches the display name in the INVITE, then the name would presumably be rendered to the end user by the terminating user agent.</t>

<t>A very similar flow could be followed by an intermediary closer to the origination of the call. Presumably such a service could be implemented at an originating network in order to decouple the systems that sign for calling party numbers from the systems that provide rich data about calls.</t>

<t>In an alternative use case, the terminating user agent might query a third-party service. In this case, no new Identity header field would be generated, though the terminating user agent might receive a PASSporT object in return from the third-party service, and use the “rcd” field in the object as a calling name to render to users while alerting.</t>

<section anchor="thirdsign" title="Signing as a Third Party">

<t>A third-party PASSporT, which contains such an “iss” element, will necessarily be signed with credentials that do not have authority over the identity that appears in the “orig” element of the PASSporT claims. The presence of “iss” signifies that a different category of credential is being used to sign a PASSporT than the <xref target="RFC8226"></xref> certificates used to sign STIR calls; it is instead a certificate that identifies the source of the “rcd” data. How those credentials are issued and managed is outside the scope of this specification; the value of “iss” however MUST reflect the Subject Name field of the certificate used to sign a third-party PASSporT. Relying parties in STIR have always been left to make their own authorization decisions about whether or not the trust the signers of PASSporTs, and in the third-party case, where an entity has explicitly queried a service to acquire the PASSporT object, it may be some external trust or business relationship that induces the relying party to trust a PASSporT.</t>

<t>An example of a Third Party issued PASSporT claims object is as follows.</t>

<figure><artwork><![CDATA[
{  "orig":{"tn":"12025551000"},
   "dest":{"tn":"12025551001"},
   "iat":1443208345,
   "iss":"Example, Inc.",
   "rcd":{"nam":"James Bond"} }
]]></artwork></figure>

</section>
</section>
<section anchor="loa" title="Levels of Assurance">

<t>As “rcd” can be provided by either first or third parties, relying parties could benefit from an additional claim that indicates the relationship of the attesting party to the caller. Even in first party cases, this admits of some complexity: the Communications Service Provider (CSP) to which a number was assigned might in turn delegate the number to a reseller, who would then sell the number to an enterprise, in which case the CSP might have little insight into the caller’s name. In third party cases, a caller’s name could derive from any number of data sources, on a spectrum between public data scraped from web searches to a direct business relationship to the caller. As multiple PASSporTs can be associated with the same call, potentially a verification service could receive attestations of the caller name from multiple sources, which have different levels of granularity or accuracy. Therefore, PASSporTs that carry “rcd” data SHOULD also carry an indication of the relationship of the generator of the PASSporT to the caller. As stated in the previous section, the use of “iss” MUST reflect the Organization (O) field of the certificate used to sign a third-party PASSporT to represent that relationship.</t>

</section>
<section anchor="use" title="Using “rcd” in SIP">

<t>This section specifies SIP-specific usage for the “rcd” claim in PASSporT, and in the SIP Identity header field value. Other using protocols of PASSporT may define their own usages for the “rcd” claim.</t>

<section anchor="authentication-service-behavior" title="Authentication Service Behavior">

<t>An authentication service creating a PASSporT containing a “rcd” claim MAY include a “ppt” for “rcd” or not. Third-party authentication services following the behavior in <xref target="thirdsign"/> MUST include a “ppt” of “rcd”. If “ppt” does contain a “rcd”, then any SIP authentication services MUST add a “ppt” parameter to the Identity header containing that PASSporT with a value of “rcd”. The resulting Identity header might look as follows:</t>

<figure><artwork><![CDATA[
Identity: "sv5CTo05KqpSmtHt3dcEiO/1CWTSZtnG3iV+1nmurLXV/HmtyNS7Ltrg9
    dlxkWzoeU7d7OV8HweTTDobV3itTmgPwCFjaEmMyEI3d7SyN21yNDo2ER/Ovgtw0
    Lu5csIppPqOg1uXndzHbG7mR6Rl9BnUhHufVRbp51Mn3w0gfUs="; \
    info=<https://biloxi.example.org/biloxi.cer>;alg=ES256;ppt="rcd"
]]></artwork></figure>

<t>This specification assumes that by default, a SIP authentication service will derive the value of “rcd”, specifically only for the “nam” key value, from the display-name component of the From header field value of the request, alternatively for some calls this may come from the P-Asserted-ID header. It is however a matter of authentication service policy to decide how it populates the value of “rcd” and “nam” key, which MAY also derive from other fields in the request, from customer profile data, or from access to external services. If the authentication service generates a PASSporT object containing “rcd” with a value that is not equivalent to the From header field display-name value, it MUST use the full form of the PASSporT object in SIP.</t>

</section>
<section anchor="verification-service-behavior" title="Verification Service Behavior">

<t><xref target="RFC8224"/> Section 6.2 Step 5 requires that specifications defining “ppt” values describe any additional verifier behavior. The behavior specified for the “ppt” values of “rcd” is as follows. If the PASSporT is in compact form, then the verification service SHOULD extract the display-name from the From header field value, if any, and use that as the value for the “nam” key when it recomputes the header and claims of the PASSporT object. Optionally, if there exists a Call-Info header field as defined in <xref target="I-D.ietf-sipcore-callinfo-rcd"/>, the “jcard” value can be derived to determine the “jcd” key when it recomputes the header and claims of the PASSporT object. If the signature validates over the recomputed object, then the verification should be considered successful.</t>

<t>However, if the PASSport is in full form with a “ppt” value of “rcd”, then the verification service MUST extract the value associated with the “rcd” “nam” key in the object. If the signature validates, then the verification service can use the value of the “rcd” “nam” key as the display name of calling party, which would in turn be rendered to alerted users or otherwise leveraged in accordance with local policy. This will allow SIP networks that convey the display name through a field other than the From header field to interoperate with this specification. Similarly, the “jcd” or linked “jcl” jcard information and “crn” can be optionally, based on local policy for devices that support it, used to populate a Call-Info header field following the format of <xref target="I-D.ietf-sipcore-callinfo-rcd"/>.</t>

<t>The third-party “rcd” PASSporT cases presents some new challenges, as an attacker could attempt to cut-and-paste such a third-party PASSporT into a SIP request in an effort to get the terminating user agent to render the display name or confidence values it contains to a call that should have no such assurance. A third-party “rcd” PASSporT provides no assurance that the calling party number has not been spoofed: if it is carried in a SIP request, for example, then some other PASSporT in another Identity header field value would have to carry a PASSporT attesting that. A verification service MUST determine that the calling party number shown in the “orig” of the “rcd” PASSporT corresponds to the calling party number of the call it has received, and that the “iat” field of the “rcd” PASSporT is within the date interval that the verification service would ordinarily accept for a PASSporT.</t>

<t>Verification services may alter their authorization policies for the credentials accepted to sign PASSporTs when third parties generate PASSporT objects, per <xref target="thirdsign"/>. This may include accepting a valid signature over a PASSporT even if it is signed with a credential that does not attest authority over the identity in the “orig” claim of the PASSporT, provided that the verification service has some other reason to trust the signer. No further guidance on verification service authorization policy is given here.</t>

<t>The behavior of a SIP UAS upon receiving an INVITE containing a PASSporT object with a “rcd” claim will largely remain a matter of implementation policy. In most cases, implementations would render this calling party name information to the user while alerting. Any user interface additions to express confidence in the veracity of this information are outside the scope of this specification.</t>

</section>
</section>
<section anchor="using-rcd-as-additional-claims-to-other-passport-extensions" title="Using “rcd” as additional claims to other PASSporT extensions">

<t>Rich Call Data, including calling name information, for example, is often data that is additive data to the personal communications information defined in the core PASSporT data required to support the security properties defined in <xref target="RFC8225"/>. For cases where the entity that is originating the personal communications and additionally is supporting the authentication service and also is the authority of the Rich Call Data, rather than creating multiple identity headers with multiple PASSporT extensions or defining multiple combinations and permutations of PASSporT extension definitions, the authentication service can alternatively directly add the “rcd” claims to the PASSporT it is creating, whether it is constructed with a PASSporT extension or not.</t>

<section anchor="procedures-for-applying-rcd-as-claims-only" title="Procedures for applying “rcd” as claims only">

<t>For a given PASSporT using some other extension than “rcd”, the Authentication Service MAY additionally include the “rcd” claim as defined in this document. This would result in a set of claims that correspond to the original intended extension with the addition of the “rcd” claim.</t>

<t>The Verification service that receives the PASSporT, if it supports this specification and chooses to, should interpret the “rcd” claim as simply just an additional claim intended to deliver and/or validate delivered Rich Call Data.</t>

</section>
<section anchor="example-for-applying-rcd-as-claims-only" title="Example for applying “rcd” as claims only">

<t>In the case of <xref target="RFC8588"/> which is the PASSporT extension supporting the SHAKEN specification <xref target="ATIS-1000074"/>, a common case for an Authentication service to co-exist in a CSP network along with the authority over the calling name used for the call. Rather than require two identity headers, the CSP Authentication Service can apply both the SHAKEN PASSporT claims and extension and simply add the “rcd” required claims defined in this document.</t>

<t>For example, the PASSporT claims for the “shaken” PASSporT with “rcd” claims would be as follows:</t>

<figure><artwork><![CDATA[
Protected Header
{
   "alg":"ES256",
   "typ":"passport",
   “ppt”:”shaken”,
   "x5u":"https://cert.example.org/passport.cer"
}
Payload
{
   “attest”:”A”,
   "dest":{“tn”:["12025551001"]},
   "iat":1443208345,
   "orig":{“tn”:"12025551000"},
   “origid”:”123e4567-e89b-12d3-a456-426655440000”,
   "rcd":{"nam":"James Bond"}
}
]]></artwork></figure>

<t>A Verification Service that supports “rcd” and “shaken” PASSporT extensions will be able to receive the above PASSporT and interpret both the “shaken” claims as well as the “rcd” defined claim.</t>

<t>If the Verification Service only understands the “shaken” extension claims but doesn’t support “rcd”, the “rcd” can simply be ignored and disregarded.</t>

</section>
</section>
<section anchor="acknowledgements" title="Acknowledgements">

<t>We would like to thank David Hancock, Robert Sparks, Russ Housley, and Eric Burger for helpful suggestions and comments.</t>

</section>
<section anchor="IANA" title="IANA Considerations">

<section anchor="json-web-token-claim" title="JSON Web Token Claim">

<t>This specification requests that the IANA add three new claims to the JSON Web Token Claims registry as defined in <xref target="RFC7519"/>.</t>

<t>Claim Name: “rcd”</t>

<t>Claim Description: Rich Call Data Information</t>

<t>Change Controller: IESG</t>

<t>Specification Document(s): [RFCThis]</t>

<t>Claim Name: “rcdi”</t>

<t>Claim Description: Rich Call Data Integrity Information</t>

<t>Change Controller: IESG</t>

<t>Specification Document(s): [RFCThis]</t>

<t>Claim Name: “crn”</t>

<t>Claim Description: Call Reason</t>

<t>Change Controller: IESG</t>

<t>Specification Document(s): [RFCThis]</t>

</section>
<section anchor="passport-types" title="PASSporT Types">

<t>This specification requests that the IANA add a new entry to the PASSporT Types registry for the type “rcd” which is specified in [RFCThis].</t>

</section>
<section anchor="rcdtypes" title="PASSporT RCD Types">

<t>This document requests that the IANA create a new registry for PASSporT RCD types. Registration of new PASSporT RCD types shall be under the Specification Required policy.</t>

<t>This registry is to be initially populated with three values, “nam”, “jcd”, and “jcl”, which are specified in [RFCThis].</t>

</section>
</section>
<section anchor="Security" title="Security Considerations">

<t>Revealing information such as the name, location, and affiliation of a person necessarily entails certain privacy risks. Baseline PASSporT has no particular confidentiality requirement, as the information it signs over in a using protocol like SIP is all information that SIP carries in the clear anyway. Transport-level security can hide those SIP fields from eavesdroppers, and the same confidentiality mechanisms would protect any PASSporT(s) carried in SIP.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference anchor="I-D.ietf-stir-oob">
<front>
<title>STIR Out-of-Band Architecture and Use Cases</title>

<author initials='E' surname='Rescorla' fullname='Eric Rescorla'>
    <organization />
</author>

<author initials='J' surname='Peterson' fullname='Jon Peterson'>
    <organization />
</author>

<date month='March' day='9' year='2020' />

<abstract><t>The PASSporT format defines a token that can be carried by signaling protocols, including SIP, to cryptographically attest the identify of callers.  Not all telephone calls use Internet signaling protocols, however, and some calls use them for only part of their signaling path, or cannot reliably deliver SIP header fields end-to-end.  This document describes use cases that require the delivery of PASSporT objects outside of the signaling path, and defines architectures and semantics to provide this functionality.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-stir-oob-07' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-stir-oob-07.txt' />
</reference>



<reference anchor="I-D.ietf-sipcore-callinfo-rcd">
<front>
<title>SIP Call-Info Parameters for Rich Call Data</title>

<author initials='C' surname='Wendt' fullname='Chris Wendt'>
    <organization />
</author>

<author initials='J' surname='Peterson' fullname='Jon Peterson'>
    <organization />
</author>

<date month='November' day='2' year='2020' />

<abstract><t>This document describes a SIP Call-Info header field usage defined to include rich data associated with the identity of the calling party that can be rendered to called party for providing more useful information about the caller or the specific reason for the call. This includes extended comprehensive information about the caller such as what a jCard object can represent for describing the calling party or other call specific information such as describing the reason or intent of the call.  The elements defined for this purpose are intended to be extensible to accommodate related information about calls that helps people decide whether to pick up the phone and additionally, with the use of jCard and other elements, to be compatible with the STIR/PASSporT Rich Call Data framework.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-sipcore-callinfo-rcd-00' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-sipcore-callinfo-rcd-00.txt' />
</reference>



<reference  anchor="RFC3261" target='https://www.rfc-editor.org/info/rfc3261'>
<front>
<title>SIP: Session Initiation Protocol</title>
<author initials='J.' surname='Rosenberg' fullname='J. Rosenberg'><organization /></author>
<author initials='H.' surname='Schulzrinne' fullname='H. Schulzrinne'><organization /></author>
<author initials='G.' surname='Camarillo' fullname='G. Camarillo'><organization /></author>
<author initials='A.' surname='Johnston' fullname='A. Johnston'><organization /></author>
<author initials='J.' surname='Peterson' fullname='J. Peterson'><organization /></author>
<author initials='R.' surname='Sparks' fullname='R. Sparks'><organization /></author>
<author initials='M.' surname='Handley' fullname='M. Handley'><organization /></author>
<author initials='E.' surname='Schooler' fullname='E. Schooler'><organization /></author>
<date year='2002' month='June' />
<abstract><t>This document describes Session Initiation Protocol (SIP), an application-layer control (signaling) protocol for creating, modifying, and terminating sessions with one or more participants.  These sessions include Internet telephone calls, multimedia distribution, and multimedia conferences.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3261'/>
<seriesInfo name='DOI' value='10.17487/RFC3261'/>
</reference>



<reference  anchor="RFC6919" target='https://www.rfc-editor.org/info/rfc6919'>
<front>
<title>Further Key Words for Use in RFCs to Indicate Requirement Levels</title>
<author initials='R.' surname='Barnes' fullname='R. Barnes'><organization /></author>
<author initials='S.' surname='Kent' fullname='S. Kent'><organization /></author>
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /></author>
<date year='2013' month='April' />
<abstract><t>RFC 2119 defines a standard set of key words for describing requirements of a specification.  Many IETF documents have found that these words cannot accurately capture the nuanced requirements of their specification.  This document defines additional key words that can be used to address alternative requirements scenarios.  Authors who follow these guidelines should incorporate this phrase near the beginning of their document:</t><t>The key words &quot;MUST (BUT WE KNOW YOU WON\'T)&quot;, &quot;SHOULD CONSIDER&quot;, &quot;REALLY SHOULD NOT&quot;, &quot;OUGHT TO&quot;, &quot;WOULD PROBABLY&quot;, &quot;MAY WISH TO&quot;, &quot;COULD&quot;, &quot;POSSIBLE&quot;, and &quot;MIGHT&quot; in this document are to be interpreted as described in RFC 6919.</t></abstract>
</front>
<seriesInfo name='RFC' value='6919'/>
<seriesInfo name='DOI' value='10.17487/RFC6919'/>
</reference>



<reference  anchor="RFC7095" target='https://www.rfc-editor.org/info/rfc7095'>
<front>
<title>jCard: The JSON Format for vCard</title>
<author initials='P.' surname='Kewisch' fullname='P. Kewisch'><organization /></author>
<date year='2014' month='January' />
<abstract><t>This specification defines &quot;jCard&quot;, a JSON format for vCard data. The vCard data format is a text format for representing and exchanging information about individuals and other entities, for example, telephone numbers, email addresses, structured names, and delivery addresses.  JSON is a lightweight, text-based, language- independent data interchange format commonly used in Internet applications.</t></abstract>
</front>
<seriesInfo name='RFC' value='7095'/>
<seriesInfo name='DOI' value='10.17487/RFC7095'/>
</reference>



<reference  anchor="RFC7340" target='https://www.rfc-editor.org/info/rfc7340'>
<front>
<title>Secure Telephone Identity Problem Statement and Requirements</title>
<author initials='J.' surname='Peterson' fullname='J. Peterson'><organization /></author>
<author initials='H.' surname='Schulzrinne' fullname='H. Schulzrinne'><organization /></author>
<author initials='H.' surname='Tschofenig' fullname='H. Tschofenig'><organization /></author>
<date year='2014' month='September' />
<abstract><t>Over the past decade, Voice over IP (VoIP) systems based on SIP have replaced many traditional telephony deployments.  Interworking VoIP systems with the traditional telephone network has reduced the overall level of calling party number and Caller ID assurances by granting attackers new and inexpensive tools to impersonate or obscure calling party numbers when orchestrating bulk commercial calling schemes, hacking voicemail boxes, or even circumventing multi-factor authentication systems trusted by banks.  Despite previous attempts to provide a secure assurance of the origin of SIP communications, we still lack effective standards for identifying the calling party in a VoIP session.  This document examines the reasons why providing identity for telephone numbers on the Internet has proven so difficult and shows how changes in the last decade may provide us with new strategies for attaching a secure identity to SIP sessions.  It also gives high-level requirements for a solution in this space.</t></abstract>
</front>
<seriesInfo name='RFC' value='7340'/>
<seriesInfo name='DOI' value='10.17487/RFC7340'/>
</reference>



<reference  anchor="RFC7519" target='https://www.rfc-editor.org/info/rfc7519'>
<front>
<title>JSON Web Token (JWT)</title>
<author initials='M.' surname='Jones' fullname='M. Jones'><organization /></author>
<author initials='J.' surname='Bradley' fullname='J. Bradley'><organization /></author>
<author initials='N.' surname='Sakimura' fullname='N. Sakimura'><organization /></author>
<date year='2015' month='May' />
<abstract><t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties.  The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t></abstract>
</front>
<seriesInfo name='RFC' value='7519'/>
<seriesInfo name='DOI' value='10.17487/RFC7519'/>
</reference>



<reference  anchor="RFC8224" target='https://www.rfc-editor.org/info/rfc8224'>
<front>
<title>Authenticated Identity Management in the Session Initiation Protocol (SIP)</title>
<author initials='J.' surname='Peterson' fullname='J. Peterson'><organization /></author>
<author initials='C.' surname='Jennings' fullname='C. Jennings'><organization /></author>
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /></author>
<author initials='C.' surname='Wendt' fullname='C. Wendt'><organization /></author>
<date year='2018' month='February' />
<abstract><t>The baseline security mechanisms in the Session Initiation Protocol (SIP) are inadequate for cryptographically assuring the identity of the end users that originate SIP requests, especially in an interdomain context.  This document defines a mechanism for securely identifying originators of SIP requests.  It does so by defining a SIP header field for conveying a signature used for validating the identity and for conveying a reference to the credentials of the signer.</t><t>This document obsoletes RFC 4474.</t></abstract>
</front>
<seriesInfo name='RFC' value='8224'/>
<seriesInfo name='DOI' value='10.17487/RFC8224'/>
</reference>



<reference  anchor="RFC8225" target='https://www.rfc-editor.org/info/rfc8225'>
<front>
<title>PASSporT: Personal Assertion Token</title>
<author initials='C.' surname='Wendt' fullname='C. Wendt'><organization /></author>
<author initials='J.' surname='Peterson' fullname='J. Peterson'><organization /></author>
<date year='2018' month='February' />
<abstract><t>This document defines a method for creating and validating a token that cryptographically verifies an originating identity or, more generally, a URI or telephone number representing the originator of personal communications.  The Personal Assertion Token, PASSporT, is cryptographically signed to protect the integrity of the identity of the originator and to verify the assertion of the identity information at the destination.  The cryptographic signature is defined with the intention that it can confidently verify the originating persona even when the signature is sent to the destination party over an insecure channel.  PASSporT is particularly useful for many personal-communications applications over IP networks and other multi-hop interconnection scenarios where the originating and destination parties may not have a direct trusted relationship.</t></abstract>
</front>
<seriesInfo name='RFC' value='8225'/>
<seriesInfo name='DOI' value='10.17487/RFC8225'/>
</reference>



<reference  anchor="RFC8226" target='https://www.rfc-editor.org/info/rfc8226'>
<front>
<title>Secure Telephone Identity Credentials: Certificates</title>
<author initials='J.' surname='Peterson' fullname='J. Peterson'><organization /></author>
<author initials='S.' surname='Turner' fullname='S. Turner'><organization /></author>
<date year='2018' month='February' />
<abstract><t>In order to prevent the impersonation of telephone numbers on the Internet, some kind of credential system needs to exist that cryptographically asserts authority over telephone numbers.  This document describes the use of certificates in establishing authority over telephone numbers, as a component of a broader architecture for managing telephone numbers as identities in protocols like SIP.</t></abstract>
</front>
<seriesInfo name='RFC' value='8226'/>
<seriesInfo name='DOI' value='10.17487/RFC8226'/>
</reference>



<reference  anchor="RFC8588" target='https://www.rfc-editor.org/info/rfc8588'>
<front>
<title>Personal Assertion Token (PaSSporT) Extension for Signature-based Handling of Asserted information using toKENs (SHAKEN)</title>
<author initials='C.' surname='Wendt' fullname='C. Wendt'><organization /></author>
<author initials='M.' surname='Barnes' fullname='M. Barnes'><organization /></author>
<date year='2019' month='May' />
<abstract><t>This document extends the Personal Assertion Token (PASSporT), which is a token object that conveys cryptographically signed information about the participants involved in communications.  The extension is defined based on the &quot;Signature-based Handling of Asserted                                     information using toKENs (SHAKEN)&quot; specification by the ATIS/SIP Forum IP-NNI Task Group.  It provides both (1) a specific set of levels of confidence in the correctness of the originating identity of a call originated in a SIP-based telephone network as well as (2) an identifier that allows the Service Provider (SP) to uniquely identify the origin of the call within its network.</t></abstract>
</front>
<seriesInfo name='RFC' value='8588'/>
<seriesInfo name='DOI' value='10.17487/RFC8588'/>
</reference>




    </references>

    <references title='Informative References'>

<reference anchor="ATIS-1000074" >
  <front>
    <title>Signature-based Handling of Asserted information using toKENs (SHAKEN) &lt;https://access.atis.org/apps/group_public/download.php/32237/ATIS-1000074.pdf&gt;</title>
    <author >
      <organization>ATIS/SIP Forum NNI Task Group</organization>
    </author>
    <date year="2017" month="January"/>
  </front>
</reference>




<reference  anchor="RFC2119" target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>




    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

