<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.2.12 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-stir-passport-rcd-08" category="std">

  <front>
    <title abbrev="RCD">PASSporT Extension for Rich Call Data</title>

    <author initials="J." surname="Peterson" fullname="Jon Peterson">
      <organization>Neustar Inc.</organization>
      <address>
        <postal>
          <street>1800 Sutter St Suite 570</street>
          <city>Concord, CA  94520</city>
          <country>US</country>
        </postal>
        <email>jon.peterson@neustar.biz</email>
      </address>
    </author>
    <author initials="C." surname="Wendt" fullname="Chris Wendt">
      <organization>Comcast</organization>
      <address>
        <postal>
          <street>Comcast Technology Center</street>
          <city>Philadelphia, PA  19103</city>
          <country>USA</country>
        </postal>
        <email>chris-ietf@chriswendt.net</email>
      </address>
    </author>

    <date year="2020" month="November" day="16"/>

    <area>art</area>
    
    <keyword>Identity</keyword>

    <abstract>


<t>This document extends PASSporT, a token for conveying cryptographically-signed call information about personal communications, to include rich meta-data about a call and caller that can be signed and integrity protected, transmitted, and subsequently rendered to users. This framework is intended to extend caller and call specific information beyond human-readable display name comparable to the “Caller ID” function common on the telephone network. The JSON element defined for this purpose, Rich Call Data (RCD), is an extensible object defined to either be used as part of STIR or with SIP Call-Info to include related information about calls that helps people decide whether to pick up the phone. This signing of the RCD information is also enhanced with a integrity mechanism that is designed to protect the authoring and transport of this information between authoritative and non-authoritative parties authoring and signing the Rich Call Data for support of different usage and content policies.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>PASSporT <xref target="RFC8225"/> is a token format based on JWT <xref target="RFC7519"/> for conveying cryptographically-signed information about the people involved in personal communications; it is used to convey a signed assertion of the identity of the participants in real-time communications established via a protocol like SIP <xref target="RFC8224"/>. The STIR problem statement <xref target="RFC7340"/> declared securing the display name of callers outside of STIR’s initial scope, so baseline STIR provides no features for caller name. This specification documents an optional mechanism for PASSporT and the associated STIR procedures which extend PASSporT objects to carry additional elements conveying richer information: information that is intended to be rendered to an end user to assist a called party in determining whether to accept or trust incoming communications. This includes the name of the person on one side of a communications session, the traditional “Caller ID” of the telephone network, along with related display information that would be rendered to the called party during alerting, or potentially used by an automaton to determine whether and how to alert a called party.</t>

<t>Traditional telephone network signaling protocols have long supported delivering a ‘calling name’ from the originating side, though in practice, the terminating side is often left to derive a name from the calling party number by consulting a local address book or an external database. SIP similarly can carry this information in a ‘display-name’ in the From header field value from the originating to terminating side, or alternatively in the Call-Info header field. However, both are unsecured fields that really can not be trusted in most interconnected SIP deployments, and therefore is a good starting point for a framework that utilizes STIR techniques and procedures for protecting call related information including but not limited to calling name.</t>

<t>As such, the baseline use-case for this document will be extending PASSporT to provide cryptographic protection for the “display-name” field of SIP requests as well as further “rich call data” (RCD) about the caller, which includes the contents of the Call-Info header field or other data structures that can be added to the PASSporT. This document furthermore specifies a third-party profile that would allow external authorities to convey rich information associated with a calling number via a new type of PASSporT. Finally, this document describes how to preserve the integrity of the RCD in scenarios where there may be non-authoritative users that may be initiating and signing RCD and therefore a constraint on the RCD data that a PASSporT can attest via certificate-level controls.</t>

</section>
<section anchor="terminology" title="Terminology">

<t>In this document, the key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”, “MAY”, and “OPTIONAL” are to be interpreted as described in <xref target="RFC2119"/> and <xref target="RFC6919"/>.</t>

</section>
<section anchor="overview-of-the-use-of-the-rich-call-data-passport-extension" title="Overview of the use of the Rich Call Data PASSporT extension">

<t>The main intended use of the signing of Rich Call Data (RCD) using STIR <xref target="RFC8224"/> and as a PASSporT extension <xref target="RFC8225"/> is from an entity that is associated with the origination of a call. Either directly the caller themselves, if they are authoritative, or a service provider or third-party service that may be authoritative over the rich call data on behalf of the caller.</t>

<t>The RCD described in this document is of two main categories. The first data is a more traditional set of info about a caller associated with “display-name” in SIP <xref target="RFC3261"/> and typically is the calling name that is a textual description of the caller. The second data is a set of RCD that is defined as part of the jCard definitions or extensions to that data. <xref target="I-D.ietf-sipcore-callinfo-rcd"/> describes the optional use of jCard in Call-Info header field as RCD with the “jcard” Call-Info purpose token. Either or both of these two types of data can be incorporated into a “rcd” claim defined in this document.</t>

<t>Additionally, <xref target="I-D.ietf-sipcore-callinfo-rcd"/> also describes a “reason” parameter intended for description of the intent or reason for a particular call. A new claim “crn”, or call reason, can contain the string or object that describes the intent of the call. This claim is intentionally kept separate from the “rcd” claim because it is envisioned that call reason is not the same as information associated with the caller and may change on a more frequent, per call, type of basis.</t>

<t>In addition to the type of RCD that can be signed, there are three modes of use of the signing of Rich Call Data (RCD). The first and simplest mode is exclusively for when all RCD content is directly included as part of the claims (i.e. no URIs are included in the content). In this mode the set of claims is signed via standard PASSporT <xref target="RFC8225"/> and SIP identity header <xref target="RFC8224"/> procedures. The second mode is an extension of the first where a “rcd” claim is included and the content includes a URI identifying external resources. In this mode, a “rcdi” integrity claim MUST be included. This integrity claim is defined later in this document and provides a digest of the content so that, particularly for the case where there is URI references in the RCD, the content of that RCD can be comprehensively validated that it was received as intended by the signer of the PASSporT. The third mode is an extension to both the first and second modes and incorporates the ability to include the digest of the integrity claim as a required value, using JWT Constraints as defined in <xref target="RFC8226"/>, in the certificate used to create the PASSporT digital signature. This mode allows for cases where there is a different authoritative entity responsible for the content of the RCD, separate from the signer of the PASSporT itself allowing the ability to have policy around the content and potential review or pre-determination of allowed RCD content.</t>

<t>More generally, either of the claims defined in this or future specifications content can be protected by the authoritative certificate creators by inclusion in the <xref target="RFC8226"/> defined certificate’s JWT Constraints.</t>

</section>
<section anchor="overview-of-rich-call-data-integrity" title="Overview of Rich Call Data integrity">

<t>When incorporating call data that represents a user, even in traditional calling name services today, often there is policy and restrictions around what data is allowed to be used. Whether preventing offensive language or icons or enforcing uniqueness, potential copyright violations or other policy enforcement, there will likely be the desire to pre-certify the specific use of rich call data. This document defines a mechanism that allows for an indirect party that controls the policy to approve or certify the content, create a cryptographic digest that can be used to validate that data and applies a constraint in the certificate to allow the recipient and verifier to validate that the specific content of the RCD is as intended at its creation and approval or certification.</t>

<t>The integrity mechanism is a process of generating a sufficiently strong cryptographic digest for both the “rcd” claim contents (e.g. “nam” and “jcd”) defined below and the resources defined by one or more globally unique HTTPS URLs referenced by the contents (e.g. an image file referenced by “jcd”). This mechanism is inspired and based on the W3C Subresource Integrity specification (http://www.w3.org/TR/SRI/). This mechanism additionally defines the ability to constrain the digest and RCD integrity mechanism to be mandatory without modification using JWT Constraints defined in <xref target="RFC8226"/>.</t>

</section>
<section anchor="passport-claims" title="PASSporT Claims">

<section anchor="syntax" title="PASSporT “rcd” Claim">

<t>This specification defines a new JSON Web Token claim for “rcd”, Rich Call Data, the value of which is a JSON object that can contain one or more key value pairs. This document defines a default set of key values.</t>

<section anchor="nam-key" title="“nam” key">

<t>The “nam” key value is a display name, associated with the originator of personal communications, which may for example derive from the display-name component of the From header field value of a SIP request, or a similar field in other PASSporT using protocols. This key MUST be included once and MUST be included as part of the “rcd” claim value JSON object. If there is no string associated with a display name, the claim value SHOULD then be an empty string.</t>

</section>
<section anchor="jcd-key" title="“jcd” key">

<t>The “jcd” key value is defined to contain a value of a jCard <xref target="RFC7095"/> JSON object. This jCard object is intended to represent and derives from the Call-Info header field value defined in <xref target="I-D.ietf-sipcore-callinfo-rcd"/> with a type of “jcard”. As also defined in <xref target="I-D.ietf-sipcore-callinfo-rcd"/>, format of the jCard and properties used should follow the normative usage and formatting rules and procedures. It is an extensible object where the calling party can provide both the standard types of information defined in jCard or can use the built-in extensibility of the jCard specification to add additional information. The “jcd” is optional. If included, this key MUST only be included once in the “rcd” JSON object and SHOULD NOT be included if there is a “jcl” key included. The “jcd” and “jcl” keys should be mutually exclusive.</t>

<t>Note: even though we refer to <xref target="I-D.ietf-sipcore-callinfo-rcd"/> as the definition of the jcard properties for usage in a “rcd” PASSporT, other protocols can be adapted for use of “jcd” (or similarly “jcl” below) key beyond SIP and Call-Info.</t>

</section>
<section anchor="jcl-key" title="“jcl” key">

<t>The “jcl” key value is defined to contain a HTTPS URL that refers the recipient to a jCard <xref target="RFC7095"/> JSON object hosted on a HTTPS enabled web server. This link may derive from the Call-Info header field value defined in <xref target="I-D.ietf-sipcore-callinfo-rcd"/> with a type of “jcard”. As also defined in <xref target="I-D.ietf-sipcore-callinfo-rcd"/>, format of the jCard and properties used should follow the normative usage and formatting rules and procedures. The “jcl” key is optional. If included, this key MUST only be included once in the “rcd” JSON object and MUST NOT be included if there is a “jcd” key included. The “jcd” and “jcl” keys MUST be used mutually exclusively.</t>

</section>
<section anchor="rcdi-rcd-integrity-claim" title="“rcdi” RCD integrity Claim">

<t>The “rcdi” claim is an optional claim that SHOULD be included if the application requires integrity to be applied to the content of the “rcd” claim and if included MUST be included only once with a corresponding “rcd” claim. The value of the “rcdi” key pair should contain a string that is defined as follows.</t>

<t>The first part of the string should define the crypto algorithm used to generate the digest. For RCD, implementations MUST support the following hash algorithms, “SHA256”, “SHA384”, or “SHA512”. The SHA-256, SHA-384, and SHA-512 are part of the SHA-2 set of cryptographic hash functions defined by the NIST. Implementations MAY support additional algorithms, but MUST NOT support known weak algorithms such as MD5 or SHA-1. In the future, the list of algorithms may re-evaluated based on security best practices. The algorithms MUST be represented in the text by “sha256”, “sha384”, or “sha512”. The character following the algorithm string MUST be a minus character, “-“. The subsequent characters MUST be the base64 encoded digest of a canonicalized and concatenated string based on the “rcd” claim and the URLs contained in the claim. The details of the creation of this string are defined in the next section.</t>

<figure><artwork><![CDATA[
Example:
"rcdi" : "sha256-H8BRh8j48O9oYatfu5AZzq6A9RINQZngK7T62em8MUt1FLm52"
]]></artwork></figure>

</section>
<section anchor="creation-of-the-rcd-digest" title="Creation of the “rcd” digest">

<t>In order to facilitate proper verification of the digest and whether the “rcd” content was modified, the input to the digest must be completely deterministic at three points in the process. First, at the certification point where the content is evaluated to conform to the application policy and the JWT Claim Constraints is applied to the certificate containing the digest. Second, when the call is signed at the Authentication Service, there may be a local policy to verify that the provided “rcd” claim corresponds to the digest. Third, when the “rcd” data is verified at the Verification Service, it MUST verify the digest by constructing the “rcd” input digest string.</t>

<t>The procedures for the creation of the “rcd” input digest string is as follows.</t>

<t><list style="numbers">
  <t>Arrange the keys in the “rcd” claim value to be in lexicographic order.</t>
  <t>Serialize the resulting “rcd” claim value JSON object to remove all white space and line breaks. The procedures of this deterministic JSON serialization is defined in <xref target="RFC8225"/>, Section 9.</t>
  <t>Identify, in order of where they appear in the serialized string, all of the URLs referencing external resource files.</t>
  <t>Construct the “rcd” input string by first inserting the serialized “rcd” claim value.</t>
  <t>If there is at least one URL identified, insert a semicolon character at the end of the “rcd” serialized string.</t>
  <t>Follow the semicolon with the Base64 encoded contents of resource file referenced by the first URL.</t>
  <t>Repeat steps 5 and 6 for any additionally identified corresponding URLs including URLs contained in resources referenced by other URLs. When or if these nested URLs occur in the contents referred to by a parent URL, the insertion of the Base64 encoded contents should be included for all child URLs before moving to any subsequent parent URL.</t>
</list></t>

<t>Once the input serialized string has been created, use this string to create the base64 encoded digest output that can be inserted into the “rcdi” claim as discussed in the last section.</t>

<figure><artwork><![CDATA[
Example "rcd" claim with URL:
"rcd": { "nam" : "James Bond",
         "jcl" : "https://example.org/james_bond.json"
       }

Example "rcd" input digest string (with line breaks for readability):
{"nam":"James Bond","jcl":"https://example.org/james_bond.json"};
ONG##*NCCCDJK123...KLJASlkJlkjsadlf2e3

Example "rcdi" claim:
"rcdi":"sha256-u5AZzq6A9RINQZngK7T62em8M"
]]></artwork></figure>

</section>
<section anchor="jwt-constraint-for-rcdi-claim" title="JWT Constraint for “rcdi” claim">

<t>Once both the contents of the “rcd” claim is certified and the construction of the “rcdi” claim is complete, the “rcdi” digest is linked to the STIR certificate associated with the signature in the PASSporT via JWT Claim Constraints as defined in <xref target="RFC8226"/> Section 8.</t>

<t>The certificate JWT Claims Constraint MUST include both of the following:</t>

<t><list style="symbols">
  <t>a “mustInclude” for the “rcd” claim</t>
  <t>a “mustInclude” for the “rcdi” claim and a “permittedValues” equal to the created “rcdi” claim value string.</t>
</list></t>

<t>The “permitedValues” for the “rcdi” claim may contain multiple entries, to support the case where the certificate holder is authorized to use different sets of rich call data.</t>

</section>
</section>
<section anchor="passport-crn-claim-call-reason" title="PASSporT “crn” claim - Call Reason">

<t>This specification defines a new JSON Web Token claim for “crn”, Call Reason, the value of which is a single string or object that can contains information as defined in <xref target="I-D.ietf-sipcore-callinfo-rcd"/> corresponding to the “reason” parameter for the Call-Info header. This claim is optional.</t>

<figure><artwork><![CDATA[
Example "crn" claim with "rcd":
"rcd": { "nam" : "James Bond",
         "jcl" : "https://example.org/james_bond.json"
       },
“crn” : “For your ears only”
]]></artwork></figure>

<section anchor="jwt-constraint-for-cdn-claim" title="JWT Constraint for “cdn” claim">

<t>The integrity of the “crn” claim can optionally be protected by the authoritative certificate creator using JWT Constraints in the certificate.</t>

</section>
</section>
</section>
<section anchor="rcd-and-crn-claims-usage" title="“rcd” and “crn” Claims Usage">

<t>Either the “rcd” or “crn” claim may appear in any PASSporT claims object as an optional element. The creator of a PASSporT MAY also add a “ppt” value of “rcd” to the header of a PASSporT as well, in which case the PASSporT claims MUST contain either a “rcd” or “crn” claim, and any entities verifying the PASSporT object will be required to understand the “ppt” extension in order to process the PASSporT in question. A PASSporT header with the “ppt” included will look as follows:</t>

<figure><artwork><![CDATA[
{ "typ":"passport",
  "ppt":"rcd",
  "alg":"ES256",
  "x5u":"https://www.example.com/cert.cer" }
]]></artwork></figure>

<t>The PASSporT claims object will then contain the “rcd” key with its corresponding value. The value of “rcd” is an array of JSON objects, of which one, the “nam” object, is mandatory. The key syntax of “nam” follows the display-name ABNF given in <xref target="RFC3261"/>.</t>

<t>After the header and claims PASSporT objects have been constructed, their signature is generated normally per the guidance in <xref target="RFC8225"/>.</t>

<section anchor="example-rcd-passports" title="Example “rcd” PASSporTs">

<t>An example of a “nam” only PASSporT claims obejct is shown next (with line breaks for readability only).</t>

<figure><artwork><![CDATA[
{  "orig":{"tn":"12025551000"},
   "dest":{"tn":"12025551001"},
   "iat":1443208345,
   "rcd":{"nam":"James Bond"} }
]]></artwork></figure>

<t>An example of a “nam” only PASSporT claims object with an “rcdi” claim is shown next (with line breaks for readability only).</t>

<figure><artwork><![CDATA[
{  "orig":{"tn":"12025551000"},
   "dest":{"tn":"12025551001"},
   "iat":1443208345,
   "rcd":{"nam":"James Bond"}
   "rcdi":"sha256-H8BRh8j48O9oYatfu5AZzq6A9R6dQZngK7T62em8MUt1FLm52"
}
]]></artwork></figure>

<t>An example of a PASSporT claims object that includes the “jcd” which is optional, but will also include the mandatory “nam” object is shown next (with line breaks for readability only).</t>

<figure><artwork><![CDATA[
{  "orig":{"tn":"12025551000"},
   "dest":{"tn":"12155551001"},
   "iat":1443208345,
   "rcd":{"nam":"James Bond","jcd":["vcard",[["version",{},"text",
       "4.0"],
       ["fn",{},"text", "James Bond"],
       ["n",{},"text",["Bond","James","","","Mr."]],
       ["adr",{"type":"work"},"text",
         ["","","3100 Massachusetts Avenue NW","Washington","DC",
         "20008","USA"]
       ],
       ["email",{},"text","007@mi6-hq.com"],
       ["tel",{"type":["voice","text","cell"],"pref":"1"},"uri",
        "tel:+1-202-555-1000"],
       ["tel",{"type":["fax"]},"uri","tel:+1-202-555-1001"],
       ["bday",{},"date","19241116"],
       ["logo",{},"uri",
       "https://upload.wikimedia.org/wikipedia/en/c/c5
        /Fleming007impression.jpg"
       ]]]}}
]]></artwork></figure>

<t>In an example PASSporT where a jCard is linked via HTTPS URL and “jcl” a jCard file served at a particular URL will be created.</t>

<t>An example jCard JSON file is shown as follows:</t>

<figure><artwork><![CDATA[
["vcard",
  [
    ["version", {}, "text", "4.0"],
    ["fn", {}, "text", "James Bond"],
    ["n", {}, "text", ["Bond", "James", "", "", "Mr."]],
    ["adr", {"type":"work"}, "text",
      ["", "", "3100 Massachusetts Avenue NW", "Washington", "DC",
      "20008", "USA"]
    ],
    ["email", {}, "text", "007@mi6-hq.com"],
    ["tel", { "type": ["voice", "text", "cell"], "pref": "1" },
      "uri", "tel:+1-202-555-1000"],
    ["tel", { "type": ["fax"] }, "uri", "tel:+1-202-555-1001"],
    ["bday", {}, "date", "19241116"]
    ["logo", {}, "uri",
    "https://upload.wikimedia.org/wikipedia/en/c/c5
      /Fleming007impression.jpg"]
  ]
]
]]></artwork></figure>

<t>If that jCard is hosted at the example address of “https://example.org/james_bond.json”, the corresponding PASSporT claims object would be as follows (with line breaks for readability only):</t>

<figure><artwork><![CDATA[
{  "orig":{"tn":"12025551000"},
   "dest":{"tn":["12155551001"]},
   "iat":1443208345,
   "rcd":{"nam":"James Bond","jcl":"https://example.org/jb.json"}
   }
]]></artwork></figure>

<t>If we were to add a “rcdi” integrity claim to the last example, the corresponding PASSporT claims object would be as follows (with line breaks for readability only):</t>

<figure><artwork><![CDATA[
{  "orig":{"tn":"12025551000"},
   "dest":{"tn":["12155551001"]},
   "iat":1443208345,
   "rcd":{"nam":"James Bond","jcl":"https://example.org/jb.json"}
   "rcdi":"sha256-H8BRh8j48O9oYatfu5AZzq6A9R6dQZngK7T62em8MUt1FLm"
   }
]]></artwork></figure>

</section>
</section>
<section anchor="compact-form-of-rcd-passport" title="Compact form of “rcd” PASSporT">

<section anchor="compact-form-of-the-rcd-passport-claim" title="Compact form of the “rcd” PASSporT claim">

<t>Compact form of an “rcd” PASSporT claim has some restrictions but mainly follows standard PASSporT compact form procedures. For re-construction of the “nam” claim the string for the display-name in the From header field. For re-construction of the “jcl”, the Call-Info header as with purpose “jcard” defined in <xref target="I-D.ietf-sipcore-callinfo-rcd"/> MUST be used. “jcd” claim MAY NOT be used as part of compact form.</t>

</section>
<section anchor="compact-form-of-the-rcdi-passport-claim" title="Compact form of the “rcdi” PASSporT claim">

<t>Compact form of an “rcdi” PASSPorT claim shall be re-constructed following the same “rcdi” defined digest procedures in this document of all of the content and referenced URI content once downloaded.</t>

</section>
<section anchor="compact-form-of-the-crn-passport-claim" title="Compact form of the “crn” PASSporT claim">

<t>Compact form of a “crn” PASSporT claim shall be re-constructed using the “reason” parameter of a Call-Info header as defined by <xref target="I-D.ietf-sipcore-callinfo-rcd"/>.</t>

</section>
</section>
<section anchor="extend" title="Further Information Associated with Callers">

<t>Beyond naming information and the information that can be contained in a jCard <xref target="RFC7095"/> object, there may be additional human-readable information about the calling party that should be rendered to the end user in order to help the called party decide whether or not to pick up the phone. This is not limited to information about the caller, but includes information about the call itself, which may derive from analytics that determine based on call patterns or similar data if the call is likely to be one the called party wants to receive. Such data could include:</t>

<t><list style="symbols">
  <t>information related to the location of the caller, or</t>
  <t>any organizations or institutions that the caller is associated with, or even categories of institutions (is this a government agency, or a bank, or what have you), or</t>
  <t>hyperlinks to images, such as logos or pictures of faces, or to similar external profile information, or</t>
  <t>information that will be processed by an application before rendering it to a user, like social networking data that shows that an unknown caller is a friend-of-a-friend, or reputation scores derived from crowdsourcing, or confidence scores based on broader analytics about the caller and callee.</t>
</list></t>

<t>All of these data elements would benefit from the secure attestations provided by the STIR and PASSporT frameworks. A new IANA registry has been defined to hold potential values of the “rcd” array; see <xref target="rcdtypes"/>. Specific extensions to the “rcd” PASSporT claim are left for future specification.</t>

<t>While in the traditional telephone network, the business relationship between calling customers and their telephone service providers is the ultimate root of information about a calling party’s name, some other forms of data like crowdsourced reputation scores might derive from third parties. It is more likely that when those elements are present, they will be in a third-party “rcd” PASSporT.</t>

</section>
<section anchor="parties" title="Third-Party Uses">

<t>While rich data about the call can be provided by an originating authentication service, an intermediary in the call path could also acquire rich call data by querying a third-party service. Such a service effectively acts as a STIR Authentication Service, generating its own PASSporT, and that PASSporT could be attached to a SIP call by either the originating or terminating side. This third-party PASSporT attests information about the calling number, rather than the call or caller itself, and as such its RCD MUST NOT be used when a call lacks a first-party PASSporT that assures verification services that the calling party number is not spoofed. It is intended to be used in cases when the originating side does not supply a display-name for the caller, so instead some entity in the call path invokes a third-party service to provide rich caller data for a call.</t>

<t>In telephone operations today, a third-party information service is commonly queried with the calling party’s number in order to learn the name of the calling party, and potentially other helpful information could also be passed over that interface. The value of using a PASSporT to convey this information from third parties lies largely in the preservation of the original authority’s signature over the data, and the potential for the PASSporT to be conveyed from intermediaries to endpoint devices. Effectively, these use cases form a sub-case of out-of-band <xref target="I-D.ietf-stir-oob"/> use cases. The manner in which third-party services are discovered is outside the scope of this document.</t>

<t>An intermediary use case might look as follows: a SIP INVITE carries a display name in its From header field value and an initial PASSporT object without the “rcd” claim. When the a terminating verification service implemented at a SIP proxy server receives this request, and determines that the signature is valid, it might query a third-party service that maps telephone numbers to calling party names. Upon receiving the PASSport in a response from that third-party service, the terminating side could add a new Identity header field to the request for the “rcd” PASSporT object provided by the third-party service. It would then forward the INVITE to the terminating user agent. If the display name in the “rcd” PASSporT object matches the display name in the INVITE, then the name would presumably be rendered to the end user by the terminating user agent.</t>

<t>A very similar flow could be followed by an intermediary closer to the origination of the call. Presumably such a service could be implemented at an originating network in order to decouple the systems that sign for calling party numbers from the systems that provide rich data about calls.</t>

<t>In an alternative use case, the terminating user agent might query a third-party service. In this case, no new Identity header field would be generated, though the terminating user agent might receive a PASSporT object in return from the third-party service, and use the “rcd” field in the object as a calling name to render to users while alerting.</t>

<section anchor="thirdsign" title="Signing as a Third Party">

<t>A third-party PASSporT, which contains such an “iss” element, will necessarily be signed with credentials that do not have authority over the identity that appears in the “orig” element of the PASSporT claims. The presence of “iss” signifies that a different category of credential is being used to sign a PASSporT than the <xref target="RFC8226"></xref> certificates used to sign STIR calls; it is instead a certificate that identifies the source of the “rcd” data. How those credentials are issued and managed is outside the scope of this specification; the value of “iss” however MUST reflect the Subject Name field of the certificate used to sign a third-party PASSporT. Relying parties in STIR have always been left to make their own authorization decisions about whether or not the trust the signers of PASSporTs, and in the third-party case, where an entity has explicitly queried a service to acquire the PASSporT object, it may be some external trust or business relationship that induces the relying party to trust a PASSporT.</t>

<t>An example of a Third Party issued PASSporT claims object is as follows.</t>

<figure><artwork><![CDATA[
{  "orig":{"tn":"12025551000"},
   "dest":{"tn":["12025551001"]},
   "iat":1443208345,
   "iss":"Example, Inc.",
   "rcd":{"nam":"James Bond"} }
]]></artwork></figure>

</section>
</section>
<section anchor="loa" title="Levels of Assurance">

<t>As “rcd” can be provided by either first or third parties, relying parties could benefit from an additional claim that indicates the relationship of the attesting party to the caller. Even in first party cases, this admits of some complexity: the Communications Service Provider (CSP) to which a number was assigned might in turn delegate the number to a reseller, who would then sell the number to an enterprise, in which case the CSP might have little insight into the caller’s name. In third party cases, a caller’s name could derive from any number of data sources, on a spectrum between public data scraped from web searches to a direct business relationship to the caller. As multiple PASSporTs can be associated with the same call, potentially a verification service could receive attestations of the caller name from multiple sources, which have different levels of granularity or accuracy. Therefore, PASSporTs that carry “rcd” data SHOULD also carry an indication of the relationship of the generator of the PASSporT to the caller. As stated in the previous section, the use of “iss” MUST reflect the Organization (O) field of the certificate used to sign a third-party PASSporT to represent that relationship.</t>

</section>
<section anchor="use" title="Using “rcd” in SIP">

<t>This section specifies SIP-specific usage for the “rcd” claim in PASSporT, and in the SIP Identity header field value. Other using protocols of PASSporT may define their own usages for the “rcd” claim.</t>

<section anchor="authentication-service-behavior" title="Authentication Service Behavior">

<t>An authentication service creating a PASSporT containing a “rcd” claim MAY include a “ppt” for “rcd” or not. Third-party authentication services following the behavior in <xref target="thirdsign"/> MUST include a “ppt” of “rcd”. If “ppt” does contain a “rcd”, then any SIP authentication services MUST add a “ppt” parameter to the Identity header containing that PASSporT with a value of “rcd”. The resulting Identity header might look as follows:</t>

<figure><artwork><![CDATA[
Identity: sv5CTo05KqpSmtHt3dcEiO/1CWTSZtnG3iV+1nmurLXV/HmtyNS7Ltrg9
       dlxkWzoeU7d7OV8HweTTDobV3itTmgPwCFjaEmMyEI3d7SyN21yNDo2ER/Ovgtw0
       Lu5csIppPqOg1uXndzHbG7mR6Rl9BnUhHufVRbp51Mn3w0gfUs=; \
       info=<https://biloxi.example.org/biloxi.cer>;alg=ES256;ppt=rcd
]]></artwork></figure>

<t>This specification assumes that by default, a SIP authentication service will derive the value of “rcd”, specifically only for the “nam” key value, from the display-name component of the From header field value of the request, alternatively for some calls this may come from the P-Asserted-ID header. It is however a matter of authentication service policy to decide how it populates the value of “rcd” and “nam” key, which MAY also derive from other fields in the request, from customer profile data, or from access to external services. If the authentication service generates a PASSporT object containing “rcd” with a value that is not equivalent to the From header field display-name value, it MUST use the full form of the PASSporT object in SIP.</t>

</section>
<section anchor="verification-service-behavior" title="Verification Service Behavior">

<t><xref target="RFC8224"/> Section 6.2 Step 5 requires that specifications defining “ppt” values describe any additional verifier behavior. The behavior specified for the “ppt” values of “rcd” is as follows. If the PASSporT is in compact form, then the verification service SHOULD extract the display-name from the From header field value, if any, and use that as the value for the “nam” key when it recomputes the header and claims of the PASSporT object. Optionally, if there exists a Call-Info header field as defined in <xref target="I-D.ietf-sipcore-callinfo-rcd"/>, the “jcard” value can be derived to determine the “jcd” key when it recomputes the header and claims of the PASSporT object. If the signature validates over the recomputed object, then the verification should be considered successful.</t>

<t>However, if the PASSport is in full form with a “ppt” value of “rcd”, then the verification service MUST extract the value associated with the “rcd” “nam” key in the object. If the signature validates, then the verification service can use the value of the “rcd” “nam” key as the display name of calling party, which would in turn be rendered to alerted users or otherwise leveraged in accordance with local policy. This will allow SIP networks that convey the display name through a field other than the From header field to interoperate with this specification. Similarly, the “jcd” or linked “jcl” jcard information and “crn” can be optionally, based on local policy for devices that support it, used to populate a Call-Info header field following the format of <xref target="I-D.ietf-sipcore-callinfo-rcd"/>.</t>

<t>The third-party “rcd” PASSporT cases presents some new challenges, as an attacker could attempt to cut-and-paste such a third-party PASSporT into a SIP request in an effort to get the terminating user agent to render the display name or confidence values it contains to a call that should have no such assurance. A third-party “rcd” PASSporT provides no assurance that the calling party number has not been spoofed: if it is carried in a SIP request, for example, then some other PASSporT in another Identity header field value would have to carry a PASSporT attesting that. A verification service MUST determine that the calling party number shown in the “orig” of the “rcd” PASSporT corresponds to the calling party number of the call it has received, and that the “iat” field of the “rcd” PASSporT is within the date interval that the verification service would ordinarily accept for a PASSporT.</t>

<t>Verification services may alter their authorization policies for the credentials accepted to sign PASSporTs when third parties generate PASSporT objects, per <xref target="thirdsign"/>. This may include accepting a valid signature over a PASSporT even if it is signed with a credential that does not attest authority over the identity in the “orig” claim of the PASSporT, provided that the verification service has some other reason to trust the signer. No further guidance on verification service authorization policy is given here.</t>

<t>The behavior of a SIP UAS upon receiving an INVITE containing a PASSporT object with a “rcd” claim will largely remain a matter of implementation policy. In most cases, implementations would render this calling party name information to the user while alerting. Any user interface additions to express confidence in the veracity of this information are outside the scope of this specification.</t>

</section>
</section>
<section anchor="using-rcd-as-additional-claims-to-other-passport-extensions" title="Using “rcd” as additional claims to other PASSporT extensions">

<t>Rich Call Data, including calling name information, for example, is often data that is additive data to the personal communications information defined in the core PASSporT data required to support the security properties defined in <xref target="RFC8225"/>. For cases where the entity that is originating the personal communications and additionally is supporting the authentication service and also is the authority of the Rich Call Data, rather than creating multiple identity headers with multiple PASSporT extensions or defining multiple combinations and permutations of PASSporT extension definitions, the authentication service can alternatively directly add the “rcd” claims to the PASSporT it is creating, whether it is constructed with a PASSporT extension or not.</t>

<section anchor="procedures-for-applying-rcd-as-claims-only" title="Procedures for applying “rcd” as claims only">

<t>For a given PASSporT using some other extension than “rcd”, the Authentication Service MAY additionally include the “rcd” claim as defined in this document. This would result in a set of claims that correspond to the original intended extension with the addition of the “rcd” claim.</t>

<t>The Verification service that receives the PASSporT, if it supports this specification and chooses to, should interpret the “rcd” claim as simply just an additional claim intended to deliver and/or validate delivered Rich Call Data.</t>

</section>
<section anchor="example-for-applying-rcd-as-claims-only" title="Example for applying “rcd” as claims only">

<t>In the case of <xref target="RFC8588"/> which is the PASSporT extension supporting the SHAKEN specification <xref target="ATIS-1000074"/>, a common case for an Authentication service to co-exist in a CSP network along with the authority over the calling name used for the call. Rather than require two identity headers, the CSP Authentication Service can apply both the SHAKEN PASSporT claims and extension and simply add the “rcd” required claims defined in this document.</t>

<t>For example, the PASSporT claims for the “shaken” PASSporT with “rcd” claims would be as follows:</t>

<figure><artwork><![CDATA[
Protected Header
{
   "alg":"ES256",
   "typ":"passport",
   “ppt”:”shaken”,
   "x5u":"https://cert.example.org/passport.cer"
}
Payload
{
   “attest”:”A”,
   "dest":{“tn”:["12025551001"]},
   "iat":1443208345,
   "orig":{“tn”:"12025551000"},
   “origid”:”123e4567-e89b-12d3-a456-426655440000”,
   "rcd":{"nam":"James Bond"}
}
]]></artwork></figure>

<t>A Verification Service that supports “rcd” and “shaken” PASSporT extensions will be able to receive the above PASSporT and interpret both the “shaken” claims as well as the “rcd” defined claim.</t>

<t>If the Verification Service only understands the “shaken” extension claims but doesn’t support “rcd”, the “rcd” can simply be ignored and disregarded.</t>

</section>
</section>
<section anchor="acknowledgements" title="Acknowledgements">

<t>We would like to thank David Hancock, Robert Sparks, Russ Housley, and Eric Burger for helpful suggestions and comments.</t>

</section>
<section anchor="IANA" title="IANA Considerations">

<section anchor="json-web-token-claim" title="JSON Web Token Claim">

<t>This specification requests that the IANA add three new claims to the JSON Web Token Claims registry as defined in <xref target="RFC7519"/>.</t>

<t>Claim Name: “rcd”</t>

<t>Claim Description: Rich Call Data Information</t>

<t>Change Controller: IESG</t>

<t>Specification Document(s): [RFCThis]</t>

<t>Claim Name: “rcdi”</t>

<t>Claim Description: Rich Call Data Integrity Information</t>

<t>Change Controller: IESG</t>

<t>Specification Document(s): [RFCThis]</t>

<t>Claim Name: “crn”</t>

<t>Claim Description: Call Reason</t>

<t>Change Controller: IESG</t>

<t>Specification Document(s): [RFCThis]</t>

</section>
<section anchor="passport-types" title="PASSporT Types">

<t>This specification requests that the IANA add a new entry to the PASSporT Types registry for the type “rcd” which is specified in [RFCThis].</t>

</section>
<section anchor="rcdtypes" title="PASSporT RCD Types">

<t>This document requests that the IANA create a new registry for PASSporT RCD types. Registration of new PASSporT RCD types shall be under the Specification Required policy.</t>

<t>This registry is to be initially populated with three values, “nam”, “jcd”, and “jcl”, which are specified in [RFCThis].</t>

</section>
</section>
<section anchor="Security" title="Security Considerations">

<t>Revealing information such as the name, location, and affiliation of a person necessarily entails certain privacy risks. Baseline PASSporT has no particular confidentiality requirement, as the information it signs over in a using protocol like SIP is all information that SIP carries in the clear anyway. Transport-level security can hide those SIP fields from eavesdroppers, and the same confidentiality mechanisms would protect any PASSporT(s) carried in SIP.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference anchor="I-D.ietf-stir-oob">
<front>
<title>STIR Out-of-Band Architecture and Use Cases</title>

<author initials='E' surname='Rescorla' fullname='Eric Rescorla'>
    <organization />
</author>

<author initials='J' surname='Peterson' fullname='Jon Peterson'>
    <organization />
</author>

<date month='March' day='9' year='2020' />

<abstract><t>The PASSporT format defines a token that can be carried by signaling protocols, including SIP, to cryptographically attest the identify of callers.  Not all telephone calls use Internet signaling protocols, however, and some calls use them for only part of their signaling path, or cannot reliably deliver SIP header fields end-to-end.  This document describes use cases that require the delivery of PASSporT objects outside of the signaling path, and defines architectures and semantics to provide this functionality.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-stir-oob-07' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-stir-oob-07.txt' />
</reference>



<reference anchor="I-D.ietf-sipcore-callinfo-rcd">
<front>
<title>SIP Call-Info Parameters for Rich Call Data</title>

<author initials='C' surname='Wendt' fullname='Chris Wendt'>
    <organization />
</author>

<author initials='J' surname='Peterson' fullname='Jon Peterson'>
    <organization />
</author>

<date month='November' day='2' year='2020' />

<abstract><t>This document describes a SIP Call-Info header field usage defined to include rich data associated with the identity of the calling party that can be rendered to called party for providing more useful information about the caller or the specific reason for the call. This includes extended comprehensive information about the caller such as what a jCard object can represent for describing the calling party or other call specific information such as describing the reason or intent of the call.  The elements defined for this purpose are intended to be extensible to accommodate related information about calls that helps people decide whether to pick up the phone and additionally, with the use of jCard and other elements, to be compatible with the STIR/PASSporT Rich Call Data framework.</t></abstract>

</front>

<seriesInfo name='Internet-Draft' value='draft-ietf-sipcore-callinfo-rcd-00' />
<format type='TXT'
        target='http://www.ietf.org/internet-drafts/draft-ietf-sipcore-callinfo-rcd-00.txt' />
</reference>



<reference  anchor="RFC3261" target='https://www.rfc-editor.org/info/rfc3261'>
<front>
<title>SIP: Session Initiation Protocol</title>
<author initials='J.' surname='Rosenberg' fullname='J. Rosenberg'><organization /></author>
<author initials='H.' surname='Schulzrinne' fullname='H. Schulzrinne'><organization /></author>
<author initials='G.' surname='Camarillo' fullname='G. Camarillo'><organization /></author>
<author initials='A.' surname='Johnston' fullname='A. Johnston'><organization /></author>
<author initials='J.' surname='Peterson' fullname='J. Peterson'><organization /></author>
<author initials='R.' surname='Sparks' fullname='R. Sparks'><organization /></author>
<author initials='M.' surname='Handley' fullname='M. Handley'><organization /></author>
<author initials='E.' surname='Schooler' fullname='E. Schooler'><organization /></author>
<date year='2002' month='June' />
<abstract><t>This document describes Session Initiation Protocol (SIP), an application-layer control (signaling) protocol for creating, modifying, and terminating sessions with one or more participants.  These sessions include Internet telephone calls, multimedia distribution, and multimedia conferences.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3261'/>
<seriesInfo name='DOI' value='10.17487/RFC3261'/>
</reference>



<reference  anchor="RFC6919" target='https://www.rfc-editor.org/info/rfc6919'>
<front>
<title>Further Key Words for Use in RFCs to Indicate Requirement Levels</title>
<author initials='R.' surname='Barnes' fullname='R. Barnes'><organization /></author>
<author initials='S.' surname='Kent' fullname='S. Kent'><organization /></author>
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /></author>
<date year='2013' month='April' />
<abstract><t>RFC 2119 defines a standard set of key words for describing requirements of a specification.  Many IETF documents have found that these words cannot accurately capture the nuanced requirements of their specification.  This document defines additional key words that can be used to address alternative requirements scenarios.  Authors who follow these guidelines should incorporate this phrase near the beginning of their document:</t><t>The key words &quot;MUST (BUT WE KNOW YOU WON\'T)&quot;, &quot;SHOULD CONSIDER&quot;, &quot;REALLY SHOULD NOT&quot;, &quot;OUGHT TO&quot;, &quot;WOULD PROBABLY&quot;, &quot;MAY WISH TO&quot;, &quot;COULD&quot;, &quot;POSSIBLE&quot;, and &quot;MIGHT&quot; in this document are to be interpreted as described in RFC 6919.</t></abstract>
</front>
<seriesInfo name='RFC' value='6919'/>
<seriesInfo name='DOI' value='10.17487/RFC6919'/>
</reference>



<reference  anchor="RFC7095" target='https://www.rfc-editor.org/info/rfc7095'>
<front>
<title>jCard: The JSON Format for vCard</title>
<author initials='P.' surname='Kewisch' fullname='P. Kewisch'><organization /></author>
<date year='2014' month='January' />
<abstract><t>This specification defines &quot;jCard&quot;, a JSON format for vCard data. The vCard data format is a text format for representing and exchanging information about individuals and other entities, for example, telephone numbers, email addresses, structured names, and delivery addresses.  JSON is a lightweight, text-based, language- independent data interchange format commonly used in Internet applications.</t></abstract>
</front>
<seriesInfo name='RFC' value='7095'/>
<seriesInfo name='DOI' value='10.17487/RFC7095'/>
</reference>



<reference  anchor="RFC7340" target='https://www.rfc-editor.org/info/rfc7340'>
<front>
<title>Secure Telephone Identity Problem Statement and Requirements</title>
<author initials='J.' surname='Peterson' fullname='J. Peterson'><organization /></author>
<author initials='H.' surname='Schulzrinne' fullname='H. Schulzrinne'><organization /></author>
<author initials='H.' surname='Tschofenig' fullname='H. Tschofenig'><organization /></author>
<date year='2014' month='September' />
<abstract><t>Over the past decade, Voice over IP (VoIP) systems based on SIP have replaced many traditional telephony deployments.  Interworking VoIP systems with the traditional telephone network has reduced the overall level of calling party number and Caller ID assurances by granting attackers new and inexpensive tools to impersonate or obscure calling party numbers when orchestrating bulk commercial calling schemes, hacking voicemail boxes, or even circumventing multi-factor authentication systems trusted by banks.  Despite previous attempts to provide a secure assurance of the origin of SIP communications, we still lack effective standards for identifying the calling party in a VoIP session.  This document examines the reasons why providing identity for telephone numbers on the Internet has proven so difficult and shows how changes in the last decade may provide us with new strategies for attaching a secure identity to SIP sessions.  It also gives high-level requirements for a solution in this space.</t></abstract>
</front>
<seriesInfo name='RFC' value='7340'/>
<seriesInfo name='DOI' value='10.17487/RFC7340'/>
</reference>



<reference  anchor="RFC7519" target='https://www.rfc-editor.org/info/rfc7519'>
<front>
<title>JSON Web Token (JWT)</title>
<author initials='M.' surname='Jones' fullname='M. Jones'><organization /></author>
<author initials='J.' surname='Bradley' fullname='J. Bradley'><organization /></author>
<author initials='N.' surname='Sakimura' fullname='N. Sakimura'><organization /></author>
<date year='2015' month='May' />
<abstract><t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties.  The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t></abstract>
</front>
<seriesInfo name='RFC' value='7519'/>
<seriesInfo name='DOI' value='10.17487/RFC7519'/>
</reference>



<reference  anchor="RFC8224" target='https://www.rfc-editor.org/info/rfc8224'>
<front>
<title>Authenticated Identity Management in the Session Initiation Protocol (SIP)</title>
<author initials='J.' surname='Peterson' fullname='J. Peterson'><organization /></author>
<author initials='C.' surname='Jennings' fullname='C. Jennings'><organization /></author>
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /></author>
<author initials='C.' surname='Wendt' fullname='C. Wendt'><organization /></author>
<date year='2018' month='February' />
<abstract><t>The baseline security mechanisms in the Session Initiation Protocol (SIP) are inadequate for cryptographically assuring the identity of the end users that originate SIP requests, especially in an interdomain context.  This document defines a mechanism for securely identifying originators of SIP requests.  It does so by defining a SIP header field for conveying a signature used for validating the identity and for conveying a reference to the credentials of the signer.</t><t>This document obsoletes RFC 4474.</t></abstract>
</front>
<seriesInfo name='RFC' value='8224'/>
<seriesInfo name='DOI' value='10.17487/RFC8224'/>
</reference>



<reference  anchor="RFC8225" target='https://www.rfc-editor.org/info/rfc8225'>
<front>
<title>PASSporT: Personal Assertion Token</title>
<author initials='C.' surname='Wendt' fullname='C. Wendt'><organization /></author>
<author initials='J.' surname='Peterson' fullname='J. Peterson'><organization /></author>
<date year='2018' month='February' />
<abstract><t>This document defines a method for creating and validating a token that cryptographically verifies an originating identity or, more generally, a URI or telephone number representing the originator of personal communications.  The Personal Assertion Token, PASSporT, is cryptographically signed to protect the integrity of the identity of the originator and to verify the assertion of the identity information at the destination.  The cryptographic signature is defined with the intention that it can confidently verify the originating persona even when the signature is sent to the destination party over an insecure channel.  PASSporT is particularly useful for many personal-communications applications over IP networks and other multi-hop interconnection scenarios where the originating and destination parties may not have a direct trusted relationship.</t></abstract>
</front>
<seriesInfo name='RFC' value='8225'/>
<seriesInfo name='DOI' value='10.17487/RFC8225'/>
</reference>



<reference  anchor="RFC8226" target='https://www.rfc-editor.org/info/rfc8226'>
<front>
<title>Secure Telephone Identity Credentials: Certificates</title>
<author initials='J.' surname='Peterson' fullname='J. Peterson'><organization /></author>
<author initials='S.' surname='Turner' fullname='S. Turner'><organization /></author>
<date year='2018' month='February' />
<abstract><t>In order to prevent the impersonation of telephone numbers on the Internet, some kind of credential system needs to exist that cryptographically asserts authority over telephone numbers.  This document describes the use of certificates in establishing authority over telephone numbers, as a component of a broader architecture for managing telephone numbers as identities in protocols like SIP.</t></abstract>
</front>
<seriesInfo name='RFC' value='8226'/>
<seriesInfo name='DOI' value='10.17487/RFC8226'/>
</reference>



<reference  anchor="RFC8588" target='https://www.rfc-editor.org/info/rfc8588'>
<front>
<title>Personal Assertion Token (PaSSporT) Extension for Signature-based Handling of Asserted information using toKENs (SHAKEN)</title>
<author initials='C.' surname='Wendt' fullname='C. Wendt'><organization /></author>
<author initials='M.' surname='Barnes' fullname='M. Barnes'><organization /></author>
<date year='2019' month='May' />
<abstract><t>This document extends the Personal Assertion Token (PASSporT), which is a token object that conveys cryptographically signed information about the participants involved in communications.  The extension is defined based on the &quot;Signature-based Handling of Asserted                                     information using toKENs (SHAKEN)&quot; specification by the ATIS/SIP Forum IP-NNI Task Group.  It provides both (1) a specific set of levels of confidence in the correctness of the originating identity of a call originated in a SIP-based telephone network as well as (2) an identifier that allows the Service Provider (SP) to uniquely identify the origin of the call within its network.</t></abstract>
</front>
<seriesInfo name='RFC' value='8588'/>
<seriesInfo name='DOI' value='10.17487/RFC8588'/>
</reference>




    </references>

    <references title='Informative References'>

<reference anchor="ATIS-1000074" >
  <front>
    <title>Signature-based Handling of Asserted information using toKENs (SHAKEN) &lt;https://access.atis.org/apps/group_public/download.php/32237/ATIS-1000074.pdf&gt;</title>
    <author >
      <organization>ATIS/SIP Forum NNI Task Group</organization>
    </author>
    <date year="2017" month="January"/>
  </front>
</reference>




<reference  anchor="RFC2119" target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>




    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

