<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-wendt-stir-certificate-transparency-02" category="info" consensus="true" submissionType="IETF" number="2" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <link href="https://datatracker.ietf.org/doc/draft-wendt-stir-certificate-transparency-02" rel="prev"/>
  <front>
    <title abbrev="STI CT">STI Certificate Transparency</title>
    <seriesInfo name="RFC" value="2"/>
    <author fullname="Chris Wendt">
      <organization>Somos, Inc.</organization>
      <address>
        <postal>
          <country>US</country>
        </postal>
        <email>chris@appliedbits.com</email>
      </address>
    </author>
    <author fullname="Rob Sliwa">
      <organization>Somos, Inc.</organization>
      <address>
        <postal>
          <country>US</country>
        </postal>
        <email>robjsliwa@gmail.com</email>
      </address>
    </author>
    <author fullname="Alec Fenichel">
      <organization>TransNexus</organization>
      <address>
        <postal>
          <country>US</country>
        </postal>
        <email>alec.fenichel@transnexus.com</email>
      </address>
    </author>
    <author fullname="Vinit Anil Gaikwad">
      <organization>Twilio</organization>
      <address>
        <postal>
          <country>US</country>
        </postal>
        <email>vanilgaikwad@twilio.com</email>
      </address>
    </author>
    <date year="2024" month="July" day="08"/>
    <area>Applications and Real-Time</area>
    <workgroup>Secure Telephone Identity Revisited</workgroup>
    <keyword>stir</keyword>
    <keyword>certificates</keyword>
    <keyword>delegate certificates</keyword>
    <abstract>
      <?line 61?>

<t>This document describes a framework for the use of the Certificate Transparency (CT) protocol for publicly logging the existence of Secure Telephone Identity (STI) certificates as they are issued or observed. This allows any interested party that is part of the STI eco-system to audit STI certification authority (CA) activity and audit both the issuance of suspect certificates and the certificate logs themselves. The intent is for the establishment of a level of trust in the STI eco-system that depends on the verification of telephone numbers requiring and refusing to honor STI certificates that do not appear in a established log. This effectively establishes the precedent that STI CAs must add all issued certificates to the logs and thus establishes unique association of STI certificates to an authorized provider or assignee of a telephone number resource. The primary role of CT in the STI ecosystem is for verifiable trust in the avoidance of issuance of unauthorized duplicate telephone number level delegate certificates or provider level certificates.  This provides a robust auditable mechanism for the detection of unauthorized creation of certificate credentials for illegitimate spoofing of telephone numbers or service provider codes (SPC).</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://appliedbits.github.io/draft-wendt-stir-certificate-transparency/draft-wendt-stir-certificate-transparency.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-wendt-stir-certificate-transparency/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Secure Telephone Identity Revisited Working Group mailing list (<eref target="mailto:stir@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/stir/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/stir/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/appliedbits/draft-wendt-stir-certificate-transparency"/>.</t>
    </note>
  </front>
  <middle>
    <?line 65?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Certificate Transparency (CT) aims to mitigate the problem of mis-issued certificates by providing append-only logs of issued certificates. The logs do not themselves prevent mis-issuance, but ensure that interested parties (particularly those named in certificates or certificate chains) can detect such mis-issuance. <xref target="RFC9162"/> describes the core protocols and mechanisms for use of CT for the purposes of public TLS server certificates associated with a domain name as part of the public domain name system (DNS). This document describes a conceptually similar framework that directly borrows concepts like transparency receipts in the form of SCPs but also is more opinionated about the process and procedures for when the receipt is generated and how it is used outside of the certificate.  This framework is defined for the specific use with Secure Telephone Identity (STI) certificates <xref target="RFC8226"/> and delegate certificates <xref target="RFC9060"/>.</t>
      <t>Telephone numbers (TNs) and their management and assignment by telephone service providers and Responsible Organizations (RespOrgs) for toll-free numbers share many similarities to the Domain Name System (DNS) where there is a global uniqueness and established association of telephone numbers to regulatory jurisdictions that manage the allocation and assignment of telephone numbers under country codes and a set of numeric digits for routing telephone calls and messages over telephone networks. STI Certificates use a TNAuthList extension defined in <xref target="RFC8226"/> to specifically associate either telephone service providers or telephone numbers to the issuance of STI certificates and certificate change that are intended to represent the authorized right to use a telephone number. This trusted association can be establish via mechanisms such as Authority tokens for TNAuthList defined in <xref target="RFC9448"/>. Certificate transparency is generally meant to provide a publicly verifiable and auditable representation of the creation of certificates in order to establish transparency and trust to interested parties as part of a stir related eco-system.</t>
      <t>There is three primary actors in the certificate transparency framework. There is the STI Certification Authorities (CAs) that submit all certificates to be issued to one or more log services. The log services are network services that implement the protocol operations for submissions of STI certificates and subsequent queries. They are hosted by interested parties in the STI ecosystem and can accept certificate log submissions from any other CA participant. The second role is the monitors that play the role of monitoring the CT logs to check for potential mis-issuance as well as auditing of the log services. This role can be played by any STI ecosystem participant interested in the trust of the ecosystem or the integrity of the telephone number or provider level certificates produced in the eco-system. CT provides a mechanism of a receipt or Signed Certificate Timestamp (SCT) that is provided as a result of submitting a certificate to the append-only log. The third actor role in the certificate transparency framework is the eco-system participants that can send and receive receipt(s) or SCT(s) to prove and validate that a certificate was submitted to a log(s) and optionally query the log directly for further validation.</t>
      <t>The details that follow in this document will detail the specific protocols and framework for Certificate Transparency associated with STI certificates. Most of the details borrow many of the concepts of certificate transparency defined in <xref target="RFC9162"/> used in Web PKI environments, but provides a specific framework designed for STI certificates and their specific issuance and usage in a telecommunications environments.</t>
      <t>This general mechanism could also be used for transparently logging other important stir related metadata associations perhaps via JWTClaimConstraints defined in <xref target="RFC8226"/> and <xref target="RFC9118"/> or other ways defined in potential future extensions of this document.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="the-use-of-certificate-transparency-for-sti-certificates">
      <name>The Use of Certificate Transparency for STI Certificates</name>
      <t>CT log(s) contains certificate chains, which can be submitted by any CA authorized in a STIR eco-system. It is expected that these CAs will contribute all their newly issued certificates to one or more logs.  Note, in <xref target="RFC9162"/> it is possible for certificate holders to directly contribute their own certificate chains or interested third parties, however because in stir eco-systems that generally consist of entities that are authorized to be assigned telephone number resources, this does not seem to be a likely scenario. Generally, many stir eco-systems have a controlled set of CAs that are authorized to participate as valid trust anchors. It is required that each chain ends with a trust anchor that is accepted by the log which would include those authorized trust anchors or a subset of them. When a chain is accepted by a log, a signed timestamp is returned, which is later used to provide evidence to STIR verification services (VS), defined in <xref target="RFC8224"/>, that the chain has been submitted. A VS can thus require that all certificates they accept as valid are accompanied by signed timestamps.</t>
      <t>Those concerned about mis-issuance of stir certificates can monitor the logs, asking them regularly for all new entries, and can thus check whether the providers or telephone numbers for which they are responsible have had certificates issued that they did not expect. What they do with this information, particularly when they find that a mis-issuance has happened, is beyond the scope of this document. However, broadly speaking, because many existing STI ecosystems have a connection to regulated and industry environments that govern the issuance of STI certificates, they can invoke existing mechanisms for dealing with issues such as mis-issued certificates, such as working with the CA to get the certificate revoked or with maintainers of trust anchor lists to get the CA removed.</t>
    </section>
    <section anchor="submitters">
      <name>Submitters</name>
      <t>Submitters submit certificates to logs for public auditing. In order to enable attribution of each logged certificate to its issuer, each submission <bcp14>MUST</bcp14> be accompanied by all additional certificates required to verify the chain up to an accepted trust anchor. The trust anchor (a root or intermediate CA certificate) <bcp14>MAY</bcp14> be omitted from the submission.</t>
      <t>If a log accepts a submission, it will return a Signed Certificate Timestamp (SCT) (see Section 4.8 <xref target="RFC9162"/>).</t>
      <section anchor="certificates">
        <name>Certificates</name>
        <t>Any entity, generally a STIR CA, can submit <xref target="RFC8226"/> defined certificates or <xref target="RFC9060"/> defined delegate certificates or similarly defined STIR certificates to a log. Since it is anticipated that verification services could reject certificates that are not logged, it is expected that certificate issuers and subjects will be strongly motivated to submit them.</t>
      </section>
    </section>
    <section anchor="log-format-and-operation">
      <name>Log Format and Operation</name>
      <t>A log is a single, append-only, merkel-tree type of log of submitted certificate entries.  Log procedures are <bcp14>RECOMMENDED</bcp14> to follow similar procedures and formats defined in Section 4 of <xref target="RFC9162"/>, but in general only are required to follow the API interfaces defined in this document.</t>
    </section>
    <section anchor="stir-authentication-services">
      <name>STIR Authentication Services</name>
      <t>STIR Authentication Services <xref target="RFC8224"/> <bcp14>MUST</bcp14> present one or more SCTs from one or more logs by the inclusion of an array of SCTs as a 'sct' claim in the signed PASSporT defined in the next section of this document.</t>
    </section>
    <section anchor="sct_define">
      <name>PASSporT Claim "sct" Definition and Usage</name>
      <t>This document defines a new JSON Web Token claim for "sct", Signed Certificate Timestamp, the value of which is a JSON object that can contains an array of one or more Signed Certificate Timestamps defined in <xref target="RFC9162"/>, Section 4.8 corresponding to SCTs provided by different CT logs the certificate may have been submitted to.</t>
      <t>Example PASSporT with SCT Claim:</t>
      <artwork><![CDATA[
{
   "dest":{"tn":["12155550131"]},
   "iat":"1443208345",
   "orig":{"tn":"12155550121"},
   "sct": ["base64-encoded-sct1", "base64-encoded-sct2"]
}
]]></artwork>
    </section>
    <section anchor="clients">
      <name>Clients</name>
      <t>There are various different functions clients of logs might perform. In this document, the client generally refers to the STI verification service defined in <xref target="RFC8224"/>, or more generally an entity that performs the verification of a PASSporT defined in <xref target="RFC8225"/>. We describe here some typical clients and how they should function.</t>
      <section anchor="submission-and-handling-of-scts">
        <name>Submission and Handling of SCTs</name>
        <ol spacing="normal" type="1"><li>
            <t>STI-CA/STI-SCA Submits STI Certificate to Transparency Logs:</t>
          </li>
        </ol>
        <ul spacing="normal">
          <li>
            <t>Step 1: The STI Certificate Authority (STI-CA) or STI Subordinate Certificate Authority (STI-SCA) issues a new STI certificate.</t>
          </li>
          <li>
            <t>Step 2: The STI-CA/STI-SCA submits the issued STI certificate to one or more transparency logs using the 'submit-entry' API.</t>
          </li>
        </ul>
        <artwork><![CDATA[
API Call:
POST <Base URL>/ct/v2/submit-entry
Content-Type: application/json
{
   "submission": "base64-encoded-sti-certificate",
   "type": 1,
   "chain": [
      "base64-encoded-CA-cert-1",
      "base64-encoded-CA-cert-2"
   ]
}

Expected Response:
{
   "sct": "base64-encoded-sct",
   "sth": "base64-encoded-signed_tree_head",
   "inclusion": "base64-encoded-inclusion_proof"
}
]]></artwork>
        <ol spacing="normal" type="1"><li>
            <t>Transparency Log Generates SCT:</t>
          </li>
        </ol>
        <ul spacing="normal">
          <li>
            <t>Step 3: Each transparency log processes the submission and generates a Signed Certificate Timestamp (SCT).</t>
          </li>
          <li>
            <t>Step 4: The transparency log returns the SCT to the STI-CA/STI-SCA.</t>
          </li>
        </ul>
        <ol spacing="normal" type="1"><li>
            <t>STI-CA/STI-SCA Passes SCT(s) to STI-AS:</t>
          </li>
        </ol>
        <ul spacing="normal">
          <li>
            <t>Step 5: The STI-CA/STI-SCA passes the generated SCT(s) to the STI Authentication Service (STI-AS). This can be done via a non-prescriptive method such as including SCT(s) in the certificate issuance metadata or through a separate communication channel.</t>
          </li>
        </ul>
        <ol spacing="normal" type="1"><li>
            <t>STI-AS Includes SCTs in <tt>sct</tt> Claim:</t>
          </li>
        </ol>
        <ul spacing="normal">
          <li>
            <t>Step 6: The STI-AS includes the SCTs in the <tt>sct</tt> claim of the PASSporT (Personal Assertion Token) when signing a call identity.</t>
          </li>
          <li>
            <t>Step 7: If some logs are slow to respond, their SCTs may be skipped to ensure timely processing.</t>
          </li>
        </ul>
        <ol spacing="normal" type="1"><li>
            <t>STI-VS Verifies PASSporT and SCTs:</t>
          </li>
        </ol>
        <ul spacing="normal">
          <li>
            <t>Step 8: The STI Verification Service (STI-VS) receives the signed PASSporT from the STI-AS.</t>
          </li>
          <li>
            <t>Step 9: The STI-VS verifies that the PASSporT contains matching SCTs for the certificate it was signed with. The STI-VS checks for the presence of SCT(s) and trusts them for quick verification.</t>
          </li>
          <li>
            <t>Step 10: In the background, a separate process can periodically gather and verify the SCTs with the transparency logs to ensure their validity and integrity.</t>
          </li>
        </ul>
      </section>
      <section anchor="example-api-calls-for-step-by-step-flow">
        <name>Example API Calls for Step-by-Step Flow</name>
        <ol spacing="normal" type="1"><li>
            <t>Submit Entry to Log:</t>
          </li>
        </ol>
        <artwork><![CDATA[
POST <Base URL>/ct/v2/submit-entry
Content-Type: application/json
{
   "submission": "base64-encoded-sti-certificate",
   "type": 1,
   "chain": [
      "base64-encoded-CA-cert-1",
      "base64-encoded-CA-cert-2"
   ]
}
]]></artwork>
        <ol spacing="normal" type="1"><li>
            <t>Retrieve Latest STH (optional for background process):</t>
          </li>
        </ol>
        <artwork><![CDATA[
GET <Base URL>/ct/v2/get-sth

Expected Response:
{
   "sth": "base64-encoded-signed_tree_head_v2"
}
]]></artwork>
        <ol spacing="normal" type="1"><li>
            <t>Retrieve Merkle Inclusion Proof by Leaf Hash (optional for background process):</t>
          </li>
        </ol>
        <artwork><![CDATA[
GET <Base URL>/ct/v2/get-proof-by-hash?hash=base64-encoded-hash&tree_size=tree-size

Expected Response:
{
   "inclusion": "base64-encoded-inclusion_proof_v2",
   "sth": "base64-encoded-signed_tree_head_v2"
}
]]></artwork>
        <ol spacing="normal" type="1"><li>
            <t>Retrieve Entries and STH from Log (optional for background process):</t>
          </li>
        </ol>
        <artwork><![CDATA[
GET <Base URL>/ct/v2/get-entries?start=0&end=99

Expected Response:
{
   "entries": [
      {
         "log_entry": "base64-encoded-log-entry",
         "submitted_entry": {
            "submission": "base64-encoded-sti-certificate",
            "chain": [
               "base64-encoded-CA-cert-1",
               "base64-encoded-CA-cert-2",
               "base64-encoded-trust-anchor-cert"
            ]
         },
         "sct": "base64-encoded-sct"
      }
   ],
   "sth": "base64-encoded-signed_tree_head_v2"
}
]]></artwork>
      </section>
      <section anchor="monitor">
        <name>Monitor</name>
        <t>Monitors in the STIR/SHAKEN Certificate Transparency (CT) framework play a crucial role in maintaining the integrity and trust of the ecosystem. They ensure that no certificates are mis-issued, particularly concerning the TNAuthList field, which lists the telephone numbers an entity is authorized to use.</t>
        <section anchor="monitor-workflow">
          <name>Monitor Workflow</name>
          <ol spacing="normal" type="1"><li>
              <t>Initialize Monitor:</t>
            </li>
          </ol>
          <ul spacing="normal">
            <li>
              <t>Step 1: Set up the Monitor to periodically query the transparency logs for new entries. The Monitor must be configured with the base URL of each log it intends to monitor.</t>
            </li>
            <li>
              <t>Step 2: Configure the Monitor with a list of telephone numbers (TNs) and associated entities to track.</t>
            </li>
          </ul>
          <ol spacing="normal" type="1"><li>
              <t>Retrieve Latest STH:</t>
            </li>
          </ol>
          <ul spacing="normal">
            <li>
              <t>Step 3: The Monitor retrieves the latest Signed Tree Head (STH) from each log to determine the current state of the log.</t>
            </li>
          </ul>
          <t>API Call:</t>
          <artwork><![CDATA[
GET <Base URL>/ct/v2/get-sth

Expected Response:
{
   "sth": "base64-encoded-signed_tree_head_v2"
}
]]></artwork>
          <ol spacing="normal" type="1"><li>
              <t>Retrieve New Entries from Log:</t>
            </li>
          </ol>
          <ul spacing="normal">
            <li>
              <t>Step 4: Using the STH, the Monitor retrieves new entries from the log that have been added since the last known state.</t>
            </li>
          </ul>
          <t>API Call:</t>
          <artwork><![CDATA[
GET <Base URL>/ct/v2/get-entries?start=last_known_index&end=current_sth_index

Expected Response:
{
   "entries": [
      {
         "log_entry": "base64-encoded-log-entry",
         "submitted_entry": {
            "submission": "base64-encoded-sti-certificate",
            "chain": [
               "base64-encoded-CA-cert-1",
               "base64-encoded-CA-cert-2",
               "base64-encoded-trust-anchor-cert"
            ]
         },
         "sct": "base64-encoded-sct"
      }
   ],
   "sth": "base64-encoded-signed_tree_head_v2"
}
]]></artwork>
          <ol spacing="normal" type="1"><li>
              <t>Decode and Verify Certificates:</t>
            </li>
          </ol>
          <ul spacing="normal">
            <li>
              <t>Step 5: Decode each retrieved certificate and verify its validity using the provided certificate chain. Extract the entity name and TNAuthList from the certificate.</t>
            </li>
          </ul>
          <ol spacing="normal" type="1"><li>
              <t>Check for Mis-issuance:</t>
            </li>
          </ol>
          <ul spacing="normal">
            <li>
              <t>Step 6: Compare the TNAuthList and entity name from the newly issued certificate with the Monitor's configured list. Alarm if a certificate is issued in the name of a different entity for the same TNs.</t>
            </li>
          </ul>
          <artwork><![CDATA[
Example Pseudocode:

for entry in entries:
   certificate = decode_base64(entry["submitted_entry"]["submission"])
   tn_auth_list = extract_tn_auth_list(certificate)
   entity_name = extract_entity_name(certificate)

   for tn in tn_auth_list:
      if tn in monitor_configured_tn_list:
         if monitor_configured_tn_list[tn] != entity_name:
               raise Alarm(f"Mis-issued Certificate: {tn} assigned to
               {entity_name}")
]]></artwork>
          <ol spacing="normal" type="1"><li>
              <t>Alarm and Reporting:</t>
            </li>
          </ol>
          <ul spacing="normal">
            <li>
              <t>Step 7: If a mis-issuance is detected, raise an alarm and log the details for further investigation and notify relevant stakeholders to rectify any confirmed mis-issuance.</t>
            </li>
          </ul>
          <ol spacing="normal" type="1"><li>
              <t>Maintain State and Continuity:</t>
            </li>
          </ol>
          <ul spacing="normal">
            <li>
              <t>Step 8: Update the Monitor's last known state with the current STH index to ensure continuity in monitoring.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="auditing">
        <name>Auditing</name>
        <t>Auditing ensures that the current published state of a log is reachable from previously published states that are known to be good and that the promises made by the log, in the form of SCTs, have been kept. Audits are performed by monitors or STI Verification Services.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <section anchor="json-web-token-claim">
        <name>JSON Web Token Claim</name>
        <t>This document requests that the IANA add three new claims to the JSON Web Token Claims registry as defined in <xref target="RFC7519"/>.</t>
        <t>Claim Name: "sct"</t>
        <t>Claim Description: Signed Certificate Timestamp</t>
        <t>Change Controller: IESG</t>
        <t>Specification Document(s): [RFCThis]</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC7519">
        <front>
          <title>JSON Web Token (JWT)</title>
          <author fullname="M. Jones" initials="M." surname="Jones"/>
          <author fullname="J. Bradley" initials="J." surname="Bradley"/>
          <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
          <date month="May" year="2015"/>
          <abstract>
            <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7519"/>
        <seriesInfo name="DOI" value="10.17487/RFC7519"/>
      </reference>
      <reference anchor="RFC8224">
        <front>
          <title>Authenticated Identity Management in the Session Initiation Protocol (SIP)</title>
          <author fullname="J. Peterson" initials="J." surname="Peterson"/>
          <author fullname="C. Jennings" initials="C." surname="Jennings"/>
          <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
          <author fullname="C. Wendt" initials="C." surname="Wendt"/>
          <date month="February" year="2018"/>
          <abstract>
            <t>The baseline security mechanisms in the Session Initiation Protocol (SIP) are inadequate for cryptographically assuring the identity of the end users that originate SIP requests, especially in an interdomain context. This document defines a mechanism for securely identifying originators of SIP requests. It does so by defining a SIP header field for conveying a signature used for validating the identity and for conveying a reference to the credentials of the signer.</t>
            <t>This document obsoletes RFC 4474.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8224"/>
        <seriesInfo name="DOI" value="10.17487/RFC8224"/>
      </reference>
      <reference anchor="RFC8225">
        <front>
          <title>PASSporT: Personal Assertion Token</title>
          <author fullname="C. Wendt" initials="C." surname="Wendt"/>
          <author fullname="J. Peterson" initials="J." surname="Peterson"/>
          <date month="February" year="2018"/>
          <abstract>
            <t>This document defines a method for creating and validating a token that cryptographically verifies an originating identity or, more generally, a URI or telephone number representing the originator of personal communications. The Personal Assertion Token, PASSporT, is cryptographically signed to protect the integrity of the identity of the originator and to verify the assertion of the identity information at the destination. The cryptographic signature is defined with the intention that it can confidently verify the originating persona even when the signature is sent to the destination party over an insecure channel. PASSporT is particularly useful for many personal-communications applications over IP networks and other multi-hop interconnection scenarios where the originating and destination parties may not have a direct trusted relationship.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8225"/>
        <seriesInfo name="DOI" value="10.17487/RFC8225"/>
      </reference>
      <reference anchor="RFC8226">
        <front>
          <title>Secure Telephone Identity Credentials: Certificates</title>
          <author fullname="J. Peterson" initials="J." surname="Peterson"/>
          <author fullname="S. Turner" initials="S." surname="Turner"/>
          <date month="February" year="2018"/>
          <abstract>
            <t>In order to prevent the impersonation of telephone numbers on the Internet, some kind of credential system needs to exist that cryptographically asserts authority over telephone numbers. This document describes the use of certificates in establishing authority over telephone numbers, as a component of a broader architecture for managing telephone numbers as identities in protocols like SIP.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8226"/>
        <seriesInfo name="DOI" value="10.17487/RFC8226"/>
      </reference>
      <reference anchor="RFC9060">
        <front>
          <title>Secure Telephone Identity Revisited (STIR) Certificate Delegation</title>
          <author fullname="J. Peterson" initials="J." surname="Peterson"/>
          <date month="September" year="2021"/>
          <abstract>
            <t>The Secure Telephone Identity Revisited (STIR) certificate profile provides a way to attest authority over telephone numbers and related identifiers for the purpose of preventing telephone number spoofing. This specification details how that authority can be delegated from a parent certificate to a subordinate certificate. This supports a number of use cases, including those where service providers grant credentials to enterprises or other customers capable of signing calls with STIR.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9060"/>
        <seriesInfo name="DOI" value="10.17487/RFC9060"/>
      </reference>
      <reference anchor="RFC9118">
        <front>
          <title>Enhanced JSON Web Token (JWT) Claim Constraints for Secure Telephone Identity Revisited (STIR) Certificates</title>
          <author fullname="R. Housley" initials="R." surname="Housley"/>
          <date month="August" year="2021"/>
          <abstract>
            <t>RFC 8226 specifies the use of certificates for Secure Telephone Identity Credentials; these certificates are often called "Secure Telephone Identity Revisited (STIR) Certificates". RFC 8226 provides a certificate extension to constrain the JSON Web Token (JWT) claims that can be included in the Personal Assertion Token (PASSporT), as defined in RFC 8225. If the PASSporT signer includes a JWT claim outside the constraint boundaries, then the PASSporT recipient will reject the entire PASSporT. This document updates RFC 8226; it provides all of the capabilities available in the original certificate extension as well as an additional way to constrain the allowable JWT claims. The enhanced extension can also provide a list of claims that are not allowed to be included in the PASSporT.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9118"/>
        <seriesInfo name="DOI" value="10.17487/RFC9118"/>
      </reference>
      <reference anchor="RFC9162">
        <front>
          <title>Certificate Transparency Version 2.0</title>
          <author fullname="B. Laurie" initials="B." surname="Laurie"/>
          <author fullname="E. Messeri" initials="E." surname="Messeri"/>
          <author fullname="R. Stradling" initials="R." surname="Stradling"/>
          <date month="December" year="2021"/>
          <abstract>
            <t>This document describes version 2.0 of the Certificate Transparency (CT) protocol for publicly logging the existence of Transport Layer Security (TLS) server certificates as they are issued or observed, in a manner that allows anyone to audit certification authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
            <t>This document obsoletes RFC 6962. It also specifies a new TLS extension that is used to send various CT log artifacts.</t>
            <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9162"/>
        <seriesInfo name="DOI" value="10.17487/RFC9162"/>
      </reference>
      <reference anchor="RFC9448">
        <front>
          <title>TNAuthList Profile of Automated Certificate Management Environment (ACME) Authority Token</title>
          <author fullname="C. Wendt" initials="C." surname="Wendt"/>
          <author fullname="D. Hancock" initials="D." surname="Hancock"/>
          <author fullname="M. Barnes" initials="M." surname="Barnes"/>
          <author fullname="J. Peterson" initials="J." surname="Peterson"/>
          <date month="September" year="2023"/>
          <abstract>
            <t>This document defines a profile of the Automated Certificate Management Environment (ACME) Authority Token for the automated and authorized creation of certificates for Voice over IP (VoIP) telephone providers to support Secure Telephone Identity (STI) using the TNAuthList defined by STI certificates.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9448"/>
        <seriesInfo name="DOI" value="10.17487/RFC9448"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
    <?line 367?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank the authors and contributors to the protocols and ideas around Certificate Transparency <xref target="RFC9162"/> which sets the basis for the STI eco-system to adopt in a very straight forward way, providing trust and transparency in the telephone number world.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
