<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.16 (Ruby 2.6.0) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-ietf-acme-authority-token-tnauthlist-11" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="ACME TNAuthList Auth Token">TNAuthList profile of ACME Authority Token</title>

    <author initials="C." surname="Wendt" fullname="Chris Wendt">
      <organization>Somos Inc.</organization>
      <address>
        <postal>
          <country>US</country>
        </postal>
        <email>chris-ietf@chriswendt.net</email>
      </address>
    </author>
    <author initials="D." surname="Hancock" fullname="David Hancock">
      <organization>Comcast</organization>
      <address>
        <postal>
          <country>US</country>
        </postal>
        <email>davidhancock.ietf@gmail.com</email>
      </address>
    </author>
    <author initials="M." surname="Barnes" fullname="Mary Barnes">
      <organization>Neustar Inc.</organization>
      <address>
        <postal>
          <country>US</country>
        </postal>
        <email>mary.ietf.barnes@gmail.com</email>
      </address>
    </author>
    <author initials="J." surname="Peterson" fullname="Jon Peterson">
      <organization>Neustar Inc.</organization>
      <address>
        <postal>
          <street>1800 Sutter St Suite 570</street>
          <city>Concord, CA  94520</city>
          <country>US</country>
        </postal>
        <email>jon.peterson@neustar.biz</email>
      </address>
    </author>

    <date year="2022" month="November" day="12"/>

    <area>sec</area>
    
    <keyword>STIR</keyword>

    <abstract>


<t>This document defines a profile of the Automated Certificate Management Environment (ACME) Authority Token for the automated and authorized creation of certificates for VoIP Telephone Providers to support Secure Telephony Identity (STI) using the TNAuthList defined by STI certificates.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t><xref target="RFC8555"/> is a mechanism for automating certificate management on the Internet. It enables administrative entities to prove effective control over resources like domain names, and automates the process of generating and issuing certificates. <xref target="I-D.ietf-acme-authority-token"/> extends ACME to provide a general method of extending the authority and authorization of entities to control a resource via a third party Token Authority beyond the Certification Authority (CA).</t>

<t>This document is a profile document using the Authority Token mechanism defined in <xref target="I-D.ietf-acme-authority-token"/>. It is a profile that  specifically addresses the STIR problem statement <xref target="RFC7340"/> which identifies the need for Internet credentials that can attest authority for the originator of VoIP calls in order to detect impersonation, which is currently an enabler for common attacks associated with illegal robocalling, voicemail hacking, and swatting.  These credentials are used to sign PASSporTs <xref target="RFC8225"/>, which can be carried in using protocols such as SIP <xref target="RFC8224"/>.  Currently, the only defined credentials for this purpose are the certificates specified in <xref target="RFC8226"/> using the TNAuthList.  This document defines the use of the TNAuthList Authority Token in the ACME challenge to proof the authoritative use of the contents of the TNAuthList, including a Service Provider Token (SPC), a Telephone Number, or a set of telephone numbers or telephone number blocks.</t>

<t>This document also describes the ability for a telephone authority to authorize the creation of CA types of certificates for delegation as defined in <xref target="RFC9060"/>.</t>

</section>
<section anchor="terminology"><name>Terminology</name>

<t>The keywords "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>

</section>
<section anchor="acme-new-order-identifiers-for-tnauthlist"><name>ACME new-order identifiers for TNAuthList</name>

<t>In <xref target="RFC8555"/>, Section 7 defines the procedure that an ACME client uses to order a new certificate from a CA. The new-order request contains an identifier field that specifies the identifier objects the order corresponds to.  This draft defines a new type of identifier object called TNAuthList. A TNAuthList identifier contains the identity information to be populated in the TN Authorization List of the new certificate. For the TNAuthList identifier, the new-order request includes a type set to the string "TNAuthList". The value of the TNAuthList identifier MUST be set to the details of the TNAuthList requested.</t>

<t>The format of the string that represents the TNAuthList MUST be constructed using base64url encoding, as per <xref target="RFC8555"/> base64url encoding described in Section 5 of <xref target="RFC4648"/> according to the profile specified in JSON Web Signature in Section 2 of <xref target="RFC7515"/>. The base64url encoding MUST NOT include any padding characters and the TNAuthList ASN.1 object MUST encoded using DER encoding rules.</t>

<t>An example of an ACME order object “identifiers” field containing a TNAuthList certificate would look as follows,</t>

<figure><artwork><![CDATA[
 "identifiers": [{"type":"TNAuthList","value":"F83n2a...avn27DN3"}]
]]></artwork></figure>

<t>where the "value" object string represents the arbitrary length base64url encoded string.</t>

<t>A full new-order request would look as follows,</t>

<figure><artwork><![CDATA[
POST /acme/new-order HTTP/1.1
Host: example.com
Content-Type: application/jose+json

{
  "protected": base64url({
    "alg": "ES256",
    "kid": "https://example.com/acme/acct/evOfKhNU60wg",
    "nonce": "5XJ1L3lEkMG7tR6pA00clA",
    "url": "https://example.com/acme/new-order"
  }),
  "payload": base64url({
    "identifiers": [{"type":"TNAuthList","value":"F83n...n27DN3"}],
    "notBefore": "2021-01-01T00:00:00Z",
    "notAfter": "2021-01-08T00:00:00Z"
  }),
  "signature": "H6ZXtGjTZyUnPeKn...wEA4TklBdh3e454g"
}
]]></artwork></figure>

<t>On receiving a valid new-order request, the ACME server creates an authorization object, <xref target="RFC8555"/> Section 7.1.4, containing the challenge that the ACME client must satisfy to demonstrate authority for the identifiers specified by the new order (in this case, the TNAuthList identifier). The CA adds the authorization object URL to the "authorizations" field of the order object, and returns the order object to the ACME client in the body of a 201 (Created) response.</t>

<figure><artwork><![CDATA[
HTTP/1.1 201 Created
Content-Type: application/json
Replay-Nonce: MYAuvOpaoIiywTezizk5vw
Location: https://example.com/acme/order/1234

{
  "status": "pending",
  "expires": "2022-01-08T00:00:00Z",

  "notBefore": "2022-01-01T00:00:00Z",
  "notAfter": "2022-01-08T00:00:00Z",
  "identifiers":[{"type":"TNAuthList",
                 "value":"F83n2a...avn27DN3"}],

  "authorizations": [
   "https://example.com/acme/authz/1234"
  ],
  "finalize": "https://example.com/acme/order/1234/finalize"
}
]]></artwork></figure>

</section>
<section anchor="tnauthlist-identifier-authorization"><name>TNAuthList Identifier Authorization</name>

<t>On receiving the new-order response, the ACME client queries the referenced authorization object to obtain the challenges for the identifier contained in the new-order request as shown in the following example request and response.</t>

<figure><artwork><![CDATA[
POST /acme/authz/1234 HTTP/1.1
    Host: example.com
    Content-Type: application/jose+json

    {
      "protected": base64url({
        "alg": "ES256",
        "kid": " https://example.com/acme/acct/evOfKhNU60wg",
        "nonce": "uQpSjlRb4vQVCjVYAyyUWg",
        "url": "https://example.com/acme/authz/1234"
      }),
      "payload": "",
      "signature": "nuSDISbWG8mMgE7H...QyVUL68yzf3Zawps"
    }
]]></artwork></figure>

<figure><artwork><![CDATA[
HTTP/1.1 200 OK
Content-Type: application/json
Link: <https://example.com/acme/some-directory>;rel="index"

{
  "status": "pending",
  "expires": "2022-01-08T00:00:00Z",

  "identifier": {
    "type:"TNAuthList",
    "value":"F83n2a...avn27DN3"
  },

  "challenges": [
    {
      "type": "tkauth-01",
      "tkauth-type": "atc",
      "token-authority": "https://authority.example.org",
      "url": "https://example.com/acme/chall/prV_B7yEyA4",
      "token": "IlirfxKKXAsHtmzK29Pj8A"
    }
  ]
}
]]></artwork></figure>

<t>When processing a certificate order containing an identifier of type "TNAuthList", a CA uses the Authority Token challenge type of "tkauth-01" with a "tkauth-type" of "atc" in <xref target="I-D.ietf-acme-authority-token"/> to verify that the requesting ACME client has authenticated and authorized control over the requested resources represented by the "TNAuthList" value.</t>

<t>The challenge "token-authority" parameter is only used in cases where the VoIP telephone network requires the CA to identify the Token Authority. This is currently not the case for the SHAKEN <xref target="ATIS-1000080"/> certificate framework governance, but may be used by other frameworks. If a "token-authority" parameter is present, then the ACME client MAY use the "token-authority" value to identify the URL representing the Token Authority that will provide the TNAuthList Authority Token response to the challenge. If the "token-authority" parameter is not present, then the ACME client MUST identify the Token Authority based on locally configured information or local policies.</t>

<t>The ACME client responds to the challenge by posting the TNAuthList Authority Token to the challenge URL identified in the returned ACME authorization object, an example of which follows.</t>

<figure><artwork><![CDATA[
POST /acme/chall/prV_B7yEyA4 HTTP/1.1
Host: boulder.example.com
Content-Type: application/jose+json

{
  "protected": base64url({
  "alg": "ES256",
  "kid": "https://example.com/acme/acct/evOfKhNU60wg",
  "nonce": "Q_s3MWoqT05TrdkM2MTDcw",
  "url": "https://boulder.example.com/acme/authz/asdf/0"
  }),
  "payload": base64url({
  "tkauth": "DGyRejmCefe7v4N...vb29HhjjLPSggwiE"
  }),
  "signature": "9cbg5JO1Gf5YLjjz...SpkUfcdPai9uVYYQ"
}
]]></artwork></figure>

<t>The "tkauth" field is defined as a new field in the challenge object specific to the tkauth-01 challenge type that should contain the TNAuthList Authority Token defined in the next section.</t>

</section>
<section anchor="tnauthlist-authority-token"><name>TNAuthList Authority Token</name>

<t>The Telephone Number Authority List Authority Token (TNAuthList Authority Token) is a profile instance of the ACME Authority Token defined in <xref target="I-D.ietf-acme-authority-token"/>.</t>

<t>The TNAuthList Authority Token Protected header MUST comply with the Authority Token Protected header as defined in <xref target="I-D.ietf-acme-authority-token"/>.</t>

<t>The TNAuthList Authority Token Payload MUST include the mandatory claims "exp", "jti", and "atc", and MAY include the optional claims defined for the Authority Token detailed in the next subsections.</t>

<section anchor="iss-claim"><name>"iss" claim</name>

<t>The "iss" claim is an optional claim defined in <xref target="RFC7519"/> Section 4.1.1.  It can be used as a URL identifying the Token Authority that issued the TNAuthList Authority Token beyond the "x5u" or other Header claims that identify the location of the certificate or certificate chain of the Token Authority used to validate the TNAuthList Authority Token.</t>

</section>
<section anchor="exp-claim"><name>"exp" claim</name>

<t>The "exp" claim, defined in <xref target="RFC7519"/> Section 4.1.4, MUST be included and contains the DateTime value of the ending date and time that the TNAuthList Authority Token expires.</t>

</section>
<section anchor="jti-claim"><name>"jti" claim</name>

<t>The "jti" claim, defined in <xref target="RFC7519"/> Section 4.1.7, MUST be included and contains a unique identifier for this TNAuthList Authority Token transaction.</t>

</section>
<section anchor="atc-claim"><name>"atc" claim</name>

<t>The "atc" claim MUST be included and is defined in <xref target="I-D.ietf-acme-authority-token"/>.  It contains a JSON object with the following elements:</t>

<t><list style="symbols">
  <t>a "tktype" key with a string value equal to "TNAuthList" to represent a TNAuthList profile of the authority token <xref target="I-D.ietf-acme-authority-token"/> defined by this document. "tktype" is a required key and MUST be included.</t>
  <t>a "tkvalue" key with a string value equal to the base64url encoding of the TN Authorization List certificate extension ASN.1 object using DER encoding rules. "tkvalue" is a required key and MUST be included.</t>
  <t>a "ca" key with a boolean value set to either true when the requested certificate is allowed to be a CA cert for delegation uses or false when the requested certificate is not intended to be a CA cert, only an end-entity certificate. "ca" is an optional key, if not included the "ca" value is considered false by default.</t>
  <t>a "fingerprint" key is constructed as defined in <xref target="RFC8555"/> Section 8.1 corresponding to the computation of the "Thumbprint" step using the ACME account key credentials. "fingerprint" is a required key and MUST be included.</t>
</list></t>

<t>An example of the TNAuthList Authority Token is as follows:</t>

<figure><artwork><![CDATA[
{
  "protected": base64url({
    "typ":"JWT",
    "alg":"ES256",
    "x5u":"https://authority.example.org/cert"
  }),
  "payload": base64url({
    "iss":"https://authority.example.org",
    "exp":1640995200,
    "jti":"id6098364921",
    "atc":{"tktype":"TNAuthList",
      "tkvalue":"F83n2a...avn27DN3",
      "ca":false,
      "fingerprint":"SHA256 56:3E:CF:AE:83:CA:4D:15:B0:29:FF:1B:71:
       D3:BA:B9:19:81:F8:50:9B:DF:4A:D4:39:72:E2:B1:F0:B9:38:E3"}
  }),
  "signature": "9cbg5JO1Gf5YLjjz...SpkUfcdPai9uVYYQ"
}
]]></artwork></figure>

</section>
<section anchor="acquiring-the-token-from-the-token-authority"><name>Acquiring the token from the Token Authority</name>

<t>Following <xref target="I-D.ietf-acme-authority-token"/> Section 5, the authority token should be acquired using a RESTful HTTP POST transaction as follows:</t>

<figure><artwork><![CDATA[
  POST /at/account/:id/token HTTP/1.1
  Host: authority.example.org
  Content-Type: application/json
]]></artwork></figure>

<t>The request will pass the account id as a string in the request parameter "id".  This string will be managed as an identifier specific to the Token Authority's relationship with a communications service provider (CSP). There is assumed to also be a corresponding authentication procedure that can be verified for the success of this transaction. For example, an HTTP authorization header containing a valid authorization credentials as defined in <xref target="RFC7231"/> Section 14.8.</t>

<t>The body of the POST request MUST contain a JSON object with key value pairs corresponding to values that are requested as the content of the claims in the issued token. As an example, the body SHOULD contain a JSON object as follows:</t>

<figure><artwork><![CDATA[
 {
   "tktype":"TNAuthList",
   "tkvalue":"F83n2a...avn27DN3",
   "ca":false,
   "fingerprint":"SHA256 56:3E:CF:AE:83:CA:4D:15:B0:29:FF:1B:71:D3
     :BA:B9:19:81:F8:50:9B:DF:4A:D4:39:72:E2:B1:F0:B9:38:E3"
 }
]]></artwork></figure>

<t>The response to the POST request if successful returns a 200 OK with a JSON body that contains, at a minimum, the TNAuthList Authority Token as a JSON object with a key of "token" and the base64url encoded string representing the atc token. JSON is easily extensible, so users of this specification may want to pass other pieces of information relevant to a specific application.</t>

<t>An example successful response would be as follows:</t>

<figure><artwork><![CDATA[
HTTP/1.1 200 OK
Content-Type: application/json

{"token": "DGyRejmCefe7v4N...vb29HhjjLPSggwiE"}
]]></artwork></figure>

<t>If the request is not successful, the response should indicate the error condition.  Specifically, for the case that the authorization credentials are invalid or if the Account ID provided does not exist, the response code MUST be 403 - Forbidden. Other 4xx and 5xx responses MUST follow standard <xref target="RFC7231"/> HTTP error condition conventions.</t>

</section>
<section anchor="token-authority-responsibilities"><name>Token Authority Responsibilities</name>

<t>When creating the TNAuthList Authority Token, the Token Authority MUST validate that the information contained in the ASN.1 TNAuthList accurately represents the service provider code (SPC) or telephone number (TN) resources the requesting party is authorized to represent based on their pre-established and verified secure relationship between the Token Authority and the requesting party. Note that the fingerprint in the token request is not meant to be verified by the Token Authority, but rather is meant to be signed as part of the token so that the party that requests the token can, as part of the challenge response, allow the ACME server to validate the token requested and used came from the same party that controls the ACME client.</t>

</section>
<section anchor="scope-of-the-tnauthlist"><name>Scope of the TNAuthList</name>

<t>Because this specification specifically involves the TNAuthList defined in <xref target="RFC8226"/> which involves SPC, TNBlock, and individual TNs, the client may also request an Authority Token with some subset of its own authority as the TNAuthList provided in the "tkvalue" element in the "atc" JSON object. Generally, the scope of authority representing a communications service provider is represented by a particular SPC (e.g. in North America, an operating company number (OCN) or service provider identifier (SPID)). That provider is also generally associated, based on number allocations, with a particular set of different TN Blocks and/or TNs. TNAuthList can be constructed to define a limited scope of the TNBlocks or TNs either associated with an SPC or with the scope of TN Blocks or TNs the client has authority over.</t>

<t>As recommended in <xref target="I-D.ietf-acme-authority-token"/> security considerations, an Authority Token can either have a scope that attests all of the resources which a client is eligible to receive certificates for, or potentially a more limited scope that is intended to capture only those resources for which a client will receive a certificate from a particular certification authority.  Any certification authority that sees an Authority Token can learn information about the resources a client can claim.  In cases where this incurs a privacy risk, Authority Token scopes should be limited to only the resources that will be attested by the requested ACME certificate.</t>

</section>
</section>
<section anchor="validating-the-tnauthlist-authority-token"><name>Validating the TNAuthList Authority Token</name>

<t>Upon receiving a response to the challenge, the ACME server MUST perform the following steps to determine the validity of the response.</t>

<t><list style="symbols">
  <t>Verify that the value of the "atc" claim is a well-formed JSON object containing the mandatory key values.</t>
  <t>If there is an "x5u" parameter verify the "x5u" parameter is a HTTPS URL with a reference to a certificate representing the trusted issuer of authority tokens for the eco-system.</t>
  <t>If there is an "x5c" parameter verify the certificate array contains a certificate representing the trusted issuer of authority tokens for the eco-system.</t>
  <t>Verify the TNAuthList Authority Token signature using the public key of the certificate referenced by the token's "x5u" or "x5c" parameter.</t>
  <t>Verify that "atc" claim contains a "tktype" identifier with the value "TNAuthList".</t>
  <t>Verify that the "atc" claim "tkvalue" identifier contains the equivalent base64url encoded TNAuthList certificate extension string value as the Identifier specified in the original challenge.</t>
  <t>Verify that the remaining claims are valid (e.g., verify that token has not expired)</t>
  <t>Verify that the "atc" claim "fingerprint" is valid and matches the account key of the client making the request</t>
  <t>Verify that the "atc" claim "ca" identifier boolean corresponds to the CA boolean in the Basic Constraints extension in the CSR for either CA certificate or end-entity certificate</t>
</list></t>

<t>If all steps in the token validation process pass, then the ACME server MUST set the challenge object "status" to "valid". If any step of the validation process fails, the "status" in the challenge object MUST be set to "invalid".</t>

</section>
<section anchor="using-acme-issued-certificates-with-json-web-signature"><name>Using ACME-issued Certificates with JSON Web Signature</name>

<t>JSON Web Signature (JWS, <xref target="RFC7515"/>) objects can include an "x5u" header parameter to refer to a certificate that is used to validate the JWS signature.  For example, the STIR PASSporT framework <xref target="RFC8225"/> uses "x5u" to indicate the STIR certificate used to validate the PASSporT JWS object.  The URLs used in "x5u" are expected to provide the required certificate in response to a GET request, not a POST-as-GET as required for the "certificate" URL in the ACME order object.  Thus the current mechanism generally requires the ACME client to download the certificate and host it on a public URL to make it accessible to relying parties.  This section defines an optional mechanism for the Certificate Authority (CA) to host the certificate directly and provide a URL that the ACME client owner can directly reference in the "x5u" of their signed PASSporTs.</t>

<t>As described in Section 7.4 of <xref target="RFC8555"/> when the certificate is ready for making a finalize request, the server will return a 200 (OK) with the updated order object.  In this response, an ACME Server can add a newly defined field called "x5u" that can pass this URL to the ACME client for usage in generated PASSporTs as a publically available URL for PASSporT validation.</t>

<dl>
  <dt>x5u (optional, string):</dt>
  <dd>
    <t>A URL that can be used to reference the certificate in the "x5u" parameter of a JWS object <xref target="RFC7515"/></t>
  </dd>
</dl>

<t>The publishing of the certificates at the new "x5u" URL should follow the GET request requirement as mentioned above and should be consistent with the timely publication according to the durations of the certificate lifecycle.</t>

<t>The following is an example of the use of "x5u" in the response when the certificate status is "valid".</t>

<figure><artwork><![CDATA[
HTTP/1.1 200 OK
Replay-Nonce: CGf81JWBsq8QyIgPCi9Q9X
Link: <https://example.com/acme/directory>;rel="index"
Location: https://example.com/acme/order/TOlocE8rfgo

{
  "status": "valid",
  "expires": "2016-01-20T14:09:07.99Z",

  "notBefore": "2016-01-01T00:00:00Z",
  "notAfter": "2016-01-08T00:00:00Z",

  "identifiers": [
    "type:"TNAuthList",
    "value":"F83n2a...avn27DN3"
  ],

  "authorizations": ["https://sti-ca.com/acme/authz/1234"],

  "finalize": "https://example.com/acme/order/TOlocE8rfgo/finalize",

  "certificate": "https://example.com/acme/cert/mAt3xBGaobw",

  "x5u": "https://example.com/cert-repo/giJI53km23.pem"
}
]]></artwork></figure>

</section>
<section anchor="usage-considerations"><name>Usage Considerations</name>

<section anchor="large-number-of-non-contiguous-tnauthlist-values"><name>Large number of Non-contiguous TNAuthList values</name>

<t>There are many scenarios and reasons to have various combinations of SPCs, TNs, and TN Ranges.  <xref target="RFC8226"/> has provided a somewhat unbounded set of combinations.  It's possible that a complex non-contiguous set of telephone numbers are being managed by a CSP.  Best practice may be simply to split a set of non-contiguous numbers under management into multiple STI certificates to represent the various contiguous parts of the greater non-contiguous set of TNs, particularly if length of the set of values in identifier object grows to be too large.</t>

</section>
</section>
<section anchor="security_considerations"><name>Security Considerations</name>

<t>The token represented by this document has the credentials to represent the scope of a telephone number, a block of telephone numbers, or an entire set of telephone numbers represented by an SPC. The creation, transport, and any storage of this token MUST follow the strictest of security best practices beyond the recommendations of the use of encrypted transport protocols in this document to protect it from getting in the hands of bad actors with illegitimate intent to impersonate telephone numbers.</t>

<t>This document inherits the security properties of <xref target="I-D.ietf-acme-authority-token"/>. Implementations should follow the best practices identified in <xref target="RFC8725"/>.</t>

<t>This document only specifies SHA256 for the fingerprint hash. However, the syntax of the fingerprint object would permit other algorithms if, due to concerns about algorithmic agility, a more robust algorithm were required at a future time.  Future specifications can define new algorithms for the fingerprint object as needed.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document requests the addition of a new identifier object type to the "ACME Identifier Types" registry defined in Section 9.7.7 of <xref target="RFC8555"/>.</t>

<figure><artwork><![CDATA[
                         +------------+-----------+
                         |   Label    | Reference |
                         +------------+-----------+
                         | TNAuthList |  RFCThis  |
                         +------------+-----------+
]]></artwork></figure>

</section>
<section anchor="acknowledgements"><name>Acknowledgements</name>

<t>We would like to thank Richard Barnes and Russ Housley for valuable contributions to this document.</t>

</section>


  </middle>

  <back>


    <references title='Normative References'>




<reference anchor='I-D.ietf-acme-authority-token'>
   <front>
      <title>ACME Challenges Using an Authority Token</title>
      <author fullname='Jon Peterson' initials='J.' surname='Peterson'>
         <organization>Neustar, Inc.</organization>
      </author>
      <author fullname='Mary Barnes' initials='M.' surname='Barnes'>
         <organization>Neustar, Inc.</organization>
      </author>
      <author fullname='David Hancock' initials='D.' surname='Hancock'>
         <organization>Comcast</organization>
      </author>
      <author fullname='Chris Wendt' initials='C.' surname='Wendt'>
         <organization>Somos</organization>
      </author>
      <date day='24' month='October' year='2022'/>
      <abstract>
	 <t>   Some proposed extensions to the Automated Certificate Management
   Environment (ACME) rely on proving eligibility for certificates
   through consulting an external authority that issues a token
   according to a particular policy.  This document specifies a generic
   Authority Token challenge for ACME which supports subtype claims for
   different identifiers or namespaces that can be defined separately
   for specific applications.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-acme-authority-token-09'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-acme-authority-token-09.txt' type='TXT'/>
</reference>



<reference anchor='RFC4648' target='https://www.rfc-editor.org/info/rfc4648'>
<front>
<title>The Base16, Base32, and Base64 Data Encodings</title>
<author fullname='S. Josefsson' initials='S.' surname='Josefsson'><organization/></author>
<date month='October' year='2006'/>
<abstract><t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes.  It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4648'/>
<seriesInfo name='DOI' value='10.17487/RFC4648'/>
</reference>



<reference anchor='RFC7231' target='https://www.rfc-editor.org/info/rfc7231'>
<front>
<title>Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content</title>
<author fullname='R. Fielding' initials='R.' role='editor' surname='Fielding'><organization/></author>
<author fullname='J. Reschke' initials='J.' role='editor' surname='Reschke'><organization/></author>
<date month='June' year='2014'/>
<abstract><t>The Hypertext Transfer Protocol (HTTP) is a stateless \%application- level protocol for distributed, collaborative, hypertext information systems.  This document defines the semantics of HTTP/1.1 messages, as expressed by request methods, request header fields, response status codes, and response header fields, along with the payload of messages (metadata and body content) and mechanisms for content negotiation.</t></abstract>
</front>
<seriesInfo name='RFC' value='7231'/>
<seriesInfo name='DOI' value='10.17487/RFC7231'/>
</reference>



<reference anchor='RFC7515' target='https://www.rfc-editor.org/info/rfc7515'>
<front>
<title>JSON Web Signature (JWS)</title>
<author fullname='M. Jones' initials='M.' surname='Jones'><organization/></author>
<author fullname='J. Bradley' initials='J.' surname='Bradley'><organization/></author>
<author fullname='N. Sakimura' initials='N.' surname='Sakimura'><organization/></author>
<date month='May' year='2015'/>
<abstract><t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures.  Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification.  Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t></abstract>
</front>
<seriesInfo name='RFC' value='7515'/>
<seriesInfo name='DOI' value='10.17487/RFC7515'/>
</reference>



<reference anchor='RFC7519' target='https://www.rfc-editor.org/info/rfc7519'>
<front>
<title>JSON Web Token (JWT)</title>
<author fullname='M. Jones' initials='M.' surname='Jones'><organization/></author>
<author fullname='J. Bradley' initials='J.' surname='Bradley'><organization/></author>
<author fullname='N. Sakimura' initials='N.' surname='Sakimura'><organization/></author>
<date month='May' year='2015'/>
<abstract><t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties.  The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t></abstract>
</front>
<seriesInfo name='RFC' value='7519'/>
<seriesInfo name='DOI' value='10.17487/RFC7519'/>
</reference>



<reference anchor='RFC8226' target='https://www.rfc-editor.org/info/rfc8226'>
<front>
<title>Secure Telephone Identity Credentials: Certificates</title>
<author fullname='J. Peterson' initials='J.' surname='Peterson'><organization/></author>
<author fullname='S. Turner' initials='S.' surname='Turner'><organization/></author>
<date month='February' year='2018'/>
<abstract><t>In order to prevent the impersonation of telephone numbers on the Internet, some kind of credential system needs to exist that cryptographically asserts authority over telephone numbers.  This document describes the use of certificates in establishing authority over telephone numbers, as a component of a broader architecture for managing telephone numbers as identities in protocols like SIP.</t></abstract>
</front>
<seriesInfo name='RFC' value='8226'/>
<seriesInfo name='DOI' value='10.17487/RFC8226'/>
</reference>



<reference anchor='RFC8555' target='https://www.rfc-editor.org/info/rfc8555'>
<front>
<title>Automatic Certificate Management Environment (ACME)</title>
<author fullname='R. Barnes' initials='R.' surname='Barnes'><organization/></author>
<author fullname='J. Hoffman-Andrews' initials='J.' surname='Hoffman-Andrews'><organization/></author>
<author fullname='D. McCarney' initials='D.' surname='McCarney'><organization/></author>
<author fullname='J. Kasten' initials='J.' surname='Kasten'><organization/></author>
<date month='March' year='2019'/>
<abstract><t>Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names.  Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate.  As of this writing, this verification is done through a collection of ad hoc mechanisms.  This document describes a protocol that a CA and an applicant can use to automate the process of verification and certificate issuance.  The protocol also provides facilities for other certificate management functions, such as certificate revocation.</t></abstract>
</front>
<seriesInfo name='RFC' value='8555'/>
<seriesInfo name='DOI' value='10.17487/RFC8555'/>
</reference>



<reference anchor='RFC8725' target='https://www.rfc-editor.org/info/rfc8725'>
<front>
<title>JSON Web Token Best Current Practices</title>
<author fullname='Y. Sheffer' initials='Y.' surname='Sheffer'><organization/></author>
<author fullname='D. Hardt' initials='D.' surname='Hardt'><organization/></author>
<author fullname='M. Jones' initials='M.' surname='Jones'><organization/></author>
<date month='February' year='2020'/>
<abstract><t>JSON Web Tokens, also known as JWTs, are URL-safe JSON-based security tokens that contain a set of claims that can be signed and/or encrypted. JWTs are being widely used and deployed as a simple security token format in numerous protocols and applications, both in the area of digital identity and in other application areas.  This Best Current Practices document updates RFC 7519 to provide actionable guidance leading to secure implementation and deployment of JWTs.</t></abstract>
</front>
<seriesInfo name='BCP' value='225'/>
<seriesInfo name='RFC' value='8725'/>
<seriesInfo name='DOI' value='10.17487/RFC8725'/>
</reference>



<reference anchor='RFC9060' target='https://www.rfc-editor.org/info/rfc9060'>
<front>
<title>Secure Telephone Identity Revisited (STIR) Certificate Delegation</title>
<author fullname='J. Peterson' initials='J.' surname='Peterson'><organization/></author>
<date month='September' year='2021'/>
<abstract><t>The Secure Telephone Identity Revisited (STIR) certificate profile provides a way to attest authority over telephone numbers and related identifiers for the purpose of preventing telephone number spoofing. This specification details how that authority can be delegated from a parent certificate to a subordinate certificate. This supports a number of use cases, including those where service providers grant credentials to enterprises or other customers capable of signing calls with STIR.</t></abstract>
</front>
<seriesInfo name='RFC' value='9060'/>
<seriesInfo name='DOI' value='10.17487/RFC9060'/>
</reference>



<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>




    </references>

    <references title='Informative References'>

<reference anchor="ATIS-1000080" >
  <front>
    <title>Signature-based Handling of Asserted information using toKENs (SHAKEN) Governance Model and Certificate Management &lt;https://access.atis.org/apps/group_public/download.php/32237/ATIS-1000080.pdf&gt;</title>
    <author >
      <organization>ATIS/SIP Forum NNI Task Group</organization>
    </author>
    <date year="2017" month="July"/>
  </front>
</reference>




<reference anchor='RFC7340' target='https://www.rfc-editor.org/info/rfc7340'>
<front>
<title>Secure Telephone Identity Problem Statement and Requirements</title>
<author fullname='J. Peterson' initials='J.' surname='Peterson'><organization/></author>
<author fullname='H. Schulzrinne' initials='H.' surname='Schulzrinne'><organization/></author>
<author fullname='H. Tschofenig' initials='H.' surname='Tschofenig'><organization/></author>
<date month='September' year='2014'/>
<abstract><t>Over the past decade, Voice over IP (VoIP) systems based on SIP have replaced many traditional telephony deployments.  Interworking VoIP systems with the traditional telephone network has reduced the overall level of calling party number and Caller ID assurances by granting attackers new and inexpensive tools to impersonate or obscure calling party numbers when orchestrating bulk commercial calling schemes, hacking voicemail boxes, or even circumventing multi-factor authentication systems trusted by banks.  Despite previous attempts to provide a secure assurance of the origin of SIP communications, we still lack effective standards for identifying the calling party in a VoIP session.  This document examines the reasons why providing identity for telephone numbers on the Internet has proven so difficult and shows how changes in the last decade may provide us with new strategies for attaching a secure identity to SIP sessions.  It also gives high-level requirements for a solution in this space.</t></abstract>
</front>
<seriesInfo name='RFC' value='7340'/>
<seriesInfo name='DOI' value='10.17487/RFC7340'/>
</reference>



<reference anchor='RFC8224' target='https://www.rfc-editor.org/info/rfc8224'>
<front>
<title>Authenticated Identity Management in the Session Initiation Protocol (SIP)</title>
<author fullname='J. Peterson' initials='J.' surname='Peterson'><organization/></author>
<author fullname='C. Jennings' initials='C.' surname='Jennings'><organization/></author>
<author fullname='E. Rescorla' initials='E.' surname='Rescorla'><organization/></author>
<author fullname='C. Wendt' initials='C.' surname='Wendt'><organization/></author>
<date month='February' year='2018'/>
<abstract><t>The baseline security mechanisms in the Session Initiation Protocol (SIP) are inadequate for cryptographically assuring the identity of the end users that originate SIP requests, especially in an interdomain context.  This document defines a mechanism for securely identifying originators of SIP requests.  It does so by defining a SIP header field for conveying a signature used for validating the identity and for conveying a reference to the credentials of the signer.</t><t>This document obsoletes RFC 4474.</t></abstract>
</front>
<seriesInfo name='RFC' value='8224'/>
<seriesInfo name='DOI' value='10.17487/RFC8224'/>
</reference>



<reference anchor='RFC8225' target='https://www.rfc-editor.org/info/rfc8225'>
<front>
<title>PASSporT: Personal Assertion Token</title>
<author fullname='C. Wendt' initials='C.' surname='Wendt'><organization/></author>
<author fullname='J. Peterson' initials='J.' surname='Peterson'><organization/></author>
<date month='February' year='2018'/>
<abstract><t>This document defines a method for creating and validating a token that cryptographically verifies an originating identity or, more generally, a URI or telephone number representing the originator of personal communications.  The Personal Assertion Token, PASSporT, is cryptographically signed to protect the integrity of the identity of the originator and to verify the assertion of the identity information at the destination.  The cryptographic signature is defined with the intention that it can confidently verify the originating persona even when the signature is sent to the destination party over an insecure channel.  PASSporT is particularly useful for many personal-communications applications over IP networks and other multi-hop interconnection scenarios where the originating and destination parties may not have a direct trusted relationship.</t></abstract>
</front>
<seriesInfo name='RFC' value='8225'/>
<seriesInfo name='DOI' value='10.17487/RFC8225'/>
</reference>




    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

