<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.15 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-stir-identity-header-errors-handling-00" category="std">

  <front>
    <title abbrev="Identity Errors">Identity Header Error Handling</title>

    <author initials="C." surname="Wendt" fullname="Chris Wendt">
      <organization>Somos</organization>
      <address>
        <email>chris-ietf@chriswendt.net</email>
      </address>
    </author>

    <date year="2021" month="December" day="06"/>

    <area>art</area>
    
    <keyword>Identity</keyword>

    <abstract>


<t>This document extends STIR and the Authenticated Identity Management in the Session Initiation Protocol (SIP) error handling procedures to include the mapping of verification failure reasons to STIR defined 4xx codes so the failure reason of an Identity header field can be conveyed to the upstream authentication service when local policy dictates that the call should continue in the presence of a verification failure. This document also defines procedures that enable enable a failure reason to be mapped to a specific Identity header for scenarios that use multiple Identity header fields where some may have errors and others may not and the handling of those situations is defined.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t><xref target="RFC8224"/> in Section 6.2.2 discusses future specifications for enhancement of how errors are communicated and the handling of multiple Identity header fields. This specification provides some additional mechanisms for solutions to address these problems.</t>

<t>In some deployments of STIR and specifically using SIP <xref target="RFC3261"/> as defined by <xref target="RFC8224"/>, one issue with the current error handling, specifically with the use of the defined 4xx error responses, is that when an error occurs with the verification of the Identity header field or the PASSporT contained in the Identity header field and a 4xx response is returned, the call is then terminated. It may be the case that the policy for handling errors dictates that calls should continue even if there is a verification error, in the case of, for example inadvertent errors, however the authentication service should still be notified of the error so that corrective action can be taken. This specification will discuss the use of the Reason header field in subsequent provisional (1xx) responses in order to accomplish this.</t>

<t>For the handling of multiple Identity header fields and the potential situation that some of the Identity header fields in a call may pass verification but others may have errors, this document provides a mechanism to add an identifier so that the authentication service can identify which Identity header field is being referred to in the case of an error.</t>

</section>
<section anchor="terminology" title="Terminology">

<t>The keywords “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”, “MAY”, and “OPTIONAL” in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>

</section>
<section anchor="reason-header-field-protocol-stir" title="Reason header field protocol “STIR”">

<t>This specification defines a new Reason header field <xref target="RFC3326"/> protocol “STIR” for STIR applications using SIP as defined in <xref target="RFC8224"/>. This will differentiate current protocols, specifically “SIP” which is currently in wide industry usage, from the <xref target="RFC8224"/> defined error cause codes and the potential use of multiple Reason header fields defined in <xref target="RFC3326"/> and updated in [upcoming document TBD] allowing multiple Reason header fields with the same “STIR” protocol string. The use of multiple Reason header field is discussed in more detail later in the document.</t>

</section>
<section anchor="use-of-provisional-error-responses-to-signal-errors-without-terminating-the-call" title="Use of provisional error responses to signal errors without terminating the call">

<t>In cases where local policy dictates that a call should continue regardless of any verification errors that may have occured, including 4XX errors described in <xref target="RFC8224"/> Section 6.2.2, then the verification service SHOULD NOT send the 4XX as a response, but rather include the error response code and reason phrase in a Reason header field, defined in <xref target="RFC3326"/>, in the next provisional or final responses sent to the authentication service.</t>

<t>Example Reason header field:</t>

<figure><artwork><![CDATA[
Reason: STIR ;cause=436 ;text="Bad Identity Info"
]]></artwork></figure>

</section>
<section anchor="handling-of-a-verification-error-when-there-are-multiple-identity-header-fields" title="Handling of a verification error when there are multiple Identity header fields">

<t>In cases where a SIP message includes multiple Identity header fields and one of those Identity header fields has an error, the verification service SHOULD include the error response code and reason phrase associated with the error in a Reason header field, defined in <xref target="RFC3326"/>, in the next provisional or final responses sent to the authentication service. The reason cause in the Reason header field SHOULD represent the error that occurred when verifying the contents of the Identity header field.  The association of a Reason header field and error to a specific Identity header field is accomplished by adding a “ppt” parameter containing the PASSporT that generated the error to the Reason header field. The “ppt” parameter for the Reason header field is optional, but RECOMMENDED, in particular for cases that a SIP INVITE contains multiple Identity header fields. The PASSporT can be included in full form, or optionally in compact form, where only the signature of the PASSporT is used to identify the reported Identity header field with an error.</t>

<t>Example Reason header field with full form PASSporT:</t>

<figure><artwork><![CDATA[
Reason: STIR ;cause=436 ;text="Bad Identity Info" ;ppt= \
"eyJhbGciOiJFUzI1NiIsInR5cCI6InBhc3Nwb3J0IiwieDV1I \
joiaHR0cHM6Ly9jZXJ0LmV4YW1wbGUub3JnL3Bhc3Nwb3J0LmNlciJ9.eyJ \
kZXN0Ijp7InVyaSI6WyJzaXA6YWxpY2VAZXhhbXBsZS5jb20iXX0sImlhdC \
I6IjE0NDMyMDgzNDUiLCJvcmlnIjp7InRuIjoiMTIxNTU1NTEyMTIifX0.r \
q3pjT1hoRwakEGjHCnWSwUnshd0-zJ6F1VOgFWSjHBr8Qjpjlk-cpFYpFYs \
ojNCpTzO3QfPOlckGaS6hEck7w"
]]></artwork></figure>

<t>Example Reason header field with compact form PASSporT:
~~~~~~~~~~~
Reason: STIR ;cause=436 ;text=”Bad Identity Info” ;ppt= \
“..rq3pjT1akEGjHCnWSwUnshd0-zJ6F1VOgFWSjHBr8Qjpjlk-cpFYpFYs \
ojNCpTzO3QfPOlckGaS6hEck7w”
~~~~~~~~~~~</t>

</section>
<section anchor="handling-multiple-verification-errors" title="Handling multiple verification errors">

<t>If there are multiple Identity header field verification errors being reported the verification service SHOULD include corresponding Reason header fields with “ppt” parameters including full or compact form of the PASSporT with cause and text parameters identifying each error. As mentioned previously, the potential use of multiple Reason header fields defined in <xref target="RFC3326"/> is updated in [upcoming document TBD] allowing multiple Reason header fields with the same protocol value, for this specification being “STIR”.</t>

<t>Example Reason header fields for two identity info errors:</t>

<figure><artwork><![CDATA[
Reason: STIR ;cause=436 ;text="Bad Identity Info" ;ppt= \
"eyJhbGciOiJFUzI1NiIsInR5cCI6InBhc3Nwb3J0IiwieDV1I \
joiaHR0cHM6Ly9jZXJ0LmV4YW1wbGUub3JnL3Bhc3Nwb3J0LmNlciJ9.eyJ \
kZXN0Ijp7InVyaSI6WyJzaXA6YWxpY2VAZXhhbXBsZS5jb20iXX0sImlhdC \
I6IjE0NDMyMDgzNDUiLCJvcmlnIjp7InRuIjoiMTIxNTU1NTEyMTIifX0.r \
q3pjT1hoRwakEGjHCnWSwUnshd0-zJ6F1VOgFWSjHBr8Qjpjlk-cpFYpFYs \
ojNCpTzO3QfPOlckGaS6hEck7w"

Reason: STIR ;cause=436 ; text="Bad Identity Info" ;ppt= \
"eyJhbGciOiJFUzI1NiIsInR5cCI6InBhc3Nwb3J0IiwieDV1I \
joiaHR0cHM6Ly9jZXJ0LmV4YW1wbGUub3JnL3Bhc3Nwb3J0LmNlciJ9.eyJ \
xpY2VAZXhhbXBsZS5jb20iXX0sImlhdCkZXN0Ijp7InVyaSI6WyJzaXA6YW \
p7InRuIjoiMTIxNTU1NTEyMTIifX0I6IjE0NDMyMDgzNDUiLCJvcmlnIj.r \
J6F1VOgFWSjHBr8Qjpjlk-cpFYpFYsq3pjT1hoRwakEGjHCnWSwUnshd0-z \
ckGaS6hEck7wojNCpTzO3QfPOl"

]]></artwork></figure>

</section>
<section anchor="removal-of-the-reason-header-field-by-authentication-service" title="Removal of the Reason header field by Authentication Service">

<t>When an Authentication Service <xref target="RFC8224"/> receives the Reason header field with a PASSporT it generated as part of an Identity header field and the authentication of a call, it should first follow local policy to recognize and acknowledge the error (e.g. perform operational actions like logging or alarming), but then MUST remove the identified Reason header field to avoid the PASSporT information from going upstream to a UAC or UAS that may not be authorized to see claim information contained in the PASSporT for privacy or other reasons.</t>

</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>This document requests the definition of a new protocol value (and associated protocol cause) to be registered by the IANA into the “Reason Protocols” sub-registry under http://www.iana.org/assignments/sip-parameter as follows:</t>

<figure><artwork><![CDATA[
Protocol Value   Protocol Cause            Reference
--------------   ---------------           -----------
STIR              Status code               RFC 8224

]]></artwork></figure>

</section>
<section anchor="acknowledgements" title="Acknowledgements">

<t>Would like to thank David Hancock for help to identify these error scenarios and Jon Peterson, Roman Shpount, and STIR working group for helpful feedback and discussion.</t>

</section>
<section anchor="Security" title="Security Considerations">

<t>TBD</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference  anchor="RFC3261" target='https://www.rfc-editor.org/info/rfc3261'>
<front>
<title>SIP: Session Initiation Protocol</title>
<author initials='J.' surname='Rosenberg' fullname='J. Rosenberg'><organization /></author>
<author initials='H.' surname='Schulzrinne' fullname='H. Schulzrinne'><organization /></author>
<author initials='G.' surname='Camarillo' fullname='G. Camarillo'><organization /></author>
<author initials='A.' surname='Johnston' fullname='A. Johnston'><organization /></author>
<author initials='J.' surname='Peterson' fullname='J. Peterson'><organization /></author>
<author initials='R.' surname='Sparks' fullname='R. Sparks'><organization /></author>
<author initials='M.' surname='Handley' fullname='M. Handley'><organization /></author>
<author initials='E.' surname='Schooler' fullname='E. Schooler'><organization /></author>
<date year='2002' month='June' />
<abstract><t>This document describes Session Initiation Protocol (SIP), an application-layer control (signaling) protocol for creating, modifying, and terminating sessions with one or more participants.  These sessions include Internet telephone calls, multimedia distribution, and multimedia conferences.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3261'/>
<seriesInfo name='DOI' value='10.17487/RFC3261'/>
</reference>



<reference  anchor="RFC3326" target='https://www.rfc-editor.org/info/rfc3326'>
<front>
<title>The Reason Header Field for the Session Initiation Protocol (SIP)</title>
<author initials='H.' surname='Schulzrinne' fullname='H. Schulzrinne'><organization /></author>
<author initials='D.' surname='Oran' fullname='D. Oran'><organization /></author>
<author initials='G.' surname='Camarillo' fullname='G. Camarillo'><organization /></author>
<date year='2002' month='December' />
<abstract><t>The REGISTER function is used in a Session Initiation Protocol (SIP) system primarily to associate a temporary contact address with an address-of-record.  This contact is generally in the form of a Uniform Resource Identifier (URI), such as Contact: &lt;sip:alice@pc33.atlanta.com&gt; and is generally dynamic and associated with the IP address or hostname of the SIP User Agent (UA).  The problem is that network topology may have one or more SIP proxies between the UA and the registrar, such that any request traveling from the user's home network to the registered UA must traverse these proxies.  The REGISTER method does not give us a mechanism to discover and record this sequence of proxies in the registrar for future use.  This document defines an extension header field, &quot;Path&quot; which provides such a mechanism.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3326'/>
<seriesInfo name='DOI' value='10.17487/RFC3326'/>
</reference>



<reference  anchor="RFC8224" target='https://www.rfc-editor.org/info/rfc8224'>
<front>
<title>Authenticated Identity Management in the Session Initiation Protocol (SIP)</title>
<author initials='J.' surname='Peterson' fullname='J. Peterson'><organization /></author>
<author initials='C.' surname='Jennings' fullname='C. Jennings'><organization /></author>
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /></author>
<author initials='C.' surname='Wendt' fullname='C. Wendt'><organization /></author>
<date year='2018' month='February' />
<abstract><t>The baseline security mechanisms in the Session Initiation Protocol (SIP) are inadequate for cryptographically assuring the identity of the end users that originate SIP requests, especially in an interdomain context.  This document defines a mechanism for securely identifying originators of SIP requests.  It does so by defining a SIP header field for conveying a signature used for validating the identity and for conveying a reference to the credentials of the signer.</t><t>This document obsoletes RFC 4474.</t></abstract>
</front>
<seriesInfo name='RFC' value='8224'/>
<seriesInfo name='DOI' value='10.17487/RFC8224'/>
</reference>



<reference  anchor="RFC2119" target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference  anchor="RFC8174" target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author initials='B.' surname='Leiba' fullname='B. Leiba'><organization /></author>
<date year='2017' month='May' />
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>




    </references>




  </back>

<!-- ##markdown-source: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-->

</rfc>

