<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-sliwa-stir-oob-transparent-discovery-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="Discovery of STIR OOB CPS">Transparent Discovery of STIR Out-of-Band Call Placement Services</title>

    <author fullname="Rob Sliwa">
      <organization>Somos Inc.</organization>
      <address>
        <postal>
          <country>US</country>
        </postal>
        <email>robjsliwa@gmail.com</email>
      </address>
    </author>
    <author fullname="Chris Wendt">
      <organization>Somos Inc.</organization>
      <address>
        <postal>
          <country>US</country>
        </postal>
        <email>chris@appliedbits.com</email>
      </address>
    </author>

    <date year="2025" month="September" day="05"/>

    <area>AREA</area>
    <workgroup>WG Working Group</workgroup>
    <keyword>stir</keyword> <keyword>certificates</keyword> <keyword>delegate certificates</keyword> <keyword>oob</keyword>

    <abstract>


<?line 54?>

<t>This document defines a Discovery Service for STIR Out-of-Band (OOB) Call Placement Services (CPS). The Discovery Service enables Authentication Services (AS) and Verification Services (VS) to quickly determine which CPS is responsible for a given telephone number (TN) or Service Provider Code (SPC), allowing retrieval of PASSporTs even when SIP Identity headers are removed by non-IP or hybrid network segments. The Discovery Service leverages a CPS URI certificate extension, which allows STIR Certificates or Delegate Certificates to embed an HTTPS URI for the CPS serving the TNs or SPCs covered by the certificate.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        The latest revision of this draft can be found at <eref target="https://github.com/appliedbits/draft-sliwa-stir-oob-transparent-discovery"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-sliwa-stir-oob-transparent-discovery/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Secure Telephone Identity Revisited Working Group mailing list (<eref target="mailto:stir@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/stir/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/stir/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/appliedbits/draft-sliwa-stir-oob-transparent-discovery"/>.</t>
    </note>


  </front>

  <middle>


<?line 58?>

<section anchor="introduction"><name>Introduction</name>

<t>In a STIR ecosystem, defined primarily by <xref target="RFC8224"/>, <xref target="RFC8225"/>, and <xref target="RFC8226"/>, and specifically when enabling Out-of-Band (OOB) delivery of PASSporTs defined in <xref target="RFC8816"/>, a Call Placement Service (CPS) plays a vital role, particularly when SIP Identity headers are lost or removed in non-IP or hybrid network environments. While the role of CPS was well established in <xref target="RFC8816"/>, the challenge remained for the definition of discovering which CPS is responsible for a specific telephone number (TN) or Service Provider Code (SPC) in a secure, scalable, and interoperable way.</t>

<t>This document introduces a CPS Discovery Service designed to solve that challenge. The CPS Discovery Service provides a transparent and cryptographically verifiable method for identifying the correct CPS for any given TN or SPC identified in the TNAuthList of a STIR certificate defined in <xref target="RFC8226"/>, supporting OOB call authentication without requiring static configuration or bilateral agreements between service providers.</t>

<t>The CPS Discovery Service operates by leveraging the CPS URI certificate extension defined in <xref target="I-D.sliwa-stir-cert-cps-ext"/>. This extension allows STIR Certificates <xref target="RFC8226"/> or Delegate Certificates <xref target="RFC9060"/> to encode an HTTPS URI pointing to the CPS responsible for the TNs or SPCs listed in the certificate's TNAuthList. Once such certificates are published to STIR Certificate Transparency (STI-CT) logs defined in <xref target="I-D.wendt-stir-certificate-transparency"/>, the CPS URI becomes immediately visible, auditable, and publicly verifiable by relying parties.</t>

<t>To facilitate CPS discovery, the Discovery Service continuously monitors these CT logs, extracts CPS URIs from newly issued or updated certificates, and registers mappings from TNs or SPCs to CPS endpoints. These mappings are exposed via a simple REST API that supports fast, automated lookups by Authentication Services (AS) and Verification Services (VS).</t>

<t>By combining CPS URI certificate extensions with CT monitoring and a queryable discovery interface, this approach enables automatic OOB CPS discovery. It can integrate with existing STIR framework components and requires only an additional lookup step to improve the robustness and scalability of Out-of-Band PASSporT delivery.</t>

</section>
<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="architectural-overview"><name>Architectural Overview</name>

<t>This document defines a mechanism for discovering Call Placement Services (CPS) responsible for specific telephone numbers (TNs) or Service Provider Codes (SPCs) by monitoring STI Certificate Transparency (STI-CT) logs for certificates that include a CPS URI extension.</t>

<t>Entities that operate a CPS obtain delegate certificates with TNAuthList entries covering the TNs or SPCs they serve. These certificates include a CPS URI extension as defined in <xref target="I-D.sliwa-stir-cert-cps-ext"/>, indicating the HTTPS endpoint of the CPS. Once issued, these certificates are submitted to STI-CT logs.</t>

<t>Any relying party may monitor STI-CT logs for new or updated certificates containing a CPS URI extension. Upon detection, the CPS URI and its associated TNAuthList entries are extracted and recorded. This enables parties to associate TNs or SPCs with corresponding CPS URIs based on the content of logged certificates.</t>

<t>This approach provides the following properties:</t>

<t><list style="symbols">
  <t>Transparency: CPS endpoint declarations are logged and auditable through STI-CT.</t>
  <t>Verifiability: Mappings are derived from signed certificates anchored in existing STIR trust infrastructure and supported by Signed Certificate Timestamps (SCTs).</t>
  <t>No bilateral provisioning: Originating and terminating parties do not require prior agreement or static configuration to determine the correct CPS.</t>
  <t>Compatibility: The mechanism is fully compatible with the STIR Out-of-Band (OOB) architecture as defined in <xref target="RFC8816"/> and requires no modification to existing CPS publish or retrieve interfaces.</t>
</list></t>

<t>While this discovery mechanism is inherently distributed, relying solely on STI-CT log monitoring and information published in signed certificates, it does not preclude the existence of centralized or convenience-based services that aggregate CPS URI data. Such services may offer simplified access patterns, enhanced performance, or monitoring utilities for relying parties. However, any such intermediary or cache-based service <bcp14>MUST</bcp14> preserve the verifiable nature of the CPS URI bindings by exposing the original certificate, Signed Certificate Timestamps (SCTs), and associated TNAuthList values. Consumers of CPS discovery data <bcp14>SHOULD</bcp14> validate the integrity and provenance of this information using the underlying CT log entries and certificate signatures, as defined in this document and related STIR specifications.</t>

</section>
<section anchor="components"><name>Components</name>

<t>The discovery mechanism relies on existing STIR framework components and STI-CT logs. No new interfaces are required between entities. CPS operators signal the location of their service using a certificate extension, and relying parties extract and verify these declarations by monitoring CT logs.</t>

<section anchor="call-placement-service-cps"><name>Call Placement Service (CPS)</name>

<t>A Call Placement Service (CPS), as defined in <xref target="RFC8816"/>, is a network-accessible endpoint that stores PASSporTs for later retrieval during call verification. CPSs are used when SIP Identity headers are removed or unavailable, such as in non-IP or hybrid telephony environments. Originating entities publish PASSporTs to the CPS associated with the called party's number, and terminating entities retrieve them during call processing.</t>

<t>This specification does not modify the behavior or interfaces of CPS endpoints. It only describes how CPS endpoint information is published and discovered using STIR certificates and delegate certificates and STI-CT.</t>

</section>
<section anchor="certificate-holders"><name>Certificate Holders</name>

<t>Entities responsible for telephone numbers or SPCs, such as service providers or enterprises, obtain STIR certificates or delegate certificates with TNAuthList entries covering those resources. These certificates may optionally as defined in this document include a CPS URI extension indicating the HTTPS endpoint of the CPS that serves those numbers to facilitate discovery.</t>

<t>When these certificates are submitted to a recognized STI-CT log, the CPS URI becomes visible to relying parties monitoring the log. This allows third parties to discover the CPS associated with a number without requiring pre-provisioning or bilateral configuration.</t>

</section>
<section anchor="transparency-log-monitors"><name>Transparency Log Monitors</name>

<t>Any party may monitor STI-CT logs for certificates containing a CPS URI extension. Upon detecting a new or updated certificate, the monitor performs the following:</t>

<t><list style="symbols">
  <t>Verifies the certificate chain to a trusted STI root</t>
  <t>Validates the certificate's Signed Certificate Timestamps (SCTs)</t>
  <t>Extracts the TNAuthList and CPS URI from the certificate</t>
  <t>Associates the covered TNs or SPCs with the indicated CPS URI</t>
</list></t>

<t>Monitors may use this data to maintain a local registry or cache of TN to CPS and SPC to CPS mappings. These mappings can be used by Authentication Services or Verification Services during call processing.</t>

</section>
</section>
<section anchor="cps-discovery-mechanisms"><name>CPS Discovery Mechanisms</name>

<t>This section describes the mechanism by which Call Placement Service (CPS) information is discovered through monitoring of STI-CT logs. This method provides a distributed, cryptographically verifiable, and interoperable means of associating telephone numbers (TNs) or Service Provider Codes (SPCs) with CPS endpoints.</t>

<section anchor="certificate-based-cps-publication"><name>Certificate-Based CPS Publication</name>

<t>CPS operators often associated with entities authorized for telephone numbers or SPCs obtain STIR certificates or delegate certificates containing a TNAuthList and the CPS URI certificate extension as defined in <xref target="I-D.sliwa-stir-cert-cps-ext"></xref>. The CPS URI identifies the CPS HTTPS endpoint where Out-of-Band (OOB) PASSporTs can be published or retrieved for the associated identifiers.</t>

<t>These certificates are submitted to one or more recognized STI-CT logs. Each submission yields a Signed Certificate Timestamp (SCT), which proves inclusion in the log and enables public verification.</t>

</section>
<section anchor="discovery-via-log-monitoring"><name>Discovery via Log Monitoring</name>

<t>Relying parties (e.g., Authentication Services, Verification Services, or intermediary discovery components) monitor STI-CT logs for new or updated certificates that include a CPS URI extension. Upon detection, the monitor performs the following steps:</t>

<t><list style="numbers" type="1">
  <t>Verifies the certificate chain to a trusted STI root.</t>
  <t>Validates the SCT(s) associated with the certificate.</t>
  <t>Extracts the TNAuthList and the CPS URI extension.</t>
  <t>Associates the covered TNs or SPCs with the CPS URI.</t>
</list></t>

<t>The resulting mappings are used to determine the appropriate CPS endpoint during call placement and verification. This process allows discovery to be performed in real-time or asynchronously using CT log clients, without requiring direct interaction with the certificate holder or CPS operator.</t>

</section>
</section>
<section anchor="end-to-end-process-summary"><name>End-to-End Process Summary</name>

<t><list style="numbers" type="1">
  <t>A STIR certificate or delegate certificate is issued containing TNAuthList and CPS URI.</t>
  <t>The certificate is logged in an STI-CT log, generating SCTs.</t>
  <t>A monitoring system observes the log and extracts TN-CPS and SPC-CPS mappings.</t>
  <t>Authentication or Verification Services consult the mappings to identify the CPS endpoint corresponding to a given TN or SPC.</t>
  <t>PASSporTs are published or retrieved using the discovered CPS URI as part of the OOB authentication process.</t>
</list></t>

<t>This approach removes the need for authoritative registries, REST-based discovery interfaces, or bilateral provisioning agreements. All discovery is based on cryptographic credentials and public transparency logs, ensuring an auditable and interoperable discovery process.</t>

</section>
<section anchor="expected-monitor-behavior"><name>Expected Monitor Behavior</name>

<t>Parties that wish to perform CPS discovery may monitor one or more STI-CT logs for delegate certificates containing the CPS URI extension. Monitors are expected to:</t>

<t><list style="symbols">
  <t>Validate certificate chains to STI trust anchors.</t>
  <t>Verify inclusion of certificates via Signed Certificate Timestamps (SCTs).</t>
  <t>Extract the CPS URI and TNAuthList from certificates.</t>
  <t>Associate telephone numbers or SPCs with the declared CPS URI.</t>
</list></t>

<t>Monitors may use this information to enable Authentication Services (AS) or Verification Services (VS) to locate the appropriate CPS endpoint. Implementations may maintain local caches or registries based on the extracted data, respecting certificate validity periods and revocation status when available.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>The CPS discovery mechanism relies on the integrity of STIR delegate certificates and STI-CT logs. Several security considerations apply:</t>

<t><list style="symbols">
  <t>Misissued Certificates: A CPS URI could be falsely claimed in a certificate. Relying parties must validate that certificates are issued by trusted STIR Certification Authorities and verify TNAuthList accuracy during issuance.</t>
  <t>Log Misbehavior: CT logs may omit or backdate entries. Implementations should monitor multiple CT logs and validate Signed Certificate Timestamps (SCTs) to ensure visibility and integrity.</t>
  <t>Stale or Revoked Certificates: CPS mappings derived from expired or revoked certificates may lead to incorrect routing. Implementations should check certificate validity and revocation status before using extracted mappings.</t>
  <t>Information Exposure: CPS URIs and TNAuthList entries are publicly logged. This may reveal operational details but does not introduce new exposures beyond existing STIR practices.</t>
</list></t>

<t>This mechanism inherits the security properties of the STIR certificate infrastructure and CT logging, offering verifiable, auditable discovery without requiring bilateral trust.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document has no IANA actions.</t>

</section>


  </middle>

  <back>



    <references title='Normative References' anchor="sec-normative-references">




<reference anchor="I-D.sliwa-stir-cert-cps-ext">
   <front>
      <title>Call Placement Service (CPS) URI Certificate Extension for STI Certificates</title>
      <author fullname="Robert Śliwa" initials="R." surname="Śliwa">
         <organization>Somos Inc.</organization>
      </author>
      <author fullname="Chris Wendt" initials="C." surname="Wendt">
         <organization>Somos Inc.</organization>
      </author>
      <date day="5" month="September" year="2025"/>
      <abstract>
	 <t>   This document specifies a non-critical X.509 v3 certificate extension
   that conveys the HTTPS URI of a Call Placement Service (CPS)
   associated with the telephone numbers authorized in a STIR Delegate
   Certificate.  The extension enables originators and verifiers of STIR
   PASSporTs to discover, with a single certificate lookup, where Out-
   of-Band (OOB) PASSporTs can be retrieved.  The mechanism removes
   bilateral CPS provisioning, allows ecosystem-scale discovery backed
   by STI Certificate Transparency (STI-CT), and is fully backward
   compatible with existing STIR certificates and OOB APIs.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-sliwa-stir-cert-cps-ext-00"/>
   
</reference>

<reference anchor="I-D.wendt-stir-certificate-transparency">
   <front>
      <title>STI Certificate Transparency</title>
      <author fullname="Chris Wendt" initials="C." surname="Wendt">
         <organization>Somos, Inc.</organization>
      </author>
      <author fullname="Robert Śliwa" initials="R." surname="Śliwa">
         <organization>Somos, Inc.</organization>
      </author>
      <author fullname="Alec Fenichel" initials="A." surname="Fenichel">
         <organization>TransNexus</organization>
      </author>
      <author fullname="Vinit Anil Gaikwad" initials="V. A." surname="Gaikwad">
         <organization>Twilio</organization>
      </author>
      <date day="11" month="June" year="2025"/>
      <abstract>
	 <t>   This document describes a framework for the use of the Certificate
   Transparency (CT) protocol for publicly logging the existence of
   Secure Telephone Identity (STI) certificates as they are issued or
   observed.  This allows any interested party that is part of the STI
   eco-system to audit STI certification authority (CA) activity and
   audit both the issuance of suspect certificates and the certificate
   logs themselves.  The intent is for the establishment of a level of
   trust in the STI eco-system that depends on the verification of
   telephone numbers requiring and refusing to honor STI certificates
   that do not appear in a established log.  This effectively
   establishes the precedent that STI CAs must add all issued
   certificates to the logs and thus establishes unique association of
   STI certificates to an authorized provider or assignee of a telephone
   number resource.  The primary role of CT in the STI ecosystem is for
   verifiable trust in the avoidance of issuance of unauthorized
   duplicate telephone number level delegate certificates or provider
   level certificates.  This provides a robust auditable mechanism for
   the detection of unauthorized creation of certificate credentials for
   illegitimate spoofing of telephone numbers or service provider codes
   (SPC).

   The framework borrows the log structure and API model from RFC6962 to
   enable public auditing and verifiability of certificate issuance.
   While the foundational mechanisms for log operation, Merkle Tree
   construction, and Signed Certificate Timestamps (SCTs) are aligned
   with RFC6962, this document contextualizes their application in the
   STIR eco-system, focusing on verifiable control over telephone number
   or service provider code resources.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-wendt-stir-certificate-transparency-06"/>
   
</reference>
<reference anchor="RFC8224">
  <front>
    <title>Authenticated Identity Management in the Session Initiation Protocol (SIP)</title>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <author fullname="C. Jennings" initials="C." surname="Jennings"/>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <author fullname="C. Wendt" initials="C." surname="Wendt"/>
    <date month="February" year="2018"/>
    <abstract>
      <t>The baseline security mechanisms in the Session Initiation Protocol (SIP) are inadequate for cryptographically assuring the identity of the end users that originate SIP requests, especially in an interdomain context. This document defines a mechanism for securely identifying originators of SIP requests. It does so by defining a SIP header field for conveying a signature used for validating the identity and for conveying a reference to the credentials of the signer.</t>
      <t>This document obsoletes RFC 4474.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8224"/>
  <seriesInfo name="DOI" value="10.17487/RFC8224"/>
</reference>
<reference anchor="RFC8225">
  <front>
    <title>PASSporT: Personal Assertion Token</title>
    <author fullname="C. Wendt" initials="C." surname="Wendt"/>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <date month="February" year="2018"/>
    <abstract>
      <t>This document defines a method for creating and validating a token that cryptographically verifies an originating identity or, more generally, a URI or telephone number representing the originator of personal communications. The Personal Assertion Token, PASSporT, is cryptographically signed to protect the integrity of the identity of the originator and to verify the assertion of the identity information at the destination. The cryptographic signature is defined with the intention that it can confidently verify the originating persona even when the signature is sent to the destination party over an insecure channel. PASSporT is particularly useful for many personal-communications applications over IP networks and other multi-hop interconnection scenarios where the originating and destination parties may not have a direct trusted relationship.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8225"/>
  <seriesInfo name="DOI" value="10.17487/RFC8225"/>
</reference>
<reference anchor="RFC8226">
  <front>
    <title>Secure Telephone Identity Credentials: Certificates</title>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <author fullname="S. Turner" initials="S." surname="Turner"/>
    <date month="February" year="2018"/>
    <abstract>
      <t>In order to prevent the impersonation of telephone numbers on the Internet, some kind of credential system needs to exist that cryptographically asserts authority over telephone numbers. This document describes the use of certificates in establishing authority over telephone numbers, as a component of a broader architecture for managing telephone numbers as identities in protocols like SIP.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8226"/>
  <seriesInfo name="DOI" value="10.17487/RFC8226"/>
</reference>
<reference anchor="RFC8816">
  <front>
    <title>Secure Telephone Identity Revisited (STIR) Out-of-Band Architecture and Use Cases</title>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <date month="February" year="2021"/>
    <abstract>
      <t>The Personal Assertion Token (PASSporT) format defines a token that can be carried by signaling protocols, including SIP, to cryptographically attest the identity of callers. However, not all telephone calls use Internet signaling protocols, and some calls use them for only part of their signaling path, while some cannot reliably deliver SIP header fields end-to-end. This document describes use cases that require the delivery of PASSporT objects outside of the signaling path, and defines architectures and semantics to provide this functionality.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8816"/>
  <seriesInfo name="DOI" value="10.17487/RFC8816"/>
</reference>
<reference anchor="RFC9060">
  <front>
    <title>Secure Telephone Identity Revisited (STIR) Certificate Delegation</title>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <date month="September" year="2021"/>
    <abstract>
      <t>The Secure Telephone Identity Revisited (STIR) certificate profile provides a way to attest authority over telephone numbers and related identifiers for the purpose of preventing telephone number spoofing. This specification details how that authority can be delegated from a parent certificate to a subordinate certificate. This supports a number of use cases, including those where service providers grant credentials to enterprises or other customers capable of signing calls with STIR.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9060"/>
  <seriesInfo name="DOI" value="10.17487/RFC9060"/>
</reference>
<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>



    </references>




<?line 195?>

<section numbered="false" anchor="acknowledgments"><name>Acknowledgments</name>

<t>TODO acknowledge.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

