<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.6 (Ruby 3.3.0) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-wendt-stir-certificate-transparency-00" category="info" consensus="true" submissionType="IETF" number="0" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="STI CT">STI Certificate Transparency</title>

    <author fullname="Chris Wendt">
      <organization>Somos, Inc.</organization>
      <address>
        <postal>
          <country>US</country>
        </postal>
        <email>chris@appliedbits.com</email>
      </address>
    </author>
    <author fullname="Rob Sliwa">
      <organization>Somos, Inc.</organization>
      <address>
        <postal>
          <country>US</country>
        </postal>
        <email>robjsliwa@gmail.com</email>
      </address>
    </author>

    <date year="2024" month="March" day="04"/>

    <area>Applications and Real-Time</area>
    <workgroup>Secure Telephone Identity Revisited</workgroup>
    <keyword>stir</keyword> <keyword>certificates</keyword> <keyword>delegate certificates</keyword>

    <abstract>


<?line 50?>

<t>This document describes a framework for the use of the Certificate Transparency (CT) protocol for publicly logging the existence of Secure Telephone Identity (STI) certificates as they are issued or observed, in a manner that allows anyone to audit STI certification authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is establish a level of trust in the STI eco-system that verification of calls would required and refuse to honor STI certificates that do not appear in a log, effectively forcing STI CAs to add all issued certificates to the logs, establishing trust that STI certificates are unique to the authorized provider or assignee of a telephone number resource. The primary role of certificate transparency in the STI ecosystem is the avoidance of issuance of unauthorized or duplicate provider level certificates or, of particular importance, telephone number level delegate certificates.  This provides a robust mechanism for the detection of unauthorized creation of certificate credentials for illegitimate spoofing of telephone numbers.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        The latest revision of this draft can be found at <eref target="https://appliedbits.github.io/draft-wendt-stir-certificate-transparency/draft-wendt-stir-certificate-transparency.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-wendt-stir-certificate-transparency/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Secure Telephone Identity Revisited Working Group mailing list (<eref target="mailto:stir@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/stir/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/stir/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/appliedbits/draft-wendt-stir-certificate-transparency"/>.</t>
    </note>


  </front>

  <middle>


<?line 54?>

<section anchor="introduction"><name>Introduction</name>

<t>Certificate Transparency (CT) aims to mitigate the problem of misissued certificates by providing append-only logs of issued certificates. The logs do not themselves prevent misissuance, but they ensure that interested parties (particularly those named in certificates or certificate chains) can detect such misissuance. This general mechanism that could also be used for transparently logging metadata associations via JWTClaimConstraints defined in <xref target="RFC8226"/> and <xref target="RFC9118"/> or potentially other ways defined in future extensions of this document.</t>

<t><xref target="RFC9162"/> describes the core protocols and mechanisms for use of CT for the purposes of public TLS server certificates associated with a domain name as part of the public domain name system (DNS). This document describes the direct use of the same fundamental protocols and processes of certificate transparency but applies them to Secure Telephone Identity (STI) certificates <xref target="RFC8226"/> and delegate certificates <xref target="RFC9060"/>.</t>

<t>Telephone numbers (TNs) and their management and assignment by telephone service providers and Responsible Organizations (RespOrgs) for toll-free numbers share many similarities to the Domain Name System (DNS) where there is a global uniqueness and established association of telephone numbers to regulatory jurisdictions that manage the globally unique allocation and assignment of telephone numbers under country codes and a set of numeric digits for routing telephone calls and messages over telephone networks. STI Certificates use a TNAuthList extension defined in <xref target="RFC8226"/> to specifically associate either telephone service providers or telephone numbers to the issuance of STI certificates and certificate change that are intended to represent the authorized right to use a telephone number. This trusted association can be establish via mechanisms such as Authority tokens for TNAuthList defined in <xref target="RFC9448"/>. Certificate transparency is generally meant to provide a public representation of the creation of certificates in order for the eco-system of interested parties to provide a publicly verifiable log of certificates created by Certification Authorities to protect against misissuance of certificates that may be misrepresenting information.</t>

<t>There is three primary actors in the certificate transparency framework. There is the STI certification authorities that submit all created certificates to logs, this could be to one or more log services. The log services are network services that implement the protocol operations for submissions of STI certificates and queries. They are hosted by interested parties in the STI ecosystem and can accept certificate log submissions from any other CA participant.  Monitors play the role of monitoring the CT logs to check for potential misissuance.  This role can be played by any STI ecosystem participant that is interested in the trust of the ecosystem.</t>

<t>The details that follow in this document will try to provide a high level overview of the use of Certificate Transparency for STI certificates.  It will provide high level details with assumptions that the details of the use of Merkel Tree and API interfaces largely follow <xref target="RFC9162"/> protocols and only when there is specific details and differences to <xref target="RFC9162"/> will that be defined normatively.</t>

</section>
<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="the-use-of-certificate-transparency-for-sti-certificates"><name>The Use of Certificate Transparency for STI Certificates</name>

<t>Each log contains certificate chains, which can be submitted by anyone. It is expected that STI CAs will contribute all their newly issued certificates to one or more logs; however, it is possible for certificate holders can also directly contribute their own certificate chains, as can interested third parties. In order to avoid logs being rendered useless by the submission of large numbers of spurious certificates, it is required that each chain ends with a trust anchor that is accepted by the log. A log may also limit the length of the chain it is willing to accept; such chains must also end with an acceptable trust anchor. When a chain is accepted by a log, a signed timestamp is returned, which can later be used to provide evidence to STIR verification services (VS), defined in <xref target="RFC8224"/>, that the chain has been submitted. A VS can thus require that all certificates they accept as valid are accompanied by signed timestamps once certificate transparency is well established in the ecosystem to maintain trust.</t>

<t>Those who are concerned about misissuance of provider or TN-based delegate certificates can monitor the logs, asking them regularly for all new entries, and can thus check whether domains for which they are responsible have had certificates issued that they did not expect. What they do with this information, particularly when they find that a misissuance has happened, is beyond the scope of this document. However, broadly speaking, because many existing STI ecosystems have a connection to regulated and industry environments that govern the issuance of STI certificates, they can invoke existing mechanisms for dealing with issues such as misissued certificates, such as working with the CA to get the certificate revoked or with maintainers of trust anchor lists to get the CA removed.</t>

</section>
<section anchor="submitters"><name>Submitters</name>

<t>Submitters submit certificates to logs for public auditing. In order to enable attribution of each logged certificate to its issuer, each submission <bcp14>MUST</bcp14> be accompanied by all additional certificates required to verify the chain up to an accepted trust anchor. The trust anchor (a root or intermediate CA certificate) <bcp14>MAY</bcp14> be omitted from the submission.</t>

<t>If a log accepts a submission, it will return a Signed Certificate Timestamp (SCT) (see Section 4.8 <xref target="RFC9162"/>). The submitter <bcp14>SHOULD</bcp14> validate the returned SCT, as described in Section 8.1 of <xref target="RFC9162"/>, if they understand its format and they intend to use it to construct an STI certificate.</t>

<section anchor="certificates"><name>Certificates</name>

<t>Any entity can submit a certificate (Section 5.1 of <xref target="RFC9162"/>) to a log. Since it is anticipated that STIR verification services could reject certificates that are not logged, it is expected that certificate issuers and subjects will be strongly motivated to submit them.</t>

</section>
</section>
<section anchor="log-format-and-operation"><name>Log Format and Operation</name>

<t>A log is a single, append-only Merkle Tree of submitted certificate entries.  Log procedures <bcp14>MUST</bcp14> follow log format and operation procedures defined in Section 4 of <xref target="RFC9162"/>.</t>

<t>Author note: Do we need a separate IANA registry for Log OIDs specific to STI eco-system?</t>

</section>
<section anchor="log-client-messages"><name>Log Client Messages</name>

<t>Log Client Messages and API <bcp14>MUST</bcp14> follow same protocols, formats and procedures as described in Section 5 of  <xref target="RFC9162"/></t>

<t>Author Note: I don't believe this is any parallel to TLS servers directly participating in CT in the STI world</t>

</section>
<section anchor="sti-certification-authorities"><name>STI Certification Authorities</name>

<t>The Transparency Information X.509v3 extension including rules of inclusion in OCSP responses <bcp14>MUST</bcp14> follow descriptions and procedures defined in Section 7 of <xref target="RFC9162"/>.</t>

</section>
<section anchor="clients"><name>Clients</name>

<t>There are various different functions clients of logs might perform. In this document, the client generally refers to the STI verification service defined in <xref target="RFC8224"/>, or more generally an entity that performs the verification of a PASSporT defined in <xref target="RFC8225"/>. We describe here some typical clients and how they should function.</t>

<section anchor="sti-verification-service"><name>STI Verification Service</name>

<section anchor="receiving-scts-and-inclusion-proofs"><name>Receiving SCTs and Inclusion Proofs</name>

<t>STI Verification Services receive SCTs and inclusion proofs in certificates.</t>

</section>
<section anchor="reconstructing-the-tbscertificate"><name>Reconstructing the TBSCertificate</name>

<t>Validation of an SCT for a certificate (where the type of the TransItem is x509_sct_v2) uses the unmodified TBSCertificate component of the certificate.</t>

</section>
<section anchor="validating-scts"><name>Validating SCTs</name>

<t>In order to make use of a received SCT, the STI Verification Service <bcp14>MUST</bcp14> first validate it as follows:</t>

<t>Compute the signature input by constructing a TransItem of type x509_entry_v2, depending on the SCT's TransItem type. The TimestampedCertificateEntryDataV2 structure is constructed in the following manner:
timestamp is copied from the SCT.
tbs_certificate is the reconstructed TBSCertificate portion of the server certificate, as described in Section 8.1.2 of <xref target="RFC9162"/>.
issuer_key_hash is computed as described in Section 4.7 of <xref target="RFC9162"/>.
sct_extensions is copied from the SCT.
Verify the SCT's signature against the computed signature input using the public key of the corresponding log, which is identified by the log_id. The required signature algorithm is one of the log's parameters.
If the STI Verification Service does not have the corresponding log's parameters, it cannot attempt to validate the SCT. When evaluating compliance (see Section 8.1.6 of <xref target="RFC9162"/>), the STI Verification Service will consider only those SCTs that it was able to validate.</t>

<t>Note that SCT validation is not a substitute for the normal validation of the server certificate and its chain.</t>

</section>
<section anchor="fetching-inclusion-proofs"><name>Fetching Inclusion Proofs</name>

<t>When a STI Verification Service has validated a received SCT but does not yet possess a corresponding inclusion proof, the STI Verification Service <bcp14>MAY</bcp14> request the inclusion proof directly from a log using get-proof-by-hash (Section 5.4 of <xref target="RFC9162"/>) or get-all-by-hash (Section 5.5 of <xref target="RFC9162"/>).</t>

</section>
<section anchor="validating-inclusion-proofs"><name>Validating Inclusion Proofs</name>

<t>When a STI Verification Service has received, or fetched, an inclusion proof (and an STH), it <bcp14>SHOULD</bcp14> proceed to verify the inclusion proof to the provided STH. The STI Verification Service <bcp14>SHOULD</bcp14> also verify consistency between the provided STH and an STH it knows about.</t>

<t>If the STI Verification Service holds an STH that predates the SCT, it <bcp14>MAY</bcp14>, in the process of auditing, request a new STH from the log (Section 5.2 of <xref target="RFC9162"/>) and then verify it by requesting a consistency proof (Section 5.3 of <xref target="RFC9162"/>). Note that if the STI Verification Service uses get-all-by-hash, then it will already have the new STH.</t>

</section>
<section anchor="evaluating-compliance"><name>Evaluating Compliance</name>

<t>It is up to a client's local policy to specify the quantity and form of evidence (SCTs, inclusion proofs, or a combination) needed to achieve compliance and how to handle noncompliance.</t>

</section>
</section>
<section anchor="monitor"><name>Monitor</name>

<t>Monitors watch logs to check for correct behavior, for certificates of interest, or for both. For example, a monitor may be configured to report on all certificates that apply to a specific domain name when fetching new entries for consistency validation.</t>

<t>A monitor <bcp14>MUST</bcp14> at least inspect every new entry in every log it watches, and it <bcp14>MAY</bcp14> also choose to keep copies of entire logs.</t>

</section>
<section anchor="auditing"><name>Auditing</name>

<t>Auditing ensures that the current published state of a log is reachable from previously published states that are known to be good and that the promises made by the log, in the form of SCTs, have been kept. Audits are performed by monitors or STI Verification Services.</t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>TODO Security</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document has no IANA actions, yet.</t>

</section>


  </middle>

  <back>


    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC8224">
  <front>
    <title>Authenticated Identity Management in the Session Initiation Protocol (SIP)</title>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <author fullname="C. Jennings" initials="C." surname="Jennings"/>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <author fullname="C. Wendt" initials="C." surname="Wendt"/>
    <date month="February" year="2018"/>
    <abstract>
      <t>The baseline security mechanisms in the Session Initiation Protocol (SIP) are inadequate for cryptographically assuring the identity of the end users that originate SIP requests, especially in an interdomain context. This document defines a mechanism for securely identifying originators of SIP requests. It does so by defining a SIP header field for conveying a signature used for validating the identity and for conveying a reference to the credentials of the signer.</t>
      <t>This document obsoletes RFC 4474.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8224"/>
  <seriesInfo name="DOI" value="10.17487/RFC8224"/>
</reference>

<reference anchor="RFC8225">
  <front>
    <title>PASSporT: Personal Assertion Token</title>
    <author fullname="C. Wendt" initials="C." surname="Wendt"/>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <date month="February" year="2018"/>
    <abstract>
      <t>This document defines a method for creating and validating a token that cryptographically verifies an originating identity or, more generally, a URI or telephone number representing the originator of personal communications. The Personal Assertion Token, PASSporT, is cryptographically signed to protect the integrity of the identity of the originator and to verify the assertion of the identity information at the destination. The cryptographic signature is defined with the intention that it can confidently verify the originating persona even when the signature is sent to the destination party over an insecure channel. PASSporT is particularly useful for many personal-communications applications over IP networks and other multi-hop interconnection scenarios where the originating and destination parties may not have a direct trusted relationship.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8225"/>
  <seriesInfo name="DOI" value="10.17487/RFC8225"/>
</reference>

<reference anchor="RFC8226">
  <front>
    <title>Secure Telephone Identity Credentials: Certificates</title>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <author fullname="S. Turner" initials="S." surname="Turner"/>
    <date month="February" year="2018"/>
    <abstract>
      <t>In order to prevent the impersonation of telephone numbers on the Internet, some kind of credential system needs to exist that cryptographically asserts authority over telephone numbers. This document describes the use of certificates in establishing authority over telephone numbers, as a component of a broader architecture for managing telephone numbers as identities in protocols like SIP.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8226"/>
  <seriesInfo name="DOI" value="10.17487/RFC8226"/>
</reference>

<reference anchor="RFC9060">
  <front>
    <title>Secure Telephone Identity Revisited (STIR) Certificate Delegation</title>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <date month="September" year="2021"/>
    <abstract>
      <t>The Secure Telephone Identity Revisited (STIR) certificate profile provides a way to attest authority over telephone numbers and related identifiers for the purpose of preventing telephone number spoofing. This specification details how that authority can be delegated from a parent certificate to a subordinate certificate. This supports a number of use cases, including those where service providers grant credentials to enterprises or other customers capable of signing calls with STIR.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9060"/>
  <seriesInfo name="DOI" value="10.17487/RFC9060"/>
</reference>

<reference anchor="RFC9118">
  <front>
    <title>Enhanced JSON Web Token (JWT) Claim Constraints for Secure Telephone Identity Revisited (STIR) Certificates</title>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <date month="August" year="2021"/>
    <abstract>
      <t>RFC 8226 specifies the use of certificates for Secure Telephone Identity Credentials; these certificates are often called "Secure Telephone Identity Revisited (STIR) Certificates". RFC 8226 provides a certificate extension to constrain the JSON Web Token (JWT) claims that can be included in the Personal Assertion Token (PASSporT), as defined in RFC 8225. If the PASSporT signer includes a JWT claim outside the constraint boundaries, then the PASSporT recipient will reject the entire PASSporT. This document updates RFC 8226; it provides all of the capabilities available in the original certificate extension as well as an additional way to constrain the allowable JWT claims. The enhanced extension can also provide a list of claims that are not allowed to be included in the PASSporT.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9118"/>
  <seriesInfo name="DOI" value="10.17487/RFC9118"/>
</reference>

<reference anchor="RFC9162">
  <front>
    <title>Certificate Transparency Version 2.0</title>
    <author fullname="B. Laurie" initials="B." surname="Laurie"/>
    <author fullname="E. Messeri" initials="E." surname="Messeri"/>
    <author fullname="R. Stradling" initials="R." surname="Stradling"/>
    <date month="December" year="2021"/>
    <abstract>
      <t>This document describes version 2.0 of the Certificate Transparency (CT) protocol for publicly logging the existence of Transport Layer Security (TLS) server certificates as they are issued or observed, in a manner that allows anyone to audit certification authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
      <t>This document obsoletes RFC 6962. It also specifies a new TLS extension that is used to send various CT log artifacts.</t>
      <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9162"/>
  <seriesInfo name="DOI" value="10.17487/RFC9162"/>
</reference>

<reference anchor="RFC9448">
  <front>
    <title>TNAuthList Profile of Automated Certificate Management Environment (ACME) Authority Token</title>
    <author fullname="C. Wendt" initials="C." surname="Wendt"/>
    <author fullname="D. Hancock" initials="D." surname="Hancock"/>
    <author fullname="M. Barnes" initials="M." surname="Barnes"/>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <date month="September" year="2023"/>
    <abstract>
      <t>This document defines a profile of the Automated Certificate Management Environment (ACME) Authority Token for the automated and authorized creation of certificates for Voice over IP (VoIP) telephone providers to support Secure Telephone Identity (STI) using the TNAuthList defined by STI certificates.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9448"/>
  <seriesInfo name="DOI" value="10.17487/RFC9448"/>
</reference>

<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>




    </references>



<?line 185?>

<section numbered="false" anchor="acknowledgments"><name>Acknowledgments</name>

<t>The authors would like to thank the authors and contributors to the protocols and ideas around Certificate Transparency <xref target="RFC9162"/> which sets the basis for the STI eco-system to adopt in a very straight forward way, providing trust and transparency in the telephone number world.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

