<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.15 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-wendt-stir-identity-header-errors-handling-03" category="std">

  <front>
    <title abbrev="Identity Errors">Identity Header Error Handling</title>

    <author initials="C." surname="Wendt" fullname="Chris Wendt">
      <organization>Comcast</organization>
      <address>
        <postal>
          <street>Comcast Technology Center</street>
          <city>Philadelphia, PA  19103</city>
          <country>USA</country>
        </postal>
        <email>chris-ietf@chriswendt.net</email>
      </address>
    </author>

    <date year="2021" month="October" day="23"/>

    <area>art</area>
    
    <keyword>Identity</keyword>

    <abstract>


<t>This document extends STIR and the Authenticated Identity Management in the Session Initiation Protocol (SIP) error handling procedures to include the mapping of verification failure reasons to STIR defined 4xx codes so the failure reason of an Identity header field can be conveyed to the upstream authentication service when local policy dictates that the call should continue in the presence of a verification failure. This document also defines procedures that enable enable a failure reason to be mapped to a specific Identity header for scenarios that use multiple Identity header fields where some may have errors and others may not and the handling of those situations is defined.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t><xref target="RFC8224"/> in Section 6.2.2 discusses future specifications for enhancement of how errors are communicated and the handling of multiple Identity header fields. This specification provides some additional mechanisms for solutions to address these problems.</t>

<t>In some deployments of STIR and specifically using SIP <xref target="RFC3261"/> as defined by <xref target="RFC8224"/>, one issue with the current error handling, specifically with the use of the defined 4xx error responses, is that when an error occurs with the verification of the Identity header field or the PASSporT contained in the Identity header field and a 4xx response is returned, the call is then terminated. It may be the case that the policy for handling errors dictates that calls should continue even if there is a verification error, in the case of, for example inadvertent errors, however the authentication service should still be notified of the error so that corrective action can be taken. This specification will discuss the use of the Reason header field in subsequent provisional (1xx) responses in order to accomplish this.</t>

<t>For the handling of multiple Identity header fields and the potential situation that some of the Identity header fields in a call may pass verification but others may have errors, this document provides a mechanism to add an identifier so that the authentication service can identify which Identity header field is being referred to in the case of an error.</t>

</section>
<section anchor="terminology" title="Terminology">

<t>The keywords “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”, “MAY”, and “OPTIONAL” in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>

</section>
<section anchor="reason-header-field-protocol-stir" title="Reason header field protocol “STIR”">

<t>This specification defines a new Reason header field <xref target="RFC3326"/> protocol “STIR” for STIR applications using SIP as defined in <xref target="RFC8224"/>. This will differentiate current protocols, specifically “SIP” which is currently in wide industry usage, from the <xref target="RFC8224"/> defined error cause codes and the potential use of multiple Reason header fields defined in <xref target="RFC3326"/> and updated in [upcoming document TBD] allowing multiple Reason header fields with the same “STIR” protocol string. The use of multiple Reason header field is discussed in more detail later in the document.</t>

</section>
<section anchor="use-of-provisional-error-responses-to-signal-errors-without-terminating-the-call" title="Use of provisional error responses to signal errors without terminating the call">

<t>In cases where local policy dictates that a call should continue regardless of any verification errors that may have occured, including 4XX errors described in <xref target="RFC8224"/> Section 6.2.2, then the verification service SHOULD NOT send the 4XX as a response, but rather include the error response code and reason phrase in a Reason header field, defined in <xref target="RFC3326"/>, in the next provisional or final responses sent to the authentication service.</t>

<t>Example Reason header field:</t>

<figure><artwork><![CDATA[
Reason: STIR ;cause=436 ;text="Bad Identity Info"
]]></artwork></figure>

</section>
<section anchor="handling-of-a-verification-error-when-there-are-multiple-identity-header-fields" title="Handling of a verification error when there are multiple Identity header fields">

<t>In cases where a SIP message includes multiple Identity header fields and one of those Identity header fields has an error, the verification service SHOULD include the error response code and reason phrase associated with the error in a Reason header field, defined in <xref target="RFC3326"/>, in the next provisional or final responses sent to the authentication service. The reason cause in the Reason header field SHOULD represent the error that occurred when verifying the contents of the Identity header field.  The association of a Reason header field and error to a specific Identity header field is accomplished by adding a “ppt” parameter containing the PASSporT that generated the error to the Reason header field. The “ppt” parameter for the Reason header field is optional, but RECOMMENDED, in particular for cases that a SIP INVITE contains multiple Identity header fields. The PASSporT can be included in full form, or optionally in compact form, where only the signature of the PASSporT is used to identify the reported Identity header field with an error.</t>

<t>Example Reason header field with full form PASSporT:</t>

<figure><artwork><![CDATA[
Reason: STIR ;cause=436 ;text="Bad Identity Info" ;ppt= \
"eyJhbGciOiJFUzI1NiIsInR5cCI6InBhc3Nwb3J0IiwieDV1I \
joiaHR0cHM6Ly9jZXJ0LmV4YW1wbGUub3JnL3Bhc3Nwb3J0LmNlciJ9.eyJ \
kZXN0Ijp7InVyaSI6WyJzaXA6YWxpY2VAZXhhbXBsZS5jb20iXX0sImlhdC \
I6IjE0NDMyMDgzNDUiLCJvcmlnIjp7InRuIjoiMTIxNTU1NTEyMTIifX0.r \
q3pjT1hoRwakEGjHCnWSwUnshd0-zJ6F1VOgFWSjHBr8Qjpjlk-cpFYpFYs \
ojNCpTzO3QfPOlckGaS6hEck7w"
]]></artwork></figure>

<t>Example Reason header field with compact form PASSporT:
~~~~~~~~~~~
Reason: STIR ;cause=436 ;text=”Bad Identity Info” ;ppt= \
“..rq3pjT1akEGjHCnWSwUnshd0-zJ6F1VOgFWSjHBr8Qjpjlk-cpFYpFYs \
ojNCpTzO3QfPOlckGaS6hEck7w”
~~~~~~~~~~~</t>

</section>
<section anchor="handling-multiple-verification-errors" title="Handling multiple verification errors">

<t>If there are multiple Identity header field verification errors being reported the verification service SHOULD include corresponding Reason header fields with “ppt” parameters including full or compact form of the PASSporT with cause and text parameters identifying each error. As mentioned previously, the potential use of multiple Reason header fields defined in <xref target="RFC3326"/> is updated in [upcoming document TBD] allowing multiple Reason header fields with the same protocol value, for this specification being “STIR”.</t>

<t>Example Reason header fields for two identity info errors:</t>

<figure><artwork><![CDATA[
Reason: STIR ;cause=436 ;text="Bad Identity Info" ;ppt= \
"eyJhbGciOiJFUzI1NiIsInR5cCI6InBhc3Nwb3J0IiwieDV1I \
joiaHR0cHM6Ly9jZXJ0LmV4YW1wbGUub3JnL3Bhc3Nwb3J0LmNlciJ9.eyJ \
kZXN0Ijp7InVyaSI6WyJzaXA6YWxpY2VAZXhhbXBsZS5jb20iXX0sImlhdC \
I6IjE0NDMyMDgzNDUiLCJvcmlnIjp7InRuIjoiMTIxNTU1NTEyMTIifX0.r \
q3pjT1hoRwakEGjHCnWSwUnshd0-zJ6F1VOgFWSjHBr8Qjpjlk-cpFYpFYs \
ojNCpTzO3QfPOlckGaS6hEck7w"

Reason: STIR ;cause=436 ; text="Bad Identity Info" ;ppt= \
"eyJhbGciOiJFUzI1NiIsInR5cCI6InBhc3Nwb3J0IiwieDV1I \
joiaHR0cHM6Ly9jZXJ0LmV4YW1wbGUub3JnL3Bhc3Nwb3J0LmNlciJ9.eyJ \
xpY2VAZXhhbXBsZS5jb20iXX0sImlhdCkZXN0Ijp7InVyaSI6WyJzaXA6YW \
p7InRuIjoiMTIxNTU1NTEyMTIifX0I6IjE0NDMyMDgzNDUiLCJvcmlnIj.r \
J6F1VOgFWSjHBr8Qjpjlk-cpFYpFYsq3pjT1hoRwakEGjHCnWSwUnshd0-z \
ckGaS6hEck7wojNCpTzO3QfPOl"

]]></artwork></figure>

</section>
<section anchor="removal-of-the-reason-header-field-by-authentication-service" title="Removal of the Reason header field by Authentication Service">

<t>When an Authentication Service <xref target="RFC8224"/> receives the Reason header field with a PASSporT it generated as part of an Identity header field and the authentication of a call, it should first follow local policy to recognize and acknowledge the error (e.g. perform operational actions like logging or alarming), but then MUST remove the identified Reason header field to avoid the PASSporT information from going upstream to a UAC or UAS that may not be authorized to see claim information contained in the PASSporT for privacy or other reasons.</t>

</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>This document requests the definition of a new protocol value (and associated protocol cause) to be registered by the IANA into the “Reason Protocols” sub-registry under http://www.iana.org/assignments/sip-parameter as follows:</t>

<figure><artwork><![CDATA[
Protocol Value   Protocol Cause            Reference
--------------   ---------------           -----------
STIR              Status code               RFC 8224

]]></artwork></figure>

</section>
<section anchor="acknowledgements" title="Acknowledgements">

<t>Would like to thank David Hancock for help to identify these error scenarios and Jon Peterson, Roman Shpount, and STIR working group for helpful feedback and discussion.</t>

</section>
<section anchor="Security" title="Security Considerations">

<t>TBD</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference  anchor="RFC3261" target='https://www.rfc-editor.org/info/rfc3261'>
<front>
<title>SIP: Session Initiation Protocol</title>
<author initials='J.' surname='Rosenberg' fullname='J. Rosenberg'><organization /></author>
<author initials='H.' surname='Schulzrinne' fullname='H. Schulzrinne'><organization /></author>
<author initials='G.' surname='Camarillo' fullname='G. Camarillo'><organization /></author>
<author initials='A.' surname='Johnston' fullname='A. Johnston'><organization /></author>
<author initials='J.' surname='Peterson' fullname='J. Peterson'><organization /></author>
<author initials='R.' surname='Sparks' fullname='R. Sparks'><organization /></author>
<author initials='M.' surname='Handley' fullname='M. Handley'><organization /></author>
<author initials='E.' surname='Schooler' fullname='E. Schooler'><organization /></author>
<date year='2002' month='June' />
<abstract><t>This document describes Session Initiation Protocol (SIP), an application-layer control (signaling) protocol for creating, modifying, and terminating sessions with one or more participants.  These sessions include Internet telephone calls, multimedia distribution, and multimedia conferences.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3261'/>
<seriesInfo name='DOI' value='10.17487/RFC3261'/>
</reference>



<reference  anchor="RFC3326" target='https://www.rfc-editor.org/info/rfc3326'>
<front>
<title>The Reason Header Field for the Session Initiation Protocol (SIP)</title>
<author initials='H.' surname='Schulzrinne' fullname='H. Schulzrinne'><organization /></author>
<author initials='D.' surname='Oran' fullname='D. Oran'><organization /></author>
<author initials='G.' surname='Camarillo' fullname='G. Camarillo'><organization /></author>
<date year='2002' month='December' />
<abstract><t>The REGISTER function is used in a Session Initiation Protocol (SIP) system primarily to associate a temporary contact address with an address-of-record.  This contact is generally in the form of a Uniform Resource Identifier (URI), such as Contact: &lt;sip:alice@pc33.atlanta.com&gt; and is generally dynamic and associated with the IP address or hostname of the SIP User Agent (UA).  The problem is that network topology may have one or more SIP proxies between the UA and the registrar, such that any request traveling from the user's home network to the registered UA must traverse these proxies.  The REGISTER method does not give us a mechanism to discover and record this sequence of proxies in the registrar for future use.  This document defines an extension header field, &quot;Path&quot; which provides such a mechanism.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3326'/>
<seriesInfo name='DOI' value='10.17487/RFC3326'/>
</reference>



<reference  anchor="RFC8224" target='https://www.rfc-editor.org/info/rfc8224'>
<front>
<title>Authenticated Identity Management in the Session Initiation Protocol (SIP)</title>
<author initials='J.' surname='Peterson' fullname='J. Peterson'><organization /></author>
<author initials='C.' surname='Jennings' fullname='C. Jennings'><organization /></author>
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /></author>
<author initials='C.' surname='Wendt' fullname='C. Wendt'><organization /></author>
<date year='2018' month='February' />
<abstract><t>The baseline security mechanisms in the Session Initiation Protocol (SIP) are inadequate for cryptographically assuring the identity of the end users that originate SIP requests, especially in an interdomain context.  This document defines a mechanism for securely identifying originators of SIP requests.  It does so by defining a SIP header field for conveying a signature used for validating the identity and for conveying a reference to the credentials of the signer.</t><t>This document obsoletes RFC 4474.</t></abstract>
</front>
<seriesInfo name='RFC' value='8224'/>
<seriesInfo name='DOI' value='10.17487/RFC8224'/>
</reference>



<reference  anchor="RFC2119" target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference  anchor="RFC8174" target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author initials='B.' surname='Leiba' fullname='B. Leiba'><organization /></author>
<date year='2017' month='May' />
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>




    </references>




  </back>

<!-- ##markdown-source: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-->

</rfc>

