<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-wendt-stir-vesper-05" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="VESPER">VESPER - Framework for VErifiable STI Personas</title>

    <author fullname="Chris Wendt">
      <organization>Somos, Inc.</organization>
      <address>
        <postal>
          <country>US</country>
        </postal>
        <email>chris@appliedbits.com</email>
      </address>
    </author>
    <author fullname="Rob Sliwa">
      <organization>Somos, Inc.</organization>
      <address>
        <postal>
          <country>US</country>
        </postal>
        <email>robjsliwa@gmail.com</email>
      </address>
    </author>

    <date year="2025" month="September" day="05"/>

    <area>Applications and Real-Time</area>
    <workgroup>Secure Telephone Identity Revisited</workgroup>
    <keyword>telephone number</keyword> <keyword>vetting</keyword> <keyword>KYC</keyword>

    <abstract>


<?line 46?>

<t>This document formalizes a profile and a framework for the use of delegate certificates and authority tokens to strengthen the association between telephone number assignments and the entities that have the authoritative right to use them. It defines a model in which the TNAuthList Authority Token serves as a trusted representation of telephone number assignment and right-to-use (RTU), anchored by a Notary Agent that logs these associations through verifiable transparency mechanisms. The framework also extends the use of authority tokens to support other PASSporT claims like Rich Call Data (RCD) by defining a role for JWTClaimConstraints Authority Tokens. These tokens are issued by authoritative or recognized and vetted claim agents within the ecosystem to assert information associated with the entity assigned a telephone number. The Notary Agent plays a critical role in recording these claims and their provenance, enhancing transparency and accountability.
Delegate certificates encapsulate and incorporate both the telephone number and associated information validated via authority tokens to the certification authority issuing them, binding them to the authenticated telephone number of the calling party. These certificates are published to a certificate transparency log, enabling relying parties to independently verify the integrity and legitimacy of number use and related claims. The VESPER (Verifiable STI PERsona) approach utilizes STIR protocols and the ACME authority token to formalizing a verifiable, auditable, and privacy-conscious foundation for associating telephone numbers with vetted entities and validated assertion of associated metadata.</t>



    </abstract>



  </front>

  <middle>


<?line 51?>

<section anchor="introduction"><name>Introduction</name>

<t>The Secure Telephone Identity (STI) architecture, based on STI certificates <xref target="RFC8226"/>, PASSporTs <xref target="RFC8225"/>, and the SIP Identity header field <xref target="RFC8224"/>, define the foundational use of digital signatures and tokens to protect the integrity of calling information, particularly the telephone number, during a communications session. While these mechanisms help validate call signaling, they do not directly establish who is authorized to use a given telephone number. This document provides a profile of the STI architecture by formalizing the use of delegate certificates and authority tokens to more clearly and verifiably associate a telephone number with the entity-person or business-responsible for its use. This stronger linkage is especially important as misuse of telephone numbers by unauthorized parties continues to undermine trust in communications networks.</t>

<t>To address this, the VESPER framework introduces roles and interactions that mirror proven practices from other trust-based industries, such as Know Your Customer (KYC) and Know Your Business (KYB) procedures in finance. Through a defined process and as an adjunct to the telephone number assignment process involving Responsible Providers or Organizations and the Notary Agent, an Entity is issued a TNAuthList Authority Token defined in <xref target="RFC9448"/>, establishing their right to use a telephone number. Additional information an entity would like to assert to a called party, such as Rich Call Data (RCD) <xref target="RFC9795"/>, can be asserted and authorized using JWTClaimConstraints Authority Tokens <xref target="I-D.wendt-acme-authority-token-jwtclaimcon"/>. JWTClaimContraints have the interesting property that they can be used to assert either direct values or the integrity hashes of values (e.g., using "rcdi" claims defined in <xref target="RFC9795"/>) to enhance the ability to protect the privacy of information when desired or required. These tokens are used in challenges toward the issuance of delegate certificates which can be transparently recorded by a Notary Agent ecosystem role, which acts as a neutral registrar of these claims associated with telephone numbers without exposing underlying private data unless explicitly authorized or desired. Transparent declarations of claim assertions have the potential beneficial property of enhancing the trust of the asserted claims based on monitoring of these claims to avoid fraudulent impersonation that the STI framework is intended to solve.</t>

<t>In addition to supporting call authentication of the originating party, the VESPER framework can also extend to the validation of the called party through the use of connected identity as defined in <xref target="I-D.ietf-stir-rfc4916-update"/>. In this model, the same authority token and delegate certificate mechanisms that bind an originating telephone number to a vetted entity can be applied in the reverse direction, enabling a called party to assert its validated identity via signed PASSporTs included in SIP responses. This optional capability broadens the scope of accountability and transparency to both ends of the communication session while maintaining the privacy-conscious design principles of VESPER.</t>

<t>This VESPER trust model and profile is enhanced using eco-system wide accountability. Transparency logs formalize the issuance of certificates and the relationship between telephone numbers, associated claims and their rightful users, helping detect and prevent fraudulent or conflicting claims by interested parties and auditing mechanisms. By shifting from implicit trust in digital signatures alone to an explicit framework of vetted identities and transparent claims, this approach builds a foundation for enhanced verifiable communications. It enables the responsible use of telephone numbers, discourages impersonation, and strengthens enforcement against abuse, ultimately fostering greater confidence in telephone number-based communications.</t>

</section>
<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="overview"><name>Overview</name>

<t>This document defines a framework for the authoritative association of telephone numbers to the entities responsible for their use, using delegate certificates and authority tokens. Within this framework, referred to as VESPER (VErifiable STI PERsonas), entities are represented through verifiable claims that establish their right to use a telephone number and, optionally, their asserted claim attributes such as Rich Call Data (RCD) or other claims defined via PASSporT type specifications. These claims are issued by trusted responsible parties and are anchored through transparency mechanisms to support trust, auditability, and privacy as appropriate.</t>

<t>The core premise is that a telephone number, when used as a communications identifier, must be explicitly bound to the real-world party authorized to use it. While telephone numbers have long served as identifiers in global communications, the absence of a strong binding between a number and a responsible party has allowed for abuse-most notably through number spoofing and impersonation fraud. In many cases, bad actors exploit the lack of accountability to mislead call recipients, avoid traceability, or impersonate legitimate businesses and individuals. To address this, the VESPER framework introduces a standardized method for expressing and publishing the right-to-use (RTU) of a telephone number through the issuance of a TNAuthList Authority Token. This token is issued following the assignment or delegation of a number and is registered via a Notary Agent, which records the issuance event in a transparency log. This notarization provides independent verification of the association between a number and its rightful user, without requiring public disclosure of sensitive identity data.</t>

<t>JWTClaimConstraints <xref target="RFC8226"/> and EnhancedJWTClaimConstraints <xref target="RFC9118"/> play a critical role in delegate certificates issued under the VESPER framework. They provide a standardized mechanism for Certification Authorities to explicitly constrain the claims that a delegate certificate holder is permitted to assert in communications. This constraint mechanism ensures that even if a certificate is misused or presented outside its intended scope, the relying party can verify whether the claims presented are authorized. Certification Authorities derive these constraints from Authority Tokens issued by vetted Claim Agents, which serve as cryptographic proof of the claim validations. By limiting the scope of claims to those proven and approved during the certificate issuance process, using Authority Tokens provided by trusted Claim Agents, VESPER mitigates impersonation risks and preserves the integrity of the call authentication ecosystem.</t>

<t>Unlike prior models that rely on implicit trust in the caller or the STI signer, this approach provides an explicit, auditable, and standards-based path to associate communications with a known and authorized party. The VESPER framework does not define how vetting (e.g., KYC/KYB) is performed, nor does it prescribe specific policy requirements. Instead, it focuses on standardizing how vetted results and right-to-use associations are asserted, recorded, and presented within the STIR ecosystem.</t>

<t>By reinforcing the accountability of number usage and enabling the trusted presentation of related identity claims, this architecture enhances integrity, supports privacy, and enables enforcement mechanisms to deter misuse-ultimately restoring trust in telephone-based communications.</t>

<t>VESPER implementations <bcp14>MUST</bcp14> support short-lived certificates and <bcp14>SHOULD</bcp14> use "x5c" to convey certificates inline. Transparency logging remains required.</t>

</section>
<section anchor="vesper-architectural-overview"><name>Vesper Architectural Overview</name>

<section anchor="the-vesper-trust-framework-architecture"><name>The VESPER Trust Framework Architecture</name>

<t>The VESPER Trust Model establishes a structured framework for asserting and verifying the association between a telephone number and the entity authorized to use it. This model supports a broad range of communications use cases, from fully attributed business communications with rich identity information to privacy-conscious scenarios that require only verification that the number is in legitimate use by a real validated entity.</t>

<t>At its core, the model is built on a trust structure with the following key roles:</t>

<t><list style="numbers" type="1">
  <t>Entities (e.g., individuals or organizations) seeking to assert their right to use a telephone number and assert claims about themselves or a set of communications,</t>
  <t>Responsible providers and organizations that are authorized to allocate and assign numbers within a jurisdictional numbering plan,</t>
  <t>Claim Agents that are authorized and recognized for validating and issuing claims about those entities, and</t>
  <t>A Notary Agent that records claim issuance events and ensures transparency and traceability within the ecosystem.</t>
</list></t>

<t>Participation in this trust model requires a shared set of policies and standards governing how entities are vetted and how claims are created and validated. These policies define the requirements for asserting an entity's identity, the right to use a telephone number, and, where applicable, additional claims and associated attributes (i.e. PASSporT type defined claims, like Rich Call Data). Claims are structured representations of verified information, issued by Claim Agents. Each claim type is standardized via PASSporT type specifications in the STIR working group, with clearly defined required and optional key-value pairs, ensuring interoperability and consistency across the ecosystem.
Through this model, VESPER provides a scalable and transparent foundation for building trust in telephone-based communications, with the flexibility to support both fully attributed and privacy-respecting use cases.</t>

</section>
<section anchor="roles-and-responsibilities-in-the-vesper-framework"><name>Roles and Responsibilities in the VESPER Framework</name>

<t>The VESPER trust framework defines a set of roles that work together to assert and validate claims about telephone numbers and the entities authorized to use them. At the core of this ecosystem are two primary roles: Entities and Claim Agents. Entities are individuals or organizations that wish to establish their authority to use a telephone number and, optionally, present additional vetted identity attributes. Claim Agents are responsible for validating this information and issuing standardized, structured claims.</t>

<section anchor="entity"><name>Entity</name>

<t>An Entity is the individual or organization seeking to assert its authority to use a specific telephone number and, optionally, to present additional vetted claims such as business name or purpose. The Entity is the central actor around which the claims and trust relationships are formed.</t>

</section>
<section anchor="responsible-provider-or-responsible-organization"><name>Responsible Provider or Responsible Organization</name>

<t>A Responsible Provider, sometimes called a Telephone Number Service Provider (TNSP), or Responsible Organization (RespOrg) plays both their traditional well-defined role in the allocation and assignment of telephone numbers in accordance with national or international numbering plans generally followed internationally via e.164 and e.164.1 but also a foundational role in the VESPER ecosystem by validation of the association of telephone number assignments to Entities. These entities operate under regulatory authority and are responsible for administering number resources associated with a specific country code or region.</t>

<t>Their responsibilities include:</t>

<t><list style="symbols">
  <t>Number Assignment: Allocating telephone numbers to Entities under the rules of an authorized numbering plan.</t>
  <t>Entity Association: Establishing and maintaining a record that links each assigned telephone number to a specific, uniquely identified entity. This includes assigning a persistent identifier or account reference to the Entity to which a number is assigned providing an opaque identifier. This identifier can be used by the Entity to reference themselves in an opaque way for accessing assignment relevant information including TNAuthList Authority Tokens or also referenced during any disputes or disclosures when necessary.</t>
</list></t>

<t>The Responsible Provider or RespOrg coordinates with the Notary Agent to issue proof of assignment or participate in the claim transparency process, their role, even as it currently exists, is essential in grounding the trust framework in authoritative number assignment data. Other ecosystem participants, such as Claim Agents and Notary Agents, can and should reference assignment records governing the Right to Use (RTU) maintained by Responsible Providers or RespOrgs to validate issuance of delegate certificates to the valid Entities.</t>

</section>
<section anchor="claim-agent-responsibilities"><name>Claim Agent Responsibilities</name>

<t>Claim Agents are trusted parties in the ecosystem responsible for validating information about Entities and issuing authoritative or verified claims. These claims cover claims associated with PASSporT defined claims including identity details or Rich Call Data (RCD).</t>

<t>Each Claim Agent is uniquely identified within the VESPER ecosystem and should be registered with a Notary Agent (NA). Once a Claim Agent performs its vetting process, it issues signed JWTClaimConstraints Authority Tokens containing the validated claim information or integrity hashes for those claims for the Entity depending on privacy preferences.</t>

</section>
<section anchor="notary-agent-responsibilities"><name>Notary Agent Responsibilities</name>

<t>The Notary Agent (NA) serves as the ecosystem's registrar and transparency authority. It performs three critical functions:</t>

<t><list style="numbers" type="1">
  <t>Registration of Responsible Providers and Responsible Organizations that correspond to the traditional roles in accordance with a national or international numbering plans.</t>
  <t>Registration of Claim Agents, ensuring each is uniquely identifiable and authorized to issue specific types of claims.</t>
  <t>Operation of a Transparency Log, which issues cryptographic receipts to confirm and timestamp the existence of each claim.</t>
</list></t>

<t>Notarization can be privacy-preserving, where only cryptographic hashes of claims are logged, or fully transparent, allowing public visibility of claim contents to detect conflicts or impersonation attempts. This optional public disclosure enables monitoring of duplicate or unauthorized claims across the ecosystem.</t>

<t>While this document does not define the dispute resolution process, any conflicts or misclaims discovered through transparency can be escalated through ecosystem-specific mechanisms, likely coordinated by the Notary Agent in communication with relevant Claim Agents.</t>

</section>
</section>
<section anchor="claim-agents-and-claim-information-privacy"><name>Claim Agents and Claim Information Privacy</name>

<t>Privacy is a foundational principle of the VESPER trust model. Claim Agents are not required to expose or publish sensitive data about Subject Entities when recording claims. Instead, claims can be privacy-protected by logging only the cryptographic hashes of the claim content in the transparency log, preserving proof without revealing the underlying details.</t>

<section anchor="public-vs-private-disclosure"><name>Public vs. Private Disclosure</name>

<t>For claim information that is public by nature-such as business names, logos, or other branding elements-Claim Agents may choose to log the data in full within certificates for public visibility. This public transparency helps the ecosystem identify conflicting or fraudulent claims and reinforces trust through open scrutiny.</t>

<t>Conversely, for private or sensitive claims (e.g., internal identifiers or personally identifiable information), Claim Agents may choose to log only a hash of the data. This approach ensures that the claim's authenticity can still be verified without compromising the Entity's privacy. Disclosure of such claims remains at the discretion of the Entity or may occur in limited cases where legal or regulatory obligations apply.</t>

</section>
</section>
<section anchor="delegate-certificate-issuance-process"><name>Delegate Certificate Issuance Process</name>

<t>In the VESPER trust framework, the issuance of a delegate certificate to an Entity involves the multiple roles defined and referenced in this document, including the Responsible Provider or Responsible Organization, Claim Agents, the Notary Agent, and a trusted Certification Authority (CA) operating under the STIR eco-system certificate policy governing STIR certificates defined in <xref target="RFC8226"/>.</t>

<t>The process begins when a Responsible Provider or Responsible Organization assigns a telephone number to an Entity. As part of that assignment, the Entity is formally associated with the number in the Notary Agent's system via an opaque and unique identifier, establishing an auditable relationship between the number and the right-to-use holder. The opaque unique identifier helps to uphold the privacy of the eco-system as part of normal telephone number allocation and assignment has traditionally followed. When potential policy violations occur the Notary Agent systems using the Entity identifier provides an indisputable path to the corresponding Responsible Providers and Organizations and then to the Entities assigned the telephone number and delegated a certificate in question that can respond to policy and legal requests as part of their responsibilities to the STIR eco-system should govern.</t>

<t>Additionally, following this association, a TNAuthList Authority Token can be issued to the Entity. This token authoritatively represents the Entity's Right-To-Use the telephone number and can serve as cryptographic proof of assignment.</t>

<t>In parallel, a Claim Agent may be used to validate additional attributes that the Entity wishes to assert when originating calls, such as Rich Call Data (RCD). These validated attributes are encoded in a JWTClaimConstraints Authority Token, which governs what claims the Entity is authorized to present in communications. The Claim Agent may also use the TNAuthList Authority Token as proof of assignment and the Right-to-Use the telephone numbers being asserted by the Entity. This should also be utilized to govern the constraint of the "orig" claim to only the valid associated numbers to the Entity.</t>

<t>Once both tokens have been obtained, the Entity initiates a Certificate Signing Request (CSR) to a CA authorized to issue certificates within the STIR ecosystem. As per the mechanisms outlined in <xref target="RFC9447"/>, <xref target="RFC9448"/>, and <xref target="I-D.wendt-acme-authority-token-jwtclaimcon"/>, the TNAuthList and JWTClaimConstraints tokens are presented as ACME challenge responses to prove the Entity's authority over the number and its validated claims.</t>

<t>Upon successful validation, the CA issues a delegate certificate to the Entity.</t>

<t>CAs <bcp14>SHOULD</bcp14> issue short-lived certificates with brief validity intervals. Entities <bcp14>SHOULD</bcp14> automate renewal to avoid service interruptions.</t>

<t>This certificate includes:</t>

<t><list style="symbols">
  <t>A TNAuthList extension <xref target="RFC8226"/>, representing the telephone number(s) the certificate holder is authorized to use.</t>
  <t>A JWTClaimConstraints extension <xref target="RFC8226"/> and/or EnhancedJWTClaimConstraints extension <xref target="RFC9118"/>, representing the constraints on claims the certificate holder is permitted to assert.</t>
</list></t>

<t>The issued certificate is then submitted to a certificate transparency log. A corresponding transparency receipt is returned to the Entity and/or CA to provide verifiable proof of publication. This transparency mechanism enables ecosystem-wide monitoring and validation of certificate issuance and claim legitimacy.</t>

</section>
<section anchor="vesper-certificate-profile-short-lived-inline-conveyance"><name>VESPER Certificate Profile (Short-Lived &amp; Inline Conveyance)</name>

<t>VESPER delegate certificates <bcp14>MUST</bcp14> support the short-lived certificate profile in <xref target="I-D.ietf-stir-certificates-shortlived"/>. PASSporTs <bcp14>SHOULD</bcp14> include the certificate chain using the "x5c" header. Verification Services <bcp14>SHOULD</bcp14> prefer "x5c" over "x5u", and <bcp14>MUST NOT</bcp14> dereference "x5u" if "x5c" is present and valid.  Short-lived certificates reduce the need for revocation infrastructure and eliminate external certificate fetches.</t>

</section>
<section anchor="use-of-vesper-delegate-certificates-for-signing-communications"><name>Use of VESPER Delegate Certificates for Signing Communications</name>

<t>Once an Entity has received a delegate certificate containing validated right-to-use and claim constraints, it can use this certificate to sign communications associated with the authorized telephone number.</t>

<t>For example, when the Entity initiates a SIP call, it generates a PASSporT object containing session-specific details such as "orig", "dest", and "iat". The Entity then signs the PASSporT using its delegate certificate, which binds both the telephone number and any authorized claims (e.g., RCD elements) to the communication.</t>

<t>Critically, the JWTClaimConstraints extension in the certificate enforces the set of claims the Entity is permitted to assert, ensuring that claims cannot exceed those vetted and authorized by the corresponding Claim Agent.</t>

<t>The signed PASSporT is then attached to the SIP Identity header and transmitted with the call. The Verification Service (VS) on the receiving side performs STIR verification, checking:</t>

<t><list style="symbols">
  <t>That the PASSporT signature is valid.</t>
  <t>That the delegate certificate is trusted, unexpired, and issued by a recognized CA.</t>
  <t>If the PASSporT includes an "x5c" header, the certificate chain must be validated from the inline header; "x5u" must not be dereferenced.</t>
  <t>If "x5c" is absent, "x5u" <bcp14>MAY</bcp14> be used to retrieve the certificate chain.</t>
  <t>That the certificate includes a valid TNAuthList extension for the telephone number in use in the "orig" claim.</t>
  <t>That any asserted claims conform to the JWTClaimConstraints and/or EnhancedJWTClaimConstraints in the certificate.</t>
  <t>That a corresponding transparency receipt exists, proving the certificate was publicly recorded.</t>
</list></t>

<t>Senders <bcp14>SHOULD</bcp14> include "x5c"; relying parties <bcp14>SHOULD</bcp14> prefer "x5c" when both are available.</t>

<t>If all verifications succeed, the relying party can trust that the call is both authorized and attributable, and that all claims have been validated by responsible participants in the ecosystem.</t>

</section>
<section anchor="vesper-authentication-and-verification-procedures"><name>VESPER Authentication and Verification Procedures</name>

<t>This section outlines the expected behavior of Authentication Services (AS) and Verification Services (VS) in deployments utilizing VESPER delegate certificates. These procedures extend the baseline STIR authentication and verification models defined in <xref target="RFC8224"/>, <xref target="RFC8225"/>, and <xref target="RFC8226"/> by incorporating validation of transparency-backed delegate certificates and associated claims.</t>

<section anchor="authentication-service-behavior"><name>Authentication Service Behavior</name>

<t>When originating a call, the Authentication Service performs the following steps:</t>

<t><list style="symbols">
  <t>Constructs a PASSporT for the session containing the required claims (e.g., <spanx style="verb">orig</spanx>, <spanx style="verb">dest</spanx>, <spanx style="verb">iat</spanx>), as well as any optional authorized claims (e.g., Rich Call Data).</t>
  <t>Signs the PASSporT using a VESPER delegate certificate that:
  <list style="symbols">
      <t>Contains a valid TNAuthList extension authorizing the <spanx style="verb">orig</spanx> telephone number.</t>
      <t>Optionally includes JWTClaimConstraints or EnhancedJWTClaimConstraints extensions consistent with the asserted claims.</t>
      <t>Is backed by a Signed Certificate Timestamp (SCT) from a transparency log.</t>
    </list></t>
  <t>Attaches the signed PASSporT in a SIP Identity header using the <spanx style="verb">"x5c"</spanx> header parameter to convey the certificate chain inline.</t>
  <t>Ensures that the certificate is valid, unexpired, and issued by a CA compliant with the VESPER certificate issuance profile.</t>
</list></t>

</section>
<section anchor="verification-service-behavior"><name>Verification Service Behavior</name>

<t>Upon receiving a SIP request containing an Identity header, the Verification Service:</t>

<t><list style="symbols">
  <t>Validates the PASSporT signature and parses the included claims.</t>
  <t>Validates the VESPER delegate certificate by checking:
  <list style="symbols">
      <t>Trust chain validity and issuer compliance with STI and VESPER certificate policies.</t>
      <t>The presence and accuracy of the TNAuthList extension corresponding to the <spanx style="verb">orig</spanx> telephone number.</t>
      <t>The presence and SCT validation of the certificate's transparency log inclusion.</t>
      <t>Any JWTClaimConstraints <xref target="RFC8226"/> and EnhancedJWTClaimConstraints <xref target="RFC9118"/> extensions, ensuring claimed values conform to constraints.</t>
    </list></t>
  <t>Rejects the PASSporT if any of the above validations fail.</t>
</list></t>

<t>This delineation ensures that only calls with properly issued and verifiable delegate certificates are authenticated and accepted under the VESPER framework, reinforcing accountability and integrity within the STIR ecosystem.</t>

</section>
<section anchor="connected-identity-authentication-and-verification"><name>Connected Identity Authentication and Verification</name>

<t>A similar verification process applies when VESPER is used in deployments that support Connected Identity as defined in <xref target="I-D.ietf-stir-rfc4916-update"/>. In this model, the destination party may return a PASSporT of type <spanx style="verb">rsp</spanx> within a SIP response, signed using a delegate certificate authorized for the <spanx style="verb">dest</spanx> telephone number in the original call.</t>

<section anchor="authentication-by-the-destination-party"><name>Authentication by the Destination Party</name>

<t>When acting as an Authentication Service, the destination party performs the following steps to generate and sign the <spanx style="verb">rsp</spanx> PASSporT:</t>

<t><list style="symbols">
  <t>Constructs a PASSporT of type <spanx style="verb">rsp</spanx> including:
  <list style="symbols">
      <t>The original <spanx style="verb">orig</spanx> and <spanx style="verb">dest</spanx> values from the incoming call.</t>
      <t>The <spanx style="verb">iat</spanx> claim representing the issuance time.</t>
      <t>Optionally, the <spanx style="verb">attest</spanx> claim to convey the attestation level of the identity relationship, if appropriate.</t>
    </list></t>
  <t>Signs the PASSporT using a valid VESPER delegate certificate containing a TNAuthList extension authorizing use of the <spanx style="verb">dest</spanx> telephone number (i.e., the destination party's number).</t>
  <t>Includes the <spanx style="verb">"x5c"</spanx> header in the PASSporT, conveying the certificate chain used for signing.</t>
  <t>Ensures the certificate is valid, unexpired, includes a valid SCT, and that the certificate corresponds to the <spanx style="verb">dest</spanx> claim.</t>
  <t>Attaches the signed PASSporT to a SIP 200 OK response using the Identity header as described in <xref target="I-D.ietf-stir-rfc4916-update"/>.</t>
</list></t>

</section>
<section anchor="verification-by-the-originating-party"><name>Verification by the Originating Party</name>

<t>To verify the <spanx style="verb">rsp</spanx> PASSporT, the originating party (or an upstream Verification Service acting on its behalf) <bcp14>MUST</bcp14> perform the following checks:</t>

<t><list style="symbols">
  <t>The <spanx style="verb">rsp</spanx> PASSporT <bcp14>MUST</bcp14> be signed using a valid VESPER delegate certificate with a TNAuthList value matching the <spanx style="verb">dest</spanx> number.</t>
  <t>The certificate <bcp14>MUST</bcp14>:
  <list style="symbols">
      <t>Be issued by a Certification Authority compliant with <xref target="RFC8226"/> and the VESPER profile;</t>
      <t>Include a valid SCT and be within its validity period.</t>
    </list></t>
  <t>The PASSporT signature <bcp14>MUST</bcp14> be validated using the provided <spanx style="verb">x5c</spanx> header.</t>
  <t>The <spanx style="verb">orig</spanx> and <spanx style="verb">dest</spanx> claims <bcp14>MUST</bcp14> match those of the original PASSporT that initiated the call.</t>
  <t>The <spanx style="verb">iat</spanx> claim <bcp14>MUST</bcp14> be within an acceptable freshness interval.</t>
  <t>The Verification Service <bcp14>SHOULD</bcp14> validate the certificate's inclusion in a transparency log using the SCT.</t>
</list></t>

<t>These procedures confirm that the destination party has authenticated and cryptographically asserted its identity using a VESPER delegate certificate, extending mutual identity validation to the terminating side of the call. This process supports bi-directional trust, enhances accountability, and enables privacy-aware identity assertion.</t>

</section>
</section>
</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>TBD</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>None</t>

</section>
<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>TODO acknowledge.</t>

</section>


  </middle>

  <back>



    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC8224">
  <front>
    <title>Authenticated Identity Management in the Session Initiation Protocol (SIP)</title>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <author fullname="C. Jennings" initials="C." surname="Jennings"/>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <author fullname="C. Wendt" initials="C." surname="Wendt"/>
    <date month="February" year="2018"/>
    <abstract>
      <t>The baseline security mechanisms in the Session Initiation Protocol (SIP) are inadequate for cryptographically assuring the identity of the end users that originate SIP requests, especially in an interdomain context. This document defines a mechanism for securely identifying originators of SIP requests. It does so by defining a SIP header field for conveying a signature used for validating the identity and for conveying a reference to the credentials of the signer.</t>
      <t>This document obsoletes RFC 4474.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8224"/>
  <seriesInfo name="DOI" value="10.17487/RFC8224"/>
</reference>
<reference anchor="RFC8225">
  <front>
    <title>PASSporT: Personal Assertion Token</title>
    <author fullname="C. Wendt" initials="C." surname="Wendt"/>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <date month="February" year="2018"/>
    <abstract>
      <t>This document defines a method for creating and validating a token that cryptographically verifies an originating identity or, more generally, a URI or telephone number representing the originator of personal communications. The Personal Assertion Token, PASSporT, is cryptographically signed to protect the integrity of the identity of the originator and to verify the assertion of the identity information at the destination. The cryptographic signature is defined with the intention that it can confidently verify the originating persona even when the signature is sent to the destination party over an insecure channel. PASSporT is particularly useful for many personal-communications applications over IP networks and other multi-hop interconnection scenarios where the originating and destination parties may not have a direct trusted relationship.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8225"/>
  <seriesInfo name="DOI" value="10.17487/RFC8225"/>
</reference>
<reference anchor="RFC8226">
  <front>
    <title>Secure Telephone Identity Credentials: Certificates</title>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <author fullname="S. Turner" initials="S." surname="Turner"/>
    <date month="February" year="2018"/>
    <abstract>
      <t>In order to prevent the impersonation of telephone numbers on the Internet, some kind of credential system needs to exist that cryptographically asserts authority over telephone numbers. This document describes the use of certificates in establishing authority over telephone numbers, as a component of a broader architecture for managing telephone numbers as identities in protocols like SIP.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8226"/>
  <seriesInfo name="DOI" value="10.17487/RFC8226"/>
</reference>
<reference anchor="RFC9118">
  <front>
    <title>Enhanced JSON Web Token (JWT) Claim Constraints for Secure Telephone Identity Revisited (STIR) Certificates</title>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <date month="August" year="2021"/>
    <abstract>
      <t>RFC 8226 specifies the use of certificates for Secure Telephone Identity Credentials; these certificates are often called "Secure Telephone Identity Revisited (STIR) Certificates". RFC 8226 provides a certificate extension to constrain the JSON Web Token (JWT) claims that can be included in the Personal Assertion Token (PASSporT), as defined in RFC 8225. If the PASSporT signer includes a JWT claim outside the constraint boundaries, then the PASSporT recipient will reject the entire PASSporT. This document updates RFC 8226; it provides all of the capabilities available in the original certificate extension as well as an additional way to constrain the allowable JWT claims. The enhanced extension can also provide a list of claims that are not allowed to be included in the PASSporT.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9118"/>
  <seriesInfo name="DOI" value="10.17487/RFC9118"/>
</reference>
<reference anchor="RFC9447">
  <front>
    <title>Automated Certificate Management Environment (ACME) Challenges Using an Authority Token</title>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <author fullname="M. Barnes" initials="M." surname="Barnes"/>
    <author fullname="D. Hancock" initials="D." surname="Hancock"/>
    <author fullname="C. Wendt" initials="C." surname="Wendt"/>
    <date month="September" year="2023"/>
    <abstract>
      <t>Some proposed extensions to the Automated Certificate Management Environment (ACME) rely on proving eligibility for certificates through consulting an external authority that issues a token according to a particular policy. This document specifies a generic Authority Token Challenge for ACME that supports subtype claims for different identifiers or namespaces that can be defined separately for specific applications.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9447"/>
  <seriesInfo name="DOI" value="10.17487/RFC9447"/>
</reference>
<reference anchor="RFC9448">
  <front>
    <title>TNAuthList Profile of Automated Certificate Management Environment (ACME) Authority Token</title>
    <author fullname="C. Wendt" initials="C." surname="Wendt"/>
    <author fullname="D. Hancock" initials="D." surname="Hancock"/>
    <author fullname="M. Barnes" initials="M." surname="Barnes"/>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <date month="September" year="2023"/>
    <abstract>
      <t>This document defines a profile of the Automated Certificate Management Environment (ACME) Authority Token for the automated and authorized creation of certificates for Voice over IP (VoIP) telephone providers to support Secure Telephone Identity (STI) using the TNAuthList defined by STI certificates.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9448"/>
  <seriesInfo name="DOI" value="10.17487/RFC9448"/>
</reference>
<reference anchor="RFC9795">
  <front>
    <title>Personal Assertion Token (PASSporT) Extension for Rich Call Data</title>
    <author fullname="C. Wendt" initials="C." surname="Wendt"/>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <date month="July" year="2025"/>
    <abstract>
      <t>This document extends Personal Assertion Token (PASSporT), a token for conveying cryptographically signed call information about personal communications, to include rich metadata about a call and caller that can be signed and integrity protected, transmitted, and subsequently rendered to the called party. This framework is intended to include and extend caller- and call-specific information beyond human-readable display name, comparable to the "Caller ID" function common on the telephone network. It is also enhanced with an integrity mechanism that is designed to protect the authoring and transport of this information for different authoritative use cases.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9795"/>
  <seriesInfo name="DOI" value="10.17487/RFC9795"/>
</reference>

<reference anchor="I-D.ietf-stir-rfc4916-update">
   <front>
      <title>Connected Identity for STIR</title>
      <author fullname="Jon Peterson" initials="J." surname="Peterson">
         <organization>TransUnion</organization>
      </author>
      <author fullname="Chris Wendt" initials="C." surname="Wendt">
         <organization>Somos</organization>
      </author>
      <date day="7" month="July" year="2025"/>
      <abstract>
	 <t>   The Session Initiation Protocol (SIP) Identity header field conveys
   cryptographic identity information about the originators of SIP
   requests.  The Secure Telephone Identity Revisited (STIR) framework,
   however, provides no means for determining the identity of the called
   party in a traditional telephone-calling scenario.  This document
   updates prior guidance on the &quot;connected identity&quot; problem to reflect
   the changes to SIP Identity that accompanied STIR, and considers a
   revised problem space for connected identity as a means of detecting
   calls that have been retargeted to a party impersonating the intended
   destination, as well as the spoofing of mid-dialog or dialog-
   terminating events by intermediaries or third parties.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-stir-rfc4916-update-07"/>
   
</reference>

<reference anchor="I-D.wendt-acme-authority-token-jwtclaimcon">
   <front>
      <title>JWTClaimConstraints profile of ACME Authority Token</title>
      <author fullname="Chris Wendt" initials="C." surname="Wendt">
         <organization>Somos Inc.</organization>
      </author>
      <author fullname="David Hancock" initials="D." surname="Hancock">
         <organization>Somos Inc.</organization>
      </author>
      <date day="7" month="July" year="2025"/>
      <abstract>
	 <t>   This document defines an authority token profile for handling the
   validation of JWTClaimConstraints and EnhancedJWTClaimConstraints.
   This profile follows the model established in Authority Token for the
   validation of TNAuthList but is specifically tailored for the
   JWTClaimConstraints certificate extensions.  The profile enables
   validation and challenge processes necessary to support certificates
   containing both TNAuthList and JWTClaimConstraints, particularly in
   the context of Secure Telephone Identity (STI).

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-wendt-acme-authority-token-jwtclaimcon-03"/>
   
</reference>

<reference anchor="I-D.ietf-stir-certificates-shortlived">
   <front>
      <title>Short-Lived Certificates for Secure Telephone Identity</title>
      <author fullname="Jon Peterson" initials="J." surname="Peterson">
         <organization>TransUnion</organization>
      </author>
      <date day="6" month="July" year="2025"/>
      <abstract>
	 <t>   When certificates are used as credentials to attest the assignment of
   ownership of telephone numbers, some mechanism is required to provide
   certificate freshness.  This document specifies short-lived
   certificates as a means of guaranteeing certificate freshness for
   secure telephone identity (STIR), potentially relying on the
   Automated Certificate Management Environment (ACME) or similar
   mechanisms to allow signers to acquire certificates as needed.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-stir-certificates-shortlived-03"/>
   
</reference>
<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>



    </references>





  </back>

<!-- ##markdown-source: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-->

</rfc>

