<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.22 (Ruby 3.4.1) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-wendt-stir-vesper-use-cases-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="VESPER Use Cases">Verifiable STI Persona (VESPER) Use Cases and Requirements</title>

    <author fullname="Chris Wendt">
      <organization>Somos, Inc.</organization>
      <address>
        <postal>
          <country>US</country>
        </postal>
        <email>chris@appliedbits.com</email>
      </address>
    </author>

    <date year="2025" month="March" day="03"/>

    <area>art</area>
    <workgroup>stir</workgroup>
    <keyword>telephone number</keyword> <keyword>right-to-use</keyword>

    <abstract>


<?line 44?>

<t>This document discusses a set of use cases and requirements for an extension to Secure Telephone Identity Revisited (STIR) called VESPER (Verifiable STI PERsona). VESPER enhances STIR by incorporating a trust framework that associating a responsible business entity and/or human with the assignment and right-to-use a telephone number. Important to the use-cases and requirements are mechanisms for the preservation of privacy and explicit choice to reveal information beyond the communications service provider you have chosen to assign the telephone number with. Core to this premise is the ability to represent and prove the right to use a telephone number resource via the legitimate holder of the Vesper token. Additional metadata and attributes can be vetted and attested via vetting policies and Know-Your-Customer (KYC) processes that are not defined as part of this effort but should follow jurisdiction specific best practices and policies that may exist.  The framework allows for the leveraging of trusted and identified issuers to create a signed credential known as a VESPER token that will be defined including associated claims and potential paths for extensibility in the future.  In addition, transparency mechanisms are explored to provide public logs or registries of certificates, keys, entity information, or telephone number details, if desired by the telephone number holder to improve trustability, visibility and accountability within the telephone ecosystem.</t>

<t>This document covers various scenarios in which VESPER can be used to enhance trust in communications, focusing on common real-world deployments and corresponding requirements. This work is intended to complement and align with the framework described currently as a work in progress in <xref target="I-D.wendt-stir-vesper"/>.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-wendt-stir-vesper-use-cases/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/appliedbits/draft-wendt-stir-vesper-use-cases"/>.</t>
    </note>


  </front>

  <middle>


<?line 50?>

<section anchor="introduction"><name>Introduction</name>

<t>The Secure Telephone Identity Revisited (STIR) framework <xref target="RFC8224"/>, <xref target="RFC8225"/>, and <xref target="RFC8226"/> has proven valuable in mitigating caller ID spoofing by creating a cryptographic identity of telephone calls.  However, STIR typically centers on validating the calling telephone number itself, without fully leveraging or verifying the human or business entity behind that number assignment.
The VESPER extension introduces a trust framework that aligns verified entities with assigned telephone numbers.  By issuing VESPER tokens that encapsulate an entity's attributes and its authorized right-to-use specific telephone numbers, VESPER augments the STIR framework to incorporate deeper levels of identity assurance.  Entities can undergo a Know-Your-Customer (KYC) process, allowing a trusted authority to verify and attest to relevant information.  Additionally, to increase overall trust and transparency, VESPER contemplates using a public registry of trusted information, certificates, keys, or telephone number assignments.
This document outlines a series of use cases where such trust frameworks can enhance communication security, as well as a set of requirements needed to facilitate these scenarios.  This approach aligns with the style of <xref target="RFC9475"/>, <xref target="RFC8396"/>, and <xref target="RFC7340"/> in terms of describing use cases and deriving associated requirements.</t>

</section>
<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

<t>Terminology
This document leverages the terminology defined in <xref target="RFC8224"/>, as well as the following terms:
VESPER Token: A cryptographic artifact issued by a trusted issuer that binds an entity (human or organization) to attributes (such as a telephone number or set of telephone numbers, business name, or relevant KYC data).
KYC (Know-Your-Customer): A verification process carried out to validate the identity and attributes of an entity.
Transparency Mechanism: A publicly accessible record (e.g., a distributed log, blockchain, or registry) that allows authorized parties to query or audit the certificates, keys, entity details, and telephone number assignments.
Right-To-Use Authorization: The validation that an entity is authorized to use a specific telephone number, typically confirmed by service providers or numbering authorities.</t>

</section>
<section anchor="overview-of-vesper"><name>Overview of VESPER</name>

<section anchor="relationship-to-stir"><name>Relationship to STIR</name>

<t>STIR provides a foundation to securely identify the calling party's telephone number by signing it with a certificate.  VESPER supplements STIR by binding the telephone number not just to a certificate, but also to a verified identity (individual or business).  This approach helps address questions such as:</t>

<t><list style="symbols">
  <t>"Is the caller truly who they claim to be?"</t>
  <t>"Does this caller have the right-to-use this number based on a recognized numbering authority or telecom provider?"</t>
</list></t>

</section>
<section anchor="the-role-of-a-vesper-token"><name>The Role of a VESPER Token</name>

<t>A VESPER token captures relevant vetted information:</t>

<t><list style="symbols">
  <t>The entity name and type (e.g., individual, organization).</t>
  <t>Telephone number(s) or range(s) assigned for use by that entity.</t>
  <t>Optional attributes (e.g., business category, address, KYC level).</t>
</list></t>

<t>This token is digitally signed by a VESPER issuer (e.g., a trusted third party recognized by the telecom ecosystem).  When making calls or presenting identity, this token can be included or referenced, allowing relying parties to confirm the entity's legitimacy.</t>

</section>
<section anchor="trust-framework-with-kyc"><name>Trust Framework with KYC</name>

<t>The KYC process is crucial in establishing a high level of trust. Entities seeking a VESPER token must supply documentation and proofs as determined by the issuer.  The issuer verifies the documents, confirms the right-to-use the telephone number(s), and digitally signs a token containing these validated attributes.</t>

</section>
<section anchor="transparency-mechanisms"><name>Transparency Mechanisms</name>

<t>VESPER anticipates the need for a public registry of telephone numbers, associated entity data, and issuer certificates or keys. Such a registry—whether implemented via distributed ledger, web-based transparency log, or other mechanisms—provides a public audit function, allowing:</t>

<t><list style="symbols">
  <t>Verification that a given telephone number is assigned to a specific entity.</t>
  <t>Monitoring revocation or expiration of VESPER tokens or certificates.</t>
  <t>Accountability to mitigate malicious issuance or misuse of tokens.</t>
</list></t>

</section>
</section>
<section anchor="use-cases"><name>Use Cases</name>

<t>This section illustrates practical examples where VESPER can strengthen trust in communications.</t>

<section anchor="enterprise-number-assignment-and-attestation"><name>Enterprise Number Assignment and Attestation</name>

<t>Large enterprises often handle multiple telephone numbers, including local, toll-free, and international numbers.  An enterprise obtains a VESPER token that includes:</t>

<t><list style="symbols">
  <t>The set of numbers assigned to the enterprise.</t>
  <t>The enterprise's registered name, relevant business attributes, and possibly additional KYC data (e.g., tax ID, business license).</t>
</list></t>

<t>When employees place outbound calls on behalf of the enterprise, the receiving party (or the terminating network) can check:</t>

<t><list style="numbers" type="1">
  <t>The STIR identity header for cryptographic validation.</t>
  <t>The VESPER token to confirm the enterprise's right-to-use the number and presence of KYC-level attributes.</t>
</list></t>

<t>This improves overall trust for called parties, who can rely on the verified identity of the business behind the call.</t>

</section>
<section anchor="consumer-user-validation"><name>Consumer User Validation</name>
<t>A consumer might seek a verified identity token for a personal mobile or landline number.  Undergoing a KYC verification ensures that the consumer is who they claim to be.  The resulting VESPER token associates:</t>

<t><list style="symbols">
  <t>The individual's legal name (or a pseudonym if appropriate).</t>
  <t>The confirmed telephone number(s).</t>
</list></t>

<t>In this scenario, calling parties can present a self-asserted name (as is common in CNAM systems) along with a verifiable token that states the name is validated by an issuer.  This extends STIR's cryptographic verification of the number to also verify the calling user's identity.</t>

</section>
<section anchor="third-party-service-provider-integration"><name>Third-Party Service Provider Integration</name>

<t>Communication service providers, contact centers, and other third-party platforms often generate calls on behalf of their clients. VESPER can be integrated to ensure:</t>

<t><list style="symbols">
  <t>The third party has explicit permission to use the phone numbers belonging to their clients.</t>
  <t>Proper KYC validation of each client, so any call from the third party can still reflect accurate identity information about the underlying client.</t>
</list></t>

<t>For example, a cloud-based contact center platform might store the VESPER tokens for multiple customers and incorporate the tokens in outbound calls, thereby guaranteeing that each call's displayed caller ID is both legitimately used and properly mapped back to the verified client.</t>

</section>
<section anchor="public-certificate-and-key-log-transparency"><name>Public Certificate and Key Log Transparency</name>

<t>The establishment of public transparency logs of telephone number right to use associations for certificates and VESPER issuer certificates could enable privacy enabled validation of:</t>

<t><list style="symbols">
  <t>"What certificate or public key is associated with the legitimate assignee of phone number +1-800-XXX-XXXX?"</t>
  <t>Rapid revocation: If an entity's right-to-use a number is revoked, the system can update the registry to reflect the change.
This mechanism benefits telecom operators, regulators, and end-users alike, providing a common check point for verifying identities in the calling ecosystem.</t>
</list></t>

</section>
</section>
<section anchor="requirements"><name>Requirements</name>

<t>The following high-level requirements flow from the use cases above.</t>

<section anchor="functional-requirements"><name>Functional Requirements</name>

<t>F1. VESPER Token Issuance:</t>

<t>A mechanism <bcp14>MUST</bcp14> exist for securely issuing a cryptographically signed token that associates an entity's identity attributes with telephone number assignments.</t>

<t>F2. KYC Validation Process:</t>

<t>The issuance process <bcp14>MUST</bcp14> incorporate a KYC validation step, ensuring that assigned numbers and entity data are accurate.</t>

<t>F3. STIR Integration:</t>

<t>Systems <bcp14>MUST</bcp14> integrate with existing STIR architecture to include or reference VESPER tokens within SIP signaling or comparable call setups, facilitating verification by downstream network elements.</t>

<t>F4. Token Revocation:</t>

<t>VESPER token issuers <bcp14>MUST</bcp14> support revocation or suspension if telephone numbers are reassigned or if an entity fails to meet continued compliance (e.g., KYC invalidation).</t>

</section>
<section anchor="trust-and-security-requirements"><name>Trust and Security Requirements</name>

<t>TS1. Cryptographic Assurance:</t>

<t>VESPER tokens <bcp14>MUST</bcp14> be signed using cryptographic methods that are at least as secure as those in STIR <xref target="RFC8224"/>.  The token's signature <bcp14>MUST</bcp14> be verifiable by relying parties.</t>

<t>TS2. Authorization Validation:</t>

<t>The system <bcp14>MUST</bcp14> ensure that only authorized entities (who have completed KYC) can obtain tokens for specific numbers.  The process <bcp14>MUST</bcp14> check right-to-use each telephone number.</t>

<t>TS3. Privacy Protection:</t>

<t>The design <bcp14>SHOULD</bcp14> include mechanisms to protect sensitive personal or corporate data, ensuring minimal information disclosure in scenarios where full identity is not strictly necessary.</t>

</section>
<section anchor="transparency-and-auditability-requirements"><name>Transparency and Auditability Requirements</name>

<t>TA1. Public Registry Interface:</t>

<t>An optional yet recommended registry mechanism <bcp14>SHOULD</bcp14> provide a public interface or API, allowing queries of current or historical ownership of telephone numbers, as well as VESPER issuer keys.</t>

<t>TA2. Auditability of Token Issuance:</t>

<t>Transparency logs or similar mechanisms <bcp14>MUST</bcp14> keep a verifiable record of token issuance and revocation events, enabling third parties to audit the authenticity and status of tokens.</t>

<t>TA3. Revocation Logging:</t>

<t>Token revocations <bcp14>MUST</bcp14> be promptly logged to the transparency mechanism to ensure relying parties have up-to-date information.</t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>VESPER relies on cryptographically verifiable tokens that extend the trust model of STIR to include entity identity attributes.  As such, it is critical that VESPER issuers are trustworthy and maintain high security standards for KYC and signing processes.  Attackers could attempt to fraudulently obtain VESPER tokens by compromising KYC processes or by forging credentials.  Comprehensive vetting and robust multi-factor verification can mitigate such risks.</t>

<t>The public registry or transparency mechanism poses another attack vector if it can be manipulated or if unauthorized parties gain write access.  Ensuring tamper-evident logs or distributed ledgers can mitigate data manipulation.  Privacy considerations must be addressed to minimize unintended exposure of personal or sensitive business information in public registries.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document has no IANA actions.</t>

</section>


  </middle>

  <back>



    <references title='Normative References' anchor="sec-normative-references">




<reference anchor="I-D.wendt-stir-vesper">
   <front>
      <title>VESPER PASSporT and Identity Tokens - VErifiable STI Personas</title>
      <author fullname="Chris Wendt" initials="C." surname="Wendt">
         <organization>Somos, Inc.</organization>
      </author>
      <author fullname="Robert Śliwa" initials="R." surname="Śliwa">
         <organization>Somos, Inc.</organization>
      </author>
      <date day="22" month="October" year="2024"/>
      <abstract>
	 <t>   This document extends the STIR architecture by defining a Personal
   Assertion Token (PASSporT) with a type of &quot;vesper&quot; (VErifiable Sti
   PERsona) and specifies the use of PASSporTs as a JSON Web Tokens
   (JWT) and Selective Disclosure JWT (SD-JWT) for representing
   verifiable claims related to a persona (a person or business entity)
   associated with a Secure Telephone Identity (STI).  This set of
   extensible claims can include verifiable information such as the
   assignment of a telephone number, the output of a Know Your Customer
   (KYC) or Know Your Business (KYB) type of vetting process, Rich Call
   Data (RCD) or claims of consent provided to the telephone number
   holder.  The architecture, dependencies, and process flow of Vesper
   includes logical roles that represent certain responsibilities for
   establishing a secure telephone identity.  These roles represent the
   basis for trusted relationships to information that is being claimed
   and who is validating and taking responsibility for the accuracy of
   that information.  These roles begin with a Subject Entity (SE) that
   is the end entity that intended to be represented by the STI
   telephone number identifier.  A Vetting Claim Agent (VCA) establishes
   the Subject Entity as a vetted entity after performing the initial
   vetting and existence as a entity that fulfills the criteria and
   policies of the ecosystem to be associated with an STI.  A Notary
   Agent (NA) is a neutral role that maintains a graph of relationships
   among all roles, claims, and identities, but importantly, for
   protecting privacy, doesn&#x27;t hold any claim information other than the
   recording of claim events to the STI telephone number.  The NA
   records these claim event transactions with a corresponding
   transparency log that generates verifiable receipts to &quot;notarize&quot; the
   recording of these relationships and claims being established.
   Privacy is enabled in this Notary role because the submitters have
   the option of submitting hashes of claims to protect information, or
   may usefully want to publicly declare their association to a claim to
   allow the public monitoring to avoid duplicate, mistaken or negligent
   claims which can be identified before illegitimate usage in the eco-
   system can occur.  Other Claim Agents are defined producing claims in
   the form of SD-JWT + receipts from the NA.  There are multiple claim
   agent types with corresponding extensible claim definitions with key
   value pairs that can be required or optionally included.  These SD-
   JWT + receipt claim objects are then collected by the SE into a
   digital wallet that it can then use for selective disclosure
   presentation and incorporate into a &quot;vesper&quot; PASSporT signed by the a
   delegate certificate associated with STI telephone number to validate
   the SE is indeed the authorized holder of the telephone number and
   vesper token at the time the presentation is required and ties the SE
   to the STIR eco-system a STIR certificates policy for use in
   communications.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-wendt-stir-vesper-02"/>
   
</reference>
<reference anchor="RFC8224">
  <front>
    <title>Authenticated Identity Management in the Session Initiation Protocol (SIP)</title>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <author fullname="C. Jennings" initials="C." surname="Jennings"/>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <author fullname="C. Wendt" initials="C." surname="Wendt"/>
    <date month="February" year="2018"/>
    <abstract>
      <t>The baseline security mechanisms in the Session Initiation Protocol (SIP) are inadequate for cryptographically assuring the identity of the end users that originate SIP requests, especially in an interdomain context. This document defines a mechanism for securely identifying originators of SIP requests. It does so by defining a SIP header field for conveying a signature used for validating the identity and for conveying a reference to the credentials of the signer.</t>
      <t>This document obsoletes RFC 4474.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8224"/>
  <seriesInfo name="DOI" value="10.17487/RFC8224"/>
</reference>
<reference anchor="RFC8225">
  <front>
    <title>PASSporT: Personal Assertion Token</title>
    <author fullname="C. Wendt" initials="C." surname="Wendt"/>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <date month="February" year="2018"/>
    <abstract>
      <t>This document defines a method for creating and validating a token that cryptographically verifies an originating identity or, more generally, a URI or telephone number representing the originator of personal communications. The Personal Assertion Token, PASSporT, is cryptographically signed to protect the integrity of the identity of the originator and to verify the assertion of the identity information at the destination. The cryptographic signature is defined with the intention that it can confidently verify the originating persona even when the signature is sent to the destination party over an insecure channel. PASSporT is particularly useful for many personal-communications applications over IP networks and other multi-hop interconnection scenarios where the originating and destination parties may not have a direct trusted relationship.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8225"/>
  <seriesInfo name="DOI" value="10.17487/RFC8225"/>
</reference>
<reference anchor="RFC8226">
  <front>
    <title>Secure Telephone Identity Credentials: Certificates</title>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <author fullname="S. Turner" initials="S." surname="Turner"/>
    <date month="February" year="2018"/>
    <abstract>
      <t>In order to prevent the impersonation of telephone numbers on the Internet, some kind of credential system needs to exist that cryptographically asserts authority over telephone numbers. This document describes the use of certificates in establishing authority over telephone numbers, as a component of a broader architecture for managing telephone numbers as identities in protocols like SIP.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8226"/>
  <seriesInfo name="DOI" value="10.17487/RFC8226"/>
</reference>
<reference anchor="RFC9475">
  <front>
    <title>Messaging Use Cases and Extensions for Secure Telephone Identity Revisited (STIR)</title>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <author fullname="C. Wendt" initials="C." surname="Wendt"/>
    <date month="December" year="2023"/>
    <abstract>
      <t>Secure Telephone Identity Revisited (STIR) provides a means of attesting the identity of a telephone caller via a signed token in order to prevent impersonation of a calling party number, which is a key enabler for illegal robocalling. Similar impersonation is sometimes leveraged by bad actors in the text and multimedia messaging space. This document explores the applicability of STIR's Personal Assertion Token (PASSporT) and certificate issuance framework to text and multimedia messaging use cases, including support for both messages carried as a payload in SIP requests and messages sent in sessions negotiated by SIP.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9475"/>
  <seriesInfo name="DOI" value="10.17487/RFC9475"/>
</reference>
<reference anchor="RFC8396">
  <front>
    <title>Managing, Ordering, Distributing, Exposing, and Registering Telephone Numbers (MODERN): Problem Statement, Use Cases, and Framework</title>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <author fullname="T. McGarry" initials="T." surname="McGarry"/>
    <date month="July" year="2018"/>
    <abstract>
      <t>The functions of the Public Switched Telephone Network (PSTN) are rapidly migrating to the Internet. This is generating new requirements for many traditional elements of the PSTN, including Telephone Numbers (TNs). TNs no longer serve simply as telephone routing addresses: they are now identifiers that may be used by Internet-based services for a variety of purposes including session establishment, identity verification, and service enablement. This problem statement examines how the existing tools for allocating and managing telephone numbers do not align with the use cases of the Internet environment and proposes a framework for Internet-based services relying on TNs.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8396"/>
  <seriesInfo name="DOI" value="10.17487/RFC8396"/>
</reference>
<reference anchor="RFC7340">
  <front>
    <title>Secure Telephone Identity Problem Statement and Requirements</title>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
    <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
    <date month="September" year="2014"/>
    <abstract>
      <t>Over the past decade, Voice over IP (VoIP) systems based on SIP have replaced many traditional telephony deployments. Interworking VoIP systems with the traditional telephone network has reduced the overall level of calling party number and Caller ID assurances by granting attackers new and inexpensive tools to impersonate or obscure calling party numbers when orchestrating bulk commercial calling schemes, hacking voicemail boxes, or even circumventing multi-factor authentication systems trusted by banks. Despite previous attempts to provide a secure assurance of the origin of SIP communications, we still lack effective standards for identifying the calling party in a VoIP session. This document examines the reasons why providing identity for telephone numbers on the Internet has proven so difficult and shows how changes in the last decade may provide us with new strategies for attaching a secure identity to SIP sessions. It also gives high-level requirements for a solution in this space.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7340"/>
  <seriesInfo name="DOI" value="10.17487/RFC7340"/>
</reference>
<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>



    </references>




<?line 224?>

<section numbered="false" anchor="acknowledgments"><name>Acknowledgments</name>

<t>TODO acknowledge.</t>

</section>


  </back>

<!-- ##markdown-source:
H4sIAAAAAAAAA5Va23IjR3J9x1eUOQ8i1wBGI82uJMZ6ZYozYyF2biY5uoTD
D41GAahlo6u3L6SwExPhj/AH+Fv8Kf4Sn5NZVd0NQFr7QRoQ6K7KysvJk5k1
m80mT548mTwxP7y8ff/yxnxorLnOGtuYrFyZG/vXztV2Z8u2keda1xb20pz9
YGu3dtmysOb2bmHe27rxZWbOdZWL31jmbJItl7V94CIHW55N8qy1G1/vL40r
134yWfm8zHbYcFVn63b2aMtVO2taV88ebFPZetY1dpbz3dnnn0+abrlzTeN8
2e4rvLR4effKmCcmKxqP7Vy5shVWgBRnU3NmV671tcsK/rG4+g7/+Bqfbu5e
nU3Kbre09eVkBYEuJ7kvG1s2XXNp2rqzEwj/5SSrbXZpsrqdPPr6flP7rro0
lG1yb/f4anU5MTPT2sJWW19ao0vyu9pttu2s9ZR+8mDLDlsYE1Y4u7V5V1tz
l15cUGLX7qHGB9e41q7O8Lge8Uds7cqN+Re+jG+zOt9ijW3bVs3l06e7zBX8
yj3YubPteu7rzVN+8XRZ+8fGPqW8T7ncxrXbbonzVFXh7Grp2ubp31X6ZJJ1
7dbXPCnWMGbdFYUa7Hpbu8b8yHflF2ycle5vWQvrXJpbv/PN1CzKfC6/WgoK
uXO+9c8DGea5353JI7nvypae8eF2Mil9vcNSD6K4xezF/EhI/nDz6vrrL754
3n/8ff/xD+HjN8+/St9++U389qsvn39+OaEPpn0mk9lsZrJl09ZZ3k4md1uc
D/7Z0avNyjV514i/m8a2xq8NtGTyFAL1IAQMlsWXxv7SwqugENN6838wuzlH
rCG48qwo8FcIn/PDWHx5w1i8mMcHbLnNyhxy8G2z3CO2cl9XvsbJ4DoZfbpp
zbqG4ejKpt1mrcmaxucuPlJDqQgCx02WXeNK2zQmyIfjPcWBtt0OZ3qEH2EB
y/fdphTlyPkHPs8tD8JibhY7SNRmeBzK4ALJy471h9AzO5vjWK7ZqTr5RgUp
bf0gPkYLVLV7yHIRELqGT+WuNfnWu9xyE4CQzQqTrIyXlnbv8TAXg+PtutLl
8kNjuDDfq2r/4Fa2NnvfmW32YLkgwIEL6pHl7cPziV7m5trXVs8H54G4gCtr
8FEUtnQF1SmSyVGC6rillUdEiXzgtBJpJd/VkPLBZfJCYRHXDoezZusLig21
8IcfJEiw1L0t5+ZqBSzEMaGNnW0zgF4mO2dtW7tl18IGeUbtmAfb0hHDj7bh
H9yM39NTKk8tB5v9ufSPs58h0ewaDuZ32PD8zz9fX/BE8EeaVl0NSik9gsiu
4VhYGboBrqqs0I5dw0It/K41zdZ3xQoWLwr/aP7SAS5WLhfb4UA54iCHmPDm
ilHq8iBJEkv222V7+INr2rkxd1BG7/kZl+0dqoCH1NmGB6MsDJNweCfBuQZK
wXxNh/RHs+RICS0tQz/AT/hbnoNe76GLkifLYliK7lWgR1cU1G5UAAK06FYS
eSEKuViRuV08ThuWrbJ2q/IGMAlO5NQN110LUMExF9g7GHmKg2RlAw3bEsEx
iCPagXECJ13xOMHXTdUtoT5T+E3DFFnDqYCCVCe0ktuaimDmBqIj9eH/ARgG
kSW59chfV3A2V+AFt8bnxnFf4NPJAAr+C7HcLkQE7RGiZmqIkeHw4p25JIwY
VAw/dxiaNvfNHibdzQ/hPMf6MOlDVjvfIfhzW/JjQ70+bl2+jUYMYYF4FI0F
qA2IiofHKDKFpXKiJ/xJf8M/8JliBu+DW4OfFH4fMA6HAEwr8IovDCFwbkRg
cVpHsVoSG5EBy1aFTcCbFcSkBMu9r0PhOaKbntVhm7It9uqfumhJ829q4jw+
f/x4Mst++jTXvLhzq1VhJ+CRC2Rpv+okJqlW+//JbL10Hz+G7P3p0zT98Xv+
wUPFL/7w6RNAuFGILGGvopM8CIl3cPaNpi/Jl7VZvABGeL/mV/AyCVbNbnm9
r1ocNqtg2xDbEI8xn4TmIlC7+d4/EhWmmk3Bwhx/wXJ4iT7jRQy30rUlk+B3
+Xzo0uA3tlhPxTge4Eb2tB+BTg1gRXLfx6U0x+Lrwxy8tHDvlaJJWL1PwHMx
Q2QDiXS4YCkhLac5AH2nURkIdbIZ417cSTeg0x0cjGr6bi/ASMGHeBcQGMiT
VU1XCFqW4RCfNcOEIyjLOBCG6f5mDzhEgvuj3adxx6zbaCxRdWKuwfn8gAYR
eS3zIXVfCKwlJ8Apu5pBjUO9jOdn2HcIuHqDrP9389xU88qAbDGL6Lk04auV
B2lVWQDEISEa4CiE6JN1AdjTc8CVoRKCFr4NtuRiQ6RPakE1A8yrqPzGKBpl
EeMDtu+H+W4E46fg/hS0997XzA/AFa5e0HmFKsc00rPlx60FWjQdQPbAKVXv
EWNH0IqVADKSCAAHjxZayAZcfMQeS2sDVK6znOmBDgAXoVNFoBdmAKFRitQ+
gyghFBKONu0eOIOlBYpYRfRAhTpiBFSsJgBUzD+23slxA/hS9+M6AT7lHg4y
/wj4JwTZa18+0D/JTPnWCxIH8YpGMReGIY6vGnP25sPtHUtc/mvevpPPNy//
9cPi5uULfr79/ur16/RhEp64/f7dh9cv+k/9m9fv3rx5+faFvoxvzeirydmb
q5/P9PBn797fLd69vXp9pnxk6ASZEuGlldxVg+9KUDSTPi3hne+u3//3fz17
DjX+A/T4xbNn30CP+sfXz75CbqC3lLqbLwGe+icMtJ/AdDaruQpjAngDQ5Nr
wC/AIkHG6GdQ5+/+jZr590vzx2VePXv+p/AFDzz6Mups9KXo7Pibo5dViSe+
OrFN0ubo+wNNj+W9+nn0d9T74Ms/fsuYM7NnX3/7J7jQ5A6e6EoPTrc/CM+Q
f2wT2FJ6bkBPx+l5EHFCMXxEO3H3y0nAnTsmgEtzdZBuMwIKyLoSaSGAPUoq
udakgWhZNX26MOcpGw6bCxdSifV55FyQRMDgCKTwagCIE0kkpVg2NKZKfAMg
A9wNi6SL+YQfz48TwAXPqXkzAFTIBXDEumYuZcIn8itX0PquTzrj4gsCpmMD
TYf0/U2k79xQQZw8LudeUq3XYLk1CJadb+YwFTsVYd0VGT3OWfj8Hou4cjpg
9/uLSAGkIhpkYZZmUkp581fYZs+XMlQrrZKdXy8HEtuXzPSbCeNGMv2dn7E3
eBX2Dr0jwltkWD4UUL1TuJGsqVT+VbYwHVI4X65dvVMfPCz4pfTRdwSeQ/qG
JuZE5HcPfN4+0lbq7/j2iQHFLZT7b10lbR7QkMlEyEhYmZ65Rq0Sz+M1l1kI
FKrM/YhGUv/kSkcapNBQIZ9xbaBoQ3sgp4VIbLoqlAh9U4jRFWnm0dKszv/S
KS0ZrTmVqpwNVv0pUcXkyudcF+fsUK0OiOvFUYbd2qJqWKVKzQHXakLnReP3
EkhtzhZN0gVhoe4E86VhtNcKWbPKt2d8+oUXFHNNfEEaNqmTEqmkPBGVmLGU
gx0yiRyok350bPd9ZD2gIclHsKsYnS5645UfpHpf4G8yuRrX/8hLLNGbHlxC
i2XAuuToXDOolICkQbSvbIzsXs3TMR7O+fKBQc+bC4n1rNxYfk5Unp0EqkSq
cCHqijm/M++q0CEaYqtunZAytu+n0YxTgUph1RexyNZzM+O4DVNysY/tEkH+
oJ0A/Am2YkKArWrFoP3QQIOuAQ2SKnu62Y/gBGaX3cdSUCI5NNgkWIKrTtUR
ol1KJSfsxNAjiIxrS9C1qwGhZ5zGqAyoGGBEBEqVTezE5fu5+MidUNtXqR6R
cIWylL5RazFh0HvrLnfSqjSWLY/CAU6Etm/hx6rfxNjnfZnSWHuvz418bset
BQP2Ke0r+IR2o183zJgAbMn+vX7VKqFtFkwUQl4DMy4Hywc1NKfi7Rhi4IWa
GMZeIWlbDYKqBTkqQFSTcoAdZsqo21MJEsw41oXQT+4qqX8oCwsC7cmfLIOO
qcGAm8fcBjag8getDPMgnYeZcG5uBcvS8v/zH/8JwgoRaja1FJFDQ3WUpu1q
w0z1aJczxadRB0+yOFmQLNT387D6IMWEk2mmXndlrvVcdGTBmB+GhEUTq9k4
dlaOexfNoP73wwzbQ8YbX8qITcLkwYd1pVdZuTq16cf9AT/WHde5GvfysF1o
7liENRu77NFR71IXYoGda+hnNJ4sKhm6nzMGIEKaFRFcUXSc6tBSoW2MWLO/
ZDRJrEcH/T48a8tNS1T5lT6fuiHjkJUNe/xvVWtX46HIldT6mbbKXmf1RgAj
vEPa12IPWHOFVLLritZBoFP+2PeLweWYAFpQ8Nm6tjb4JBctswDgfZPmqhzs
Z/ySAXa6Qx1wsEmpKPDmsNbIFwLuhWXnfe4K33zWhACw7Pcqu07ZL+WSPqin
oecthHaf+tg4SeThMU202S9m8WKQkOAcML9l7pEswLaH31sausjoK127JPWK
eYGYv82KdRyT9EJPFcZsbrU81wx0HgYFipPa8ittS0S/EF/Jtza/h9KezUUJ
QrYSNdrajC1tIs+4JOrp7Xzyhb45NslRkhmo9hBpI78WaGfSyyUyoLuZJo4R
fEpkhA57c9BREkF19hjS3VTIFw8qfNVrh/2YBAZ1JrukdqVSuRAv1widjt0z
RGptfkhKAGfK4087GYExsZ1km6qfgOV6KaEwOw/kEGAoGEtuMHU0H7SLp1mS
/jQq2jj0r+PYSKeCQQ4230/wzpAa8Q7D9aD52eeNPo562qYkgfFJeneuR2hs
t/LlfscJiTBlmBnvX8So6kuWEwkVal2EvktsbE1HZURsZaZpo2FDegYxgcAh
Ns15phxEpxXAuuu3V2+M0itSx8JjtVBtPPSj6AF4EOJiquWKrhkkb5K+ckgs
OPBjj3qltclnzWFwDA0UHCv4OBMRS5HQTh1WTYiGGktFRwlEgWRy9l5C+TbU
e+/jgHeBqNrUAZyvD5qNB7XhVOlJ3sYxQGhJSUYWyjpTwGDXlbw+gvvGllYa
0KcByCHgCqcDn/HEyQXp4tyJfpqcakiSOR5Jw++KONXEKwcRIUbZBIvTosKz
/IEMWB7qYaNcIqUvwiGtZQ2nD04NbJCVezmUWddeYWooleZRjj3BqsHZW7Ys
OtFEiuXhYD5bSr+E1wIYsMq5dTeY8pVwCsnXrBXywnerwJTGdkn6jzjSykD+
AF91oJoSbh56OmEmMZgayKn0DcTFOJlIwqgt3HvTZaBrrbXKXVlVia7w1Ges
ghoItberwZgKIbCE7wzG9wBXmTEGgl5RBSA/VcUIyvL7mHcTIibdwM3fK/W7
7mmVjucBXa/9ZkSXtfxIRYb269eRPB7SzuYUPz64pRCvkfig1hExphjjgm/0
cy7DfiAXASXe5tA/V2P30+7Aj1TuYAUp9FR0NsSVs0bmnlr5g0sSgcZIghyd
6R+fzb7+/PPZTz/9xP9+kvbCTVa51YDZXprFejTNOrjz0jNnvnPPMlImCYKk
OlKqUiswVSAyCNIQETzbsmYPI5XE9RG0pV1zXBYrYLpIBu9uyK02nLT5iEqA
VkpEfy7cPSJGYSyMQhXmhbeAcwFmxGr9GDKEJ1NHGKhHiB2O06XzNbg7KG7V
N4ZZtgb2Mb4YxVsdCTAGk5ElmIg686tQuiBRjnd49Ww+arWYRagILo1h26VX
lrT35QKInK1vt4WB5cFAeNiiGGS1PpmPjN73cPs+ibrab3Y8J69A9IiqPe0h
1rIDIPLHgltKnNgakIMMASk7BGaYo5pqekjok7h6Iu/lqI6V2UyEY0r25VyJ
6yAjiky3ygGiGCEh6WlFvdxS3pQ7iC18uNOxTygnRl2VAwgONzZuF+9F91kR
BuK83gA8JSJIekEh0lW8WRFneXxuxBGW7HI8lizbsl2k58YWaaD26vk8uMzN
IJhN6hfEjpXe85HTsnvCO0njuhZVZxWH6ycaB6JYjmqD/vGGGyAGjuAK6SDt
rG0lc7mykxyGzObE8qHQoZVd2dv5YthUojlvwzj0MApvESTXIzp1FefbRycO
RwXZCPLqrHjMxna23frV4CJXxglSRjGaEFk6F/KNXMsQdxhMjwJhlg0RPWJq
8ZK494BSLveH7TYWLLcInNGIYBBCKXQCyGrkC1lSiWVoOBgYJGw7J7vX+31y
n4YZQ2b6xGmtlIdkIXU/+uL6bnsQqIqpo6QgRODoLiQPhZh7HxIeYKDVVkU6
Di9LbaBMHSHGaBpc5dLbW3zN8Oay4x3WviCSMEpXH6R1lSACdSxy4fhaJG+3
Fl60hmP3t6G0NcJrKwPW1si0gN2rnFeKSksNZPX+RG9OeiBsSMXWzoG3XsFb
A3m5ifmQIFQj2AOswxixMb23rbSEdzu9C5VSaI/8QWHxYlvqirm4KFVz9X4x
aPByxhWvuuk9KT6D7MvOFhtFgBboleOdX2sWpunomOpIS5CnFAceaAHrnMhg
d8fkC37ndrzhPTS9+Nq9tdW4HgtzwNgT65OJ3q5NMGYftH0rNEtzRqTtob/d
D/sYOFaaqWFmyUqva0aNt7sruHKPq2ScLC70SCJJv3mPOLDQrqL74KCbvq10
+uZiXwEdteMlgruK8SbUaniVhiwl4SR7DyzlsnCJIpgK64nxyxOU4LDYjXeb
pHgN4hKPd36l7Xm9MdZnvxgxx4yBvTmdfE05y5MRgNO+pOwxciTNK7IXMlu7
VVPsgFCCUjIiiNdjaKFylfFiCGGLeUTsFuaG6WIuBWhRON1zeaXhvJgEm8i9
mRo+0BV6ZzCA4Thz8H6dZxcJ5SYXHgw0tB+OByDARhNKvCXLba/5mt0StB5s
ulcsTuqXok7WZTPeGIi8NCZ6QnPqDMvYsHbNvXa17HFrv/41d6q83sbR8j0T
PWAn2RAJm5fItQjf4flKbrHFZN6VJyblG+rnEeq3YTAvV8kiJUPZauuZfRA3
SIF93P9vxucTppYE0KthMWPkI2fWeQ/EDUM5DSfBeYgJkdPtUftLpSjP8meQ
LPoUkjp4w/TAu6Ij5cah+OLq7dVRZI1vm7A9UXp9Mstj91zulLKu5SpXOS9P
UwmaFz5eKrba1T+dreE09uwTVn334h0WiE+Ct/4vp8EV1ds0AAA=

-->

</rfc>

