<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.34 (Ruby 4.0.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-wendt-stir-vesper-07" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="VESPER">VESPER - Verifiable STI Presentation and Evidence for RTU</title>

    <author fullname="Chris Wendt">
      <organization>Somos, Inc.</organization>
      <address>
        <postal>
          <country>US</country>
        </postal>
        <email>chris@appliedbits.com</email>
      </address>
    </author>
    <author fullname="Rob &#x015A;liwa">
      <organization>Somos, Inc.</organization>
      <address>
        <postal>
          <country>US</country>
        </postal>
        <email>robjsliwa@gmail.com</email>
      </address>
    </author>

    <date year="2026" month="March" day="31"/>

    <area>Applications and Real-Time</area>
    <workgroup>Secure Telephone Identity Revisited</workgroup>
    <keyword>telephone number</keyword> <keyword>domain</keyword>

    <abstract>


<?line 46?>

<t>This document defines VESPER (Verifiable STI Presentation and Evidence for RTU), a framework that extends the STIR architecture to cryptographically bind telephone number authority, domain identity, and originating provider authorization in a single delegate certificate. The delegate certificate is issued under the certificate policy defined under a STIR compliant eco-system and carries the assigned telephone numbers and authorized originating providers in a TNAuthList extension, the responsible entity's domain in a SubjectAltName, and an embedded Signed Certificate Timestamp (SCT) proving the certificate was recorded in a public transparency log prior to use. VESPER enables relying parties to verify that a telephone number was assigned to the entity whose domain is presented, and that calls from those numbers are originated by an authorized originating provider.</t>

<t>The framework defines a certificate profile and issuance process grounded in existing STIR and ACME authority token mechanisms, a domain-hosted certificate repository with domain-controlled certificate discovery enabling cross-channel trust signals, a PASSporT usage profile for SIP signaling, and certificate transparency to support ecosystem auditability and detection of mis-issuance.</t>



    </abstract>



  </front>

  <middle>


<?line 52?>

<section anchor="introduction"><name>Introduction</name>

<t>The Secure Telephone Identity (STI) architecture, based on STI certificates <xref target="RFC8226"/>, PASSporTs <xref target="RFC8225"/>, and the SIP Identity header field <xref target="RFC8224"/>, provides cryptographic integrity protection for calling information in real-time communications. These mechanisms enable relying parties to verify that a telephone number was not modified in transit and that it was signed using credentials authorized for that number. However, the STI architecture does not define how to verify that a telephone number is being used by the entity it was assigned to, nor does it provide a way to identify which originating providers are authorized to place calls from those numbers.</t>

<t>In practice, telephone numbers appear across a wide range of digital contexts: in SIP signaling, on websites, in SMS and rich communication messages, and in email. Today, there is no standard mechanism for a relying party to verify that the entity asserting a telephone number is the same entity it was assigned to, or to confirm that an originating provider is one of the legitimate originators authorized for that number. This gap enables impersonation, unauthorized origination, and the presentation of misleading contact information across digital channels.</t>

<t>VESPER addresses this by defining a delegate certificate that serves as a single, auditable trust artifact binding three things: the telephone numbers assigned to the responsible entity, the domain that entity controls and for which it holds certificate credentials, and the set of originating providers enabled as legitimate originators for calls from those telephone numbers. Because this binding is expressed in a standard X.509 certificate subject to the certificate policy defined in <xref target="RFC8226"/>, it can be validated using widely deployed PKI mechanisms and recorded in a transparency system for ecosystem auditability.</t>

<t>This document defines the certificate profile, the certificate repository and domain-controlled certificate discovery mechanism, the PASSporT usage profile, and the relationship to origination policy distribution.</t>

</section>
<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="overview"><name>Overview</name>

<section anchor="the-vesper-delegate-certificate"><name>The VESPER Delegate Certificate</name>

<t>The VESPER framework is built around a delegate certificate issued to the entity that holds the right-to-use for one or more telephone numbers. This certificate is issued under the certificate policy defined in <xref target="RFC8226"/>, whose trust anchors govern the authority chain. The delegate certificate represents the issued credentials that bind telephone number authority to the assigned entity, which also holds domain credentials as a corroborating identity signal. Trust assertions in VESPER are expressions of what is certified in this credential, validated against the trust anchors defined in <xref target="RFC8226"/> through the certificate chain.</t>

<t>The certificate carries the following:</t>

<t><list style="symbols">
  <t>Telephone number authority: one or more telephone numbers (or ranges) in the TNAuthList extension, representing the entity's right-to-use as assigned by a responsible provider or organization. The authority chain is established via a TNAuthList Authority Token issued by that responsible provider or organization and validated through the STI certificate chain.</t>
  <t>Originating provider enablement: one or more service provider codes (SPCs) in the same TNAuthList extension, identifying the originating providers authorized to originate calls from those telephone numbers. Both TN entries and SPC entries <bcp14>MAY</bcp14> appear together in a single TNAuthList, as permitted by <xref target="RFC8226"/>.</t>
  <t>Domain credential: a DNS domain name in the SubjectAltName extension (dNSName), representing a domain the entity controls and for which it holds WebPKI credentials. This domain provides a corroborating identity signal that is independent of the telephone number ecosystem and enables certificate discovery via the repository defined in this document.</t>
  <t>Optional claim constraints: JWTClaimConstraints <xref target="RFC8226"/> and/or EnhancedJWTClaimConstraints <xref target="RFC9118"/> extensions, authorizing additional PASSporT claims (such as Rich Call Data) and optionally constraining their values. These constraints are backed by a JWTClaimConstraints Authority Token issued in accordance with <xref target="I-D.ietf-acme-authority-token-jwtclaimcon"/>.</t>
  <t>Transparency: a Signed Certificate Timestamp (SCT) embedded in the certificate, proving that the certificate was submitted to and recorded in a transparency log before use.</t>
</list></t>

<t>Short-lived certificates <bcp14>MUST</bcp14> be used. Implementations <bcp14>MUST</bcp14> support the profile in <xref target="I-D.ietf-stir-certificates-shortlived"/> and <bcp14>MUST</bcp14> convey the certificate chain inline using the <spanx style="verb">x5c</spanx> header parameter and <bcp14>MUST</bcp14> include the <spanx style="verb">x5u</spanx> header parameter referencing the certificate at its domain-controlled repository location.</t>

</section>
<section anchor="domain-as-a-corroborating-trust-credential"><name>Domain as a Corroborating Trust Credential</name>

<t>Prior STIR specifications establish telephone number authority through the TNAuthList but do not bind that authority to the real-world entity to which the number was assigned. VESPER addresses this by also recording a domain credential held by that entity, a domain the entity controls and for which it holds WebPKI certificate credentials.</t>

<t>The domain in the delegate certificate SubjectAltName corresponds to a domain the entity controls. Control of that domain, established through the entity's ability to obtain certificate credentials for it, provides a corroborating identity signal that is independent of the telephone number ecosystem. When a relying party validates a VESPER delegate certificate, it obtains verifiable evidence that a specific entity, which holds those domain credentials, has been assigned the telephone numbers in the certificate by a responsible provider or organization.</t>

</section>
<section anchor="user-identity-and-delegation"><name>User Identity and Delegation</name>

<t>The VESPER delegate certificate authorizes the entity that holds it to use the telephone numbers it contains. Within that entity, individual users or automated agents may be further authorized to originate communications using those numbers through mechanisms defined by the entity's own governance, such as sub-credentials or access control policies, without those individuals being identified in the delegate certificate itself. A single telephone number may be authorized for use by multiple users or agents, as is common in shared lines and call center deployments. The delegate certificate identifies the entity that holds the right-to-use for the telephone numbers it contains, not the individual users or agents originating communications on behalf of that entity. Where caller identity at the individual level is desired, mechanisms such as Rich Call Data <xref target="RFC9795"/> or other PASSporT extensions provide optional paths for conveying that information.</t>

</section>
<section anchor="certificate-repository-and-domain-controlled-certificate-discovery"><name>Certificate Repository and Domain-Controlled Certificate Discovery</name>

<t>An entity that holds a VESPER delegate certificate <bcp14>MUST</bcp14> publish that certificate at a stable HTTPS location under its domain. The specific path is not prescribed; any HTTPS URL whose domain matches the dNSName SubjectAltName of the delegate certificate is valid. The TLS certificate on the hosting server <bcp14>MUST</bcp14> match the dNSName SubjectAltName of the VESPER delegate certificate, validated through standard WebPKI TLS. No cross-signing between the STI delegate certificate and the web TLS certificate is required or defined.</t>

<t>This specification defines two token representations derived from the delegate certificate: a PASSporT as defined in <xref target="RFC8225"/> for use in SIP signaling, and a basic JWT form that provides portable proof of right-to-use for a telephone number in contexts outside of SIP signaling, such as cases where a traditional letter of authorization or other evidence of TN association is required. Each is defined in detail in the sections below.</t>

</section>
</section>
<section anchor="vesper-roles-and-certificate-issuance"><name>VESPER Roles and Certificate Issuance</name>

<section anchor="roles"><name>Roles</name>

<t>The VESPER framework defines the following functional roles.</t>

<t><list style="numbers" type="1">
  <t>Domain Operator: the entity that controls a domain and holds the right-to-use for one or more telephone numbers. The Domain Operator is the subject of the VESPER delegate certificate, publishes the certificate at a stable HTTPS location under its domain, and uses the delegate certificate's private key to sign PASSporTs and RTU Tokens.</t>
  <t>Right-to-Use (RTU) Authority: the responsible provider or organization that allocates telephone numbers and issues TNAuthList Authority Tokens as RTU evidence for delegate certificate issuance (e.g., a TNSP or RespOrg).</t>
  <t>STI Certification Authority (STI CA): issues VESPER delegate certificates after validating RTU evidence and domain association, operating under the certificate policy defined in <xref target="RFC8226"/>.</t>
  <t>Transparency Log Operator: records issued delegate certificates and returns SCTs to support ecosystem auditability and detection of mis-issuance.</t>
</list></t>

</section>
<section anchor="delegate-certificate-issuance-process"><name>Delegate Certificate Issuance Process</name>

<t>In the VESPER framework, a delegate certificate is issued through the following sequence:</t>

<t><list style="numbers" type="1">
  <t>The RTU Authority produces a TNAuthList Authority Token representing the right-to-use for the telephone number(s) being assigned. The STI CA operates under a certificate policy that recognizes the RTU Authority's authority to make this assignment.</t>
  <t>The certificate subject generates a CSR and presents it to the STI CA along with the TNAuthList Authority Token, validated via ACME mechanisms as defined in <xref target="RFC9447"/>, <xref target="RFC9448"/>, and <xref target="I-D.ietf-acme-authority-token-jwtclaimcon"/>. If additional PASSporT claims are to be authorized (e.g., Rich Call Data <xref target="RFC9795"/>), a JWTClaimConstraints Authority Token <xref target="I-D.ietf-acme-authority-token-jwtclaimcon"/> is also presented; the STI CA <bcp14>MUST NOT</bcp14> widen the constraints specified in that token.</t>
  <t>Upon successful validation, the STI CA issues a delegate certificate. STI CAs <bcp14>SHOULD</bcp14> issue short-lived certificates as specified in <xref target="I-D.ietf-stir-certificates-shortlived"/>, and subjects <bcp14>SHOULD</bcp14> automate renewal.</t>
  <t>The issued certificate <bcp14>MUST</bcp14> be submitted to a transparency log as defined in <xref target="I-D.ietf-stir-certificate-transparency"/>. The resulting SCT <bcp14>MUST</bcp14> be embedded in the certificate prior to deployment.</t>
</list></t>

<t>The issued delegate certificate <bcp14>MUST</bcp14> include:</t>

<t><list style="symbols">
  <t>A TNAuthList extension <xref target="RFC8226"/>, representing the telephone number(s) the certificate holder is authorized to use and, where applicable, the SPC(s) of authorized originating providers. TN entries and SPC entries <bcp14>MAY</bcp14> appear together in a single TNAuthList extension.</t>
</list></t>

<t>If the certificate is intended to authorize additional PASSporT claims beyond <xref target="RFC8225"/>, it <bcp14>MUST</bcp14> also include:</t>

<t><list style="symbols">
  <t>A JWTClaimConstraints extension <xref target="RFC8226"/> and/or EnhancedJWTClaimConstraints extension <xref target="RFC9118"/>.</t>
</list></t>

</section>
<section anchor="vesper-certificate-profile"><name>VESPER Certificate Profile</name>

<t>VESPER delegate certificates <bcp14>MUST</bcp14> conform to the STIR certificate profile in <xref target="RFC8226"/> and <bcp14>MUST</bcp14> support the short-lived certificate profile in <xref target="I-D.ietf-stir-certificates-shortlived"/>. The certificate <bcp14>MUST</bcp14> contain the following:</t>

<t><list style="symbols">
  <t>Subject: <bcp14>SHOULD</bcp14> include an Organization (O) field reflecting the entity's name.</t>
  <t>SubjectAltName: <bcp14>MUST</bcp14> include a dNSName entry carrying the entity's domain. This domain <bcp14>MUST</bcp14> be DNS-resolvable and <bcp14>MUST</bcp14> match the domain of the certificate repository host.</t>
  <t>TNAuthList <xref target="RFC8226"/>: <bcp14>MUST</bcp14> include one or more TN entries representing telephone numbers assigned to the certificate subject, and <bcp14>MAY</bcp14> include one or more SPC entries identifying authorized originating providers. TN and SPC entries <bcp14>MAY</bcp14> appear together in a single TNAuthList extension.</t>
  <t>SCT: <bcp14>MUST</bcp14> include an embedded Signed Certificate Timestamp as defined in <xref target="I-D.ietf-stir-certificate-transparency"/>, proving the certificate was submitted to a transparency log prior to deployment. Relying parties <bcp14>MUST</bcp14> validate the embedded SCT as part of certificate validation.</t>
  <t>JWTClaimConstraints <xref target="RFC8226"/> and/or EnhancedJWTClaimConstraints <xref target="RFC9118"/> (<bcp14>OPTIONAL</bcp14>): <bcp14>MUST</bcp14> be present if the certificate is intended to authorize PASSporT claims beyond <xref target="RFC8225"/>. The STI CA <bcp14>MUST NOT</bcp14> widen the constraints specified in the JWTClaimConstraints Authority Token.</t>
</list></t>

<t>CAs <bcp14>SHOULD</bcp14> issue certificates with short validity intervals as specified in <xref target="I-D.ietf-stir-certificates-shortlived"/>, and subjects <bcp14>SHOULD</bcp14> automate renewal.</t>

</section>
<section anchor="vesper-authentication-and-verification-procedures"><name>VESPER Authentication and Verification Procedures</name>

<t>These procedures extend the baseline STIR authentication and verification models defined in <xref target="RFC8224"/>, <xref target="RFC8225"/>, and <xref target="RFC8226"/>.</t>

<section anchor="authentication-service-behavior"><name>Authentication Service Behavior</name>

<t>When originating a call or message, the Authentication Service:</t>

<t><list style="symbols">
  <t>Constructs a PASSporT containing <spanx style="verb">orig</spanx>, <spanx style="verb">dest</spanx>, <spanx style="verb">iat</spanx>, and any optional claims authorized by JWTClaimConstraints in the certificate.</t>
  <t>Signs the PASSporT using a VESPER delegate certificate whose TNAuthList authorizes the <spanx style="verb">orig</spanx> telephone number and that contains an embedded SCT.</t>
  <t>Conveys the certificate chain inline using the <spanx style="verb">x5c</spanx> header parameter.</t>
  <t>Includes the <spanx style="verb">x5u</spanx> header parameter containing the HTTPS URL of the delegate certificate at its location in the domain-controlled repository.</t>
</list></t>

</section>
<section anchor="verification-service-behavior"><name>Verification Service Behavior</name>

<t>Upon receiving a PASSporT, the Verification Service <bcp14>MUST</bcp14>:</t>

<t><list style="symbols">
  <t>Validate the PASSporT signature.</t>
  <t>Validate the certificate trust chain against the trust anchors defined in <xref target="RFC8226"/> using the <spanx style="verb">x5c</spanx> header parameter.</t>
  <t>Confirm the TNAuthList extension authorizes the <spanx style="verb">orig</spanx> telephone number.</t>
  <t>Validate the embedded SCT.</t>
  <t>If JWTClaimConstraints or EnhancedJWTClaimConstraints extensions are present, verify that all asserted claims conform to those constraints.</t>
  <t>Confirm that the domain in the <spanx style="verb">x5u</spanx> URL matches the dNSName SubjectAltName of the signing certificate.</t>
</list></t>

<t>The PASSporT <bcp14>MUST</bcp14> be rejected if any of the above checks fail.</t>

</section>
<section anchor="connected-identity"><name>Connected Identity</name>

<t>When VESPER is used with Connected Identity <xref target="I-D.ietf-stir-rfc4916-update"/>, the destination party returns a PASSporT of type <spanx style="verb">rsp</spanx> in a SIP 200 OK, signed using a VESPER delegate certificate authorized for the <spanx style="verb">dest</spanx> telephone number. The <spanx style="verb">rsp</spanx> PASSporT <bcp14>MUST</bcp14> include the original <spanx style="verb">orig</spanx> and <spanx style="verb">dest</spanx> values and a fresh <spanx style="verb">iat</spanx>. The originating party <bcp14>MUST</bcp14> verify the <spanx style="verb">rsp</spanx> PASSporT using the same certificate validation steps above, applied to the <spanx style="verb">dest</spanx> telephone number and the destination party's certificate.</t>

</section>
</section>
</section>
<section anchor="rtu-token"><name>RTU Token</name>

<t>The RTU Token is a JWT <xref target="RFC7519"/> signed by the private key of the VESPER delegate certificate, with the certificate chain conveyed in the JOSE header using the <spanx style="verb">x5c</spanx> parameter. The delegate certificate is the primary trust artifact; the RTU Token signature demonstrates that the presenter holds the corresponding private key. The token is intended for distribution contexts where portable evidence of right-to-use is needed outside of SIP signaling.</t>

<t>The RTU Token <bcp14>MUST</bcp14> include:</t>

<t><list style="symbols">
  <t><spanx style="verb">iss</spanx>: the entity's domain (matching the dNSName SubjectAltName of the signing certificate)</t>
  <t><spanx style="verb">iat</spanx>, <spanx style="verb">exp</spanx>: issuance and expiration times; <spanx style="verb">exp</spanx> <bcp14>SHOULD</bcp14> be set to a short validity interval to limit the replay surface</t>
  <t><spanx style="verb">orig</spanx>: the telephone number being asserted, consistent with the TNAuthList of the signing certificate</t>
</list></t>

<t>The token <bcp14>MAY</bcp14> include additional claims authorized by the JWTClaimConstraints extension of the signing certificate (e.g., Rich Call Data <xref target="RFC9795"/>).</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>VESPER provides verifiable evidence that an entity authorized to use one or more telephone numbers has signed a communication, with the delegate certificate serving as the primary trust artifact. The primary security properties are: prevention of unauthorized parties from asserting telephone number authority; prevention of over-claiming beyond what the certificate authorizes; and ecosystem auditability through certificate transparency.</t>

<t>The certificate repository <bcp14>MUST</bcp14> be served over HTTPS and implementations <bcp14>SHOULD</bcp14> apply rate limiting to reduce the effectiveness of automated probing. The <spanx style="verb">x5u</spanx> URL in PASSporT headers <bcp14>MUST</bcp14> reference the certificate at its domain-controlled repository location; Verification Services <bcp14>MUST</bcp14> confirm the domain in the <spanx style="verb">x5u</spanx> URL matches the dNSName SubjectAltName of the signing certificate, providing proof of domain control without requiring a network fetch. The embedded SCT <bcp14>MUST</bcp14> be validated as defined in <xref target="I-D.ietf-stir-certificate-transparency"/> to confirm the certificate was publicly recorded before use. Short-lived certificates reduce dependence on revocation; relying parties <bcp14>MUST</bcp14> enforce certificate validity windows and <bcp14>SHOULD</bcp14> enforce freshness checks on PASSporT <spanx style="verb">iat</spanx> claims using existing STIR replay mitigations.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document defines no new IANA registrations. VESPER uses existing PASSporT claims defined in <xref target="RFC8225"/> and certificate extensions defined in <xref target="RFC8226"/> and <xref target="RFC9118"/>.</t>

</section>
<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>The authors would like to acknowledge Jon Peterson for valuable feedback on this document, and the STIR working group for the foundational specifications on which VESPER builds.</t>

</section>


  </middle>

  <back>



    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC8224">
  <front>
    <title>Authenticated Identity Management in the Session Initiation Protocol (SIP)</title>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <author fullname="C. Jennings" initials="C." surname="Jennings"/>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <author fullname="C. Wendt" initials="C." surname="Wendt"/>
    <date month="February" year="2018"/>
    <abstract>
      <t>The baseline security mechanisms in the Session Initiation Protocol (SIP) are inadequate for cryptographically assuring the identity of the end users that originate SIP requests, especially in an interdomain context. This document defines a mechanism for securely identifying originators of SIP requests. It does so by defining a SIP header field for conveying a signature used for validating the identity and for conveying a reference to the credentials of the signer.</t>
      <t>This document obsoletes RFC 4474.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8224"/>
  <seriesInfo name="DOI" value="10.17487/RFC8224"/>
</reference>
<reference anchor="RFC8225">
  <front>
    <title>PASSporT: Personal Assertion Token</title>
    <author fullname="C. Wendt" initials="C." surname="Wendt"/>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <date month="February" year="2018"/>
    <abstract>
      <t>This document defines a method for creating and validating a token that cryptographically verifies an originating identity or, more generally, a URI or telephone number representing the originator of personal communications. The Personal Assertion Token, PASSporT, is cryptographically signed to protect the integrity of the identity of the originator and to verify the assertion of the identity information at the destination. The cryptographic signature is defined with the intention that it can confidently verify the originating persona even when the signature is sent to the destination party over an insecure channel. PASSporT is particularly useful for many personal-communications applications over IP networks and other multi-hop interconnection scenarios where the originating and destination parties may not have a direct trusted relationship.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8225"/>
  <seriesInfo name="DOI" value="10.17487/RFC8225"/>
</reference>
<reference anchor="RFC8226">
  <front>
    <title>Secure Telephone Identity Credentials: Certificates</title>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <author fullname="S. Turner" initials="S." surname="Turner"/>
    <date month="February" year="2018"/>
    <abstract>
      <t>In order to prevent the impersonation of telephone numbers on the Internet, some kind of credential system needs to exist that cryptographically asserts authority over telephone numbers. This document describes the use of certificates in establishing authority over telephone numbers, as a component of a broader architecture for managing telephone numbers as identities in protocols like SIP.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8226"/>
  <seriesInfo name="DOI" value="10.17487/RFC8226"/>
</reference>
<reference anchor="RFC9118">
  <front>
    <title>Enhanced JSON Web Token (JWT) Claim Constraints for Secure Telephone Identity Revisited (STIR) Certificates</title>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <date month="August" year="2021"/>
    <abstract>
      <t>RFC 8226 specifies the use of certificates for Secure Telephone Identity Credentials; these certificates are often called "Secure Telephone Identity Revisited (STIR) Certificates". RFC 8226 provides a certificate extension to constrain the JSON Web Token (JWT) claims that can be included in the Personal Assertion Token (PASSporT), as defined in RFC 8225. If the PASSporT signer includes a JWT claim outside the constraint boundaries, then the PASSporT recipient will reject the entire PASSporT. This document updates RFC 8226; it provides all of the capabilities available in the original certificate extension as well as an additional way to constrain the allowable JWT claims. The enhanced extension can also provide a list of claims that are not allowed to be included in the PASSporT.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9118"/>
  <seriesInfo name="DOI" value="10.17487/RFC9118"/>
</reference>
<reference anchor="RFC9447">
  <front>
    <title>Automated Certificate Management Environment (ACME) Challenges Using an Authority Token</title>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <author fullname="M. Barnes" initials="M." surname="Barnes"/>
    <author fullname="D. Hancock" initials="D." surname="Hancock"/>
    <author fullname="C. Wendt" initials="C." surname="Wendt"/>
    <date month="September" year="2023"/>
    <abstract>
      <t>Some proposed extensions to the Automated Certificate Management Environment (ACME) rely on proving eligibility for certificates through consulting an external authority that issues a token according to a particular policy. This document specifies a generic Authority Token Challenge for ACME that supports subtype claims for different identifiers or namespaces that can be defined separately for specific applications.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9447"/>
  <seriesInfo name="DOI" value="10.17487/RFC9447"/>
</reference>
<reference anchor="RFC9448">
  <front>
    <title>TNAuthList Profile of Automated Certificate Management Environment (ACME) Authority Token</title>
    <author fullname="C. Wendt" initials="C." surname="Wendt"/>
    <author fullname="D. Hancock" initials="D." surname="Hancock"/>
    <author fullname="M. Barnes" initials="M." surname="Barnes"/>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <date month="September" year="2023"/>
    <abstract>
      <t>This document defines a profile of the Automated Certificate Management Environment (ACME) Authority Token for the automated and authorized creation of certificates for Voice over IP (VoIP) telephone providers to support Secure Telephone Identity (STI) using the TNAuthList defined by STI certificates.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9448"/>
  <seriesInfo name="DOI" value="10.17487/RFC9448"/>
</reference>
<reference anchor="RFC9795">
  <front>
    <title>Personal Assertion Token (PASSporT) Extension for Rich Call Data</title>
    <author fullname="C. Wendt" initials="C." surname="Wendt"/>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <date month="July" year="2025"/>
    <abstract>
      <t>This document extends Personal Assertion Token (PASSporT), a token for conveying cryptographically signed call information about personal communications, to include rich metadata about a call and caller that can be signed and integrity protected, transmitted, and subsequently rendered to the called party. This framework is intended to include and extend caller- and call-specific information beyond human-readable display name, comparable to the "Caller ID" function common on the telephone network. It is also enhanced with an integrity mechanism that is designed to protect the authoring and transport of this information for different authoritative use cases.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9795"/>
  <seriesInfo name="DOI" value="10.17487/RFC9795"/>
</reference>
<reference anchor="RFC7519">
  <front>
    <title>JSON Web Token (JWT)</title>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <author fullname="J. Bradley" initials="J." surname="Bradley"/>
    <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
    <date month="May" year="2015"/>
    <abstract>
      <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7519"/>
  <seriesInfo name="DOI" value="10.17487/RFC7519"/>
</reference>

<reference anchor="I-D.ietf-stir-rfc4916-update">
   <front>
      <title>Connected Identity for STIR</title>
      <author fullname="Jon Peterson" initials="J." surname="Peterson">
         <organization>TransUnion</organization>
      </author>
      <author fullname="Chris Wendt" initials="C." surname="Wendt">
         <organization>Somos</organization>
      </author>
      <date day="7" month="July" year="2025"/>
      <abstract>
	 <t>   The Session Initiation Protocol (SIP) Identity header field conveys
   cryptographic identity information about the originators of SIP
   requests.  The Secure Telephone Identity Revisited (STIR) framework,
   however, provides no means for determining the identity of the called
   party in a traditional telephone-calling scenario.  This document
   updates prior guidance on the &quot;connected identity&quot; problem to reflect
   the changes to SIP Identity that accompanied STIR, and considers a
   revised problem space for connected identity as a means of detecting
   calls that have been retargeted to a party impersonating the intended
   destination, as well as the spoofing of mid-dialog or dialog-
   terminating events by intermediaries or third parties.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-stir-rfc4916-update-07"/>
   
</reference>

<reference anchor="I-D.ietf-acme-authority-token-jwtclaimcon">
   <front>
      <title>JWTClaimConstraints profile of ACME Authority Token</title>
      <author fullname="Chris Wendt" initials="C." surname="Wendt">
         <organization>Somos Inc.</organization>
      </author>
      <author fullname="David Hancock" initials="D." surname="Hancock">
         <organization>Somos Inc.</organization>
      </author>
      <date day="26" month="March" year="2026"/>
      <abstract>
	 <t>   This document defines an authority token profile for the validation
   of JWTClaimConstraints and EnhancedJWTClaimConstraints certificate
   extensions within the Automated Certificate Management Environment
   (ACME) protocol.  This profile is based on the Authority Token
   framework and establishes the specific ACME identifier type,
   challenge mechanism, and token format necessary to authorize a client
   to request a certificate containing these constraints.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-acme-authority-token-jwtclaimcon-01"/>
   
</reference>

<reference anchor="I-D.ietf-stir-certificates-shortlived">
   <front>
      <title>Short-Lived Certificates for Secure Telephone Identity</title>
      <author fullname="Jon Peterson" initials="J." surname="Peterson">
         <organization>TransUnion</organization>
      </author>
      <date day="4" month="November" year="2025"/>
      <abstract>
	 <t>   When certificates are used as credentials to attest the assignment of
   ownership of telephone numbers, some mechanism is required to provide
   certificate freshness.  This document specifies short-lived
   certificates as a means of guaranteeing certificate freshness for
   secure telephone identity (STIR), potentially relying on the
   Automated Certificate Management Environment (ACME) or similar
   mechanisms to allow signers to acquire certificates as needed.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-stir-certificates-shortlived-04"/>
   
</reference>

<reference anchor="I-D.ietf-stir-certificate-transparency">
   <front>
      <title>STI Certificate Transparency</title>
      <author fullname="Chris Wendt" initials="C." surname="Wendt">
         <organization>Somos, Inc.</organization>
      </author>
      <author fullname="Robert Śliwa" initials="R." surname="Śliwa">
         <organization>Somos, Inc.</organization>
      </author>
      <author fullname="Alec Fenichel" initials="A." surname="Fenichel">
         <organization>TransNexus</organization>
      </author>
      <author fullname="Vinit Anil Gaikwad" initials="V. A." surname="Gaikwad">
         <organization>Twilio</organization>
      </author>
      <date day="23" month="November" year="2025"/>
      <abstract>
	 <t>   This document describes a framework for the use of the Certificate
   Transparency (CT) protocol for publicly logging the existence of
   Secure Telephone Identity (STI) certificates as they are issued or
   observed.  This allows any interested party that is part of the STI
   eco-system to audit STI certification authority (CA) activity and
   audit both the issuance of suspect certificates and the certificate
   logs themselves.  The intent is for the establishment of a level of
   trust in the STI eco-system that depends on the verification of
   telephone numbers requiring and refusing to honor STI certificates
   that do not appear in a established log.  This effectively
   establishes the precedent that STI CAs must add all issued
   certificates to the logs and thus establishes unique association of
   STI certificates to an authorized provider or assignee of a telephone
   number resource.  The primary role of CT in the STI ecosystem is for
   verifiable trust in the avoidance of issuance of unauthorized
   duplicate telephone number level delegate certificates or provider
   level certificates.  This provides a robust auditable mechanism for
   the detection of unauthorized creation of certificate credentials for
   illegitimate spoofing of telephone numbers or service provider codes
   (SPC).

   The framework borrows the log structure and API model from RFC6962 to
   enable public auditing and verifiability of certificate issuance.
   While the foundational mechanisms for log operation, Merkle Tree
   construction, and Signed Certificate Timestamps (SCTs) are aligned
   with RFC6962, this document contextualizes their application in the
   STIR eco-system, focusing on verifiable control over telephone number
   or service provider code resources.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-stir-certificate-transparency-01"/>
   
</reference>
<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>



    </references>





  </back>

<!-- ##markdown-source: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-->

</rfc>

