| < draft-ietf-stir-servprovider-oob-01.txt | draft-ietf-stir-servprovider-oob-02.txt > | |||
|---|---|---|---|---|
| Network Working Group J. Peterson | Network Working Group J. Peterson | |||
| Internet-Draft Neustar | Internet-Draft Neustar | |||
| Intended status: Informational February 22, 2021 | Intended status: Informational 21 April 2022 | |||
| Expires: August 26, 2021 | Expires: 23 October 2022 | |||
| Out-of-Band STIR for Service Providers | Out-of-Band STIR for Service Providers | |||
| draft-ietf-stir-servprovider-oob-01 | draft-ietf-stir-servprovider-oob-02 | |||
| Abstract | Abstract | |||
| The Secure Telephone Identity Revisited (STIR) framework defines | The Secure Telephone Identity Revisited (STIR) framework defines | |||
| means of carrying its Persona Assertion Tokens (PASSporTs) either in- | means of carrying its Persona Assertion Tokens (PASSporTs) either in- | |||
| band, within the headers of a SIP request, or out-of-band, through a | band, within the headers of a SIP request, or out-of-band, through a | |||
| service that stores PASSporTs for retrieval by relying parties. This | service that stores PASSporTs for retrieval by relying parties. This | |||
| specification defines a way that the out-of-band conveyance of | specification defines a way that the out-of-band conveyance of | |||
| PASSporTs can be used to support large service providers, for cases | PASSporTs can be used to support large service providers, for cases | |||
| in which in-band STIR conveyance is not universally available. | in which in-band STIR conveyance is not universally available. | |||
| skipping to change at page 1, line 36 ¶ | skipping to change at page 1, line 36 ¶ | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at https://datatracker.ietf.org/drafts/current/. | Drafts is at https://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on August 26, 2021. | This Internet-Draft will expire on 23 October 2022. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2021 IETF Trust and the persons identified as the | Copyright (c) 2022 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents (https://trustee.ietf.org/ | |||
| (https://trustee.ietf.org/license-info) in effect on the date of | license-info) in effect on the date of publication of this document. | |||
| publication of this document. Please review these documents | Please review these documents carefully, as they describe your rights | |||
| carefully, as they describe your rights and restrictions with respect | and restrictions with respect to this document. Code Components | |||
| to this document. Code Components extracted from this document must | extracted from this document must include Revised BSD License text as | |||
| include Simplified BSD License text as described in Section 4.e of | described in Section 4.e of the Trust Legal Provisions and are | |||
| the Trust Legal Provisions and are provided without warranty as | provided without warranty as described in the Revised BSD License. | |||
| described in the Simplified BSD License. | ||||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | |||
| 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3 | 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 3. Service Provider Deployment Architecture for Out-of-Band STIR 3 | 3. Service Provider Deployment Architecture for Out-of-Band | |||
| 4. Advertising a CPS . . . . . . . . . . . . . . . . . . . . . . 3 | STIR . . . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 4. Advertising a CPS . . . . . . . . . . . . . . . . . . . . . . 4 | ||||
| 5. Submitting a PASSporT . . . . . . . . . . . . . . . . . . . . 5 | 5. Submitting a PASSporT . . . . . . . . . . . . . . . . . . . . 5 | |||
| 6. PASSporT Retrieval . . . . . . . . . . . . . . . . . . . . . 6 | 6. PASSporT Retrieval . . . . . . . . . . . . . . . . . . . . . 6 | |||
| 7. Gateways . . . . . . . . . . . . . . . . . . . . . . . . . . 7 | 7. Gateways . . . . . . . . . . . . . . . . . . . . . . . . . . 7 | |||
| 8. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 7 | 8. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 7 | |||
| 9. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 7 | 9. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 7 | |||
| 10. Security Considerations . . . . . . . . . . . . . . . . . . . 7 | 10. Security Considerations . . . . . . . . . . . . . . . . . . . 8 | |||
| 11. Informative References . . . . . . . . . . . . . . . . . . . 7 | 11. References . . . . . . . . . . . . . . . . . . . . . . . . . 8 | |||
| Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 9 | 11.1. Normative References . . . . . . . . . . . . . . . . . . 8 | |||
| 11.2. Informative References . . . . . . . . . . . . . . . . . 9 | ||||
| Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 10 | ||||
| 1. Introduction | 1. Introduction | |||
| STIR [RFC8224] provides a cryptographic assurance of the identity of | STIR [RFC8224] provides a cryptographic assurance of the identity of | |||
| calling parties in order to prevent impersonation, which is a key | calling parties in order to prevent impersonation, which is a key | |||
| enabler of unwanted robocalls, swatting, vishing, voicemail hacking, | enabler of unwanted robocalls, swatting, vishing, voicemail hacking, | |||
| and similar attacks (see [RFC7340]). The STIR out-of-band | and similar attacks (see [RFC7340]). The STIR out-of-band [RFC8816] | |||
| [I-D.ietf-stir-oob] framework enables the delivery of PASSporT | framework enables the delivery of PASSporT [RFC8225] objects through | |||
| [RFC8225] objects through a Call Placement Service (CPS), rather than | a Call Placement Service (CPS), rather than carrying them within a | |||
| carrying them within a signaling protocol such as SIP. Out-of-band | signaling protocol such as SIP. Out-of-band conveyance is valuable | |||
| conveyance is valuable when end-to-end SIP delivery of calls is | when end-to-end SIP delivery of calls is partly or entirely | |||
| partly or entirely unavailable due to network border policies, calls | unavailable due to network border policies, calls routinely | |||
| routinely transitting a gateway to the PSTN, or similar | transitting a gateway to the PSTN, or similar circumstances. | |||
| circumstances. | ||||
| While out-of-band STIR can be implemented as an open Internet | While out-of-band STIR can be implemented as an open Internet | |||
| service, it then requires complex security measures to enable the CPS | service, it then requires complex security measures to enable the CPS | |||
| function without allowing the CPS to collect data about the parties | function without allowing the CPS to collect data about the parties | |||
| placing calls. This specification describes CPS implementations that | placing calls. This specification describes CPS implementations that | |||
| act specifically on behalf of service providers who will be | act specifically on behalf of service providers who will be | |||
| processing the calls that STIR secures, and who thus will learn about | processing the calls that STIR secures, and who thus will learn about | |||
| the parties to communication independently, so an alternative | the parties to communication independently, so an alternative | |||
| security architecture becomes possible. These functions may be | security architecture becomes possible. These functions may be | |||
| crucial to the adoption of STIR in some environments, like mobile | crucial to the adoption of STIR in some environments, like mobile | |||
| skipping to change at page 3, line 33 ¶ | skipping to change at page 3, line 50 ¶ | |||
| third party could operate the CPS on the destination's behalf. This | third party could operate the CPS on the destination's behalf. This | |||
| model does not assume a monolithic CPS that acts on behalf of all | model does not assume a monolithic CPS that acts on behalf of all | |||
| service providers, but nor does it prohibit multiple service | service providers, but nor does it prohibit multiple service | |||
| providers from sharing a CPS provider. Moreover, a particular CPS | providers from sharing a CPS provider. Moreover, a particular CPS | |||
| can be a logically distributed entity compromised of several | can be a logically distributed entity compromised of several | |||
| geographically distant entities that flood PASSporTs among themselves | geographically distant entities that flood PASSporTs among themselves | |||
| to support an anycast-like service. | to support an anycast-like service. | |||
| The process of locating a destination CPS and submitting a PASSporT | The process of locating a destination CPS and submitting a PASSporT | |||
| naturally requires Internet connectivity to the CPS. If the CPS is | naturally requires Internet connectivity to the CPS. If the CPS is | |||
| deployed in the terminating service provider network, that network | deployed in the terminating service provider network, any such | |||
| connectivity could be leveraged by a caller to initiate a SIP | network connectivity could instead be leveraged by a caller to | |||
| session, during which in-band STIR could be used normally. The | initiate a SIP session, during which in-band STIR could be used | |||
| applicability of this architecture is therefore to those cases where, | normally. The applicability of this architecture is therefore to | |||
| for whatever reason, SIP requests cannot reliably convey PASSporTs | those cases where, for whatever reason, SIP requests cannot reliably | |||
| end-to-end, but an HTTP transaction can reliably be sent to the | convey PASSporTs end-to-end, but an HTTP transaction can reliably be | |||
| destination network from the out-of-band authentication service (OOB- | sent to the CPS from the out-of-band authentication service (OOB-AS). | |||
| AS). It is hoped that as IP connectivity between telephone providers | It is hoped that as IP connectivity between telephone providers | |||
| increases, there will be less need for an out-of-band mechanism, but | increases, there will be less need for an out-of-band mechanism, but | |||
| it can serve as a fallback mechanism in cases where service providers | it can serve as a fallback mechanism in cases where service providers | |||
| cannot predict whether end-to-end delivery of SIP calls will occur. | cannot predict whether end-to-end delivery of SIP calls will occur. | |||
| 4. Advertising a CPS | 4. Advertising a CPS | |||
| If more than one CPS exists for a given deployment, there will need | If more than one CPS exists for a given deployment, there will need | |||
| to be some means of discovering CPSs, either administratively or | to be some means of discovering CPSs, either administratively or | |||
| programmatically. Many services providers have bilateral agreements | programmatically. Many services providers have bilateral agreements | |||
| to peer with one another, and in those environments, identifying | to peer with one another, and in those environments, identifying | |||
| skipping to change at page 5, line 8 ¶ | skipping to change at page 5, line 25 ¶ | |||
| these certificates are themselves signed by a CA, and contain their | these certificates are themselves signed by a CA, and contain their | |||
| own TNAuthList, the URI would be bound securely to the proper | own TNAuthList, the URI would be bound securely to the proper | |||
| telephone network identifiers. As STIR assumes a community of | telephone network identifiers. As STIR assumes a community of | |||
| relying parties who trust these credentials, this method perhaps best | relying parties who trust these credentials, this method perhaps best | |||
| mirrors the trust model required to allow a CPS to authorize PASSporT | mirrors the trust model required to allow a CPS to authorize PASSporT | |||
| submission and retrieval. | submission and retrieval. | |||
| 5. Submitting a PASSporT | 5. Submitting a PASSporT | |||
| Submitting a PASSporT to a CPS as specified in the STIR out-of-band | Submitting a PASSporT to a CPS as specified in the STIR out-of-band | |||
| framework [I-D.ietf-stir-oob] requires security measures which are | framework [RFC8816] requires security measures which are intended to | |||
| intended to prevent the CPS from learning the identity of the caller | prevent the CPS from learning the identity of the caller (or callee), | |||
| (or callee), to the degree possible. In this service provider case, | to the degree possible. In this service provider case, however, the | |||
| however, the CPS is operated by the service provider of the callee | CPS is operated by the service provider of the callee (or an entity | |||
| (or an entity operating on their behalf), and as such the information | operating on their behalf), and as such the information that appears | |||
| that appears in the PASSporT is redundant with call signaling that | in the PASSporT is redundant with call signaling that the terminating | |||
| the terminating party will receive anyway. Therefore, the service | party will receive anyway. Therefore, the service provider out-of- | |||
| provider out-of-band framework does not attempt to conceal the | band framework does not attempt to conceal the identity of the | |||
| identity of the originating or terminating party from the CPS. | originating or terminating party from the CPS. | |||
| An out-of-band authentication service (OOB-AS) forms a secure | An out-of-band authentication service (OOB-AS) forms a secure | |||
| connection with the target CPS. This may happen at the time a call | connection with the target CPS. This may happen at the time a call | |||
| is being placed, or it may be a persistent connection, if there is a | is being placed, or it may be a persistent connection, if there is a | |||
| significant volume of traffic sent over this interface. The OOB-AS | significant volume of traffic sent over this interface. The OOB-AS | |||
| SHOULD authenticate itself to the CPS via mutual TLS using its STIR | SHOULD authenticate itself to the CPS via mutual TLS using its STIR | |||
| credential [RFC8226], the same one it would use to sign calls; this | credential [RFC8226], the same one it would use to sign calls; this | |||
| helps mitigate the risk of flooding that more open OOB | helps mitigate the risk of flooding that more open OOB | |||
| implementations may face. Furthermore, use of mutual TLS prevents | implementations may face. Furthermore, use of mutual TLS prevents | |||
| attackers from replaying captured PASSporTs to the CPS. A CPS makes | attackers from replaying captured PASSporTs to the CPS. A CPS makes | |||
| skipping to change at page 5, line 43 ¶ | skipping to change at page 6, line 13 ¶ | |||
| See Section 7 below for more on their behavior. | See Section 7 below for more on their behavior. | |||
| Service provider out-of-band PASSporTs do not need to be encrypted | Service provider out-of-band PASSporTs do not need to be encrypted | |||
| for storage at the CPS, although use of transport-layer security to | for storage at the CPS, although use of transport-layer security to | |||
| prevent eavesdropping on the connection between the CPS and OOB-ASs | prevent eavesdropping on the connection between the CPS and OOB-ASs | |||
| is REQUIRED. PASSporTs will typically be submitted to the CPS at the | is REQUIRED. PASSporTs will typically be submitted to the CPS at the | |||
| time they are created by an AS; if the PASSporT is also being used | time they are created by an AS; if the PASSporT is also being used | |||
| for in-band transit within a SIP request, the PASSporT can be | for in-band transit within a SIP request, the PASSporT can be | |||
| submitted to the CPS before or after the SIP request is sent, at the | submitted to the CPS before or after the SIP request is sent, at the | |||
| discretion of the originating domain. An OOB-AS will use a REST | discretion of the originating domain. An OOB-AS will use a REST | |||
| interface to submit PASSporTs to the CPS as described in | interface to submit PASSporTs to the CPS as described in [RFC8816] | |||
| [I-D.ietf-stir-oob] Section 9 [more TBD]. PASSporTs persist at the | Section 9. PASSporTs persist at the CPS for as long as is required | |||
| CPS for as long as is required for them to be retrieved (see the next | for them to be retrieved (see the next section), but in any event for | |||
| section), but in any event for no longer than the freshness interval | no longer than the freshness interval of the PASSporT itself (a | |||
| of the PASSporT itself (a maximum of sixty seconds). | maximum of sixty seconds). | |||
| 6. PASSporT Retrieval | 6. PASSporT Retrieval | |||
| The STIR out-of-band framework [I-D.ietf-stir-oob] proposes two means | The STIR out-of-band framework [RFC8816] proposes two means that | |||
| that called parties can acquire PASSporTs out-of-band: through a | called parties can acquire PASSporTs out-of-band: through a retrieval | |||
| retrieval interface, or through a subscription interface. In the | interface, or through a subscription interface. In the service | |||
| service provider context, where many calls to or from the same number | provider context, where many calls to or from the same number may | |||
| may pass through a CPS simultaneous, an out-of-band capable | pass through a CPS simultaneously, an out-of-band capable | |||
| verification service may therefore operate in one of two modes: it | verification service (OOB-VS) may therefore operate in one of two | |||
| can either pull PASSporTs from the CPS after calls arrive, or receive | modes: it can either pull PASSporTs from the CPS after calls arrive, | |||
| push notifications from the CPS for incoming calls. | or receive push notifications from the CPS for incoming calls. | |||
| If a CPS serves only one service provider, then all PASSporTs | ||||
| submitted to the CPS are made available to the OOB-VS of that | ||||
| provider; indeed, the CPS and OOB-VS may be colocated or effectively | ||||
| operated as a consolidated system. In a multi-provider environment, | ||||
| the STIR credential of the terminating domain can be used by the CPS | ||||
| to determine the range of TNAuthLists for which an OOB-VS is entitled | ||||
| to receive PASSporTs; this may be through a mechanism like mutual | ||||
| TLS, or through using the STIR credential to sign a token that is | ||||
| submitted to the CPS by the retrieving OOB-VS. Note that a multi- | ||||
| provider CPS will need to inspect the "dest" element of a PASSporT to | ||||
| determine which OOB-VS should receive the PASSporT. | ||||
| [TBD: Which sub/not protocol to use for the case where the CPS and | ||||
| OOB-VS are not composed in a single function?] | ||||
| Pulling of PASSporTs from the CPS will follow the basic REST flow | Pulling of PASSporTs from the CPS will follow the basic REST flow | |||
| described in [I-D.ietf-stir-oob] Section 9. Exactly how a CPS | described in [RFC8816] Section 9. In the pull model, a terminating | |||
| determines which PASSporTs an OOB-VS is eligible to receive is a | service provider polls the CPS via its OOB-VS after having received a | |||
| matter of implementation. An OOB-VS could for example subscribe to a | call for those cases in which the call signaling does not itself | |||
| range of telephone numbers, which will be directed to that OOB-VS by | carry a PASSporT. Exactly how a CPS determines which PASSporTs an | |||
| the CPS (provided the OOB-VS is authorized to receive them by the | OOB-VS is eligible to receive over this interface is a matter of | |||
| CPS). In the pull model, a terminating service provider polls the | local policy. If a CPS serves only one service provider, then all | |||
| CPS via its OOB-VS after having received a call, in those cases where | PASSporTs submitted to the CPS are made available to the OOB-VS of | |||
| the call signaling does not itself carry a PASSporT. In the push | that provider; indeed, the CPS and OOB-VS may be colocated or | |||
| model, a PASSporT might be sent to the OOB-VS either before or after | effectively operated as a consolidated system. In a multi-provider | |||
| unsigned call signaling has been received by the terminating domain. | environment, the STIR credential of the terminating domain can be | |||
| Domains using the push model may therefore need to adopt a model | used by the CPS to determine the range of TNAuthLists for which an | |||
| where the display of call verification for alerting is held | OOB-VS is entitled to receive PASSporTs; this may be through a | |||
| momentarily in order to await the potential arrival of a PASSporT at | mechanism like mutual TLS, or through using the STIR credential to | |||
| the OOB-VS. The exact timing of this, and its interaction with the | sign a token that is submitted to the CPS by the retrieving OOB-VS. | |||
| substitution attack described in [I-D.ietf-stir-oob] Section 7.4, | Note that a multi-provider CPS will need to inspect the "dest" | |||
| will be the covered by future versions of this specification. | element of a PASSporT to determine which OOB-VS should receive the | |||
| PASSporT. | ||||
| In a push model, an OOB-VS could for example subscribe to a range of | ||||
| telephone numbers, which will be directed to that OOB-VS by the CPS | ||||
| (provided the OOB-VS is authorized to receive them by the CPS). | ||||
| PASSporT might be sent to the OOB-VS either before or after unsigned | ||||
| call signaling has been received by the terminating domain. In | ||||
| either model, the terminating side may need to delay rendering a call | ||||
| verification indicator when alerting, in order to await the potential | ||||
| arrival of a PASSporT at the OOB-VS. The exact timing of this, and | ||||
| its interaction with the substitution attack described in [RFC8816] | ||||
| Section 7.4, is left for future work. | ||||
| 7. Gateways | 7. Gateways | |||
| In some deployment architectures, gateways might perform a function | In some deployment architectures, gateways might perform a function | |||
| that interfaces with a CPS for the retrieval or storage of PASSporTs, | that interfaces with a CPS for the retrieval or storage of PASSporTs, | |||
| especially in cases when in-band STIR service providers need to | especially in cases when in-band STIR service providers need to | |||
| exchange secure calls with providers that can only be reached by STIR | exchange secure calls with providers that can only be reached by STIR | |||
| out-of-band. For example, a closed network of in-band STIR providers | out-of-band. For example, a closed network of in-band STIR providers | |||
| may send SIP INVITEs to a gateway in front of a traditional PSTN | may send SIP INVITEs to a gateway in front of a traditional PSTN | |||
| tandem that services a set of legacy service providers. In that | tandem that services a set of legacy service providers. In that | |||
| skipping to change at page 7, line 28 ¶ | skipping to change at page 7, line 34 ¶ | |||
| functions. | functions. | |||
| The simplest way to interface a gateway performing this sort of | The simplest way to interface a gateway performing this sort of | |||
| function for a service provider CPS system is to issue credentials to | function for a service provider CPS system is to issue credentials to | |||
| the gateway that allow it to act on behalf of the legacy service | the gateway that allow it to act on behalf of the legacy service | |||
| providers it supports: this would allow it to both add PASSporTs to | providers it supports: this would allow it to both add PASSporTs to | |||
| the CPS acting on behalf of the legacy providers, and also to create | the CPS acting on behalf of the legacy providers, and also to create | |||
| PASSporTs for in-band STIR conveyance from the legacy-providers to | PASSporTs for in-band STIR conveyance from the legacy-providers to | |||
| terminating service providers in the closed STIR network. For | terminating service providers in the closed STIR network. For | |||
| example, a service provider could issue a delegate certificate | example, a service provider could issue a delegate certificate | |||
| [I-D.ietf-stir-cert-delegation] for this purpose. | [RFC9060] for this purpose. | |||
| 8. Acknowledgments | 8. Acknowledgments | |||
| We would like to thank Alex Fenichel for contributions to this | We would like to thank Alex Fenichel for contributions to this | |||
| specification. | specification. | |||
| 9. IANA Considerations | 9. IANA Considerations | |||
| This memo includes no request to IANA. | This memo includes no request to IANA. | |||
| 10. Security Considerations | 10. Security Considerations | |||
| It is the aim of this mechanism to provide | The Security Considerations of [RFC8816] apply to those document as | |||
| well, including concerns about potential denial-of-service vectors | ||||
| 11. Informative References | and traffic analysis. However, that specification's model focused a | |||
| great deal on the privacy implications of uploading PASSporTs to a | ||||
| third-party web service. This draft mitigates those concerns by | ||||
| making the CPS one of the two parties to call setup (or an entity | ||||
| contractual acting on their behalf). That said, any architecture in | ||||
| which PASSporTs are shared with a federated or centralized CPS raises | ||||
| potential concerns about data collection [RFC7258]. | ||||
| [I-D.ietf-stir-cert-delegation] | Unlike [RFC8816], this document proposes the use of STIR certificates | |||
| Peterson, J., "STIR Certificate Delegation", draft-ietf- | to authenticate transactions with a CPS as well as signatures for CPS | |||
| stir-cert-delegation-03 (work in progress), July 2020. | advertisements. This presumes an environment where STIR certificates | |||
| are issued by known trust anchors which are known to the CPS, | ||||
| potentially including gateways and similar services. Common STIR | ||||
| deployments use Service Provider Codes (SPCs) instead of telephone | ||||
| numbers ranges to identify service providers today; determining | ||||
| whether a given SPC entitles a service provider to access PASSporTs | ||||
| for a given telephone number is not trivial, but is a necessary | ||||
| component of this CPS architecture. If anyone with a STIR | ||||
| certificate is able to publish or access PASSporTs for any telephone | ||||
| number, the potential data collection implications are significant. | ||||
| As | ||||
| [I-D.ietf-stir-oob] | 11. References | |||
| Rescorla, E. and J. Peterson, "STIR Out-of-Band | ||||
| Architecture and Use Cases", draft-ietf-stir-oob-07 (work | ||||
| in progress), March 2020. | ||||
| [I-D.ietf-stir-passport-divert] | 11.1. Normative References | |||
| Peterson, J., "PASSporT Extension for Diverted Calls", | ||||
| draft-ietf-stir-passport-divert-09 (work in progress), | ||||
| July 2020. | ||||
| [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
| Requirement Levels", BCP 14, RFC 2119, | Requirement Levels", BCP 14, RFC 2119, | |||
| DOI 10.17487/RFC2119, March 1997, | DOI 10.17487/RFC2119, March 1997, | |||
| <https://www.rfc-editor.org/info/rfc2119>. | <https://www.rfc-editor.org/info/rfc2119>. | |||
| [RFC3261] Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, | [RFC3261] Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, | |||
| A., Peterson, J., Sparks, R., Handley, M., and E. | A., Peterson, J., Sparks, R., Handley, M., and E. | |||
| Schooler, "SIP: Session Initiation Protocol", RFC 3261, | Schooler, "SIP: Session Initiation Protocol", RFC 3261, | |||
| DOI 10.17487/RFC3261, June 2002, | DOI 10.17487/RFC3261, June 2002, | |||
| <https://www.rfc-editor.org/info/rfc3261>. | <https://www.rfc-editor.org/info/rfc3261>. | |||
| [RFC3311] Rosenberg, J., "The Session Initiation Protocol (SIP) | ||||
| UPDATE Method", RFC 3311, DOI 10.17487/RFC3311, October | ||||
| 2002, <https://www.rfc-editor.org/info/rfc3311>. | ||||
| [RFC4916] Elwell, J., "Connected Identity in the Session Initiation | ||||
| Protocol (SIP)", RFC 4916, DOI 10.17487/RFC4916, June | ||||
| 2007, <https://www.rfc-editor.org/info/rfc4916>. | ||||
| [RFC7159] Bray, T., Ed., "The JavaScript Object Notation (JSON) Data | [RFC7159] Bray, T., Ed., "The JavaScript Object Notation (JSON) Data | |||
| Interchange Format", RFC 7159, DOI 10.17487/RFC7159, March | Interchange Format", RFC 7159, DOI 10.17487/RFC7159, March | |||
| 2014, <https://www.rfc-editor.org/info/rfc7159>. | 2014, <https://www.rfc-editor.org/info/rfc7159>. | |||
| [RFC7340] Peterson, J., Schulzrinne, H., and H. Tschofenig, "Secure | ||||
| Telephone Identity Problem Statement and Requirements", | ||||
| RFC 7340, DOI 10.17487/RFC7340, September 2014, | ||||
| <https://www.rfc-editor.org/info/rfc7340>. | ||||
| [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC | [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC | |||
| 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, | 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, | |||
| May 2017, <https://www.rfc-editor.org/info/rfc8174>. | May 2017, <https://www.rfc-editor.org/info/rfc8174>. | |||
| [RFC8224] Peterson, J., Jennings, C., Rescorla, E., and C. Wendt, | [RFC8224] Peterson, J., Jennings, C., Rescorla, E., and C. Wendt, | |||
| "Authenticated Identity Management in the Session | "Authenticated Identity Management in the Session | |||
| Initiation Protocol (SIP)", RFC 8224, | Initiation Protocol (SIP)", RFC 8224, | |||
| DOI 10.17487/RFC8224, February 2018, | DOI 10.17487/RFC8224, February 2018, | |||
| <https://www.rfc-editor.org/info/rfc8224>. | <https://www.rfc-editor.org/info/rfc8224>. | |||
| [RFC8225] Wendt, C. and J. Peterson, "PASSporT: Personal Assertion | [RFC8225] Wendt, C. and J. Peterson, "PASSporT: Personal Assertion | |||
| Token", RFC 8225, DOI 10.17487/RFC8225, February 2018, | Token", RFC 8225, DOI 10.17487/RFC8225, February 2018, | |||
| <https://www.rfc-editor.org/info/rfc8225>. | <https://www.rfc-editor.org/info/rfc8225>. | |||
| [RFC8226] Peterson, J. and S. Turner, "Secure Telephone Identity | [RFC8226] Peterson, J. and S. Turner, "Secure Telephone Identity | |||
| Credentials: Certificates", RFC 8226, | Credentials: Certificates", RFC 8226, | |||
| DOI 10.17487/RFC8226, February 2018, | DOI 10.17487/RFC8226, February 2018, | |||
| <https://www.rfc-editor.org/info/rfc8226>. | <https://www.rfc-editor.org/info/rfc8226>. | |||
| [RFC8816] Rescorla, E. and J. Peterson, "Secure Telephone Identity | ||||
| Revisited (STIR) Out-of-Band Architecture and Use Cases", | ||||
| RFC 8816, DOI 10.17487/RFC8816, February 2021, | ||||
| <https://www.rfc-editor.org/info/rfc8816>. | ||||
| 11.2. Informative References | ||||
| [RFC3311] Rosenberg, J., "The Session Initiation Protocol (SIP) | ||||
| UPDATE Method", RFC 3311, DOI 10.17487/RFC3311, October | ||||
| 2002, <https://www.rfc-editor.org/info/rfc3311>. | ||||
| [RFC4916] Elwell, J., "Connected Identity in the Session Initiation | ||||
| Protocol (SIP)", RFC 4916, DOI 10.17487/RFC4916, June | ||||
| 2007, <https://www.rfc-editor.org/info/rfc4916>. | ||||
| [RFC7258] Farrell, S. and H. Tschofenig, "Pervasive Monitoring Is an | ||||
| Attack", BCP 188, RFC 7258, DOI 10.17487/RFC7258, May | ||||
| 2014, <https://www.rfc-editor.org/info/rfc7258>. | ||||
| [RFC7340] Peterson, J., Schulzrinne, H., and H. Tschofenig, "Secure | ||||
| Telephone Identity Problem Statement and Requirements", | ||||
| RFC 7340, DOI 10.17487/RFC7340, September 2014, | ||||
| <https://www.rfc-editor.org/info/rfc7340>. | ||||
| [RFC8946] Peterson, J., "Personal Assertion Token (PASSporT) | ||||
| Extension for Diverted Calls", RFC 8946, | ||||
| DOI 10.17487/RFC8946, February 2021, | ||||
| <https://www.rfc-editor.org/info/rfc8946>. | ||||
| [RFC9060] Peterson, J., "Secure Telephone Identity Revisited (STIR) | ||||
| Certificate Delegation", RFC 9060, DOI 10.17487/RFC9060, | ||||
| September 2021, <https://www.rfc-editor.org/info/rfc9060>. | ||||
| Author's Address | Author's Address | |||
| Jon Peterson | Jon Peterson | |||
| Neustar, Inc. | Neustar, Inc. | |||
| Email: jon.peterson@team.neustar | ||||
| Email: jon.peterson@neustar.biz | ||||
| End of changes. 22 change blocks. | ||||
| 115 lines changed or deleted | 143 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||