<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-wendt-stir-vesper-04" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="VESPER">VESPER - Framework for VErifiable STI Personas</title>

    <author fullname="Chris Wendt">
      <organization>Somos, Inc.</organization>
      <address>
        <postal>
          <country>US</country>
        </postal>
        <email>chris@appliedbits.com</email>
      </address>
    </author>
    <author fullname="Rob Sliwa">
      <organization>Somos, Inc.</organization>
      <address>
        <postal>
          <country>US</country>
        </postal>
        <email>robjsliwa@gmail.com</email>
      </address>
    </author>

    <date year="2025" month="July" day="07"/>

    <area>Applications and Real-Time</area>
    <workgroup>Secure Telephone Identity Revisited</workgroup>
    <keyword>telephone number</keyword> <keyword>vetting</keyword> <keyword>KYC</keyword>

    <abstract>


<?line 43?>

<t>This document formalizes a profile and a framework for the use of delegate certificates and authority tokens to strengthen the association between telephone number assignments and the entities that have the authoritative right to use them. It defines a model in which the TNAuthList Authority Token serves as a trusted representation of telephone number assignment and right-to-use (RTU), anchored by a Notary Agent that logs these associations through verifiable transparency mechanisms. The framework also extends the use of authority tokens to support other PASSporT claims like Rich Call Data (RCD) by defining a role for JWTClaimConstraints Authority Tokens. These tokens are issued by authoritative or recognized and vetted claim agents within the ecosystem to assert information associated with the entity assigned a telephone number. The Notary Agent plays a critical role in recording these claims and their provenance, enhancing transparency and accountability.
Delegate certificates encapsulate and incorporate both the telephone number and associated information validated via authority tokens to the certification authority issuing them, binding them to the authenticated telephone number of the calling party. These certificates are published to a certificate transparency log, enabling relying parties to independently verify the integrity and legitimacy of number use and related claims. The VESPER (Verifiable STI PERsona) approach utilizes STIR protocols and the ACME authority token to formalizing a verifiable, auditable, and privacy-conscious foundation for associating telephone numbers with vetted entities and validated assertion of associated metadata.</t>



    </abstract>



  </front>

  <middle>


<?line 48?>

<section anchor="introduction"><name>Introduction</name>

<t>The Secure Telephone Identity (STI) architecture, based on STI certificates <xref target="RFC8226"/>, PASSporTs <xref target="RFC8225"/>, and the SIP Identity header field <xref target="RFC8224"/>, define the foundational use of digital signatures and tokens to protect the integrity of calling information, particularly the telephone number, during a communications session. While these mechanisms help validate call signaling, they do not directly establish who is authorized to use a given telephone number. This document provides a profile of the STI architecture by formalizing the use of delegate certificates and authority tokens to more clearly and verifiably associate a telephone number with the entity-person or business-responsible for its use. This stronger linkage is especially important as misuse of telephone numbers by unauthorized parties continues to undermine trust in communications networks.</t>

<t>To address this, the VESPER framework introduces roles and interactions that mirror proven practices from other trust-based industries, such as Know Your Customer (KYC) and Know Your Business (KYB) procedures in finance. Through a defined process and as an adjunct to the telephone number assignment process involving Responsible Providers or Organizations and the Notary Agent, an Entity is issued a TNAuthList Authority Token defined in <xref target="RFC9448"/>, establishing their right to use a telephone number. Additional information an entity would like to assert to a called party, such as Rich Call Data (RCD) <xref target="I-D.ietf-stir-passport-rcd"/>, can be asserted and authorized using JWTClaimConstraints Authority Tokens <xref target="I-D.wendt-acme-authority-token-jwtclaimcon"/>. JWTClaimContraints have the interesting property that they can be used to assert either direct values or the integrity hashes of values (e.g., using "rcdi" claims defined in <xref target="I-D.ietf-stir-passport-rcd"/>) to enhance the ability to protect the privacy of information when desired or required. These tokens are used in challenges toward the issuance of delegate certificates which can be transparently recorded by a Notary Agent ecosystem role, which acts as a neutral registrar of these claims associated with telephone numbers without exposing underlying private data unless explicitly authorized or desired. Transparent declarations of claim assertions have the potential beneficial property of enhancing the trust of the asserted claims based on monitoring of these claims to avoid fraudulent impersonation that the STI framework is intended to solve.</t>

<t>This VESPER trust model and profile is enhanced using eco-system wide accountability. Transparency logs formalize the issuance of certificates and the relationship between telephone numbers, associated claims and their rightful users, helping detect and prevent fraudulent or conflicting claims by interested parties and auditing mechanisms. By shifting from implicit trust in digital signatures alone to an explicit framework of vetted identities and transparent claims, this approach builds a foundation for enhanced verifiable communications. It enables the responsible use of telephone numbers, discourages impersonation, and strengthens enforcement against abuse, ultimately fostering greater confidence in telephone number-based communications.</t>

</section>
<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="overview"><name>Overview</name>

<t>This document defines a framework for the authoritative association of telephone numbers to the entities responsible for their use, using delegate certificates and authority tokens. Within this framework, referred to as VESPER (VErifiable STI PERsonas), entities are represented through verifiable claims that establish their right to use a telephone number and, optionally, their asserted claim attributes such as Rich Call Data (RCD) or other claims defined via PASSporT type specifications. These claims are issued by trusted responsible parties and are anchored through transparency mechanisms to support trust, auditability, and privacy as appropriate.</t>

<t>The core premise is that a telephone number, when used as a communications identifier, must be explicitly bound to the real-world party authorized to use it. While telephone numbers have long served as identifiers in global communications, the absence of a strong binding between a number and a responsible party has allowed for abuse-most notably through number spoofing and impersonation fraud. In many cases, bad actors exploit the lack of accountability to mislead call recipients, avoid traceability, or impersonate legitimate businesses and individuals. To address this, the VESPER framework introduces a standardized method for expressing and publishing the right-to-use (RTU) of a telephone number through the issuance of a TNAuthList Authority Token. This token is issued following the assignment or delegation of a number and is registered via a Notary Agent, which records the issuance event in a transparency log. This notarization provides independent verification of the association between a number and its rightful user, without requiring public disclosure of sensitive identity data.
Additional claim information can be represented and protected within the delegated certificate using JWTClaimConstraints <xref target="RFC8226"/> and EnhancedJWTClaimConstraints <xref target="RFC9118"/>. During the delegate certificate issuance process a JWTClaimConstraints Authority Token is used to validate the inclusion of these in the delegated certificate. The resulting delegate certificates are recorded by the Notary Agent, enabling verifiable, ecosystem-wide awareness of valid claims associated to a telephone number. This provides confidence to a relying party and through a verification service that both the entity and the associated claim metadata has been validated through an authorized process and that the calling party has both the right to use the number and, if applicable, has been vetted by a recognized authority.</t>

<t>Unlike prior models that rely on implicit trust in the caller or the STI signer, this approach provides an explicit, auditable, and standards-based path to associate communications with a known and authorized party. The VESPER framework does not define how vetting (e.g., KYC/KYB) is performed, nor does it prescribe specific policy requirements. Instead, it focuses on standardizing how vetted results and right-to-use associations are asserted, recorded, and presented within the STIR ecosystem.
By reinforcing the accountability of number usage and enabling the trusted presentation of related identity claims, this architecture enhances integrity, supports privacy, and enables enforcement mechanisms to deter misuse-ultimately restoring trust in telephone-based communications.</t>

</section>
<section anchor="vesper-architectural-overview"><name>Vesper Architectural Overview</name>

<section anchor="the-vesper-trust-framework-architecture"><name>The VESPER Trust Framework Architecture</name>

<t>The VESPER Trust Model establishes a structured framework for asserting and verifying the association between a telephone number and the entity authorized to use it. This model supports a broad range of communications use cases, from fully attributed business communications with rich identity information to privacy-conscious scenarios that require only verification that the number is in legitimate use by a real validated entity.</t>

<t>At its core, the model is built on a trust structure with the following key roles:</t>

<t><list style="numbers" type="1">
  <t>Entities (e.g., individuals or organizations) seeking to assert their right to use a telephone number and assert claims about themselves or a set of communications,</t>
  <t>Responsible providers and organizations that are authorized to allocate and assign numbers within a jurisdictional numbering plan,</t>
  <t>Claim Agents that are authorized and recognized for validating and issuing claims about those entities, and</t>
  <t>A Notary Agent that records claim issuance events and ensures transparency and traceability within the ecosystem.</t>
</list></t>

<t>Participation in this trust model requires a shared set of policies and standards governing how entities are vetted and how claims are created and validated. These policies define the requirements for asserting an entity's identity, the right to use a telephone number, and, where applicable, additional claims and associated attributes (i.e. PASSporT type defined claims, like Rich Call Data). Claims are structured representations of verified information, issued by Claim Agents. Each claim type is standardized via PASSporT type specifications in the STIR working group, with clearly defined required and optional key-value pairs, ensuring interoperability and consistency across the ecosystem.
Through this model, VESPER provides a scalable and transparent foundation for building trust in telephone-based communications, with the flexibility to support both fully attributed and privacy-respecting use cases.</t>

</section>
<section anchor="roles-and-responsibilities-in-the-vesper-framework"><name>Roles and Responsibilities in the VESPER Framework</name>

<t>The VESPER trust framework defines a set of roles that work together to assert and validate claims about telephone numbers and the entities authorized to use them. At the core of this ecosystem are two primary roles: Entities and Claim Agents. Entities are individuals or organizations that wish to establish their authority to use a telephone number and, optionally, present additional vetted identity attributes. Claim Agents are responsible for validating this information and issuing standardized, structured claims.</t>

<section anchor="entity"><name>Entity</name>

<t>An Entity is the individual or organization seeking to assert its authority to use a specific telephone number and, optionally, to present additional vetted claims such as business name or purpose. The Entity is the central actor around which the claims and trust relationships are formed.</t>

</section>
<section anchor="responsible-provider-or-responsible-organization"><name>Responsible Provider or Responsible Organization</name>

<t>A Responsible Provider, sometimes called a Telephone Number Service Provider (TNSP), or Responsible Organization (RespOrg) plays both their traditional well-defined role in the allocation and assignment of telephone numbers in accordance with national or international numbering plans generally followed internationally via e.164 and e.164.1 but also a foundational role in the VESPER ecosystem by validation of the association of telephone number assignments to Entities. These entities operate under regulatory authority and are responsible for administering number resources associated with a specific country code or region.</t>

<t>Their responsibilities include:</t>

<t><list style="symbols">
  <t>Number Assignment: Allocating telephone numbers to Entities under the rules of an authorized numbering plan.</t>
  <t>Entity Association: Establishing and maintaining a record that links each assigned telephone number to a specific, uniquely identified entity. This includes assigning a persistent identifier or account reference to the Entity to which a number is assigned providing an opaque identifier. This identifier can be used by the Entity to reference themselves in an opaque way for accessing assignment relevant information including TNAuthList Authority Tokens or also referenced during any disputes or disclosures when necessary.</t>
</list></t>

<t>The Responsible Provider or RespOrg coordinates with the Notary Agent to issue proof of assignment or participate in the claim transparency process, their role, even as it currently exists, is essential in grounding the trust framework in authoritative number assignment data. Other ecosystem participants, such as Claim Agents and Notary Agents, can and should reference assignment records governing the Right to Use (RTU) maintained by Responsible Providers or RespOrgs to validate issuance of delegate certificates to the valid Entities.</t>

</section>
<section anchor="claim-agent-responsibilities"><name>Claim Agent Responsibilities</name>

<t>Claim Agents are trusted parties in the ecosystem responsible for validating information about Entities and issuing authoritative or verified claims. These claims cover claims associated with PASSporT defined claims including identity details or Rich Call Data (RCD).</t>

<t>Each Claim Agent is uniquely identified within the VESPER ecosystem and should be registered with a Notary Agent (NA) (CW: should it?). Once a Claim Agent performs its vetting process, it issues signed JWTClaimConstraints Authority Tokens containing the validated claim information or integrity hashes for those claims for the Entity depending on privacy preferences.</t>

</section>
<section anchor="notary-agent-responsibilities"><name>Notary Agent Responsibilities</name>

<t>The Notary Agent (NA) serves as the ecosystem's registrar and transparency authority. It performs three critical functions:</t>

<t><list style="numbers" type="1">
  <t>Registration of Responsible Providers and Responsible Organizations that correspond to the traditional roles in accordance with a national or international numbering plans.</t>
  <t>Registration of Claim Agents, ensuring each is uniquely identifiable and authorized to issue specific types of claims.</t>
  <t>Operation of a Transparency Log, which issues cryptographic receipts to confirm and timestamp the existence of each claim.</t>
</list></t>

<t>Notarization can be privacy-preserving, where only cryptographic hashes of claims are logged, or fully transparent, allowing public visibility of claim contents to detect conflicts or impersonation attempts. This optional public disclosure enables monitoring of duplicate or unauthorized claims across the ecosystem.</t>

<t>While this document does not define the dispute resolution process, any conflicts or misclaims discovered through transparency can be escalated through ecosystem-specific mechanisms, likely coordinated by the Notary Agent in communication with relevant Claim Agents.</t>

</section>
</section>
<section anchor="claim-agents-and-claim-information-privacy"><name>Claim Agents and Claim Information Privacy</name>

<t>Privacy is a foundational principle of the VESPER trust model. Claim Agents are not required to expose or publish sensitive data about Subject Entities when recording claims. Instead, claims can be privacy-protected by logging only the cryptographic hashes of the claim content in the transparency log, preserving proof without revealing the underlying details.</t>

<section anchor="public-vs-private-disclosure"><name>Public vs. Private Disclosure</name>

<t>For claim information that is public by nature-such as business names, logos, or other branding elements-Claim Agents may choose to log the data in full within certificates for public visibility. This public transparency helps the ecosystem identify conflicting or fraudulent claims and reinforces trust through open scrutiny.</t>

<t>Conversely, for private or sensitive claims (e.g., internal identifiers or personally identifiable information), Claim Agents may choose to log only a hash of the data. This approach ensures that the claim's authenticity can still be verified without compromising the Entity's privacy. Disclosure of such claims remains at the discretion of the Entity or may occur in limited cases where legal or regulatory obligations apply.</t>

</section>
</section>
<section anchor="delegate-certificate-issuance-process"><name>Delegate Certificate Issuance Process</name>

<t>In the VESPER trust framework, the issuance of a delegate certificate to an Entity involves the multiple roles defined and referenced in this document, including the Responsible Provider or Responsible Organization, Claim Agents, the Notary Agent, and a trusted Certification Authority (CA) operating under the STIR eco-system certificate policy governing STIR certificates defined in <xref target="RFC8226"/>.</t>

<t>The process begins when a Responsible Provider or Responsible Organization assigns a telephone number to an Entity. As part of that assignment, the Entity is formally associated with the number in the Notary Agent's system via an opaque and unique identifier, establishing an auditable relationship between the number and the right-to-use holder. The opaque unique identifier helps to uphold the privacy of the eco-system as part of normal telephone number allocation and assignment has traditionally followed. When potential policy violations occur the Notary Agent systems using the Entity identifier provides an indisputable path to the corresponding Responsible Providers and Organizations and then to the Entities assigned the telephone number and delegated a certificate in question that can respond to policy and legal requests as part of their responsibilities to the STIR eco-system should govern.</t>

<t>Additionally, following this association, a TNAuthList Authority Token can be issued to the Entity. This token authoritatively represents the Entity's Right-To-Use the telephone number and can serve as cryptographic proof of assignment.</t>

<t>In parallel, a Claim Agent may be used to validate additional attributes that the Entity wishes to assert when originating calls, such as Rich Call Data (RCD). These validated attributes are encoded in a JWTClaimConstraints Authority Token, which governs what claims the Entity is authorized to present in communications. The Claim Agent may also use the TNAuthList Authority Token as proof of assignment and the Right-to-Use the telephone numbers being asserted by the Entity. This should also be utilized to govern the constraint of the "orig" claim to only the valid associated numbers to the Entity.</t>

<t>Once both tokens have been obtained, the Entity initiates a Certificate Signing Request (CSR) to a CA authorized to issue certificates within the STIR ecosystem. As per the mechanisms outlined in <xref target="RFC9447"/>, <xref target="RFC9448"/>, and <xref target="I-D.wendt-acme-authority-token-jwtclaimcon"/>, the TNAuthList and JWTClaimConstraints tokens are presented as ACME challenge responses to prove the Entity's authority over the number and its validated claims.</t>

<t>Upon successful validation, the CA issues a delegate certificate to the Entity. This certificate includes:</t>

<t><list style="symbols">
  <t>A TNAuthList extension <xref target="RFC8226"/>, representing the telephone number(s) the certificate holder is authorized to use.</t>
  <t>A JWTClaimConstraints extension <xref target="RFC8226"/> and/or EnhancedJWTClaimConstraints extension <xref target="RFC9118"/>, representing the constraints on claims the certificate holder is permitted to assert.</t>
</list></t>

<t>The issued certificate is then submitted to a certificate transparency log. A corresponding transparency receipt is returned to the Entity and/or CA to provide verifiable proof of publication. This transparency mechanism enables ecosystem-wide monitoring and validation of certificate issuance and claim legitimacy.</t>

</section>
<section anchor="use-of-delegate-certificates-for-signing-communications"><name>Use of Delegate Certificates for Signing Communications</name>

<t>Once an Entity has received a delegate certificate containing validated right-to-use and claim constraints, it can use this certificate to sign communications associated with the authorized telephone number.</t>

<t>For example, when the Entity initiates a SIP call, it generates a PASSporT object containing session-specific details such as "orig", "dest", and "iat". The Entity then signs the PASSporT using its delegate certificate, which binds both the telephone number and any authorized claims (e.g., RCD elements) to the communication.</t>

<t>Critically, the JWTClaimConstraints extension in the certificate enforces the set of claims the Entity is permitted to assert, ensuring that claims cannot exceed those vetted and authorized by the corresponding Claim Agent.</t>

<t>The signed PASSporT is then attached to the SIP Identity header and transmitted with the call. The Verification Service (VS) on the receiving side performs STIR verification, checking:</t>

<t><list style="symbols">
  <t>That the PASSporT signature is valid.</t>
  <t>That the delegate certificate is trusted, unexpired, and issued by a recognized CA.</t>
  <t>That the certificate includes a valid TNAuthList extension for the telephone number in use in the "orig" claim.</t>
  <t>That any asserted claims conform to the JWTClaimConstraints and/or EnhancedJWTClaimConstraints in the certificate.</t>
  <t>That a corresponding transparency receipt exists, proving the certificate was publicly recorded.</t>
</list></t>

<t>If all verifications succeed, the relying party can trust that the call is both authorized and attributable, and that all claims have been validated by responsible participants in the ecosystem.</t>

<t>Should questions arise, such as disputes over the legitimacy of the claims, the identity of the calling Entity, or the integrity of the Claim Agent, the Notary Agent serves as the central authority for managing escalation and disclosure. This includes providing access to Responsible Party information via a privacy-preserving and legally compliant resolution process, aligned with ecosystem governance and policy enforcement.</t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>TODO Security</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>None</t>

</section>
<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>TODO acknowledge.</t>

</section>


  </middle>

  <back>



    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC8224">
  <front>
    <title>Authenticated Identity Management in the Session Initiation Protocol (SIP)</title>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <author fullname="C. Jennings" initials="C." surname="Jennings"/>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <author fullname="C. Wendt" initials="C." surname="Wendt"/>
    <date month="February" year="2018"/>
    <abstract>
      <t>The baseline security mechanisms in the Session Initiation Protocol (SIP) are inadequate for cryptographically assuring the identity of the end users that originate SIP requests, especially in an interdomain context. This document defines a mechanism for securely identifying originators of SIP requests. It does so by defining a SIP header field for conveying a signature used for validating the identity and for conveying a reference to the credentials of the signer.</t>
      <t>This document obsoletes RFC 4474.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8224"/>
  <seriesInfo name="DOI" value="10.17487/RFC8224"/>
</reference>
<reference anchor="RFC8225">
  <front>
    <title>PASSporT: Personal Assertion Token</title>
    <author fullname="C. Wendt" initials="C." surname="Wendt"/>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <date month="February" year="2018"/>
    <abstract>
      <t>This document defines a method for creating and validating a token that cryptographically verifies an originating identity or, more generally, a URI or telephone number representing the originator of personal communications. The Personal Assertion Token, PASSporT, is cryptographically signed to protect the integrity of the identity of the originator and to verify the assertion of the identity information at the destination. The cryptographic signature is defined with the intention that it can confidently verify the originating persona even when the signature is sent to the destination party over an insecure channel. PASSporT is particularly useful for many personal-communications applications over IP networks and other multi-hop interconnection scenarios where the originating and destination parties may not have a direct trusted relationship.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8225"/>
  <seriesInfo name="DOI" value="10.17487/RFC8225"/>
</reference>
<reference anchor="RFC8226">
  <front>
    <title>Secure Telephone Identity Credentials: Certificates</title>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <author fullname="S. Turner" initials="S." surname="Turner"/>
    <date month="February" year="2018"/>
    <abstract>
      <t>In order to prevent the impersonation of telephone numbers on the Internet, some kind of credential system needs to exist that cryptographically asserts authority over telephone numbers. This document describes the use of certificates in establishing authority over telephone numbers, as a component of a broader architecture for managing telephone numbers as identities in protocols like SIP.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8226"/>
  <seriesInfo name="DOI" value="10.17487/RFC8226"/>
</reference>
<reference anchor="RFC9118">
  <front>
    <title>Enhanced JSON Web Token (JWT) Claim Constraints for Secure Telephone Identity Revisited (STIR) Certificates</title>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <date month="August" year="2021"/>
    <abstract>
      <t>RFC 8226 specifies the use of certificates for Secure Telephone Identity Credentials; these certificates are often called "Secure Telephone Identity Revisited (STIR) Certificates". RFC 8226 provides a certificate extension to constrain the JSON Web Token (JWT) claims that can be included in the Personal Assertion Token (PASSporT), as defined in RFC 8225. If the PASSporT signer includes a JWT claim outside the constraint boundaries, then the PASSporT recipient will reject the entire PASSporT. This document updates RFC 8226; it provides all of the capabilities available in the original certificate extension as well as an additional way to constrain the allowable JWT claims. The enhanced extension can also provide a list of claims that are not allowed to be included in the PASSporT.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9118"/>
  <seriesInfo name="DOI" value="10.17487/RFC9118"/>
</reference>
<reference anchor="RFC9447">
  <front>
    <title>Automated Certificate Management Environment (ACME) Challenges Using an Authority Token</title>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <author fullname="M. Barnes" initials="M." surname="Barnes"/>
    <author fullname="D. Hancock" initials="D." surname="Hancock"/>
    <author fullname="C. Wendt" initials="C." surname="Wendt"/>
    <date month="September" year="2023"/>
    <abstract>
      <t>Some proposed extensions to the Automated Certificate Management Environment (ACME) rely on proving eligibility for certificates through consulting an external authority that issues a token according to a particular policy. This document specifies a generic Authority Token Challenge for ACME that supports subtype claims for different identifiers or namespaces that can be defined separately for specific applications.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9447"/>
  <seriesInfo name="DOI" value="10.17487/RFC9447"/>
</reference>
<reference anchor="RFC9448">
  <front>
    <title>TNAuthList Profile of Automated Certificate Management Environment (ACME) Authority Token</title>
    <author fullname="C. Wendt" initials="C." surname="Wendt"/>
    <author fullname="D. Hancock" initials="D." surname="Hancock"/>
    <author fullname="M. Barnes" initials="M." surname="Barnes"/>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <date month="September" year="2023"/>
    <abstract>
      <t>This document defines a profile of the Automated Certificate Management Environment (ACME) Authority Token for the automated and authorized creation of certificates for Voice over IP (VoIP) telephone providers to support Secure Telephone Identity (STI) using the TNAuthList defined by STI certificates.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9448"/>
  <seriesInfo name="DOI" value="10.17487/RFC9448"/>
</reference>

<reference anchor="I-D.ietf-stir-passport-rcd">
   <front>
      <title>PASSporT Extension for Rich Call Data</title>
      <author fullname="Chris Wendt" initials="C." surname="Wendt">
         <organization>Somos Inc.</organization>
      </author>
      <author fullname="Jon Peterson" initials="J." surname="Peterson">
         <organization>Neustar Inc.</organization>
      </author>
      <date day="5" month="June" year="2023"/>
      <abstract>
	 <t>   This document extends PASSporT, a token for conveying
   cryptographically-signed call information about personal
   communications, to include rich meta-data about a call and caller
   that can be signed and integrity protected, transmitted, and
   subsequently rendered to the called party.  This framework is
   intended to include and extend caller and call specific information
   beyond human-readable display name comparable to the &quot;Caller ID&quot;
   function common on the telephone network and is also enhanced with a
   integrity mechanism that is designed to protect the authoring and
   transport of this information for different authoritative use-cases.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-stir-passport-rcd-26"/>
   
</reference>

<reference anchor="I-D.wendt-acme-authority-token-jwtclaimcon">
   <front>
      <title>JWTClaimConstraints profile of ACME Authority Token</title>
      <author fullname="Chris Wendt" initials="C." surname="Wendt">
         <organization>Somos Inc.</organization>
      </author>
      <author fullname="David Hancock" initials="D." surname="Hancock">
         <organization>Somos Inc.</organization>
      </author>
      <date day="7" month="July" year="2025"/>
      <abstract>
	 <t>   This document defines an authority token profile for handling the
   validation of JWTClaimConstraints and EnhancedJWTClaimConstraints.
   This profile follows the model established in Authority Token for the
   validation of TNAuthList but is specifically tailored for the
   JWTClaimConstraints certificate extensions.  The profile enables
   validation and challenge processes necessary to support certificates
   containing both TNAuthList and JWTClaimConstraints, particularly in
   the context of Secure Telephone Identity (STI).

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-wendt-acme-authority-token-jwtclaimcon-02"/>
   
</reference>
<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>



    </references>





  </back>

<!-- ##markdown-source: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-->

</rfc>

