<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-wendt-stir-vesper-06" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="VESPER">VESPER - Framework for VErifiable STI Personas</title>

    <author fullname="Chris Wendt">
      <organization>Somos, Inc.</organization>
      <address>
        <postal>
          <country>US</country>
        </postal>
        <email>chris@appliedbits.com</email>
      </address>
    </author>
    <author fullname="Rob &#x015A;liwa">
      <organization>Somos, Inc.</organization>
      <address>
        <postal>
          <country>US</country>
        </postal>
        <email>robjsliwa@gmail.com</email>
      </address>
    </author>

    <date year="2025" month="November" day="04"/>

    <area>Applications and Real-Time</area>
    <workgroup>Secure Telephone Identity Revisited</workgroup>
    <keyword>telephone number</keyword> <keyword>vetting</keyword> <keyword>KYC</keyword>

    <abstract>


<?line 46?>

<t>This document formalizes a profile and a framework for the use of delegate certificates and authority tokens to strengthen the association between telephone number assignments and the entities that have the authoritative right to use them on the telephone network. It defines a model in which the TNAuthList Authority Token serves as a trusted representation of telephone number assignment and right-to-use (RTU), anchored by a Notary Agent that logs these associations through verifiable transparency mechanisms. The framework also extends the use of authority tokens to support other PASSporT claims like Rich Call Data (RCD) by defining a role for JWTClaimConstraints Authority Tokens. These tokens are issued by authoritative or recognized and vetted claim agents within the ecosystem to assert information associated with the entity assigned a telephone number. The Notary Agent plays a critical role in recording these claims and their provenance, enhancing transparency and accountability.
Delegate certificates encapsulate and incorporate both the telephone number and associated information validated via authority tokens to the certification authority issuing them, binding them to the authenticated telephone number of the calling party. These certificates are published to a certificate transparency log, enabling relying parties to independently verify the integrity and legitimacy of number use and related claims. The VESPER (Verifiable STI PERsona) approach utilizes STIR protocols and the ACME authority token to formalizing a verifiable, auditable, and privacy-conscious foundation for associating telephone numbers with identifiable entities and assertion of associated metadata.</t>



    </abstract>



  </front>

  <middle>


<?line 51?>

<section anchor="introduction"><name>Introduction</name>

<t>The Secure Telephone Identity (STI) architecture, based on STI certificates <xref target="RFC8226"/>, PASSporTs <xref target="RFC8225"/>, and the SIP Identity header field <xref target="RFC8224"/>, define the foundational use of digital signatures and tokens to protect the integrity of calling information, particularly the telephone number, during a communications session. While these mechanisms help validate call signaling, they do not directly establish the entity who is authorized to use a given telephone number. This document provides a profile of the STI architecture by formalizing the use of delegate certificates and authority tokens to more clearly and verifiably associate a telephone number with the entity responsible for its use. This stronger linkage is especially important as misuse (i.e., the illegimate spoofing and impersonation) tied to telephone numbers by unauthorized parties continues to undermine trust in communications networks.</t>

<t>To address this, the VESPER framework introduces roles and interactions that mirror proven practices from other trust-based industries, such as Know Your Customer (KYC) and Know Your Business (KYB) procedures well established in the financial industry. Through a defined process and as an adjunct to the authoritative telephone number assignment process involving Responsible Providers or Organizations and the jurisdictional Numbering Administrator, an Entity is issued a TNAuthList Authority Token defined in <xref target="RFC9448"/>, establishing their right to use a telephone number. Beyond establishing the authority of the telephone number, optionally additional information an entity may like to assert to a called party, such as Rich Call Data (RCD) <xref target="RFC9795"/>, can be asserted and authorized using JWTClaimConstraints Authority Tokens <xref target="I-D.wendt-acme-authority-token-jwtclaimcon"/>. JWTClaimContraints have the interesting property that they can be used to assert either direct values or the integrity hashes of values (e.g., using "rcdi" claims defined in <xref target="RFC9795"/>) to enhance the ability to protect the privacy of information when desired or required. These Authority Tokens are used in challenges toward the issuance of delegate certificates which can be transparently recorded in a transparency log, which can act as a set of neutral eco-system registrar points for representing asserted claims associated with telephone numbers with or without exposing underlying data as explicitly authorized or desired. Transparent declarations of claim assertions have the potential beneficial property of enhancing the trust of the asserted claims based on monitoring of these claims to avoid fraudulent impersonation that the STI framework is intended to solve.</t>

<t>In addition to supporting call authentication of the originating party, the VESPER framework can also extend to the validation of the called party through the use of connected identity as defined in <xref target="I-D.ietf-stir-rfc4916-update"/>. In this model, the same authority token and delegate certificate mechanisms that bind an originating telephone number to a vetted entity can be applied in the reverse direction, enabling a called party to assert its validated identity via signed PASSporTs included in SIP responses. This optional capability broadens the scope of accountability and transparency to both ends of the communication session while maintaining the privacy-conscious design principles of VESPER.</t>

<t>This VESPER trust model and profile is enhanced using eco-system wide accountability. Transparency logs formalize and announce the issuance of certificates and the relationship between telephone numbers, associated claims and their rightful users, helping detect and prevent fraudulent or conflicting claims by interested parties and auditing mechanisms. By shifting from implicit trust in digital signatures alone to an explicit framework of vetted identities and transparent claims, this approach builds a foundation for enhanced verifiable communications. It enables the responsible use of telephone numbers and auditability, discourages impersonation, and strengthens enforcement against abuse, ultimately fostering greater confidence in telephone number-based communications.</t>

</section>
<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="overview"><name>Overview</name>

<t>This document defines a framework for the authoritative association of telephone numbers to the entities responsible for their use, using delegate certificates and authority tokens for issuance and certificate transparency for eco-system auditing. Within this framework, referred to as VESPER (VErifiable STI PERsonas), entities are represented through verifiable claims that establish their right to use a telephone number and, optionally, their asserted claim attributes such as Rich Call Data (RCD) or other claims defined via PASSporT claim and type specifications. These claims are issued by trusted responsible parties and are anchored through transparency mechanisms to support trust, auditability, and privacy as appropriate.</t>

<t>The core premise is that a telephone number, when used as a communications identifier, must be explicitly bound to the real-world party authorized to use it. While telephone numbers have long served as identifiers in global communications, the absence of a strong binding between a number and a responsible party has allowed for abuse, most notably through number spoofing and impersonation fraud. In many cases, bad actors exploit the lack of accountability to mislead call recipients, avoid traceability, or impersonate legitimate businesses and individuals. To address this, the VESPER framework introduces a standardized method for expressing and publishing the right-to-use (RTU) of a telephone number through the issuance of a TNAuthList Authority Token from a centralized jurisdictional Number Administrator. This token is issued following the assignment or delegation of a number. The issuance of the delegate certificate is recorded in a transparency log providing relying parties an eco-system wide verification of the association between a number and its authorized entity, authorized by the regulated Responsible Provider or Organization that is authorized to assign numbers via jurisdictional regulatory policies over telephone numbers.</t>

<t>Beyond the association of telephone numbers, JWTClaimConstraints <xref target="RFC8226"/> and EnhancedJWTClaimConstraints <xref target="RFC9118"/> play a critical role in delegate certificates issued under the VESPER framework. They provide a standardized mechanism for Certification Authorities to explicitly constrain any additional claims a delegate certificate holder is permitted to assert in communications. This constraint mechanism ensures that even if a certificate is misused or presented outside its intended scope, the relying party can verify whether the claims presented are authorized by the issuer. Certification Authorities derive these constraints from Authority Tokens issued by vetted Claim Agents, which serve as cryptographic proof of the claim validations. By limiting the scope of claims to those proven and approved during the certificate issuance process, using JWTClaimConstraints Authority Tokens provided by trusted Claim Agents that take responsibility for vetting those additional claims makes VESPER extensible just as PASSporT claims are intended to do to protect both the telephone number and other assertions made through PASSporTs.</t>

<t>Unlike prior models that rely on implicit trust in the caller or the STI signer, this approach provides an explicit, auditable, and standards-based path to associate communications with a known and authorized party. The VESPER framework does not define how vetting (e.g., KYC/KYB) is performed, nor does it prescribe specific policy requirements for what the relying party should do with this information. Instead, it focuses on standardizing how vetted results and right-to-use associations are asserted, recorded, and presented within the STIR ecosystem focused on the telephone number first and additional claims and assertions second.</t>

<t>By reinforcing the accountability of number usage and enabling the trusted presentation of related identity claims, this architecture enhances integrity, supports privacy, and enables enforcement mechanisms to deter misuse or mis-issuance issues.</t>

<t>VESPER implementations <bcp14>MUST</bcp14> support short-lived delegate certificates and <bcp14>SHOULD</bcp14> use "x5c" to convey certificates inline. Transparency logging remains required.</t>

</section>
<section anchor="vesper-architectural-overview"><name>Vesper Architectural Overview</name>

<section anchor="the-vesper-framework-architecture"><name>The VESPER Framework Architecture</name>

<t>The VESPER framework establishes a structured framework for asserting and verifying the association between a telephone number and the entity authorized to use it. This model supports a broad range of communications use cases, from fully attributed business communications with rich identity information to privacy-conscious person scenarios that require only verification that the number is in legitimate use by a real validated entity.</t>

<t>At its core, the model is built on a trust structure with the following key roles:</t>

<t><list style="numbers" type="1">
  <t>Entities (e.g., individuals or organizations) seeking to assert their right to use a telephone number and assert claims about themselves or a set of communications,</t>
  <t>Responsible providers and organizations that are authorized to allocate and assign numbers within a jurisdictional numbering plan,</t>
  <t>Claim Agents that are authorized and recognized for validating and issuing claims about those entities, and</t>
  <t>A Numbering Administrator (NA), both jurisdictional to a country code and neutral to the eco-system, that represents authoritative policies for number uses within that jurisdiction and facilitates a minimum tie of telephone numbers to entity identifiers and ensures transparency, traceability, and auditability within the ecosystem.</t>
</list></t>

<t>Participation in the VESPER framework requires a shared set of policies governing how entities are vetted and how claims are created and validated. These policies define the requirements for asserting an entity's identity, the right to use a telephone number, and optionally and where applicable, additional claims and associated attributes (i.e. PASSporT type defined claims, like Rich Call Data). Claims beyond the telephone number are structured representations of verified information, issued by authorized or accepted Claim Agents. Each claim type is standardized via PASSporT type specifications <xref target="RFC8225"/> in the STIR working group, with clearly defined required and optional key-value pairs, ensuring interoperability and consistency across the ecosystem.
Through this model, VESPER provides a scalable and transparent foundation for building trust in telephone-based communications, with the flexibility to support both fully attributed and privacy-respecting use cases.</t>

</section>
<section anchor="roles-and-responsibilities-in-the-vesper-framework"><name>Roles and Responsibilities in the VESPER Framework</name>

<t>The VESPER trust framework defines a set of roles that work together to assert and validate claims about telephone numbers and the entities authorized to use them. At the core of this ecosystem are two primary roles: Entities and Claim Agents. Entities are individuals or organizations that wish to establish their authority to use a telephone number and, optionally, present additional vetted identity attributes. Claim Agents are responsible for validating this information and issuing standardized, structured claims.</t>

<section anchor="entity"><name>Entity</name>

<t>An Entity is the individual or organization seeking to assert its authority to use a specific telephone number and, optionally, to present additional vetted claims such as business name or purpose. The Entity is the central actor around which the claims and trust relationships are formed.</t>

</section>
<section anchor="responsible-provider-or-responsible-organization"><name>Responsible Provider or Responsible Organization</name>

<t>A Responsible Provider, sometimes called a Telephone Number Service Provider (TNSP), or Responsible Organization (RespOrg) plays both their traditional well-defined role in the allocation and assignment of telephone numbers in accordance with national or international numbering plans generally followed internationally via e.164 and e.164.1 but also a foundational role in the VESPER ecosystem by validation of the association of telephone number assignments to Entities. These entities operate under regulatory authority and are responsible for administering number resources associated with a specific country code or region.</t>

<t>Their responsibilities include:</t>

<t><list style="symbols">
  <t>Number Assignment: Allocating telephone numbers to Entities under the rules of an authorized numbering plan.</t>
  <t>Entity Association: Establishing and maintaining a record that links each assigned telephone number to a specific, uniquely identified entity. This includes assigning a persistent identifier or account reference to the Entity to which a number is assigned providing an opaque identifier. This identifier can be used by the Entity to reference themselves in an opaque way for accessing assignment relevant information including TNAuthList Authority Tokens or also referenced during any disputes or disclosures when necessary.</t>
</list></t>

<t>The Responsible Provider or Organization follows the numbering assignment process but additionally authorizes an TNAuthList Authority Token to be used by a Certification Authority in the issuance of a delegate certificate that minimally includes a TNAuthList extension that corresponds ot the telephone number.</t>

</section>
<section anchor="claim-agent-responsibilities"><name>Claim Agent Responsibilities</name>

<t>Claim Agents are trusted parties in the ecosystem responsible for validating information about Entities and issuing authoritative or verified claims. These claims cover claims associated with PASSporT defined claims including identity details or Rich Call Data (RCD).</t>

<t>Claim Agents provide JWTClaimConstraints Authority Tokens to validate inclusion of these constrainted claim assertions to the issuance of delegate certificates to the valid Entities. Once a Claim Agent performs its vetting process, it issues signed JWTClaimConstraints Authority Tokens containing the validated claim information or integrity hashes for those claims for the Entity depending on privacy preferences.</t>

</section>
<section anchor="juridictional-number-administrator-responsibilities"><name>Juridictional Number Administrator Responsibilities</name>

<t>The Number Administrator (NA) serves as the ecosystem's neutral registrar and transparency authority. It performs three critical functions:</t>

<t><list style="numbers" type="1">
  <t>Registration of Responsible Providers and Responsible Organizations that correspond to the traditional roles in accordance with a national or international numbering plans.</t>
  <t>Registration of Claim Agents, ensuring each is uniquely identifiable and authorized to issue specific types of claims.</t>
  <t>Coordination of eco-system Transparency Logs, which issues cryptographic receipts to confirm and timestamp the existence of each claim.</t>
</list></t>

<t>While this document does not define a dispute resolution process, any conflicts or misclaims discovered through transparency should be escalated through a neutral ecosystem-specific mechanisms, likely coordinated by the NA role in communication with relevant Responsible Providers or Organizations or Claim Agents.</t>

</section>
</section>
<section anchor="claim-agents-and-claim-information-privacy"><name>Claim Agents and Claim Information Privacy</name>

<t>Privacy is a foundational principle of the VESPER framework. Claim Agents are not required to expose or publish sensitive data about Entities when recording claims. Instead, claims can be privacy-protected by logging only the cryptographic hashes of the claim content in the transparency log, preserving proof without revealing the underlying details.</t>

<section anchor="public-vs-private-disclosure"><name>Public vs. Private Disclosure</name>

<t>For claim information that is public by nature, such as business names, logos, or other potential claim assertions relevent to identifying the calling party, Claim Agents may choose to constrain the direct values of the claims to log the data in full within certificates for public visibility. This public transparency helps the ecosystem identify conflicting or fraudulent claims and reinforces trust through open scrutiny.</t>

<t>Conversely, for private or sensitive claims (e.g., internal identifiers or personally identifiable information), Claim Agents may choose to log only a hash of the data or not at all. This approach ensures that the claim's authenticity can still be verified without compromising the Entity's privacy, if and when required. Disclosure of such claims remains at the discretion of the Entity or may occur in limited cases where legal or regulatory obligations apply.</t>

</section>
</section>
<section anchor="delegate-certificate-issuance-process"><name>Delegate Certificate Issuance Process</name>

<t>In the VESPER framework, the issuance of a delegate certificate to an Entity involves the multiple roles defined and referenced in this document, including the Responsible Provider or Responsible Organization, Claim Agents and a trusted Certification Authority (CA) operating under the STIR eco-system certificate policy governing STIR certificates defined in <xref target="RFC8226"/>.</t>

<t>The process begins when a Responsible Provider or Responsible Organization assigns a telephone number to an Entity. As part of that assignment, the Entity is formally associated with the number as is typical in a Number Administration assignment system, but additionally via an associated opaque and unique identifier.  This could be globally unique identifier or a public-key that is provably associated to the entity and  establishes an auditable relationship between the number and the right-to-use holder. The opaque unique identifier helps to uphold the privacy of the eco-system as part of normal telephone number allocation and assignment has traditionally followed but allows for non-repudiation throughout the ecosystem. Thus, when potential policy violations occur, the Entity identifier provides an indisputable path to the corresponding Responsible Providers and Organizations and to the Entities assigned the telephone number via the delegated certificate in question.</t>

<t>Additionally, following this association, a TNAuthList Authority Token can be issued to the Entity. This token authoritatively represents the Entity's Right-To-Use the telephone number and can serve as cryptographic proof of assignment to an authorized CA that requires that proof to issue a delegate certificate.</t>

<t>In parallel, a Claim Agent may be used to validate additional attributes that the Entity wishes to assert when originating calls, such as Rich Call Data (RCD). These validated attributes are encoded in a JWTClaimConstraints Authority Token, which governs what claims the Entity is authorized to present in communications. The Claim Agent may also use the TNAuthList Authority Token as proof of assignment and the Right-to-Use the telephone numbers being asserted by the Entity. This should also be utilized to govern the constraint of the "orig" claim to only the valid associated numbers to the Entity.</t>

<t>Once both tokens have been obtained, the Entity initiates a Certificate Signing Request (CSR) to their preferred CA authorized to issue certificates within the STIR ecosystem. As per the mechanisms outlined in <xref target="RFC9447"/>, <xref target="RFC9448"/>, and <xref target="I-D.wendt-acme-authority-token-jwtclaimcon"/>, the TNAuthList and JWTClaimConstraints tokens are presented as ACME challenge responses to prove the Entity's authority over the number and its validated claims.</t>

<t>Upon successful validation of the Authority Tokens required, the CA issues a delegate certificate to the Entity.</t>

<t>CAs <bcp14>SHOULD</bcp14> issue short-lived certificates with brief validity intervals. Entities <bcp14>SHOULD</bcp14> automate renewal to avoid service interruptions.</t>

<t>This certificate <bcp14>MUST</bcp14> include:</t>

<t><list style="symbols">
  <t>A TNAuthList extension <xref target="RFC8226"/>, representing the telephone number(s) the certificate holder is authorized to use.</t>
</list></t>

<t>This certificate, if additional claims and assertions are made beyond the base PASSporT claims defined in <xref target="RFC8225"/>, <bcp14>MUST</bcp14> include:</t>

<t><list style="symbols">
  <t>A JWTClaimConstraints extension <xref target="RFC8226"/> and/or EnhancedJWTClaimConstraints extension <xref target="RFC9118"/>, representing the constraints on claims the certificate holder is permitted to assert.</t>
</list></t>

<t>The issued certificate is then submitted to a certificate transparency log. A corresponding transparency receipt is returned to the Entity and/or CA to provide verifiable proof of publication.</t>

</section>
<section anchor="vesper-certificate-profile-short-lived-inline-conveyance"><name>VESPER Certificate Profile (Short-Lived &amp; Inline Conveyance)</name>

<t>VESPER delegate certificates <bcp14>MUST</bcp14> support the short-lived certificate profile in <xref target="I-D.ietf-stir-certificates-shortlived"/>. PASSporTs <bcp14>MUST</bcp14> include the certificate chain using the "x5c" header. Verification Services <bcp14>SHOULD</bcp14> prefer "x5c" over "x5u" if included, and <bcp14>MUST NOT</bcp14> dereference "x5u" if "x5c" is present and valid. Short-lived certificates reduce the need for revocation infrastructure and eliminate external certificate fetches.</t>

</section>
<section anchor="use-of-vesper-delegate-certificates-for-signing-communications"><name>Use of VESPER Delegate Certificates for Signing Communications</name>

<t>Once an Entity has received a delegate certificate containing validated right-to-use and claim constraints, it can use this certificate to sign communications associated with the authorized telephone number.</t>

<t>For example, as defined in <xref target="RFC8224"/> when the Entity initiates a SIP call, it generates a PASSporT object containing session-specific details such as "orig", "dest", and "iat". The Entity then signs the PASSporT using its delegate certificate, which binds both the telephone number and any authorized claims (e.g., RCD elements) to the communication.</t>

<t>Critically, the JWTClaimConstraints extension in the certificate enforces the set of claims the Entity is permitted to assert in the PASSporT, ensuring that claims cannot exceed those vetted and authorized by the corresponding Claim Agent.</t>

<t>As defined in <xref target="RFC8224"/>, the signed PASSporT is then attached to the SIP Identity header and transmitted with the call. The Verification Service (VS) on the receiving side performs STIR verification, checking:</t>

<t><list style="symbols">
  <t>That the PASSporT signature is valid.</t>
  <t>That the delegate certificate is trusted, unexpired, and issued by a recognized CA.</t>
  <t>If the PASSporT includes an "x5c" header, the certificate chain must be validated from the inline header; "x5u" must not be dereferenced.</t>
  <t>If "x5c" is absent, "x5u" <bcp14>MAY</bcp14> be used to retrieve the certificate chain.</t>
  <t>That the certificate includes a valid TNAuthList extension for the telephone number in use in the "orig" claim.</t>
  <t>That any asserted claims conform to the JWTClaimConstraints and/or EnhancedJWTClaimConstraints in the certificate.</t>
  <t>That a corresponding transparency receipt exists, proving the certificate was publicly recorded.</t>
</list></t>

<t>Senders <bcp14>SHOULD</bcp14> include "x5c"; relying parties <bcp14>SHOULD</bcp14> prefer "x5c" when both are available.</t>

<t>If all verifications succeed, the relying party can trust that the call is both authorized and attributable, and that all claims have been validated by responsible participants in the ecosystem.</t>

</section>
<section anchor="vesper-authentication-and-verification-procedures"><name>VESPER Authentication and Verification Procedures</name>

<t>This section outlines the expected behavior of Authentication Services (AS) and Verification Services (VS) in deployments utilizing VESPER delegate certificates. These procedures extend the baseline STIR authentication and verification models defined in <xref target="RFC8224"/>, <xref target="RFC8225"/>, and <xref target="RFC8226"/> by incorporating validation of transparency-backed delegate certificates and associated claims.</t>

<section anchor="authentication-service-behavior"><name>Authentication Service Behavior</name>

<t>When originating a call, the Authentication Service performs the following steps:</t>

<t><list style="symbols">
  <t>Constructs a PASSporT for the session containing the required claims (e.g., <spanx style="verb">orig</spanx>, <spanx style="verb">dest</spanx>, <spanx style="verb">iat</spanx>), as well as any optional authorized claims (e.g., Rich Call Data).</t>
  <t>Signs the PASSporT using a VESPER delegate certificate that:
  <list style="symbols">
      <t>Contains a valid TNAuthList extension authorizing the <spanx style="verb">orig</spanx> telephone number.</t>
      <t>Optionally includes JWTClaimConstraints or EnhancedJWTClaimConstraints extensions consistent with the asserted claims.</t>
      <t>Is backed by a Signed Certificate Timestamp (SCT) from a transparency log.</t>
    </list></t>
  <t>Attaches the signed PASSporT in a SIP Identity header using the <spanx style="verb">"x5c"</spanx> header parameter to convey the certificate chain inline.</t>
  <t>Ensures that the certificate is valid, unexpired, and issued by a CA compliant with the VESPER certificate issuance profile.</t>
</list></t>

</section>
<section anchor="verification-service-behavior"><name>Verification Service Behavior</name>

<t>Upon receiving a SIP request containing an Identity header, the Verification Service:</t>

<t><list style="symbols">
  <t>Validates the PASSporT signature and parses the included claims.</t>
  <t>Validates the VESPER delegate certificate by checking:
  <list style="symbols">
      <t>Trust chain validity and issuer compliance with STI and VESPER certificate policies.</t>
      <t>The presence and accuracy of the TNAuthList extension corresponding to the <spanx style="verb">orig</spanx> telephone number.</t>
      <t>The presence and SCT validation of the certificate's transparency log inclusion.</t>
      <t>Any JWTClaimConstraints <xref target="RFC8226"/> and EnhancedJWTClaimConstraints <xref target="RFC9118"/> extensions, ensuring claimed values conform to constraints.</t>
    </list></t>
  <t>Rejects the PASSporT if any of the above validations fail.</t>
</list></t>

<t>This delineation ensures that only calls with properly issued and verifiable delegate certificates are authenticated and accepted under the VESPER framework, reinforcing accountability and integrity within the STIR ecosystem.</t>

</section>
<section anchor="connected-identity-authentication-and-verification"><name>Connected Identity Authentication and Verification</name>

<t>A similar verification process applies when VESPER is used in deployments that support Connected Identity as defined in <xref target="I-D.ietf-stir-rfc4916-update"/>. In this model, the destination party may return a PASSporT of type 'rsp' within a SIP response, signed using a delegate certificate authorized for the 'dest' telephone number in the original call.</t>

<section anchor="authentication-by-the-destination-party"><name>Authentication by the Destination Party</name>

<t>When acting as an Authentication Service, the destination party performs the following steps to generate and sign the 'rsp' PASSporT:</t>

<t>Constructs a PASSporT of type 'rsp' including:</t>

<t><list style="symbols">
  <t>The original 'orig' and 'dest' values from the incoming call.</t>
  <t>The 'iat' claim representing the issuance time.</t>
  <t>Optionally, include other claims to convey attributes of entity including "vper", if appropriate.</t>
</list></t>

<t>Sign the PASSporT using a valid VESPER delegate certificate containing a TNAuthList extension authorizing use of the 'dest' telephone number (i.e., the destination party's number).</t>

<t>Include the "x5c" header in the PASSporT, conveying the certificate chain used for signing.</t>

<t>Ensure the certificate is valid, unexpired, includes a valid SCT, and that the certificate corresponds to the 'dest' claim.</t>

<t>Attach the signed PASSporT to a SIP 200 OK response using the Identity header as described in <xref target="I-D.ietf-stir-rfc4916-update"/>.</t>

</section>
<section anchor="verification-by-the-originating-party"><name>Verification by the Originating Party</name>

<t>To verify the 'rsp' PASSporT, the originating party (or an upstream Verification Service acting on its behalf) <bcp14>MUST</bcp14> perform the following checks:</t>

<t><list style="symbols">
  <t>The 'rsp' PASSporT <bcp14>MUST</bcp14> be signed using a valid VESPER delegate certificate with a TNAuthList value matching the 'dest' number.</t>
  <t>The certificate <bcp14>MUST</bcp14>:
  <list style="symbols">
      <t>Be issued by a Certification Authority compliant with <xref target="RFC8226"/> and the VESPER profile;</t>
      <t>Include a valid SCT and be within its validity period.</t>
    </list></t>
  <t>The PASSporT signature <bcp14>MUST</bcp14> be validated using the provided 'x5c' header.</t>
  <t>The 'orig' and 'dest' claims <bcp14>MUST</bcp14> match those of the original PASSporT that initiated the call.</t>
  <t>The 'iat' claim <bcp14>MUST</bcp14> be within an acceptable freshness interval.</t>
  <t>The Verification Service <bcp14>SHOULD</bcp14> validate the certificate's inclusion in a transparency log using the SCT.</t>
</list></t>

<t>These procedures confirm that the destination party has authenticated and cryptographically asserted its identity using a VESPER delegate certificate, extending mutual identity validation to the terminating side of the call. This process supports bi-directional trust, enhances accountability, and enables privacy-aware identity assertion.</t>

</section>
</section>
</section>
</section>
<section anchor="passport-claim-vper-verifiable-persona-entity-representation"><name>PASSporT Claim: "vper" (Verifiable Persona Entity Representation)</name>

<t>This section defines a new PASSporT claim, "vper" (Verifiable Persona Entity Representation), intended to encapsulate structured, extensible metadata about an entity authorized to use a telephone number. The "vper" claim enables verifiable, privacy-conscious assertion of real-world entity attributes bound to a delegate certificate and associated number via the VESPER framework.</t>

<section anchor="claim-format"><name>Claim Format</name>

<t>The "vper" claim is a JSON object containing the following <bcp14>REQUIRED</bcp14> fields:</t>

<figure><artwork><![CDATA[
"vper": {
  "id": "string",              // Globally unique NA identifier
  "glue": ["string", ...],     // Array of GLUE URNs
  "name": "string",            // Registered legal business name
  "domain": "string"           // Domain associated with the entity
}
]]></artwork></figure>

<t>Field Definitions</t>

<t><list style="symbols">
  <t>id (<bcp14>REQUIRED</bcp14>): A globally unique identifier for the entity associated via Number Assignment process. This <bcp14>MAY</bcp14> be a UUID, a public key thumbprint, or another opaque identifier that supports global uniqueness and non-repudiation. The identifier serves as a persistent reference to the entity across authority tokens and certificates.</t>
  <t>glue (<bcp14>REQUIRED</bcp14>): An array of GLUE URNs defined in <xref target="I-D.ietf-spice-glue-id"/> that bind the entity to one or more standardized, jurisdiction-specific or globally recognized business identifiers (e.g., DUNS number, EIN, LEI, VAT ID). These enable interoperability across business registries and aid in regulatory traceability.</t>
  <t>name (<bcp14>REQUIRED</bcp14>): A string containing the legal business name as registered with the relevant jurisdictional authority or business registry. This <bcp14>MUST</bcp14> match the name associated with the provided GLUE identifiers.</t>
  <t>domain (<bcp14>REQUIRED</bcp14>): A string representing the canonical domain name associated with the business, typically used for its public website and/or authorized communication addresses (e.g., email). This value <bcp14>MUST</bcp14> be DNS-resolvable and under the administrative control of the asserting entity.</t>
</list></t>

<t>The "vper" claim may be used in full or in hashed form to support privacy-conscious deployments, as guided by the next section.</t>

<t>Extensibility</t>

<t>The "vper" claim is designed to be extensible. Future specifications may define optional fields for additional structured entity metadata. Such extensions <bcp14>MUST</bcp14> be registered via the IANA PASSporT claim registry under this base claim or defined via new claim types.</t>

</section>
</section>
<section anchor="jwtclaimconstraints-for-transparent-claims"><name>JWTClaimConstraints for Transparent Claims</name>

<t>This section defines how VESPER uses JWTClaimConstraints <xref target="RFC8226"/> and EnhancedJWTClaimConstraints <xref target="RFC9118"/> to announce claims through the certificate that is submitted to a transparency log, while preserving privacy when desired or required. In this model, a Claim Agent validates an Entity's desired claims and issues a JWTClaimConstraints Authority Token <xref target="I-D.wendt-acme-authority-token-jwtclaimcon"/> to a Certification Authority (CA). The CA includes a corresponding constraints extension in the delegate certificate, and that certificate is logged for ecosystem transparency. Three privacy modes are supported:</t>

<t><list style="numbers" type="1">
  <t>Transparent-Value — the constraint fixes the exact value to be asserted (fully transparent).</t>
  <t>Semi‑Private (Unsalted Hash) — the constraint fixes a hash of the value (guessable by an observer who can test likely values).</t>
  <t>Private (Salted Commitment) — the constraint fixes a salted hash commitment; verification requires out‑of‑band salt disclosure from the Entity to an explicitly authorized relying party (RP).</t>
</list></t>

<section anchor="goals-and-non-goals"><name>Goals and Non-Goals</name>

<t><list style="symbols">
  <t>Binding: Relying parties <bcp14>MUST</bcp14> be able to verify that a presented claim value is one authorized by the certificate.</t>
  <t>Transparency: Observers <bcp14>MUST</bcp14> be able to audit which claims are authorized for a number, without necessarily learning the private values.</t>
  <t>Transparent Privacy Choice: Entities and Claim Agents <bcp14>MUST</bcp14> be able to choose per-claim whether values are public, semi‑private, or private.</t>
  <t>Simplicity: All modes use widely deployed primitives (SHA‑2) and reuse deterministic serialization similar to RCD integrity <xref target="RFC9795"/> mechanism.</t>
</list></t>

<t>This section does not redefine the syntax of the JWTClaimConstraints/EnhancedJWTClaimConstraints extensions; it profiles their content to carry clear values or integrity artifacts for values.</t>

</section>
<section anchor="addressing-claims-in-passports"><name>Addressing Claims in PASSporTs</name>

<t>When Claims appear in PASSporTs, constraints refer to claims by claim name and, for structured claims, by JSON Pointer (RFC 6901) into the claim value.</t>

<t>However, even if the PASSporT does not include an explicit claim as part of the signed object in the context of a call or message, an important property of the transparency in the VESPER framework is if the relying party wants to validate claims made as part of transparency validation outside of PASSporT verification, it can look at the JWTClaimsConstraints objects to validate claims.</t>

</section>
<section anchor="constraint-encodings-three-privacy-modes"><name>Constraint Encodings (Three Privacy Modes)</name>

<t>For each constrained claim (or claim path), the JWTClaimConstraints Authority Token and the certificate extension <bcp14>MUST</bcp14> carry exactly one of the following encodings.</t>

<section anchor="transparenct-value-constraint"><name>Transparenct-Value Constraint</name>

<t>The claim value is directly constrainted to be the value in open text.</t>

<t>Verification: The VS compares the presented PASSporT claim value (after deterministic serialization if structured) for equality with value.</t>

</section>
<section anchor="semiprivate-constraint-unsalted-hash"><name>Semi‑Private Constraint (Unsalted Hash)</name>

<t>Intended use: Values where limited hiding is acceptable, understanding that guessing is possible (e.g., logo URL or short labels).</t>

<t>Semantics: The certificate fixes a digest D over the canonicalized value without a salt.</t>

<t>Computation:</t>

<t>V_bytes = deterministic_serialize(V)
D = SHA-256(V_bytes)</t>

<t>Verification: The VS computes D' over the received value and accepts if D' == digest.</t>

<t>Privacy: An observer who can guess candidate values can compute digests and test them. Use only when this risk is acceptable or values have sufficient entropy. This mirrors the integrity mechanism in <xref target="RFC9795"/>.</t>

</section>
<section anchor="private-constraint-salted-commitment-with-selective-disclosure"><name>Private Constraint (Salted Commitment with Selective Disclosure)</name>

<t>Intended use: Sensitive values (e.g., opaque IDs, PII) where the Entity wants verifiability only for explicitly authorized RPs.</t>

<t>Semantics: The certificate fixes a commitment C that incorporates a secret, per‑claim salt S. Only C (and optionally a hash of S) is published. The Entity may later disclose S (and, if needed, V) out‑of‑band to an RP of its choosing for verification.</t>

<t>Data Items</t>

<t>V: value to be proven (octets after deterministic serialization).
S: secret random salt (≥ 128 bits from a CSPRNG).
H: a collision‑resistant hash (<bcp14>MUST</bcp14> support SHA‑256).</t>

<t>Computation:</t>

<t>V_bytes = deterministic_serialize(V)
C = H( S || V_bytes )
(optional) S_hash = H(S)</t>

<t>Publication: The certificate and transparency log include only commit (and optional salt_hash). S and V are not published.</t>

<t>Salt Disclosure: The Entity <bcp14>MAY</bcp14> disclose S (and, if required, V) to an authorized RP via an authenticated, confidential channel (e.g., a compact JWE encrypted to the RP's public key). Disclosure is per‑RP and per event at the Entity's discretion.</t>

<t>Verification by RP:
        1.      Obtain (V, S) from the Entity.
        2.      Compute C' = H( S || deterministic_serialize(V) ).
        3.      Accept if and only if C' == commit (and, if salt_hash present, H(S) == salt_hash).</t>

</section>
</section>
<section anchor="certificate-and-transparency-log-requirements"><name>Certificate and Transparency Log Requirements</name>

<t>The CA <bcp14>MUST</bcp14> copy the constraints from the JWTClaimConstraints Authority Token into the certificate's JWTClaimConstraints/EnhancedJWTClaimConstraints extension without widening them.</t>

<t>The issued certificate <bcp14>MUST</bcp14> be submitted to a transparency log; the log therefore reveals:
* the existence of each constrained claim/path, and
* for each, either the clear value, an unsalted hash, or a salted commitment (but never the salt).
* For mode commit, implementations <bcp14>MUST NOT</bcp14> include the salt in the certificate or log.</t>

</section>
<section anchor="authority-token-requirements"><name>Authority Token Requirements</name>

<t>A JWTClaimConstraints Authority Token <bcp14>MUST</bcp14>:</t>

<t><list style="symbols">
  <t>identify the Claim Agent and the Entity,</t>
  <t>enumerate the constrained claims/paths and, for each, one of the three encodings above,</t>
  <t>specify the hash algorithm where applicable ("alg": "sha-256" <bcp14>RECOMMENDED</bcp14>),</t>
  <t>be time‑bounded and bound to the TN(s) (e.g., via TNAuthList) authorized for the Entity.</t>
</list></t>

<t>The CA <bcp14>MUST</bcp14> verify the token per <xref target="I-D.wendt-acme-authority-token-jwtclaimcon"/> and issue a certificate that does not exceed the token's scope.</t>

</section>
<section anchor="verification-by-a-relying-party-vs"><name>Verification by a Relying Party (VS)</name>

<t>When verifying a PASSporT:</t>

<t><list style="symbols">
  <t>For value mode: ensure the presented claim equals the constrained value.</t>
  <t>For hash mode: recompute the digest over the presented claim and compare.</t>
  <t>For commit mode: if the RP has received S (and V if needed) out‑of‑band, recompute and compare the commitment. If S is not available, the RP <bcp14>MUST</bcp14> treat the constraint as "authorized but not presently verifiable" and apply local policy (e.g., defer validation, request disclosure, or treat as unauthenticated attribute).</t>
</list></t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>TBD</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>New PASSporT Claim: "vper"</t>

<t>This document requests that the IANA add a new entry to the "PASSporT Claims" registry as follows:</t>

<texttable title="PASSporT Claims registry entry for &quot;vper">
      <ttcol align='left'>Claim Name</ttcol>
      <ttcol align='left'>Claim Value Type</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>vper</c>
      <c>JSON object</c>
      <c>RFCthis</c>
</texttable>

</section>
<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>The authors would like to acknowledge Jon Peterson for valuable feedback into the concepts and framework for this document.  This work is mainly based on the many years of inputs and specifications developed in the STIR working group and the larger telephone industry which the authors acknowledge as a critically important feedback and influence toward the development of the VESPER framework.</t>

</section>


  </middle>

  <back>



    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC8224">
  <front>
    <title>Authenticated Identity Management in the Session Initiation Protocol (SIP)</title>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <author fullname="C. Jennings" initials="C." surname="Jennings"/>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <author fullname="C. Wendt" initials="C." surname="Wendt"/>
    <date month="February" year="2018"/>
    <abstract>
      <t>The baseline security mechanisms in the Session Initiation Protocol (SIP) are inadequate for cryptographically assuring the identity of the end users that originate SIP requests, especially in an interdomain context. This document defines a mechanism for securely identifying originators of SIP requests. It does so by defining a SIP header field for conveying a signature used for validating the identity and for conveying a reference to the credentials of the signer.</t>
      <t>This document obsoletes RFC 4474.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8224"/>
  <seriesInfo name="DOI" value="10.17487/RFC8224"/>
</reference>
<reference anchor="RFC8225">
  <front>
    <title>PASSporT: Personal Assertion Token</title>
    <author fullname="C. Wendt" initials="C." surname="Wendt"/>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <date month="February" year="2018"/>
    <abstract>
      <t>This document defines a method for creating and validating a token that cryptographically verifies an originating identity or, more generally, a URI or telephone number representing the originator of personal communications. The Personal Assertion Token, PASSporT, is cryptographically signed to protect the integrity of the identity of the originator and to verify the assertion of the identity information at the destination. The cryptographic signature is defined with the intention that it can confidently verify the originating persona even when the signature is sent to the destination party over an insecure channel. PASSporT is particularly useful for many personal-communications applications over IP networks and other multi-hop interconnection scenarios where the originating and destination parties may not have a direct trusted relationship.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8225"/>
  <seriesInfo name="DOI" value="10.17487/RFC8225"/>
</reference>
<reference anchor="RFC8226">
  <front>
    <title>Secure Telephone Identity Credentials: Certificates</title>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <author fullname="S. Turner" initials="S." surname="Turner"/>
    <date month="February" year="2018"/>
    <abstract>
      <t>In order to prevent the impersonation of telephone numbers on the Internet, some kind of credential system needs to exist that cryptographically asserts authority over telephone numbers. This document describes the use of certificates in establishing authority over telephone numbers, as a component of a broader architecture for managing telephone numbers as identities in protocols like SIP.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8226"/>
  <seriesInfo name="DOI" value="10.17487/RFC8226"/>
</reference>
<reference anchor="RFC9118">
  <front>
    <title>Enhanced JSON Web Token (JWT) Claim Constraints for Secure Telephone Identity Revisited (STIR) Certificates</title>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <date month="August" year="2021"/>
    <abstract>
      <t>RFC 8226 specifies the use of certificates for Secure Telephone Identity Credentials; these certificates are often called "Secure Telephone Identity Revisited (STIR) Certificates". RFC 8226 provides a certificate extension to constrain the JSON Web Token (JWT) claims that can be included in the Personal Assertion Token (PASSporT), as defined in RFC 8225. If the PASSporT signer includes a JWT claim outside the constraint boundaries, then the PASSporT recipient will reject the entire PASSporT. This document updates RFC 8226; it provides all of the capabilities available in the original certificate extension as well as an additional way to constrain the allowable JWT claims. The enhanced extension can also provide a list of claims that are not allowed to be included in the PASSporT.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9118"/>
  <seriesInfo name="DOI" value="10.17487/RFC9118"/>
</reference>
<reference anchor="RFC9447">
  <front>
    <title>Automated Certificate Management Environment (ACME) Challenges Using an Authority Token</title>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <author fullname="M. Barnes" initials="M." surname="Barnes"/>
    <author fullname="D. Hancock" initials="D." surname="Hancock"/>
    <author fullname="C. Wendt" initials="C." surname="Wendt"/>
    <date month="September" year="2023"/>
    <abstract>
      <t>Some proposed extensions to the Automated Certificate Management Environment (ACME) rely on proving eligibility for certificates through consulting an external authority that issues a token according to a particular policy. This document specifies a generic Authority Token Challenge for ACME that supports subtype claims for different identifiers or namespaces that can be defined separately for specific applications.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9447"/>
  <seriesInfo name="DOI" value="10.17487/RFC9447"/>
</reference>
<reference anchor="RFC9448">
  <front>
    <title>TNAuthList Profile of Automated Certificate Management Environment (ACME) Authority Token</title>
    <author fullname="C. Wendt" initials="C." surname="Wendt"/>
    <author fullname="D. Hancock" initials="D." surname="Hancock"/>
    <author fullname="M. Barnes" initials="M." surname="Barnes"/>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <date month="September" year="2023"/>
    <abstract>
      <t>This document defines a profile of the Automated Certificate Management Environment (ACME) Authority Token for the automated and authorized creation of certificates for Voice over IP (VoIP) telephone providers to support Secure Telephone Identity (STI) using the TNAuthList defined by STI certificates.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9448"/>
  <seriesInfo name="DOI" value="10.17487/RFC9448"/>
</reference>
<reference anchor="RFC9795">
  <front>
    <title>Personal Assertion Token (PASSporT) Extension for Rich Call Data</title>
    <author fullname="C. Wendt" initials="C." surname="Wendt"/>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <date month="July" year="2025"/>
    <abstract>
      <t>This document extends Personal Assertion Token (PASSporT), a token for conveying cryptographically signed call information about personal communications, to include rich metadata about a call and caller that can be signed and integrity protected, transmitted, and subsequently rendered to the called party. This framework is intended to include and extend caller- and call-specific information beyond human-readable display name, comparable to the "Caller ID" function common on the telephone network. It is also enhanced with an integrity mechanism that is designed to protect the authoring and transport of this information for different authoritative use cases.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9795"/>
  <seriesInfo name="DOI" value="10.17487/RFC9795"/>
</reference>

<reference anchor="I-D.ietf-stir-rfc4916-update">
   <front>
      <title>Connected Identity for STIR</title>
      <author fullname="Jon Peterson" initials="J." surname="Peterson">
         <organization>TransUnion</organization>
      </author>
      <author fullname="Chris Wendt" initials="C." surname="Wendt">
         <organization>Somos</organization>
      </author>
      <date day="7" month="July" year="2025"/>
      <abstract>
	 <t>   The Session Initiation Protocol (SIP) Identity header field conveys
   cryptographic identity information about the originators of SIP
   requests.  The Secure Telephone Identity Revisited (STIR) framework,
   however, provides no means for determining the identity of the called
   party in a traditional telephone-calling scenario.  This document
   updates prior guidance on the &quot;connected identity&quot; problem to reflect
   the changes to SIP Identity that accompanied STIR, and considers a
   revised problem space for connected identity as a means of detecting
   calls that have been retargeted to a party impersonating the intended
   destination, as well as the spoofing of mid-dialog or dialog-
   terminating events by intermediaries or third parties.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-stir-rfc4916-update-07"/>
   
</reference>

<reference anchor="I-D.wendt-acme-authority-token-jwtclaimcon">
   <front>
      <title>JWTClaimConstraints profile of ACME Authority Token</title>
      <author fullname="Chris Wendt" initials="C." surname="Wendt">
         <organization>Somos Inc.</organization>
      </author>
      <author fullname="David Hancock" initials="D." surname="Hancock">
         <organization>Somos Inc.</organization>
      </author>
      <date day="7" month="July" year="2025"/>
      <abstract>
	 <t>   This document defines an authority token profile for handling the
   validation of JWTClaimConstraints and EnhancedJWTClaimConstraints.
   This profile follows the model established in Authority Token for the
   validation of TNAuthList but is specifically tailored for the
   JWTClaimConstraints certificate extensions.  The profile enables
   validation and challenge processes necessary to support certificates
   containing both TNAuthList and JWTClaimConstraints, particularly in
   the context of Secure Telephone Identity (STI).

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-wendt-acme-authority-token-jwtclaimcon-03"/>
   
</reference>

<reference anchor="I-D.ietf-stir-certificates-shortlived">
   <front>
      <title>Short-Lived Certificates for Secure Telephone Identity</title>
      <author fullname="Jon Peterson" initials="J." surname="Peterson">
         <organization>TransUnion</organization>
      </author>
      <date day="6" month="July" year="2025"/>
      <abstract>
	 <t>   When certificates are used as credentials to attest the assignment of
   ownership of telephone numbers, some mechanism is required to provide
   certificate freshness.  This document specifies short-lived
   certificates as a means of guaranteeing certificate freshness for
   secure telephone identity (STIR), potentially relying on the
   Automated Certificate Management Environment (ACME) or similar
   mechanisms to allow signers to acquire certificates as needed.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-stir-certificates-shortlived-03"/>
   
</reference>

<reference anchor="I-D.ietf-spice-glue-id">
   <front>
      <title>GLobal Unique Enterprise (GLUE) Identifiers</title>
      <author fullname="Brent Zundel" initials="B." surname="Zundel">
         </author>
      <author fullname="Pamela Dingle" initials="P." surname="Dingle">
         <organization>Microsoft Corporation</organization>
      </author>
      <author fullname="Michael B. Jones" initials="M. B." surname="Jones">
         <organization>Self-Issued Consulting</organization>
      </author>
      <date day="20" month="October" year="2025"/>
      <abstract>
	 <t>   This specification establishes an IETF URN namespace for GLobal
   Unique Enterprise (GLUE) Identifiers.  It also establishes an IETF
   URN namespace for identifiers addressing the requirements identified
   by the IETF Secure Patterns for Internet CrEdentials (SPICE) working
   group.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-spice-glue-id-02"/>
   
</reference>
<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>



    </references>





  </back>

<!-- ##markdown-source:
H4sIAAAAAAAAA61923Lj1pnuPZ8CW66aFl2gnHbaji1PZoatVsdK7G5tUd0u
19RUDIJLFNwgwACg1Ezsqdzuy121H2DfzPW8w36UPMn+j2v9CwDVciq+cFMk
DuvwH77/uGaz2aQrutKdJkdvzxeX51fJLHnZZBt3Xzfvkpu6Sd6eN8VNkS1L
lyyuL5JL17R1lbVHk2y5bNydv/FokmedW9fN/jRpu9VksqrzCh50mqya7Kab
3btq1c3armhmd67dumb2q88n7W65Kdq2qKtuv4VLL86vXybJR0lWtjU8uahW
bgv3uao7SpMjtyq6uimyEv+4mD+Hf2CARxdX1y+PJtVus3TN6WQFozid5HXV
uqrdtadJ1+zcBMb560nWuAyeOt9uywIGC29tk6xaJVcuK2fXxcYdTXDa66be
beG6hct3jUuuXem2t3XlkgscSNHt4Ya7oi06tzqavHN7uGd1OoGF6/yVPBj8
7s51XVGtE/z8h+/PJpNs193WDV4/SeC/m11Z8jKd3TZFm3yHy0S/1M06q4o/
0zhPk0W9qds0uajyE/rVbbKihEHmeNe/ZTglt1oWXXuS15sjuiSvd1WH2/Fm
MXzbVb1M/umj9796+tn8q7K4zx7/yqZe/tjiLf+2xi/wfYPXTaq62cBj7mAr
kuTq5dkXn376LHz8LHz8XD5++fTpF/rx2bPfhI/+2998SbddzF6cFK67YVJq
bvJnXz79fLbb8r7z70xrWb5xM15u2LRZV79z1ezH+y4vs2IDBDJ8Wu6aDogd
CbmdtXBfV8IUVvGF2yJ3s3W5c7MCfpkU1U2Y62Q2myXZsu2aLO8mk+tb2FHg
g90GCCeh68rizw6oLtk29U0BPIX0lyU3Ect1ty7ZtS6pb5IVkNQahpPYofFN
OrGEJtbCP8B3javWcHtFz8jats4L2s1k6bp7h9/3aBQvKtYVDpCfizcSmRfw
ou4265Lb7M7x8+SVNNmkKda3Hb4Vhwo/b5KaX2teAS+FSZ0kFx3M5KaoaOqb
GmaVFFVyf1vkt3TL9as5PPubou2SuZ/XNc4raV1zh7fhncDKLXBd0rht44C/
O54brNMD06JZ0WCBBGY42OOr6zfTFL7P4U3wuOUenv2q7rJmn8zXeAvNu6zX
uALwIruS+BUIiPUtsLaXjLDfVbsF+VLl+2Tj8ltgo3bTniTXMLmwuSjWEve+
A/Js7S6P7uVuuwUCTGq4rkku54sF/HmdEPG2SVm8c8kVLt9ZVpbJi6zLYFpn
L6Y4GVpqFDoZMCuMDmnq999dn+GtZzADGG2B291bah4ubiYPAqaTgHDeyQpF
mw9PbFxer0FawM+4wijo4CONL8nWRE/3RXdbMFHAxe0eNm+Dc4PlBHJOPOvA
HuoKwyPwrkCGe9lKfM1gm3mBo63bltkeaSWHsQK7lLwEMAocb7PCZeE9lZUU
mi8aZMk7VwFVuBReDVuY08V2a4nxcpJ02bIoYXQnkxejLAqXZ9t2V+IPeFdR
wdthB/HvZS0THFItPj+shF2gOxAdK/r2rshGKQafGMZAi+qvwn2UqW/SZAmK
Vf/SO/FaXPCc3jEYGfIYPh+oDe+EBYG5C73EsgmoZrtblkV7i8+pcSvC7/Fy
AofhUgML4TMbV+712SR86sQAgHLPDLencQD9ujXNDJcMNgA2e5PBI2GcMmLk
LWJ9V2aeMoUlBescv3UxuDm/QnAzTUCfNnUG3LXrCpbY8PMVUkhX53UZJOX8
7Nvz/mbgwFXWMxcGSQFSZwcoRj7CQ7ZNcQfjniFgyYt618Ktu2rF+4eM60UP
7ldvV5jDkoJwiczDy26hJVx7lpGGsDauy+Ad2QlrrE2xWpVuMvkIlH3X1Ktd
jveg/oJ1OYiCjmFNYKma/BagUN7BVUBZWQuPh/fhckZ08Ze/iML/+efUi7Pw
9Wf4ta7q4uIyvObWZSvYzpvClSt/+TO8nFUK3REWDThedWcBVAF/ovTIcHiy
bZ5hcDth4D2CgjuVyg3/pUyWOXB0U+5HuRcGtGt4wwETbXaVB5mtI4x7knx3
izqf5U9QEzDFcusZnN7Og8ZBpHg5yPQ6qWrQogWIMeQF1yIRAZNZSXl/CyzT
Kj3+mfmP+CBZg9Qean/kBgtRUAQCNVmAIoyP+2m3GlWCJfK/G7NsQAUDbzpa
VlYkwiz7QLEjon+gJmB/t7DYxVI0HmBhHJFMEZReXa3hNljTd6CecJ3QDIHH
l/CmYoPKNkO00AI7tAQTihN3kjJ1lChiNjgSeAksDO4ySvXNlu0h3OdpAnxH
Sz7kU1itXWX2RWUcsD1w9o6lHZCwazZE0gh0UGn1CEkAVQt8ew2SdbWCSSOS
KFoep8i1gDgK4Wd4AerBVnRR5xCgCpoBqLMpmqZWDQj/4I94z01TbwSB0JBm
zN8gluGPBiaQAk4BMQmL9oeqvk++r3dNcga/1Ru45RgMnim9Mfz4fNciDGzx
x+dTfGPuVsSb9w7I3pM1vYVZu0CdDNukryW9wxAsExmw4ge1KvXgH1idH3dV
3ln9FvDLQ3hRH1VUd3V5h1t9ZUjrklkE9hQW7LUxmIJS+BHEQLsqchFHr+gN
+Jz5Cna3QPwFdiyKu+ScaReIUZBW9hAW1snCypAgRPMIBaFfNeFEADMROh8D
Ts/dvobx9m81PCqcPxRz9ZZnhhy6Am3G04zQXKVcucn2DFYD7GNMALcLH+wD
EY0iWp4qmH841TxDW0YeJdDT8BVS1/pRYBce+3hT8eefT+xD9ZneMiKOgqUk
+NLUIBRQxiFnkfCWQe9aQUS8Dq4gxmKRjuIfxYCYf0Ed3WbADC1uhlxx7E7W
IJZ4pkdNviqOFMsO6IMWbYrvZEArdhxD174KFCiCr7J7eX9LlNcWaCoR7v/T
Dj8r+hssLCLAHYuJBFQc7DMIXhRw91nDDIK0TqM5qC3YNJR1C5gRNR/jeH58
NoInw60gxdhubF1HwNDt4PISbZGZGCMNiHUkEZB9NW3pDc1QzEsS80ppai/0
DZVxTFazgqp3sM/vtzVtFsl3xrgIvnBs8FtZ5AXOy1Ax3CwLDoscJg9fwiAa
kTaIU9jYUpBnCHIL2wrjh8kuXQVUQfLTUybcagycW9U3wvD9GXtMt6krcsDB
TXxpsKKQqu/qYoWqZ7falTjaSDl6biAkYRRUS7RerZg1WpC4DrTbReVFizGG
8c2Ejoyxog6AWzRKAfFVDJVFsIwqRaKNYIqrhhAAZh5ohZQ3+w3SAclQAfcg
La68sRpz4UPuKpQqFxWpb3aK8HhbGOfApkA5N8YqFkbSEqNth/LXLsZA25EI
FotdBq6ClT2JqnwbB3AMJstCinCwt9ey3voEux74KJirfmnQbhVLPuB/sIvL
nXAzwn5Bca4V3Ka6Bt61Vbm1BNtsRfARVysHoibzJrLLWRlb4QDjI8ObnC+6
wRZeKUxHCQKKfoMyPmNHihGPxlJDHl0jXIJJFNuSpTRT24k4/4T2mL/Y8cVW
H4NrBKEsmFV1Gdl0DyvX9zYYccDyrg1uRdaFVQXXi6C3cnYAxnl7S5Ymt8X2
oIsQQJ4RegO3CSGNmx2ZXXgtGjMk4hxpFp4ukBF6QINwABEHC3lTIkpCrhZR
s/eq1IBk1vEoDeBK6117vk9g5Df0PUFVEDkkTgOAHjMCS5wbkmvl5a+RDqhp
mTOEcnUIRg3JeFPmXe8tWO6KcoUKp2fD+z02LsMY2ZOLlDjLtbIzAXKKtBlq
Gr8wQh5ggRbAD7smQ4UbyV82roODGAkPhpY7dpGugdBhwbIlvAuwRdmRsVOi
jQdbQSJ/3Tj4ircNVyYnr1p/UGIh9GaHrgXATUgEHim/IC8l/c2ehneAlDCW
0iZH375ZXGOQB/9NXr2mz1fn//PNxdX5C/y8+Hr+zTf+w0SuWHz9+s03L8Kn
cOfZ62+/PX/1gm+Gb5Poq8nRt/Pvj3iFjl5fXl+8fjX/5ohFoLWOEdigFBG8
B1RNCLSdgCDIm2LJUuz52eX/+79Pn4Hs/x8AwT59+vTLn3+WP754+ptn8Aci
Kn5bXZV7+ROB4gQoCQxhQjYliTykXeI/IPT6vgLmalA9fvzvuDL/cZr88zLf
Pn32L/IFTjj6Utcs+pLWbPjN4GZexJGvRl7jVzP6vrfS8Xjn30d/67qbL//5
X0s0hmdPv/jXf5kgCb0G/rkr3H0/shJiC8NASmz32ZDIKEsJFvCM3/cqsMxj
LmlZzD3a20FeCRXJeMVBxygJjaAJVPidJN+pR71ow1xTGOWNaxq1LoJ783zM
vdlOU+MlbFzAu/iAYXBDIR6ii8jt9GEzE2dp7cVUboshZpJ1HbDPDhfuQUsQ
VoWdET17B5FFHCFhgb3for/G5d4j7kMcqsWiEEcIL4U9j3RQ40LQyMPB8dCP
DeHQc9OepDbOXzJSUIfA30AKJywOc3SMwcZsipaAAq3/cIlTNtDI4CJjp+cy
UucwXrlBpQjiy1gdS9RUSvUNBsKBokrFdENPYtF5L+aAd8j6AOW65qAdjSe8
HrFesi7rJYK5aIypWKWtE6ySibvOByoUmmRRoGSwUWQto+is7+Ht5D1nhbYB
LYb+U/Iq6s7Jow479BivEEbfZBVC5BY9XssMg0BgCLH5Vhds15RZ/m4Eh6KL
s2hLBzeR6QI4utgWGB5LxWTCYLHzdIEywg/C+dAGho3Edea9eKvirljtQEEA
Vf9SbyAuMTwFLHLa3Y2DjeYlgznhc3RFJJajKHgYSOUNG5oYxlyyOPRBBxeB
OAwYoYulpJGNOtNiT5qYCmwoBVfaTY2E4P1awcFH5jVJbY2MROFEO1q8c9Ts
KtoPOCLElz4W2ELc2YP5LG5jc3YsfB8xANpZhkPZzErtV8u98PV6x0GwMU9m
35HJkmYQR+AF9MyOMre3N/Kautkn2xoFDFpEd0gLfVEBIk78j/2JjinldNSh
ZwJKtBrnArIPXospJnAtBojH4sPjilxoiVw3o0xFNLPXyMmQr0QhEGudRdFZ
JX6JdRqhnOvQExQ7xseqamucJm/rEkcJO7fFOALZMDbaPrA5iG38yzozWsyd
ajQBBI23pLjpRXILDZSQvyogiHrXtbgSSJ3etUNWeqo2p+cGdjtIXBf0GEca
br1+Dk8l3TsgbNodYNvDCwsLUtxpyC03JEGiZuC7DGBAbEAiJU4taNW3SNoN
lVve7LddvW6yLXyPJADUq54Fui+4lNhaLYsNW7GR5yL40GA0rdMwDOm4Lf2x
0tBiHOM3skqCFukv8YALzUbYx85XfHbZO2OOslJDYtbMNh7zkEg3cJ+HouRp
Y7HzI4IQWLx+SgthMeMKXNXWQf1wzgSjQuMI3WQr51WQ9zaB2HlTUTQCkBZM
gRwyMk0kS3RyDl0I3hPYqHcewTR5spq+ByAEUINvYRDzVwnRirG8zXButQl3
9jAceZSz5F2FJmAv4hEyMYb6flXDSChszJFyMCH9tkkY4Q/fn31CkTiWGuhM
cgDZK9SReHfREROSeeuxNIv3vYYCOHkMaeJenbwxk4PtugNMCTsqQVvy+voQ
AyIsIL4M3oueGLDqEOOgQ86LUnyWjp4R+q6UhLUIkUSJWiQzxNJIvbpW6K2S
xSQpUZJHyFTikaxG8tqY8m6KpmUH14iIttkXmAEAsmeFag9Xjebune89wGgz
WDBQjU/yPlfvrHd+Cl5vaqKLd7jGTiobvBeHVBviTKlaK61aJWl4s4u9RbGV
g36+RmPmNX2aebFE8hT5TmgTuYseIltEXgu1kyjjckYplw+Y1eKDwLcdvf8s
P8Ix5Ohb2vc0d4Xeg6HHdM2QDN27bQhmoXvhLeUlJ/OwUrCfwefw0UeWy0KW
tLnesek2YMQQ1mbk3ezo6lXPXyEEI8ib1aLBryNocFQa2ty5UQPu2kccwq5n
7FZPYLXWEtyIZBDeKwYQqU5MJd4Hy33lzZNR4dWg3vSEacOLJOP7nnW2f0BD
AvmBpPYimjaLvWYRYvbBJVkFki/WdsLRU5onmrgmOMEDgt2fc9gCjW6GKZKl
2pJTt0MZIPmnYftCCkowNdCJSZkWp5PJ0xOO7xchamuMNvJm2PyBKUgJ9472
O8TKH+tl0RtU/Cwx8oj5fa0r7ziu7OOgPet78ulJZBdsfYYDqdYoxYGdEDEW
w9HC9HNNdewZCiJfB9ZC5dMiAJFX6eTXJyPgo/cqzufzeacEQwRiqQEviY69
dUCIoj4vEmyTZyfJ/FBqRnL8aj5NGXP0Rs3JC5zqDv+ueMoaWVbvobfuUqVc
EdZtzx/p7SScSkhcNKmzcLcdAr3uJstRV7BITHDgm90Gs48O+jSV8Yw3hqW7
wHwjI9OeQ6IfZBjN6gUOuqT8uGLLHCkXDCSh8DCJwdsMRaAQpV+JNZqMlSr8
yFEp2h9HhL8Z4JhTcEIykZW71dnnH20SBgfQxcpeWa4nrRdZaXB+HOZD8emb
7Bj48x5d9hxWzQUCHgILGmIz7lDKQQtQmTya6vVU9T6SCz4VXgLpFczsodiA
gRldFGfVc8oJCdk4EzkdJoVLzgIAGbftGxEgAxEYsz1E46dsPGMjR97bEZ+t
zRFNLFJDguLIVL3bpiyNNZNQF0kVfLQ1KKVnlE4DALVABwMxAqd8AprBNAkb
R0bFBLKBU8Dzpm7bPvVfe29XiOUL7ZucyhbMCHKp98OJvXghxRE5+VxtEN27
0fhaajRR6d4XwfWo0IpE2UBl2wTkhrIhiQG8qj8h0HPlEwevrBVYEMayXO4h
UYSCeA7GKPHBGuF8TkwkSUcXgEUtjgCvBi1b90T7aFA0CuEMMRDqRRD/neQA
NOLqw2i8B/8U7LsncLLB6gJW6kGh42t6dG5F1UOKXuZKUZR6EFKxYaNHh1WE
c61siYPYZt/bnqLlEFAc5jJatW+tRWrWMnJqhYlk2yMBfSRZjgCybMIjp7np
KvUXaQQLGXenXRxvlD4i+FQ/sFBCVhqA8nAW6+XIw7VrtjXnE7veNMRfzVEB
WE+KqYTqJpsyQcxg0y54/dnuluU65KS131uHLSzs6D2wIfXGAQLGRGNO1clM
Ir+40hdo3+TmTcfXrxaX0/ShNybH+At8M5V6G3XPFJgonPmlxZzemRfF4mgl
a4YBo5KTdc6PIRjEjzma72RUkrCrNNsfAyYotP0XMbAEQOEqEOclJTNIaCi6
oeTUJHfy9PNnjIrw08lTIIGO88SyuL7ATkT9W15uoOtwkEj2AQ93VIQHRKqS
RAGMF2WkmNCcIXe08bcHvtBAZZ+jMwG4vDLyXrio3jUUD+qlNRq+itAupUeu
0WlDQr5oYtcgKwVK6QID6GMfrvHzO03msvWj9Sxm8sbn3uwkuSqrrDSPN/oE
XidsOQ/LDRLbZjjj6tjErkzcQiySsTYAdEBGEkBS1cZz53RxUhhl8acd+g49
tvZWJdvZshytPJLfigYuIYrOYHLBULjcHNGneKjYFDI1+IsFS2ZsXT/YEHPC
DMBtBiMzz9cBhRfaxGRxqYf3mCEEO5JiEvro+4xdwQj8JGIYGBmEnLvDigqr
O3gx8MrDUUA2VpHv/Ai8/xvjIaui3RI4Rh9l0eZlzUYMxcErh0MBhS1R9EcF
vFgutMaD0JuLlgSQRPCawybtksf3gcgm5w3pQmcHIhZ7FStxxHQ02iOFG2D7
cQWLJzM7DPG7q4sESJ3ZFVMgu1Gr4CRJWAsZjDAAfpPJAEF4r6QEOQd1nw9A
jAhdEKyLYJaCjUEJqjdPTG1fSO7IKfZ4IG3bGxyxNWUI1AOnlQNpwTBuLCvl
pLcYGgl8VAgGyMLjWnp1G7RGFLAKuTLBqSyS4cPZ9DbB2SiX15SHFG20hABa
zuGVUIGPLRWdOHQ1j/dRc8QaJ5NHG5xvPCG7+aLLo8oHzrqqw75qZte5bg9W
iFJSeuUzarZedCgG/T0IkIfTCEaoHCXI6KXoIDKl6RGlP2m9PyiUFwzSkb3G
ptRPv+7dbeNcCE7fYAkTbja7E6/keQokxguTIlOth9zaviBQ4rCwjS2yEdCV
PR52nbBbMR5vHE31Rjdp3KId6lJvLMc2HBGhAf77rQv1EPBmdCXWVOzt32wS
LqKAwDf12sd1hbbjqC7gA1dsGZdR6msjyWUIq7tss+XNf8/+AWJC5x0eQHta
8hnlK/bicpnqNAJk5Y4G7bmOUo8kV7qVCIsmwGG6L0i5Q/loEnjDlC/yPdgM
v8zWw/DSzPyShhAP+5coKUFWNGCFV3OPheNMevb5KwB4ZPkcJkhYg5qcD7Ge
8Tb3hREal8zzk4l8IEQUI3afoq+AfJjFMVBouD/ee8T5GXUrliDb69hhpiBd
xOU8seYiOBKaDqiK8qFO1VIMwdQNI/FuXmONVlHAgyzJiDRDaVjIOEBhS6iy
Uq7ulUeRAdzciVyHe7VMCXP0Mx9ktLVKrP9Ejl7i5PPkDqZC6w1E+8KDsMnk
Zd2MyHXNKNryzTA1TsZPx81tJLp6jc1nfMZnKGgaqEGiM+raUavg8FGzqF9B
Gm8ylibmt3VNHS9Mzg3lfMVFeWaFSRBgfhddhvsOt6BnTf3ikea9UXKBFSs0
fUJwuHwfbREWT/TUiZ9TVDABzzXVFMbDoNFl8uqjs0H5HWxHjKg1IF0qRMeU
j98ArId1oWHKbsLHQNjyYB+9IoFfRnEEvJXTFcu+5DYkMH1w8XE9icgzImqf
eYfLi4ERYEUMBpWlLJ3Pt4jylPwePWlDhZjWNrVdUWI1XACNSvgguuBpIFSV
aM7V++8j4Zj8xL78ytQ/BrrHARMly3ppeFkGhWK6cdYhINgFhTksRJ3nO8r6
p/wgREZZyxKkoQxQVrfG3K+Bctaa5bDdlnsWlr4VyZmxEy4UHl6yQqHiujEZ
mD7a8qht6TJVSUvVygYrR1DMMoJQbM106W25fmFFalB394DNdgjTpEMtEXoF
HTK0js8AwbE/xddmRkkgChfszCXvJYSo6OKI4/s1uJyhKNaotyMBF1WiIrJf
PF+xTNvRtFuzNyfJvCXJx1SHHORN2tSSYaFVZLbngmnE471U5PDcbwmaUkx3
CI7D+AjqaBh0YDlTF5uo7484FXD7GAhGrgtNVhQ8w4nk5X54KYe6WbjOMBzv
lQ8sbdxWwoNfdZHDq+NcjSrkbh0olrsdpF5ECUmck8lOY5ngcMQi9etkt8Xr
6SmmGjsOKeM26KZSm7VyxJ940L2KCfIG6lunKLs7yRFC0ei6mjVuC9NXHU56
RPIKTPAL5rZrpQwhqGlhlbuiLhXfoZSL6S4sgU2cw6gAwuGM8/o5OU5CNWK1
HO7KgPMdactgnGiFMx6z0cAo0qbN/I4rdYDwYf/ajp2gc0PUaZRzXrTW75s+
nPkuMFBCq5HPL0pvj3wgVA3vMwsi1XVFRHhdz95wvGs8aYQU4weyWQ3xsHAx
ttjZPMrMET3Mt3o7bVyLcJE3EDIGJsq054dArWg6JngfiQnbmCi51/5CV/fM
vSF0RLRpK6IRF7YP951Qb1LwV5g3ZpREhx5xSf9/hCdEzUzWHi0nS/riKiuM
Y2tXQ1ajCdxusGzkOZUo50MUl7Wje6xS7Eql2CECQi0WNUiIHMjadocNUBoT
7ie306Jp8TIIX/sUdBF3R7hZR5o1UAcLiH1YRoL3CvfONaGLnFsclmI3FFUn
LVFm10v0R2HA0i471qJKRo2FTwvx2V85YnrADYurqbyNmsZp6R3wwpiXIm5r
cSjXlFW1IBCTXwnStuy3fPkN9kGJ+r/gnv2ydiZpnzrwEWM0bHoBmmT8lhuf
+e4eoWxfcralDYUXR6arzJ3MslfI0nMLUq72FuPAOwouYIH5MK428DUqOOf5
wZaIT+cwko2I5gx2QfJLxcdkUlIHO5ksm8Ld8LCYhMA8uqN6LK9o5Gkw/5oS
EQECu3vJI6Pqr1bCr3Rzs9tqwTTDHTNWSpW1sbX5uKM/arQWtTIZ4+Ljdioh
7LE6kkHqxMjA2Dr6UAI0EhAl5ZuEJExlGZQBjOBnavwzMv0xeh1dBxzMJwBp
HioR6t3IxUIjC2hrSOBiI78fXYojxoDo+l5NDZqtCfVF9jc92EAR0xhjXBRd
Ie5Lrlfrdk3VRxe6NqjKax+8MOW/XkkwpJaMfbI3xYK04vJSOlscL4hzviHO
+afkgpKxuQfAHvdg6lPCx0MWUWI4jvYAJ4ZWGsNuKwfa+WLbldCAxNLVYBtB
wBWVlNSQWqKEc+5IeJK8tSnIkkbhOZ4Vg9xBQg8+7o6QWbTnCQtuLdzHUiUf
cfXX8v1FGxJXNBXqJFkcEk4gAHfSAqRykifbuDs1CYoKbP6QxUwpD+h5oIJT
5APy8dh1uHFdfqv5YG+4HYVs35jPgQ0I1ZxnEWgRzRwcCGiREJVSxfC4nDYh
pKAn4sKPahU8oMqgFLFCjMtwqCdQMT0OE5V7+epjBrCVg/14Kfs83fsMSxvS
QQMg36+SQegBxIGtbxCT0og5YYV/8OKxXv6IHkmzEtKuJjjtNVCpqJZBVJoc
gV3VaX8LeONRlMPEAof8CTg4/0KmelTNY1uiYBYrtNsPdbStokzR2KcIUBuo
jxNxp8HQM1uCelniYdJB4AOSX2u2zF477xNFUSJp8GPQ+0DlpF0ZE7jqDITP
sfUOKuLckV2Jrk2TsDwsXoyltoHxaFUeoiJpERW3UfJ6AyyULL8NIn6skaqP
RMo8PZHn4l91o4ItOX67mGopFPMrESFqCx+9JFBrKzNSEKEux0Q+0tnXaqj5
kfu+PDgHlmv2ukO11+Ldw/Qb937LiE9TBTTFwhQKnM3xqRc38btDykQVSfb0
gB7Q9glBBFElDCcykn7j+78S8U3XI00snRXuK0yxoNF44U69D7pU7vt2/r01
fkFvA868O6CdouWK3RQ+IYSNplG0qMH0AeMWLDWF9q095t9IfN1rFocxCiAF
JcAxRn0EGBtycHjpY9AOhWPblOHMSNnsfabhF9NQENhugdWnTbABBBbQPn01
qOMf0/Qk5EkcUunKHQhkRFHo7bihpj6WO1q2btRcGVZGawRHtxcfUIi47ZXF
qHMilJmyx7f0iDwYwIGAl3Hf3K3WcJhNsDUeAfPN4w58+L5Ialz6xq5iMbTc
P04tWglyvd9KsNPB6LAkF+Ry79EeWB3PF9Phi8LPKJ+ojn9b1nvOpWR/A67p
Q2DT14mEZrTaGVCsFGJuEm7ZcN5RJZqUFB8S3oN219ZKoe5n2ibeYB01eA2l
z5ZZ/u7BMslByzaJ346vbvJcNgATFnq+skyQiRrcI3eb9BVbDAdUs8XMlVnC
zL3LuwjTqPDRxnu9TCEffY8Rww84uB/gX4Q1+C/M8ocpIS/qIUztf/eh2OMw
9OjVzMA4F4dwUPYQBRGr4SkhNNGOQ38PSV0dks6UpzSCLfGRr0NBkZfpY0Lz
sQZuG+pZOgNxY0HOr77A7p9EaKRRFww7rL137dNgjhdn11Pt4DKwUmFt5wxO
2nEEUwkK7sOVYHz9QBL2B/0BXccbqj0OBcDjelsqgWEI54NwcQwraMseBBVn
c4oXl0VmF09o41BnBjRQhf1GoVVgPnJ5BXSVSU9Mdj0a9gDd0Fsoafkz8nhi
wLci8nvEHeAX1QJlTeu0MkP6cio59B/xEDss9wb2IR1dkx7j3fDuMr+0jV9S
zTOjbvMo6YfrqsV8TKAcVHXcOYrEHgaZTNxslP16CKL+MA8O3gPEPtYwNgz0
STtsCeQzPPmhc5BS/8jONoHDjYlC++dWmspi8JkxlHF7rxwamD36oMQHv5jZ
Eh27pqlJcoMnQGk7PlKTvB5RXgY57yniwrvLfYjLve95XkWdMQ/otKZ/Rols
N5ccHm7Qk0YNF0a6xIaM08PueUmJ9v1+PfN9AAdhaU5bbAAENjFO8P3qqd+u
pAJok4TW98+2YIbWUl1iI0P5B7QeXlEPcxkhoVCMKLHjMHJG3HCh5pOm3T4J
Fd62gW+qIl7156ikMLpZwcATHMSTUYMEfxZkUrK5SvsyADViYL8ws8Hq5L2A
myyXzt4oRscRzaHleAjoUFBLXDfc5wW9SzQlWiZdvVPKvRqBQ/Gq+pwYkt/X
dupP8NMTeoeslnC3sUdBpGqg80TufwJA6Yl4yQZ+ba+vMLEV73htCufUEIq6
Lwa1awKj1Fpc3Fua03N0B8t2xHGCqM3hQhdoALYYOz2kY6wy/DDI0ha6D9CX
Oe5jsO+Y0k1XTSlsHZzF1m0w9BPx8owZoOpYFrqXwiB4OCOUx2GTgYUPSsmY
foN3muIP0XmyFpqrzAhtFJ9RHAL5+9Nf/Sp5/QfP5gafDRxN1CE7NMb9oEQS
Zo4wjLDya2OPCCtf1/ZAqJjFUisqQj/45Bhzg2Ddt9gIOduMozERD+hI7Fqy
TMubKbvphf173E9Yp/VsGg+Fb1y6vjj8MIVLxr2hbS5Z32Rd7vsxyg56XzQP
oR83ZBT23MVQ9kBmXA/f9tGI0bECbb9iW0HYwhAjXb90qiB8mLdgSVrUKz/i
EUSqCxe8FYHWfOuyJ8CATzQi43dgIB9FZNEjaf3EQRufHFAaeqekMfHQr4J/
dDIiS3WgqgcrgSWEZm6AU24rPk+Gw8P+GaPUJ04ln/EyhJWhTmi88WRYJdgC
jjXGzg0tY+iCl7Wv56iP6gBtRRlCmi3IViN1+1MB8AiTORUXC1642XU7n1Tc
RfWzWpxC5yIxJ5PH2RzQoNnUAqh8Q6NlMfOnFmDAnZvw+s5XMRCMm11pMn52
T6X8AWBJOJu6RXlSIUx+KlouOlNODsvV8MJV1GBj2nOMhb4IlbvvhcXTX/70
NGqmZ48jDFX6qe3Lp2fCSR1DOMJn7Dix8YMYZZDMFbqY9vC7Yaen6IQ60394
0LQgdCo+BCWrkbwgn8o3KPgw1SUvKUmdg/LRFKiQ5PeL169Gom+xCtBG63xM
HeqC/zT/Tfipp8lfQFIeFSv4dITnZ1UYnYv+++ST5He9zNZXc5Mniffj2bPw
hH8Pjzg5OfmPVO+fN01GFtvvvnlznry5etXiTVhWcei1cBMXalEhEeebR/UY
+IBVjSnt5hHxA17Qzw8c4zn5OV6SyUs60C86BeBjmGlyrGs5PU3mD+X5qsEQ
uFNfjZs+qDxXCSHyQoIsWfLmzcWL1GcMJ5wxDDdjzVBHFShZxbh3UFAdmWSt
NrfmkVZ6Glkvj1Z6DIdn2ANuTVn4oABcp8n9ZwbN5Xv95FsMmCClxOsJOzQg
j0NWoz3oGHR/OF3GjIZS87jtX03dhGw7ENu3KkSp4Vq/qSZE5wnO1paIo/bF
m1cL32Pp/OJVmnxzfpEmb+fXyUVI1GSBM9LBh1fMv0CKMn1X94JmbqorbP8r
XEbqABKTJfNAXx6MsE6S6QuJuTxT+OK4Xn8xkyjXDIasWZURjHH6niHneZRE
e20WFmfFDD0+r2HWE/BARWn/ctvBd+qYUy0UQN5VOwdRgvDZvVviEeoaDbRO
+qiUUNqahxZ6dAz5VFaCEbECsBevFjOqoLzzhaPBL5SZGoU7th+buowPvaJi
VE0GHKgDm5SsRV9UBsuVeDTFje26NHZkkPfnUMBivfMNeClZ532neABtQVHO
RIjj6omPIGLNvHRGnZ8kL3eEonu9tHAOUnXqAySss6RLiM/jM818hNn9qbHJ
AjNMTEBBN8BQuireizkosN7hDErOfncKPmVMfqb+7OFkB4RDoX0YHyYz5grF
8dvT0rgD2gGUhf3jBBNQv71/pB+W0uTlGCafZBK64Q+aOODw4oS/0VPtShcX
b3J9yOHj+Xr+vTjB/s47830m1pPWP8fkcPoE2kdkuP/CJGSe60MFWpLhPreu
jth5nz+UATRueHgHSc/BgtW2IqfMaeVmJ+jcURdKc3Bh2TEtDO9WXKZvqHD2
liTU3/76fyTnx2e63xTvfRQ801pT4WNvVh1zzzbTK25KhfULtyn+9tf/rRW4
x2+qNivxhq9BEk0Pvy6ur+RXHq932DIFJSb6BTA/njBJQ+cJUxoCRp+kDJw9
jVMqsvevX/DLMdOv6FC6PTgEGSqNJPe3fBU7yH1JCRgjMNP6Bv63JK8q3G36
vgSfZ+hcY5pvxwcrxhkWx1eXU7YDfldncqj3K4Aq9Bca6c/5+JFTgMdx5ofK
O1q0zjiiKEElJMr7LvA7ojCESiN5YDbLZRa1JzhNXsteDN9JhWl62mXohNnz
qGceN2m5q3bIKWBpsFlifMBdJ1TRxkPptMo+ObutMaZ4uBHeYKBS5guKa8br
oY3+xWntT4zPUxDTRNcylDQJdckcnZfm7HtqIyUMiBYpHqJBXR9RvTrqarih
CmaADYuv5/DIT6dShoqXU89qhgMARWCFCzxtRBrPSbgGRo65iSE6ZI5UDSUa
J339oq0dQIyGbqPtHnDie2W7EUn6yeMi919xP3byupHsKBpf8Y8rDeB+zy0w
zXmyYQZIvTdZLrpS9xkZYM4oyyciUvaPT5KWuIn8Eg4p8xekkRzmfCgcj/Qg
lVbkAhqxKx85vfvdAlO8kszty5pQPHDoy7O//fW/P//yV08xt0ezQwNXYSL6
1/U9nlKZ+nMqooiC3xCNYdhT/7SXgKmS9Y5aMfkLX6LUITqjqmjKw0KbBxlp
TSrFnCBuj1kl55VV5of64mJfrpuRLLD7THrC9dtfUjGFHbl9i41My3EccIlf
kzhDU3Kky7p+pwXrSoVtlF+ylADxYDDiTAmS/hxL42ASwH2sMlV6fIscO5WU
aWqTojd5aXnsO0hg6ef0cMLvoKBNTNMo79dDApJKzCCkb+m0B+9IDJ4cp0OX
mK8Rx6rMwyDkpK5YyrPX0R7j0nmAHrRuUXFHBqQq7I9vtuSUvcML8sRnjaCE
oFV6aFq0eHaDHPOQZAMCCzw3ZaDzp13mmzoLS/G8ewjDbG4PbGBATByNIFpP
k7cseKR5gTQ0uOWudEVrXOMpw3/yGfhkasIicukWzHZyTYrlhz1BkjdX31CL
Cqx9SMps6UoEIxMYboa+6vZ0EABR2LEq1ohjXoQSNG/Vch9iWkdVkwxTqE/G
BmuRaWNgn/643CNq/m280n/UlXbHb6eTF/AzaJ3Zp599fiw3TB/YYnJvvngS
xuXLIXhIIdGBhARc+dvfymxOfNcbcu4MkBstJ35aMb9qFkhW6ZvlQVIm7Vru
Gn/CVR56PCUbEk3Rvou3MPFqhLNL290NnjWN6siheb1Vj8WmaBo8MI1j06qP
wnlD8Ynl2mpmhPYGSFMShgDp52TXh6YcA8pc+LYm8VHq4te7eAEa6PLiYiq0
azAlS2H1ZMs5HVW51wPTRqDm1WX7OLIMCDg507CTJoFKm2RsHpIigAKGZJ4n
ELzAFm7w1jNg/l7jcQ/zF1PfdwddFFHlB/oCMCLg2yi6ZEGPolA9Vg6hF+/t
dADBGWJfXdJR8XhqAiI8ZNqbOk5zgRWgguoLMKUARbw9jawcOefouM47hwT4
IQEGfL44leXAcypWtSzE8d/+138lTz/9IlkWerIT2JWLy6tXv4N7vj6lVS5h
BeAhMAcQpEVLqppW6TiqNRO0+Nnn07+P98/g56+PYSF/+inRG6aTY92cabL4
I70Vr1oAiV6GqrohjQy6xvksspVwJ1NPTAC0KPQWMKAXnJPkW1oFUgDqxMUL
DHNqiQP942NkESps306HDQGAJrSxh40epv7UYG7hBFxfuVL5L2NFB2Dr99+d
owLGMGMoYrm6fNIa7/w0arzDJTuwY/BmSmEEEuJuUFFLgCetacLTU7eIOq8u
MUTO/4EBT/+9pjLx5PhtilzUMzNP/OWfyuVnIk/PnhgKOEwoyTQ84tfyiDkJ
Vu02RPsLn89I3puNpn3we6zAICWCwkvN9jMw61FUvwEe1bbrYQgMac7mAphA
hPfMeJNl9BhUFlB7FMT+u20gr6DR5FPbdXO4pNanXzzsYfuKHfjc1wsMmJpa
KGNHtPZ08rG4aQY9/vrg9ROErHy+yMesG+AyMEyKLhxs540zMht2lfGGpHJM
C39jFMPxkgx3xQd4wRR9+C/lEDO5Nh0/XwmLS22FK8nMkSI5eBilak8ko85u
Y0wi47XX/Xs484Sieo47mOEbrRdSITvzVAqXumq34Qy6iOq8jUgr3AYjkhfY
IHluoOlRPOes4pPZEc5jIL7JyjWO9nYzOKMjOT6CHynWeZshijuyx1hP8WlL
TpRDjYhxaUmQiE7TvX6FxfUi41Aqhkye6Vji47kNPCgDmhQnbgCDAu4Xulm9
G7dfSo5gw9vHvnBR3gRMSicUStlPT2Bm3id2yb60t6jMyE0Qzq3KbM4jU6uk
MAHNnkqScM+4keSBP9HJCX0aEAOFH0WbyE/COCJLX3L7MtD3cLr/cD7Sg0wr
fZZIV36aGOKgUaLaZFaCoEo9OBogo9SMxLxF5qHsfIK1fwtUXdTYTmvEUn0r
bTwmqHU90UtFvdaBuOP6QpmgPxULn3bEZgM2h0uwGZTvyCQEuSInTXAUpL7M
IPhWSR7xQDLsztrLCNLcDFIzgK7zHTE/igTsxaT13tfPX+DvFAjq//bKprpE
iTT9M95ldKZ2gx6YrVaSMeOoSb3w3lH80PYoxJyyVvt9A1H+JOLoFXqm9A+2
8q8xFfcnIHONw/8EV8/8f4n9Y/gVXY0TERX/U5RHIl+BwUOGFXye/OUUBEpX
ut/2hx5GzjNEccFL9DMu6zzHYyFLt1ob9c00AkY4dd+hA4JQ6/lLQXVjTjSC
k1aKQJG1OGENSBuLfozmris2PunsqejEuqiPnzZpU4cWBorxiPHMHKJIB2nv
QQdSqnBRAavwc3txyhUouxKkz+rwiT9ee5RZs45OGS6q1Y5WLJzBoSti14CP
S/el5caF59eA6wNugB44E+M+a1YSWqLx+SMrxlOMkBDwOZP/D5F9cChpnQAA

-->

</rfc>

