<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.34 (Ruby 4.0.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-ietf-stir-certificate-transparency-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="STI CT">STI Certificate Transparency</title>

    <author fullname="Chris Wendt">
      <organization>Somos, Inc.</organization>
      <address>
        <postal>
          <country>US</country>
        </postal>
        <email>chris@appliedbits.com</email>
      </address>
    </author>
    <author fullname="Rob &#x015A;liwa">
      <organization>Somos, Inc.</organization>
      <address>
        <postal>
          <country>US</country>
        </postal>
        <email>robjsliwa@gmail.com</email>
      </address>
    </author>
    <author fullname="Alec Fenichel">
      <organization>TransNexus</organization>
      <address>
        <postal>
          <country>US</country>
        </postal>
        <email>alec.fenichel@transnexus.com</email>
      </address>
    </author>
    <author fullname="Vinit Anil Gaikwad">
      <organization>Twilio</organization>
      <address>
        <postal>
          <country>US</country>
        </postal>
        <email>vanilgaikwad@twilio.com</email>
      </address>
    </author>

    <date year="2026" month="May" day="18"/>

    <area>Applications and Real-Time</area>
    <workgroup>Secure Telephone Identity Revisited</workgroup>
    <keyword>stir</keyword> <keyword>certificates</keyword> <keyword>delegate certificates</keyword>

    <abstract>


<?line 59?>

<t>This document describes a framework for the use of the Certificate Transparency (CT) protocol for publicly logging the existence of Secure Telephone Identity (STI) certificates as they are issued or observed. This allows any interested party that is part of the STI eco-system to audit STI certification authority (CA) activity and audit both the issuance of suspect certificates and the certificate logs themselves. The intent is for the establishment of a level of trust in the STI eco-system that depends on the verification of telephone numbers requiring and refusing to honor STI certificates that do not appear in a established log. This effectively establishes the precedent that STI CAs must add all issued certificates to the logs and thus establishes unique association of STI certificates to an authorized provider or assignee of a telephone number resource. The primary role of CT in the STI ecosystem is for verifiable trust in the avoidance of issuance of unauthorized duplicate telephone number level delegate certificates or provider level certificates.  This provides a robust auditable mechanism for the detection of unauthorized creation of certificate credentials for illegitimate spoofing of telephone numbers or service provider codes (SPC).</t>

<t>The framework borrows the log structure and API model from RFC6962 to enable public auditing and verifiability of certificate issuance. While the foundational mechanisms for log operation, Merkle Tree construction, and Signed Certificate Timestamps (SCTs) are aligned with RFC6962, this document contextualizes their application in the STIR eco-system, focusing on verifiable control over telephone number or service provider code resources.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        The latest revision of this draft can be found at <eref target="https://appliedbits.github.io/draft-ietf-stir-certificate-transparency/draft-ietf-stir-certificate-transparency.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-stir-certificate-transparency/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Secure Telephone Identity Revisited Working Group mailing list (<eref target="mailto:stir@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/stir/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/stir/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/appliedbits/draft-ietf-stir-certificate-transparency"/>.</t>
    </note>


  </front>

  <middle>


<?line 65?>

<section anchor="introduction"><name>Introduction</name>

<t>Certificate Transparency (CT) aims to mitigate the problem of mis-issued certificates by providing append-only logs of issued certificates. The logs do not themselves prevent mis-issuance, but ensure that interested parties (particularly those named in legitimate certificates or certificate chains) can detect such mis-issuance. <xref target="RFC6962"/> describes the core protocols and mechanisms for use of CT for the purposes of public TLS server certificates associated with a domain name as part of the public domain name system (DNS). This document describes a conceptually similar framework that directly borrows concepts like transparency receipts in the form of SCTs and how they are used in certificates and its specific use as part of the larger STIR framework for call authentication.  This framework is defined for the specific use with both Secure Telephone Identity (STI) certificates <xref target="RFC8226"/> and delegate certificates <xref target="RFC9060"/>.</t>

<t>Telephone numbers (TNs) and their management and assignment by telephone service providers and Responsible Organizations (RespOrgs) for toll-free numbers share many similarities to the Domain Name System (DNS) where there is a global uniqueness and established association of telephone numbers to regulatory jurisdictions that manage the allocation and assignment of telephone numbers under country codes and a set of numeric digits for routing telephone calls and messages over telephone networks. STI Certificates use a TNAuthList extension defined in <xref target="RFC8226"/> to specifically associate either telephone service providers or telephone numbers to the issuance of STI certificates and certificate change that are intended to represent the authorized right to use a telephone number. This trusted association can be establish via mechanisms such as Authority tokens for TNAuthList defined in <xref target="RFC9448"/>. Certificate transparency and the concept of transparency is generally meant to provide a publicly verifiable and auditable representation of the creation of certificates in order to establish transparency and trust to interested parties as part of a stir related eco-system.</t>

<t>There is three primary actors in the certificate transparency framework. There is the STI Certification Authorities (CAs) that submit all certificates to be issued to one or more transparency append-only log services. The log services are network services that implement the protocol operations for submissions of STI certificates and subsequent queries. They are hosted by interested parties in the STI ecosystem and can accept certificate log submissions from any other CA participant. The second role is the monitors that play the role of monitoring the CT logs to check for potential mis-issuance as well as auditing of the log services. This role can be played by any STI ecosystem participant interested in the trust of the ecosystem or the integrity of the telephone number or provider level certificates produced in the eco-system. CT provides a mechanism of a receipt or Signed Certificate Timestamp (SCT) that is provided as a result of submitting a certificate to the append-only log. The third actor role in the certificate transparency framework is the eco-system participants that can send and receive receipt(s) or SCT(s) to prove and validate that a certificate was submitted to a log(s) and optionally query the log directly for further validation.</t>

<t>The details that follow in this document will detail the specific protocols and framework for Certificate Transparency associated with STI certificates. Most of the details borrow many of the concepts of certificate transparency defined in <xref target="RFC6962"/> used in web browser and web PKI environments, but provides a specific framework designed for STI certificates and their specific issuance and usage in a telecommunications and telephone number dependent eco-system.</t>

<t>This general mechanism could also be used for transparently logging other important stir related metadata associations perhaps via JWTClaimConstraints defined in <xref target="RFC8226"/> and <xref target="RFC9118"/> or other ways defined in potential future extensions of this document.</t>

</section>
<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="the-use-of-certificate-transparency-for-sti-certificates"><name>The Use of Certificate Transparency for STI Certificates</name>

<t>CT log(s) contains certificate chains, which can be submitted by any CA authorized in a STIR eco-system. It is expected that these CAs will contribute all their newly issued certificates to one or more logs.  Note, in <xref target="RFC6962"/> it is possible for certificate holders to directly contribute their own certificate chains or interested third parties, however because in stir eco-systems that generally consist of entities that are authorized to be assigned telephone number resources, this does not seem to be a likely scenario. Generally, many stir eco-systems have a controlled set of CAs that are authorized to participate as valid trust anchors. It is required that each chain ends with a trust anchor that is accepted by the log which would include those authorized trust anchors or a subset of them. When a chain is accepted by a log, a signed timestamp is returned, which is later used to provide evidence to STIR verification services (VS), defined in <xref target="RFC8224"/>, that the chain has been submitted. A VS can thus require that all certificates they accept as valid are accompanied by signed timestamps.</t>

<t>Those concerned about mis-issuance of STIR certificates can monitor the logs, asking them regularly for all new entries, and can thus check whether the service provider codes or telephone numbers for which they are responsible have had certificates issued that they did not expect. What they do with this information, particularly when they find that a mis-issuance has happened, is beyond the scope of this document. However, broadly speaking, because many existing STI ecosystems have a connection to regulated and industry environments that govern the issuance of STI certificates, they can invoke existing mechanisms for dealing with issues such as mis-issued certificates, such as working with the CA to get the certificate revoked or with maintainers of trust anchor lists to get the CA removed.</t>

</section>
<section anchor="terminology"><name>Terminology</name>

<t>This section defines key terms used throughout the STI-CT framework to ensure clarity and consistency.</t>

<section anchor="authentication-service-as"><name>Authentication Service (AS)</name>

<t>A service defined in <xref target="RFC8224"/> that signs the identity of a telephone call using Secure Telephone Identity (STI) certificates, ensuring the authenticity of the caller information. It ensures that STI Certificates contain SCTs.</t>

</section>
<section anchor="certificate-transparency-ct"><name>Certificate Transparency (CT)</name>

<t>A framework designed to provide an open and verifiable log of issued certificates. It aims to detect and prevent the misuse or mis-issuance of certificates by maintaining append-only logs that can be audited by any interested party.</t>

</section>
<section anchor="delegate-certificate"><name>Delegate Certificate</name>

<t>A type of STI certificate defined in <xref target="RFC9060"/> that associates a specific telephone number or a range of telephone numbers with a particular entity used to delegate the right to use these numbers.</t>

</section>
<section anchor="log"><name>Log</name>

<t>An append-only, cryptographically verifiable structure used in Certificate Transparency to record pre-certificate entries. Logs accept submissions, generate Signed Certificate Timestamps (SCTs), and maintain the integrity of the entries through a Merkle Tree structure.</t>

</section>
<section anchor="merkle-tree"><name>Merkle Tree</name>

<t>A cryptographic data structure used in logs to ensure the integrity and consistency of the entries. It is built by hashing individual log entries and combining them into a single root hash that represents the state of the entire log.</t>

</section>
<section anchor="precertificate"><name>Precertificate</name>

<t>A certificate issued by an CA that is intended to be submitted to a Certificate Transparency log before the final certificate is issued. The pre-certificate includes a special extension (the poison extension) that prevents it from being used as a valid certificate on its own.</t>

</section>
<section anchor="signed-certificate-timestamp-sct"><name>Signed Certificate Timestamp (SCT)</name>

<t>A data structure provided by a Certificate Transparency log in response to a pre-certificate submission. The SCT serves as a promise from the log to include the submitted pre-certificate in the log within a specified time frame (Maximum Merge Delay). It is included in the final certificate to prove that it has been logged.</t>

</section>
<section anchor="sti-certification-authority-sti-ca"><name>STI Certification Authority (STI-CA)</name>

<t>An entity responsible for issuing STI certificates in the Secure Telephone Identity ecosystem. The CA can also issue pre-certificates, which are submitted to CT logs before the final certificate is issued.</t>

</section>
<section anchor="sti-subordinate-certification-authority-sti-sca"><name>STI Subordinate Certification Authority (STI-SCA)</name>

<t>An entity authorized by an CA to issue STI certificates under the authority of the STI-CA. The STI-SCA can also issue pre-certificates for submission to CT logs.</t>

</section>
<section anchor="signed-tree-head-sth"><name>Signed Tree Head (STH)</name>

<t>A cryptographically signed data structure that represents the current state of a Certificate Transparency log. It includes the root hash of the Merkle Tree and the number of entries in the log, allowing auditors to verify the integrity and consistency of the log.</t>

</section>
<section anchor="tbscertificate-to-be-signed-certificate"><name>TBSCertificate (To Be Signed Certificate)</name>

<t>A component of an X.509 certificate that contains all the information about the certificate except the actual digital signature. The TBSCertificate includes fields such as the version, serial number, issuer, validity period, subject, and the subject's public key information. This component is signed by the certificate authority (CA) to create the final certificate. In the context of Certificate Transparency, the TBSCertificate of a pre-certificate is submitted to the log for inclusion.</t>

</section>
<section anchor="verification-service-vs"><name>Verification Service (VS)</name>

<t>A service defined in <xref target="RFC8224"/> that verifies the authenticity of a telephone call by checking the validity of the PASSporT token, including verification that certificate contains valid SCTs.</t>

</section>
</section>
<section anchor="sti-certificate-transparency-framework"><name>STI Certificate Transparency Framework</name>

<t>This section describes the format and operational procedures for logs in the STI Certificate Transparency (CT) framework.</t>

<section anchor="log-entries"><name>Log Entries</name>

<t>Logs in the STI CT framework are append-only structures that store entries in a Merkle Tree and use SHA-256 for data hashing. The entries consist of pre-certificates submitted by STI Certification Authorities (STI-CAs) or Subordinate Certification Authorities (STI-SCAs). The log entries help ensure that all issued STI certificates can be audited for legitimacy.</t>

</section>
<section anchor="precertificate-submission"><name>Precertificate Submission</name>

<t>An STI-CA/STI-SCA submits a pre-certificate to a log before the actual STI certificate is issued. The pre-certificate submission must include all necessary intermediate certificates to validate the chain up to an accepted root certificate. The root certificate may be omitted from the submission.</t>

<t>When a pre-certificate is submitted:</t>

<t><list style="symbols">
  <t>The log verifies the chain of the pre-certificate up to a trusted root.</t>
  <t>If valid, the log generates and returns a Signed Certificate Timestamp (SCT) to the submitter.</t>
  <t>The SCT serves as a promise from the log that the pre-certificate will be included in the Merkle Tree within a defined Maximum Merge Delay (MMD).</t>
</list></t>

<t>Logs must publish a list of accepted root certificates, which aligns with those trusted in the STIR ecosystem. The inclusion of SCTs in the actual STI certificates is critical, as Verification Services (VS) will only accept certificates that include valid SCTs.</t>

<t>Note: The data structures (e.g., LogEntry, SignedCertificateTimestamp, TreeHeadSignature) in this section follow the definitions provided in <xref target="RFC6962"/>.</t>

</section>
<section anchor="log-entry"><name>Log Entry</name>

<t>Logs may impose a limit on the length of the certificate chain they will accept. The log verifies the validity of the pre-certificate chain up to an accepted root and, upon acceptance, stores the entire chain for future auditing.</t>

</section>
<section anchor="signed-certificate-timestamp-sct-1"><name>Signed Certificate Timestamp (SCT)</name>

<t>The SCT is included in the final STI certificate, and VS services will check the presence and validity of SCTs to verify the legitimacy of the certificate.</t>

</section>
<section anchor="merkle-tree-structure"><name>Merkle Tree Structure</name>

<t>Logs use a Merkle Tree structure, with each leaf corresponding to a MerkleTreeLeaf entry. The leaves are hashed to form the tree, which is continuously updated as new entries are added.</t>

<t>The root hash of the Merkle Tree represents the state of the log at a given time and can be used to verify the inclusion of specific entries.</t>

</section>
<section anchor="signed-tree-head-sth-1"><name>Signed Tree Head (STH)</name>

<t>The log periodically signs the root of the Merkle Tree, producing a Signed Tree Head (STH), which ensures the integrity of the log over time.</t>

<t>Logs must produce an STH within the Maximum Merge Delay (MMD) to confirm that all SCTs issued have been incorporated into the Merkle Tree. Auditors and monitors can use the STH to verify that the log is operating correctly and that no entries have been tampered with.</t>

</section>
</section>
<section anchor="sti-ct-apis"><name>STI-CT APIs</name>

<t>STI-CT re-uses the REST endpoints defined in Section 4 of <xref target="RFC6962"/> (the "/ct/v1/" namespace) with no semantic changes.  For operational clarity it is <bcp14>RECOMMENDED</bcp14> deployments expose them under a path <spanx style="verb">/stict/v1/</spanx> but the request/response formats are compatible with <xref target="RFC6962"/>.</t>

</section>
<section anchor="clients"><name>Clients</name>

<t>This section describes various roles clients of STI-CT perform. Any inconsistency detected by clients could serve as evidence that a log has not behaved correctly, and the signatures on the data structures prevent the log from denying any misbehavior.</t>

<section anchor="submitters-sti-casti-sca"><name>Submitters (STI-CA/STI-SCA)</name>

<t>Submitters in the STI-CT framework are typically STI Certification Authorities (STI-CAs) or Subordinate Certification Authorities (STI-SCAs). These entities submit pre-certificates to the log as described in the APIs section. The returned Signed Certificate Timestamp (SCT) can then be used to construct the final STI certificate, which includes one or more SCTs.</t>

</section>
<section anchor="use-of-scts-by-authentication-and-verification-services"><name>Use of SCTs by Authentication and Verification Services</name>

<t>This specification defines the STI eco-system rely exclusively on the pre-certificate chain method defined in <xref target="RFC6962"/>; therefore every Certificate issued for call signing <bcp14>MUST</bcp14> already carry one or more embedded SCTs in the SignedCertificateTimestampList X.509 extension at issuance time.</t>

<t>Because the SCT is delivered in-band with the Certificate, neither the AS nor the VS perform any network round-trips to Certificate Transparency (CT) logs on the call path.</t>

<section anchor="authentication-service-processing"><name>Authentication Service Processing</name>

<t><list style="numbers" type="1">
  <t>Optional local SCT validation - For each embedded SCT the AS <bcp14>MAY</bcp14>:
  <list style="symbols">
      <t>compute the hash of the TBSCertificate as defined in Section 3.2 of <xref target="RFC6962"/> and verify the SCT signature with the cached public key of the issuing CT log;</t>
      <t>verify that now() &gt;= SCT.timestamp advertised by that log.</t>
      <t>Implementations <bcp14>SHOULD</bcp14> pre-compute and cache these checks at certificate activation time so that per-call signing incurs only an O(1) lookup.</t>
    </list></t>
  <t>PASSporT construction - The PASSporT header and payload are produced per <xref target="RFC8224"/> using the Certificate’s private key; the Certificate (with its SCT list) is conveyed in the 'x5u' or 'x5c' parameter.</t>
  <t>Optional Failure handling - If no SCT validates, the AS <bcp14>MAY</bcp14> treat the Certificate as unusable and refuse to sign the call.</t>
</list></t>

</section>
<section anchor="verification-service-processing"><name>Verification Service Processing</name>

<t>Upon receipt of a SIP INVITE bearing an Identity header, the VS performs the steps below, all of which are deliberately offline to avoid adding call-path latency:</t>

<t><list style="numbers" type="1">
  <t>Verify PASSporT signature with DC public key.</t>
  <t>Validate DC chain to an accepted STI trust anchor.</t>
  <t>For each embedded SCT:
  <list style="symbols">
      <t>Verify signature against cached log key.</t>
      <t>Ensure now() &gt;= SCT.timestamp <strong>or</strong> defer to asynchronous auditor.</t>
    </list></t>
</list></t>

<t>Implementations <bcp14>SHOULD</bcp14> cache certificates and validated SCT objects for the lifetime of the certificates' notAfter field to amortize step 3 across many calls.</t>

</section>
<section anchor="performance-and-scalability-guidelines"><name>Performance and Scalability Guidelines</name>

<t><list style="symbols">
  <t>No synchronous log queries - Embedded SCTs guarantee log commitment; therefore, AS/VS <bcp14>MUST NOT</bcp14> fetch proofs on the call path.</t>
  <t>Key caching - Log public keys are static and should be loaded at process start-up; reload only on key-roll events signaled via CT or operator policy.</t>
</list></t>

</section>
</section>
<section anchor="monitor"><name>Monitor</name>

<t>Monitors in the STI-CT framework play a crucial role in maintaining the integrity and trust of the ecosystem. They ensure that no certificates are mis-issued, particularly concerning the TNAuthList field, which lists the telephone numbers an entity is authorized to use.</t>

<section anchor="monitor-workflow"><name>Monitor Workflow</name>

<t><list style="numbers" type="1">
  <t>Initialize Monitor:
Set up the Monitor to periodically query the transparency logs for new entries. The Monitor must be configured with the base URL of each log it intends to monitor.
Configure the Monitor with a list of telephone numbers (TNs) and/or associated SPC represented entities to track.</t>
  <t>Retrieve Latest STH:
The Monitor retrieves the latest Signed Tree Head (STH) from each log to determine the current state of the log.
<br /><br />API Call: GET https://&lt;log server&gt;/stict/v1/get-sth</t>
  <t>Retrieve New Entries from Log:
Using the STH, the Monitor retrieves new entries from the log that have been added since the last known state.
<br /><br />API Call: GET https://&lt;log server&gt;/stict/v1/get-entries?start=last_known_index&amp;end=current_sth_index</t>
  <t>Decode and Verify Certificates:
Decode each retrieved certificate and verify its validity using the provided certificate chain. Extract the entity name and TNAuthList from the certificate.</t>
  <t>Check for Mis-issuance:
Compare the TNAuthList and entity name from the newly issued certificate with the Monitor's configured list. Alarm if a certificate is issued in the name of a different entity for the same TNs.</t>
  <t>Alarm and Reporting:
If a mis-issuance is detected, raise an alarm and log the details for further investigation. Notify relevant stakeholders to rectify any confirmed mis-issuance.</t>
  <t>Maintain State and Continuity:
Update the Monitor's last known state with the current STH index to ensure continuity in monitoring.</t>
  <t>STH Verification and Consistency Check:
After retrieving a new STH, verify the STH signature.
If not keeping all log entries, fetch a consistency proof for the new STH with the previous STH (GET https://&lt;log server&gt;/stict/v1/get-sth-consistency) and verify it.
Go to Step 5 and repeat the process.</t>
</list></t>

</section>
</section>
<section anchor="auditor"><name>Auditor</name>

<t>Auditors are responsible for verifying the consistency and correctness of the log, ensuring that the log behaves according to the expected protocol. Auditors can operate as standalone services or as part of another client role, such as a monitor or an VS.</t>

<section anchor="auditor-functions"><name>Auditor Functions</name>

<t><list style="numbers" type="1">
  <t>STH Verification:
Auditors can fetch STHs periodically and verify their signatures to ensure the log is maintaining its integrity.
<br /><br />API Call: GET https://&lt;log server&gt;/stict/v1/get-sth</t>
  <t>Consistency Proof Verification:
Auditors verify the consistency of a log over time by requesting a consistency proof between two STHs.
<br /><br />API Call: GET https://&lt;log server&gt;/stict/v1/get-sth-consistency</t>
  <t>Audit Proof Verification:
A certificate accompanied by an SCT can be verified against any STH dated after the SCT timestamp + the Maximum Merge Delay by requesting a Merkle audit proof.
<br /><br />API Call: GET https://&lt;log server&gt;/stict/v1/get-proof-by-hash</t>
  <t>Cross-Checking Logs:
Auditors can cross-check entries across different logs by comparing SCTs and verifying that entries are consistently logged across the ecosystem.</t>
  <t>Error and Inconsistency Detection:
Any discrepancies or failures in verification processes can be logged as evidence of potential log misbehavior, and appropriate actions can be taken based on the findings.</t>
</list></t>

</section>
</section>
</section>
<section anchor="relationship-to-rfc6962"><name>Relationship to RFC6962</name>
<t>This document profiles the Certificate Transparency (CT) protocol as defined in <xref target="RFC6962"/> for use within the STIR eco-system. All log data structures (e.g., LogEntry, SignedCertificateTimestamp, TreeHeadSignature) and API endpoints (e.g., add-pre-chain, get-sth, get-entries, etc.) are adopted directly from <xref target="RFC6962"/>.</t>

<t>The main differences are:
- The expected certificate types are STI certificates as defined in <xref target="RFC8226"/> and <xref target="RFC9060"/>, with TNAuthList extensions.
- Submitters are limited to STI Certification Authorities and Subordinate Certification Authorities.
- Monitoring and auditing are focused on detection of mis-issued telephone number or service provider codes (SPCs).
- The client roles (e.g., VS, AS) interact with certificates and logs in ways specific to SIP call authentication.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>As this specification follows the guidance of <xref target="RFC6962"/>, it also inherits the security considerations defined therein.</t>

<t>The use of Certificate Transparency (CT) within the STIR ecosystem enhances accountability but also introduces operational and security risks that must be managed. Trust in the system depends on the integrity of CT logs and therefore, logs should be operated by reputable entities and monitored to detect mis-issuance or inconsistent Signed Tree Heads (STHs).</t>

<t>Signed Certificate Timestamps (SCTs) should be verified by Authentication Services (AS) before use for creating digital signatures and by Verification Services (VS) using trusted log public keys to prevent forgery or replay. Key rotation and distribution should be performed securely.</t>

<t>While CT does not prevent mis-issuance, it enables timely detection and monitors should track Telephone Number (TN) and Service Provider Code (SPC) associations and alert stakeholders if certificates are issued outside of authorized ranges.</t>

<t>Because transparency may expose sensitive relationships between TNs and entities, implementers should consider privacy implications and minimize or redact logged data where appropriate.</t>

<t>CT logs and Certification Authorities (CAs) should implement safeguards such as rate limiting, caching, and redundant storage to mitigate denial-of-service risks and ensure availability.</t>

</section>
<section anchor="IANA"><name>IANA Considerations</name>

<t>None at this time.</t>

</section>


  </middle>

  <back>



    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC6962">
  <front>
    <title>Certificate Transparency</title>
    <author fullname="B. Laurie" initials="B." surname="Laurie"/>
    <author fullname="A. Langley" initials="A." surname="Langley"/>
    <author fullname="E. Kasper" initials="E." surname="Kasper"/>
    <date month="June" year="2013"/>
    <abstract>
      <t>This document describes an experimental protocol for publicly logging the existence of Transport Layer Security (TLS) certificates as they are issued or observed, in a manner that allows anyone to audit certificate authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
      <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6962"/>
  <seriesInfo name="DOI" value="10.17487/RFC6962"/>
</reference>
<reference anchor="RFC8224">
  <front>
    <title>Authenticated Identity Management in the Session Initiation Protocol (SIP)</title>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <author fullname="C. Jennings" initials="C." surname="Jennings"/>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <author fullname="C. Wendt" initials="C." surname="Wendt"/>
    <date month="February" year="2018"/>
    <abstract>
      <t>The baseline security mechanisms in the Session Initiation Protocol (SIP) are inadequate for cryptographically assuring the identity of the end users that originate SIP requests, especially in an interdomain context. This document defines a mechanism for securely identifying originators of SIP requests. It does so by defining a SIP header field for conveying a signature used for validating the identity and for conveying a reference to the credentials of the signer.</t>
      <t>This document obsoletes RFC 4474.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8224"/>
  <seriesInfo name="DOI" value="10.17487/RFC8224"/>
</reference>
<reference anchor="RFC8226">
  <front>
    <title>Secure Telephone Identity Credentials: Certificates</title>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <author fullname="S. Turner" initials="S." surname="Turner"/>
    <date month="February" year="2018"/>
    <abstract>
      <t>In order to prevent the impersonation of telephone numbers on the Internet, some kind of credential system needs to exist that cryptographically asserts authority over telephone numbers. This document describes the use of certificates in establishing authority over telephone numbers, as a component of a broader architecture for managing telephone numbers as identities in protocols like SIP.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8226"/>
  <seriesInfo name="DOI" value="10.17487/RFC8226"/>
</reference>
<reference anchor="RFC9060">
  <front>
    <title>Secure Telephone Identity Revisited (STIR) Certificate Delegation</title>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <date month="September" year="2021"/>
    <abstract>
      <t>The Secure Telephone Identity Revisited (STIR) certificate profile provides a way to attest authority over telephone numbers and related identifiers for the purpose of preventing telephone number spoofing. This specification details how that authority can be delegated from a parent certificate to a subordinate certificate. This supports a number of use cases, including those where service providers grant credentials to enterprises or other customers capable of signing calls with STIR.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9060"/>
  <seriesInfo name="DOI" value="10.17487/RFC9060"/>
</reference>
<reference anchor="RFC9118">
  <front>
    <title>Enhanced JSON Web Token (JWT) Claim Constraints for Secure Telephone Identity Revisited (STIR) Certificates</title>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <date month="August" year="2021"/>
    <abstract>
      <t>RFC 8226 specifies the use of certificates for Secure Telephone Identity Credentials; these certificates are often called "Secure Telephone Identity Revisited (STIR) Certificates". RFC 8226 provides a certificate extension to constrain the JSON Web Token (JWT) claims that can be included in the Personal Assertion Token (PASSporT), as defined in RFC 8225. If the PASSporT signer includes a JWT claim outside the constraint boundaries, then the PASSporT recipient will reject the entire PASSporT. This document updates RFC 8226; it provides all of the capabilities available in the original certificate extension as well as an additional way to constrain the allowable JWT claims. The enhanced extension can also provide a list of claims that are not allowed to be included in the PASSporT.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9118"/>
  <seriesInfo name="DOI" value="10.17487/RFC9118"/>
</reference>
<reference anchor="RFC9448">
  <front>
    <title>TNAuthList Profile of Automated Certificate Management Environment (ACME) Authority Token</title>
    <author fullname="C. Wendt" initials="C." surname="Wendt"/>
    <author fullname="D. Hancock" initials="D." surname="Hancock"/>
    <author fullname="M. Barnes" initials="M." surname="Barnes"/>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <date month="September" year="2023"/>
    <abstract>
      <t>This document defines a profile of the Automated Certificate Management Environment (ACME) Authority Token for the automated and authorized creation of certificates for Voice over IP (VoIP) telephone providers to support Secure Telephone Identity (STI) using the TNAuthList defined by STI certificates.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9448"/>
  <seriesInfo name="DOI" value="10.17487/RFC9448"/>
</reference>
<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>



    </references>




<?line 320?>

<section numbered="false" anchor="acknowledgments"><name>Acknowledgments</name>

<t>The authors would like to thank the authors and contributors to the protocols and ideas around Certificate Transparency <xref target="RFC6962"/> which sets the basis for the STI eco-system to adopt in a very straight forward way, providing trust and transparency in the telephone number world.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

