<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.34 (Ruby 4.0.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-sliwa-stir-cert-cps-ext-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="CPS URI Certificate Extension">Call Placement Service (CPS) URI Certificate Extension for STI Certificates</title>

    <author fullname="Rob &#x015A;liwa">
      <organization>Somos Inc.</organization>
      <address>
        <email>robjsliwa@gmail.com</email>
      </address>
    </author>
    <author fullname="Chris Wendt">
      <organization>Somos Inc.</organization>
      <address>
        <email>chris@appliedbits.com</email>
      </address>
    </author>

    <date year="2026" month="May" day="06"/>

    <area>Applications and Real-Time</area>
    <workgroup>Secure Telephone Identity Revisited</workgroup>
    <keyword>stir</keyword> <keyword>certificates</keyword> <keyword>delegate certificates</keyword>

    <abstract>


<?line 92?>
<t>This document specifies a non-critical X.509 v3 certificate extension that conveys the HTTPS URI of a Call Placement Service (CPS) associated with the telephone numbers authorized in a STIR Certificate. The extension enables originators and verifiers of STIR PASSporTs to discover, with a single certificate lookup, where Out-of-Band (OOB) PASSporTs can be retrieved. The mechanism only provides a new way to discover the URI of CPS endpoint and is fully backward compatible with existing STIR certificates and OOB APIs.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        The latest revision of this draft can be found at <eref target="https://github.com/appliedbits/draft-sliwa-stir-cert-cps-ext"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-sliwa-stir-cert-cps-ext/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Secure Telephone Identity Revisited Working Group mailing list (<eref target="mailto:stir@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/stir/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/stir/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/appliedbits/draft-sliwa-stir-cert-cps-ext"/>.</t>
    </note>


  </front>

  <middle>


<?line 94?>

<section anchor="introduction"><name>Introduction</name>

<t>The STIR (Secure Telephone Identity Revisited) framework provides a means of cryptographically asserting the identity of the calling party in a telephone call by using PASSporTs carried in SIP requests, as defined in <xref target="RFC8224"/> and <xref target="RFC8225"/>. To support deployment in environments where SIP Identity headers may be removed or are not end-to-end transmittable, such as in non-IP or hybrid telephony networks, the STIR Out-of-Band (OOB) mechanism was introduced in <xref target="RFC8816"/>. In OOB scenarios, PASSporTs are published to a Call Placement Service (CPS) where they may be retrieved independently of the SIP signaling path.</t>

<t>To enable discovery of the appropriate CPS for a given telephone number or SPC, this document defines a certificate extension that binds a CPS URI to the identity resources listed in the TNAuthList of the STI certificate. This CPS URI extension provides a verifiable association between a number resource and its corresponding CPS, enabling relying parties to discover CPS endpoints by observing STI Certificate Transparency (STI-CT) logs defined in <xref target="I-D.ietf-stir-certificate-transparency"/>.</t>

<t>This specification defines the syntax and semantics of the CPS URI certificate extension, describes how it is encoded in <xref target="X.509"/> certificates also defined in <xref target="RFC5280"/>, and outlines validation procedures for Certification Authorities and relying parties. This extension is intended to be used in conjunction with existing STIR certificates defined in <xref target="RFC8226"/> and delegate certificates defined in <xref target="RFC9060"/> infrastructure, and supports enhanced transparency and automation in OOB PASSporT routing.</t>

<section anchor="relationship-to-other-specifications"><name>Relationship to Other Specifications</name>

<t>This document defines the certificate extension data format for embedding CPS URIs in STIR certificates. It is designed to work within the broader STIR Out of Band ecosystem as follows:</t>

<t><list style="symbols">
  <t><xref target="RFC8816"/> defines the OOB architecture and the CPS concept.</t>
  <t><xref target="I-D.ietf-stir-servprovider-oob"/> describes a service-provider-specific OOB deployment model and identifies, in its Section 4, the possibility of embedding CPS information directly in STIR certificates. This document also defines a discovery mechanism built on CT log monitoring that consumes this extension.</t>
  <t><xref target="I-D.ietf-stir-certificate-transparency"/> defines STI Certificate Transparency logs that can be used to publish and discover certificates containing this extension.</t>
</list></t>

</section>
</section>
<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="the-id-pe-ooburi-certificate-extension"><name>The id-pe-oobURI Certificate Extension</name>

<t>This <xref target="X.509"/> extension is non-critical, applicable only to end-entity certificates, and defined with ASN.1 <xref target="X.680"/> <xref target="X.681"/> <xref target="X.682"/> <xref target="X.683"/> later in this section.</t>

<t>This extension is intended for use in end-entity STI certificates <xref target="RFC8226"/> and delegate certificates <xref target="RFC9060"/> that include TNAuthList values authorizing the use of specific telephone numbers or Service Provider Codes (SPCs). The OOB URI extension provides a means for the certificate holder to declare the HTTPS endpoint of a Call Placement Service (CPS) defined in <xref target="RFC8816"/> that can be used to publish or retrieve PASSporTs for the covered resources.</t>

<t>The presence of this extension allows relying parties to discover the CPS associated with a given telephone number without relying on static configuration or bilateral agreements. This facilitates scalable and verifiable Out-of-Band PASSporT delivery as defined in <xref target="RFC8816"/>, using information already published in publicly logged STI certificates.</t>

<t>The extension is encoded as a sequence of IA5Strings containing absolute HTTPS URIs and is identified by an object identifier (OID) assigned in the PKIX id-pe arc. Additional details about the encoding, semantics, and validation rules for the OOB URI list are defined in the sections below.</t>

<section anchor="asn1-module-syntax"><name>ASN.1 Module Syntax</name>

<t>The extension ASN.1 module is defined as follows:</t>

<figure><artwork><![CDATA[
OOB-CERT-EXTENSION
  { iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) id-mod(0)
    id-mod-cmw-collection-extn(TBD0) }

DEFINITIONS EXPLICIT TAGS ::=
BEGIN

IMPORTS
  EXTENSION
  FROM PKIX-CommonTypes-2009  -- RFC 5912
    { iso(1) identified-organization(3) dod(6) internet(1)
      security(5) mechanisms(5) pkix(7) id-mod(0)
      id-mod-pkixCommon-02(57) } ;

-- CPS URIs Certificate Extension

ext-OOBURIs EXTENSION ::= {
  SYNTAX OOBURIs
  IDENTIFIED BY id-pe-oobURI }

-- OOB CPS URI Extension Syntax

id-pe OBJECT IDENTIFIER ::=
  { iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) 1 }

id-pe-oobURI OBJECT IDENTIFIER ::= { id-pe TBD1 }

OOBURIs ::= SEQUENCE SIZE (1..MAX) OF IA5String

END
]]></artwork></figure>

<t>Certificates containing a OOBURI that is not an absolute HTTPS URI as defined in <xref target="RFC3986"/> <bcp14>MUST</bcp14> be considered invalid by relying parties.</t>

<t>Note: The numeric assignment TBD is temporary. IANA will allocate a permanent arc under "PKIX SubjectPublicKeyInfo Certificate Extensions" during RFC publication.</t>

</section>
<section anchor="extension-semantics"><name>Extension Semantics</name>

<t>Each IA5String value in the sequence <bcp14>MUST</bcp14> be an absolute URI <xref target="RFC3986"/> that:</t>

<t><list style="symbols">
  <t>Uses the "https" scheme.</t>
  <t>Identifies the root of the CPS HTTPS API interface (e.g., "https://cps.example.net/oob/v1").</t>
</list></t>

<t>The sequence <bcp14>MUST</bcp14> contain at least one URI. Producers <bcp14>MAY</bcp14> include multiple URIs to provide resiliency or geographic locality information.</t>

</section>
<section anchor="criticality"><name>Criticality</name>

<t>The extension <bcp14>MUST</bcp14> be marked non-critical so that implementations that do not understand it can still validate the certificate.</t>

</section>
<section anchor="processing-rules"><name>Processing Rules</name>

<t><list style="symbols">
  <t>A STIR Authentication Service (AS), defined in <xref target="RFC8224"/>, that holds a Certificate containing id-pe-oobURI <bcp14>SHOULD</bcp14> publish OOB PASSporTs to the indicated CPS.</t>
  <t>A STIR Verification Service (VS), defined in <xref target="RFC8224"/> that receives a PASSporT signed by such a certificate <bcp14>MAY</bcp14> derive the CPS endpoint by reading the extension, or <bcp14>MAY</bcp14> query an external discovery directory that is populated by monitoring the STI-CT logs.</t>
  <t>If the extension and an external directory disagree, the resolution is a matter of local policy.</t>
  <t>A STIR Verification Service (VS) that receives a SIP request without an in-band PASSporT <bcp14>MAY</bcp14> use the calling party's identity (e.g., from the From or P-Asserted-Identity headers) to query a local directory or STI-CT monitor to locate the associated certificate. Once the certificate is located, the VS can extract the OOB URI extension to discover the Call Placement Service and retrieve the PASSporT.</t>
</list></t>

</section>
</section>
<section anchor="use-with-out-of-band"><name>Use with Out-of-Band</name>

<t>Figure 1 shows the message flow when the extension is present:</t>

<figure><artwork><![CDATA[
  +------------+  (1) Request Delegate Cert   +---------+
  | Enterprise |  ---- w/ CPS URI ext ------> | CA / CT |
  | (AS/OOB-AS)|                              +---------+
  +------------+                                   |
       |    |                                      |
       |    | (2a) SIP INVITE                      |
       |    |      (may or may not carry PASSporT) |
       |    v                                      |
       |  [Terminating Network]                    |
       |                                           |
       |  (2b) POST PASSporT to CPS                |
       +------------------------------------------>|
                                              +---------+
                                              |   CPS   |
       +------- (3) GET PASSporT from CPS --->+---------+
       |
  +---------+    (4) Monitor CT logs     +-----------+
  |   VS    |<---------------------------| CT Monitor|
  +---------+                            +-----------+
Figure 1
]]></artwork></figure>

<t><list style="numbers" type="1">
  <t>The enterprise obtains an STI certificate (either a STIR certificate or delegate certificate) containing the CPS URI. The CA submits the certificate to STI-CT.
2a. The AS sends a SIP INVITE toward the terminating network. The INVITE may or may not carry an in-band PASSporT.
2b. The OOB-AS submits the PASSporT to the CPS indicated by the extension.</t>
  <t>The terminating VS retrieves the PASSporT from the CPS.</t>
  <t>The VS (or a monitoring component) discovers the CPS URI by monitoring CT logs for certificates containing the extension.</t>
</list></t>

<t>Note: Although the figure depicts an enterprise scenario, the same mechanism applies when a service provider holds an STI certificate with the CPS URI extension.</t>

</section>
<section anchor="operational-considerations"><name>Operational Considerations</name>

<t><list style="symbols">
  <t>Logging: CAs issuing certificates with id-pe-oobURI <bcp14>MAY</bcp14> submit the certificate to STI-CT logs.</t>
  <t>Migration overlap: When changing a CPS endpoint, operators <bcp14>SHOULD</bcp14> ensure that both the old and new CPS URIs are operational during the transition. Specifically, the operator <bcp14>SHOULD</bcp14> issue a new certificate containing the updated CPS URI, confirm its presence in CT logs, and only then decommission the old CPS endpoint. The old certificate's CPS URI <bcp14>SHOULD</bcp14> remain functional until the old certificate expires or is revoked.</t>
  <t>Propagation delay: Relying parties that discover CPS URIs through CT log monitoring will experience a delay between certificate issuance and CPS URI availability. This delay depends on CT log inclusion time and monitor polling intervals. Operators <bcp14>SHOULD</bcp14> account for this delay when planning CPS migrations by maintaining the old endpoint for a period beyond the expected propagation time.</t>
</list></t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>The CPS URI certificate extension introduces a mechanism for associating telephone number resources with CPS endpoints through STI certificates. The following considerations apply:</t>

<t><list style="symbols">
  <t>Misuse or Misissuance: A malicious or misconfigured entity may include a CPS URI in a certificate without authorization for the corresponding TNAuthList resources. Certification Authorities (CAs) <bcp14>MUST</bcp14> validate that the entity requesting the certificate has authority over the listed numbers or SPCs before issuing the certificate.</t>
  <t>URI Integrity: The CPS URI is not digitally signed independently of the certificate. Relying parties <bcp14>MUST</bcp14> validate the entire certificate chain before relying on the URI.</t>
  <t>Certificate Expiry and Revocation: CPS URI information may become outdated due to certificate expiration or revocation. Relying parties <bcp14>SHOULD</bcp14> evaluate certificate validity and revocation status when interpreting CPS mappings.</t>
  <t>Log Availability and Monitoring: Relying parties that depend on CT log monitoring for CPS discovery <bcp14>SHOULD</bcp14> monitor multiple trusted logs to ensure timely detection of CPS declarations and prevent omission attacks.</t>
  <t>Information Exposure: The publication of CPS URIs in publicly logged certificates may reveal deployment metadata. This exposure is consistent with existing STIR delegate certificate practices and does not introduce additional privacy risk beyond what is already present in TNAuthList usage.</t>
</list></t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>IANA is requested to assign a new object identifier (OID) for the CPS URI certificate extension in the "PKIX Extension Registry" as follows:</t>

<t><list style="symbols">
  <t>Name: id-pe-oobURI</t>
  <t>OID: to be assigned</t>
  <t>Description: Certificate extension for specifying a Call Placement Service (CPS) URI for STIR Out-of-Band PASSporTs</t>
  <t>Reference: [RFC THIS]</t>
</list></t>

</section>


  </middle>

  <back>



    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC3986">
  <front>
    <title>Uniform Resource Identifier (URI): Generic Syntax</title>
    <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
    <author fullname="R. Fielding" initials="R." surname="Fielding"/>
    <author fullname="L. Masinter" initials="L." surname="Masinter"/>
    <date month="January" year="2005"/>
    <abstract>
      <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="66"/>
  <seriesInfo name="RFC" value="3986"/>
  <seriesInfo name="DOI" value="10.17487/RFC3986"/>
</reference>
<reference anchor="RFC5280">
  <front>
    <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
    <author fullname="D. Cooper" initials="D." surname="Cooper"/>
    <author fullname="S. Santesson" initials="S." surname="Santesson"/>
    <author fullname="S. Farrell" initials="S." surname="Farrell"/>
    <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
    <author fullname="R. Housley" initials="R." surname="Housley"/>
    <author fullname="W. Polk" initials="W." surname="Polk"/>
    <date month="May" year="2008"/>
    <abstract>
      <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5280"/>
  <seriesInfo name="DOI" value="10.17487/RFC5280"/>
</reference>
<reference anchor="RFC8224">
  <front>
    <title>Authenticated Identity Management in the Session Initiation Protocol (SIP)</title>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <author fullname="C. Jennings" initials="C." surname="Jennings"/>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <author fullname="C. Wendt" initials="C." surname="Wendt"/>
    <date month="February" year="2018"/>
    <abstract>
      <t>The baseline security mechanisms in the Session Initiation Protocol (SIP) are inadequate for cryptographically assuring the identity of the end users that originate SIP requests, especially in an interdomain context. This document defines a mechanism for securely identifying originators of SIP requests. It does so by defining a SIP header field for conveying a signature used for validating the identity and for conveying a reference to the credentials of the signer.</t>
      <t>This document obsoletes RFC 4474.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8224"/>
  <seriesInfo name="DOI" value="10.17487/RFC8224"/>
</reference>
<reference anchor="RFC8225">
  <front>
    <title>PASSporT: Personal Assertion Token</title>
    <author fullname="C. Wendt" initials="C." surname="Wendt"/>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <date month="February" year="2018"/>
    <abstract>
      <t>This document defines a method for creating and validating a token that cryptographically verifies an originating identity or, more generally, a URI or telephone number representing the originator of personal communications. The Personal Assertion Token, PASSporT, is cryptographically signed to protect the integrity of the identity of the originator and to verify the assertion of the identity information at the destination. The cryptographic signature is defined with the intention that it can confidently verify the originating persona even when the signature is sent to the destination party over an insecure channel. PASSporT is particularly useful for many personal-communications applications over IP networks and other multi-hop interconnection scenarios where the originating and destination parties may not have a direct trusted relationship.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8225"/>
  <seriesInfo name="DOI" value="10.17487/RFC8225"/>
</reference>
<reference anchor="RFC8226">
  <front>
    <title>Secure Telephone Identity Credentials: Certificates</title>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <author fullname="S. Turner" initials="S." surname="Turner"/>
    <date month="February" year="2018"/>
    <abstract>
      <t>In order to prevent the impersonation of telephone numbers on the Internet, some kind of credential system needs to exist that cryptographically asserts authority over telephone numbers. This document describes the use of certificates in establishing authority over telephone numbers, as a component of a broader architecture for managing telephone numbers as identities in protocols like SIP.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8226"/>
  <seriesInfo name="DOI" value="10.17487/RFC8226"/>
</reference>
<reference anchor="RFC8816">
  <front>
    <title>Secure Telephone Identity Revisited (STIR) Out-of-Band Architecture and Use Cases</title>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <date month="February" year="2021"/>
    <abstract>
      <t>The Personal Assertion Token (PASSporT) format defines a token that can be carried by signaling protocols, including SIP, to cryptographically attest the identity of callers. However, not all telephone calls use Internet signaling protocols, and some calls use them for only part of their signaling path, while some cannot reliably deliver SIP header fields end-to-end. This document describes use cases that require the delivery of PASSporT objects outside of the signaling path, and defines architectures and semantics to provide this functionality.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8816"/>
  <seriesInfo name="DOI" value="10.17487/RFC8816"/>
</reference>
<reference anchor="RFC9060">
  <front>
    <title>Secure Telephone Identity Revisited (STIR) Certificate Delegation</title>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <date month="September" year="2021"/>
    <abstract>
      <t>The Secure Telephone Identity Revisited (STIR) certificate profile provides a way to attest authority over telephone numbers and related identifiers for the purpose of preventing telephone number spoofing. This specification details how that authority can be delegated from a parent certificate to a subordinate certificate. This supports a number of use cases, including those where service providers grant credentials to enterprises or other customers capable of signing calls with STIR.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9060"/>
  <seriesInfo name="DOI" value="10.17487/RFC9060"/>
</reference>

<reference anchor="I-D.ietf-stir-certificate-transparency">
   <front>
      <title>STI Certificate Transparency</title>
      <author fullname="Chris Wendt" initials="C." surname="Wendt">
         <organization>Somos, Inc.</organization>
      </author>
      <author fullname="Robert Śliwa" initials="R." surname="Śliwa">
         <organization>Somos, Inc.</organization>
      </author>
      <author fullname="Alec Fenichel" initials="A." surname="Fenichel">
         <organization>TransNexus</organization>
      </author>
      <author fullname="Vinit Anil Gaikwad" initials="V. A." surname="Gaikwad">
         <organization>Twilio</organization>
      </author>
      <date day="23" month="November" year="2025"/>
      <abstract>
	 <t>   This document describes a framework for the use of the Certificate
   Transparency (CT) protocol for publicly logging the existence of
   Secure Telephone Identity (STI) certificates as they are issued or
   observed.  This allows any interested party that is part of the STI
   eco-system to audit STI certification authority (CA) activity and
   audit both the issuance of suspect certificates and the certificate
   logs themselves.  The intent is for the establishment of a level of
   trust in the STI eco-system that depends on the verification of
   telephone numbers requiring and refusing to honor STI certificates
   that do not appear in a established log.  This effectively
   establishes the precedent that STI CAs must add all issued
   certificates to the logs and thus establishes unique association of
   STI certificates to an authorized provider or assignee of a telephone
   number resource.  The primary role of CT in the STI ecosystem is for
   verifiable trust in the avoidance of issuance of unauthorized
   duplicate telephone number level delegate certificates or provider
   level certificates.  This provides a robust auditable mechanism for
   the detection of unauthorized creation of certificate credentials for
   illegitimate spoofing of telephone numbers or service provider codes
   (SPC).

   The framework borrows the log structure and API model from RFC6962 to
   enable public auditing and verifiability of certificate issuance.
   While the foundational mechanisms for log operation, Merkle Tree
   construction, and Signed Certificate Timestamps (SCTs) are aligned
   with RFC6962, this document contextualizes their application in the
   STIR eco-system, focusing on verifiable control over telephone number
   or service provider code resources.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-stir-certificate-transparency-01"/>
   
</reference>

<reference anchor="I-D.ietf-stir-servprovider-oob">
   <front>
      <title>Out-of-Band STIR for Service Providers</title>
      <author fullname="Jon Peterson" initials="J." surname="Peterson">
         <organization>TransUnion</organization>
      </author>
      <date day="7" month="July" year="2025"/>
      <abstract>
	 <t>   The Secure Telephone Identity Revisited (STIR) framework defines
   means of carrying its Personal Assertion Tokens (PASSporTs) either
   in-band, within the headers of a Session Initiation Protocol (SIP)
   request, or out-of-band, through a service that stores PASSporTs for
   retrieval by relying parties.  This specification defines a way that
   the out-of-band conveyance of PASSporTs can be used to support large
   service providers, for cases in which in-band STIR conveyance is not
   universally available.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-stir-servprovider-oob-08"/>
   
</reference>

<reference anchor="X.509" target="https://www.itu.int/rec/T-REC-X.509">
  <front>
    <title>Information technology - Open Systems Interconnection - The Directory: Public-key and attribute certificate frameworks</title>
    <author >
      <organization>International Telecommunication Union</organization>
    </author>
    <date year="2016" month="October"/>
  </front>
  <seriesInfo name="ITU-T" value="Recommendation X.509, ISO/IEC 9594-8"/>
</reference>
<reference anchor="X.680" target="https://www.itu.int/rec/T-REC-X.680">
  <front>
    <title>Information Technology - Abstract Syntax Notation One (ASN.1): Specification of basic notation</title>
    <author >
      <organization>International Telecommunication Union</organization>
    </author>
    <date year="2015" month="August"/>
  </front>
  <seriesInfo name="ITU-T" value="Recommendation X.680, ISO/IEC 8824-1"/>
</reference>
<reference anchor="X.681" target="https://www.itu.int/rec/T-REC-X.681">
  <front>
    <title>Information Technology - Abstract Syntax Notation One (ASN.1): Information object specification</title>
    <author >
      <organization>International Telecommunication Union</organization>
    </author>
    <date year="2015" month="August"/>
  </front>
  <seriesInfo name="ITU-T" value="Recommendation X.681, ISO/IEC 8824-2"/>
</reference>
<reference anchor="X.682" target="https://www.itu.int/rec/T-REC-X.682">
  <front>
    <title>Information Technology - Abstract Syntax Notation One (ASN.1): Constraint specification</title>
    <author >
      <organization>International Telecommunication Union</organization>
    </author>
    <date year="2015" month="August"/>
  </front>
  <seriesInfo name="ITU-T" value="Recommendation X.682, ISO/IEC 8824-3"/>
</reference>
<reference anchor="X.683" target="https://www.itu.int/rec/T-REC-X.683">
  <front>
    <title>Information Technology - Abstract Syntax Notation One (ASN.1): Parameterization of ASN.1 specifications</title>
    <author >
      <organization>International Telecommunication Union</organization>
    </author>
    <date year="2015" month="August"/>
  </front>
  <seriesInfo name="ITU-T" value="Recommendation X.683, ISO/IEC 8824-4"/>
</reference>


<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>



    </references>




<?line 267?>

<section numbered="false" anchor="acknowledgments"><name>Acknowledgments</name>

<t>TODO acknowledge.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

