| rfc8226.txt | draft-ietf-stir-certificates-17.txt | |||
|---|---|---|---|---|
| Internet Engineering Task Force (IETF) J. Peterson | Network Working Group J. Peterson | |||
| Request for Comments: 8226 Neustar | Internet-Draft Neustar | |||
| Category: Standards Track S. Turner | Intended status: Standards Track S. Turner | |||
| ISSN: 2070-1721 sn3rd | Expires: June 17, 2018 sn3rd | |||
| November 2017 | December 14, 2017 | |||
| Secure Telephone Identity Credentials: Certificates | Secure Telephone Identity Credentials: Certificates | |||
| draft-ietf-stir-certificates-17 | ||||
| Abstract | Abstract | |||
| In order to prevent the impersonation of telephone numbers on the | In order to prevent the impersonation of telephone numbers on the | |||
| Internet, some kind of credential system needs to exist that | Internet, some kind of credential system needs to exist that | |||
| cryptographically asserts authority over telephone numbers. This | cryptographically asserts authority over telephone numbers. This | |||
| document describes the use of certificates in establishing authority | document describes the use of certificates in establishing authority | |||
| over telephone numbers, as a component of a broader architecture for | over telephone numbers, as a component of a broader architecture for | |||
| managing telephone numbers as identities in protocols like SIP. | managing telephone numbers as identities in protocols like SIP. | |||
| Status of This Memo | Status of This Memo | |||
| This is an Internet Standards Track document. | This Internet-Draft is submitted in full conformance with the | |||
| provisions of BCP 78 and BCP 79. | ||||
| This document is a product of the Internet Engineering Task Force | Internet-Drafts are working documents of the Internet Engineering | |||
| (IETF). It represents the consensus of the IETF community. It has | Task Force (IETF). Note that other groups may also distribute | |||
| received public review and has been approved for publication by the | working documents as Internet-Drafts. The list of current Internet- | |||
| Internet Engineering Steering Group (IESG). Further information on | Drafts is at http://datatracker.ietf.org/drafts/current/. | |||
| Internet Standards is available in Section 2 of RFC 7841. | ||||
| Information about the current status of this document, any errata, | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and how to provide feedback on it may be obtained at | and may be updated, replaced, or obsoleted by other documents at any | |||
| https://www.rfc-editor.org/info/rfc8226. | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | ||||
| This Internet-Draft will expire on June 17, 2018. | ||||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2017 IETF Trust and the persons identified as the | Copyright (c) 2017 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (https://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| carefully, as they describe your rights and restrictions with respect | carefully, as they describe your rights and restrictions with respect | |||
| to this document. Code Components extracted from this document must | to this document. Code Components extracted from this document must | |||
| include Simplified BSD License text as described in Section 4.e of | include Simplified BSD License text as described in Section 4.e of | |||
| the Trust Legal Provisions and are provided without warranty as | the Trust Legal Provisions and are provided without warranty as | |||
| described in the Simplified BSD License. | described in the Simplified BSD License. | |||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | |||
| 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3 | 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 3. Authority for Telephone Numbers in Certificates . . . . . . . 3 | 3. Authority for Telephone Numbers in Certificates . . . . . . . 4 | |||
| 4. Certificate Usage with STIR . . . . . . . . . . . . . . . . . 5 | 4. Certificate Usage with STIR . . . . . . . . . . . . . . . . . 5 | |||
| 5. Enrollment and Authorization Using the TN Authorization List 6 | 5. Enrollment and Authorization Using the TN Authorization List 6 | |||
| 5.1. Constraints on Signing PASSporTs . . . . . . . . . . . . 7 | 5.1. Constraints on Signing PASSporTs . . . . . . . . . . . . 8 | |||
| 5.2. Certificate Extension Scope and Structure . . . . . . . . 8 | 5.2. Certificate Extension Scope and Structure . . . . . . . . 8 | |||
| 6. Provisioning Private Keying Material . . . . . . . . . . . . 8 | 6. Provisioning Private Keying Material . . . . . . . . . . . . 9 | |||
| 7. Acquiring Credentials to Verify Signatures . . . . . . . . . 9 | 7. Acquiring Credentials to Verify Signatures . . . . . . . . . 9 | |||
| 8. JWT Claim Constraints Syntax . . . . . . . . . . . . . . . . 10 | 8. JWT Claim Constraints Syntax . . . . . . . . . . . . . . . . 10 | |||
| 9. TN Authorization List Syntax . . . . . . . . . . . . . . . . 11 | 9. TN Authorization List Syntax . . . . . . . . . . . . . . . . 11 | |||
| 10. Certificate Freshness and Revocation . . . . . . . . . . . . 13 | 10. Certificate Freshness and Revocation . . . . . . . . . . . . 13 | |||
| 10.1. Acquiring the TN List by Reference . . . . . . . . . . . 14 | 10.1. Acquiring the TN List by Reference . . . . . . . . . . . 14 | |||
| 11. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 15 | 11. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 15 | |||
| 12. Security Considerations . . . . . . . . . . . . . . . . . . . 15 | 11.1. ASN.1 Registrations . . . . . . . . . . . . . . . . . . 15 | |||
| 13. References . . . . . . . . . . . . . . . . . . . . . . . . . 15 | 11.2. Media Type Registrations . . . . . . . . . . . . . . . . 16 | |||
| 13.1. Normative References . . . . . . . . . . . . . . . . . . 15 | 12. Security Considerations . . . . . . . . . . . . . . . . . . . 16 | |||
| 13.2. Informative References . . . . . . . . . . . . . . . . . 18 | 13. References . . . . . . . . . . . . . . . . . . . . . . . . . 17 | |||
| Appendix A. ASN.1 Module . . . . . . . . . . . . . . . . . . . . 18 | 13.1. Normative References . . . . . . . . . . . . . . . . . . 17 | |||
| Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . 20 | 13.2. Informative References . . . . . . . . . . . . . . . . . 19 | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 20 | Appendix A. ASN.1 Module . . . . . . . . . . . . . . . . . . . . 20 | |||
| Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . 22 | ||||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 22 | ||||
| 1. Introduction | 1. Introduction | |||
| The Secure Telephone Identity Revisited (STIR) problem statement | The Secure Telephone Identity Revisited (STIR) problem statement | |||
| [RFC7340] identifies the primary enabler of robocalling, vishing | [RFC7340] identifies the primary enabler of robocalling, vishing | |||
| (voicemail hacking), swatting, and related attacks as the capability | (voicemail hacking), swatting, and related attacks as the capability | |||
| to impersonate a calling party number. The starkest examples of | to impersonate a calling party number. The starkest examples of | |||
| these attacks are cases where automated callees on the Public | these attacks are cases where automated callees on the Public | |||
| Switched Telephone Network (PSTN) rely on the calling number as a | Switched Telephone Network (PSTN) rely on the calling number as a | |||
| security measure -- for example, to access a voicemail system. | security measure -- for example, to access a voicemail system. | |||
| skipping to change at page 6, line 5 | skipping to change at page 6, line 12 | |||
| described in Section 9 identifies the scope of authority of the | described in Section 9 identifies the scope of authority of the | |||
| certificate. | certificate. | |||
| 4. The cryptographic algorithms required to validate the | 4. The cryptographic algorithms required to validate the | |||
| credentials: for this specification, that means the signature | credentials: for this specification, that means the signature | |||
| algorithms used to sign certificates. This specification | algorithms used to sign certificates. This specification | |||
| REQUIRES that implementations support both the Elliptic Curve | REQUIRES that implementations support both the Elliptic Curve | |||
| Digital Signature Algorithm (ECDSA) with the P-256 curve (see | Digital Signature Algorithm (ECDSA) with the P-256 curve (see | |||
| [DSS]) and RSA PKCS #1 v1.5 ("PKCS" stands for "Public-Key | [DSS]) and RSA PKCS #1 v1.5 ("PKCS" stands for "Public-Key | |||
| Cryptography Standards") (see [RFC8017], Section 8.2) for | Cryptography Standards") (see [RFC8017], Section 8.2) for | |||
| certificate signatures. Implementers are advised that RS256 is | certificate signatures. Implementers are advised that the latter | |||
| mandated only as a transitional mechanism, due to its widespread | algorithm is mandated only as a transitional mechanism, due to | |||
| use in existing PKIs, but we anticipate that this mechanism will | its widespread use in existing PKIs, but we anticipate that this | |||
| eventually be deprecated. | mechanism will eventually be deprecated. | |||
| 5. Finally, note that all certificates compliant with this | 5. Finally, note that all certificates compliant with this | |||
| specification: | specification: | |||
| * MUST provide cryptographic keying material sufficient to | * MUST provide cryptographic keying material sufficient to | |||
| generate the ECDSA using P-256 and SHA-256 signatures | generate the ECDSA using P-256 and SHA-256 signatures | |||
| necessary to support the ES256 hashed signatures required by | necessary to support the ES256 hashed signatures required by | |||
| PASSporT [RFC8225], which in turn follows the JSON Web Token | PASSporT [RFC8225], which in turn follows the JSON Web Token | |||
| (JWT) [RFC7519]. | (JWT) [RFC7519]. | |||
| skipping to change at page 12, line 33 | skipping to change at page 12, line 43 | |||
| one [2] TelephoneNumber | one [2] TelephoneNumber | |||
| } | } | |||
| ServiceProviderCode ::= IA5String | ServiceProviderCode ::= IA5String | |||
| -- SPCs may be OCNs, various SPIDs, or other SP identifiers | -- SPCs may be OCNs, various SPIDs, or other SP identifiers | |||
| -- from the telephone network. | -- from the telephone network. | |||
| TelephoneNumberRange ::= SEQUENCE { | TelephoneNumberRange ::= SEQUENCE { | |||
| start TelephoneNumber, | start TelephoneNumber, | |||
| count INTEGER (2..MAX) | count INTEGER (2..MAX), | |||
| ... | ||||
| } | } | |||
| TelephoneNumber ::= IA5String (SIZE (1..15)) (FROM ("0123456789#*")) | TelephoneNumber ::= IA5String (SIZE (1..15)) (FROM ("0123456789#*")) | |||
| The TN Authorization List certificate extension indicates the | The TN Authorization List certificate extension indicates the | |||
| authorized phone numbers for the call setup signer. It indicates one | authorized phone numbers for the call setup signer. It indicates one | |||
| or more blocks of telephone number entries that have been authorized | or more blocks of telephone number entries that have been authorized | |||
| for use by the call setup signer. There are three ways to identify | for use by the call setup signer. There are three ways to identify | |||
| the block: | the block: | |||
| 1. SPCs as described in this document are a generic term for the | 1. SPCs as described in this document are a generic term for the | |||
| identifiers used to designate service providers in telephone | identifiers used to designate service providers in telephone | |||
| networks today. In North American context, these would include | networks today. In North American context, these would include | |||
| OCNs as specified in [ATIS-0300251], related SPIDs, or other | OCNs as specified in [ATIS-0300251], related SPIDs, or other | |||
| similar identifiers for service providers. SPCs can be used to | similar identifiers for service providers. SPCs can be used to | |||
| indirectly name all of the telephone numbers associated with that | indirectly name all of the telephone numbers associated with that | |||
| identifier for a service provider, | identifier for a service provider. | |||
| 2. Telephone numbers can be listed in a range (in the | 2. Telephone numbers can be listed in a range (in the | |||
| TelephoneNumberRange format), which consists of a starting | TelephoneNumberRange format), which consists of a starting | |||
| telephone number and then an integer count of numbers within the | telephone number and then an integer count of numbers within the | |||
| range, where the valid boundaries of ranges may vary according to | range, where the valid boundaries of ranges may vary according to | |||
| national policies, or | national policies. The count field is only applicable to start | |||
| fields' whose values do not include "*" or "#" (i.e., a | ||||
| TelephoneNumber that does not include "*" or "#"). count never | ||||
| makes the number increase in length (i.e., a TelephoneNumberRange | ||||
| with TelephoneNumber=10 with a count=91 will address numbers | ||||
| 10-99); formally, given the inputs count and TelephoneNumber of | ||||
| length D the end of the TelephoneNumberRange is: | ||||
| MIN(TelephoneNumber + count, 10^D - 1). | ||||
| 3. A single telephone number can be listed (as a TelephoneNumber). | 3. A single telephone number can be listed (as a TelephoneNumber). | |||
| Note that because large-scale service providers may want to associate | Note that because large-scale service providers may want to associate | |||
| many numbers, possibly millions of numbers, with a particular | many numbers, possibly millions of numbers, with a particular | |||
| certificate, optimizations are required for those cases to prevent | certificate, optimizations are required for those cases to prevent | |||
| the certificate size from becoming unmanageable. In these cases, the | the certificate size from becoming unmanageable. In these cases, the | |||
| TN Authorization List may be given by reference rather than by value, | TN Authorization List may be given by reference rather than by value, | |||
| through the presence of a separate certificate extension that permits | through the presence of a separate certificate extension that permits | |||
| verifiers to either (1) securely download the list of numbers | verifiers to either (1) securely download the list of numbers | |||
| skipping to change at page 14, line 31 | skipping to change at page 14, line 49 | |||
| certificate itself. | certificate itself. | |||
| Acquiring a list of the telephone numbers associated with a | Acquiring a list of the telephone numbers associated with a | |||
| certificate or its subject lends itself to an application-layer | certificate or its subject lends itself to an application-layer | |||
| query/response interaction outside of certificate status, one that | query/response interaction outside of certificate status, one that | |||
| could be initiated through a separate URI included in the | could be initiated through a separate URI included in the | |||
| certificate. The AIA extension (see [RFC5280]) supports such a | certificate. The AIA extension (see [RFC5280]) supports such a | |||
| mechanism: it designates an OID to identify the accessMethod and an | mechanism: it designates an OID to identify the accessMethod and an | |||
| accessLocation, which would most likely be a URI. A verifier would | accessLocation, which would most likely be a URI. A verifier would | |||
| then follow the URI to ascertain whether the TNs in the list are | then follow the URI to ascertain whether the TNs in the list are | |||
| authorized for use by the caller. | authorized for use by the caller. As with the certificate extension | |||
| defined in Section 9, a URI dereferenced from an end entity | ||||
| certificate will indicate the TNs which the caller has been | ||||
| authorized. Verifiers MUST support the AIA extension and the | ||||
| dereferenced URI from a CA certificate limits the the set of TNs for | ||||
| certification paths that include this certificate. | ||||
| HTTPS is the most obvious candidate for a protocol to be used for | HTTPS is the most obvious candidate for a protocol to be used for | |||
| fetching the list of telephone numbers associated with a particular | fetching the list of telephone numbers associated with a particular | |||
| certificate. This document defines a new AIA accessMethod, called | certificate. This document defines a new AIA accessMethod, called | |||
| "id-ad-stirTNList", which uses the following AIA OID: | "id-ad-stirTNList", which uses the following AIA OID: | |||
| id-ad-stirTNList OBJECT IDENTIFIER ::= { id-ad 14 } | id-ad-stirTNList OBJECT IDENTIFIER ::= { id-ad 14 } | |||
| When the "id-ad-stirTNList" accessMethod is used, the accessLocation | When the "id-ad-stirTNList" accessMethod is used, the accessLocation | |||
| MUST be an HTTPS URI. Dereferencing the URI will return the complete | MUST be an HTTPS URI. Dereferencing the URI will return the complete | |||
| TN Authorization List (see Section 9) for the certificate. | DER encoded TN Authorization List (see Section 9) for the certificate | |||
| with a Content-Type of application/tnauthlist (see Section 11.2). | ||||
| Delivering the entire list of telephone numbers associated with a | Delivering the entire list of telephone numbers associated with a | |||
| particular certificate will divulge to STIR verifiers information | particular certificate will divulge to STIR verifiers information | |||
| about telephone numbers other than the one associated with the | about telephone numbers other than the one associated with the | |||
| particular call that the verifier is checking. In some environments, | particular call that the verifier is checking. In some environments, | |||
| where STIR verifiers handle a high volume of calls, maintaining an | where STIR verifiers handle a high volume of calls, maintaining an | |||
| up-to-date and complete cache for the numbers associated with crucial | up-to-date and complete cache for the numbers associated with crucial | |||
| certificate holders could give an important boost to performance. | certificate holders could give an important boost to performance. | |||
| 11. IANA Considerations | 11. IANA Considerations | |||
| 11.1. ASN.1 Registrations | ||||
| This document makes use of object identifiers for the TN certificate | This document makes use of object identifiers for the TN certificate | |||
| extension defined in Section 9, the "TN List by reference" AIA access | extension defined in Section 9, the "TN List by reference" AIA access | |||
| descriptor defined in Section 10.1, and the ASN.1 module identifier | descriptor defined in Section 10.1, and the ASN.1 module identifier | |||
| defined in Appendix A. Therefore, per this document, IANA has made | defined in Appendix A. Therefore, per this document, IANA has made | |||
| the following assignments, as shown on | the following assignments, as shown on | |||
| <https://www.iana.org/assignments/smi-numbers>: | <https://www.iana.org/assignments/smi-numbers>: | |||
| o TN Authorization List certificate extension in the "SMI Security | o TN Authorization List certificate extension in the "SMI Security | |||
| for PKIX Certificate Extension" (1.3.6.1.5.5.7.1) registry: | for PKIX Certificate Extension" (1.3.6.1.5.5.7.1) registry: | |||
| skipping to change at page 15, line 34 | skipping to change at page 16, line 12 | |||
| o TN List by reference access descriptor in the "SMI Security for | o TN List by reference access descriptor in the "SMI Security for | |||
| PKIX Access Descriptor" (1.3.6.1.5.5.7.48) registry: | PKIX Access Descriptor" (1.3.6.1.5.5.7.48) registry: | |||
| 14 id-ad-stirTNList | 14 id-ad-stirTNList | |||
| o The TN ASN.1 module in the "SMI Security for PKIX Module | o The TN ASN.1 module in the "SMI Security for PKIX Module | |||
| Identifier" (1.3.6.1.5.5.7.0) registry: | Identifier" (1.3.6.1.5.5.7.0) registry: | |||
| 89 id-mod-tn-module | 89 id-mod-tn-module | |||
| 11.2. Media Type Registrations | ||||
| Type name: application | ||||
| Subtype name: tnauthlist | ||||
| Required parameters: None | ||||
| Optional parameters: None | ||||
| Encoding considerations: Binary | ||||
| Security considerations: See Section 12 of [RFCTBD] | ||||
| Interoperability considerations: | ||||
| The TN Authorization List inside this media type MUST be | ||||
| DER-encoded TNAuthorizationList. | ||||
| Published specification: [RFCTBD] | ||||
| Applications that use this media type: | ||||
| Issuers and relying parties of secure telephone identity | ||||
| certificates, to limit the subject's authority to a | ||||
| particular telephone number or telephone number range. | ||||
| Fragment identifier considerations: None | ||||
| Additional information: | ||||
| Deprecated alias names for this type: None | ||||
| Magic number(s): None | ||||
| File extension(s): None | ||||
| Macintosh File Type Code(s): None | ||||
| Person & email address to contact for further information: | ||||
| Jon Peterson <jon.peterson@team.neustar> | ||||
| Intended usage: COMMON | ||||
| Restrictions on usage: None | ||||
| Author: Sean Turner <sean@sn3rd.com> | ||||
| Change controller: The IESG <iesg@ietf.org> | ||||
| [RFC editor's instruction: Please replace RFCTBD with the | ||||
| RFC number when this document is published.] | ||||
| 12. Security Considerations | 12. Security Considerations | |||
| This document is entirely about security. For further information on | This document is entirely about security. For further information on | |||
| certificate security and practices, see [RFC5280], in particular its | certificate security and practices, see [RFC5280], in particular its | |||
| Security Considerations section. | Security Considerations section. | |||
| If a certification authority issues a certificate attesting authority | ||||
| over many telephone numbers, the TNAuthList element can divulge to | ||||
| relying parties extraneous telephone numbers associated with the | ||||
| certificate which have no bearing on any given call in progress. The | ||||
| potential privacy risk can be exacerbated by the use of AIA, as | ||||
| described in Section 10.1, to link many thousand of numbers to a | ||||
| single certificate. Even an SPC in a certificate can be used to link | ||||
| a certificate to a particular carrier and, with access to industry | ||||
| databases, potentially the set of numbers associated with that SPC. | ||||
| While these practices may not cause concern in some environments, in | ||||
| other scenarios alternative approaches could minimize the data | ||||
| revealed to relying parties. For example, a service provider with | ||||
| authority over a large block of numbers could generate short-lived | ||||
| certificates for individual TNs that are not so easily linked to the | ||||
| service provider or any other numbers that the service provider | ||||
| controls. Optimizations to facilitate acquiring short-lived | ||||
| certificates are a potential area of future work for STIR. | ||||
| The TN Authorization List returned through a dereferenced URI is | ||||
| served over HTTPS; the TN Authorization List is therefore protected | ||||
| in transit. But, the TN Authorization List served is not a signed | ||||
| object and therefore the server is trusted to faithfully return the | ||||
| TN Authorization List provided to it by the list generator. | ||||
| 13. References | 13. References | |||
| 13.1. Normative References | 13.1. Normative References | |||
| [ATIS-0300251] | [ATIS-0300251] | |||
| ATIS Recommendation 0300251, "Codes for Identification of | ATIS Recommendation 0300251, "Codes for Identification of | |||
| Service Providers for Information Exchange", 2007. | Service Providers for Information Exchange", 2007. | |||
| [DSS] National Institute of Standards and Technology, U.S. | [DSS] National Institute of Standards and Technology, U.S. | |||
| Department of Commerce, "Digital Signature Standard | Department of Commerce, "Digital Signature Standard | |||
| (DSS)", NIST FIPS PUB 186-4, DOI 10.6028/NIST.FIPS.186-4, | (DSS)", NIST FIPS PUB 186-4, DOI 10.6028/NIST.FIPS.186-4, | |||
| July 2013, <http://nvlpubs.nist.gov/nistpubs/FIPS/ | July 2013, <http://nvlpubs.nist.gov/nistpubs/FIPS/ | |||
| NIST.FIPS.186-4.pdf>. | NIST.FIPS.186-4.pdf>. | |||
| [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
| Requirement Levels", BCP 14, RFC 2119, | Requirement Levels", BCP 14, RFC 2119, | |||
| DOI 10.17487/RFC2119, March 1997, | DOI 10.17487/RFC2119, March 1997, <https://www.rfc- | |||
| <https://www.rfc-editor.org/info/rfc2119>. | editor.org/info/rfc2119>. | |||
| [RFC2392] Levinson, E., "Content-ID and Message-ID Uniform Resource | [RFC2392] Levinson, E., "Content-ID and Message-ID Uniform Resource | |||
| Locators", RFC 2392, DOI 10.17487/RFC2392, August 1998, | Locators", RFC 2392, DOI 10.17487/RFC2392, August 1998, | |||
| <https://www.rfc-editor.org/info/rfc2392>. | <https://www.rfc-editor.org/info/rfc2392>. | |||
| [RFC3986] Berners-Lee, T., Fielding, R., and L. Masinter, "Uniform | [RFC3986] Berners-Lee, T., Fielding, R., and L. Masinter, "Uniform | |||
| Resource Identifier (URI): Generic Syntax", STD 66, | Resource Identifier (URI): Generic Syntax", STD 66, | |||
| RFC 3986, DOI 10.17487/RFC3986, January 2005, | RFC 3986, DOI 10.17487/RFC3986, January 2005, | |||
| <https://www.rfc-editor.org/info/rfc3986>. | <https://www.rfc-editor.org/info/rfc3986>. | |||
| [RFC5280] Cooper, D., Santesson, S., Farrell, S., Boeyen, S., | [RFC5280] Cooper, D., Santesson, S., Farrell, S., Boeyen, S., | |||
| Housley, R., and W. Polk, "Internet X.509 Public Key | Housley, R., and W. Polk, "Internet X.509 Public Key | |||
| Infrastructure Certificate and Certificate Revocation List | Infrastructure Certificate and Certificate Revocation List | |||
| (CRL) Profile", RFC 5280, DOI 10.17487/RFC5280, May 2008, | (CRL) Profile", RFC 5280, DOI 10.17487/RFC5280, May 2008, | |||
| <https://www.rfc-editor.org/info/rfc5280>. | <https://www.rfc-editor.org/info/rfc5280>. | |||
| [RFC5912] Hoffman, P. and J. Schaad, "New ASN.1 Modules for the | [RFC5912] Hoffman, P. and J. Schaad, "New ASN.1 Modules for the | |||
| Public Key Infrastructure Using X.509 (PKIX)", RFC 5912, | Public Key Infrastructure Using X.509 (PKIX)", RFC 5912, | |||
| DOI 10.17487/RFC5912, June 2010, | DOI 10.17487/RFC5912, June 2010, <https://www.rfc- | |||
| <https://www.rfc-editor.org/info/rfc5912>. | editor.org/info/rfc5912>. | |||
| [RFC5958] Turner, S., "Asymmetric Key Packages", RFC 5958, | [RFC5958] Turner, S., "Asymmetric Key Packages", RFC 5958, | |||
| DOI 10.17487/RFC5958, August 2010, | DOI 10.17487/RFC5958, August 2010, <https://www.rfc- | |||
| <https://www.rfc-editor.org/info/rfc5958>. | editor.org/info/rfc5958>. | |||
| [RFC7230] Fielding, R., Ed. and J. Reschke, Ed., "Hypertext Transfer | [RFC7230] Fielding, R., Ed. and J. Reschke, Ed., "Hypertext Transfer | |||
| Protocol (HTTP/1.1): Message Syntax and Routing", | Protocol (HTTP/1.1): Message Syntax and Routing", | |||
| RFC 7230, DOI 10.17487/RFC7230, June 2014, | RFC 7230, DOI 10.17487/RFC7230, June 2014, | |||
| <https://www.rfc-editor.org/info/rfc7230>. | <https://www.rfc-editor.org/info/rfc7230>. | |||
| [RFC7258] Farrell, S. and H. Tschofenig, "Pervasive Monitoring Is an | [RFC7258] Farrell, S. and H. Tschofenig, "Pervasive Monitoring Is an | |||
| Attack", BCP 188, RFC 7258, DOI 10.17487/RFC7258, May | Attack", BCP 188, RFC 7258, DOI 10.17487/RFC7258, May | |||
| 2014, <https://www.rfc-editor.org/info/rfc7258>. | 2014, <https://www.rfc-editor.org/info/rfc7258>. | |||
| skipping to change at page 17, line 12 | skipping to change at page 18, line 45 | |||
| RFC 8017, DOI 10.17487/RFC8017, November 2016, | RFC 8017, DOI 10.17487/RFC8017, November 2016, | |||
| <https://www.rfc-editor.org/info/rfc8017>. | <https://www.rfc-editor.org/info/rfc8017>. | |||
| [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC | [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC | |||
| 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, | 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, | |||
| May 2017, <https://www.rfc-editor.org/info/rfc8174>. | May 2017, <https://www.rfc-editor.org/info/rfc8174>. | |||
| [RFC8224] Peterson, J., Jennings, C., Rescorla, E., and C. Wendt, | [RFC8224] Peterson, J., Jennings, C., Rescorla, E., and C. Wendt, | |||
| "Authenticated Identity Management in the Session | "Authenticated Identity Management in the Session | |||
| Initiation Protocol (SIP)", RFC 8224, | Initiation Protocol (SIP)", RFC 8224, | |||
| DOI 10.17487/RFC8224, November 2017, | DOI 10.17487/RFC8224, November 2017, <https://www.rfc- | |||
| <https://www.rfc-editor.org/info/rfc8224>. | editor.org/info/rfc8224>. | |||
| [RFC8225] Wendt, C. and J. Peterson, "PASSporT: Personal Assertion | [RFC8225] Wendt, C. and J. Peterson, "PASSporT: Personal Assertion | |||
| Token", RFC 8225, DOI 10.17487/RFC8225, November 2017, | Token", RFC 8225, DOI 10.17487/RFC8225, November 2017, | |||
| <https://www.rfc-editor.org/info/rfc8225>. | <https://www.rfc-editor.org/info/rfc8225>. | |||
| [X.509] International Telecommunication Union, "Information | [X.509] International Telecommunication Union, "Information | |||
| technology - Open Systems Interconnection - The Directory: | technology - Open Systems Interconnection - The Directory: | |||
| Public-key and attribute certificate frameworks", ITU-T | Public-key and attribute certificate frameworks", ITU-T | |||
| Recommendation X.509, ISO/IEC 9594-8, October 2016, | Recommendation X.509, ISO/IEC 9594-8, October 2016, | |||
| <https://www.itu.int/rec/T-REC-X.509>. | <https://www.itu.int/rec/T-REC-X.509>. | |||
| skipping to change at page 18, line 9 | skipping to change at page 19, line 39 | |||
| [X.683] International Telecommunication Union, "Information | [X.683] International Telecommunication Union, "Information | |||
| Technology - Abstract Syntax Notation One (ASN.1): | Technology - Abstract Syntax Notation One (ASN.1): | |||
| Parameterization of ASN.1 specifications", ITU-T | Parameterization of ASN.1 specifications", ITU-T | |||
| Recommendation X.683, ISO/IEC 8824-4, August 2015, | Recommendation X.683, ISO/IEC 8824-4, August 2015, | |||
| <https://www.itu.int/rec/T-REC-X.683>. | <https://www.itu.int/rec/T-REC-X.683>. | |||
| 13.2. Informative References | 13.2. Informative References | |||
| [RFC2046] Freed, N. and N. Borenstein, "Multipurpose Internet Mail | [RFC2046] Freed, N. and N. Borenstein, "Multipurpose Internet Mail | |||
| Extensions (MIME) Part Two: Media Types", RFC 2046, | Extensions (MIME) Part Two: Media Types", RFC 2046, | |||
| DOI 10.17487/RFC2046, November 1996, | DOI 10.17487/RFC2046, November 1996, <https://www.rfc- | |||
| <https://www.rfc-editor.org/info/rfc2046>. | editor.org/info/rfc2046>. | |||
| [RFC3647] Chokhani, S., Ford, W., Sabett, R., Merrill, C., and S. | [RFC3647] Chokhani, S., Ford, W., Sabett, R., Merrill, C., and S. | |||
| Wu, "Internet X.509 Public Key Infrastructure Certificate | Wu, "Internet X.509 Public Key Infrastructure Certificate | |||
| Policy and Certification Practices Framework", RFC 3647, | Policy and Certification Practices Framework", RFC 3647, | |||
| DOI 10.17487/RFC3647, November 2003, | DOI 10.17487/RFC3647, November 2003, <https://www.rfc- | |||
| <https://www.rfc-editor.org/info/rfc3647>. | editor.org/info/rfc3647>. | |||
| [RFC7340] Peterson, J., Schulzrinne, H., and H. Tschofenig, "Secure | [RFC7340] Peterson, J., Schulzrinne, H., and H. Tschofenig, "Secure | |||
| Telephone Identity Problem Statement and Requirements", | Telephone Identity Problem Statement and Requirements", | |||
| RFC 7340, DOI 10.17487/RFC7340, September 2014, | RFC 7340, DOI 10.17487/RFC7340, September 2014, | |||
| <https://www.rfc-editor.org/info/rfc7340>. | <https://www.rfc-editor.org/info/rfc7340>. | |||
| [RFC7375] Peterson, J., "Secure Telephone Identity Threat Model", | [RFC7375] Peterson, J., "Secure Telephone Identity Threat Model", | |||
| RFC 7375, DOI 10.17487/RFC7375, October 2014, | RFC 7375, DOI 10.17487/RFC7375, October 2014, | |||
| <https://www.rfc-editor.org/info/rfc7375>. | <https://www.rfc-editor.org/info/rfc7375>. | |||
| skipping to change at page 20, line 21 | skipping to change at page 22, line 4 | |||
| TNAuthorizationList ::= SEQUENCE SIZE (1..MAX) OF TNEntry | TNAuthorizationList ::= SEQUENCE SIZE (1..MAX) OF TNEntry | |||
| TNEntry ::= CHOICE { | TNEntry ::= CHOICE { | |||
| spc [0] ServiceProviderCode, | spc [0] ServiceProviderCode, | |||
| range [1] TelephoneNumberRange, | range [1] TelephoneNumberRange, | |||
| one [2] TelephoneNumber | one [2] TelephoneNumber | |||
| } | } | |||
| ServiceProviderCode ::= IA5String | ServiceProviderCode ::= IA5String | |||
| -- SPCs may be OCNs, various SPIDs, or other SP identifiers | -- SPCs may be OCNs, various SPIDs, or other SP identifiers | |||
| -- from the telephone network. | -- from the telephone network. | |||
| TelephoneNumberRange ::= SEQUENCE { | TelephoneNumberRange ::= SEQUENCE { | |||
| start TelephoneNumber, | start TelephoneNumber, | |||
| count INTEGER (2..MAX) | count INTEGER (2..MAX), | |||
| ... | ||||
| } | } | |||
| TelephoneNumber ::= IA5String (SIZE (1..15)) (FROM ("0123456789#*")) | TelephoneNumber ::= IA5String (SIZE (1..15)) (FROM ("0123456789#*")) | |||
| -- TN Access Descriptor | -- TN Access Descriptor | |||
| id-ad-stirTNList OBJECT IDENTIFIER ::= { id-ad 14 } | id-ad-stirTNList OBJECT IDENTIFIER ::= { id-ad 14 } | |||
| END | END | |||
| Acknowledgments | Acknowledgments | |||
| Anders Kristensen, Russ Housley, Brian Rosen, Cullen Jennings, Dave | Anders Kristensen, Russ Housley, Brian Rosen, Cullen Jennings, Dave | |||
| Crocker, Tony Rutkowski, John Braunberger, and Eric Rescorla provided | Crocker, Tony Rutkowski, John Braunberger, Eric Rescorla, and Martin | |||
| key input to the discussions leading to this document. Russ Housley | Thomson provided key input to the discussions leading to this | |||
| provided some direct assistance and text surrounding the ASN.1 | document. Russ Housley provided some direct assistance and text | |||
| module. | surrounding the ASN.1 module. | |||
| Authors' Addresses | Authors' Addresses | |||
| Jon Peterson | Jon Peterson | |||
| Neustar, Inc. | Neustar, Inc. | |||
| Email: jon.peterson@neustar.biz | Email: jon.peterson@neustar.biz | |||
| Sean Turner | Sean Turner | |||
| sn3rd | sn3rd | |||
| Email: sean@sn3rd.com | Email: sean@sn3rd.com | |||
| End of changes. 29 change blocks. | ||||
| 52 lines changed or deleted | 131 lines changed or added | |||
This html diff was produced by rfcdiff 1.41. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||