Authors, While reviewing this document during AUTH48, please resolve (as necessary) the following questions, which are also in the XML file.
1) <!--[rfced] For clarity, may the last phrase of this sentence be reworded as follows or otherwise? It's not clear what is placing the constraint on the RCD. Original: Finally, this document describes how to preserve the integrity of the RCD in scenarios where there may be non-authoritative users initiating and signing RCD and therefore a constraint on the RCD data that a PASSporT can attest via certificate-level controls. Option A: Finally, this document describes how to preserve the integrity of the RCD in scenarios where there may be non-authoritative users initiating and signing RCD, therefore limiting whether a PASSporT can attest the RCD via certificate-level controls. Option B: Finally, this document describes how to preserve the integrity of the RCD in scenarios where there may be non-authoritative users initiating and signing RCD by specifying the use of JWT claims constraints on the RCD data that a PASSporT can attest to via certificate-level controls. --> 2) <!--[rfced] Please clarify the list in this sentence. Original: This document defines a mechanism that allows for a direct or indirect party that enforces the policies to approve or certify the content, create a cryptographic digest that can be used to validate that data and applies a constraint in the certificate to allow the recipient and verifier to validate that the specific content of the RCD is as intended at its creation and approval or certification. Option A: This document defines a mechanism that allows for a party that (a) enforces X, (b) creates Y, and (c) applies Z. Option B: This document defines a mechanism that (a) allows for a party that enforces X, (b) creates Y, and (c) applies Z. Perhaps (if Option A is accurate): This document defines a mechanism that allows for a direct or indirect party that (a) enforces the policies to approve or certify the content, (b) creates a cryptographic digest that can be used to validate that data, and (c) applies a constraint in the certificate to allow the recipient and verifier to validate that the specific content of the RCD is as intended at its creation and its approval or certification. --> 3) <!--[rfced] May this phrase be reworded for clarity? Seems "allowing the ability to enable a mechanism for allowing" could be simplified. Original: The third and fourth modes cover cases where there is a different authoritative entity responsible for the content of the RCD, separate from the signer of the PASSporT itself, allowing the ability, in particular when delegating signing authority for PASSporT, to enable a mechanism for allowing agreed or vetted content included in or referenced by the RCD claim contents. Specifically, regarding the last part: allowing the ability, in particular when [...], to enable a mechanism for allowing agreed or vetted content included in or referenced by the RCD claim contents. Option A: allowing the ability, in particular when [...], to enable a mechanism for agreed or vetted content to be included in or referenced by the RCD claim contents. Option B: allowing the ability, in particular when [...], for agreed or vetted content to be included in or referenced by the RCD claim contents. --> 4) <!-- [rfced] This sentence appeared to intend to cite 3GPP TS 24.229, but there was not a corresponding reference. We added an informative reference as follows; please review and let us know if this is accurate. Would you like to update this to the most recent version? (We see version 19.0.2 from March 2025.) Original: The "apn" key value is an optional alternate presentation number associated with the originator of personal communications, which may for example match the user component of the From header field value of a SIP request (in cases where a network number is carried in the P-Asserted-Identity [RFC3325]), or alternatively from the Additional- Identity header field value [3GPP TS 24.229 v16.7.0], or a similar field in other PASSporT using protocols. Current: The "apn" key value is an optional alternate presentation number associated with the originator of personal communications, which may for example match the user component of the From header field value of a SIP request (in cases where a network number is carried in the P-Asserted-Identity [RFC3325]), or alternatively of the Additional- Identity header field value [TS.3GPP.24.229], or a similar field in other PASSporT-using protocols. Added in Section 18.2: [TS.3GPP.24.229] 3GPP, "IP multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description Protocol (SDP); Stage 3", 16.7.0, 3GPP TS 24.229, September 2020, <https://www.3gpp.org/ftp/Specs/html-info/24229.htm>. --> 5) <!--[rfced] What does "This usage" refer to? The preceding sentence is included for context. Perhaps it refers to the use of the "apn" key in general? Original: How the signer determines that a user is authorized to present the number in question is a policy decision outside the scope of this document, however, the vetting of the alternate presentation number should follow the same level of vetting as telephone identities or any other information contained in an "rcd" PASSporT or "rcd" claims. This usage is intended as an alternative to conveying the presentation number in the "tel" key value of a jCard, in situations where no other rich jCard data needs to be conveyed with the call. Perhaps: How the signer determines [...] The use of the "apn" key is intended as an alternative to conveying the presentation number ... --> 6) <!--[rfced] Please clarify "using Call-Info as protocol". Original: Note: even though we refer to [RFC9796] as the definition of the jcard properties for usage in "rcd" claims, using Call-Info as protocol with the addition of an identity header carrying the PASSPorT is not required. --> 7) <!--[rfced] Is this a 1:1 relationship? In other words, should this be "Each of these claims corresponds to each of the elements"? Original: These objects correspond to each of the elements of the "rcd" claim object that require integrity protection with an associated digest over the content referenced by the key string. --> 8) <!--[rfced] Would you like to list the codepoint for this character in a more typical manner? "ASCII 45" was last used in RFC 1849. Original: MUST be a hyphen character, "-", or ASCII 45. Perhaps: MUST be a hyphen character ("-", %x2D). Or: MUST be a hyphen character, "-" (HYPHEN-MINUS, U+002D). --> 9) <!--[rfced] How should the first point be changed to a complete sentence? (The second and third points are complete sentences.) Also, for subject/verb agreement, should "the JWT Claim Constraints is applied" be "the JWT Claim Constraints certificate extension is applied" or "the JWT Claim Constraints are applied" or otherwise? Preceding sentence for context: In order to facilitate proper verification of the digests and to determine whether the "rcd" elements or content referenced by URIs were modified, the input to the digest must be completely deterministic at three points in the process: Original: First, at the certification point where the content is evaluated to conform to the application policy and the JWT Claim Constraints is applied to the certificate containing the digest. Perhaps: First, it must be deterministic at the certification point when the content is evaluated to conform to the application policy and when the JWT Claim Constraints are applied to the certificate containing the digest. --> 10) <!--[rfced] Please clarify this sentence. In particular, what does "with the exception and the minor modification" mean? We suggest making this into two sentences. Original: In the case of the use of a "jcl" URI reference to an external jCard, the procedures are similar to "jcd" with the exception and the minor modification to JSON pointer, where "/jcl" is used to refer to the external jCard array string and any following numeric array indices added to the "jcl" (e.g., "/jcl/1/2/3") are treated as if the external content referenced by the jCard was directly part of the overall "rcd" claim JSON object. Perhaps: In the case of the use of a "jcl" URI reference to an external jCard, the procedures are similar to "jcd" with the minor modification to the JSON pointer, where "/jcl" is used to refer to the external jCard array string. Also, any following numeric array indices added to the "jcl" (e.g., "/jcl/1/2/3") are treated as if the external content referenced by the jCard were directly part of the overall "rcd" claim JSON object. --> 11) <!--[rfced] May 'usage' be cut from the title of Section 6.3 for consistency with the title of Section 6.2? Original: 6.2. JWT Claim Constraints for "rcd" claims 6.3. JWT Claim Constraints usage for "rcd" and "rcdi" claims Perhaps: 6.2. JWT Claim Constraints for "rcd" Claims 6.3. JWT Claim Constraints for "rcd" and "rcdi" Claims --> 12) <!--[rfced] Is this whole sentence describing an example? If so, we suggest moving "as an example" to the start. Original: This would often be associated with the use of delegate certificates [RFC9060] for the signing of calls by the calling party directly as an example, even though the "authorized party" is not necessarily the subject of a STIR certificate. Perhaps: For example, this may be used with delegate certificates [RFC9060] for the signing of calls by the calling party directly, even though the "authorized party" is not necessarily the subject of a STIR certificate. --> 13) <!--[rfced] May we update these section titles to make them parallel and simplified? Original: 5. PASSporT Claim "rcd" Definition and Usage 6. "rcdi" RCD Integrity Claim Definition and Usage 7. PASSporT "crn" claim - Call Reason Definition and Usage Option A: 5. PASSporT Claim "rcd" Definition and Usage 6. PASSporT Claim "rcdi" Definition and Usage 7. PASSporT Claim "crn" Definition and Usage Option B (as this word order is also used within this document): 5. "rcd" PASSporT Claim: Definition and Usage 6. "rcdi" PASSporT Claim: Definition and Usage 7. "crn" PASSporT Claim: Definition and Usage --> 14) <!--[rfced] There is one instance of "JWT Constraints" (plural) in this document; should it be "JWT Claim Constraints" to match usage elsewhere within this document? Original: The integrity of the "crn" claim contents can optionally be protected by the authoritative certificate issuer using JWT Constraints in the certificate. --> 15) <!--[rfced] May this be rephrased to clarify "at least one or both an"? Original: ... in which case the PASSporT claims MUST contain at least one or both an "rcd" or "crn" claim. Perhaps: In that case, the PASSporT MUST contain at least one "rcd" or "crn" claim (or both). --> 16) <!--[rfced] Do both of these sentences refer to the example that follows? Perhaps the text can be clarified? Original: In an example PASSporT, where a jCard is linked via HTTPS URL using "jcl", a jCard file served at a particular URL. An example jCard JSON file hosted at the example web address of https://example.com/qbranch.json is shown as follows: Perhaps: In the following PASSporT example, a jCard is linked via HTTPS URL using "jcl", and a jCard file is served at a particular URL. Example jCard JSON file hosted at https://example.com/qbranch.json: --> 17) <!--[rfced] Please clarify this sentence. Specifically, what is "leading to too restrictive a set of constraints"? Also, please consider starting with "The claims" or similar to make a clearer break with the preceding sentence (which ends with the example of the empty string "".). Original: "jcl" and "jcd" MUST NOT be used with compact form due to integrity rules and URI reference rules in this document leading to too restrictive of a set of constraints. Perhaps: The claims "jcl" and "jcd" MUST NOT be used with compact form because the integrity rules and URI reference rules defined in this document would lead to a set of constraints that is too restrictive. --> 18) <!--[rfced] What is "It" in "It is intended"? The third-party PASSporT? (The preceding sentence is included for context.) Original: This third-party PASSporT attests information about the calling number, rather than the call or caller itself, and as such its RCD MUST NOT be used when a call lacks a first-party PASSporT that assures verification services that the calling party number is not spoofed. It is intended to be used in cases when the originating side does not supply a display-name for the caller, so instead some entity in the call path invokes a third-party service to provide rich caller data for a call. --> 19) <!--[rfced] Please clarify "providers that are indirectly or delegated authority to sign PASSporTs". What is the intended meaning? Is a word missing? Original: As "rcd" can be provided by either first party providers that are directly authorized to sign PASSporTs in the STIR eco-system or third party providers that are indirectly or delegated authority to sign PASSporTs. --> 20) <!--[rfced] Please note that we have removed "and" from the sentence below. Please let us know if this incorrect. Original: This section documents SIP-specific usage for "rcd" PASSporTs and in the SIP Identity header field value. Current: This section documents SIP-specific usage for "rcd" PASSporTs in the SIP Identity header field value. --> 21) <!--[rfced] Is this a list of five elements? If so, may it be rephrased as follows or otherwise? Original: Similarly, "jcd" or "jcl" jcard information, "icn", "apn", or "crn" can be optionally, based on local policy for devices that support it, used to populate a Call-Info header field following the format of [I-D.ietf-sipcore-callinfo-rcd]. Perhaps: Similarly, "jcd", "jcl", "icn", "apn", or "crn" elements can be used optionally (based on local policy for devices that support it) to populate a Call-Info header field following the format of [RFC9796]. --> 22) <!-- [rfced] Regarding [ATIS-1000074.v002], the original URL provided yields "Sorry, the document could not be found". We found the following URL of a more recent version of this standard: https://access.atis.org/higherlogic/ws/public/download/67436 (which appears to be Version 3 of this standard and was published 16 August 2022). May we update this reference to that version? Original: [ATIS-1000074.v002] ATIS/SIP Forum NNI Task Group, "Signature-based Handling of Asserted information using toKENs (SHAKEN) <https://access.atis.org/apps/group_public/ download.php/62391/ATIS-1000074.v002.pdf>", November 2021. Perhaps: [ATIS-1000074.v003] Alliance for Telecommunications Industry Solutions, "Signature-based Handling of Asserted information using toKENs (SHAKEN)", August 2022, <https://access.atis.org/higherlogic/ws/public/ download/67436>. --> 23) <!-- [rfced] Regarding [W3C-SubresourceIntegrity], the original URL for this reference directed the reader to a W3C First Public Working Draft with a date of 22 April 2025. However, the original date provided for this reference was 23 June 2016, which matches that of the W3C Recommendation titled "Subresource Integrity" (https://www.w3.org/TR/2016/REC-SRI-20160623/). We have updated this reference to that. However, please let us know if you intended to point to the First Public Working Draft (https://www.w3.org/TR/2025/WD-sri-2-20250422/) or otherwise. Original: [W3C-SubresourceIntegrity] W3C, "Subresource Integrity <https://www.w3.org/TR/SRI/>", 23 June 2016. Current: [W3C-SubresourceIntegrity] Akhawe, D., Ed., Braun, F., Ed., Marier, F., Ed., and J. Weinberger, Ed., "Subresource Integrity", W3C Recommendation, 23 June 2016, <https://www.w3.org/TR/2016/REC-SRI-20160623/>. --> 24) <!--[rfced] Terminology a) We updated the following terms to the form on the right based on common usage. Please let us know if you prefer otherwise. Verification Service -> verification service JSON Pointer -> JSON pointer 'display-name', "display-name" -> display-name (because it most often appeared without quotes) b) JWTClaimConstraints (4 instances) vs. JWT Claim Constraints (15 instances) Do these have the same meaning? If so, should one be used consistently? c) Note that we added hyphens as shown on the right below. Please let us know if you have any concerns. URI referenced content -> URI-referenced content URI linked content -> URI-linked content --> 25) <!-- [rfced] Please review the "type" attribute of each sourcecode element in the XML file to ensure correctness. If the current list of preferred values for "type" (https://www.rfc-editor.org/rpc/wiki/doku.php?id=sourcecode-types) does not contain an applicable type, then feel free to let us know. Also, it is acceptable to leave the "type" attribute not set. In addition, review each artwork element. Specifically, should any artwork element be tagged as sourcecode or another element? --> 26) <!-- [rfced] Please review whether any of the notes in this document should be in the <aside> element. It is defined as "a container for content that is semantically less important or tangential to the content that surrounds it" (https://authors.ietf.org/en/rfcxml-vocabulary#aside). --> 27) <!-- [rfced] Please review the "Inclusive Language" portion of the online Style Guide <https://www.rfc-editor.org/styleguide/part2/#inclusive_language> and let us know if any changes are needed. Updates of this nature typically result in more precise language, which is helpful for readers. Note that our script did not flag any words in particular, but this should still be reviewed as a best practice. In addition, please consider whether "traditional" should be updated for clarity in the instances listed below. While the NIST website <https://web.archive.org/web/20250214092458/https://www.nist.gov/nist-research-library/nist-technical-series-publications-author-instructions#table1> indicates that this term is potentially biased, it is also ambiguous. "Tradition" is a subjective term, as it is not the same for everyone. ... the traditional "Caller ID" of the telephone network Traditional telephone network signaling protocols ... The first data is a more traditional set of info about a caller associated with "display-name" in SIP ... ... even in traditional calling name services today ... While in the traditional telephone network, ... --> Thank you. RFC Editor On May 23, 2025, at 1:48 PM, rfc-edi...@rfc-editor.org wrote: *****IMPORTANT***** Updated 2025/05/23 RFC Author(s): -------------- Instructions for Completing AUTH48 Your document has now entered AUTH48. Once it has been reviewed and approved by you and all coauthors, it will be published as an RFC. If an author is no longer available, there are several remedies available as listed in the FAQ (https://www.rfc-editor.org/faq/). You and you coauthors are responsible for engaging other parties (e.g., Contributors or Working Group) as necessary before providing your approval. Planning your review --------------------- Please review the following aspects of your document: * RFC Editor questions Please review and resolve any questions raised by the RFC Editor that have been included in the XML file as comments marked as follows: <!-- [rfced] ... --> These questions will also be sent in a subsequent email. * Changes submitted by coauthors Please ensure that you review any changes submitted by your coauthors. We assume that if you do not speak up that you agree to changes submitted by your coauthors. * Content Please review the full content of the document, as this cannot change once the RFC is published. Please pay particular attention to: - IANA considerations updates (if applicable) - contact information - references * Copyright notices and legends Please review the copyright notice and legends as defined in RFC 5378 and the Trust Legal Provisions (TLP – https://trustee.ietf.org/license-info). * Semantic markup Please review the markup in the XML file to ensure that elements of content are correctly tagged. For example, ensure that <sourcecode> and <artwork> are set correctly. See details at <https://authors.ietf.org/rfcxml-vocabulary>. * Formatted output Please review the PDF, HTML, and TXT files to ensure that the formatted output, as generated from the markup in the XML file, is reasonable. Please note that the TXT will have formatting limitations compared to the PDF and HTML. Submitting changes ------------------ To submit changes, please reply to this email using ‘REPLY ALL’ as all the parties CCed on this message need to see your changes. The parties include: * your coauthors * rfc-edi...@rfc-editor.org (the RPC team) * other document participants, depending on the stream (e.g., IETF Stream participants are your working group chairs, the responsible ADs, and the document shepherd). * auth48archive@rfc-editor.org, which is a new archival mailing list to preserve AUTH48 conversations; it is not an active discussion list: * More info: https://mailarchive.ietf.org/arch/msg/ietf-announce/yb6lpIGh-4Q9l2USxIAe6P8O4Zc * The archive itself: https://mailarchive.ietf.org/arch/browse/auth48archive/ * Note: If only absolutely necessary, you may temporarily opt out of the archiving of messages (e.g., to discuss a sensitive matter). If needed, please add a note at the top of the message that you have dropped the address. When the discussion is concluded, auth48archive@rfc-editor.org will be re-added to the CC list and its addition will be noted at the top of the message. You may submit your changes in one of two ways: An update to the provided XML file — OR — An explicit list of changes in this format Section # (or indicate Global) OLD: old text NEW: new text You do not need to reply with both an updated XML file and an explicit list of changes, as either form is sufficient. We will ask a stream manager to review and approve any changes that seem beyond editorial in nature, e.g., addition of new text, deletion of text, and technical changes. Information about stream managers can be found in the FAQ. Editorial changes do not require approval from a stream manager. Approving for publication -------------------------- To approve your RFC for publication, please reply to this email stating that you approve this RFC for publication. Please use ‘REPLY ALL’, as all the parties CCed on this message need to see your approval. Files ----- The files are available here: https://www.rfc-editor.org/authors/rfc9795.xml https://www.rfc-editor.org/authors/rfc9795.html https://www.rfc-editor.org/authors/rfc9795.pdf https://www.rfc-editor.org/authors/rfc9795.txt Diff file of the text: https://www.rfc-editor.org/authors/rfc9795-diff.html https://www.rfc-editor.org/authors/rfc9795-rfcdiff.html (side by side) Diff of the XML: https://www.rfc-editor.org/authors/rfc9795-xmldiff1.html Tracking progress ----------------- The details of the AUTH48 status of your document are here: https://www.rfc-editor.org/auth48/rfc9795 Please let us know if you have any questions. Thank you for your cooperation, RFC Editor -------------------------------------- RFC 9795 (draft-ietf-stir-passport-rcd-26) Title : PASSporT Extension for Rich Call Data Author(s) : C. Wendt, J. Peterson WG Chair(s) : Ben Campbell, Robert Sparks, Russ Housley Area Director(s) : Andy Newton, Orie Steele -- auth48archive mailing list -- auth48archive@rfc-editor.org To unsubscribe send an email to auth48archive-le...@rfc-editor.org