Authors,

While reviewing this document during AUTH48, please resolve (as necessary) 
the following questions, which are also in the XML file.

1) <!--[rfced] For clarity, may the last phrase of this sentence be 
reworded as follows or otherwise? It's not clear what is placing the 
constraint on the RCD.

Original:
   Finally, this document describes how to preserve the integrity of the
   RCD in scenarios where there may be non-authoritative users
   initiating and signing RCD and therefore a constraint on the RCD data
   that a PASSporT can attest via certificate-level controls.

Option A:
   Finally, this document describes how to preserve the integrity of the 
   RCD in scenarios where there may be non-authoritative users initiating 
   and signing RCD, therefore limiting whether a PASSporT can attest the 
   RCD via certificate-level controls.

Option B:
   Finally, this document describes how to preserve the integrity of the 
   RCD in scenarios where there may be non-authoritative users initiating 
   and signing RCD by specifying the use of JWT claims constraints on the 
   RCD data that a PASSporT can attest to via certificate-level controls.
-->


2) <!--[rfced] Please clarify the list in this sentence.

Original:
   This document defines a
   mechanism that allows for a direct or indirect party that enforces
   the policies to approve or certify the content, create a
   cryptographic digest that can be used to validate that data and
   applies a constraint in the certificate to allow the recipient and
   verifier to validate that the specific content of the RCD is as
   intended at its creation and approval or certification.

Option A:
 This document defines a mechanism that allows for a party that
 (a) enforces X, (b) creates Y, and (c) applies Z.

Option B:
 This document defines a mechanism that 
 (a) allows for a party that enforces X, (b) creates Y, and (c) applies Z.


Perhaps (if Option A is accurate):
   This document defines a mechanism that allows for a direct or 
   indirect party that (a) enforces
   the policies to approve or certify the content, (b) creates a
   cryptographic digest that can be used to validate that data, and
   (c) applies a constraint in the certificate to allow the recipient and
   verifier to validate that the specific content of the RCD is as
   intended at its creation and its approval or certification.
-->


3) <!--[rfced] May this phrase be reworded for clarity?
Seems "allowing the ability to enable a mechanism for allowing"
could be simplified.

Original:
   The third and fourth modes cover cases where there is a different
   authoritative entity responsible for the content of the RCD, separate
   from the signer of the PASSporT itself, allowing the ability, in
   particular when delegating signing authority for PASSporT, to enable
   a mechanism for allowing agreed or vetted content included in or
   referenced by the RCD claim contents.

Specifically, regarding the last part:
   allowing the ability, in particular when [...],
   to enable a mechanism for allowing agreed or vetted content included in 
   or referenced by the RCD claim contents. 
   
Option A:
   allowing the ability, in particular when [...],
   to enable a mechanism for agreed or vetted content to be included 
   in or referenced by the RCD claim contents.
   
Option B:
   allowing the ability, in particular when [...],
   for agreed or vetted content to be included in or
   referenced by the RCD claim contents. 
-->


4) <!-- [rfced] This sentence appeared to intend to cite 3GPP TS 24.229, 
but there was not a corresponding reference. We added an informative 
reference as follows; please review and let us know if this is accurate.
Would you like to update this to the most recent version? (We see
version 19.0.2 from March 2025.)

Original:
   The "apn" key value is an optional alternate presentation number
   associated with the originator of personal communications, which may
   for example match the user component of the From header field value
   of a SIP request (in cases where a network number is carried in the
   P-Asserted-Identity [RFC3325]), or alternatively from the Additional-
   Identity header field value [3GPP TS 24.229 v16.7.0], or a similar
   field in other PASSporT using protocols.

Current:
   The "apn" key value is an optional alternate presentation number
   associated with the originator of personal communications, which may
   for example match the user component of the From header field value
   of a SIP request (in cases where a network number is carried in the
   P-Asserted-Identity [RFC3325]), or alternatively of the Additional-
   Identity header field value [TS.3GPP.24.229], or a similar
   field in other PASSporT-using protocols.

Added in Section 18.2:

   [TS.3GPP.24.229]
              3GPP, "IP multimedia call control protocol based on
              Session Initiation Protocol (SIP) and Session Description
              Protocol (SDP); Stage 3", 16.7.0, 3GPP TS 24.229,
              September 2020,
              <https://www.3gpp.org/ftp/Specs/html-info/24229.htm>.
-->


5) <!--[rfced] What does "This usage" refer to? The preceding sentence 
is included for context. Perhaps it refers to the use of the "apn" 
key in general?

Original:
   How the signer determines
   that a user is authorized to present the number in question is a
   policy decision outside the scope of this document, however, the
   vetting of the alternate presentation number should follow the same
   level of vetting as telephone identities or any other information
   contained in an "rcd" PASSporT or "rcd" claims.  This usage is
   intended as an alternative to conveying the presentation number in
   the "tel" key value of a jCard, in situations where no other rich
   jCard data needs to be conveyed with the call.

Perhaps:
   How the signer determines [...]
   The use of the "apn" key is intended as an alternative to conveying
   the presentation number ...
-->


6) <!--[rfced] Please clarify "using Call-Info as protocol".

Original:
   Note: even though we refer to [RFC9796] as the definition of the
   jcard properties for usage in "rcd" claims, using Call-Info as
   protocol with the addition of an identity header carrying the
   PASSPorT is not required. 
-->


7) <!--[rfced] Is this a 1:1 relationship? In other words,
should this be "Each of these claims corresponds to each of the elements"?

Original:
   These objects correspond to each of the
   elements of the "rcd" claim object that require integrity protection
   with an associated digest over the content referenced by the key
   string.
-->


8) <!--[rfced] Would you like to list the codepoint for this character 
in a more typical manner? "ASCII 45" was last used in RFC 1849.

Original:
   MUST be a hyphen character, "-", or ASCII 45.

Perhaps:
   MUST be a hyphen character ("-", %x2D).

Or:
   MUST be a hyphen character, "-" (HYPHEN-MINUS, U+002D).
--> 


9) <!--[rfced] How should the first point be changed to a complete 
sentence? (The second and third points are complete sentences.)
Also, for subject/verb agreement, should "the JWT Claim Constraints is 
applied" be "the JWT Claim Constraints certificate extension is applied" 
or "the JWT Claim Constraints are applied" or otherwise?

Preceding sentence for context:
   In order to facilitate proper verification of the digests and to
   determine whether the "rcd" elements or content referenced by URIs
   were modified, the input to the digest must be completely
   deterministic at three points in the process:

Original:
   First, at the certification point where the content
   is evaluated to conform to the application policy and the JWT Claim
   Constraints is applied to the certificate containing the digest.

Perhaps:
   First, it must be deterministic at the certification point when the 
   content is evaluated to conform to the application policy and when 
   the JWT Claim Constraints are applied to the certificate containing 
   the digest.
-->


10) <!--[rfced] Please clarify this sentence. In particular, what does
"with the exception and the minor modification" mean?
We suggest making this into two sentences.

Original:
   In the case of the use of a "jcl" URI reference to an external jCard,
   the procedures are similar to "jcd" with the exception and the minor
   modification to JSON pointer, where "/jcl" is used to refer to the
   external jCard array string and any following numeric array indices
   added to the "jcl" (e.g., "/jcl/1/2/3") are treated as if the
   external content referenced by the jCard was directly part of the
   overall "rcd" claim JSON object.

Perhaps:  
   In the case of the use of a "jcl" URI reference to an external jCard,
   the procedures are similar to "jcd" with the minor
   modification to the JSON pointer, where "/jcl" is used to refer to the
   external jCard array string.  Also, any following numeric array indices
   added to the "jcl" (e.g., "/jcl/1/2/3") are treated as if the
   external content referenced by the jCard were directly part of the
   overall "rcd" claim JSON object.
-->


11) <!--[rfced] May 'usage' be cut from the title of Section 6.3 for
consistency with the title of Section 6.2?

Original:
6.2.  JWT Claim Constraints for "rcd" claims 
6.3.  JWT Claim Constraints usage for "rcd" and "rcdi" claims

Perhaps:
6.2.  JWT Claim Constraints for "rcd" Claims 
6.3.  JWT Claim Constraints for "rcd" and "rcdi" Claims 
-->


12) <!--[rfced] Is this whole sentence describing an example? If so, we 
suggest moving "as an example" to the start.

Original:
   This would often be associated with the use of delegate
   certificates [RFC9060] for the signing of calls by the calling party
   directly as an example, even though the "authorized party" is not
   necessarily the subject of a STIR certificate.

Perhaps:
   For example, this may be used with delegate certificates [RFC9060]
   for the signing of calls by the calling party directly, even though
   the "authorized party" is not necessarily the subject of a STIR
   certificate.
-->


13) <!--[rfced] May we update these section titles to make them parallel
and simplified?

Original:
   5.  PASSporT Claim "rcd" Definition and Usage 
   6.  "rcdi" RCD Integrity Claim Definition and Usage
   7.  PASSporT "crn" claim - Call Reason Definition and Usage

Option A:
   5.  PASSporT Claim "rcd" Definition and Usage 
   6.  PASSporT Claim "rcdi" Definition and Usage
   7.  PASSporT Claim "crn" Definition and Usage

Option B (as this word order is also used within this document):
   5.  "rcd" PASSporT Claim: Definition and Usage 
   6.  "rcdi" PASSporT Claim: Definition and Usage
   7.  "crn" PASSporT Claim: Definition and Usage
-->


14) <!--[rfced] There is one instance of "JWT Constraints" (plural) in this
document; should it be "JWT Claim Constraints" to match usage elsewhere
within this document?

Original:
   The integrity of the "crn" claim contents can optionally be protected
   by the authoritative certificate issuer using JWT Constraints in the
   certificate.
-->


15) <!--[rfced] May this be rephrased to clarify "at least one or both an"?

Original:
   ... in which case the PASSporT
   claims MUST contain at least one or both an "rcd" or "crn" claim.

Perhaps: 
   In that case, 
   the PASSporT MUST contain at least one "rcd" or "crn" claim (or both).
-->


16) <!--[rfced] Do both of these sentences refer to the example that follows?  
Perhaps the text can be clarified? 

Original:
    In an example PASSporT, where a jCard is linked via HTTPS URL using
   "jcl", a jCard file served at a particular URL.

   An example jCard JSON file hosted at the example web address of
   https://example.com/qbranch.json is shown as follows:

Perhaps:
    In the following PASSporT example, a jCard is linked via HTTPS URL 
    using "jcl", and a jCard file is served at a particular URL.  

   Example jCard JSON file hosted at https://example.com/qbranch.json: 
-->


17) <!--[rfced] Please clarify this sentence. Specifically,
what is "leading to too restrictive a set of constraints"?
Also, please consider starting with "The claims" or similar
to make a clearer break with the preceding sentence (which ends
with the example of the empty string "".).

Original:
   "jcl" and "jcd" MUST NOT be used with compact form due to
   integrity rules and URI reference rules in this document leading to
   too restrictive of a set of constraints.

Perhaps:
   The claims
   "jcl" and "jcd" MUST NOT be used with compact form because
   the integrity rules and URI reference rules defined in this document
   would lead to a set of constraints that is too restrictive.
-->


18) <!--[rfced] What is "It" in "It is intended"? The third-party PASSporT?
(The preceding sentence is included for context.)

Original:
   This third-party
   PASSporT attests information about the calling number, rather than
   the call or caller itself, and as such its RCD MUST NOT be used when
   a call lacks a first-party PASSporT that assures verification
   services that the calling party number is not spoofed.  It is
   intended to be used in cases when the originating side does not
   supply a display-name for the caller, so instead some entity in the
   call path invokes a third-party service to provide rich caller data
   for a call.
-->


19) <!--[rfced] Please clarify "providers that are indirectly or delegated
authority to sign PASSporTs". What is the intended meaning? Is a word missing?

Original:
   As "rcd" can be provided by either first party providers that are
   directly authorized to sign PASSporTs in the STIR eco-system or third
   party providers that are indirectly or delegated authority to sign
   PASSporTs. 
-->


20) <!--[rfced] Please note that we have removed "and" from the sentence below. 
 Please let us know if this incorrect. 

Original:
   This section documents SIP-specific usage for "rcd" PASSporTs and in
   the SIP Identity header field value.

Current:
   This section documents SIP-specific usage for "rcd" PASSporTs in
   the SIP Identity header field value.
-->


21) <!--[rfced] Is this a list of five elements? If so, may it be rephrased
as follows or otherwise?

Original:
   Similarly, "jcd" or "jcl" jcard information, "icn", "apn", or "crn"
   can be optionally, based on local policy for devices that support it,
   used to populate a Call-Info header field following the format of
   [I-D.ietf-sipcore-callinfo-rcd].

Perhaps:
   Similarly, "jcd", "jcl", "icn", "apn", or "crn" elements
   can be used optionally (based on local policy for devices that support 
   it) to populate a Call-Info header field following the format of
   [RFC9796].
-->


22) <!-- [rfced] Regarding [ATIS-1000074.v002], the original URL provided
yields "Sorry, the document could not be found".
We found the following URL of a more recent version of this standard:
https://access.atis.org/higherlogic/ws/public/download/67436
(which appears to be Version 3 of this standard and was published
16 August 2022). May we update this reference to that version?

Original:
   [ATIS-1000074.v002]
              ATIS/SIP Forum NNI Task Group, "Signature-based Handling
              of Asserted information using toKENs (SHAKEN)
              <https://access.atis.org/apps/group_public/
              download.php/62391/ATIS-1000074.v002.pdf>", November
              2021.

Perhaps:
   [ATIS-1000074.v003]
              Alliance for Telecommunications Industry Solutions,
              "Signature-based Handling of Asserted information using
              toKENs (SHAKEN)", August 2022,
              <https://access.atis.org/higherlogic/ws/public/
              download/67436>.
-->


23) <!-- [rfced] Regarding [W3C-SubresourceIntegrity], the original URL 
for this reference directed the reader to a W3C First Public Working Draft 
with a date of 22 April 2025. However, the original date provided for 
this reference was 23 June 2016, which matches that of the W3C 
Recommendation titled "Subresource Integrity"
(https://www.w3.org/TR/2016/REC-SRI-20160623/). We have updated this
reference to that.

However, please let us know if you intended to point to
the First Public Working Draft (https://www.w3.org/TR/2025/WD-sri-2-20250422/)
or otherwise.

Original:
   [W3C-SubresourceIntegrity]
              W3C, "Subresource Integrity <https://www.w3.org/TR/SRI/>",
              23 June 2016.

Current:
   [W3C-SubresourceIntegrity]
              Akhawe, D., Ed., Braun, F., Ed., Marier, F., Ed., and J.
              Weinberger, Ed., "Subresource Integrity", W3C
              Recommendation, 23 June 2016,
              <https://www.w3.org/TR/2016/REC-SRI-20160623/>.
-->


24) <!--[rfced] Terminology

a) We updated the following terms to the form on the right
based on common usage. Please let us know if you prefer otherwise.

Verification Service -> verification service

JSON Pointer -> JSON pointer

'display-name', "display-name" -> display-name 
   (because it most often appeared without quotes)


b) JWTClaimConstraints (4 instances) vs. 
   JWT Claim Constraints (15 instances)
Do these have the same meaning? If so, should one be used
consistently?

c) Note that we added hyphens as shown on the right below.  Please let us know 
if you have any concerns. 

URI referenced content -> URI-referenced content
URI linked content -> URI-linked content
-->


25) <!-- [rfced] Please review the "type" attribute of each sourcecode 
element in the XML file to ensure correctness. If the current list of 
preferred values for "type"
(https://www.rfc-editor.org/rpc/wiki/doku.php?id=sourcecode-types)
does not contain an applicable type, then feel free to let us know.
Also, it is acceptable to leave the "type" attribute not set.  

In addition, review each artwork element. Specifically,
should any artwork element be tagged as sourcecode or another
element? 
-->


26) <!-- [rfced] Please review whether any of the notes in this document
should be in the <aside> element. It is defined as "a container for 
content that is semantically less important or tangential to the 
content that surrounds it" 
(https://authors.ietf.org/en/rfcxml-vocabulary#aside).
-->


27) <!-- [rfced] Please review the "Inclusive Language" portion of the 
online Style Guide 
<https://www.rfc-editor.org/styleguide/part2/#inclusive_language>
and let us know if any changes are needed.  Updates of this nature 
typically result in more precise language, which is helpful for readers.

Note that our script did not flag any words in particular, but this should 
still be reviewed as a best practice.

In addition, please consider whether "traditional" should be updated for 
clarity in the instances listed below.  While the NIST website 
<https://web.archive.org/web/20250214092458/https://www.nist.gov/nist-research-library/nist-technical-series-publications-author-instructions#table1>
indicates that this term is potentially biased, it is also ambiguous.  
"Tradition" is a subjective term, as it is not the same for everyone.


   ... the traditional "Caller ID" of the telephone network

   Traditional telephone network signaling protocols ... 

   The first data is a more
   traditional set of info about a caller associated with "display-name"
   in SIP ... 

   ... even in traditional calling name services today ... 

   While in the traditional telephone network, ...
-->


Thank you.

RFC Editor



On May 23, 2025, at 1:48 PM, rfc-edi...@rfc-editor.org wrote:

*****IMPORTANT*****

Updated 2025/05/23

RFC Author(s):
--------------

Instructions for Completing AUTH48

Your document has now entered AUTH48.  Once it has been reviewed and 
approved by you and all coauthors, it will be published as an RFC.  
If an author is no longer available, there are several remedies 
available as listed in the FAQ (https://www.rfc-editor.org/faq/).

You and you coauthors are responsible for engaging other parties 
(e.g., Contributors or Working Group) as necessary before providing 
your approval.

Planning your review 
---------------------

Please review the following aspects of your document:

*  RFC Editor questions

   Please review and resolve any questions raised by the RFC Editor 
   that have been included in the XML file as comments marked as 
   follows:

   <!-- [rfced] ... -->

   These questions will also be sent in a subsequent email.

*  Changes submitted by coauthors 

   Please ensure that you review any changes submitted by your 
   coauthors.  We assume that if you do not speak up that you 
   agree to changes submitted by your coauthors.

*  Content 

   Please review the full content of the document, as this cannot 
   change once the RFC is published.  Please pay particular attention to:
   - IANA considerations updates (if applicable)
   - contact information
   - references

*  Copyright notices and legends

   Please review the copyright notice and legends as defined in
   RFC 5378 and the Trust Legal Provisions 
   (TLP – https://trustee.ietf.org/license-info).

*  Semantic markup

   Please review the markup in the XML file to ensure that elements of  
   content are correctly tagged.  For example, ensure that <sourcecode> 
   and <artwork> are set correctly.  See details at 
   <https://authors.ietf.org/rfcxml-vocabulary>.

*  Formatted output

   Please review the PDF, HTML, and TXT files to ensure that the 
   formatted output, as generated from the markup in the XML file, is 
   reasonable.  Please note that the TXT will have formatting 
   limitations compared to the PDF and HTML.


Submitting changes
------------------

To submit changes, please reply to this email using ‘REPLY ALL’ as all 
the parties CCed on this message need to see your changes. The parties 
include:

   *  your coauthors
   
   *  rfc-edi...@rfc-editor.org (the RPC team)

   *  other document participants, depending on the stream (e.g., 
      IETF Stream participants are your working group chairs, the 
      responsible ADs, and the document shepherd).
     
   *  auth48archive@rfc-editor.org, which is a new archival mailing list 
      to preserve AUTH48 conversations; it is not an active discussion 
      list:
     
     *  More info:
        
https://mailarchive.ietf.org/arch/msg/ietf-announce/yb6lpIGh-4Q9l2USxIAe6P8O4Zc
     
     *  The archive itself:
        https://mailarchive.ietf.org/arch/browse/auth48archive/

     *  Note: If only absolutely necessary, you may temporarily opt out 
        of the archiving of messages (e.g., to discuss a sensitive matter).
        If needed, please add a note at the top of the message that you 
        have dropped the address. When the discussion is concluded, 
        auth48archive@rfc-editor.org will be re-added to the CC list and 
        its addition will be noted at the top of the message. 

You may submit your changes in one of two ways:

An update to the provided XML file
 — OR —
An explicit list of changes in this format

Section # (or indicate Global)

OLD:
old text

NEW:
new text

You do not need to reply with both an updated XML file and an explicit 
list of changes, as either form is sufficient.

We will ask a stream manager to review and approve any changes that seem
beyond editorial in nature, e.g., addition of new text, deletion of text, 
and technical changes.  Information about stream managers can be found in 
the FAQ.  Editorial changes do not require approval from a stream manager.


Approving for publication
--------------------------

To approve your RFC for publication, please reply to this email stating
that you approve this RFC for publication.  Please use ‘REPLY ALL’,
as all the parties CCed on this message need to see your approval.


Files 
-----

The files are available here:
   https://www.rfc-editor.org/authors/rfc9795.xml
   https://www.rfc-editor.org/authors/rfc9795.html
   https://www.rfc-editor.org/authors/rfc9795.pdf
   https://www.rfc-editor.org/authors/rfc9795.txt

Diff file of the text:
   https://www.rfc-editor.org/authors/rfc9795-diff.html
   https://www.rfc-editor.org/authors/rfc9795-rfcdiff.html (side by side)

Diff of the XML: 
   https://www.rfc-editor.org/authors/rfc9795-xmldiff1.html


Tracking progress
-----------------

The details of the AUTH48 status of your document are here:
   https://www.rfc-editor.org/auth48/rfc9795

Please let us know if you have any questions.  

Thank you for your cooperation,

RFC Editor

--------------------------------------
RFC 9795 (draft-ietf-stir-passport-rcd-26)

Title            : PASSporT Extension for Rich Call Data
Author(s)        : C. Wendt, J. Peterson
WG Chair(s)      : Ben Campbell, Robert Sparks, Russ Housley
Area Director(s) : Andy Newton, Orie Steele


-- 
auth48archive mailing list -- auth48archive@rfc-editor.org
To unsubscribe send an email to auth48archive-le...@rfc-editor.org

Reply via email to