<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.15 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-stir-identity-header-errors-handling-01" category="std">

  <front>
    <title abbrev="Identity Errors">Identity Header Error Handling</title>

    <author initials="C." surname="Wendt" fullname="Chris Wendt">
      <organization>Somos Inc.</organization>
      <address>
        <email>chris-ietf@chriswendt.net</email>
      </address>
    </author>

    <date year="2022" month="April" day="19"/>

    <area>art</area>
    
    <keyword>Identity</keyword>

    <abstract>


<t>This document extends STIR and the Authenticated Identity Management in the Session Initiation Protocol (SIP) error handling procedures to include the mapping of verification failure reasons to STIR defined 4xx codes so the failure reason of an Identity header field can be conveyed to the upstream authentication service when local policy dictates that the call should continue in the presence of a verification failure. This document also defines procedures that enable enable a failure reason to be mapped to a specific Identity header for scenarios that use multiple Identity header fields where some may have errors and others may not and the handling of those situations is defined.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t><xref target="RFC8224"/> in Section 6.2.2 discusses future specifications for enhancement of how errors are communicated and the handling of multiple Identity header fields. This specification provides some additional mechanisms for solutions to address these problems.</t>

<t>In some deployments of STIR and specifically using SIP <xref target="RFC3261"/> as defined by <xref target="RFC8224"/>, one issue with the current error handling, specifically with the use of the defined 4xx error responses, is that when an error occurs with the verification of the Identity header field or the PASSporT contained in the Identity header field and a 4xx response is returned, the call is then terminated. It may be the case that the policy for handling errors dictates that calls should continue even if there is a verification error, in the case of, for example inadvertent errors, however the authentication service should still be notified of the error so that corrective action can be taken. This specification will discuss the use of the Reason header field in subsequent provisional (1xx) responses in order to accomplish this.</t>

<t>For the handling of multiple Identity header fields and the potential situation that some of the Identity header fields in a call may pass verification but others may have errors, this document provides a mechanism to add an identifier so that the authentication service can identify which Identity header field is being referred to in the case of an error.</t>

</section>
<section anchor="terminology" title="Terminology">

<t>The keywords “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”, “MAY”, and “OPTIONAL” in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>

</section>
<section anchor="reason-header-field-protocol-stir" title="Reason header field protocol “STIR”">

<t>This specification defines a new Reason header field <xref target="RFC3326"/> protocol “STIR” for STIR applications using SIP as defined in <xref target="RFC8224"/>. This will differentiate current protocols, specifically “SIP” which is currently in wide industry usage, from the <xref target="RFC8224"/> defined error cause codes and the potential use of multiple Reason header fields defined in <xref target="RFC3326"/> and updated in [upcoming document TBD] allowing multiple Reason header fields with the same “STIR” protocol string. The use of multiple Reason header field is discussed in more detail later in the document.</t>

</section>
<section anchor="use-of-provisional-error-responses-to-signal-errors-without-terminating-the-call" title="Use of provisional error responses to signal errors without terminating the call">

<t>In cases where local policy dictates that a call should continue regardless of any verification errors that may have occured, including 4XX errors described in <xref target="RFC8224"/> Section 6.2.2, then the verification service SHOULD NOT send the 4XX as a response, but rather include the error response code and reason phrase in a Reason header field, defined in <xref target="RFC3326"/>, in the next provisional or final responses sent to the authentication service.</t>

<t>Example Reason header field:</t>

<figure><artwork><![CDATA[
Reason: STIR ;cause=436 ;text="Bad Identity Info"
]]></artwork></figure>

</section>
<section anchor="handling-of-a-verification-error-when-there-are-multiple-identity-header-fields" title="Handling of a verification error when there are multiple Identity header fields">

<t>In cases where a SIP message includes multiple Identity header fields and one of those Identity header fields has an error, the verification service SHOULD include the error response code and reason phrase associated with the error in a Reason header field, defined in <xref target="RFC3326"/>, in the next provisional or final responses sent to the authentication service. The reason cause in the Reason header field SHOULD represent the error that occurred when verifying the contents of the Identity header field.  The association of a Reason header field and error to a specific Identity header field is accomplished by adding a “ppt” parameter containing the PASSporT that generated the error to the Reason header field. The “ppt” parameter for the Reason header field is optional, but RECOMMENDED, in particular for cases that a SIP INVITE contains multiple Identity header fields. The PASSporT can be included in full form, or optionally in compact form, where only the signature of the PASSporT is used to identify the reported Identity header field with an error.</t>

<t>Example Reason header field with full form PASSporT:</t>

<figure><artwork><![CDATA[
Reason: STIR ;cause=436 ;text="Bad Identity Info" ;ppt= \
"eyJhbGciOiJFUzI1NiIsInR5cCI6InBhc3Nwb3J0IiwieDV1I \
joiaHR0cHM6Ly9jZXJ0LmV4YW1wbGUub3JnL3Bhc3Nwb3J0LmNlciJ9.eyJ \
kZXN0Ijp7InVyaSI6WyJzaXA6YWxpY2VAZXhhbXBsZS5jb20iXX0sImlhdC \
I6IjE0NDMyMDgzNDUiLCJvcmlnIjp7InRuIjoiMTIxNTU1NTEyMTIifX0.r \
q3pjT1hoRwakEGjHCnWSwUnshd0-zJ6F1VOgFWSjHBr8Qjpjlk-cpFYpFYs \
ojNCpTzO3QfPOlckGaS6hEck7w"
]]></artwork></figure>

<t>Example Reason header field with compact form PASSporT:
~~~~~~~~~~~
Reason: STIR ;cause=436 ;text=”Bad Identity Info” ;ppt= \
“..rq3pjT1akEGjHCnWSwUnshd0-zJ6F1VOgFWSjHBr8Qjpjlk-cpFYpFYs \
ojNCpTzO3QfPOlckGaS6hEck7w”
~~~~~~~~~~~</t>

</section>
<section anchor="handling-multiple-verification-errors" title="Handling multiple verification errors">

<t>If there are multiple Identity header field verification errors being reported the verification service SHOULD include corresponding Reason header fields with “ppt” parameters including full or compact form of the PASSporT with cause and text parameters identifying each error. As mentioned previously, the potential use of multiple Reason header fields defined in <xref target="RFC3326"/> is updated in <xref target="I-D.sparks-sipcore-multiple-reasons"/> allowing multiple Reason header fields with the same protocol value, for this specification being “STIR”.</t>

<t>Example Reason header fields for two identity info errors:</t>

<figure><artwork><![CDATA[
Reason: STIR ;cause=436 ;text="Bad Identity Info" ;ppt= \
"eyJhbGciOiJFUzI1NiIsInR5cCI6InBhc3Nwb3J0IiwieDV1I \
joiaHR0cHM6Ly9jZXJ0LmV4YW1wbGUub3JnL3Bhc3Nwb3J0LmNlciJ9.eyJ \
kZXN0Ijp7InVyaSI6WyJzaXA6YWxpY2VAZXhhbXBsZS5jb20iXX0sImlhdC \
I6IjE0NDMyMDgzNDUiLCJvcmlnIjp7InRuIjoiMTIxNTU1NTEyMTIifX0.r \
q3pjT1hoRwakEGjHCnWSwUnshd0-zJ6F1VOgFWSjHBr8Qjpjlk-cpFYpFYs \
ojNCpTzO3QfPOlckGaS6hEck7w"

Reason: STIR ;cause=436 ; text="Bad Identity Info" ;ppt= \
"eyJhbGciOiJFUzI1NiIsInR5cCI6InBhc3Nwb3J0IiwieDV1I \
joiaHR0cHM6Ly9jZXJ0LmV4YW1wbGUub3JnL3Bhc3Nwb3J0LmNlciJ9.eyJ \
xpY2VAZXhhbXBsZS5jb20iXX0sImlhdCkZXN0Ijp7InVyaSI6WyJzaXA6YW \
p7InRuIjoiMTIxNTU1NTEyMTIifX0I6IjE0NDMyMDgzNDUiLCJvcmlnIj.r \
J6F1VOgFWSjHBr8Qjpjlk-cpFYpFYsq3pjT1hoRwakEGjHCnWSwUnshd0-z \
ckGaS6hEck7wojNCpTzO3QfPOl"

]]></artwork></figure>

</section>
<section anchor="removal-of-the-reason-header-field-by-authentication-service" title="Removal of the Reason header field by Authentication Service">

<t>When an Authentication Service <xref target="RFC8224"/> receives the Reason header field with a PASSporT it generated as part of an Identity header field and the authentication of a call, it should first follow local policy to recognize and acknowledge the error (e.g. perform operational actions like logging or alarming), but then MUST remove the identified Reason header field to avoid the PASSporT information from going upstream to a UAC or UAS that may not be authorized to see claim information contained in the PASSporT for privacy or other reasons.</t>

</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>This document requests the definition of a new protocol value (and associated protocol cause) to be registered by the IANA into the “Reason Protocols” sub-registry under http://www.iana.org/assignments/sip-parameter as follows:</t>

<figure><artwork><![CDATA[
Protocol Value   Protocol Cause            Reference
--------------   ---------------           -----------
STIR              Status code               RFC 8224

]]></artwork></figure>

</section>
<section anchor="acknowledgements" title="Acknowledgements">

<t>Would like to thank David Hancock for help to identify these error scenarios and Jon Peterson, Roman Shpount, Robert Sparks and STIR working group for helpful feedback and discussion.</t>

</section>
<section anchor="Security" title="Security Considerations">

<t>This specification discusses the use of a PASSporT as an identifier for cases where there is multiple identity header errors occuring as part of the Reason header field response. For some call scenarios (e.g. diversion based call flows) the signer of the PASSporT(s) may not be the first hop initiator of the call. In those cases, there may be some security or privacy concerns associated with PASSporT information that is passed beyond the authentication service that originally signed the PASSporT(s) in the resulting error Reason header field. This specification states the authentication service MUST remove the Reason header field with the PASSporT to protect the security (e.g. use of potentially still fresh PASSporT for replay attacks) and privacy of any potential information that could be passed beyond the authentication service response back in the direction of the call initiator. This is just to reinforce this MUST as a security consideration that should be followed.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>




<reference anchor="I-D.sparks-sipcore-multiple-reasons">
   <front>
      <title>Multiple SIP Reason Header Field Values</title>
      <author fullname="Robert Sparks">
	 </author>
      <date month="November" day="12" year="2021" />
      <abstract>
	 <t>   The SIP Reason Header Field as defined in RFC 3326 allows only one
   Reason value per protocol value.  Practice shows it is useful to
   allow multiple values with the same protocol value.  This update to
   RFC 3326 allows multiple values for an indicated registered protocol
   when that protocol defines what the presence of multiple values
   means.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-sparks-sipcore-multiple-reasons-00" />
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-sparks-sipcore-multiple-reasons-00.txt" />
</reference>



<reference  anchor="RFC3261" target='https://www.rfc-editor.org/info/rfc3261'>
<front>
<title>SIP: Session Initiation Protocol</title>
<author initials='J.' surname='Rosenberg' fullname='J. Rosenberg'><organization /></author>
<author initials='H.' surname='Schulzrinne' fullname='H. Schulzrinne'><organization /></author>
<author initials='G.' surname='Camarillo' fullname='G. Camarillo'><organization /></author>
<author initials='A.' surname='Johnston' fullname='A. Johnston'><organization /></author>
<author initials='J.' surname='Peterson' fullname='J. Peterson'><organization /></author>
<author initials='R.' surname='Sparks' fullname='R. Sparks'><organization /></author>
<author initials='M.' surname='Handley' fullname='M. Handley'><organization /></author>
<author initials='E.' surname='Schooler' fullname='E. Schooler'><organization /></author>
<date year='2002' month='June' />
<abstract><t>This document describes Session Initiation Protocol (SIP), an application-layer control (signaling) protocol for creating, modifying, and terminating sessions with one or more participants.  These sessions include Internet telephone calls, multimedia distribution, and multimedia conferences.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3261'/>
<seriesInfo name='DOI' value='10.17487/RFC3261'/>
</reference>



<reference  anchor="RFC3326" target='https://www.rfc-editor.org/info/rfc3326'>
<front>
<title>The Reason Header Field for the Session Initiation Protocol (SIP)</title>
<author initials='H.' surname='Schulzrinne' fullname='H. Schulzrinne'><organization /></author>
<author initials='D.' surname='Oran' fullname='D. Oran'><organization /></author>
<author initials='G.' surname='Camarillo' fullname='G. Camarillo'><organization /></author>
<date year='2002' month='December' />
<abstract><t>The REGISTER function is used in a Session Initiation Protocol (SIP) system primarily to associate a temporary contact address with an address-of-record.  This contact is generally in the form of a Uniform Resource Identifier (URI), such as Contact: &lt;sip:alice@pc33.atlanta.com&gt; and is generally dynamic and associated with the IP address or hostname of the SIP User Agent (UA).  The problem is that network topology may have one or more SIP proxies between the UA and the registrar, such that any request traveling from the user's home network to the registered UA must traverse these proxies.  The REGISTER method does not give us a mechanism to discover and record this sequence of proxies in the registrar for future use.  This document defines an extension header field, &quot;Path&quot; which provides such a mechanism.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3326'/>
<seriesInfo name='DOI' value='10.17487/RFC3326'/>
</reference>



<reference  anchor="RFC8224" target='https://www.rfc-editor.org/info/rfc8224'>
<front>
<title>Authenticated Identity Management in the Session Initiation Protocol (SIP)</title>
<author initials='J.' surname='Peterson' fullname='J. Peterson'><organization /></author>
<author initials='C.' surname='Jennings' fullname='C. Jennings'><organization /></author>
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /></author>
<author initials='C.' surname='Wendt' fullname='C. Wendt'><organization /></author>
<date year='2018' month='February' />
<abstract><t>The baseline security mechanisms in the Session Initiation Protocol (SIP) are inadequate for cryptographically assuring the identity of the end users that originate SIP requests, especially in an interdomain context.  This document defines a mechanism for securely identifying originators of SIP requests.  It does so by defining a SIP header field for conveying a signature used for validating the identity and for conveying a reference to the credentials of the signer.</t><t>This document obsoletes RFC 4474.</t></abstract>
</front>
<seriesInfo name='RFC' value='8224'/>
<seriesInfo name='DOI' value='10.17487/RFC8224'/>
</reference>



<reference  anchor="RFC2119" target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference  anchor="RFC8174" target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author initials='B.' surname='Leiba' fullname='B. Leiba'><organization /></author>
<date year='2017' month='May' />
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>




    </references>




  </back>

<!-- ##markdown-source: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-->

</rfc>

