<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.16 (Ruby 2.6.0) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-ietf-stir-identity-header-errors-handling-07" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="Identity Errors">Identity Header Errors Handling for STIR</title>

    <author initials="C." surname="Wendt" fullname="Chris Wendt">
      <organization>Somos Inc.</organization>
      <address>
        <email>chris-ietf@chriswendt.net</email>
      </address>
    </author>

    <date year="2022" month="November" day="07"/>

    <area>ART</area>
    <workgroup>STIR Working Group</workgroup>
    <keyword>Identity</keyword>

    <abstract>


<t>This document extends STIR and the Authenticated Identity Management in the Session Initiation Protocol (SIP) error handling procedures to include the mapping of verification failure reasons to STIR defined 4xx codes so the failure reason of an Identity header field can be conveyed to the upstream authentication service when local policy dictates that the call should continue in the presence of a verification failure. This document also defines procedures that enable a failure reason to be mapped to a specific Identity header field for scenarios that use multiple Identity header fields where some may have errors and others may not and the handling of those situations is defined.</t>



    </abstract>



  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>The STIR framework as described in <xref target="RFC7340"/> is an authentication framework for asserting a telephone number or URI based identity using a digital signature and certificate based framework as described in <xref target="RFC8225"/> and <xref target="RFC8226"/> respectively.  <xref target="RFC8224"/> describes the use of the STIR framework in the SIP protocol <xref target="RFC3261"/> and defines both the authentication service that creates a PASSporT, defined in <xref target="RFC8225"/>, and delivers it in an Identity header field and the verification service that correspondingly verifies the PASSporT and embedded originating identity.</t>

<t>This document is concerned with errors in validating PASSporTs and Identity header fields and how they are communicated in special cases and defines a solution to help address the potential issue of multiple Identity header fields and the plurality of potential verification errors. Additionally, it addresses the issue of the current 4xx error response and that when there is a verification error, the call is terminated. In some deployments, it may be the case that the policy for handling errors dictates that calls should continue even if there is a verification error. In many cases of, for example, inadvertent or operational errors that do not represent any identity falsification type of attempt, the policy of continuing the call even though the identity is not verified, may be the preferred policy. In these cases, the authentication service should still be notified of the error so that corrective action can be taken to fix any issues. This specification will discuss the use of the Reason header field in subsequent provisional (1xx) responses in order to deliver the error back to the authentication service or other SIP path network equipment responsible for error handling.</t>

<t>For the handling of multiple Identity header fields and the potential situation that some of the Identity header fields in a call may pass verification but others may have errors, this document defines the method of adding an identifier so that the authentication service can uniquely identify which Identity header field is being referred to in the case of an error.</t>

</section>
<section anchor="terminology"><name>Terminology</name>

<t>The keywords "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>

</section>
<section anchor="reason-header-field-protocol-stir"><name>Reason header field protocol "STIR"</name>

<t>This document defines a new Reason header field <xref target="RFC3326"/> protocol "STIR" for STIR applications using SIP as defined in <xref target="RFC8224"/>. The use of "STIR" as a reason header field protocol with the <xref target="RFC8224"/> defined error cause codes allows the use of multiple Reason header fields defined in <xref target="RFC3326"/> and updated in <xref target="I-D.ietf-sipcore-multiple-reasons"/>. Any provisional SIP Response message or final response message, with the exception of a 100 (Trying), MAY contain one or more Reason header fields with a STIR related cause code defined in <xref target="RFC8224"/> or future specifications. The use of multiple Reason header field is discussed in more detail later in the document.</t>

</section>
<section anchor="use-of-provisional-response-to-signal-errors-without-terminating-the-call"><name>Use of provisional response to signal errors without terminating the call</name>

<t>In cases where local policy dictates that a call should continue regardless of any verification errors that may have occured, including 4XX errors described in <xref target="RFC8224"/> Section 6.2.2, then the verification service MUST NOT send the 4XX as a response, but rather include the error response code and reason phrase in a Reason header field, defined in <xref target="RFC3326"/>, in the next provisional or final responses sent to the authentication service.</t>

<t>Example Reason header field:</t>

<figure><artwork><![CDATA[
Reason: STIR ;cause=436 ;text="Bad Identity Info"
]]></artwork></figure>

</section>
<section anchor="handling-of-a-verification-error-when-there-are-multiple-identity-header-fields"><name>Handling of a verification error when there are multiple Identity header fields</name>

<t>In cases where a SIP message includes multiple Identity header fields and one of those Identity header fields has an error, the verification service MUST include the error response code and reason phrase associated with the error in a Reason header field, defined in <xref target="RFC3326"/>, in the next provisional or final responses sent to the authentication service. The reason cause in the Reason header field MUST represent the error that occurred when verifying the contents of the Identity header field.  The association of a Reason header field and error to a specific Identity header field is accomplished by adding a PASSporT identifier, "ppi", parameter containing the PASSporT string as an identifier for the identity header and corresponding PASSporT that generated the error to the Reason header field. The "ppi" parameter for the Reason header field is RECOMMENDED in particular for cases that a SIP INVITE contains multiple Identity header fields. As implied and defined in <xref target="RFC8224"/>, error codes associated with STIR targeted at authentication services that produced a specific identity header field represent a single error occurring with the verification and processing of that identity header field. Therefore the association of a "ppi" parameter with a Reason header field using "STIR" protocol MUST only identify a single cause code in the context of a call dialog defined in <xref target="RFC8224"/> or in future documents defining STIR related errors. The PASSporT can be included in full form or in compact form, where only the signature of the PASSporT is included with two periods as a prefix as defined in <xref target="RFC8225"/> Section 7 to identify the reported Identity header field with an error. Compact form is the recommended form as full form may include information that could have privacy or security implications in some call scenarios as discussed in <xref target="Security"/>.</t>

<t>Example Reason header field with full form PASSporT:</t>

<figure><artwork><![CDATA[
Reason: STIR ;cause=436 ;text="Bad Identity Info" ;ppi= \
"eyJhbGciOiJFUzI1NiIsInR5cCI6InBhc3Nwb3J0IiwieDV1I \
joiaHR0cHM6Ly9jZXJ0LmV4YW1wbGUub3JnL3Bhc3Nwb3J0LmNlciJ9.eyJ \
kZXN0Ijp7InVyaSI6WyJzaXA6YWxpY2VAZXhhbXBsZS5jb20iXX0sImlhdC \
I6IjE0NDMyMDgzNDUiLCJvcmlnIjp7InRuIjoiMTIxNTU1NTEyMTIifX0.r \
q3pjT1hoRwakEGjHCnWSwUnshd0-zJ6F1VOgFWSjHBr8Qjpjlk-cpFYpFYs \
ojNCpTzO3QfPOlckGaS6hEck7w"
]]></artwork></figure>

<t>Example Reason header field with compact form PASSporT:</t>

<figure><artwork><![CDATA[
Reason: STIR ;cause=436 ;text="Bad Identity Info" ;ppi= \
"..rq3pjT1akEGjHCnWSwUnshd0-zJ6F1VOgFWSjHBr8Qjpjlk-cpFYpFYs \
ojNCpTzO3QfPOlckGaS6hEck7w"
]]></artwork></figure>

</section>
<section anchor="handling-multiple-verification-errors"><name>Handling multiple verification errors</name>

<t>If there are multiple Identity header field verification errors being reported the verification service MUST include a corresponding number of Reason header fields per error.  These Reason header fields should include a "ppi" parameters including the full or compact form of the PASSporT with cause and text parameters identifying each error. As mentioned previously, the potential use of multiple Reason header fields defined in <xref target="RFC3326"/> is updated in <xref target="I-D.ietf-sipcore-multiple-reasons"/> allowing multiple Reason header fields with the same protocol value, for this specification "STIR" should be used for any STIR error defined in <xref target="RFC8224"/> or future specifications.</t>

<t>Example Reason header fields for two identity info errors:</t>

<figure><artwork><![CDATA[
Reason: STIR ;cause=436 ;text="Bad Identity Info" ;ppi=     \
"..rq3pjT1hoRwakEGjHCnWSwUnshd0-zJ6F1VOgFWSjHBr8Qjpjlk-cpFY \
pFYsojNCpTzO3QfPOlckGaS6hEck7w"

Reason: STIR ;cause=438 ; text="Invalid Identity Header" ;ppi=  \
"..rJ6F1VOgFWSjHBr8Qjpjlk-cpFYpFYsq3pjT1hoRwakEGjHCnWSwUnsh \
d0-zckGaS6hEck7wojNCpTzO3QfPOl"

]]></artwork></figure>

</section>
<section anchor="removal-of-the-reason-header-field-by-authentication-service"><name>Removal of the Reason header field by Authentication Service</name>

<t>When an Authentication Service <xref target="RFC8224"/> receives the Reason header field with a PASSporT it generated as part of an Identity header field and the authentication of a call, it should first follow local policy to recognize and acknowledge the error (e.g. perform operational actions like logging or alarming), but then MUST remove the identified Reason header field to avoid the PASSporT information from going upstream to a UAC or UAS that may not be authorized to see claim information contained in the PASSporT for privacy or other reasons.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document requests the definition of a new protocol value (and associated protocol cause) to be registered by the IANA into the "Reason Protocols" sub-registry under http://www.iana.org/assignments/sip-parameters as follows:</t>

<figure><artwork><![CDATA[
Protocol Value   Protocol Cause            Reference
--------------   ---------------           -----------
STIR             STIR Error code           RFC 8224

]]></artwork></figure>

<t>This document also requests the definition of a new header field parameter name to be registered by IANA into the Header Field Parameters and Parameter Values sub-registry under https://www.iana.org/assignments/sip-parameters as follows:</t>

<figure><artwork><![CDATA[
Header Field   Parameter Name   Predefined Values  Reference
------------   --------------   -----------------  ---------
Reason         ppi               No                RFC THIS

]]></artwork></figure>

</section>
<section anchor="Security"><name>Security Considerations</name>

<t>This specification discusses the use of a PASSporT as an identifier for cases where there are multiple identity header field errors occuring as part of the Reason header field response. For some call scenarios (e.g. diversion based call flows) the signer of the PASSporT(s) may not be the first hop initiator of the call. In those cases, there may be some security or privacy concerns associated with PASSporT information that is passed upstream beyond the authentication service that originally signed the PASSporT(s) in the resulting error Reason header field. This specification states the authentication service MUST remove the Reason header field with the PASSporT to protect the security (e.g. use of potentially still fresh PASSporT for replay attacks) and privacy of any potential information that could be passed beyond the authentication service response back in the direction of the call initiator. While this specification allows for both full and compact form of the PASSporT to be used as the error identifier, use of the compact form is RECOMMENDED to avoid  the potential exposure of call information contained in the full form of the PASSporT.</t>

</section>


  </middle>

  <back>


    <references title='Normative References'>




<reference anchor='I-D.ietf-sipcore-multiple-reasons'>
   <front>
      <title>Multiple SIP Reason Header Field Values</title>
      <author fullname='Robert Sparks' initials='R.' surname='Sparks'>
         </author>
      <date day='23' month='August' year='2022'/>
      <abstract>
	 <t>   The SIP Reason Header Field as defined in RFC 3326 allows only one
   Reason value per protocol value.  Experience with more recently
   defined protocols shows it is useful to allow multiple values with
   the same protocol value.  This update to RFC 3326 allows multiple
   values for an indicated registered protocol when that protocol
   defines what the presence of multiple values means.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-ietf-sipcore-multiple-reasons-01'/>
   <format target='https://www.ietf.org/archive/id/draft-ietf-sipcore-multiple-reasons-01.txt' type='TXT'/>
</reference>



<reference anchor='RFC3261' target='https://www.rfc-editor.org/info/rfc3261'>
<front>
<title>SIP: Session Initiation Protocol</title>
<author fullname='J. Rosenberg' initials='J.' surname='Rosenberg'><organization/></author>
<author fullname='H. Schulzrinne' initials='H.' surname='Schulzrinne'><organization/></author>
<author fullname='G. Camarillo' initials='G.' surname='Camarillo'><organization/></author>
<author fullname='A. Johnston' initials='A.' surname='Johnston'><organization/></author>
<author fullname='J. Peterson' initials='J.' surname='Peterson'><organization/></author>
<author fullname='R. Sparks' initials='R.' surname='Sparks'><organization/></author>
<author fullname='M. Handley' initials='M.' surname='Handley'><organization/></author>
<author fullname='E. Schooler' initials='E.' surname='Schooler'><organization/></author>
<date month='June' year='2002'/>
<abstract><t>This document describes Session Initiation Protocol (SIP), an application-layer control (signaling) protocol for creating, modifying, and terminating sessions with one or more participants.  These sessions include Internet telephone calls, multimedia distribution, and multimedia conferences.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3261'/>
<seriesInfo name='DOI' value='10.17487/RFC3261'/>
</reference>



<reference anchor='RFC3326' target='https://www.rfc-editor.org/info/rfc3326'>
<front>
<title>The Reason Header Field for the Session Initiation Protocol (SIP)</title>
<author fullname='H. Schulzrinne' initials='H.' surname='Schulzrinne'><organization/></author>
<author fullname='D. Oran' initials='D.' surname='Oran'><organization/></author>
<author fullname='G. Camarillo' initials='G.' surname='Camarillo'><organization/></author>
<date month='December' year='2002'/>
<abstract><t>The REGISTER function is used in a Session Initiation Protocol (SIP) system primarily to associate a temporary contact address with an address-of-record.  This contact is generally in the form of a Uniform Resource Identifier (URI), such as Contact: &lt;sip:alice@pc33.atlanta.com&gt; and is generally dynamic and associated with the IP address or hostname of the SIP User Agent (UA).  The problem is that network topology may have one or more SIP proxies between the UA and the registrar, such that any request traveling from the user's home network to the registered UA must traverse these proxies.  The REGISTER method does not give us a mechanism to discover and record this sequence of proxies in the registrar for future use.  This document defines an extension header field, &quot;Path&quot; which provides such a mechanism.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3326'/>
<seriesInfo name='DOI' value='10.17487/RFC3326'/>
</reference>



<reference anchor='RFC8224' target='https://www.rfc-editor.org/info/rfc8224'>
<front>
<title>Authenticated Identity Management in the Session Initiation Protocol (SIP)</title>
<author fullname='J. Peterson' initials='J.' surname='Peterson'><organization/></author>
<author fullname='C. Jennings' initials='C.' surname='Jennings'><organization/></author>
<author fullname='E. Rescorla' initials='E.' surname='Rescorla'><organization/></author>
<author fullname='C. Wendt' initials='C.' surname='Wendt'><organization/></author>
<date month='February' year='2018'/>
<abstract><t>The baseline security mechanisms in the Session Initiation Protocol (SIP) are inadequate for cryptographically assuring the identity of the end users that originate SIP requests, especially in an interdomain context.  This document defines a mechanism for securely identifying originators of SIP requests.  It does so by defining a SIP header field for conveying a signature used for validating the identity and for conveying a reference to the credentials of the signer.</t><t>This document obsoletes RFC 4474.</t></abstract>
</front>
<seriesInfo name='RFC' value='8224'/>
<seriesInfo name='DOI' value='10.17487/RFC8224'/>
</reference>



<reference anchor='RFC8225' target='https://www.rfc-editor.org/info/rfc8225'>
<front>
<title>PASSporT: Personal Assertion Token</title>
<author fullname='C. Wendt' initials='C.' surname='Wendt'><organization/></author>
<author fullname='J. Peterson' initials='J.' surname='Peterson'><organization/></author>
<date month='February' year='2018'/>
<abstract><t>This document defines a method for creating and validating a token that cryptographically verifies an originating identity or, more generally, a URI or telephone number representing the originator of personal communications.  The Personal Assertion Token, PASSporT, is cryptographically signed to protect the integrity of the identity of the originator and to verify the assertion of the identity information at the destination.  The cryptographic signature is defined with the intention that it can confidently verify the originating persona even when the signature is sent to the destination party over an insecure channel.  PASSporT is particularly useful for many personal-communications applications over IP networks and other multi-hop interconnection scenarios where the originating and destination parties may not have a direct trusted relationship.</t></abstract>
</front>
<seriesInfo name='RFC' value='8225'/>
<seriesInfo name='DOI' value='10.17487/RFC8225'/>
</reference>



<reference anchor='RFC8226' target='https://www.rfc-editor.org/info/rfc8226'>
<front>
<title>Secure Telephone Identity Credentials: Certificates</title>
<author fullname='J. Peterson' initials='J.' surname='Peterson'><organization/></author>
<author fullname='S. Turner' initials='S.' surname='Turner'><organization/></author>
<date month='February' year='2018'/>
<abstract><t>In order to prevent the impersonation of telephone numbers on the Internet, some kind of credential system needs to exist that cryptographically asserts authority over telephone numbers.  This document describes the use of certificates in establishing authority over telephone numbers, as a component of a broader architecture for managing telephone numbers as identities in protocols like SIP.</t></abstract>
</front>
<seriesInfo name='RFC' value='8226'/>
<seriesInfo name='DOI' value='10.17487/RFC8226'/>
</reference>



<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author fullname='S. Bradner' initials='S.' surname='Bradner'><organization/></author>
<date month='March' year='1997'/>
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author fullname='B. Leiba' initials='B.' surname='Leiba'><organization/></author>
<date month='May' year='2017'/>
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>




    </references>

    <references title='Informative References'>





<reference anchor='RFC7340' target='https://www.rfc-editor.org/info/rfc7340'>
<front>
<title>Secure Telephone Identity Problem Statement and Requirements</title>
<author fullname='J. Peterson' initials='J.' surname='Peterson'><organization/></author>
<author fullname='H. Schulzrinne' initials='H.' surname='Schulzrinne'><organization/></author>
<author fullname='H. Tschofenig' initials='H.' surname='Tschofenig'><organization/></author>
<date month='September' year='2014'/>
<abstract><t>Over the past decade, Voice over IP (VoIP) systems based on SIP have replaced many traditional telephony deployments.  Interworking VoIP systems with the traditional telephone network has reduced the overall level of calling party number and Caller ID assurances by granting attackers new and inexpensive tools to impersonate or obscure calling party numbers when orchestrating bulk commercial calling schemes, hacking voicemail boxes, or even circumventing multi-factor authentication systems trusted by banks.  Despite previous attempts to provide a secure assurance of the origin of SIP communications, we still lack effective standards for identifying the calling party in a VoIP session.  This document examines the reasons why providing identity for telephone numbers on the Internet has proven so difficult and shows how changes in the last decade may provide us with new strategies for attaching a secure identity to SIP sessions.  It also gives high-level requirements for a solution in this space.</t></abstract>
</front>
<seriesInfo name='RFC' value='7340'/>
<seriesInfo name='DOI' value='10.17487/RFC7340'/>
</reference>




    </references>


<section anchor="acknowledgements"><name>Acknowledgements</name>

<t>The author would like to thank David Hancock for help to identify these error scenarios and additionally Jon Peterson, Roman Shpount, Robert Sparks, Christer Holmberg and others in the STIR working group for their helpful feedback and discussion.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

