<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.27 (Ruby 3.0.0) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-hardman-verifiable-voice-protocol-04" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.0 -->
  <front>
    <title abbrev="VVP">Verifiable Voice Protocol</title>
    <seriesInfo name="Internet-Draft" value="draft-hardman-verifiable-voice-protocol-04"/>
    <author fullname="Daniel Hardman">
      <organization>Provenant, Inc</organization>
      <address>
        <email>daniel.hardman@gmail.com</email>
      </address>
    </author>
    <date year="2025" month="September" day="22"/>
    <keyword>voip</keyword>
    <keyword>telecom</keyword>
    <keyword>telco</keyword>
    <keyword>telephone number</keyword>
    <keyword>vetting</keyword>
    <keyword>KYC</keyword>
    <abstract>
      <?line 138?>

<t>Verifiable Voice Protocol (VVP) authenticates and authorizes organizations and individuals making and/or receiving telephone calls. This eliminates trust gaps that malicious parties exploit. Like related technolgies such as SHAKEN, RCD, and BCID, VVP uses STIR to bind cryptographic evidence to a SIP INVITE, and verify this evidence downstream. VVP can also let evidence flow the other way, proving things about the callee. VVP builds from different technical and governance assumptions than alternatives, and uses stronger, richer evidence. This allows VVP to cross jurisdictional boundaries easily and robustly. It also makes VVP simpler, more decentralized, cheaper to deploy and maintain, more private, more scalable, and higher assurance. Because it is easier to adopt, VVP can plug gaps or build bridges between other approaches, functioning as glue in hybrid ecosystems. For example, it may justify an A attestation in SHAKEN, or an RCD passport for branded calling, when a call originates outside SHAKEN or RCD ecosystems. VVP also works well as a standalone mechanism, independent of other solutions. An extra benefit is that VVP enables two-way evidence sharing with verifiable text and chat (e.g., RCS and vCon), as well as with other industry verticals that need verifiability in non-telco contexts.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://dhh1128.github.io/vvp/draft-hardman-verifiable-voice-protocol.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-hardman-verifiable-voice-protocol/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/dhh1128/vvp"/>.</t>
    </note>
  </front>
  <middle>
    <?line 142?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>When we get phone calls, we want to know who's calling, and why. Often, we want similar information when we <em>make</em> calls as well, to confirm that we've truly reached who we intend. Strangers abuse expectations in either direction, far too often.</t>
      <t>Regulators have mandated protections, and industry has responded. However, existing solutions have several drawbacks:</t>
      <ul spacing="normal">
        <li>
          <t>Assurance of callers derives only from the signatures of originating service providers, with no independently verifiable proof of what they assert.</t>
        </li>
        <li>
          <t>Proving the identity of the callee is not supported.</t>
        </li>
        <li>
          <t>Each jurisdiction has its own governance and its own set of signers. Sharing information across boundaries is fraught with logistical and regulatory problems.</t>
        </li>
        <li>
          <t>Deployment and maintenance costs are high.</t>
        </li>
        <li>
          <t>Market complexities such as the presence of aggregators, wholesalers, and call centers that proxy a brand are difficult to model safely.</t>
        </li>
        <li>
          <t>What might work for enterprises offers few benefits and many drawbacks for individual callers.</t>
        </li>
      </ul>
      <t>VVP solves these problems by applying crucial innovations in evidence scope, evidence format, and vetting mechanisms. These innovations profoundly upgrade what is provable in an ecosystem, as well as what is cacheable and what must be centralized. However, they have only subtle effects on the content of a STIR PASSporT, so they are explored outside this spec.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="overview">
      <name>Overview</name>
      <t>Fundamentally, VVP requires identified parties (callers and/or callees) to curate a dossier (<xref target="TOIP-DOSSIER"/>) of stable evidence that proves things about them. This is done once or occasionally, in advance, as a configuration precondition. Then, for each call, participants decide whether to share this evidence. Callers share evidence by creating an ephemeral STIR-compatible VVP PASSporT (<xref target="RFC8225"/>) that cites (<xref format="counter" target="citing"/>) their preconfigured dossier. This passport travels along the delivery route as an <tt>Identity</tt> header in a SIP INVITE. Callees share evidence by adding an analogous passport to an attribute line in the SDP <xref target="RFC8866"/> body of their SIP response. This passes a signed citation to their dossier in the other direction. Verifiers anywhere along the route check the citation(s) and corresponding dossier(s), including realtime revocation status, to make decisions (<xref format="counter" target="verifying"/>).</t>
      <t>A VVP call may carry assurance in either or both directions. Compliant implementations may choose to support only assurance about the caller, only assurance about the callee, or both.</t>
      <section anchor="roles">
        <name>Roles</name>
        <t>Understanding the workflow in VVP requires a careful definition of roles related to the protocol. The terms that follow have deep implications for the mental model, and their meaning in VVP may not match casual usage.</t>
        <section anchor="allocation-holder">
          <name>Allocation Holder</name>
          <t>An <em>allocation holder</em> controls how a phone number is used, in the eyes of a regulator. Enterprises and consumers that make and receive calls with phone numbers they legitimately control are the most obvious category of allocation holders, and are called direct <em>telephone number users</em> (<em>TNUs</em>). Range holders hold allocations for numbers that have not yet been assigned; they don't make or receive calls with these numbers, and are therefore not TNUs, but they are still allocation holders.</t>
          <t>It is possible for an ecosystem to include other parties as allocation holders (e.g., wholesalers, aggregators). However, many regulators dislike this outcome, and prefer that such parties broker allocations without actually holding the allocations directly.</t>
        </section>
        <section anchor="TP">
          <name>Callee</name>
          <t>For a given phone call, a <em>callee</em> (also referred to as a <em>terminating party</em> or <em>TP</em>) receives the call. Typically one callee is targeted, but multiparty SIP flows allow INVITEs to multiple callees, either directly or via a conference server (see <xref target="RFC4353"/> and <xref target="RFC4575"/>). A callee can be an individual consumer or an organization. The direct service provider of the callee is the <em>terminating service provider</em> (<em>TSP</em>). In many use cases for VVP, callers attempt to prove things to callees, and callees and their service providers use VVP primarily with a verifier mindset. However, enterprises or call centers that accept inbound calls from individuals may want assurance to flow the other direction; hence, VVP supports optional evidence about callees as well.</t>
        </section>
        <section anchor="OP">
          <name>Originating Party</name>
          <t>An <em>originating party</em> (<em>OP</em>) controls the first <em>session border controller</em> (<em>SBC</em>) that processes an outbound call, and therefore builds the VVP passport that cites evidence about the caller.</t>
          <t>It may be tempting to equate the OP with "the caller", and in some perspectives this could be true. However, this simple equivalence lacks nuance and doesn't always hold. In a VVP context, it is more accurate to say that the OP creates a SIP INVITE <xref target="RFC3261"/> with explicit, provable authorization from the party accountable for calls on the originating phone number. The OP originates the VVP protocol, but not always the call on the handset.</t>
          <t>It may also be tempting to associate the OP with an organizational identity like "Company X". While this is not wrong, and is in fact used in high-level descriptions in this specification, in its most careful definition, the cryptographic identity of an OP should be more narrow. It typically corresponds to a single service operated by an IT department within (or outsourced but operating at the behest of) Company X, rather than to Company X generically. This narrowness limits cybersecurity risk, because a single service operated by Company X needs far fewer privileges than the company as a whole. Failing to narrow identity appropriately creates vulnerabilities in some alternative approaches. The evidence securing VVP <bcp14>MUST</bcp14> therefore prove a valid relationship between the OP's narrow identity and the broader legal entities that stakeholders more naturally assume and understand.</t>
          <t>The service provider associated with an OP is called the <em>originating service provider</em> (<em>OSP</em>). For a given phone call, there may be complexity between the hardware that begins a call and the SBC of the OP -- and there may also be many layers, boundaries, and transitions between OSP and TSP.</t>
        </section>
        <section anchor="AP">
          <name>Accountable Party</name>
          <t>For a given call, the <em>accountable party</em> (<em>AP</em>) is the organization or individual (the TNU) that has the right to use the originating phone number, according to the regulator of that number. When a callee asks, "Who's calling?", they have little interest in the technicalities of the OP, and it is almost always the AP that they want to identify. The AP is accountable for the call, and thus "the caller", as far as the regulator and the callee are concerned.</t>
          <t>APs can operate their own SBCs and therefore be their own OPs. However, APs can also use a UCaaS provider that makes the AP-OP relationship indirect. Going further, a business can hire a call center, and delegate to the call center the right to use its phone number. In such a case, the business is the AP, but the call center is the OP that makes calls on its behalf. None of these complexities alter the fact that, from the callee's perspective, the AP is "the caller". The callee chooses to answer or not, based on their desire to interact with the AP. If the callee's trust is abused, the regulator and the callee both want to hold the AP accountable.</t>
          <t>In order to verify a caller, VVP requires an AP to prepare a dossier of evidence that documents a basis for imposing this accountability on them. Only the owner of a given dossier can prove they intend to initiate a VVP call that cites their dossier. Therefore, if a verifier confirms that a particular call properly matches its dossier, the verifier is justified in considering the owner of that dossier the AP for the call. Otherwise, someone is committing fraud. Accountability, and the basis for it, are both unambiguous.</t>
        </section>
        <section anchor="VP">
          <name>Verified Party</name>
          <t>A <em>verified party</em> (<em>VP</em>) is a party that uses VVP to prove assertions about itself and its delegation decisions. When VVP provides assurance about callers, the AP is a VP. When VVP provides assurance about callees, the callee is a VP. Some characteristics of proxies, delegates, and service providers may be proved by a dossier, but these parties are not VPs. They don't create dossiers, and dossiers are not focused on them.</t>
        </section>
        <section anchor="verifier">
          <name>Verifier</name>
          <t>A <em>verifier</em> is a party that wants to know who's calling or being called, and maybe why -- and that evaluates the answers to these questions by examining formal evidence. Callees, callers, TSPs, OSPs, government regulators, law enforcement doing lawful intercept, auditors, and even APs or OPs can be verifiers. Each may need to see different views of the evidence about a particular phone call, and it may be impossible to comply with various regulations unless these views are kept distinct -- yet each wants similar and compatible assurance.</t>
          <t>In addition to checking the validity of cryptographic evidence, the verifier role in VVP <bcp14>MAY</bcp14> also consider how that evidence matches business rules and external conditions. For example, a verifier can begin its analysis by deciding whether Call Center Y has the right, in the abstract, to make or receive calls on behalf of Organization X using a given phone number. However, VVP evidence allows a verifier to go further: it can also consider whether Y is allowed to exercise this right at the particular time of day when a call occurs, or in a particular jurisdiction, given the business purpose asserted in a particular call.</t>
        </section>
      </section>
      <section anchor="lifecycle">
        <name>Lifecycle</name>
        <t>VVP depends on three interrelated activities with evidence:</t>
        <ul spacing="normal">
          <li>
            <t>Curating</t>
          </li>
          <li>
            <t>Citing</t>
          </li>
          <li>
            <t>Verifying</t>
          </li>
        </ul>
        <t>Chronologically, evidence must be curated before it can be cited or verified. In addition, some vulnerabilities in existing approaches occur because evidence requirements are too loose. Therefore, understanding the nature of backing evidence, and how that evidence is created and maintained, is a crucial consideration for VVP.</t>
        <t>However, curating does not occur in realtime during phone calls, and is out of scope for a network protocol specification. Citing and verifying are the heart of VVP, and implementers will approach VVP from the standpoint of SIP flows <xref target="RFC3261"/>, <xref target="RFC5626"/>. Therefore, we leave the question of curation to a separate document. Where not-yet-explained evidence concepts are used, inline references allow easy cross-reference to formal definitions that come later.</t>
      </section>
    </section>
    <section anchor="citing">
      <name>Citing</name>
      <section anchor="citing-the-aps-dossier">
        <name>Citing the AP's dossier</name>
        <t>A VVP call that makes the caller verifiable begins when the OP (<xref format="counter" target="OP"/>) generates a new VVP passport <xref target="RFC8225"/> that complies with STIR <xref target="RFC8224"/> requirements. In its compact-serialized JWT <xref target="RFC7519"/> form, this passport is then passed as an <tt>Identity</tt> header in a SIP INVITE <xref target="RFC3261"/>. The passport <em>constitutes</em> lightweight, direct, and ephemeral evidence; it <em>cites</em> and therefore depends upon comprehensive, indirect, and long-lived evidence (the AP's dossier. Safely and efficiently citing stronger evidence in a dossier is one way that VVP differs from alternatives.</t>
        <section anchor="questions-answered-by-an-aps-passport">
          <name>Questions answered by an AP's passport</name>
          <t>The passport directly answers at least the following questions:</t>
          <ul spacing="normal">
            <li>
              <t>What is the cryptographic identity of the OP?</t>
            </li>
            <li>
              <t>How can a verifier determine the OP's key state at the time the passport was created?</t>
            </li>
            <li>
              <t>How can a verifier identify and fetch more evidence that connects the OP to the asserted AP?</t>
            </li>
            <li>
              <t>What brand attributes are asserted to accompany the call?</t>
            </li>
          </ul>
          <t>The first two answers come from the <tt>kid</tt> header. The third answer is communicated in the required <tt>evd</tt> claim. The fourth answer is communicated in the optional <tt>card</tt> and <tt>goal</tt> claims.</t>
          <t>More evidence can then be fetched to indirectly answer the following additional questions:</t>
          <ul spacing="normal">
            <li>
              <t>What is the legal identity of the AP?</t>
            </li>
            <li>
              <t>Does the AP have the right to use the originating phone number?</t>
            </li>
            <li>
              <t>Does the AP intend the OP to sign passports on its behalf?</t>
            </li>
            <li>
              <t>Does the AP have the right to use the brand attributes asserted for the call?</t>
            </li>
          </ul>
          <t>Dossiers can be further expanded to answer even more questions; such dynamic expansion of the scope of proof is compatible with but not specified by VVP.</t>
        </section>
        <section anchor="sample-passport">
          <name>Sample passport</name>
          <t>An example will help. In its JSON-serialized form, a typical VVP passport for an AP (with some long CESR-encoded hashes shortened by ellipsis for readability) might look like this:</t>
          <sourcecode type="json"><![CDATA[
{
  "header": {
    "alg": "EdDSA",
    "typ": "JWT",
    "ppt": "vvp",
    "kid": "https://agentsrus.net/oobi/EMC.../agent/EAx..."
  },
  "payload": {
    "orig": {"tn": ["+33612345678"]},
    "dest": {"tn": ["+33765432109"]},
    "card": ["NICKNAME:Monde d'Exemples",
      "CHATBOT:https://example.com/chatwithus",
      "LOGO;HASH=EK2...;VALUE=URI:https://example.com/ico64x48.png"],
    "goal": "negotiate.schedule",
    "call-reason": "planifier le prochain rendez-vous",
    "evd": "https://fr.example.com/dossiers/E0F....cesr",
    "origId": "e0ac7b44-1fc3-4794-8edd-34b83c018fe9",
    "iat": 1699840000,
    "exp": 1699840030,
    "jti": "70664125-c88d-49d6-b66f-0510c20fc3a6"
  }
}
]]></sourcecode>
          <t>The semantics of the fields are:</t>
          <ul spacing="normal">
            <li>
              <t><tt>alg</tt> <em>(required)</em> <bcp14>MUST</bcp14> be "EdDSA" (<xref target="RFC8032"/>, <xref target="FIPS186-4"/>). Standardizing on one scheme prevents jurisdictions with incompatible or weaker cryptography. The RSA, HMAC, and ES256 algorithms <bcp14>MUST NOT</bcp14> be used. (This choice is motivated by compatibility with the vLEI and its associated ACDC ecosystem, which depends on the Montgomery-to-Edwards transformation.)</t>
            </li>
            <li>
              <t><tt>typ</tt> <em>(required)</em> Per <xref target="RFC8225"/>, <bcp14>MUST</bcp14> be "passport".</t>
            </li>
            <li>
              <t><tt>ppt</tt> <em>(required)</em> Per <xref target="RFC8225"/>, <bcp14>MUST</bcp14> identify the specific PASSporT type -- in this case, "vvp".</t>
            </li>
            <li>
              <t><tt>kid</tt> <em>(required)</em> <bcp14>MUST</bcp14> be the OOBI of an AID (<xref target="TOIP-KERI"/>) controlled by the OP (<xref format="counter" target="OP"/>). An OOBI is a special URL that facilitates ACDC's viral discoverability goals. It returns IANA content-type <tt>application/json+cesr</tt>, which provides some important security guarantees. The content for this particular OOBI <bcp14>MUST</bcp14> be a KEL (<xref target="TOIP-KERI"/>). Typically the AID in question does not identify the OP as a legal entity, but rather software running on or invoked by the SBC operated by the OP. (The AID that identifies the OP as a legal entity may be controlled by a multisig scheme and thus require multiple humans to create a signature. The AID for <tt>kid</tt> <bcp14>MUST</bcp14> be singlesig and, in the common case where it is not the legal entity AID, <bcp14>MUST</bcp14> have a delegate relationship with the legal entity AID that's proved through formal evidence.)</t>
            </li>
            <li>
              <t><tt>orig</tt> <em>(required)</em> Although VVP does not depend on SHAKEN, the format of this field <bcp14>MUST</bcp14> conform to SHAKEN requirements (<xref target="ATIS-1000074"/>), for interoperability reasons. It <bcp14>MUST</bcp14> also satisfy one additional constraint, which is that only one phone number is allowed. Depite the fact that a containing SIP INVITE may allow multiple originating phone numbers, only one can be tied to evidence evaluated by verifiers.</t>
            </li>
            <li>
              <t><tt>dest</tt> <em>(required)</em> For interoperability reasons, <bcp14>MUST</bcp14> conform to SHAKEN requirements.</t>
            </li>
            <li>
              <t><tt>card</tt> <em>(optional)</em> Contains one or more brand attributes. These are analogous to <xref target="RCD-DRAFT"/> or <xref target="CTIA-BCID"/> data, but differ in that they <bcp14>MUST</bcp14> be justified by evidence in the dossier. Because of this strong foundation that interconnects with formal legal identity, they can be used to derive other brand evidence (e.g., an RCD passport) as needed. Individual attributes <bcp14>MUST</bcp14> conform to the VCard standard <xref target="RFC6350"/>.</t>
            </li>
            <li>
              <t><tt>goal</tt> <em>(optional)</em> A machine-readable, localizable goal code, as described informally by <xref target="ARIES-RFC-0519"/>. If present, the dossier <bcp14>MUST</bcp14> prove that the OP is authorized by the AP to initiate calls with this particular goal.</t>
            </li>
            <li>
              <t><tt>call-reason</tt> <em>(optional)</em> A human-readable, arbitrary phrase that describes the self-asserted intent of the caller. This claim is largely redundant with <tt>goal</tt>; most calls will either omit both, or choose one or the other. Since <tt>call-reason</tt> cannot be analyzed or verified in any way, and since it may communicate in a human language that is not meaningful to the callee, use of this field is discouraged. However it is not formally deprecated. It is included in VVP to facilitate the construction of derivative RCD passports which have the property.</t>
            </li>
            <li>
              <t><tt>evd</tt> <em>(required)</em> <bcp14>MUST</bcp14> be the OOBI of a bespoke ACDC (the dossier, <xref target="TOIP-ACDC"/>) that constitutes a verifiable data graph of all evidence justifying belief in the identity and authorization of the AP, the OP, and any relevant delegations. This URL can be hosted on any convenient web server, and is somewhat analogous to the <tt>x5u</tt> header in X509 contexts. See below for details.</t>
            </li>
            <li>
              <t><tt>origId</tt> <em>(optional)</em> Follows SHAKEN semantics.</t>
            </li>
            <li>
              <t><tt>iat</tt> <em>(required)</em> Follows standard JWT semantics (see <xref target="RFC7519"/>).</t>
            </li>
            <li>
              <t><tt>exp</tt> <em>(required)</em> Follows standard JWT semantics. As this sets a window for potential replay attacks between the same two phone numbers, a recommended expiration should be 30 seconds, with a minimum of 10 seconds and a maximum of 300 seconds.</t>
            </li>
            <li>
              <t><tt>jti</tt> <em>(optional)</em> Follows standard JWT semantics.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="citing-a-callees-dossier">
        <name>Citing a callee's dossier</name>
        <t>Optionally, evidence in VVP can also flow from callee to caller. For privacy reasons, individuals who receive phone calls may choose not to use VVP in this way. However, enterprises and call centers may find it useful as a reassurance to their customers about who they've reached.</t>
        <t>In such cases, the callee must have curated a dossier. The format of the callee dossier is identical in schema to that used by a caller. It may therefore introduce evidence of the callee's legal identity, right to use a brand, right to use a TN, delegated authority to a call center proxy or an AI, and so forth. (A callee's dossier might differ in one minor way that doesn't affect the schema: it could prove the right to use a TN that has a DNO flag.)</t>
        <t>A reference to the callee's dossier is conveyed by adding a special <tt>a=callee-passport:X</tt> attribute line to the SDP <xref target="RFC8866"/> body of the callee's <tt>200 OK</tt> response. (Optionally, the lines <bcp14>MAY</bcp14> also be added to a <tt>180 Ringing</tt> response, to make the callee verifiable earlier, but it <bcp14>MUST</bcp14> appear on the <tt>200 OK</tt> response.) The value of this line is a JWT in compact form, with the <tt>;type=vvp</tt> suffix. This is exactly compliant with the format used by callers to convey VVP passports in <tt>Identity</tt> headers. However, <tt>Identity</tt> headers are not used for callees because existing SIP tooling does not expect or preserve <tt>Identity</tt> headers on responses. Furthermore, the identity of a callee is primarily of interest to the caller, who is willing to parse the SDP body; it does not need the same full-route auditability as the identity of a caller.</t>
        <t>Although dossiers are identical in either direction, the callee JWT has a slightly different schema than a caller's VVP passport. The headers of the JWT match, but <tt>kid</tt> contains the OOBI of the callee, not of the OP. Two new claims are added to the JWT payload: <tt>call-id</tt> and <tt>cseq</tt>. These <bcp14>MUST</bcp14> contain the values of the <tt>Call-ID</tt> and <tt>CSeq</tt> values on the preceding SIP INVITE. The <tt>iat</tt> claim <bcp14>MUST</bcp14> also be present and <bcp14>MUST</bcp14> contain a value from the system clock of the callee. The <tt>exp</tt> field <bcp14>MAY</bcp14> also be present and use a value chosen by the callee; if it is missing, this communicates the callee's intention to impose no new timeout logic on the call. The <tt>evd</tt> field <bcp14>MUST</bcp14> also be present, and <bcp14>MUST</bcp14> contain the OOBI of the callee's dossier. The <tt>card</tt> and <tt>goal</tt> claims are also allowed. Other claims <bcp14>MAY</bcp14> be present, but <bcp14>MUST</bcp14> be ignored by compliant implementations that do not understand them. (Because the callee references the specific SIP dialog via <tt>call-id</tt> and <tt>cseq</tt>, there is no point in repeating fields that describe the dialog, like <tt>orig</tt>, <tt>dest</tt>, and so forth.)</t>
      </section>
    </section>
    <section anchor="verifying">
      <name>Verifying</name>
      <section anchor="verifying-the-caller">
        <name>Verifying the caller</name>
        <section anchor="algorithm">
          <name>Algorithm</name>
          <t>When a verifier encounters a VVP passport, they <bcp14>SHOULD</bcp14> verify by using an algorithm similar to the following. Optimizations may combine or reorder operations, but <bcp14>MUST</bcp14> achieve all of the same guarantees, in order to be compliant implementations.</t>
          <ol spacing="normal" type="1"><li>
              <t>Analyze the <tt>iat</tt> and <tt>exp</tt> claims to evaluate timing. Confirm that <tt>exp</tt> is greater than <tt>iat</tt> and also greater than the reference time for analysis (e.g., <em>now</em>), and that <tt>iat</tt> is close enough to the reference time to satisfy the verifier's tolerance for replays. (A replay attack would have to call from the same <tt>orig</tt> to the same <tt>dest</tt> with the same <tt>iat</tt>, within whatever window the verifier accepts. Thirty seconds is a recommended default value.)</t>
            </li>
            <li>
              <t>Confirm that the <tt>orig</tt>, <tt>dest</tt>, and <tt>iat</tt> claims match contextual observations and other SIP metadata. That is, the passport appears aligned with what is known about the call from external sources.</t>
            </li>
            <li>
              <t>Extract the <tt>kid</tt> header.</t>
            </li>
            <li>
              <t>Fetch the key state for the OP at the reference time from the OOBI in <tt>kid</tt>. Caches may be used to optimize this, as long as they meet the freshness requirements of the verifier.</t>
            </li>
            <li>
              <t>Use the public key of the OP to verify that the signature on the passport is valid for that key state. On success, the verifier knows that the OP is at least making an assertion about the identity and authorizations of the AP. (When reference time is now, this is approximately the level of assurance provided by existing alternatives to VVP.)</t>
            </li>
            <li>
              <t>Extract the <tt>evd</tt> field, which references the dossier that constitutes backing evidence.</t>
            </li>
            <li>
              <t>Use the SAID (<xref target="TOIP-CESR"/>) of the dossier as a lookup key to see whether the dossier has already been fully validated. Since dossiers are highly stable, caching dossier validations is recommended.</t>
            </li>
            <li>
              <t>If the dossier requires full validation, perform it. Validation includes checking the signature on each ACDC in the dossier's data graph against the key state of its respective issuer at the time the issuance occurred. Key state is proved by the KEL (<xref target="TOIP-KERI"/>), and checked against independent witnesses.  </t>
              <t>
Issuance is recorded explicitly in the KEL's overall event sequence, so this check does not require guesses about how to map issuance timestamps to key state events. Subsequent key rotations do not invalidate this analysis.  </t>
              <t>
Validation also includes comparing data structure and values against the declared schema, plus a full traversal of all chained cryptographically verifiable evidence, back to the root of trust for each artifact. The verifier <bcp14>MUST</bcp14> accept the root of trust as a valid authority on the vital question answered by each credential that depends upon it. The correct relationships among evidence artifacts <bcp14>MUST</bcp14> also be checked (e.g., proving that the issuer of one piece is the issuee of another piece).</t>
            </li>
            <li>
              <t>Check to see whether the revocation status of the dossier and each item it depends on has been tested recently enough, at the reference time, to satisfy the verifier's freshness requirements. If no, check for revocations anywhere in the data graph of the dossier. Revocations are not the same as key rotations. They can be checked much more quickly than doing a full validation. Revocation checks can also be cached, possibly with a different freshness threshold than the main evidence.</t>
            </li>
            <li>
              <t>Assuming that the dossier is valid and has no breakages due to revocation, confirm that the OP is authorized to sign the passport. If there is no delegation evidence, the AP and the OP <bcp14>MUST</bcp14> be identical, and the OP <bcp14>MUST</bcp14> be the issuee of the identity credential; otherwise, the OP <bcp14>MUST</bcp14> be the issuee of a delegated signing credential for which the issuer is the AP.</t>
            </li>
            <li>
              <t>Extract the <tt>orig</tt> field and compare it to the TNAlloc credential cited in the dossier to confirm that the AP (<xref format="counter" target="AP"/>) -- or, if OP is not equal to AP and OP is using their own number, the OP (<xref format="counter" target="OP"/>) -- has the right to originate calls with this number.</t>
            </li>
            <li>
              <t>If the passport includes non-null values for the optional <tt>card</tt> claim, extract that information and check that the brand attributes claimed for the call are justified by a brand credential in the dossier.</t>
            </li>
            <li>
              <t>Check any business logic. For example, if the passport includes a non-null value for the optional <tt>goal</tt> claim, confirm that the verifier is willing to accept a call with that goal. Or, if the delegated signer credential says that the OP can only call on behalf of the AP during certain hours, or in certain geos, check those attributes of the call.</t>
            </li>
          </ol>
        </section>
      </section>
      <section anchor="verifying-the-callee">
        <name>Verifying the callee</name>
        <t>The callee is verified with an algorithm that <bcp14>MAY</bcp14> be optimized but <bcp14>MUST</bcp14> achieve the same security guarantees as this:</t>
        <ol spacing="normal" type="1"><li>
            <t>Confirm that the <tt>call-id</tt> and <tt>cseq</tt> claims match the values of <tt>Call-ID</tt> and <tt>CSeq</tt> from the preceding SIP INVITE.</t>
          </li>
          <li>
            <t>Confirm that the <tt>iat</tt> claim matches contextual observations and other SIP metadata. That is, the timing described by the callee appears aligned with what is known about the call from external sources.</t>
          </li>
          <li>
            <t>If the <tt>exp</tt> claim is present, analyze the <tt>iat</tt> and <tt>exp</tt> claims to evaluate timeout.</t>
          </li>
          <li>
            <t>Extract the <tt>kid</tt> header.</t>
          </li>
          <li>
            <t>Fetch the key state for the callee at the reference time from the OOBI in <tt>kid</tt>. Caches may be used to optimize this, as long as they meet the freshness requirements of the verifier.</t>
          </li>
          <li>
            <t>Use the public key of the callee to verify that the signature on the passport is valid for that key state.</t>
          </li>
          <li>
            <t>Extract the <tt>evd</tt> field, which references the dossier that constitutes backing evidence.</t>
          </li>
          <li>
            <t>Use the SAID (<xref target="TOIP-CESR"/>) of the dossier as a lookup key to see whether the dossier has already been fully validated. Since dossiers are highly stable, caching dossier validations is recommended.</t>
          </li>
          <li>
            <t>Confirm that the dossier was signed (issued) by the same AID that appears in the <tt>kid</tt> header.</t>
          </li>
          <li>
            <t>If the dossier requires full validation, perform it.</t>
          </li>
          <li>
            <t>Check to see whether the revocation status of the dossier and each item it depends on has been tested recently enough, at the reference time, to satisfy the verifier's freshness requirements.</t>
          </li>
          <li>
            <t>Compare the callee's TN to the TNAlloc credential cited in the dossier to confirm that the callee has the right to accept calls at this number.</t>
          </li>
          <li>
            <t>If the passport includes non-null values for the optional <tt>card</tt> claim, extract that information and check that the brand attributes claimed for the call are justified by a brand credential in the dossier.</t>
          </li>
          <li>
            <t>Check any business logic. For example, if the passport includes a non-null value for the optional <tt>goal</tt> claim, and the preceding INVITE included a VVP passport that also declared a goal, confirm that the callee's and caller's goals overlap (one must be a subset of the other). Or, if the delegated signer credential says that a call center or an AI can accept calls during certain hours, or in certain geos, check those attributes of the call.</t>
          </li>
        </ol>
      </section>
      <section anchor="planning-for-efficiency">
        <name>Planning for efficiency</name>
        <t>A complete verficiation of either caller or callee passport, from scratch, is quite rigorous. With no caches, it may take several seconds, much like a thorough validation of a certificate chain. However, much VVP evidence is stable for long periods of time and lends itself to caching, subject to the proviso that revocation freshness must be managed wisely. Since the same dossier is used to add assurance to many calls -- perhaps thousands or millions of calls, for busy call centers -- and many dossiers will reference the same issuers and issuees and their associated key states and KELs (<xref target="TOIP-KERI"/>), caching will produce huge benefits.</t>
        <t>Furthermore, because SAIDs and their associated data (including links to other nodes in a data graph) have a tamper-evident relationship, any party can perform validation and compile their results, then share the data with verifiers that want to do less work. Validators like this are not oracles, because consumers of such data need not trust shared results blindly. They can always directly recompute some or all of it from a passport, to catch deception. However, they can do this lazily or occasionally, per their preferred balance of risk/effort.</t>
        <t><em>In toto</em>, these characteristics mean that no centralized registry is required in any given ecosystem. Data can be fetched directly from its source, across jurisdictional boundaries. Because it is fetched from its source, it comes with consent. Privacy can be tuned. Simple opportunistic, uncoordinated reuse (e.g., in or across the datacenters of TSPs) will arise spontaneously and will dramatically improve the scale and efficiency of the system.</t>
      </section>
      <section anchor="historical-analysis">
        <name>Historical analysis</name>
        <t>Normally, a verification algorithm determines whether the passport verifies <em>now</em>. (This is the only evaluation that's valid for most JWTs, because they depend on ephemeral key state fetched just in time from <tt>x5u</tt>). However, a VVP passport can do more. Its <tt>kid</tt> header references a KEL for the signer's AID (<xref target="TOIP-KERI"/>), and its <tt>evd</tt> header references a dossier issued by either the AID of the AP or the AID of the callee. Thence it connects to a KEL (<xref target="TOIP-KERI"/>). These data structures provide key state transitions that are timestamped -- both by the controllers of the AIDs, and by their independent witnesses. Although the timestamps are not guaranteed to be perfectly synchronized, they can be compared to establish rough transition times and to detect duplicity.</t>
        <t>Using this historical information, it becomes possible to ask whether a VVP passport would have verified at an arbitrary moment in the past. In such framings, the reference time from the verification algorithm is <em>then</em>, not <em>now</em>. In the normal case where <em>then</em> falls outside a fuzzy range, answers about key state are clear to all observers. In the rare cases where <em>then</em> falls inside a fuzzy range, a state transition was underway but not yet universally known, and a verifier can compute the key state (and thence, the outcome of the verification algorithm) according to their preferred interpretation.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Complying with a specification may forestall certain easy-to-anticipate attacks. However, <em>it does not mean that vulnerabilities don't exist, or that they won't be exploited</em>. The overall assurance of VVP requires reasonable vigilance. Given that a major objective of VVP is to ensure security, implementers are strongly counseled to understand the underlying principles, the assumptions, and the ways that choices by their own or other implementations could introduce risk.</t>
      <t>Like most cryptographic mechanisms, VVP depends on the foundational assumption that human stakeholders will manage cryptographic keys carefully. VVP enforces this assumption more thoroughly than many existing solutions:</t>
      <ul spacing="normal">
        <li>
          <t>Parties that issue credentials <bcp14>MUST</bcp14> be identified with AIDs (<xref target="TOIP-KERI"/>) that use witnesses. This guarantees a non-repudiable, publicly accessible audit log of how their key state evolves, and it makes key rotation easy. It also offers compromise and duplicity detection. Via prerotation, it enables recovery from key compromise. AIDs can be upgraded to use quantum-proof signing algorithms without changing the identifier.</t>
        </li>
        <li>
          <t>Parties that issue credentials <bcp14>MUST</bcp14> do so using ACDCs (<xref target="TOIP-ACDC"/>) signed by their AID rather than a raw key. This makes evidence revocable. It also makes it stable across key rotation, and prevents retrograde attacks by allowing verifiers to map an issuance or revocation event to an unambiguous key state in the KEL (<xref target="TOIP-KERI"/>).</t>
        </li>
        <li>
          <t>Parties that issue credentials <bcp14>SHOULD</bcp14> employ threshold-based multi-signature schemes. This enhances security by distributing signing authority across multiple key holders, reducing the risk of single-point compromise. Threshold-based signatures ensure that no single key compromise undermines the system’s integrity while enabling controlled key recovery and rotation without disrupting credential validity.</t>
        </li>
      </ul>
      <t>Nonetheless, it is still possible to make choices that weaken the security posture of the ecosystem, including at least the following:</t>
      <ul spacing="normal">
        <li>
          <t>Sharing keys or controlling access to them carelessly</t>
        </li>
        <li>
          <t>Issuing credentials with a flimsy basis for trust</t>
        </li>
        <li>
          <t>Delegating authority to untrustworthy parties</t>
        </li>
        <li>
          <t>Delegating authority without adequate constraints</t>
        </li>
        <li>
          <t>Failing to fully verify evidence</t>
        </li>
      </ul>
      <t>Generally understood best practices in cybersecurity will avoid many of these problems. In addition, the following policies that are specific to VVP are strongly recommended:</t>
      <ol spacing="normal" type="1"><li>
          <t>Passports <bcp14>SHOULD</bcp14> have an aggressive timeout (e.g., 30 seconds). Signatures on passports are not anchored in a KEL, and must therefore be evaluated for age with respect to the time they were received. Overly old passports could be a replay attack (a purported second call with the same orig and dest numbers, using the same backing evidence, soon after the first.)</t>
        </li>
        <li>
          <t>Witnesses (which <bcp14>MUST</bcp14> be used) <bcp14>SHOULD</bcp14> be used in such a way that high availability is guaranteed, and in such a way that duplicity by the controller of an AID is detected. (Verifiers will be able to see the witness policy of each AID controller, and <bcp14>SHOULD</bcp14> decide for themselves whether the party is reliable, depending on what they observe.)</t>
        </li>
        <li>
          <t>Revocations <bcp14>SHOULD</bcp14> be timely, and the timeliness guarantees of issuers <bcp14>SHOULD</bcp14> be published.</t>
        </li>
        <li>
          <t>Watchers <bcp14>SHOULD</bcp14> propagate events to local caches with a low latency, and <bcp14>MUST</bcp14> provide information that allows verifiers to decide whether that latency meets their freshness requirements.</t>
        </li>
      </ol>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document defines a new SDP <xref target="RFC8866"/> session-level attribute:</t>
      <t>Attribute name:      callee-passport
   Long-form description: Contains a STIR-compatible passport that references a dossier of evidence about the callee's identity, brand, and related attributes. Used in 200 OK and/or 180 Ringing responses.
   Type of attribute:   session-level
   Subject to charset:  No
   Reference:           This document</t>
      <t>This specification also depends on OOBIs (<xref target="TOIP-KERI"/>) being served as web resources with IANA content type <tt>application/cesr</tt>.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC3261">
          <front>
            <title>SIP: Session Initiation Protocol</title>
            <author fullname="J. Rosenberg" initials="J." surname="Rosenberg"/>
            <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
            <author fullname="G. Camarillo" initials="G." surname="Camarillo"/>
            <author fullname="A. Johnston" initials="A." surname="Johnston"/>
            <author fullname="J. Peterson" initials="J." surname="Peterson"/>
            <author fullname="R. Sparks" initials="R." surname="Sparks"/>
            <author fullname="M. Handley" initials="M." surname="Handley"/>
            <author fullname="E. Schooler" initials="E." surname="Schooler"/>
            <date month="June" year="2002"/>
            <abstract>
              <t>This document describes Session Initiation Protocol (SIP), an application-layer control (signaling) protocol for creating, modifying, and terminating sessions with one or more participants. These sessions include Internet telephone calls, multimedia distribution, and multimedia conferences. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3261"/>
          <seriesInfo name="DOI" value="10.17487/RFC3261"/>
        </reference>
        <reference anchor="RFC4353">
          <front>
            <title>A Framework for Conferencing with the Session Initiation Protocol (SIP)</title>
            <author fullname="J. Rosenberg" initials="J." surname="Rosenberg"/>
            <date month="February" year="2006"/>
            <abstract>
              <t>The Session Initiation Protocol (SIP) supports the initiation, modification, and termination of media sessions between user agents. These sessions are managed by SIP dialogs, which represent a SIP relationship between a pair of user agents. Because dialogs are between pairs of user agents, SIP's usage for two-party communications (such as a phone call), is obvious. Communications sessions with multiple participants, generally known as conferencing, are more complicated. This document defines a framework for how such conferencing can occur. This framework describes the overall architecture, terminology, and protocol components needed for multi-party conferencing. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4353"/>
          <seriesInfo name="DOI" value="10.17487/RFC4353"/>
        </reference>
        <reference anchor="RFC4575">
          <front>
            <title>A Session Initiation Protocol (SIP) Event Package for Conference State</title>
            <author fullname="J. Rosenberg" initials="J." surname="Rosenberg"/>
            <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
            <author fullname="O. Levin" initials="O." role="editor" surname="Levin"/>
            <date month="August" year="2006"/>
            <abstract>
              <t>This document defines a conference event package for tightly coupled conferences using the Session Initiation Protocol (SIP) events framework, along with a data format used in notifications for this package. The conference package allows users to subscribe to a conference Uniform Resource Identifier (URI). Notifications are sent about changes in the membership of this conference and optionally about changes in the state of additional conference components. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4575"/>
          <seriesInfo name="DOI" value="10.17487/RFC4575"/>
        </reference>
        <reference anchor="RFC4648">
          <front>
            <title>The Base16, Base32, and Base64 Data Encodings</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <date month="October" year="2006"/>
            <abstract>
              <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4648"/>
          <seriesInfo name="DOI" value="10.17487/RFC4648"/>
        </reference>
        <reference anchor="RFC5626">
          <front>
            <title>Managing Client-Initiated Connections in the Session Initiation Protocol (SIP)</title>
            <author fullname="C. Jennings" initials="C." role="editor" surname="Jennings"/>
            <author fullname="R. Mahy" initials="R." role="editor" surname="Mahy"/>
            <author fullname="F. Audet" initials="F." role="editor" surname="Audet"/>
            <date month="October" year="2009"/>
            <abstract>
              <t>The Session Initiation Protocol (SIP) allows proxy servers to initiate TCP connections or to send asynchronous UDP datagrams to User Agents in order to deliver requests. However, in a large number of real deployments, many practical considerations, such as the existence of firewalls and Network Address Translators (NATs) or the use of TLS with server-provided certificates, prevent servers from connecting to User Agents in this way. This specification defines behaviors for User Agents, registrars, and proxy servers that allow requests to be delivered on existing connections established by the User Agent. It also defines keep-alive behaviors needed to keep NAT bindings open and specifies the usage of multiple connections from the User Agent to its registrar. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5626"/>
          <seriesInfo name="DOI" value="10.17487/RFC5626"/>
        </reference>
        <reference anchor="RFC8032">
          <front>
            <title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <author fullname="I. Liusvaara" initials="I." surname="Liusvaara"/>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes elliptic curve signature scheme Edwards-curve Digital Signature Algorithm (EdDSA). The algorithm is instantiated with recommended parameters for the edwards25519 and edwards448 curves. An example implementation and test vectors are provided.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8032"/>
          <seriesInfo name="DOI" value="10.17487/RFC8032"/>
        </reference>
        <reference anchor="RFC8224">
          <front>
            <title>Authenticated Identity Management in the Session Initiation Protocol (SIP)</title>
            <author fullname="J. Peterson" initials="J." surname="Peterson"/>
            <author fullname="C. Jennings" initials="C." surname="Jennings"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="C. Wendt" initials="C." surname="Wendt"/>
            <date month="February" year="2018"/>
            <abstract>
              <t>The baseline security mechanisms in the Session Initiation Protocol (SIP) are inadequate for cryptographically assuring the identity of the end users that originate SIP requests, especially in an interdomain context. This document defines a mechanism for securely identifying originators of SIP requests. It does so by defining a SIP header field for conveying a signature used for validating the identity and for conveying a reference to the credentials of the signer.</t>
              <t>This document obsoletes RFC 4474.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8224"/>
          <seriesInfo name="DOI" value="10.17487/RFC8224"/>
        </reference>
        <reference anchor="RFC8225">
          <front>
            <title>PASSporT: Personal Assertion Token</title>
            <author fullname="C. Wendt" initials="C." surname="Wendt"/>
            <author fullname="J. Peterson" initials="J." surname="Peterson"/>
            <date month="February" year="2018"/>
            <abstract>
              <t>This document defines a method for creating and validating a token that cryptographically verifies an originating identity or, more generally, a URI or telephone number representing the originator of personal communications. The Personal Assertion Token, PASSporT, is cryptographically signed to protect the integrity of the identity of the originator and to verify the assertion of the identity information at the destination. The cryptographic signature is defined with the intention that it can confidently verify the originating persona even when the signature is sent to the destination party over an insecure channel. PASSporT is particularly useful for many personal-communications applications over IP networks and other multi-hop interconnection scenarios where the originating and destination parties may not have a direct trusted relationship.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8225"/>
          <seriesInfo name="DOI" value="10.17487/RFC8225"/>
        </reference>
        <reference anchor="RFC8866">
          <front>
            <title>SDP: Session Description Protocol</title>
            <author fullname="A. Begen" initials="A." surname="Begen"/>
            <author fullname="P. Kyzivat" initials="P." surname="Kyzivat"/>
            <author fullname="C. Perkins" initials="C." surname="Perkins"/>
            <author fullname="M. Handley" initials="M." surname="Handley"/>
            <date month="January" year="2021"/>
            <abstract>
              <t>This memo defines the Session Description Protocol (SDP). SDP is intended for describing multimedia sessions for the purposes of session announcement, session invitation, and other forms of multimedia session initiation. This document obsoletes RFC 4566.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8866"/>
          <seriesInfo name="DOI" value="10.17487/RFC8866"/>
        </reference>
        <reference anchor="FIPS186-4" target="https://doi.org/10.6028/NIST.FIPS.186-4">
          <front>
            <title>Digital Signature Standard (DSS)</title>
            <author>
              <organization>National Institute of Standards and Technology (NIST)</organization>
            </author>
            <date year="2013" month="July"/>
          </front>
        </reference>
        <reference anchor="TOIP-CESR" target="https://trustoverip.github.io/tswg-cesr-specification/">
          <front>
            <title>Composable Event Streaming Representation (CESR)</title>
            <author initials="S." surname="Smith" fullname="Sam Smith">
              <organization/>
            </author>
            <author initials="K." surname="Griffin" fullname="Kevin Griffin" role="editor">
              <organization/>
            </author>
            <author>
              <organization>Trust Over IP Foundation</organization>
            </author>
            <date year="2023" month="November"/>
          </front>
        </reference>
        <reference anchor="TOIP-KERI" target="https://trustoverip.github.io/tswg-keri-specification/">
          <front>
            <title>Key Event Receipt Infrastructure (KERI)</title>
            <author initials="S." surname="Smith" fullname="Sam Smith">
              <organization/>
            </author>
            <author initials="K." surname="Griffin" fullname="Kevin Griffin" role="editor">
              <organization/>
            </author>
            <author>
              <organization>Trust Over IP Foundation</organization>
            </author>
            <date year="2024" month="January"/>
          </front>
        </reference>
        <reference anchor="TOIP-ACDC" target="https://trustoverip.github.io/tswg-acdc-specification/">
          <front>
            <title>Authentic Chained Data Containers (ACDC)</title>
            <author initials="S." surname="Smith" fullname="Sam Smith">
              <organization/>
            </author>
            <author initials="P." surname="Feairheller" fullname="Phil Feairheller">
              <organization/>
            </author>
            <author initials="K." surname="Griffin" fullname="Kevin Griffin" role="editor">
              <organization/>
            </author>
            <author>
              <organization>Trust Over IP Foundation</organization>
            </author>
            <date year="2023" month="November"/>
          </front>
        </reference>
        <reference anchor="TOIP-DOSSIER" target="https://trustoverip.github.io/kswg-dossier-specification/">
          <front>
            <title>Verifiable Dossiers</title>
            <author initials="D." surname="Hardman" fullname="Daniel Hardman">
              <organization/>
            </author>
            <date year="2025" month="September"/>
          </front>
        </reference>
        <reference anchor="ATIS-1000074" target="https://atis.org/resources/signature-based-handling-of-asserted-information-using-tokens-shaken-atis-1000074-e/">
          <front>
            <title>Signature-Based Handling of Asserted Information Using toKENs (SHAKEN)</title>
            <author>
              <organization>Alliance for Telecommunications Industry Solutions</organization>
            </author>
            <date year="2019" month="February"/>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC6350">
          <front>
            <title>vCard Format Specification</title>
            <author fullname="S. Perreault" initials="S." surname="Perreault"/>
            <date month="August" year="2011"/>
            <abstract>
              <t>This document defines the vCard data format for representing and exchanging a variety of information about individuals and other entities (e.g., formatted and structured name and delivery addresses, email address, multiple telephone numbers, photograph, logo, audio clips, etc.). This document obsoletes RFCs 2425, 2426, and 4770, and updates RFC 2739. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6350"/>
          <seriesInfo name="DOI" value="10.17487/RFC6350"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RCD-DRAFT">
          <front>
            <title>SIP Call-Info Parameters for Rich Call Data</title>
            <author fullname="Chris Wendt" initials="C." surname="Wendt">
              <organization>Somos</organization>
            </author>
            <author fullname="Jon Peterson" initials="J." surname="Peterson">
              <organization>TransUnion</organization>
            </author>
            <date day="21" month="April" year="2025"/>
            <abstract>
              <t>   This document specifies a usage of the SIP Call-Info header field
   that incorporates Rich Call Data (RCD) associated with the identity
   of the originating party in order to provide to the terminating party
   a description of the caller (including details about the reason for
   the session).  RCD includes information about the caller beyond the
   telephone number such as a calling name, a logo, photo, or jCard
   object representing the caller, which can help the called party
   decide how to handle the session request.

   This document defines three new parameters 'call-reason', 'verified',
   and 'integrity' for the SIP Call-Info header field and also a new
   token ("jcard") for the 'purpose' parameter of the Call-Info header
   field.  It also provides guidance on the use of the Call-Info
   'purpose' parameter token, "icon".

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-sipcore-callinfo-rcd-19"/>
        </reference>
        <reference anchor="CTIA-BCID" target="https://api.ctia.org/wp-content/uploads/2022/11/Branded-Calling-Best-Practices.pdf">
          <front>
            <title>Branded Calling ID Best Practices</title>
            <author>
              <organization>CTIA</organization>
            </author>
            <date year="2022" month="November"/>
          </front>
        </reference>
        <reference anchor="ARIES-RFC-0519" target="https://github.com/hyperledger/aries-rfcs/blob/main/concepts/0519-goal-codes/README.md">
          <front>
            <title>Aries RFC 0519: Goal Codes</title>
            <author initials="D." surname="Hardman" fullname="Daniel Hardman">
              <organization/>
            </author>
            <date year="2021" month="April"/>
          </front>
        </reference>
        <reference anchor="LE-VLEI-SCHEMA" target="https://github.com/GLEIF-IT/vLEI-schema/blob/main/legal-entity-vLEI-credential.json">
          <front>
            <title>Legal Entity vLEI Credential</title>
            <author>
              <organization>GLEIF</organization>
            </author>
            <date year="2023" month="November"/>
          </front>
        </reference>
        <reference anchor="TN-ALLOC-SCHEMA" target="https://github.com/provenant-dev/public-schema/blob/main/tn-alloc/tn-alloc.schema.json">
          <front>
            <title>TN Allocation Credential</title>
            <author>
              <organization>Provenant</organization>
            </author>
            <date year="2024" month="December"/>
          </front>
        </reference>
        <reference anchor="BRAND-SCHEMA" target="https://github.com/provenant-dev/public-schema/blob/brand-owner/brand-owner/brand-owner.schema.json">
          <front>
            <title>Brand Credential</title>
            <author initials="D." surname="Hardman" fullname="Daniel Hardman">
              <organization/>
            </author>
            <date year="2024" month="December"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 407?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Much of the cybersecurity infrastructure used by VVP depends on KERI, which was invented by Sam Smith, and first implemented by Sam plus Phil Fairheller, Kevin Griffin, and other technical staff at GLEIF. Thanks to logistical support from Trust Over IP and the Linux Foundation, and to a diverse community of technical experts in those communities and in the Web of Trust group.</t>
      <t>Techniques that apply KERI to telco use cases were developed by Daniel Hardman, Randy Warshaw, and Ruth Choueka, with additional contributions from Dmitrii Tychinin, Yaroslav Lazarev, Arshdeep Singh, and many other staff members at Provenant, Inc. Thanks as well to Ed Eykholt for multiple editorial improvements.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
