<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.15 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-stir-identity-header-errors-handling-02" category="std">

  <front>
    <title abbrev="Identity Errors">Identity Header Error Handling</title>

    <author initials="C." surname="Wendt" fullname="Chris Wendt">
      <organization>Somos Inc.</organization>
      <address>
        <email>chris-ietf@chriswendt.net</email>
      </address>
    </author>

    <date year="2022" month="July" day="11"/>

    <area>art</area>
    
    <keyword>Identity</keyword>

    <abstract>


<t>This document extends STIR and the Authenticated Identity Management in the Session Initiation Protocol (SIP) error handling procedures to include the mapping of verification failure reasons to STIR defined 4xx codes so the failure reason of an Identity header field can be conveyed to the upstream authentication service when local policy dictates that the call should continue in the presence of a verification failure. This document also defines procedures that enable enable a failure reason to be mapped to a specific Identity header for scenarios that use multiple Identity header fields where some may have errors and others may not and the handling of those situations is defined.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t><xref target="RFC8224"/> in Section 6.2.2 discusses future specifications for enhancement of how errors are communicated and the handling of multiple Identity header fields. This specification provides some additional mechanisms for solutions to address these problems.</t>

<t>In some deployments of STIR and specifically using SIP <xref target="RFC3261"/> as defined by <xref target="RFC8224"/>, one issue with the current error handling, specifically with the use of the defined 4xx error responses, is that when an error occurs with the verification of the Identity header field or the PASSporT contained in the Identity header field and a 4xx response is returned, the call is then terminated. It may be the case that the policy for handling errors dictates that calls should continue even if there is a verification error, in the case of, for example inadvertent errors, however the authentication service should still be notified of the error so that corrective action can be taken. This specification will discuss the use of the Reason header field in subsequent provisional (1xx) responses in order to accomplish this.</t>

<t>For the handling of multiple Identity header fields and the potential situation that some of the Identity header fields in a call may pass verification but others may have errors, this document provides a mechanism to add an identifier so that the authentication service can identify which Identity header field is being referred to in the case of an error.</t>

</section>
<section anchor="terminology" title="Terminology">

<t>The keywords “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”, “MAY”, and “OPTIONAL” in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>

</section>
<section anchor="reason-header-field-protocol-stir" title="Reason header field protocol “STIR”">

<t>This document defines a new Reason header field <xref target="RFC3326"/> protocol “STIR” for STIR applications using SIP as defined in <xref target="RFC8224"/>. The use of “STIR” as a reason header field protocol with the <xref target="RFC8224"/> defined error cause codes allows the use of multiple Reason header fields defined in <xref target="RFC3326"/> and updated in <xref target="I-D.sparks-sipcore-multiple-reasons"/>. The use of multiple Reason header field is discussed in more detail later in the document.</t>

</section>
<section anchor="use-of-provisional-error-responses-to-signal-errors-without-terminating-the-call" title="Use of provisional error responses to signal errors without terminating the call">

<t>In cases where local policy dictates that a call should continue regardless of any verification errors that may have occured, including 4XX errors described in <xref target="RFC8224"/> Section 6.2.2, then the verification service SHOULD NOT send the 4XX as a response, but rather include the error response code and reason phrase in a Reason header field, defined in <xref target="RFC3326"/>, in the next provisional or final responses sent to the authentication service.</t>

<t>Example Reason header field:</t>

<figure><artwork><![CDATA[
Reason: STIR ;cause=436 ;text="Bad Identity Info"
]]></artwork></figure>

</section>
<section anchor="handling-of-a-verification-error-when-there-are-multiple-identity-header-fields" title="Handling of a verification error when there are multiple Identity header fields">

<t>In cases where a SIP message includes multiple Identity header fields and one of those Identity header fields has an error, the verification service SHOULD include the error response code and reason phrase associated with the error in a Reason header field, defined in <xref target="RFC3326"/>, in the next provisional or final responses sent to the authentication service. The reason cause in the Reason header field SHOULD represent the error that occurred when verifying the contents of the Identity header field.  The association of a Reason header field and error to a specific Identity header field is accomplished by adding a PASSporT identifier, “ppi”, parameter containing the PASSporT string as an identifier for the identity header and corresponding PASSporT that generated the error to the Reason header field. The “ppi” parameter for the Reason header field is optional, but RECOMMENDED, in particular for cases that a SIP INVITE contains multiple Identity header fields. The PASSporT can be included in full form or in compact form, where only the signature of the PASSporT is included with two periods as a prefix as defined in <xref target="RFC8225"/> Section 7 to identify the reported Identity header field with an error. Compact form is the recommended form as full form may include information that could have privacy or security implications in some call scenarios as discussed in <xref target="Security"/>.</t>

<t>Example Reason header field with full form PASSporT:</t>

<figure><artwork><![CDATA[
Reason: STIR ;cause=436 ;text="Bad Identity Info" ;ppi= \
"eyJhbGciOiJFUzI1NiIsInR5cCI6InBhc3Nwb3J0IiwieDV1I \
joiaHR0cHM6Ly9jZXJ0LmV4YW1wbGUub3JnL3Bhc3Nwb3J0LmNlciJ9.eyJ \
kZXN0Ijp7InVyaSI6WyJzaXA6YWxpY2VAZXhhbXBsZS5jb20iXX0sImlhdC \
I6IjE0NDMyMDgzNDUiLCJvcmlnIjp7InRuIjoiMTIxNTU1NTEyMTIifX0.r \
q3pjT1hoRwakEGjHCnWSwUnshd0-zJ6F1VOgFWSjHBr8Qjpjlk-cpFYpFYs \
ojNCpTzO3QfPOlckGaS6hEck7w"
]]></artwork></figure>

<t>Example Reason header field with compact form PASSporT:</t>

<figure><artwork><![CDATA[
Reason: STIR ;cause=436 ;text="Bad Identity Info" ;ppi= \
"..rq3pjT1akEGjHCnWSwUnshd0-zJ6F1VOgFWSjHBr8Qjpjlk-cpFYpFYs \
ojNCpTzO3QfPOlckGaS6hEck7w"
]]></artwork></figure>

</section>
<section anchor="handling-multiple-verification-errors" title="Handling multiple verification errors">

<t>If there are multiple Identity header field verification errors being reported the verification service SHOULD include corresponding Reason header fields with “ppi” parameters including full or compact form of the PASSporT with cause and text parameters identifying each error. As mentioned previously, the potential use of multiple Reason header fields defined in <xref target="RFC3326"/> is updated in <xref target="I-D.sparks-sipcore-multiple-reasons"/> allowing multiple Reason header fields with the same protocol value, for this specification being “STIR”.</t>

<t>Example Reason header fields for two identity info errors:</t>

<figure><artwork><![CDATA[
Reason: STIR ;cause=436 ;text="Bad Identity Info" ;ppi=     \
"..rq3pjT1hoRwakEGjHCnWSwUnshd0-zJ6F1VOgFWSjHBr8Qjpjlk-cpFY \
pFYsojNCpTzO3QfPOlckGaS6hEck7w"

Reason: STIR ;cause=436 ; text="Bad Identity Info" ;ppi=    \
"..rJ6F1VOgFWSjHBr8Qjpjlk-cpFYpFYsq3pjT1hoRwakEGjHCnWSwUnsh \
d0-zckGaS6hEck7wojNCpTzO3QfPOl"

]]></artwork></figure>

</section>
<section anchor="removal-of-the-reason-header-field-by-authentication-service" title="Removal of the Reason header field by Authentication Service">

<t>When an Authentication Service <xref target="RFC8224"/> receives the Reason header field with a PASSporT it generated as part of an Identity header field and the authentication of a call, it should first follow local policy to recognize and acknowledge the error (e.g. perform operational actions like logging or alarming), but then MUST remove the identified Reason header field to avoid the PASSporT information from going upstream to a UAC or UAS that may not be authorized to see claim information contained in the PASSporT for privacy or other reasons.</t>

</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>This document requests the definition of a new protocol value (and associated protocol cause) to be registered by the IANA into the “Reason Protocols” sub-registry under http://www.iana.org/assignments/sip-parameters as follows:</t>

<figure><artwork><![CDATA[
Protocol Value   Protocol Cause            Reference
--------------   ---------------           -----------
STIR              Status code               RFC 8224

]]></artwork></figure>

<t>This document also requests the definition of a new header field parameter name to be registered by IANA into the Header Field Parameters and Parameter Values sub-registry under https://www.iana.org/assignments/sip-parameters as follows:</t>

<figure><artwork><![CDATA[
Header Field   Parameter Name   Predefined Values  Reference
------------   --------------   -----------------  ---------
Reason         ppi               No                RFC THIS

]]></artwork></figure>

</section>
<section anchor="acknowledgements" title="Acknowledgements">

<t>Would like to thank David Hancock for help to identify these error scenarios and Jon Peterson, Roman Shpount, Robert Sparks and STIR working group for helpful feedback and discussion.</t>

</section>
<section anchor="Security" title="Security Considerations">

<t>This specification discusses the use of a PASSporT as an identifier for cases where there is multiple identity header errors occuring as part of the Reason header field response. For some call scenarios (e.g. diversion based call flows) the signer of the PASSporT(s) may not be the first hop initiator of the call. In those cases, there may be some security or privacy concerns associated with PASSporT information that is passed beyond the authentication service that originally signed the PASSporT(s) in the resulting error Reason header field. This specification states the authentication service MUST remove the Reason header field with the PASSporT to protect the security (e.g. use of potentially still fresh PASSporT for replay attacks) and privacy of any potential information that could be passed beyond the authentication service response back in the direction of the call initiator. While this specification allows for both full and compact form of the PASSporT to be used as the error identifier, use of the compact form can avoid many of the security and privacy concerns.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>




<reference anchor="I-D.sparks-sipcore-multiple-reasons">
   <front>
      <title>Multiple SIP Reason Header Field Values</title>
      <author fullname="Robert Sparks">
	 </author>
      <date month="November" day="12" year="2021" />
      <abstract>
	 <t>   The SIP Reason Header Field as defined in RFC 3326 allows only one
   Reason value per protocol value.  Practice shows it is useful to
   allow multiple values with the same protocol value.  This update to
   RFC 3326 allows multiple values for an indicated registered protocol
   when that protocol defines what the presence of multiple values
   means.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-sparks-sipcore-multiple-reasons-00" />
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-sparks-sipcore-multiple-reasons-00.txt" />
</reference>



<reference  anchor="RFC3261" target='https://www.rfc-editor.org/info/rfc3261'>
<front>
<title>SIP: Session Initiation Protocol</title>
<author initials='J.' surname='Rosenberg' fullname='J. Rosenberg'><organization /></author>
<author initials='H.' surname='Schulzrinne' fullname='H. Schulzrinne'><organization /></author>
<author initials='G.' surname='Camarillo' fullname='G. Camarillo'><organization /></author>
<author initials='A.' surname='Johnston' fullname='A. Johnston'><organization /></author>
<author initials='J.' surname='Peterson' fullname='J. Peterson'><organization /></author>
<author initials='R.' surname='Sparks' fullname='R. Sparks'><organization /></author>
<author initials='M.' surname='Handley' fullname='M. Handley'><organization /></author>
<author initials='E.' surname='Schooler' fullname='E. Schooler'><organization /></author>
<date year='2002' month='June' />
<abstract><t>This document describes Session Initiation Protocol (SIP), an application-layer control (signaling) protocol for creating, modifying, and terminating sessions with one or more participants.  These sessions include Internet telephone calls, multimedia distribution, and multimedia conferences.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3261'/>
<seriesInfo name='DOI' value='10.17487/RFC3261'/>
</reference>



<reference  anchor="RFC3326" target='https://www.rfc-editor.org/info/rfc3326'>
<front>
<title>The Reason Header Field for the Session Initiation Protocol (SIP)</title>
<author initials='H.' surname='Schulzrinne' fullname='H. Schulzrinne'><organization /></author>
<author initials='D.' surname='Oran' fullname='D. Oran'><organization /></author>
<author initials='G.' surname='Camarillo' fullname='G. Camarillo'><organization /></author>
<date year='2002' month='December' />
<abstract><t>The REGISTER function is used in a Session Initiation Protocol (SIP) system primarily to associate a temporary contact address with an address-of-record.  This contact is generally in the form of a Uniform Resource Identifier (URI), such as Contact: &lt;sip:alice@pc33.atlanta.com&gt; and is generally dynamic and associated with the IP address or hostname of the SIP User Agent (UA).  The problem is that network topology may have one or more SIP proxies between the UA and the registrar, such that any request traveling from the user's home network to the registered UA must traverse these proxies.  The REGISTER method does not give us a mechanism to discover and record this sequence of proxies in the registrar for future use.  This document defines an extension header field, &quot;Path&quot; which provides such a mechanism.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3326'/>
<seriesInfo name='DOI' value='10.17487/RFC3326'/>
</reference>



<reference  anchor="RFC8224" target='https://www.rfc-editor.org/info/rfc8224'>
<front>
<title>Authenticated Identity Management in the Session Initiation Protocol (SIP)</title>
<author initials='J.' surname='Peterson' fullname='J. Peterson'><organization /></author>
<author initials='C.' surname='Jennings' fullname='C. Jennings'><organization /></author>
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /></author>
<author initials='C.' surname='Wendt' fullname='C. Wendt'><organization /></author>
<date year='2018' month='February' />
<abstract><t>The baseline security mechanisms in the Session Initiation Protocol (SIP) are inadequate for cryptographically assuring the identity of the end users that originate SIP requests, especially in an interdomain context.  This document defines a mechanism for securely identifying originators of SIP requests.  It does so by defining a SIP header field for conveying a signature used for validating the identity and for conveying a reference to the credentials of the signer.</t><t>This document obsoletes RFC 4474.</t></abstract>
</front>
<seriesInfo name='RFC' value='8224'/>
<seriesInfo name='DOI' value='10.17487/RFC8224'/>
</reference>



<reference  anchor="RFC8225" target='https://www.rfc-editor.org/info/rfc8225'>
<front>
<title>PASSporT: Personal Assertion Token</title>
<author initials='C.' surname='Wendt' fullname='C. Wendt'><organization /></author>
<author initials='J.' surname='Peterson' fullname='J. Peterson'><organization /></author>
<date year='2018' month='February' />
<abstract><t>This document defines a method for creating and validating a token that cryptographically verifies an originating identity or, more generally, a URI or telephone number representing the originator of personal communications.  The Personal Assertion Token, PASSporT, is cryptographically signed to protect the integrity of the identity of the originator and to verify the assertion of the identity information at the destination.  The cryptographic signature is defined with the intention that it can confidently verify the originating persona even when the signature is sent to the destination party over an insecure channel.  PASSporT is particularly useful for many personal-communications applications over IP networks and other multi-hop interconnection scenarios where the originating and destination parties may not have a direct trusted relationship.</t></abstract>
</front>
<seriesInfo name='RFC' value='8225'/>
<seriesInfo name='DOI' value='10.17487/RFC8225'/>
</reference>



<reference  anchor="RFC2119" target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference  anchor="RFC8174" target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author initials='B.' surname='Leiba' fullname='B. Leiba'><organization /></author>
<date year='2017' month='May' />
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>




    </references>




  </back>

<!-- ##markdown-source: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-->

</rfc>

