Last Call: <draft-ietf-stir-certificates-10.txt> (Secure Telephone Identity Credentials: Certificates) to Proposed Standard

The IESG <> Tue, 18 October 2016 21:39 UTC

Return-Path: <>
Received: from (localhost [IPv6:::1]) by (Postfix) with ESMTP id BDE381298AF; Tue, 18 Oct 2016 14:39:39 -0700 (PDT)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: The IESG <>
To: IETF-Announce <>
Subject: Last Call: <draft-ietf-stir-certificates-10.txt> (Secure Telephone Identity Credentials: Certificates) to Proposed Standard
X-Test-IDTracker: no
X-IETF-IDTracker: 6.35.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <>
Date: Tue, 18 Oct 2016 14:39:39 -0700
Archived-At: <>
X-Mailman-Version: 2.1.17
List-Id: "IETF announcement list. No discussions." <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Tue, 18 Oct 2016 21:39:40 -0000

The IESG has received a request from the Secure Telephone Identity
Revisited WG (stir) to consider the following document:
- 'Secure Telephone Identity Credentials: Certificates'
  <draft-ietf-stir-certificates-10.txt> as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the mailing lists by 2016-11-01. Exceptionally, comments may be
sent to instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.


   In order to prevent the impersonation of telephone numbers on the
   Internet, some kind of credential system needs to exist that
   cryptographically asserts authority over telephone numbers.  This
   document describes the use of certificates in establishing authority
   over telephone numbers, as a component of a broader architecture for
   managing telephone numbers as identities in protocols like SIP.

The file can be obtained via

IESG discussion can be tracked via

No IPR declarations have been submitted directly on this I-D.

The document contains this normative downward references.
See RFC 3967 for additional information: 
    rfc7093: Additional Methods for Generating Key Identifiers Values (Informational - Independent Submission Editor stream)
    rfc3447: Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1 (Informational - IETF stream)
    rfc5912: New ASN.1 Modules for the Public Key Infrastructure Using X.509 (PKIX) (Informational - IETF stream)
Note that rfc3447 and rfc5912 are already listed in the acceptable Downref Registry.