ENUM -- Telephone Number Mapping A. Mayrhofer Working Group O. Lendl Internet-Draft enum.at Expires: April 7, 2005 M. Haberler IPA October 7, 2004 ENUM Validation Architecture and Token Format Definition draft-mayrhofer-enum-validation-00 Status of this Memo This document is an Internet-Draft and is subject to all provisions of section 3 of RFC 3667. By submitting this Internet-Draft, each author represents that any applicable patent or other IPR claims of which he or she is aware have been or will be disclosed, and any of which he or she become aware will be disclosed, in accordance with RFC 3668. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt. The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html. This Internet-Draft will expire on April 7, 2005. Copyright Notice Copyright (C) The Internet Society (2004). Abstract ENUM domains track the right-to-use of the underlying E.164 number. The process of asserting this is called "validation". This document describes a generalized role model and a XML data format -- the validation token -- to convey validation related information. Mayrhofer, et al. Expires April 7, 2005 [Page 1] Internet-Draft ENUM Validation Architecture October 2004 Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 2. Roles and their Suitability for Validation . . . . . . . . . . 3 2.1 The Registry . . . . . . . . . . . . . . . . . . . . . . . 3 2.2 The Number-Range Holder (NRH) . . . . . . . . . . . . . . 3 2.3 The Registrar . . . . . . . . . . . . . . . . . . . . . . 4 2.4 The Validation Entity (VE) . . . . . . . . . . . . . . . . 4 3. Example Scenarios . . . . . . . . . . . . . . . . . . . . . . 4 3.1 Fully Segregated Roles . . . . . . . . . . . . . . . . . . 4 3.2 ITSP acts as Registrar and VE . . . . . . . . . . . . . . 4 3.3 Cooperating Number-Range Holder . . . . . . . . . . . . . 5 3.4 ENUM enabled Telco . . . . . . . . . . . . . . . . . . . . 5 4. Validation Process Requirements . . . . . . . . . . . . . . . 5 5. The Validation Token . . . . . . . . . . . . . . . . . . . . . 5 5.1 Attribute description . . . . . . . . . . . . . . . . . . 6 5.2 Signature . . . . . . . . . . . . . . . . . . . . . . . . 7 5.3 Examples . . . . . . . . . . . . . . . . . . . . . . . . . 7 5.3.1 Unsigned token without subscriber information . . . . 7 5.3.2 Unsigned token with subscriber information . . . . . . 8 5.3.3 Signed token . . . . . . . . . . . . . . . . . . . . . 8 6. Formal Syntax . . . . . . . . . . . . . . . . . . . . . . . . 10 6.1 Token Core Schema . . . . . . . . . . . . . . . . . . . . 11 6.2 Token Data Schema . . . . . . . . . . . . . . . . . . . . 12 7. Wider applicability . . . . . . . . . . . . . . . . . . . . . 14 8. References . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . 15 Intellectual Property and Copyright Statements . . . . . . . . 17 Mayrhofer, et al. Expires April 7, 2005 [Page 2] Internet-Draft ENUM Validation Architecture October 2004 1. Introduction TLD domain registrations are typically handled on a first-come-first-served basis. The registration data is the complete source of ownership information. An ENUM [2] domain is an attribute of an E.164 number, and thus is inextricably linked to the status and the holder of the number. Therefore, the right-to-use in the number is a precondition to delegation of the domain and relinquishing the number implies cancellation of the domain. During the process of registration, it must be guaranteed that some trusted party does actually confirm the right-to-use of the registrant. If the telco which initially assigned the number to the registrant acts as his registrar, then he can assert the right-to-use as neccessary. If the number-holder tries to register his ENUM domain independently of his telco, then he has to prove his right to the ENUM domain. Besides this "initial validation", provisions must be made to ensure that the state of the ENUM domain tracks any change in the ownership of the number. 2. Roles and their Suitability for Validation 2.1 The Registry The Registry typically operates the master database of delegated ENUM domains and runs the authoritative nameservers for the relevant zone under e164.arpa. While the registry could try to check the legitimacy of incoming delegation requests, a registry is a natural monopoly and it may be undesirable to task it with the validation problem. However, the registry should be able to verify that requests have been properly validated, preferrably in a fully automated way. 2.2 The Number-Range Holder (NRH) The right to use on a number is typically assigned to the subscriber (the "number-holder") by a telco (in case of number block allocations) or by the local numbering authority (in case of direct assignments). The associated subscriber data is the primary source of number assignment information. A telco assigning numbers to customers may easily assert the Mayrhofer, et al. Expires April 7, 2005 [Page 3] Internet-Draft ENUM Validation Architecture October 2004 right-to-use for their subscribers. However it is unlikely that all telcos will participate in ENUM validation. 2.3 The Registrar A registrar performs ENUM domain delegations on behalf of a numberholder by interacting with the registry, typically through a protocol like EPP [5]. This is the same role registrars fulfill in the TLD world. While registrar usually "owns" the customer and thus can assert his identity, he may lack authoritative number-assignment information. 2.4 The Validation Entity (VE) The Validation Entity asserts the right-to-use of a subscriber for a given E.164 number. This role may be performed by several parties and is not neccessarily limited to a single legal entity. The actual validation methods employed might vary depending on the particular party, available data-sources, subscriber choice, and regulatory requirements. See Section 3 for examples. The VE may assert successful validation by supplying a standardized "Validation Token" to the registrar for passing to the registry. The registry could formally verify its contents, origin and integrity, regardless of the method and source of validation information used. 3. Example Scenarios The following section describes potential role allocations. While in theory all roles could be fulfilled by different entities, in practice a party may assume several roles simultaneously. 3.1 Fully Segregated Roles An Internet Telephony Service Provider (ITSP) acts as registrar and offers an ENUM-enabled service based on existing geographic numbers. The number-range holders (telcos) do not provide validation entity services. The ITSP contracts a directory assistance operator to provide VE services. 3.2 ITSP acts as Registrar and VE An ITSP offers ENUM-enabled services for mobile numbers. For validation the ITSP uses a SMS (Short Message Service) confirmation loop to establish the link between his customer and the number. Mayrhofer, et al. Expires April 7, 2005 [Page 4] Internet-Draft ENUM Validation Architecture October 2004 3.3 Cooperating Number-Range Holder The number-range holder provides VE services. The ITSP contracts the NRH for validation. 3.4 ENUM enabled Telco A broadband ISP provides VoIP services to subscribers using his own number ranges. He performs validation by reference to his subscriber database. 4. Validation Process Requirements An ENUM domain delegation to a different entity than the number holder is faulty and a potential privacy risk. Extending registration data with validation information avoids this risk, if the registry can assert its authenticity and integrity. If trust relationships is established between the registry and the VE's, then these checks can be applied regardless which VE supplied the validation information for a registrar for a given registration, and without the need for direct interaction of a VE with the registry. This simplifies the most common case (ENUM enabled telco scenario, Section 3.4) while retaining choice for registrars and avoiding a single, prescribed validation entity. To enable the registry to automatically verify validation information produced by potentially many VE's and presented by different registrars, a standardized data format for validation information is required. It establishes a communication channel between VE's and the registry without adding direct interaction and introducing another VE/registry protocol. Validation information must provide auditable non-repudiation of origin and content. Timestamps must allow to limit the validity period of the asserted right-to-use. The data format of the validation information must allow for number holder related information. This information is required to assist in recurring validation. 5. The Validation Token A validation token is a XML [6] document format for conveying validation related information from validation entities to the registry. Its attributes and associated values contain information deemed to be neccessary for asserting the right-to-use and revalidation. Mayrhofer, et al. Expires April 7, 2005 [Page 5] Internet-Draft ENUM Validation Architecture October 2004 The relevant parts of the validation token are signed by the VE using XML-Signature [3]. This signature as described in Section 5.2 allows checking authenticity and origin of a token. 5.1 Attribute description A token MUST contain the following attributes: o A single validation "serial" string uniquely identifying a validation token for a certain VE. o A single "e164number" attribute, containing the E.164 number in international format for which validation was carried out. o A single "validator" id, identifying the VE. o A single "method" id, identifying the method used by the VE for validation. o A single "registrar" id, identifying the registrar for which validation was carried out. o A single "createdate" attribute, containing the date of validation, formatted as "full-date" according to RFC3339 [4]. o A single "expiredate" attribute, marking the expiration date of the validation token, formatted as "full-date" according to RFC3339. A token MAY contain a "tokendata" section. The section contains information about the entity whose right-to-use is being asserted. o A single "organisation" attribute, containing the full name of the entity. o A single "commercialregisternumber" attribute, containing the entity's registration number. o A single "title" attribute. o A single "firstname" attribute. o A single "lastname" attribute. o A single "address" section, containing the following attributes: * A single mandatory "streetname" attribute * A single optional "streetnumber" attribute * A single optional "apartment" attribute * A single mandatory "postalcode" attribute * A single mandatory "city" attribute * A single optional "state" attribute * A single mandatory "country" attribute o up to 10 "phone" attributes, containing full E.164 numbers o up to 10 "fax" attributes, containing full E.164 numbers o up to 10 "email" attributes Basically, all attributes are optional. In case an address section is used, several components are mandatory for conformance with the E.115 [1] recommendation. The reason for this is that "computerized Mayrhofer, et al. Expires April 7, 2005 [Page 6] Internet-Draft ENUM Validation Architecture October 2004 directory assistance" accessible through the E.115 interface may be a source of validation information. 5.2 Signature The validation token is generated by a validation entity and passed via a registrar to the registry which then acts upon the content of the token. A digital signature on the token guarantees that o the token was indeed generated by the indicated VE (authenticity) o the token was not tampered with in transit (integrity) o auditing the validation process is possible (non-repudiation). The cryptographic signature on the token follows XML-DSIG [9]. As tokens might be transmitted as part of an already XML based protocol the transform as specified in [10] is used. In order to make the signature an integral part of the token the "enveloped"-signature mode is employed. The actual signature uses the RSA-SHA1 algorithm and relies on X.509 certificates. This document does not dictate a public key infrastructure. Whether the registry acts as a certificate authority, accepts certs from a public CA, or only accepts pre-registered keys is a local policy choice. 5.3 Examples 5.3.1 Unsigned token without subscriber information This format encompasses other proposals concerning ENUM validation which describe a simple flag that indicates a successful validation. +43123456789 4711 42 1 2004-10-07 2005-04-07 Mayrhofer, et al. Expires April 7, 2005 [Page 7] Internet-Draft ENUM Validation Architecture October 2004 5.3.2 Unsigned token with subscriber information +43123456789 4711 42 1 2004-10-07 2005-04-07 Demo-org Inc. DO-2345678 Dr. Max Mustermann
Lindenstrasse 42 4711 1010 Wien n/a AT
+431234412 +431234412512 mail1@example.com mail2@example.com
5.3.3 Signed token This example uses an X.509 based signature which includes the certificate of the signing validation entity. Thus the validity of Mayrhofer, et al. Expires April 7, 2005 [Page 8] Internet-Draft ENUM Validation Architecture October 2004 the signature can be verified without the need for a keyserver. For improved legibility, the example token has been reformatted, and parts of the certificate and actual signature have been removed. The text below should be considered prototypic, and is not a valid token. +43123456789 4711 42 1 2004-10-07 2005-04-07 Demo-org Inc. DO-2345678 Dr. Max Mustermann
Lindenstrasse 42 4711 1010 Wien n/a AT
+431234412 +431234412512 mail1@example.com mail2@example.com
Mayrhofer, et al. Expires April 7, 2005 [Page 9] Internet-Draft ENUM Validation Architecture October 2004 nx1li5twhfh/wrXm5JvANBxGPAg= iw+xek4sGOzI4/rlNXTvpmC1o//u2SM [...] 4wLKpao74qmgX/R2r2G5m3xoRhjmMzX+LI0Y9UywMkk= MIIDZjCCAs+gAwIBAgIBBDANBgk [...] MvwKYwhcpQ9UdM/w7VpXQqf+CEj0XSyqxGw65UsHIOijgiG/WyhSj+Lzriw7CTge P2iAJkJVC4t2XA==
6. Formal Syntax The formal syntax of the validation token is specified using XML schema notation [7][8]. Two schemas are defined: The "token core schema" contains mandatory attribute definitions, the "token data schema" defines the format of the optional "tokendata" section. Mayrhofer, et al. Expires April 7, 2005 [Page 10] Internet-Draft ENUM Validation Architecture October 2004 6.1 Token Core Schema enum.at Validation Token Format 1.0 Mayrhofer, et al. Expires April 7, 2005 [Page 11] Internet-Draft ENUM Validation Architecture October 2004 6.2 Token Data Schema enum.at Validation Token Format 1.0 optional tokendata format definition Mayrhofer, et al. Expires April 7, 2005 [Page 12] Internet-Draft ENUM Validation Architecture October 2004 Mayrhofer, et al. Expires April 7, 2005 [Page 13] Internet-Draft ENUM Validation Architecture October 2004 7. Wider applicability The basic idea of this validation token can be helpful to other registries where any request for a delegation must be accompanied by a proof of ownership. One example are all the specialized TLDs with strict rules on who qualifies for registering a domain under that TLD. Even liberal TLDs could make use of validation tokens during a sunrise phase, where only applicants with a prior right to a name are allowed to register a domain. Moving away from the domain business, telephone number portablity verification needs to solve roughly the same validation problem as the ENUM domain delegation. A formalized system based on signed tokens could replace the manual process used in many countries. 8 References [1] ITU-T, "Computerized Directory Assistance", Recommendation E.115, February 1995. [2] Faltstrom, P. and M. Mealling, "The E.164 to Uniform Resource Identifiers (URI) Dynamic Delegation Discovery System (DDDS) Application (ENUM)", RFC 3761, April 2004. [3] Eastlake, D., Reagle, J. and D. Solo, "(Extensible Markup Language) XML-Signature Syntax and Processing", RFC 3275, March Mayrhofer, et al. Expires April 7, 2005 [Page 14] Internet-Draft ENUM Validation Architecture October 2004 2002. [4] Klyne, G. and C. Newman, "Date and Time on the Internet: Timestamps", RFC 3339, July 2002. [5] Hollenbeck, S., "Extensible Provisioning Protocol (EPP)", RFC 3730, March 2004. [6] Paoli, J., Sperberg-McQueen, C., Bray, T. and E. Maler, "Extensible Markup Language (XML) 1.0 (Second Edition)", W3C FirstEdition REC-xml-20001006, October 2000. [7] Maloney, M., Beech, D., Mendelsohn, N. and H. Thompson, "XML Schema Part 1: Structures", W3C REC REC-xmlschema-1-20010502, May 2001. [8] Malhotra, A. and P. Biron, "XML Schema Part 2: Datatypes", W3C REC REC-xmlschema-2-20010502, May 2001. [9] Solo, D., Reagle, J. and D. Eastlake, "XML-Signature Syntax and Processing", W3C REC REC-xmldsig-core-20020212, February 2002. [10] 3rd, D., Boyer, J. and J. Reagle, "Exclusive XML Canonicalization Version 1.0", W3C REC REC-xml-exc-c14n-20020718, July 2002. Authors' Addresses Alexander Mayrhofer enum.at GmbH Karlsplatz 1/9 Wien A-1010 Austria Phone: +43 1 5056416 34 EMail: alexander.mayrhofer@enum.at URI: http://www.enum.at/ Mayrhofer, et al. Expires April 7, 2005 [Page 15] Internet-Draft ENUM Validation Architecture October 2004 Otmar Lendl enum.at GmbH Karlsplatz 1/9 Wien A-1010 Austria Phone: +43 1 5056416 33 EMail: otmar.lendl@enum.at URI: http://www.enum.at/ Michael Haberler Internet Foundation Austria Waehringerstrasse 3/18 Wien A-1090 Austria Phone: +43 664 4213465 EMail: mah@eunet.at URI: http://www.nic.at/ipa/ Mayrhofer, et al. Expires April 7, 2005 [Page 16] Internet-Draft ENUM Validation Architecture October 2004 Intellectual Property Statement The IETF takes no position regarding the validity or scope of any Intellectual Property Rights or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available; nor does it represent that it has made any independent effort to identify any such rights. Information on the procedures with respect to rights in RFC documents can be found in BCP 78 and BCP 79. Copies of IPR disclosures made to the IETF Secretariat and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementers or users of this specification can be obtained from the IETF on-line IPR repository at http://www.ietf.org/ipr. The IETF invites any interested party to bring to its attention any copyrights, patents or patent applications, or other proprietary rights that may cover technology that may be required to implement this standard. Please address the information to the IETF at ietf-ipr@ietf.org. Disclaimer of Validity This document and the information contained herein are provided on an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Copyright Statement Copyright (C) The Internet Society (2004). This document is subject to the rights, licenses and restrictions contained in BCP 78, and except as set forth therein, the authors retain all their rights. Acknowledgment Funding for the RFC Editor function is currently provided by the Internet Society. Mayrhofer, et al. Expires April 7, 2005 [Page 17]