| Internet-Draft | Phishing-Resistant MFA | November 2025 |
| Brown | Expires 7 May 2026 | [Page] |
This draft introduces a phishing-resistant phone number attestation mechanism for multi-factor authentication (MFA). Conceptually similar to WebAuthn, it uses origin-bound cryptographic challenges to ensure that users only attest ownership of their phone numbers to legitimate relying parties. The protocol leverages network-operator-issued verifiable credentials (VCs) that cryptographically bind phone number ownership to a user's device. Applications present origin-scoped challenges that users sign using their VC, ensuring secure, domain-specific authentication and mitigating replay, relay, and phishing attacks- without relying on SMS-based one-time passwords (OTPs).¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 7 May 2026.¶
Copyright (c) 2025 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
Multi-factor authentication (MFA) is considered a best practice for preserving application security. In organizational authentication settings, secure MFA implementations (e.g., FIDO) can be implemented on the basis of a pre-established trust relationship (e.g., possession of a trusted device, authenticator, etc). However, end-user applications generally lack this pre-established trust relationship, and must instead bootstrap MFA using a user's email or phone number.¶
One of the most widely-adopted methods to implement phone-based MFA is SMS-based one time passwords (OTPs). This method is convenient and widely-adopted, but is vulnerable to various phishing attacks and domain spoofing. For example, a threat actor can create a fake login or password reset screen (domain spoofing) to trick a user into initiating an MFA request. The attacker intercepts the legitimate OTP sent to the user's device and uses it to gain access to the user's account.¶
These vectors are enabled because two attestations fail to happen:¶
This document proposes a mechanism to mitigate the risk of domain spoofing/SMS-phishing via an extension of [I-D.song-spice-telecom-usecases].¶
An application seeking to authenticate the user generates a unique cryptographic challenge and presents this to the user. The cryptographic challenge is bound to the relying party using WebAuthn-like origin semantics (i.e., RP ID/origin), limiting the usefulness of relayed or replayed material against other domains.¶
https://<rp_id>/.well-known/phone-attest).¶
Implementations are encouraged to bind proofs to the requesting HTTP session (e.g., include a session-scoped nonce) so that successful verification upgrades the same session that initiated the challenge.¶
If the application receives a cryptographic proof by the above method, the application can be assured that (i) the user completed the challenge while viewing a page hosted by the backend (per origin checks aligned with WebAuthn semantics), and (ii) the user is in possession of a specific phone number:¶
This draft does not supplant or modify any existing document.¶
This Internet-Draft is intended to motivate changes proposed in draft-ietf-spice-sd-cwt-04 and draft-song-spice-telecom-usecases-00. A full evaluation of security considerations of this change is necessary and appropriate should these changes be promulgated into an implementable proposal. Number assignment and lifecycle considerations (e.g., SIM swap and recycling) rely on carrier-issued attestations that should be considered when utilizing the proposed mechanisms.¶
This draft makes no request of the IANA.¶