<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.39 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-hendrickson-privacypass-expiration-extension-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.5 -->
  <front>
    <title abbrev="Privacy Pass Token Expiration Extension">Privacy Pass Token Expiration Extension</title>
    <seriesInfo name="Internet-Draft" value="draft-hendrickson-privacypass-expiration-extension-01"/>
    <author fullname="Scott Hendrickson">
      <organization>Google</organization>
      <address>
        <email>scott@shendrickson.com</email>
      </address>
    </author>
    <author fullname="Christopher A. Wood">
      <organization>Cloudflare, Inc.</organization>
      <address>
        <email>caw@heapingbits.net</email>
      </address>
    </author>
    <date year="2023" month="August" day="07"/>
    <area>Security</area>
    <workgroup>Privacy Pass</workgroup>
    <keyword>token</keyword>
    <keyword>extensions</keyword>
    <abstract>
      <?line 42?>

<t>This document describes an extension for Privacy Pass that allows tokens
to encode expiration information.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-hendrickson-privacypass-expiration-extension/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Privacy Pass Working Group mailing list (<eref target="mailto:privacy-pass@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/privacy-pass/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/privacy-pass/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/chris-wood/draft-hendrickson-privacypass-expiration-extension"/>.</t>
    </note>
  </front>
  <middle>
    <?line 47?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Some Privacy Pass token types support binding additional information to
the tokens, often referred to as public metadata. <xref target="AUTH-EXTENSIONS"/> describes
an extension parameter to the basic PrivateToken HTTP authentication scheme <xref target="AUTH-SCHEME"/>
for supplying this metadata alongside a token. <xref target="EXTENDED-ISSUANCE"/> describes
variants of the basic Privacy Pass issuance protocols <xref target="BASIC-ISSUANCE"/> that
support issuing tokens with public metadata. However, there are no existing
extensions defined to make use of these protocol extensions.</t>
      <t>This document describes an extension for Privacy Pass that allows tokens
to encode expiration information. The use case and deployment considerations,
especially with respect to the resulting privacy impact, are also discussed.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="expiration-extension">
      <name>Expiration Extension</name>
      <t>The expiration extension is an extension used to convey the expiration for an issued
token. It is useful for Privacy Pass deployments that make use of cached tokens, i.e.,
those that are not bound to a specific TokenChallenge redemption context, without having
to frequently rotate issuing public keys.</t>
      <t>For example, consider a Privacy Pass deployment wherein Clients use cached tokens that
are valid for one hour. Clients could pre-fetch these tokens each hour and the Issuer
and Origin could rotate the verification key every hour to force expiration. Alternatively,
Clients could pre-fetch tokens for the entire day all at once, including an expiration
timestamp in each token to indicate the time window for which the token is valid.</t>
      <t>The value of this extension is an ExpirationTimestamp, defined as follows.</t>
      <artwork><![CDATA[
struct {
   uint64 timestamp_precision;
   uint64 timestamp;
} ExpirationTimestmap;
]]></artwork>
      <t>The ExpirationTimestmap fields are defined as follows:</t>
      <ul spacing="normal">
        <li>"timestamp_precision" is an 8-octet integer, in network byte order, representing the granularity of the timestamp,
i.e., the target to which the timestamp is rounded for loss of precision.</li>
        <li>"timestamp" is an 8-octet integer, in network byte order, representing the expiration timestamp. The
expiration timestamp is the UNIX time in seconds at which a token expires.</li>
      </ul>
      <t>As an example, an ExpirationTimestamp structure with the following value would be interpreted as an
expiration timestamp of 1688583600, i.e., July 05, 2023 at 19:00:00 GMT+0000, which is the timestamp
rounded to the nearest hour (timestamp_precision = 3600).</t>
      <artwork><![CDATA[
struct {
   uint64 timestamp_precision = 3600;
   uint64 timestamp = 1688583600;
} ExpirationTimestmap;
]]></artwork>
    </section>
    <section anchor="privacy">
      <name>Privacy Considerations</name>
      <t>This extension intentionally adds more information to a token that might not otherwise be
visibile to Attester, Issuer, or Origin. As such, how this information is chosen can have
an impact on Origin-Client, Issuer-Client, Attester-Origin, or redemption context unlinkability
as defined in <xref section="3.2" sectionFormat="of" target="ARCHITECTURE"/>. Mitigating risk of privacy violation requires
that the extension be constructed in a way that does not induce anonymity set partitioning,
as described in <xref section="6.1" sectionFormat="of" target="ARCHITECTURE"/>.</t>
      <t>The best way to achieve this in practice is for Clients to use the same limited sets of information
in the extension. Consistency can be achieved in a variety of ways. For example,
Client implementations might insist that all Clients use the same deterministic function for
computing the expiration timestamp, e.g., some function F(current time). This
function would round the current timestamp, resulting in a loss of precision but overall
less unique value. One way to implement this function would by rounding the timestamp
to the nearest hour, day, or week. Of course, this does not account for clock skew,
which occurs with some non-neglgiible probability in practice <xref target="CLOCK-SKEW"/>.</t>
      <t>An alternative implementation strategy for consistency is to run some sort of consistency
check to ensure that the Client uses a value that is consistent with other Clients. Several
consistency mechanisms exist; see <xref target="CONSISTENCY"/> for more information. Such an explicit
consistency check would depend less upon the Client's current clock and thus be more robust
at the cost of additional work.</t>
      <t>Orthogonal to the mechanism used to ensure consistency, it is also important that Clients
choose expiration timestamps that are shared by other Clients. Consider, for example, a
scenario where two Clients consistently choose expiration timestamps per the recommendation
above, but only one Client ever requests a token within a given expiration window. Despite
the consistency check in place, the actual value of the timestamp is still unique to one of
the Clients.</t>
      <t>The means by which implementations ensure that some minimum number of Clients share the same
expiration timestamp is a deployment-specific challenge. For example, in the Split Origin,
Attester, and Issuer deployments as described in <xref section="4.4" sectionFormat="of" target="ARCHITECTURE"/>, the Attester
is positioned to ensure that Clients do not choose consistent yet unique values. General purpose
approaches to ensure that some minimum number of Clients share the same expiration timestamp
are outside the scope of this document; indeed, this problem is not unique to Privacy Pass and
is common to other privacy-related protocols such as Oblivious HTTP <xref target="OHTTP"/>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Use of the expiration extension risks revealing additional information to parties that see the
extension, including the Attester, Issuer, and Origin. <xref target="privacy"/> discusses specific privacy
implications for use of this extension that aim to mitigate exposure of information that can
unintentionally partition the Client anonymity set and lead to Origin-Client, Issuer-Client,
Attester-Origin, or redemption context unlinkability as defined in <xref section="3.2" sectionFormat="of" target="ARCHITECTURE"/>.
General information regarding the use of extensions and their possible impact on Client privacy
can be found in <xref section="3.4.3" sectionFormat="of" target="ARCHITECTURE"/> and <xref section="6.1" sectionFormat="of" target="ARCHITECTURE"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document registers the following entry into the "Privacy Pass PrivateToken Extensions" registry.</t>
      <ul spacing="normal">
        <li>
          <t>Expiration extension
          </t>
          <ul spacing="normal">
            <li>Type: 0x0001</li>
            <li>Name: Expiration</li>
            <li>Value: ExpirationTimestamp value as defined in <xref target="expiration-extension"/></li>
            <li>Reference: This document</li>
            <li>Notes: None</li>
          </ul>
        </li>
      </ul>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="AUTH-EXTENSIONS">
          <front>
            <title>The PrivateToken HTTP Authentication Scheme Extensions Parameter</title>
            <author fullname="Scott Hendrickson" initials="S." surname="Hendrickson">
              <organization>Google</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare, Inc.</organization>
            </author>
            <date day="10" month="July" year="2023"/>
            <abstract>
              <t>   This document specifies a new parameter for the "PrivateToken" HTTP
   authentication scheme.  This purpose of this parameter is to carry
   extensions for Privacy Pass protocols that support public metadata.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wood-privacypass-auth-scheme-extensions-00"/>
        </reference>
        <reference anchor="AUTH-SCHEME">
          <front>
            <title>The Privacy Pass HTTP Authentication Scheme</title>
            <author fullname="Tommy Pauly" initials="T." surname="Pauly">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Steven Valdez" initials="S." surname="Valdez">
              <organization>Google LLC</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="23" month="June" year="2023"/>
            <abstract>
              <t>   This document defines an HTTP authentication scheme that can be used
   by clients to redeem Privacy Pass tokens with an origin.  It can also
   be used by origins to challenge clients to present an acceptable
   Privacy Pass token.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-privacypass-auth-scheme-11"/>
        </reference>
        <reference anchor="EXTENDED-ISSUANCE">
          <front>
            <title>*** BROKEN REFERENCE ***</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="BASIC-ISSUANCE">
          <front>
            <title>Privacy Pass Issuance Protocol</title>
            <author fullname="Sofia Celi" initials="S." surname="Celi">
              <organization>Brave Software</organization>
            </author>
            <author fullname="Alex Davidson" initials="A." surname="Davidson">
              <organization>Brave Software</organization>
            </author>
            <author fullname="Steven Valdez" initials="S." surname="Valdez">
              <organization>Google LLC</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="26" month="June" year="2023"/>
            <abstract>
              <t>   This document specifies two variants of the two-message issuance
   protocol for Privacy Pass tokens: one that produces tokens that are
   privately verifiable using the issuance private key, and another that
   produces tokens that are publicly verifiable using the issuance
   public key.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-privacypass-protocol-11"/>
        </reference>
        <reference anchor="ARCHITECTURE">
          <front>
            <title>The Privacy Pass Architecture</title>
            <author fullname="Alex Davidson" initials="A." surname="Davidson">
              <organization>LIP</organization>
            </author>
            <author fullname="Jana Iyengar" initials="J." surname="Iyengar">
              <organization>Fastly</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="15" month="June" year="2023"/>
            <abstract>
              <t>   This document specifies the Privacy Pass architecture and
   requirements for its constituent protocols used for constructing
   privacy-preserving authentication mechanisms.  It provides
   recommendations on how the architecture should be deployed to ensure
   the privacy of clients and the security of all participating
   entities.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-privacypass-architecture-13"/>
        </reference>
        <reference anchor="CONSISTENCY">
          <front>
            <title>Key Consistency and Discovery</title>
            <author fullname="Alex Davidson" initials="A." surname="Davidson">
              <organization>Brave Software</organization>
            </author>
            <author fullname="Matthew Finkel" initials="M." surname="Finkel">
              <organization>The Tor Project</organization>
            </author>
            <author fullname="Martin Thomson" initials="M." surname="Thomson">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="10" month="July" year="2023"/>
            <abstract>
              <t>   This document describes the consistency requirements of protocols
   such as Privacy Pass, Oblivious DoH, and Oblivious HTTP for user
   privacy.  It presents definitions for consistency and then surveys
   mechanisms for providing consistency in varying threat models.  In
   concludes with discussion of open problems in this area.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-privacypass-key-consistency-01"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="CLOCK-SKEW">
          <front>
            <title>Where the Wild Warnings Are: Root Causes of Chrome HTTPS Certificate Errors</title>
            <author fullname="Mustafa Emre Acer" initials="M." surname="Acer">
              <organization>Google Inc., Mountain View, CA, USA</organization>
            </author>
            <author fullname="Emily Stark" initials="E." surname="Stark">
              <organization>Google Inc., Mountain View, CA, USA</organization>
            </author>
            <author fullname="Adrienne Porter Felt" initials="A." surname="Felt">
              <organization>Google Inc., Mountain View, CA, USA</organization>
            </author>
            <author fullname="Sascha Fahl" initials="S." surname="Fahl">
              <organization>Leibniz University Hannover, Hannover, Germany</organization>
            </author>
            <author fullname="Radhika Bhargava" initials="R." surname="Bhargava">
              <organization>Purdue University, West Lafayette, IN, USA</organization>
            </author>
            <author fullname="Bhanu Dev" initials="B." surname="Dev">
              <organization>International Institute of Information Technology, Hyderabad, Hyderabad, India</organization>
            </author>
            <author fullname="Matt Braithwaite" initials="M." surname="Braithwaite">
              <organization>Google Inc., Mountain View, CA, USA</organization>
            </author>
            <author fullname="Ryan Sleevi" initials="R." surname="Sleevi">
              <organization>Google Inc., Mountain View, CA, USA</organization>
            </author>
            <author fullname="Parisa Tabriz" initials="P." surname="Tabriz">
              <organization>Google Inc., Mountain View, CA, USA</organization>
            </author>
            <date month="October" year="2017"/>
          </front>
          <seriesInfo name="Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications" value="Security"/>
          <seriesInfo name="DOI" value="10.1145/3133956.3134007"/>
          <refcontent>ACM</refcontent>
        </reference>
        <reference anchor="OHTTP">
          <front>
            <title>*** BROKEN REFERENCE ***</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
      </references>
    </references>
    <?line 186?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document received input and feedback from Jim Laskey.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
