<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.8 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-hendrickson-privacypass-expiration-extension-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.20.1 -->
  <front>
    <title abbrev="Privacy Pass Token Expiration Extension">Privacy Pass Token Expiration Extension</title>
    <seriesInfo name="Internet-Draft" value="draft-hendrickson-privacypass-expiration-extension-02"/>
    <author fullname="Scott Hendrickson">
      <organization>Google</organization>
      <address>
        <email>scott@shendrickson.com</email>
      </address>
    </author>
    <author fullname="Christopher A. Wood">
      <organization>Cloudflare, Inc.</organization>
      <address>
        <email>caw@heapingbits.net</email>
      </address>
    </author>
    <date year="2024" month="March" day="18"/>
    <area>Security</area>
    <workgroup>Privacy Pass</workgroup>
    <keyword>token</keyword>
    <keyword>extensions</keyword>
    <abstract>
      <?line 42?>

<t>This document describes an extension for Privacy Pass that allows tokens
to encode expiration information.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-hendrickson-privacypass-expiration-extension/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Privacy Pass Working Group mailing list (<eref target="mailto:privacy-pass@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/privacy-pass/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/privacy-pass/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/chris-wood/draft-hendrickson-privacypass-expiration-extension"/>.</t>
    </note>
  </front>
  <middle>
    <?line 47?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Some Privacy Pass token types support binding additional information to
the tokens, often referred to as public metadata. <xref target="AUTH-EXTENSIONS"/> describes
an extension parameter to the basic PrivateToken HTTP authentication scheme <xref target="AUTH-SCHEME"/>
for supplying this metadata alongside a token. <xref target="EXTENDED-ISSUANCE"/> describes
variants of the basic Privacy Pass issuance protocols <xref target="BASIC-ISSUANCE"/> that
support issuing tokens with public metadata. However, there are no existing
extensions defined to make use of these protocol extensions.</t>
      <t>This document describes an extension for Privacy Pass that allows tokens
to encode expiration information. The use case and deployment considerations,
especially with respect to the resulting privacy impact, are also discussed.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="expiration-extension">
      <name>Expiration Extension</name>
      <t>The expiration extension is an extension used to convey the expiration for an issued
token. It is useful for Privacy Pass deployments that make use of cached tokens, i.e.,
those that are not bound to a specific TokenChallenge redemption context, without having
to frequently rotate issuing public keys.</t>
      <t>For example, consider a Privacy Pass deployment wherein Clients use cached tokens that
are valid for one hour. Clients could pre-fetch these tokens each hour and the Issuer
and Origin could rotate the verification key every hour to force expiration. Alternatively,
Clients could pre-fetch tokens for the entire day all at once, including an expiration
timestamp in each token to indicate the time window for which the token is valid.</t>
      <t>The value of this extension is an ExpirationTimestamp, defined as follows.</t>
      <artwork><![CDATA[
struct {
   uint64 timestamp_precision;
   uint64 timestamp;
} ExpirationTimestmap;
]]></artwork>
      <t>The ExpirationTimestmap fields are defined as follows:</t>
      <ul spacing="normal">
        <li>
          <t>"timestamp_precision" is an 8-octet integer, in network byte order, representing the granularity of the timestamp,
i.e., the target to which the timestamp is rounded for loss of precision.</t>
        </li>
        <li>
          <t>"timestamp" is an 8-octet integer, in network byte order, representing the expiration timestamp. The
expiration timestamp is the UNIX time in seconds at which a token expires, expressed in the UTC/GMT timezone (<xref section="4.1" sectionFormat="comma" target="RFC3339"/>).</t>
        </li>
      </ul>
      <t>As an example, an ExpirationTimestamp structure with the following value would be interpreted as an
expiration timestamp of 1688583600, i.e., July 05, 2023 at 19:00:00 GMT+0000, which is the timestamp
rounded to the nearest hour (timestamp_precision = 3600).</t>
      <artwork><![CDATA[
struct {
   uint64 timestamp_precision = 3600;
   uint64 timestamp = 1688583600;
} ExpirationTimestmap;
]]></artwork>
    </section>
    <section anchor="privacy">
      <name>Privacy Considerations</name>
      <t>This extension intentionally adds more information to a token that might not otherwise be
visibile to Attester, Issuer, or Origin. As such, how this information is chosen can have
an impact on Origin-Client, Issuer-Client, Attester-Origin, or redemption context unlinkability
as defined in <xref section="3.2" sectionFormat="of" target="ARCHITECTURE"/>. Mitigating risk of privacy violation requires
that the extension be constructed in a way that does not induce anonymity set partitioning,
as described in <xref section="6.1" sectionFormat="of" target="ARCHITECTURE"/>.</t>
      <t>The best way to achieve this in practice is for Clients to use the same limited sets of information
in the extension. Consistency can be achieved in a variety of ways. For example,
Client implementations might insist that all Clients use the same deterministic function for
computing the expiration timestamp, e.g., some function F(current time). This
function would round the current timestamp, resulting in a loss of precision but overall
less unique value. One way to implement this function would by rounding the timestamp
to the nearest hour, day, or week. Of course, this does not account for clock skew,
which occurs with some non-neglgiible probability in practice <xref target="CLOCK-SKEW"/>.</t>
      <t>An alternative implementation strategy for consistency is to run some sort of consistency
check to ensure that the Client uses a value that is consistent with other Clients. Several
consistency mechanisms exist; see <xref target="CONSISTENCY"/> for more information. Such an explicit
consistency check would depend less upon the Client's current clock and thus be more robust
at the cost of additional work.</t>
      <t>Orthogonal to the mechanism used to ensure consistency, it is also important that Clients
choose expiration timestamps that are shared by other Clients. Consider, for example, a
scenario where two Clients consistently choose expiration timestamps per the recommendation
above, but only one Client ever requests a token within a given expiration window. Despite
the consistency check in place, the actual value of the timestamp is still unique to one of
the Clients.</t>
      <t>The means by which implementations ensure that some minimum number of Clients share the same
expiration timestamp is a deployment-specific challenge. For example, in the Split Origin,
Attester, and Issuer deployments as described in <xref section="4.4" sectionFormat="of" target="ARCHITECTURE"/>, the Attester
is positioned to ensure that Clients do not choose consistent yet unique values. General purpose
approaches to ensure that some minimum number of Clients share the same expiration timestamp
are outside the scope of this document; indeed, this problem is not unique to Privacy Pass and
is common to other privacy-related protocols such as Oblivious HTTP <xref target="OHTTP"/>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Use of the expiration extension risks revealing additional information to parties that see the
extension, including the Attester, Issuer, and Origin. <xref target="privacy"/> discusses specific privacy
implications for use of this extension that aim to mitigate exposure of information that can
unintentionally partition the Client anonymity set and lead to Origin-Client, Issuer-Client,
Attester-Origin, or redemption context unlinkability as defined in <xref section="3.2" sectionFormat="of" target="ARCHITECTURE"/>.
General information regarding the use of extensions and their possible impact on Client privacy
can be found in <xref section="3.4.3" sectionFormat="of" target="ARCHITECTURE"/> and <xref section="6.1" sectionFormat="of" target="ARCHITECTURE"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document registers the following entry into the "Privacy Pass PrivateToken Extensions" registry.</t>
      <ul spacing="normal">
        <li>
          <t>Expiration extension
          </t>
          <ul spacing="normal">
            <li>
              <t>Type: 0x0001</t>
            </li>
            <li>
              <t>Name: Expiration</t>
            </li>
            <li>
              <t>Value: ExpirationTimestamp value as defined in <xref target="expiration-extension"/></t>
            </li>
            <li>
              <t>Reference: This document</t>
            </li>
            <li>
              <t>Notes: None</t>
            </li>
          </ul>
        </li>
      </ul>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="AUTH-EXTENSIONS">
          <front>
            <title>The PrivateToken HTTP Authentication Scheme Extensions Parameter</title>
            <author fullname="Scott Hendrickson" initials="S." surname="Hendrickson">
              <organization>Google</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare, Inc.</organization>
            </author>
            <date day="25" month="November" year="2023"/>
            <abstract>
              <t>   This document specifies a new parameter for the "PrivateToken" HTTP
   authentication scheme.  This purpose of this parameter is to carry
   extensions for Privacy Pass protocols that support public metadata.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wood-privacypass-auth-scheme-extensions-01"/>
        </reference>
        <reference anchor="AUTH-SCHEME">
          <front>
            <title>The Privacy Pass HTTP Authentication Scheme</title>
            <author fullname="Tommy Pauly" initials="T." surname="Pauly">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Steven Valdez" initials="S." surname="Valdez">
              <organization>Google LLC</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>   This document defines an HTTP authentication scheme for Privacy Pass,
   a privacy-preserving authentication mechanism used for authorization.
   The authentication scheme in this document can be used by clients to
   redeem Privacy Pass tokens with an origin.  It can also be used by
   origins to challenge clients to present Privacy Pass tokens.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-privacypass-auth-scheme-15"/>
        </reference>
        <reference anchor="EXTENDED-ISSUANCE">
          <front>
            <title>*** BROKEN REFERENCE ***</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="BASIC-ISSUANCE">
          <front>
            <title>Privacy Pass Issuance Protocol</title>
            <author fullname="Sofia Celi" initials="S." surname="Celi">
              <organization>Brave Software</organization>
            </author>
            <author fullname="Alex Davidson" initials="A." surname="Davidson">
              <organization>Brave Software</organization>
            </author>
            <author fullname="Steven Valdez" initials="S." surname="Valdez">
              <organization>Google LLC</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="3" month="October" year="2023"/>
            <abstract>
              <t>   This document specifies two variants of the two-message issuance
   protocol for Privacy Pass tokens: one that produces tokens that are
   privately verifiable using the issuance private key, and another that
   produces tokens that are publicly verifiable using the issuance
   public key.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-privacypass-protocol-16"/>
        </reference>
        <reference anchor="ARCHITECTURE">
          <front>
            <title>The Privacy Pass Architecture</title>
            <author fullname="Alex Davidson" initials="A." surname="Davidson">
              <organization>LIP</organization>
            </author>
            <author fullname="Jana Iyengar" initials="J." surname="Iyengar">
              <organization>Fastly</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="25" month="September" year="2023"/>
            <abstract>
              <t>   This document specifies the Privacy Pass architecture and
   requirements for its constituent protocols used for authorization
   based on privacy-preserving authentication mechanisms.  It describes
   the conceptual model of Privacy Pass and its protocols, its security
   and privacy goals, practical deployment models, and recommendations
   for each deployment model that helps ensure the desired security and
   privacy goals are fulfilled.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-privacypass-architecture-16"/>
        </reference>
        <reference anchor="CONSISTENCY">
          <front>
            <title>Key Consistency and Discovery</title>
            <author fullname="Alex Davidson" initials="A." surname="Davidson">
              <organization>Brave Software</organization>
            </author>
            <author fullname="Matthew Finkel" initials="M." surname="Finkel">
              <organization>The Tor Project</organization>
            </author>
            <author fullname="Martin Thomson" initials="M." surname="Thomson">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="10" month="July" year="2023"/>
            <abstract>
              <t>   This document describes the consistency requirements of protocols
   such as Privacy Pass, Oblivious DoH, and Oblivious HTTP for user
   privacy.  It presents definitions for consistency and then surveys
   mechanisms for providing consistency in varying threat models.  In
   concludes with discussion of open problems in this area.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-privacypass-key-consistency-01"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC3339">
          <front>
            <title>Date and Time on the Internet: Timestamps</title>
            <author fullname="G. Klyne" initials="G." surname="Klyne"/>
            <author fullname="C. Newman" initials="C." surname="Newman"/>
            <date month="July" year="2002"/>
            <abstract>
              <t>This document defines a date and time format for use in Internet protocols that is a profile of the ISO 8601 standard for representation of dates and times using the Gregorian calendar.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3339"/>
          <seriesInfo name="DOI" value="10.17487/RFC3339"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="CLOCK-SKEW">
          <front>
            <title>Where the Wild Warnings Are: Root Causes of Chrome HTTPS Certificate Errors</title>
            <author fullname="Mustafa Emre Acer" initials="M." surname="Acer">
              <organization>Google Inc., Mountain View, CA, USA</organization>
            </author>
            <author fullname="Emily Stark" initials="E." surname="Stark">
              <organization>Google Inc., Mountain View, CA, USA</organization>
            </author>
            <author fullname="Adrienne Porter Felt" initials="A." surname="Felt">
              <organization>Google Inc., Mountain View, CA, USA</organization>
            </author>
            <author fullname="Sascha Fahl" initials="S." surname="Fahl">
              <organization>Leibniz University Hannover, Hannover, Germany</organization>
            </author>
            <author fullname="Radhika Bhargava" initials="R." surname="Bhargava">
              <organization>Purdue University, West Lafayette, IN, USA</organization>
            </author>
            <author fullname="Bhanu Dev" initials="B." surname="Dev">
              <organization>International Institute of Information Technology, Hyderabad, Hyderabad, India</organization>
            </author>
            <author fullname="Matt Braithwaite" initials="M." surname="Braithwaite">
              <organization>Google Inc., Mountain View, CA, USA</organization>
            </author>
            <author fullname="Ryan Sleevi" initials="R." surname="Sleevi">
              <organization>Google Inc., Mountain View, CA, USA</organization>
            </author>
            <author fullname="Parisa Tabriz" initials="P." surname="Tabriz">
              <organization>Google Inc., Mountain View, CA, USA</organization>
            </author>
            <date month="October" year="2017"/>
          </front>
          <seriesInfo name="Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications" value="Security"/>
          <seriesInfo name="DOI" value="10.1145/3133956.3134007"/>
          <refcontent>ACM</refcontent>
        </reference>
        <reference anchor="OHTTP">
          <front>
            <title>*** BROKEN REFERENCE ***</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
      </references>
    </references>
    <?line 186?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document received input and feedback from Jim Laskey.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
