<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.34 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-lassey-tigress-threat-model-01" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.1 -->
  <front>
    <title>TIGRESS Threat Model</title>
    <seriesInfo name="Internet-Draft" value="draft-lassey-tigress-threat-model-01"/>
    <author fullname="Brad Lassey">
      <organization>Google</organization>
      <address>
        <email>lassey@google.com</email>
      </address>
    </author>
    <author fullname="Casey Astiz">
      <organization>Apple</organization>
      <address>
        <email>castiz@apple.com</email>
      </address>
    </author>
    <author fullname="Dmitry Vinokurov">
      <organization>Apple</organization>
      <address>
        <email>dvinokurov@apple.com</email>
      </address>
    </author>
    <date year="2023" month="June" day="02"/>
    <area>Applications and Real-Time</area>
    <workgroup>Transfer dIGital cREdentialS Securely</workgroup>
    <keyword>tigress</keyword>
    <keyword>threat model</keyword>
    <abstract>
      <?line 65?>

<t>This document describes a threat model by which the working group can evaluate potential solutions to the problems laid out in the <eref target="https://datatracker.ietf.org/doc/charter-ietf-tigress/">TIGRESS charter</eref>.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://bslassey.github.io/tigress-threat-model/draft-lassey-tigress-threat-model.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-lassey-tigress-threat-model/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transfer dIGital cREdentialS Securely Working Group mailing list (<eref target="mailto:tigress@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tigress/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tigress/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/bslassey/tigress-threat-model"/>.</t>
    </note>
  </front>
  <middle>
    <?line 70?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The TIGRESS Working Group is <eref target="https://datatracker.ietf.org/doc/charter-ietf-tigress/">chartered</eref> to deliver a protocol for transferring copies of digital credentials. The charter specifies certain goals:</t>
      <section anchor="privacy-goals">
        <name>Privacy goals:</name>
        <ul spacing="normal">
          <li>The intermediate server should not see sensitive details of the Provisioning Information <xref target="Tigress-req-03"/></li>
          <li>The intermediate server should not be able to provision the credential itself,
acting as an intermediary for the recipient (person-in-the-middle,
impersonation attack)</li>
          <li>Aside from network-level metadata, the intermediate server should not learn
information about the sender or receiver</li>
        </ul>
      </section>
      <section anchor="security-goals">
        <name>Security goals:</name>
        <ul spacing="normal">
          <li>Allow for ensuring that only the intended recipient is able to provision the credential</li>
          <li>Allow for ensuring that the credential can only be provisioned once (anti-replay)</li>
          <li>Allow for ensuring that the sender has the intent to transfer (proof of the fact that the
initiation of the credential transfer is attributed to a valid device and a user)</li>
        </ul>
      </section>
      <section anchor="functional-goals">
        <name>Functional goals:</name>
        <ul spacing="normal">
          <li>Allow a sender to initiate a credential transfer and select an intermediary server</li>
          <li>Allow a recipient to view the transfer request with Provisioning Information <xref target="Tigress-req-03"/>, and provision the credential information associated with it upon receipt</li>
          <li>Allow a sender and a recipient to perform multiple round trip communications
within a limited time frame</li>
          <li>Not require that both the sender and recipient have connectivity to the intermediary
server at the same time</li>
          <li>Support opaque message content based on the credential type</li>
          <li>Support a variety of types of credentials, to include those adhering to
public standards (e.g., Car Connectivity Consortium) and proprietary (i.e.,
non-public or closed community) formats</li>
        </ul>
        <t>From these goals we can derive a threat model for the general problem space.</t>
      </section>
    </section>
    <section anchor="threat-model">
      <name>Threat Model</name>
      <section anchor="assets-and-data">
        <name>Assets and Data</name>
        <section anchor="credential">
          <name>Credential</name>
          <t>The credential or key that is being transferred via this protocol.</t>
        </section>
        <section anchor="intermediary-data">
          <name>Intermediary data</name>
          <t>Data that is transferred over the course of the transaction.</t>
        </section>
        <section anchor="credential-transfer-invitation">
          <name>Credential transfer invitation</name>
          <t>The initial data containing Provisioning Information <xref target="Tigress-req-03"/> transmetted to the receiver which represents an invitation to accept the transferred credential.</t>
        </section>
      </section>
    </section>
    <section anchor="users">
      <name>Users</name>
      <section anchor="sender">
        <name>Sender</name>
        <t>The user who initiates the credential transfer.</t>
      </section>
      <section anchor="receiver">
        <name>Receiver</name>
        <t>The user who is the intended recipient and accepts the invitation with the transferred credential.</t>
      </section>
      <section anchor="credential-authority">
        <name>Credential Authority</name>
        <t>The Provisioning Entity <xref target="Tigress-req-03"/> that manages the lifecycle of a credential on a device.</t>
      </section>
    </section>
    <section anchor="attackers-and-motivations">
      <name>Attackers and Motivations</name>
    </section>
    <section anchor="threats-and-mitigations">
      <name>Threats and mitigations</name>
      <table>
        <thead>
          <tr>
            <th align="left">Threat Description</th>
            <th align="left">Likelihood</th>
            <th align="left">Impact</th>
            <th align="left">Mitigations</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">An Attacker with physical access to the victim's phone initiates the transfer of a Credential to the the Attacker's device</td>
            <td align="left">MED</td>
            <td align="left">HIGH</td>
            <td align="left">
              <xref target="user-auth"/></td>
          </tr>
          <tr>
            <td align="left">Attacker intercepts or eavesdrops on sharing message</td>
            <td align="left">HIGH</td>
            <td align="left">HIGH</td>
            <td align="left">
              <xref target="secret-transport"/></td>
          </tr>
          <tr>
            <td align="left">Sender mistakenly sends to the wrong Receiver</td>
            <td align="left">HIGH</td>
            <td align="left">HIGH</td>
            <td align="left">
              <xref target="transfer-control"/></td>
          </tr>
          <tr>
            <td align="left">Sender device compromised</td>
            <td align="left">MED</td>
            <td align="left">HIGH</td>
            <td align="left">
              <xref target="transfer-control"/></td>
          </tr>
          <tr>
            <td align="left">Attacker compromises Credential Authority</td>
            <td align="left">LOW</td>
            <td align="left">HIGH</td>
            <td align="left">None</td>
          </tr>
          <tr>
            <td align="left">Credential Authority can recognize and track Sender across shares</td>
            <td align="left">HIGH</td>
            <td align="left">LOW</td>
            <td align="left">None</td>
          </tr>
          <tr>
            <td align="left">Credential Authority can recognize and track Receiver across shares</td>
            <td align="left">HIGH</td>
            <td align="left">LOW</td>
            <td align="left">None</td>
          </tr>
          <tr>
            <td align="left">Sender can recognize and track Receiver across shares</td>
            <td align="left">HIGH</td>
            <td align="left">LOW</td>
            <td align="left">None</td>
          </tr>
          <tr>
            <td align="left">Receiver can recognize and track Sender across shares</td>
            <td align="left">HIGH</td>
            <td align="left">LOW</td>
            <td align="left">None</td>
          </tr>
        </tbody>
      </table>
      <section anchor="if-an-intermediary-server-is-used">
        <name>If an intermediary server is used</name>
        <t>Some designs may rely on an intermediary server to facilitate the transfer of material. Below are threats and mitigations assuming that there is an intermediary server hosting encrypted content at an "unguessable" location.</t>
        <table>
          <thead>
            <tr>
              <th align="left">Threat Description</th>
              <th align="left">Likelihood</th>
              <th align="left">Impact</th>
              <th align="left">Mitigations</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Attacker brute forces "unguessable" location</td>
              <td align="left">LOW</td>
              <td align="left">LOW</td>
              <td align="left">
                <xref target="limited-ttl"/></td>
            </tr>
            <tr>
              <td align="left">Attacker intercepts encryption key</td>
              <td align="left">MED</td>
              <td align="left">MED</td>
              <td align="left">
                <xref target="secret-separation"/></td>
            </tr>
            <tr>
              <td align="left">Attacker intercepts encryption key and unguessable location</td>
              <td align="left">MED</td>
              <td align="left">HIGH</td>
              <td align="left">
                <xref target="group-transfer-warning"/></td>
            </tr>
            <tr>
              <td align="left">Attacker compromises intermediary server</td>
              <td align="left">LOW</td>
              <td align="left">LOW</td>
              <td align="left">
                <xref target="mailbox-content-encryption"/></td>
            </tr>
            <tr>
              <td align="left">Attacker uses intermediary server to store unrelated items (i.e. cat pictures)</td>
              <td align="left">HIGH</td>
              <td align="left">LOW</td>
              <td align="left">
                <xref target="mailbox-limits"/></td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="mitigations">
        <name>Mitigations.</name>
        <section anchor="user-auth">
          <name>User authentication at the time of transfer initiation</name>
          <t>Implementers <bcp14>SHOULD</bcp14> take sufficient precautions to ensure that the device owner is in possession of the device when initiating a transfer such as requiring authentication at the time of initition.</t>
        </section>
        <section anchor="secret-transport">
          <name>Secret to be sent securily</name>
          <t>Solution should require an end-to-end encrypted messaging channel or otherwise specify a way to send a secret out of band.</t>
        </section>
        <section anchor="transfer-control">
          <name>Transfer control</name>
          <t>Implementers should ensure any initiated attempts of credential transfer can be withdrawn or revoked at any time.</t>
        </section>
        <section anchor="limited-ttl">
          <name>Limited time-to-live for mailbox storage</name>
          <t>Limited TTL of storage, rate limiting of requests.</t>
        </section>
        <section anchor="secret-separation">
          <name>Separation of shareURL and secret</name>
          <t>Separate transmission of encryption key and unguessable location.</t>
        </section>
        <section anchor="group-transfer-warning">
          <name>Group transfer warning</name>
          <t>Implementor should warn users about transferring credentials to groups.</t>
        </section>
        <section anchor="mailbox-content-encryption">
          <name>Encrypted mailbox content</name>
          <t>Content on the server is encrypted.</t>
        </section>
        <section anchor="mailbox-limits">
          <name>Mailbox size limit and TTL</name>
          <t>Intermediary server should have tight size limits and TTLS to discourage misuse</t>
        </section>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="Tigress-req-03" target="https://github.com/dimmyvi/tigress-requirements/">
          <front>
            <title>Tigress requirements</title>
            <author initials="D." surname="Vinokurov" fullname="Dmitry Vinokurov">
              <organization/>
            </author>
            <author initials="A." surname="Pelletier" fullname="Alex Pelletier">
              <organization/>
            </author>
            <author initials="C." surname="Astiz" fullname="Casey Astiz">
              <organization/>
            </author>
            <author initials="B." surname="Lassey" fullname="Brad Lassey">
              <organization/>
            </author>
            <author initials="Y." surname="Karandikar" fullname="Yogesh Karandikar">
              <organization/>
            </author>
            <author initials="B." surname="Lassey" fullname="Brad Lassey">
              <organization/>
            </author>
            <date year="2023" month="April"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 223?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document took as inspiration the <eref target="https://github.com/dimmyvi/tigress-sample-implementation/blob/main/draft-tigress-sample-implementation.md#threat-model">threat model</eref> that was part of Dmitry Vinokurov's sample implementation document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
