<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.34 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-lassey-tigress-threat-model-02" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.2 -->
  <front>
    <title>TIGRESS Threat Model</title>
    <seriesInfo name="Internet-Draft" value="draft-lassey-tigress-threat-model-02"/>
    <author fullname="Brad Lassey">
      <organization>Google</organization>
      <address>
        <email>lassey@google.com</email>
      </address>
    </author>
    <author fullname="Casey Astiz">
      <organization>Apple</organization>
      <address>
        <email>castiz@apple.com</email>
      </address>
    </author>
    <author fullname="Dmitry Vinokurov">
      <organization>Apple</organization>
      <address>
        <email>dvinokurov@apple.com</email>
      </address>
    </author>
    <author fullname="Yogesh Karandikar">
      <organization>Apple</organization>
      <address>
        <email>ykarandikar@apple.com</email>
      </address>
    </author>
    <date year="2023" month="June" day="05"/>
    <area>Applications and Real-Time</area>
    <workgroup>Transfer dIGital cREdentialS Securely</workgroup>
    <keyword>tigress</keyword>
    <keyword>threat model</keyword>
    <abstract>
      <?line 68?>

<t>This document describes a threat model by which the working group can evaluate potential solutions to the problems laid out in the <eref target="https://datatracker.ietf.org/doc/charter-ietf-tigress/">TIGRESS charter</eref>.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://bslassey.github.io/tigress-threat-model/draft-lassey-tigress-threat-model.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-lassey-tigress-threat-model/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transfer dIGital cREdentialS Securely Working Group mailing list (<eref target="mailto:tigress@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tigress/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tigress/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/bslassey/tigress-threat-model"/>.</t>
    </note>
  </front>
  <middle>
    <?line 73?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The TIGRESS Working Group is <eref target="https://datatracker.ietf.org/doc/charter-ietf-tigress/">chartered</eref> to deliver a protocol for transferring copies of digital credentials. The charter specifies certain goals:</t>
      <section anchor="privacy-goals">
        <name>Privacy goals:</name>
        <ul spacing="normal">
          <li>The intermediate server should not see sensitive details of the Provisioning Information <xref target="Tigress-req-03"/></li>
          <li>The intermediate server should not be able to provision the credential itself,
acting as an intermediary for the recipient (person-in-the-middle,
impersonation attack)</li>
          <li>Aside from network-level metadata, the intermediate server should not learn
information about the sender or receiver</li>
        </ul>
      </section>
      <section anchor="security-goals">
        <name>Security goals:</name>
        <ul spacing="normal">
          <li>Allow for ensuring that only the intended recipient is able to provision the credential</li>
          <li>Allow for ensuring that the credential can only be provisioned once (anti-replay)</li>
          <li>Allow for ensuring that the sender has the intent to transfer (proof of the fact that the
initiation of the credential transfer is attributed to a valid device and a user)</li>
        </ul>
      </section>
      <section anchor="functional-goals">
        <name>Functional goals:</name>
        <ul spacing="normal">
          <li>Allow a sender to initiate a credential transfer and select an intermediary server</li>
          <li>Allow a recipient to view the transfer request with Provisioning Information <xref target="Tigress-req-03"/>, and provision the credential information associated with it upon receipt</li>
          <li>Allow a sender and a recipient to perform multiple round trip communications
within a limited time frame</li>
          <li>Not require that both the sender and recipient have connectivity to the intermediary
server at the same time</li>
          <li>Support opaque message content based on the credential type</li>
          <li>Support a variety of types of credentials, to include those adhering to
public standards (e.g., Car Connectivity Consortium) and proprietary (i.e.,
non-public or closed community) formats</li>
        </ul>
        <t>From these goals we can derive a threat model for the general problem space.</t>
      </section>
    </section>
    <section anchor="threat-model">
      <name>Threat Model</name>
      <section anchor="assets-and-data">
        <name>Assets and Data</name>
        <section anchor="credential">
          <name>Credential</name>
          <t>A digital credential <xref target="Tigress-req-03"/> is composed of Cryptographic material and other data that enables an user to access a property.</t>
        </section>
        <section anchor="intermediary-data">
          <name>Intermediary data</name>
          <t>Data that is exchanged over the course of credential transfer.</t>
        </section>
        <section anchor="credential-transfer-invitation">
          <name>Credential transfer invitation</name>
          <t>The initial data containing Provisioning Information <xref target="Tigress-req-03"/> sent to the receiver. It represents an invitation to accept the transfer of the credential.</t>
        </section>
      </section>
    </section>
    <section anchor="users">
      <name>Users</name>
      <section anchor="sender">
        <name>Sender</name>
        <t>The user who initiates the credential transfer.</t>
      </section>
      <section anchor="receiver">
        <name>Receiver</name>
        <t>The user who is the intended recipient and accepts the invitation with the transferred credential.</t>
      </section>
      <section anchor="credential-authority">
        <name>Credential Authority</name>
        <t>The Provisioning Entity <xref target="Tigress-req-03"/> that manages the lifecycle of a credential on a device.</t>
      </section>
    </section>
    <section anchor="attackers-and-motivations">
      <name>Attackers and Motivations</name>
    </section>
    <section anchor="threats-and-mitigations">
      <name>Threats and mitigations</name>
      <table>
        <thead>
          <tr>
            <th align="left">Threat Description</th>
            <th align="left">Likelihood</th>
            <th align="left">Impact</th>
            <th align="left">Mitigations</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">An Attacker with physical access to the victim's phone initiates the transfer of a Credential to the the Attacker's device</td>
            <td align="left">MED</td>
            <td align="left">HIGH</td>
            <td align="left">
              <xref target="user-auth"/></td>
          </tr>
          <tr>
            <td align="left">Attacker intercepts or eavesdrops on sharing message</td>
            <td align="left">HIGH</td>
            <td align="left">HIGH</td>
            <td align="left">
              <xref target="secret-transport"/></td>
          </tr>
          <tr>
            <td align="left">Sender mistakenly sends to the wrong Receiver</td>
            <td align="left">HIGH</td>
            <td align="left">HIGH</td>
            <td align="left">
              <xref target="transfer-control"/></td>
          </tr>
          <tr>
            <td align="left">Sender device compromised</td>
            <td align="left">MED</td>
            <td align="left">HIGH</td>
            <td align="left">
              <xref target="transfer-control"/></td>
          </tr>
          <tr>
            <td align="left">Attacker compromises Credential Authority</td>
            <td align="left">LOW</td>
            <td align="left">HIGH</td>
            <td align="left">None</td>
          </tr>
          <tr>
            <td align="left">Credential Authority can recognize and track Sender across shares</td>
            <td align="left">HIGH</td>
            <td align="left">LOW</td>
            <td align="left">None</td>
          </tr>
          <tr>
            <td align="left">Credential Authority can recognize and track Receiver across shares</td>
            <td align="left">HIGH</td>
            <td align="left">LOW</td>
            <td align="left">None</td>
          </tr>
          <tr>
            <td align="left">Sender can recognize and track Receiver across shares</td>
            <td align="left">HIGH</td>
            <td align="left">LOW</td>
            <td align="left">None</td>
          </tr>
          <tr>
            <td align="left">Receiver can recognize and track Sender across shares</td>
            <td align="left">HIGH</td>
            <td align="left">LOW</td>
            <td align="left">None</td>
          </tr>
        </tbody>
      </table>
      <section anchor="if-an-intermediary-server-is-used">
        <name>If an intermediary server is used</name>
        <t>Some designs may rely on an intermediary server to facilitate the transfer of material. Below are threats and mitigations assuming that there is an intermediary server hosting encrypted content at an "unguessable" location.</t>
        <table>
          <thead>
            <tr>
              <th align="left">Threat Description</th>
              <th align="left">Likelihood</th>
              <th align="left">Impact</th>
              <th align="left">Mitigations</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Attacker brute forces "unguessable" location</td>
              <td align="left">LOW</td>
              <td align="left">LOW</td>
              <td align="left">
                <xref target="limited-ttl"/></td>
            </tr>
            <tr>
              <td align="left">Attacker intercepts encryption key</td>
              <td align="left">MED</td>
              <td align="left">MED</td>
              <td align="left">
                <xref target="secret-separation"/></td>
            </tr>
            <tr>
              <td align="left">Attacker intercepts encryption key and unguessable location</td>
              <td align="left">MED</td>
              <td align="left">HIGH</td>
              <td align="left">
                <xref target="group-transfer-warning"/></td>
            </tr>
            <tr>
              <td align="left">Attacker compromises intermediary server</td>
              <td align="left">LOW</td>
              <td align="left">LOW</td>
              <td align="left">
                <xref target="mailbox-content-encryption"/></td>
            </tr>
            <tr>
              <td align="left">Attacker uses intermediary server to store unrelated items (i.e. cat pictures)</td>
              <td align="left">HIGH</td>
              <td align="left">LOW</td>
              <td align="left">
                <xref target="mailbox-limits"/></td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="mitigations">
        <name>Mitigations.</name>
        <section anchor="user-auth">
          <name>User authentication at the time of transfer initiation</name>
          <t>Implementers <bcp14>SHOULD</bcp14> take sufficient precautions to ensure that the device owner is in possession of the device when initiating a transfer such as requiring authentication at the time of initiation.</t>
        </section>
        <section anchor="secret-transport">
          <name>Secret to be sent securely</name>
          <t>Solution should require an end-to-end encrypted messaging channel or otherwise specify a way to send a secret out of band.</t>
        </section>
        <section anchor="transfer-control">
          <name>Transfer control</name>
          <t>Implementers should ensure any initiated attempts of credential transfer can be withdrawn or revoked at any time.</t>
        </section>
        <section anchor="limited-ttl">
          <name>Limited time-to-live for mailbox storage</name>
          <t>Limited TTL of storage, rate limiting of requests.</t>
        </section>
        <section anchor="secret-separation">
          <name>Separation of shareURL and secret</name>
          <t>Separate transmission of encryption key and unguessable location.</t>
        </section>
        <section anchor="group-transfer-warning">
          <name>Group transfer warning</name>
          <t>Implementor should warn users about transferring credentials to groups.</t>
        </section>
        <section anchor="mailbox-content-encryption">
          <name>Encrypted mailbox content</name>
          <t>Content on the server is encrypted.</t>
        </section>
        <section anchor="mailbox-limits">
          <name>Mailbox size limit and TTL</name>
          <t>Intermediary server should have tight size limits and TTLS to discourage misuse</t>
        </section>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="Tigress-req-03" target="https://github.com/dimmyvi/tigress-requirements/">
          <front>
            <title>Tigress requirements</title>
            <author initials="D." surname="Vinokurov" fullname="Dmitry Vinokurov">
              <organization/>
            </author>
            <author initials="A." surname="Pelletier" fullname="Alex Pelletier">
              <organization/>
            </author>
            <author initials="C." surname="Astiz" fullname="Casey Astiz">
              <organization/>
            </author>
            <author initials="B." surname="Lassey" fullname="Brad Lassey">
              <organization/>
            </author>
            <author initials="Y." surname="Karandikar" fullname="Yogesh Karandikar">
              <organization/>
            </author>
            <date year="2023" month="April"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 226?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document took as inspiration the <eref target="https://github.com/dimmyvi/tigress-sample-implementation/blob/main/draft-tigress-sample-implementation.md#threat-model">threat model</eref> that was part of Dmitry Vinokurov's sample implementation document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
