<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.1.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-tigress-requirements-02" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.14.2 -->
  <front>
    <title abbrev="tigress-requirements">Transfer Digital Credentials Securely - Requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-tigress-requirements-02"/>
    <author initials="D." surname="Vinokurov" fullname="Dmitry Vinokurov">
      <organization>Apple Inc</organization>
      <address>
        <email>dvinokurov@apple.com</email>
      </address>
    </author>
    <author initials="C." surname="Astiz" fullname="Casey Astiz">
      <organization>Apple Inc</organization>
      <address>
        <email>castiz@apple.com</email>
      </address>
    </author>
    <author initials="A." surname="Pelletier" fullname="Alex Pelletier">
      <organization>Apple Inc</organization>
      <address>
        <email>a_pelletier@apple.com</email>
      </address>
    </author>
    <author initials="J. L." surname="Giraud" fullname="Jean-Luc Giraud">
      <organization>Apple Inc</organization>
      <address>
        <email>jgiraud@apple.com</email>
      </address>
    </author>
    <author initials="A." surname="Bulgakov" fullname="Alexey Bulgakov">
      <organization>Apple Inc</organization>
      <address>
        <email>abulgakov@apple.com</email>
      </address>
    </author>
    <author initials="M." surname="Byington" fullname="Matt Byington">
      <organization>Apple Inc</organization>
      <address>
        <email>mbyington@apple.com</email>
      </address>
    </author>
    <author initials="N." surname="Sha" fullname="Nick Sha">
      <organization>Alphabet Inc</organization>
      <address>
        <email>nicksha@google.com</email>
      </address>
    </author>
    <author initials="M." surname="Gerster" fullname="Manuel Gerster">
      <organization>Mercedes-Benz AG</organization>
      <address>
        <email>manuel.gerster@mercedes-benz.com</email>
      </address>
    </author>
    <date year="2022" month="September" day="30"/>
    <area>ART</area>
    <workgroup>TIGRESS</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document describes the use cases necessitating the secure transfer of digital credentials between two devices and defines general assumptions, requirements and the scope of the corresponding Tigress Internet-draft <xref target="Tigress-00"/>.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://datatracker.ietf.org/doc/draft-tigress-requirements/"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-tigress-requirements/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/dimmyvi/tigress-requirements"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>TODO Introduction</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <t>General terms:</t>
      <ul spacing="normal">
        <li>Credential information - data used to authenticate the user with an access point.</li>
        <li>Provisioning information - data transferred from Sender to Receiver device that is both necessary and sufficient for the Receiver to request a new credential from Provisioning Partner to provision it to the Receiver device.</li>
        <li>Provisioning - A process of adding a new credential to the device.</li>
        <li>Provisioning Partner - an entity which facilitates Credential Information lifecycle on a device. Lifecycle may include provisioning of credential, credential termination, credential update.</li>
        <li>Sender (device) - a device initiating a transfer of Provisioning Information to a Receiver that can provision this credential.</li>
        <li>Receiver (device) - a device that receives Provisioning Information and uses it to provision a new credential.</li>
        <li>Intermediary (server) - an intermediary server that provides a standardized and platform-independent way of transferring provisioning information between Sender and Receiver devices.</li>
      </ul>
    </section>
    <section anchor="use-cases">
      <name>Use Cases</name>
      <ul spacing="normal">
        <li>Let's say Ben owns a vehicle that supports digital keys which comply with the CCC <xref target="CCC-Digital-Key-30"/> open standard. Ben would like to let Ryan borrow the car for the weekend. Ryan and Ben are using two different mobile phones with different operating systems. In order for Ben to share his car key to Ryan for a weekend, he must transfer some data to the receiver device. The data structure shared between the two participants is defined in the CCC. In addition, the CCC requires the receiver to generate required key material and return it to the sender to sign and return back to the receiver. At this point, the receiver now has a token that will allow them to provision their new key with the car.</li>
        <li>Bob booked a room at a hotel for the weekend, but will be arriving late at night. Alice, his partner, comes to the hotel first, so Bob wants to share his key to the room with Alice. Bob and Alice are using two different mobile phones with different operating systems. In order for Bob to share his key to the hotel to Alice for a weekend, he must transfer some data to her device. The data structure shared between the two participants is proprietary to the given hotel chain (or Provisioning Partner). This data transfer is a one-time, unidirectional from Bob's device to Alice's. Once Alice receives this data, she can provision a new key to her device, making a call to Provisioning Partner to receive new credential information.</li>
      </ul>
    </section>
    <section anchor="assumptions">
      <name>Assumptions</name>
      <ul spacing="normal">
        <li>Original credential information (with cryptographic key material) <bcp14>MUST NOT</bcp14> be sent or shared. Instead, sender <bcp14>SHALL</bcp14> be transferring its approval token for Receiver to acquire new credential information.</li>
        <li>Provisioning Partner <bcp14>SHALL NOT</bcp14> allow for two users to use the same credential / cryptographic keys.</li>
        <li>Security: Communication between Sender / Receiver and Provisioning Partner <bcp14>SHOULD</bcp14> be trusted.</li>
        <li>The choice of intermediary <bcp14>SHALL</bcp14> be defined by the application initiating the credential transfer.</li>
        <li>Sender and Receiver <bcp14>SHALL</bcp14> both be able to manage the shared credential at any point by communicating with the Provisioning Partner. Credential lifecycle management is out of scope for this proposal.</li>
        <li>Any device OEM with a digital credential implementation adherent to Tigress <xref target="Tigress-00"/> <bcp14>SHALL</bcp14> be able to receive shared provisioning information, whether or not they can originate provisioning information themselves or host their own intermediary.</li>
      </ul>
    </section>
    <section anchor="requirements">
      <name>Requirements</name>
      <ul spacing="normal">
        <li>(Req-AnyPlatform) Solution <bcp14>SHOULD</bcp14> be able to communicate with any mobile device of any operating system and allow easy implementation of server-side components without requiring a specific Cloud stack.</li>
        <li>(Req-NontechnicalUX) Solution <bcp14>SHALL</bcp14> enable secure credential transfer for non technical users.</li>
        <li>(Req-SmoothUX) Solution <bcp14>SHALL</bcp14> allow for user experience where neither Sender nor Receiver is presented with raw data required only by the secure transfer protocol. The data <bcp14>SHOULD</bcp14> only be parsed programmatically and not required to be presented to the end user. This data <bcp14>SHOULD</bcp14> never be visible to said user in whichever messaging application the sender chose to initiate the transfer on. This eliminates the possibility of merely sending the requisite data inline, through an SMS or email for example, rather than leveraging an Intermediary server.</li>
        <li>(Req-Connectivity) Sender and Receiver <bcp14>SHALL</bcp14> be allowed to be online at different times. Sender and Receiver <bcp14>SHALL</bcp14> never need to be online at the same time.</li>
        <li>(Req-init) Solution <bcp14>SHOULD</bcp14> allow Sender to initiate credential transfer to Receiver over any messaging channel, with various degrees of security.</li>
        <li>(Req-P2P) A credential transfer <bcp14>SHALL</bcp14> be strictly from one device to another (group sharing is not a goal).</li>
        <li>(Req-Privacy) If Intermediary server is required - it <bcp14>SHALL</bcp14> not be able to correlate users between exchanges, or create a social graph. Intermediary server shall not be an arbiter of Identity.</li>
        <li>(Req-Security) Solution <bcp14>SHOULD</bcp14> provide security of the provisioning data transferred (MITM, brute-force attacks on the content, DDOS attacks etc).</li>
        <li>(Req-Notify) Solution <bcp14>SHOULD</bcp14> support a notification mechanism to inform devices on the content update on Intermediary server.</li>
        <li>(Req-Revoke) Solution <bcp14>SHALL</bcp14> maintain access control, allowing Sender to revoke before the share has been accepted, and for Receiver to end transfer at any time.</li>
        <li>(Req-IntermediaryProvision) If Intermediary server is required - it <bcp14>MUST</bcp14> not be able to provision credential on their own.</li>
        <li>(Req-Opaque) If Intermediary server is required - Message content between Sender and Receiver <bcp14>MUST</bcp14> be opaque to the Intermediary.</li>
        <li>(Req-ArbitraryFormat) The solution <bcp14>SHALL</bcp14> support arbitrary message formats to support both keys that implement public standards like CCC as well as proprietary implementations of digital keys.</li>
        <li>(Req-UnderstoodFormat) Both Sender application and Receiver application <bcp14>MUST</bcp14> be able to recognize the format.</li>
        <li>(Req-Simplicity) Where possible, the system <bcp14>SHOULD</bcp14> rely on simple building blocks to facilitate adoption and implementation.</li>
        <li>(Req-IntermediaryAttestation) If any Intermediary is required - it <bcp14>SHALL</bcp14> implement mechanisms to prevent abuse by share initiating device, verifying that the device is in good standing and content generated by the sender device can be trusted by the Intermediary. The trust mechanism could be proprietary or publicly verifiable ( e.g. WebAuthN).</li>
        <li>(Req-RoundTrips) Solution <bcp14>SHALL</bcp14> allow for multiple round trips or multiple reads/writes between one set of Sender and Receiver devices.</li>
        <li>(Req-ReceiverTrust) If any Intermediary is required - the Receiver device <bcp14>SHOULD</bcp14> evaluate the trustworthiness of the Intermediary using a list of trusted/approved intermediaries.</li>
        <li>(Req-Preview) Solution <bcp14>SHOULD</bcp14> allow for extensibility and discoverable extensions (preview of share invitation).</li>
        <li>(Req-RedemptionHandling) Shared Provisioning Information <bcp14>SHOULD</bcp14> route Receiver to redeem Provisioning Information using the designated Credential Management Application (e.g. Wallet).</li>
      </ul>
    </section>
    <section anchor="review-of-existing-solutions">
      <name>Review of existing solutions</name>
      <t>A number of existing solutions / protocols have been reviewed in order to be used for secure credential transfer based on the requirements: GSS-API, Kerberos, AWS S3, email, Signal. None of the existing protocols comply with the requirements; the effort of modifying the existing protocols has been accessed to be significantly higher than introducing a new solution to solve this problem. The goal of the Tigress draft <xref target="Tigress-00"/> is not to define a new encryption or secure message exchange protocol, but rather a standardized mechanism of exchanging access-specific encrypted credential information.</t>
      <section anchor="arbitrary-messaging-channel-email-whatsapp-sms-signal-etc">
        <name>Arbitrary Messaging Channel (Email / WhatsApp / SMS / Signal / etc.)</name>
        <t>The Provisioning Information <bcp14>MAY</bcp14> be sent from Sender to Receiver over an arbitrary messaging channel, but that would not provide a good user experience. Users <bcp14>MAY</bcp14> need to copy and paste the Provisioning Information, or need a special application to handle some new file type. This violates (Req-SmoothUX).
If multiple round trips were required the user would need to manually managing multiple payloads of Provisioning Information. This would be very hard for anyone non technical and greatly limit adoption. This violates (Req-NontechnicalUX).</t>
      </section>
      <section anchor="gss-api-kerberos">
        <name>GSS-API, Kerberos</name>
        <t>GSS-API <xref target="RFC2078"/> and Kerberos <xref target="RFC4120"/> are authentication technologies which could be used to authenticate Sender, Receiver and intermediary. However, as they provide strong authentication, they would allow the Intermediary server to build a social graph in violation of (Req-Privacy). Their setup also require strong coordination between the actors of the system which seems overly costly for the intended system.
AWS S3 could be used as an Intermediary server but it would force all participants to use a specific cloud service which is in violation of (Req-AnyPlatorm).</t>
      </section>
      <section anchor="signal-protocol">
        <name>Signal Protocol</name>
        <t>As a messaging protocol, Signal could be used between Sender, Receiver and Intermediary but this protocol is fairly complex and its use would most like violate (Req-Simplicity).
The system will however support the Signal service for share initiation, in line with (Req-init).</t>
      </section>
    </section>
    <section anchor="out-of-scope">
      <name>Out of Scope</name>
      <ul spacing="normal">
        <li>Identification and Authorization - solution shall not require strong identification and authentication from user (e.g. using PKI certificates).</li>
        <li>Fully stopping people from sharing malicious content ("cat pictures").</li>
        <li>Solving problem of sharing to groups.</li>
        <li>Detailing how credentials are provisioned either on a device or with a provisioning partner.</li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Normative References</name>
      <reference anchor="Tigress-00" target="https://datatracker.ietf.org/doc/draft-art-tigress/">
        <front>
          <title>Transfer Digital Credentials Securely</title>
          <author initials="D." surname="Vinokurov" fullname="Dmitry Vinokurov">
            <organization/>
          </author>
          <author initials="M." surname="Byington" fullname="Matt Byington">
            <organization/>
          </author>
          <author initials="M." surname="Lerch" fullname="Matthias Lerch">
            <organization/>
          </author>
          <author initials="A." surname="Pelletier" fullname="Alex Pelletier">
            <organization/>
          </author>
          <author initials="N." surname="Sha" fullname="Nick Sha">
            <organization/>
          </author>
          <date year="2022" month="September"/>
        </front>
      </reference>
      <reference anchor="CCC-Digital-Key-30" target="https://global-carconnectivity.org/wp-content/uploads/2021/11/CCC_Digital_Key_Whitepaper_Approved.pdf">
        <front>
          <title>Digital Key – The Future of Vehicle Access</title>
          <author>
            <organization>Car Connectivity Consortium</organization>
          </author>
          <date year="2021" month="November"/>
        </front>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner">
            <organization/>
          </author>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba">
            <organization/>
          </author>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
      <reference anchor="RFC2078">
        <front>
          <title>Generic Security Service Application Program Interface, Version 2</title>
          <author fullname="J. Linn" initials="J." surname="Linn">
            <organization/>
          </author>
          <date month="January" year="1997"/>
          <abstract>
            <t>The Generic Security Service Application Program Interface (GSS-API), as defined in RFC-1508, provides security services to callers in a generic fashion, supportable with a range of underlying mechanisms and technologies and hence allowing source-level portability of applications to different environments.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="2078"/>
        <seriesInfo name="DOI" value="10.17487/RFC2078"/>
      </reference>
      <reference anchor="RFC4120">
        <front>
          <title>The Kerberos Network Authentication Service (V5)</title>
          <author fullname="C. Neuman" initials="C." surname="Neuman">
            <organization/>
          </author>
          <author fullname="T. Yu" initials="T." surname="Yu">
            <organization/>
          </author>
          <author fullname="S. Hartman" initials="S." surname="Hartman">
            <organization/>
          </author>
          <author fullname="K. Raeburn" initials="K." surname="Raeburn">
            <organization/>
          </author>
          <date month="July" year="2005"/>
          <abstract>
            <t>This document provides an overview and specification of Version 5 of the Kerberos protocol, and it obsoletes RFC 1510 to clarify aspects of the protocol and its intended use that require more detailed or clearer explanation than was provided in RFC 1510.  This document is intended to provide a detailed description of the protocol, suitable for implementation, together with descriptions of the appropriate use of protocol messages and fields within those messages.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4120"/>
        <seriesInfo name="DOI" value="10.17487/RFC4120"/>
      </reference>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
