<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.1.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-tigress-requirements-03" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.2 -->
  <front>
    <title abbrev="tigress-requirements">Transfer Digital Credentials Securely - Requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-tigress-requirements-03"/>
    <author initials="D." surname="Vinokurov" fullname="Dmitry Vinokurov">
      <organization>Apple Inc</organization>
      <address>
        <email>dvinokurov@apple.com</email>
      </address>
    </author>
    <author initials="C." surname="Astiz" fullname="Casey Astiz">
      <organization>Apple Inc</organization>
      <address>
        <email>castiz@apple.com</email>
      </address>
    </author>
    <author initials="A." surname="Pelletier" fullname="Alex Pelletier">
      <organization>Apple Inc</organization>
      <address>
        <email>a_pelletier@apple.com</email>
      </address>
    </author>
    <author initials="J. L." surname="Giraud" fullname="Jean-Luc Giraud">
      <organization>Apple Inc</organization>
      <address>
        <email>jgiraud@apple.com</email>
      </address>
    </author>
    <author initials="A." surname="Bulgakov" fullname="Alexey Bulgakov">
      <organization>Apple Inc</organization>
      <address>
        <email>abulgakov@apple.com</email>
      </address>
    </author>
    <author initials="M." surname="Byington" fullname="Matt Byington">
      <organization>Apple Inc</organization>
      <address>
        <email>mbyington@apple.com</email>
      </address>
    </author>
    <author initials="N." surname="Sha" fullname="Nick Sha">
      <organization>Alphabet Inc</organization>
      <address>
        <email>nicksha@google.com</email>
      </address>
    </author>
    <author initials="M." surname="Gerster" fullname="Manuel Gerster">
      <organization>Mercedes-Benz AG</organization>
      <address>
        <email>manuel.gerster@mercedes-benz.com</email>
      </address>
    </author>
    <date year="2022" month="November" day="06"/>
    <area>ART</area>
    <workgroup>TIGRESS</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document describes the use cases necessitating the secure transfer of digital credentials between two devices and defines general assumptions, requirements and the scope of the corresponding Tigress Internet-draft <xref target="Tigress-00"/>.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://datatracker.ietf.org/doc/draft-tigress-requirements/"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-tigress-requirements/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/dimmyvi/tigress-requirements"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>TODO Introduction</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <t>General terms:</t>
      <ul spacing="normal">
        <li>Credential information - data used to authenticate the user with an access point.</li>
        <li>Provisioning information - data transferred from Sender to Receiver device that is both necessary and sufficient for the Receiver to request a new credential from Provisioning Partner to provision it to the Receiver device.</li>
        <li>Provisioning - A process of adding a new credential to the device.</li>
        <li>Provisioning Partner - an entity which facilitates Credential Information lifecycle on a device. Lifecycle may include provisioning of credential, credential termination, credential update.</li>
        <li>Sender (device) - a device initiating a transfer of Provisioning Information to a Receiver that can provision this credential.</li>
        <li>Receiver (device) - a device that receives Provisioning Information and uses it to provision a new credential.</li>
        <li>Intermediary (server) - an intermediary server that provides a standardized and platform-independent way of transferring provisioning information between Sender and Receiver devices.</li>
      </ul>
    </section>
    <section anchor="use-cases">
      <name>Use Cases</name>
      <ul spacing="normal">
        <li>Let's say Ben owns a vehicle that supports digital keys which comply with the CCC <xref target="CCC-Digital-Key-30"/> open standard. Ben would like to let Ryan borrow the car for the weekend. Ryan and Ben are using two different mobile phones with different operating systems. In order for Ben to share his car key to Ryan for a weekend, he must transfer some data to the receiver device. The data structure shared between the two participants is defined in the CCC. In addition, the CCC requires the receiver to generate required key material and return it to the sender to sign and return back to the receiver. At this point, the receiver now has a token that will allow them to provision their new key with the car.</li>
        <li>Bob booked a room at a hotel for the weekend, but will be arriving late at night. Alice, his partner, comes to the hotel first, so Bob wants to share his key to the room with Alice. Bob and Alice are using two different mobile phones with different operating systems. In order for Bob to share his key to the hotel to Alice for a weekend, he must transfer some data to her device. The data structure shared between the two participants is proprietary to the given hotel chain (or Provisioning Partner). This data transfer is a one-time, unidirectional from Bob's device to Alice's. Once Alice receives this data, she can provision a new key to her device, making a call to Provisioning Partner to receive new credential information.</li>
      </ul>
    </section>
    <section anchor="relationships">
      <name>Relationships</name>
      <t><tt>mermaid
sequenceDiagram
    actor S as Sender
    participant I as Intermediary
    actor R as Receiver
    S -&gt;&gt; I : upload credential data
    break Generic messaging channel
      S -&gt;&gt; R : send invite
    end
    Loop Provision credential
      R -&gt;&gt; I : request credential data
      I -&gt;&gt; R : deliver credential data
    end
</tt></t>
    </section>
    <section anchor="assumptions">
      <name>Assumptions</name>
      <ul spacing="normal">
        <li>Original credential information (with cryptographic key material) <bcp14>MUST NOT</bcp14> be sent or shared. Instead, sender <bcp14>SHALL</bcp14> be transferring its approval token for Receiver to acquire new credential information.</li>
        <li>Provisioning Partner <bcp14>SHALL NOT</bcp14> allow for two users to use the same credential / cryptographic keys.</li>
        <li>Security: Communication between Sender / Receiver and Provisioning Partner <bcp14>SHOULD</bcp14> be trusted.</li>
        <li>The choice of intermediary <bcp14>SHALL</bcp14> be defined by the application initiating the credential transfer.</li>
        <li>Sender and Receiver <bcp14>SHALL</bcp14> both be able to manage the shared credential at any point by communicating with the Provisioning Partner. Credential lifecycle management is out of scope for this proposal.</li>
        <li>Any device OEM with a digital credential implementation adherent to Tigress <xref target="Tigress-00"/> <bcp14>SHALL</bcp14> be able to receive shared provisioning information, whether or not they can originate provisioning information themselves or host their own intermediary.</li>
        <li>Provisioning a credential on the Receiver <bcp14>MAY</bcp14> require multiple round trips.</li>
      </ul>
    </section>
    <section anchor="requirements">
      <name>Requirements</name>
      <ul spacing="normal">
        <li>(Req-Connectivity) Sender and Receiver <bcp14>SHALL</bcp14> be allowed to be online at different times. Sender and Receiver <bcp14>SHALL</bcp14> never need to be online at the same time.</li>
        <li>(Req-init) Solution <bcp14>SHOULD</bcp14> allow Sender to send the share invitation to Receiver over any messaging channel, with various degrees of security.</li>
        <li>(Req-P2P) A goal of credential transfer covered in this document <bcp14>SHALL</bcp14> include transfer from one device to another (group sharing <bcp14>SHALL</bcp14> not be a goal).</li>
        <li>(Req-Security) Solution <bcp14>SHOULD</bcp14> provide security of the provisioning data transferred (confidentiality, integrity and availability).</li>
        <li>(Req-Revoke) Solution <bcp14>SHALL</bcp14> maintain access control, allowing Sender to revoke before the share has been accepted, and for Receiver to end transfer at any time.</li>
        <li>(Req-ArbitraryFormat) The solution <bcp14>SHALL</bcp14> support arbitrary message formats to support both keys that implement public standards like CCC as well as proprietary implementations of digital keys.</li>
        <li>(Req-UnderstoodFormat) Both Sender application and Receiver application <bcp14>MUST</bcp14> be able to recognize the format.</li>
        <li>(Req-RoundTrips) Solution <bcp14>SHALL</bcp14> allow for multiple round trips or multiple reads/writes between one set of Sender and Receiver devices.</li>
        <li>(Req-Preview) Solution <bcp14>SHOULD</bcp14> allow for extensibility and discoverable extensions (preview of share invitation).</li>
        <li>(Req-RedemptionHandling) Shared Provisioning Information <bcp14>SHOULD</bcp14> route Receiver to redeem Provisioning Information using the designated Credential Management Application (e.g. Wallet).</li>
      </ul>
      <section anchor="intermediary-server-requirments">
        <name>Intermediary server requirments</name>
        <t>If the solution requires an intermediary server, it should have the following requirements.</t>
        <ul spacing="normal">
          <li>(Req-Privacy) An Intermediary server <bcp14>SHALL</bcp14> not be able to correlate users between exchanges, or create a social graph. Intermediary server shall not be an arbiter of Identity.</li>
          <li>(Req-Notify) Solution <bcp14>SHOULD</bcp14> support a notification mechanism to inform devices on the content update on Intermediary server.</li>
          <li>(Req-IntermediaryProvision) An Intermediary server <bcp14>MUST</bcp14> not be able to provision credential on their own.</li>
          <li>(Req-Opaque) Message content between Sender and Receiver <bcp14>MUST</bcp14> be opaque to an Intermediary.</li>
          <li>(Req-IntermediaryAttestation) An Intermediary <bcp14>SHALL</bcp14> implement mechanisms to prevent abuse by share initiating device, verifying that the device is in good standing and content generated by the sender device can be trusted by the Intermediary. The trust mechanism could be proprietary or publicly verifiable ( e.g. WebAuthN).</li>
          <li>(Req-ReceiverTrust) The Receiver device <bcp14>SHOULD</bcp14> be able to evaluate the trustworthiness of the Intermediary using a list of trusted/approved intermediaries.</li>
        </ul>
      </section>
    </section>
    <section anchor="review-of-existing-solutions">
      <name>Review of existing solutions</name>
      <t>A number of existing solutions / protocols have been reviewed in order to be used for secure credential transfer based on the requirements: GSS-API, Kerberos, AWS S3, email, Signal. None of the existing protocols comply with the requirements; the effort of modifying the existing protocols has been accessed to be significantly higher than introducing a new solution to solve this problem. The goal of the Tigress draft <xref target="Tigress-00"/> is not to define a new encryption or secure message exchange protocol, but rather a standardized mechanism of exchanging access-specific encrypted credential information.</t>
      <section anchor="arbitrary-messaging-channel-email-whatsapp-sms-signal-etc">
        <name>Arbitrary Messaging Channel (Email / WhatsApp / SMS / Signal / etc.)</name>
        <t>The Provisioning Information <bcp14>MAY</bcp14> be sent from Sender to Receiver over an arbitrary messaging channel that supports binary file transfer, but this would not support provisioning flows which require multiple round trips as requied by (Req-RoundTrips).</t>
      </section>
      <section anchor="gss-api-kerberos">
        <name>GSS-API, Kerberos</name>
        <t>GSS-API <xref target="RFC2078"/> and Kerberos <xref target="RFC4120"/> are authentication technologies which could be used to authenticate Sender, Receiver and intermediary. However, as they provide strong authentication, they would allow the Intermediary server to build a social graph in violation of (Req-Privacy). Their setup also require strong coordination between the actors of the system which seems overly costly for the intended system.
AWS S3 could be used as an Intermediary server but it would force all participants to use a specific cloud service which is in violation of (Req-AnyPlatorm).</t>
      </section>
      <section anchor="signal-protocol">
        <name>Signal Protocol</name>
        <t>As a messaging protocol, Signal could be used between Sender, Receiver and Intermediary but this protocol is fairly complex and its use would most like violate (Req-Simplicity).
The system will however support the Signal service for share initiation, in line with (Req-init).</t>
      </section>
    </section>
    <section anchor="out-of-scope">
      <name>Out of Scope</name>
      <ul spacing="normal">
        <li>Identification and Authorization - solution shall not require strong identification and authentication from user (e.g. using PKI certificates).</li>
        <li>Fully stopping people from sharing malicious content ("cat pictures").</li>
        <li>Solving problem of sharing to groups.</li>
        <li>Detailing how credentials are provisioned either on a device or with a provisioning partner.</li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Normative References</name>
      <reference anchor="Tigress-00" target="https://datatracker.ietf.org/doc/draft-art-tigress/">
        <front>
          <title>Transfer Digital Credentials Securely</title>
          <author initials="D." surname="Vinokurov" fullname="Dmitry Vinokurov">
            <organization/>
          </author>
          <author initials="M." surname="Byington" fullname="Matt Byington">
            <organization/>
          </author>
          <author initials="M." surname="Lerch" fullname="Matthias Lerch">
            <organization/>
          </author>
          <author initials="A." surname="Pelletier" fullname="Alex Pelletier">
            <organization/>
          </author>
          <author initials="N." surname="Sha" fullname="Nick Sha">
            <organization/>
          </author>
          <date year="2022" month="September"/>
        </front>
      </reference>
      <reference anchor="CCC-Digital-Key-30" target="https://global-carconnectivity.org/wp-content/uploads/2021/11/CCC_Digital_Key_Whitepaper_Approved.pdf">
        <front>
          <title>Digital Key – The Future of Vehicle Access</title>
          <author>
            <organization>Car Connectivity Consortium</organization>
          </author>
          <date year="2021" month="November"/>
        </front>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner">
            <organization/>
          </author>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba">
            <organization/>
          </author>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
      <reference anchor="RFC2078">
        <front>
          <title>Generic Security Service Application Program Interface, Version 2</title>
          <author fullname="J. Linn" initials="J." surname="Linn">
            <organization/>
          </author>
          <date month="January" year="1997"/>
          <abstract>
            <t>The Generic Security Service Application Program Interface (GSS-API), as defined in RFC-1508, provides security services to callers in a generic fashion, supportable with a range of underlying mechanisms and technologies and hence allowing source-level portability of applications to different environments.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="2078"/>
        <seriesInfo name="DOI" value="10.17487/RFC2078"/>
      </reference>
      <reference anchor="RFC4120">
        <front>
          <title>The Kerberos Network Authentication Service (V5)</title>
          <author fullname="C. Neuman" initials="C." surname="Neuman">
            <organization/>
          </author>
          <author fullname="T. Yu" initials="T." surname="Yu">
            <organization/>
          </author>
          <author fullname="S. Hartman" initials="S." surname="Hartman">
            <organization/>
          </author>
          <author fullname="K. Raeburn" initials="K." surname="Raeburn">
            <organization/>
          </author>
          <date month="July" year="2005"/>
          <abstract>
            <t>This document provides an overview and specification of Version 5 of the Kerberos protocol, and it obsoletes RFC 1510 to clarify aspects of the protocol and its intended use that require more detailed or clearer explanation than was provided in RFC 1510.  This document is intended to provide a detailed description of the protocol, suitable for implementation, together with descriptions of the appropriate use of protocol messages and fields within those messages.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4120"/>
        <seriesInfo name="DOI" value="10.17487/RFC4120"/>
      </reference>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
