<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.1.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-tigress-requirements-04" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.2 -->
  <front>
    <title abbrev="tigress-requirements">Transfer Digital Credentials Securely - Requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-tigress-requirements-04"/>
    <author initials="D." surname="Vinokurov" fullname="Dmitry Vinokurov">
      <organization>Apple Inc</organization>
      <address>
        <email>dvinokurov@apple.com</email>
      </address>
    </author>
    <author initials="C." surname="Astiz" fullname="Casey Astiz">
      <organization>Apple Inc</organization>
      <address>
        <email>castiz@apple.com</email>
      </address>
    </author>
    <author initials="A." surname="Pelletier" fullname="Alex Pelletier">
      <organization>Apple Inc</organization>
      <address>
        <email>a_pelletier@apple.com</email>
      </address>
    </author>
    <author initials="J. L." surname="Giraud" fullname="Jean-Luc Giraud">
      <organization>Apple Inc</organization>
      <address>
        <email>jgiraud@apple.com</email>
      </address>
    </author>
    <author initials="A." surname="Bulgakov" fullname="Alexey Bulgakov">
      <organization>Apple Inc</organization>
      <address>
        <email>abulgakov@apple.com</email>
      </address>
    </author>
    <author initials="M." surname="Byington" fullname="Matt Byington">
      <organization>Apple Inc</organization>
      <address>
        <email>mbyington@apple.com</email>
      </address>
    </author>
    <author initials="N." surname="Sha" fullname="Nick Sha">
      <organization>Alphabet Inc</organization>
      <address>
        <email>nicksha@google.com</email>
      </address>
    </author>
    <author initials="M." surname="Gerster" fullname="Manuel Gerster">
      <organization>Mercedes-Benz AG</organization>
      <address>
        <email>manuel.gerster@mercedes-benz.com</email>
      </address>
    </author>
    <date year="2022" month="November" day="09"/>
    <area>ART</area>
    <workgroup>TIGRESS</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document describes the use cases necessitating the secure transfer of digital credentials, residing in a digital wallet, between two devices and defines general assumptions, requirements and the scope of the corresponding Tigress Internet-draft <xref target="Tigress-00"/>.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://datatracker.ietf.org/doc/draft-tigress-requirements/"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-tigress-requirements/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/dimmyvi/tigress-requirements"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>Today, there is no widely accepted way of transferring digital credentials securely between two digital wallets independent of hardware and software manufacturer. This document describes the problem space and the requirements for the solution the working group creates.</t>
      <t>Tigress allows for a sender and receiver to communicate in order to facilitate a secure credential transfer between two digital wallets. Tigress also specifies certain privacy requirements in order to maintain a high level of user privacy.</t>
    </section>
    <section anchor="general-setting">
      <name>General Setting</name>
      <t>When sharing digital secure credentials, there are several actors involved. While the Tigress working group's solution will focus on sharing information between two digital wallets, potentially through an intermediary server, there are a couple more actors involved.</t>
      <t>The companies that are providing the digital credential for consumption by a digital wallet are the provisioning partners. They are in control of the provisioning information and the lifecycle of the credentials. Each digital wallet has a preexisting trust relationship between itself and the Provisioning Partner.</t>
      <t>The interface between the devices and the Provisioning Partner can be proprietary or a part of published specifications such as the <xref target="CCC-Digital-Key-30"/>. The sender obtains provisioning information from the provisioning partner, then shares it to the recipient via Tigress. The recipient then takes that data and sends it to the Provisioning Partner to redeem a credential for consumption in a digital wallet.</t>
      <t>For some credential types the Provisioning Partner who mints new credentials is actually the sender. In that scenario the receiver will generate a new key material at the request of the sender, and then communicate with the sender over Tigress to have its key material signed by the sender.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <t>General terms:</t>
      <ul spacing="normal">
        <li>Credential information - data used to authenticate the user with an access point.</li>
        <li>Provisioning information - data transferred from Sender to Receiver device that is both necessary and sufficient for the Receiver to request a new credential from Provisioning Partner to provision it to the Receiver device.</li>
        <li>Provisioning - A process of adding a new credential to the device.</li>
        <li>Provisioning Partner - an entity which facilitates Credential Information lifecycle on a device. Lifecycle may include provisioning of credential, credential termination, credential update.</li>
        <li>Sender (device) - a device initiating a transfer of Provisioning Information to a Receiver that can provision this credential.</li>
        <li>Receiver (device) - a device that receives Provisioning Information and uses it to provision a new credential.</li>
        <li>Intermediary (server) - an intermediary server that provides a standardized and platform-independent way of transferring provisioning information between Sender and Receiver devices.</li>
        <li>Digital Wallet - A device, service, and/or software that faciliates transactions either online or in-person via a technology like NFC. Digital Wallet's typically support payments, drivers licenses, loyalty cards, access credentials and more.</li>
      </ul>
    </section>
    <section anchor="use-cases">
      <name>Use Cases</name>
      <ul spacing="normal">
        <li>Let's say Ben owns a vehicle that supports digital keys which comply with the CCC specification <xref target="CCC-Digital-Key-30"/>. Ben would like to let Ryan borrow the car for the weekend. Ryan and Ben are using two different mobile phones with different operating systems. In order for Ben to share his digital car key to Ryan for a weekend, he must transfer some data to the receiver device. The data structure shared between the two participants is defined in the <xref target="CCC-Digital-Key-30"/>. In addition, the <xref target="CCC-Digital-Key-30"/> requires the receiver to generate required key material and return it to the sender to sign and return back to the receiver. At this point, the receiver now has a token that will allow them to provision their new key with the car.</li>
        <li>Bob booked a room at a hotel for the weekend, but will be arriving late at night. Alice, his partner, comes to the hotel first, so Bob wants to share his digital room key with Alice. Bob and Alice are using two different mobile phones with different operating systems. In order for Bob to share his digital room key to Alice for a weekend, he must transfer some data to her device. The data structure shared between the two participants is proprietary to the given hotel chain (or Provisioning Partner). This data transfer is a one-time, unidirectional transfer from Bob's device to Alice's. Once Alice receives this data, she can provision a new key to her digital wallet, making a call to Provisioning Partner to receive new credential information.</li>
      </ul>
    </section>
    <section anchor="relationships">
      <name>Relationships</name>
      <t><tt>mermaid
sequenceDiagram
    actor S as Sender
    participant I as Intermediary
    actor R as Receiver
    S -&gt;&gt; I : upload credential data
    break Generic messaging channel
      S -&gt;&gt; R : send invite
    end
    Loop Provision credential
      R -&gt;&gt; I : request credential data
      I -&gt;&gt; R : deliver credential data
    end
</tt></t>
    </section>
    <section anchor="assumptions">
      <name>Assumptions</name>
      <ul spacing="normal">
        <li>Original credential information (with cryptographic key material) <bcp14>MUST NOT</bcp14> be sent or shared. Instead, sender <bcp14>SHALL</bcp14> be transferring its approval token for Receiver to acquire new credential information.</li>
        <li>Provisioning Partner <bcp14>SHALL NOT</bcp14> allow for two users to use the same credential / cryptographic keys.</li>
        <li>Security: Communication between Sender / Receiver and Provisioning Partner <bcp14>SHOULD</bcp14> be trusted.</li>
        <li>The choice of intermediary <bcp14>SHALL</bcp14> be defined by the application initiating the credential transfer.</li>
        <li>Sender and Receiver <bcp14>SHALL</bcp14> both be able to manage the shared credential at any point by communicating with the Provisioning Partner. Credential lifecycle management is out of scope for this proposal.</li>
        <li>Any device OEM with a digital credential implementation adherent to Tigress <xref target="Tigress-00"/> <bcp14>SHALL</bcp14> be able to receive shared provisioning information, whether or not they can originate provisioning information themselves or host their own intermediary.</li>
        <li>Provisioning a credential on the Receiver <bcp14>MAY</bcp14> require multiple round trips.</li>
      </ul>
    </section>
    <section anchor="requirements">
      <name>Requirements</name>
      <ul spacing="normal">
        <li>(Req-Connectivity) Sender and Receiver <bcp14>SHALL</bcp14> be allowed to be online at different times. Sender and Receiver <bcp14>SHALL</bcp14> never need to be online at the same time.</li>
        <li>(Req-init) Solution <bcp14>SHOULD</bcp14> allow Sender to send the share invitation to Receiver over any messaging channel, with various degrees of security.</li>
        <li>(Req-P2P) A goal of credential transfer covered in this document <bcp14>SHALL</bcp14> include transfer from one device to another (group sharing <bcp14>SHALL</bcp14> not be a goal).</li>
        <li>(Req-Security) Solution <bcp14>SHOULD</bcp14> provide security of the provisioning data transferred (confidentiality, integrity and availability).</li>
        <li>(Req-Revoke) Solution <bcp14>SHALL</bcp14> maintain access control, allowing Sender to revoke before the share has been accepted, and for Receiver to end transfer at any time.</li>
        <li>(Req-ArbitraryFormat) The solution <bcp14>SHALL</bcp14> support arbitrary message formats to support both digital keys that implement public standards like <xref target="CCC-Digital-Key-30"/> as well as proprietary implementations of digital keys.</li>
        <li>(Req-RoundTrips) Solution <bcp14>SHALL</bcp14> allow for stateful requests between Sender and Receiver to support stateful actions like key signing requests.</li>
        <li>(Req-Preview) Solution <bcp14>SHOULD</bcp14> allow for receiver to know what is being added to their digital wallet.</li>
      </ul>
      <section anchor="intermediary-server-requirments">
        <name>Intermediary server requirments</name>
        <t>If the solution requires an intermediary server, it should have the following requirements.</t>
        <ul spacing="normal">
          <li>(Req-Privacy) An Intermediary server <bcp14>SHALL</bcp14> not be able to correlate users between exchanges, or create a social graph. Intermediary server shall not be an arbiter of Identity.</li>
          <li>(Req-Notify) Solution <bcp14>SHOULD</bcp14> support a notification mechanism to inform devices on the content update on Intermediary server.</li>
          <li>(Req-Opaque) Message content between Sender and Receiver <bcp14>MUST</bcp14> be opaque to an Intermediary.</li>
          <li>(Req-IntermediaryAttestation) An Intermediary <bcp14>SHALL</bcp14> implement mechanisms to prevent abuse by share initiating device, verifying that the device is in good standing and content generated by the sender device can be trusted by the Intermediary. The trust mechanism could be proprietary or publicly verifiable ( e.g. WebAuthN).</li>
          <li>(Req-ReceiverTrust) The Receiver device <bcp14>SHOULD</bcp14> be able to evaluate the trustworthiness of the Intermediary using a list of trusted/approved intermediaries.</li>
        </ul>
      </section>
    </section>
    <section anchor="review-of-existing-solutions">
      <name>Review of existing solutions</name>
      <t>A number of existing solutions / protocols have been reviewed in order to be used for secure credential transfer based on the requirements: GSS-API, Kerberos, AWS S3, email, Signal. None of the existing protocols comply with the requirements; the effort of modifying the existing protocols has been accessed to be significantly higher than introducing a new solution to solve this problem. The goal of the Tigress draft <xref target="Tigress-00"/> is not to define a new encryption or secure message exchange protocol, but rather a standardized mechanism of exchanging access-specific encrypted credential information.</t>
      <section anchor="arbitrary-messaging-channel-email-whatsapp-sms-signal-etc">
        <name>Arbitrary Messaging Channel (Email / WhatsApp / SMS / Signal / etc.)</name>
        <t>The Provisioning Information <bcp14>MAY</bcp14> be sent from Sender to Receiver over an arbitrary messaging channel that supports binary file transfer, but this would not support provisioning flows which require multiple round trips as requied by (Req-RoundTrips). The same requirement applies to Signal protocol outside of the Signal app, as the Req-RoundTrips would likely be difficult and add a lot of friction for the user.</t>
      </section>
      <section anchor="gss-api-kerberos">
        <name>GSS-API, Kerberos</name>
        <t>GSS-API <xref target="RFC2078"/> and Kerberos <xref target="RFC4120"/> are authentication technologies which could be used to authenticate Sender, Receiver and intermediary. However, as they provide strong authentication, they would allow the Intermediary server to build a social graph in violation of (Req-Privacy). Their setup also require strong coordination between the actors of the system which seems overly costly for the intended system.
AWS S3 could be used as an Intermediary server but it would force all participants to use a specific cloud service which is in violation of (Req-AnyPlatorm).</t>
      </section>
    </section>
    <section anchor="out-of-scope">
      <name>Out of Scope</name>
      <ul spacing="normal">
        <li>Identification and Authorization - solution shall not require strong identification and authentication from user (e.g. using PKI certificates).</li>
        <li>Fully stopping people from sharing malicious content ("cat pictures").</li>
        <li>Solving problem of sharing to groups.</li>
        <li>Detailing how credentials are provisioned either on a device or with a provisioning partner.</li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Normative References</name>
      <reference anchor="Tigress-00" target="https://datatracker.ietf.org/doc/draft-art-tigress/">
        <front>
          <title>Transfer Digital Credentials Securely</title>
          <author initials="D." surname="Vinokurov" fullname="Dmitry Vinokurov">
            <organization/>
          </author>
          <author initials="M." surname="Byington" fullname="Matt Byington">
            <organization/>
          </author>
          <author initials="M." surname="Lerch" fullname="Matthias Lerch">
            <organization/>
          </author>
          <author initials="A." surname="Pelletier" fullname="Alex Pelletier">
            <organization/>
          </author>
          <author initials="N." surname="Sha" fullname="Nick Sha">
            <organization/>
          </author>
          <date year="2022" month="November"/>
        </front>
      </reference>
      <reference anchor="CCC-Digital-Key-30" target="https://carconnectivity.org/download-digital-key-3-specification/">
        <front>
          <title>Digital Key Release 3</title>
          <author>
            <organization>Car Connectivity Consortium</organization>
          </author>
          <date year="2022" month="July"/>
        </front>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner">
            <organization/>
          </author>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba">
            <organization/>
          </author>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
      <reference anchor="RFC2078">
        <front>
          <title>Generic Security Service Application Program Interface, Version 2</title>
          <author fullname="J. Linn" initials="J." surname="Linn">
            <organization/>
          </author>
          <date month="January" year="1997"/>
          <abstract>
            <t>The Generic Security Service Application Program Interface (GSS-API), as defined in RFC-1508, provides security services to callers in a generic fashion, supportable with a range of underlying mechanisms and technologies and hence allowing source-level portability of applications to different environments.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="2078"/>
        <seriesInfo name="DOI" value="10.17487/RFC2078"/>
      </reference>
      <reference anchor="RFC4120">
        <front>
          <title>The Kerberos Network Authentication Service (V5)</title>
          <author fullname="C. Neuman" initials="C." surname="Neuman">
            <organization/>
          </author>
          <author fullname="T. Yu" initials="T." surname="Yu">
            <organization/>
          </author>
          <author fullname="S. Hartman" initials="S." surname="Hartman">
            <organization/>
          </author>
          <author fullname="K. Raeburn" initials="K." surname="Raeburn">
            <organization/>
          </author>
          <date month="July" year="2005"/>
          <abstract>
            <t>This document provides an overview and specification of Version 5 of the Kerberos protocol, and it obsoletes RFC 1510 to clarify aspects of the protocol and its intended use that require more detailed or clearer explanation than was provided in RFC 1510.  This document is intended to provide a detailed description of the protocol, suitable for implementation, together with descriptions of the appropriate use of protocol messages and fields within those messages.  [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4120"/>
        <seriesInfo name="DOI" value="10.17487/RFC4120"/>
      </reference>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
