<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.22 (Ruby 3.1.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-tigress-requirements-06" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.16.0 -->
  <front>
    <title abbrev="tigress-requirements">Transfer Digital Credentials Securely - Requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-tigress-requirements-06"/>
    <author initials="D." surname="Vinokurov" fullname="Dmitry Vinokurov">
      <organization>Apple Inc</organization>
      <address>
        <email>dvinokurov@apple.com</email>
      </address>
    </author>
    <author initials="C." surname="Astiz" fullname="Casey Astiz">
      <organization>Apple Inc</organization>
      <address>
        <email>castiz@apple.com</email>
      </address>
    </author>
    <author initials="A." surname="Pelletier" fullname="Alex Pelletier">
      <organization>Apple Inc</organization>
      <address>
        <email>a_pelletier@apple.com</email>
      </address>
    </author>
    <author initials="B." surname="Lassey" fullname="Brad Lassey">
      <organization>Alphabet Inc</organization>
      <address>
        <email>lassey@google.com</email>
      </address>
    </author>
    <date year="2023" month="February" day="17"/>
    <area>ART</area>
    <workgroup>TIGRESS</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document describes the use cases necessitating the secure transfer of digital credentials, residing in a digital wallet, between two devices and defines general assumptions, requirements and the scope for possible solutions to this problem.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://datatracker.ietf.org/doc/draft-tigress-requirements/"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-tigress-requirements/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/dimmyvi/tigress-requirements"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>In this document we are identifying a problem of transferring digital credentials (e.g. a digital car key, a digital key to a hotel room or a digital key to a private house) from a wallet on one device (smartphone) to another, particularly, if these devices belong to two different platforms (e.g. one is iOS, another - Android).
Today, there is no widely accepted way of transferring digital credentials securely between two digital wallets independent of hardware and software manufacturer. This document describes the problem space and the requirements for the solution the working group creates.</t>
      <t>A Working Group, called Tigress has been established to find a solution to the problem described above.
Within the WG an initial solution was presented (https://datatracker.ietf.org/doc/draft-art-tigress). The community decided to generalize the requirements to the solution and consider alternative solutions within the WG.</t>
      <t>This document presents the general requirements to possible solutions and  specifies certain privacy requirements in order to maintain a high level of user privacy.</t>
    </section>
    <section anchor="general-setting">
      <name>General Setting</name>
      <t>When sharing digital secure credentials, there are several actors involved. This document will focus on sharing information between two digital wallets, directly or through an intermediary server.</t>
      <t>Digital credentials provide access to property owned and / or operated by 3-rd party entities, such as hotel or residential building owners. The entity that is providing the digital credential for consumption by a digital wallet is referred to as the Provisioning Entity.
For some kind of credentials, the Provisioning Entity may need to have control over digital credential issuance and life time management - for example, hotel is the owner of the rooms and allow guests to access them for the time of thier stay only.</t>
      <t>A digital wallet is a combination of software and hardware in a smartphone device, there are two devices involved in credential transfer process - Sender and Receiver. They are defined in terms of which one is a transfer initiator (Sender) and which device is eventually consuming transferred credentials (Receiver). Device roles can change based on the transfer direction - in some transfers a device can act as a Sender, in other - as a Receiver.</t>
      <t>The interface between the device and the Provisioning Entity can be proprietary or a part of published specifications. The sender wallet obtains provisioning information from the Provisioning Entity, then shares it to the recipient using a solution defined in Tigress WG. The recipient then takes that provisioning information and sends it to the Provisioning Entity to redeem for credential for consumption in a digital wallet.</t>
      <t>For some credential types the Provisioning Entity who issues new credentials is actually the sender wallet. In that scenario the receiver will generate new key material at the request of the sender, and then communicate with the sender over Tigress to have its key material signed by the sender. The new credential, with the key material generated by receiver device and signed by sender device, will finally be added (provisioned) into a digital wallet on sender device.</t>
      <section anchor="credential-transfer-without-provisioning-entity">
        <name>Credential transfer without Provisioning Entity</name>
        <t><tt>mermaid
sequenceDiagram
    actor S as Sender
    participant I as Intermediary
    actor R as Receiver
    S -&gt;&gt; I : upload Sharing Invititation ({{CCC-Digital-Key-30}})
    break Generic messaging channel
      S -&gt;&gt; R : send invite
    end
    break Credential Provisioning flow {{CCC-Digital-Key-30}}
      R -&gt;&gt; I : upload Key Signing Request ({{CCC-Digital-Key-30}})
      S -&gt;&gt; I : read Key Signing Request, generate and upload Key Import Request ({{CCC-Digital-Key-30}})
      R -&gt;&gt; I : read Key Import Request and Import Key Data ({{CCC-Digital-Key-30}})
    end
</tt></t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <t>General terms:</t>
      <ul spacing="normal">
        <li>Credential information - data used to authenticate the user with an access point.</li>
        <li>Provisioning information - data transferred from Sender to Receiver device that is both necessary and sufficient for the Receiver to request a new credential from Provisioning Entity to provision it to the Receiver device.</li>
        <li>Provisioning - A process of adding a new credential to the device.</li>
        <li>Provisioning Entity - an entity which facilitates Credential Information lifecycle on a device - for some types of access credentials (e.g. hotels, corporate access). Lifecycle may include provisioning of credential, credential termination, credential update.</li>
        <li>Sender (device) - a device initiating a transfer of Provisioning Information to a Receiver that can provision this credential.</li>
        <li>Receiver (device) - a device that receives Provisioning Information and uses it to provision a new credential.</li>
        <li>Intermediary (server) - an optional intermediary server that provides a standardized and platform-independent way of transferring provisioning information between Sender and Receiver devices, acting as a temporary store and forward service between Sender and Receiver.</li>
        <li>Digital Wallet - A device, service, and/or software that faciliates transactions either online or in-person via a technology like NFC. Digital Wallet's typically support payments, drivers licenses, loyalty cards, access credentials and more.</li>
      </ul>
    </section>
    <section anchor="use-cases">
      <name>Use Cases</name>
      <ul spacing="normal">
        <li>Let's say Ben owns a vehicle that supports digital car keys. Ben would like to let Ryan borrow the car for the weekend. Ryan and Ben are using two different devices (smartphones) with different operating systems. In order for Ben to share his digital car key to Ryan for a weekend, he must transfer some data to the receiver device. Receiver device generates new key material and return it to the sender to sign and return back to the receiver. At this point, the receiver now has a token that will allow them to provision their new key with the car.</li>
        <li>Bob booked a room at a hotel for the weekend, but will be arriving late at night. Alice, his partner, comes to the hotel first, so Bob wants to share his digital room key with Alice. Bob and Alice are using two different mobile phones with different operating systems. In order for Bob to share his digital room key to Alice for a weekend, he must transfer some data to her device. The data structure shared between the two participants is proprietary to the given hotel chain (or Provisioning Entity). This data transfer is a one-time, unidirectional transfer from Bob's device to Alice's. Once Alice receives this data, she can provision a new key to her digital wallet, making a call to Provisioning Entity to receive new credential information.</li>
      </ul>
    </section>
    <section anchor="relationships">
      <name>Relationships</name>
      <section anchor="credential-transfer-with-intermediary-server">
        <name>Credential transfer with intermediary server</name>
        <t><tt>mermaid
sequenceDiagram
    actor S as Sender
    participant I as Intermediary
    actor R as Receiver
    S -&gt;&gt; I : upload provisioning information
    break Generic messaging channel
      S -&gt;&gt; R : send invite
    end
    loop Provision credential
      R -&gt;&gt; I : request additional provisioning information
      I -&gt;&gt; R : deliver additional provisioning information
    end
</tt></t>
      </section>
      <section anchor="credential-transfer-without-intermediary">
        <name>Credential transfer without intermediary</name>
        <t><tt>mermaid
sequenceDiagram
    actor S as Sender
    actor R as Receiver
    break secure messaging channel
      S -&gt;&gt; R : transfer provisioning information E2E
    end
    loop Provision credential
      R -&gt;&gt; S : request additional provisioning information
      S -&gt;&gt; R : deliver additional provisioning information
    end
</tt></t>
      </section>
    </section>
    <section anchor="assumptions">
      <name>Assumptions</name>
      <ul spacing="normal">
        <li>Depending on credential type, there are 3 possible scenarios for transferred credential cryptographic key material:
1) An existing cryptographic key is being copied and sent from Sender to receiver and provisioned to digital wallet as it is. In this case two credentails on both devices are indistinguashable. This scenario is currently used by a very limited number of entities.
2) Instead of the original cryptographic key, Sender device fetches a provisiong token from Provisiong entity approval and sends it to Receiver so that Receiver can acquire new credential information from Provisiong Entity presenting given provisiong token to it and receiving new cryptographic key material. In this case receiver device may have just a subset of the sender's device access rights or receiver's device credential may be revoked independently of the sender's device credential. As a result, Sender and Receiver devices have 2 different keys, potentially linked to the same logical "user account". Also, the Provisiong Entity may not allow the same cryptographic key to be added to different physical devices.
3) When Provisioning Entity does not exist in the transfer flow. For example, for a transfer of a digital car key both sender and receiver devices are used to generate new credential's cryptographic key matherial and sign over the new cryptographic key for it to be trusted by the access point.</li>
        <li>Security: Communication between sender or receiver devices and Provisioning Entity should be trusted. Since new credential's key material is generated by Provisioning Entity, the channel between the device and Provisioning Entity shall be secure and trusted by both parties.</li>
        <li>In case of an intermediary server, used during the credential transfer from sender device to receiver device, the choice of intermediary shall be defined by the application initiating the credential transfer. Digital wallet or another application that manages credentials on sender device shall make the decision regarding the channel to be used to sent the Provisioning Information.</li>
        <li>Sender and Receiver shall both be able to manage the shared credential at any point in transfer or lifecycle: a) the process of credential transfer can be stopped at any time before the credential is provisioned to the receiver device by either sender or receiver device (e.g. making a call to intermediate server to delete a temporary mailbox); b) or after credential has been provisioned - by ether "manage credential" call issued from sender device to Provisiong Entity (or from Provisiong Entity initiating "manage credential" API).</li>
        <li>Any device OEM with a digital credential implementation adherent to Tigress solution shall be able to receive shared provisioning information, whether or not they can originate provisioning information themselves. We define the digital credential transfer as platform-independant; therefore, if the receiver device can recognize the data format of the received Provisioning Information, it should be able to provision the new credential to the Digital Wallet.</li>
        <li>Provisioning new credential on the receiver may require multiple round trips. In case the Provisioning Entity is not used for a certain type of credentials (e.g. for a transfer of a digital car key), both sender and receiver devices are used to generate new credential's cryptographic key matherial and sign on the new cryptographic key for it to be trusted by the access point.</li>
      </ul>
    </section>
    <section anchor="requirements">
      <name>Requirements</name>
      <ul spacing="normal">
        <li>(Req-XPlatform) Solution shall support transfer of digital credential across different platforms (e.g. from Android to iOS).</li>
        <li>(Req-P2P) A goal of credential transfer covered in this document shall include transfer from one device to another (group sharing shall not be a goal).</li>
        <li>(Req-CredentialType) The solution shall support transfer of various digital credential types, based on symmetric and asymmetric cryptography, public and proprietary standards.</li>
        <li>(Req-Security) Solution should provide security of the provisioning data transferred (confidentiality, integrity and availability of provisioning information in transit).</li>
        <li>(Req-Privacy) Transport protocol used to transfer provisioning information ( e.g. secure E2E transfer protocol or intermediary server) shall prevent from correlating users between exchanges or create a social graph of users involved into transfer. Intermediary server shall not be an arbiter of identity. User identities shall not be collected, stored and used for purpose other then the credential transfer itself.</li>
        <li>(Req-Connectivity) Sender and Receiver shall be allowed to be online at different times. Sender and Receiver shall not need to be online at the same time. This requirement allows devices to connect to network to only exchange the portion of information required during the transfer, allowing them upload or download data in turns to network servers.</li>
        <li>(Req-RoundTrips) Solution shall allow for multiple data exchanges between sender and receiver devices in the process of credential transfer. This requirement shall alighn with (Req-Connectivity) above.</li>
        <li>(Req-Opaque) In the case when an intermediary server is used to facilitate the credential transfer, message content between sender and receiver must be opaque to an intermediary, intermediary server shall not be able to recognize the content of provisioning information or use it to provision digital credential on its own.</li>
        <li>(Req-SenderTrust) In the case when an intermediary server is used to facilitate the credential transfer, sender device should establish trusted relationship with the intermediary server. Intermediary server shall be able to verify that the sender device is in good standing and content generated by the sender device can be trusted by the intermediary. The trust mechanism could be proprietary or publicly verifiable ( e.g. WebAuthN). This is important because intermediary server shall have no visibility to the content of the provisiong information sent through it (Req-Opaque).</li>
        <li>(Req-ReceiverTrust) In the case when an intermediary server is used to facilitate the credential transfer, receiver device should be able to evaluate the trustworthiness of the intermediary based on agreed criteria.</li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="CCC-Digital-Key-30" target="https://carconnectivity.org/download-digital-key-3-specification/">
          <front>
            <title>Digital Key Release 3</title>
            <author>
              <organization>Car Connectivity Consortium</organization>
            </author>
            <date year="2022" month="July"/>
          </front>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
