<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.22 (Ruby 3.1.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-tigress-requirements-05" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.16.0 -->
  <front>
    <title abbrev="tigress-requirements">Transfer Digital Credentials Securely - Requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-tigress-requirements-05"/>
    <author initials="D." surname="Vinokurov" fullname="Dmitry Vinokurov">
      <organization>Apple Inc</organization>
      <address>
        <email>dvinokurov@apple.com</email>
      </address>
    </author>
    <author initials="C." surname="Astiz" fullname="Casey Astiz">
      <organization>Apple Inc</organization>
      <address>
        <email>castiz@apple.com</email>
      </address>
    </author>
    <author initials="A." surname="Pelletier" fullname="Alex Pelletier">
      <organization>Apple Inc</organization>
      <address>
        <email>a_pelletier@apple.com</email>
      </address>
    </author>
    <author initials="B." surname="Lassey" fullname="Brad Lassey">
      <organization>Alphabet Inc</organization>
      <address>
        <email>lassey@google.com</email>
      </address>
    </author>
    <date year="2023" month="February" day="17"/>
    <area>ART</area>
    <workgroup>TIGRESS</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document describes the use cases necessitating the secure transfer of digital credentials, residing in a digital wallet, between two devices and defines general assumptions, requirements and the scope for possible solutions to this problem.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://datatracker.ietf.org/doc/draft-tigress-requirements/"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-tigress-requirements/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/dimmyvi/tigress-requirements"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>In this document we are identifying a problem of transferring digital credentials (e.g. a digital car key, a digital key a a hotel room or a digital key to a private house) from a wallet on one device (smartphone) to another, particularly, if these devices belong to two different platforms (e.g. one is iOS, another - Android).
Today, there is no widely accepted way of transferring digital credentials securely between two digital wallets independent of hardware and software manufacturer. This document describes the problem space and the requirements for the solution the working group creates.</t>
      <t>A Working Group, called Tigress has been established to find a solution to the problem described above.
Within the WG an initial solution was presented (https://datatracker.ietf.org/doc/draft-art-tigress). The community decided to generalize the requirements to the solution and consider alternative solutions within the WG.</t>
      <t>This document presents the general requirements to possible solutions and  specifies certain privacy requirements in order to maintain a high level of user privacy.</t>
    </section>
    <section anchor="general-setting">
      <name>General Setting</name>
      <t>When sharing digital secure credentials, there are several actors involved. This document will focus on sharing information between two digital wallets, directly or through an intermediary server.</t>
      <t>Digital credentials provide access to property owned and / or operated by 3-rd party entities, such as hotel or residential building owners. The entity that is providing the digital credential for consumption by a digital wallet are referred to as Provisioning Entities.
For some kind of credentials Provisioning Entity require to have control over digital credential issuance and life time management - for example, hotel is the owner of the rooms and allow guests to access them for the time of thier stay only.</t>
      <t>Digital wallet is a combination of software and hardware in a smartphone device, there are two devices involved in credentail transfer process - Sender and Receiver. They are defined in terms of which one is a transfer initiator (Sender) and which device is eventually consuming transferred credentials (Receiver). Device roles can change based on the transfer direction - in some transfers a device can act as a Sender, in other - as a Receiver.</t>
      <t>The interface between the device and the Provisioning Entity can be proprietary or a part of published specifications. The sender wallet obtains provisioning information from the Provisioning Entity, then shares it to the recipient using a solution defined in Tigress WG. The recipient then takes that provisioning information and sends it to the Provisioning Entity to redeem for credential for consumption in a digital wallet.</t>
      <t>For some credential types the Provisioning Entity who issues new credentials is actually the sender wallet. In that scenario the receiver will generate a new key material at the request of the sender, and then communicate with the sender over Tigress to have its key material signed by the sender. New credential, with the key material generated by receiver device and signed by sender device, will finally be added (provisioned) into a digital wallet on sender device.</t>
      <section anchor="credential-transfer-without-provisioning-entity">
        <name>Credential transfer without Provisioning Entity</name>
        <t><tt>mermaid
sequenceDiagram
    actor S as Sender
    participant I as Intermediary
    actor R as Receiver
    S -&gt;&gt; I : upload Sharing Invititation ({{CCC-Digital-Key-30}})
    break Generic messaging channel
      S -&gt;&gt; R : send invite
    end
    break Credential Provisioning flow {{CCC-Digital-Key-30}}
      R -&gt;&gt; I : upload Key Signing Request ({{CCC-Digital-Key-30}})
      S -&gt;&gt; I : read Key Signing Request, generate and upload Key Import Request ({{CCC-Digital-Key-30}})
      R -&gt;&gt; I : read Key Import Request and Import Key Data ({{CCC-Digital-Key-30}})
    end
</tt></t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <t>General terms:</t>
      <ul spacing="normal">
        <li>Credential information - data used to authenticate the user with an access point.</li>
        <li>Provisioning information - data transferred from Sender to Receiver device that is both necessary and sufficient for the Receiver to request a new credential from Provisioning Entity to provision it to the Receiver device.</li>
        <li>Provisioning - A process of adding a new credential to the device.</li>
        <li>Provisioning Entity - an entity which facilitates Credential Information lifecycle on a device - for some types of access credentials (e.g. hotels, corporate access). Lifecycle may include provisioning of credential, credential termination, credential update.</li>
        <li>Sender (device) - a device initiating a transfer of Provisioning Information to a Receiver that can provision this credential.</li>
        <li>Receiver (device) - a device that receives Provisioning Information and uses it to provision a new credential.</li>
        <li>Intermediary (server) - an optional intermediary server that provides a standardized and platform-independent way of transferring provisioning information between Sender and Receiver devices, acting as a temporary store and forward service between Sender and Receiver.</li>
        <li>Digital Wallet - A device, service, and/or software that faciliates transactions either online or in-person via a technology like NFC. Digital Wallet's typically support payments, drivers licenses, loyalty cards, access credentials and more.</li>
      </ul>
    </section>
    <section anchor="use-cases">
      <name>Use Cases</name>
      <ul spacing="normal">
        <li>Let's say Ben owns a vehicle that supports digital car keys. Ben would like to let Ryan borrow the car for the weekend. Ryan and Ben are using two different devices (smartphones) with different operating systems. In order for Ben to share his digital car key to Ryan for a weekend, he must transfer some data to the receiver device. Receiver device generates new key material and return it to the sender to sign and return back to the receiver. At this point, the receiver now has a token that will allow them to provision their new key with the car.</li>
        <li>Bob booked a room at a hotel for the weekend, but will be arriving late at night. Alice, his partner, comes to the hotel first, so Bob wants to share his digital room key with Alice. Bob and Alice are using two different mobile phones with different operating systems. In order for Bob to share his digital room key to Alice for a weekend, he must transfer some data to her device. The data structure shared between the two participants is proprietary to the given hotel chain (or Provisioning Entity). This data transfer is a one-time, unidirectional transfer from Bob's device to Alice's. Once Alice receives this data, she can provision a new key to her digital wallet, making a call to Provisioning Entity to receive new credential information.</li>
      </ul>
    </section>
    <section anchor="relationships">
      <name>Relationships</name>
      <section anchor="credential-transfer-with-intermediary-server">
        <name>Credential transfer with intermediary server</name>
        <t><tt>mermaid
sequenceDiagram
    actor S as Sender
    participant I as Intermediary
    actor R as Receiver
    S -&gt;&gt; I : upload provisioning information
    break Generic messaging channel
      S -&gt;&gt; R : send invite
    end
    loop Provision credential
      R -&gt;&gt; I : request additional provisioning information
      I -&gt;&gt; R : deliver additional provisioning information
    end
</tt></t>
      </section>
      <section anchor="credential-transfer-without-intermediary">
        <name>Credential transfer without intermediary</name>
        <t><tt>mermaid
sequenceDiagram
    actor S as Sender
    actor R as Receiver
    break secure messaging channel
      S -&gt;&gt; R : transfer provisioning information E2E
    end
    loop Provision credential
      R -&gt;&gt; S : request additional provisioning information
      S -&gt;&gt; R : deliver additional provisioning information
    end
</tt></t>
      </section>
    </section>
    <section anchor="assumptions">
      <name>Assumptions</name>
      <ul spacing="normal">
        <li>Depending on credential type, there are 3 possible scenarios for transferred credential cryptographic key material:
1) An existing cryptographic key is being copied and sent from Sender to receiver and provisioned to digital wallet as it is. In this case two credentails on both devices are indistinguashable. This scenario is currently used by a very limited number of entities.
2) Instead of the original cryptographic key, Sender device fetches a provisiong token from Provisiong entity approval and sends it to Receiver so that Receiver can acquire new credential information from Provisiong Entity presenting given provisiong token to it and receiving new cryptographic key material. In this case receiver device may have just a subset of the sender's device access rights or receiver's device credential may be revoked independently of the sender's device credential. As a result, Sender and Receiver devices have 2 different keys, potentially linked to the same logical "user account". Also, the Provisiong Entity may not allow the same cryptographic key to be added to different physical devices.
3) When Provisioning Entity does not exist in the transfer flow. For example, for a transfer of a digital car key both sender and receiver devices are used to generate new credential's cryptographic key matherial and sign over the new cryptographic key for it to be trusted by the access point.</li>
        <li>Security: Communication between sender or receiver devices and Provisioning Entity should be trusted. Since new credential's key material is generated by Provisioning Entity, the channel between the device and Provisioning Entity shall be secure and trusted by both parties.</li>
        <li>In case of an intermediary server, used during the credential transfer from sender device to receiver device, the choice of intermediary shall be defined by the application initiating the credential transfer. Digital wallet or another application that manages credentials on sender device shall make the decision regarding the channel to be used to sent the Provisioning Information.</li>
        <li>Sender and Receiver shall both be able to manage the shared credential at any point in transfer or lifecycle: a) the process of credential transfer can be stopped at any time before the credential is provisioned to the receiver device by either sender or receiver device (e.g. making a call to intermediate server to delete a temporary mailbox); b) or after credential has been provisioned - by ether "manage credential" call issued from sender device to Provisiong Entity (or from Provisiong Entity initiating "manage credential" API).</li>
        <li>Any device OEM with a digital credential implementation adherent to Tigress solution shall be able to receive shared provisioning information, whether or not they can originate provisioning information themselves. We define the digital credential transfer as platform-independant; therefore, if the receiver device can recognize the data format of the received Provisioning Information, it should be able to provision the new credential to the Digital Wallet.</li>
        <li>Provisioning new credential on the receiver may require multiple round trips. In case the Provisioning Entity is not used for a certain type of credentials (e.g. for a transfer of a digital car key), both sender and receiver devices are used to generate new credential's cryptographic key matherial and sign on the new cryptographic key for it to be trusted by the access point.</li>
      </ul>
    </section>
    <section anchor="requirements">
      <name>Requirements</name>
      <ul spacing="normal">
        <li>(Req-XPlatform) Solution shall support transfer of digital credential across different platforms (e.g. from Android to iOS).</li>
        <li>(Req-P2P) A goal of credential transfer covered in this document shall include transfer from one device to another (group sharing shall not be a goal).</li>
        <li>(Req-CredentialType) The solution shall support transfer of various digital credential types, based on symmetric and asymmetric cryptography, public and proprietary standards.</li>
        <li>(Req-Security) Solution should provide security of the provisioning data transferred (confidentiality, integrity and availability of provisioning information in transit).</li>
        <li>(Req-Privacy) Transport protocol used to transfer provisioning information ( e.g. secure E2E transfer protocol or intermediary server) shall prevent from correlating users between exchanges or create a social graph of users involved into transfer. Intermediary server shall not be an arbiter of identity. User identities shall not be collected, stored and used for purpose other then the credential transfer itself.</li>
        <li>(Req-Connectivity) Sender and Receiver shall be allowed to be online at different times. Sender and Receiver shall not need to be online at the same time. This requirement allows devices to connect to network to only exchange the portion of information required during the transfer, allowing them upload or download data in turns to network servers.</li>
        <li>(Req-RoundTrips) Solution shall allow for multiple data exchanges between sender and receiver devices in the process of credential transfer. This requirement shall alighn with (Req-Connectivity) above.</li>
        <li>(Req-Opaque) In the case when an intermediary server is used to facilitate the credential transfer, message content between sender and receiver must be opaque to an intermediary, intermediary server shall not be able to recognize the content of provisioning information or use it to provision digital credential on its own.</li>
        <li>(Req-SenderTrust) In the case when an intermediary server is used to facilitate the credential transfer, sender device should establish trusted relationship with the intermediary server. Intermediary server shall be able to verify that the sender device is in good standing and content generated by the sender device can be trusted by the intermediary. The trust mechanism could be proprietary or publicly verifiable ( e.g. WebAuthN). This is important because intermediary server shall have no visibility to the content of the provisiong information sent through it (Req-Opaque).</li>
        <li>(Req-ReceiverTrust) In the case when an intermediary server is used to facilitate the credential transfer, receiver device should be able to evaluate the trustworthiness of the intermediary based on agreed criteria.</li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="CCC-Digital-Key-30" target="https://carconnectivity.org/download-digital-key-3-specification/">
          <front>
            <title>Digital Key Release 3</title>
            <author>
              <organization>Car Connectivity Consortium</organization>
            </author>
            <date year="2022" month="July"/>
          </front>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
