<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.3.1) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-linker-digital-emblem-02" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="PS-DE">Problem Statement for a Digital Emblem</title>
    <seriesInfo name="Internet-Draft" value="draft-linker-digital-emblem-02"/>
    <author fullname="Felix Linker">
      <organization>ETH Zurich</organization>
      <address>
        <email>flinker@inf.ethz.ch</email>
      </address>
    </author>
    <author fullname="David Basin">
      <organization>ETH Zurich</organization>
      <address>
        <email>flinker@inf.ethz.ch</email>
      </address>
    </author>
    <author fullname="Mauro Vignati">
      <organization>ICRC</organization>
      <address>
        <email>mvignati@icrc.org</email>
      </address>
    </author>
    <author fullname="Tommy Jensen">
      <organization>Microsoft</organization>
      <address>
        <email>tojens@microsoft.com</email>
      </address>
    </author>
    <date year="2024" month="June" day="28"/>
    <abstract>
      <?line 86?>

<t>In times of armed conflict, the protective emblems of the red cross, red crescent, and red crystal are used to mark <em>physical</em> assets.
This enables military units to identify assets as respected and protected under international humanitarian law.
This draft explores how one could apply the protective emblems to <em>digital</em>, network-connected infrastructure using a <em>digital emblem</em>, and defines the requirements of a digital emblem, emphasizing security requirements.</t>
      <t>Notably, a digital emblem has a unique combination of security requirements, namely, authentication, accountability, and a property that we call <em>covert inspection</em>.
Covert inspection means that those wishing to authenticate assets as protected must be able to do so without revealing that they may attack unprotected entities.</t>
    </abstract>
  </front>
  <middle>
    <?line 95?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>International Humanitarian Law (IHL) mandates that military units must not attack medical facilities, such as hospitals.
The emblems of the red cross, red crescent, and red crystal are used to mark <em>physical</em> infrastructure (e.g., by a red cross painted on a hospital's rooftop), thereby enabling military units to identify those assets as protected under IHL.
The International Committee of the Red Cross (ICRC) recently posed the question: How can one extend such markings to <em>digital</em> infrastructure such as servers and networks? <xref target="DE-REPORT"/></t>
      <t>The goal of a digital emblem is to prevent cyberattacks on humanitarian infrastructure.
Parties to armed conflicts are bound by IHL, and are thus required by law to respect the protective emblems.
Other actors may not be bound by IHL, but could still respect a digital emblem.
Either out of respect for the humanitarian cause or to avoid unwanted attention when attacking marked assets.
A digital emblem can only serve this purpose, though, if it meets a unique combination of requirements.</t>
      <ol spacing="normal" type="1"><li>
          <t>Digital emblems require authentication as assets must not be able to fake protection, for example, by transferring emblems from medical to military infrastructures.</t>
        </li>
        <li>
          <t>Protective emblems must be decentralized, i.e., there must be no central authorities that govern the use or distribution of digital emblems.
Under IHL, states themselves determine which parties and assets may display the emblem under their authority.</t>
        </li>
        <li>
          <t>Systems with a decentralized trust model are prone to misuse.
Therefore, a digital emblem must be designed so that parties can be held accountable whenever they mark unprotected infrastructure.
Protection under IHL stems from law, and laws must be enforceable to have an effect.</t>
        </li>
        <li>
          <t>Those wishing to authenticate assets must be able to verify protective emblems in a way that does not call attention to the fact that they are screening potential targets.
We call this property <em>covert inspection</em>.
This is analogous to looking at a physical emblem from a distance: A flag of a red cross does similarly not raise attention to the fact that its being looked at.</t>
        </li>
      </ol>
      <t>Work on the digital emblem dates back multiple years.
In 2020, the ICRC invited two research institutions, Johns Hopkins University Applied Physics Laboratory (APL) and the Centre for Cyber Trust (CECYT), a joint research centre between ETH Zurich and Bonn University, to develop technical proposals for a digital emblem.
These proposals were presented to and evaluated by a group of international experts at the invitation of the ICRC <xref target="DE-REPORT"/>.
We discuss the proposed designs in <xref target="proposals"/>.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="the-problem">
      <name>The Problem</name>
      <section anchor="legal-and-historical-background">
        <name>Legal and Historical Background</name>
        <t>The Geneva Conventions and their <em>Additional Protocols</em> (APs) constitute the core of IHL and establish legal rules on the conduct of armed conflict.
These Conventions and Protocol establish the meaning and usage of protective emblems, namely, the red cross, crescent, and crystal.</t>
        <t>The emblems have a protective and an indicative function.
In its protective function, parties to conflict may apply an emblem to assets that exclusively undertake medical functions, such as vehicles, personnel, or buildings.
These emblems inform other parties that they must not be attacked.
In its indicative function, an emblem signals affiliation with the International Red Cross and Red Crescent Movement.</t>
        <t>Since 1949, the Geneva Conventions have been revised.
AP I contains additional regulations on how parties to conflict can communicate their status using technical means, like radar transponders and radio signals.
Recognizing that technology may progress rapidly, the amendment process for AP I is streamlined.
For example, this process could begin through expert consultations convened by the ICRC.</t>
      </section>
      <section anchor="problem-domain">
        <name>Problem Domain</name>
        <t>The concept of a digital emblem touches a variety of stakeholders.
First and foremost, there are <em>emblem issuers (EIs)</em>, groups that provide medical services or conduct humanitarian operations such as military forces or organizations like Doctors Without Borders.
As part of their activities, they may display the protective emblems on their <em>protected digital assets</em>, such as mobile devices (tablets, smartphones), servers (both virtual and dedicated), or an intranet.
Prior to commencing their operations, EIs must seek permission from competent <em>authorities</em>.
When they are given permission, EIs can apply digital emblems to their protected assets, which <em>present</em> them to three types of <em>agents</em>.</t>
        <t><em>Regular users</em> of an asset do not pay attention to the emblem, for example, when they visit a website.
<em>Verifiers</em> pay attention to the emblem and only wish to attack lawful (under IHL) targets.
They are typically part of an armed force engaged in a conflict.
We can assume that most verifiers (typically military units) will be associated with an authority (typically their nation state or an ally), and, hence, that such verifiers can obtain the authentic public keys of their affiliated authorities through secure, out-of-band channels.
Finally, we define <em>adversaries</em> as those agents that are willing to violate IHL and search to abuse digital emblems.
For example, they may seek to issue emblems to non-protected assets.</t>
      </section>
      <section anchor="reqs">
        <name>Requirements</name>
        <t>The digital emblem's requirements were adapted from the ICRC's report on digital emblems <xref target="DE-REPORT"/>.
However, whereas the report introduces requirements on a much higher, abstract level and without a detailed consideration of security, we present a comprehensive list of actionable, technical requirements.</t>
        <t>The purpose of a digital emblem is to prevent attacks on protected assets by informing other parties about their status under IHL.
(Note that IHL also permits the indicative use of an emblem, we subsume this case under the protective use of an emblem for clarity.)
The digital emblem's requirements are derived from two important insights.
(i) A digital emblem critically requires adoption by verifiers, which (by definition) intend to attack assets not protected under IHL.
(ii) A digital emblem should comply with existing IHL, which facilitates the diplomatic process of adopting a digital emblem.</t>
        <section anchor="covert-inspection">
          <name>Covert Inspection</name>
          <t>A digital emblem <bcp14>MUST NOT</bcp14> reveal whether someone is inspecting it.
We call this requirement <em>covert inspection</em>.
If verifiers were to reveal that they are inspecting digital emblems, their targets (potentially unprotected) could use that knowledge to protect themselves against an imminent attack, and verifiers would therefore not inspect emblems.
In particular, covert inspection implies that emblem presentation must be <em>active</em>, i.e., verifiers will be sent emblems and need not query them explicitly.</t>
        </section>
        <section anchor="authentic">
          <name>Authentic</name>
          <t>Digital emblems <bcp14>MUST</bcp14> be <em>authentic</em>, i.e., a digital emblem only marks assets that are used to provide medical services or conduct humanitarian operations.
If it were not authentic, verifiers would risk that their lawful, i.e., unprotected, targets could avert attacks by displaying fraudulent emblems, and verifiers would again not inspect emblems.</t>
        </section>
        <section anchor="decentralized-trust-model">
          <name>Decentralized Trust Model</name>
          <t>Compliance with existing IHL implies that there <bcp14>MUST NOT</bcp14> be a fixed set of authorities that can regulate how a digital emblem is used, i.e., it must follow a <em>decentralized trust model</em>.</t>
        </section>
        <section anchor="accountable-display">
          <name>Accountable Display</name>
          <t>Systems with a decentralized trust model can suffer from misuse.
Should a digital emblem be codified in law, it is crucial that any unlawful display of digital emblems can be provably attributed to the respective parties such that they can be prosecuted.
Hence, a digital emblem <bcp14>MUST</bcp14> provide <em>accountability</em>.</t>
        </section>
        <section anchor="removable-verifiable-presence">
          <name>Removable &amp; Verifiable Presence</name>
          <t>A digital emblem should work just as the physical emblems.
Just as a flag with a red cross can be displayed and removed at any time, a digital emblem <bcp14>MUST</bcp14> be applicable to the widest possible range of use cases and digital technologies, and also be easily <em>removable</em>.
Additionally, agents <bcp14>MUST</bcp14> be able to <em>verify the presence</em> of digital emblems.
With physical emblems, unprotected assets will simply not show the red cross.
Likewise, in the digital domain, these assets will not present an invalid emblem, but rather no emblem, and verifiers must be able to determine when no emblem was shown to them.</t>
        </section>
      </section>
      <section anchor="use-case-scenarios">
        <name>Use-Case Scenarios</name>
        <t>In the following, we list a number of use cases that a digital emblem should cover.
These use cases were derived in collaboration with the ICRC and a broad range of international experts, including the medical sector, the information technology sector, the military sector, and cybersecurity experts.</t>
        <t>It may turn out that there cannot be a single design proposal that covers all use-cases.
Nevertheless, the number of ways in which a digital emblem can be distributed should be kept minimal.
The more interfaces supported by a digital emblem, the greater the burden on verifiers, who would need to check every interface to ensure that they are not attacking a protected asset.</t>
        <section anchor="personal-devices">
          <name>Personal Devices</name>
          <t>A digital emblem should apply to general purpose, personal computing devices such as laptops, smartphones, and tablets.
Typically, such devices have no stable IP address, but have a powerful operating system and support complex applications well.</t>
        </section>
        <section anchor="constrained-devices">
          <name>Constrained Devices</name>
          <t>A digital emblem should apply to network-connected devices that are constrained in computing power, bandwidth, or cannot be easily modified, for example, medical or IoT devices.
Typically, such devices are deployed in a fixed environment, however, due to power, hardware, or legal constraints, they cannot support complex applications, or their software might not be modifiable at all.</t>
        </section>
        <section anchor="servers">
          <name>Servers</name>
          <t>A digital emblem should apply to dedicated and virtual servers, e.g., web or database servers.
Such servers may or may not have a stable IP or a domain name associated with them.</t>
        </section>
        <section anchor="networks">
          <name>Networks</name>
          <t>A digital emblem should apply to networks that are controlled by one organization, e.g., the ICRC's internal network.
Typically, such networks have an IP range associated with them.
Each device connected to this network should fall into one of the categories above and could thus be marked individually.
However, marking entire networks should drastically ease the burden of deployment, verification, and distribution.</t>
        </section>
      </section>
      <section anchor="excluded-scenarios">
        <name>Excluded Scenarios</name>
        <t>Notably, a digital emblem cannot be applied to infrastructure that is used for both services worthy and unworthy of protection.
A digital emblem must always identify assets that only serve purposes that enjoy protection under IHL.</t>
      </section>
    </section>
    <section anchor="proposals">
      <name>Proposed Designs for a Digital Emblem</name>
      <t>Two designs were proposed to solve the problem of a digital emblem.
First, JHU APL proposed a DNS-based solution for a digital emblem <xref target="I-D.haberman-digital-emblem"/>.
Second, CECYT (a joint endeavour between ETH Zurich and Bonn University) proposed <em>An Authentic Digital EMblem (ADEM)</em>, which was initially described in an academic publication <xref target="ADEM"/>, but was also specified technically <xref target="ADEM-SPEC"/> and has openly accessible, working prototypes (<eref target="https://github.com/adem-wg/adem-proto">Go library and CLI</eref>, <eref target="https://github.com/adem-wg/adem-chrome">Browser extension</eref>).
We focus here on ADEM as it was selected by the ICRC as the most suitable proposal for a digital emblem given its scope of applying emblems to digital assets and using the existing physical emblems for labeling physical assets.</t>
      <t>ADEM was designed following the requirements laid out in this draft.
ADEM follows a decentralized trust model and utilizes existing infrastructure wherever possible, e.g., it provides accountability through the Certificate Transparency infrastructure <xref target="RFC6962"/>.
ADEM was designed to be distributed over many channels and as such is not bound to one mode of transportation.
The academic paper foresees distribution of digital emblems via TLS, DNS, and UDP.
Next to its prototype, ADEM's security was thoroughly evaluated and formal proofs of security are described in the academic publication.</t>
      <t>Once there is consensus on the scope of a digital emblem, the plan is to propose ADEM as a basis for designing a digital emblem.
Although ADEM has gone through several iterations in collaboration with the ICRC, it is expected that it will be refined by the IETF WG that adopts it to ensure industry interoperability with good protocol practices.
In particular, it must be investigated whether it fits the needs of all stakeholders of a digital emblem.</t>
    </section>
    <section anchor="considerations-of-potential-risks">
      <name>Considerations of Potential Risks</name>
      <t>Because digital emblems label digital infrastructure as legally protected, misuse of a digital emblem may
not always be automatically detectable. In this section, we discuss two examples of potential misuse and
how the <xref target="reqs"/> section aims ensure that this standard is utilized responsibly.</t>
      <t>First, a nation state could misuse a digital emblem to wrongfully protect infrastructure used to enforce
Internet censorship or shutdowns for its population. Second, technology vendors that provide online services
or resources might maliciously or accidentally apply digital emblems to not only IHL-protected assets but
their general infrastructure that hosts this and other services. In both cases, such misuse would abuse and
potentially undermine combatants' and resistance movements' respect for IHL only to label one's own
infrastructure, which even may actively harm human rights.</t>
      <t>In all cases where a digital emblem is deployed, it should be noted that verifying a digital emblem
<bcp14>MAY</bcp14> include more than verifying its presence and authenticity. Verifiers <bcp14>MAY</bcp14> also observe other behavior
of the emblem-bearing asset, applying heuristics to check whether its plausible that the asset displays a
digital emblem. Additionally, we point out that digital emblem's mechanism of providing authentication
additionally enables combatants to hold emblem-bearers accountable should misuse be detected.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The requirements "covert inspection", "authentic", and "accountable display" are all security requirements, i.e., one must consider powerful adversaries trying to break these requirements when evaluating a proposal for a digital emblem.
The original, academic paper proposing <em>ADEM: An Authentic Digital Emblem</em> formally verified ADEM's security, and any subsequent proposal should be rigorously analyzed as well.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="ADEM" target="https://dl.acm.org/doi/10.1145/3576915.3616578">
          <front>
            <title>ADEM: An Authentic Digital EMblem</title>
            <author initials="F." surname="Linker" fullname="Felix Linker">
              <organization>Department of Computer Science, ETH Zurich</organization>
            </author>
            <author initials="D." surname="Basin" fullname="David Basin">
              <organization>Department of Computer Science, ETH Zurich</organization>
            </author>
            <date year="2023" month="November"/>
          </front>
          <seriesInfo name="CCS '23" value="Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security"/>
        </reference>
        <reference anchor="ADEM-SPEC" target="https://adem-wg.github.io/adem-spec/draft-adem-wg-adem-core.html">
          <front>
            <title>An Authenticated Digital EMblem - Core Specification</title>
            <author initials="F." surname="Linker" fullname="Felix Linker">
              <organization>ETH Zurich</organization>
            </author>
            <author initials="D." surname="Jackson" fullname="Dennis Jackson">
              <organization>None</organization>
            </author>
            <author initials="D." surname="Basin" fullname="David Basin">
              <organization>ETH Zurich</organization>
            </author>
            <date year="2023" month="August"/>
          </front>
        </reference>
        <reference anchor="DE-REPORT" target="https://www.icrc.org/en/document/icrc-digital-emblems-report">
          <front>
            <title>Digitalizing the Red Cross, Red Crescent and Red Crystal Emblems</title>
            <author initials="T." surname="Rodenhäuser" fullname="Tilman Rodenhäuser">
              <organization>ICRC</organization>
            </author>
            <author initials="M." surname="Vignati" fullname="Mauro Vignati">
              <organization>ICRC</organization>
            </author>
            <author initials="L." surname="Maybee" fullname="Larry Maybee">
              <organization>Australian Red Cross</organization>
            </author>
            <author initials="H." surname="Johnston" fullname="Hollie Johnston">
              <organization>Australian Red Cross</organization>
            </author>
            <date year="2022" month="November"/>
          </front>
          <format type="PDF" target="https://www.icrc.org/en/download/file/253888/icrc_digitalizing_the_rcrc_emblem.pdf"/>
        </reference>
        <reference anchor="I-D.haberman-digital-emblem">
          <front>
            <title>Digital Emblems Indicating Protections Under International Law</title>
            <author fullname="Brian Haberman" initials="B." surname="Haberman">
              <organization>Johns Hopkins University Applied Physics Lab</organization>
            </author>
            <author fullname="Allison Mankin" initials="A." surname="Mankin">
              <organization>Packet Clearing House</organization>
            </author>
            <author fullname="Bill Woodcock" initials="B." surname="Woodcock">
              <organization>Packet Clearing House</organization>
            </author>
            <author fullname="Casey Deccio" initials="C." surname="Deccio">
              <organization>Brigham Young University</organization>
            </author>
            <author fullname="Antonio DeSimone" initials="A." surname="DeSimone">
              <organization>Johns Hopkins University Applied Physics Lab</organization>
            </author>
            <date day="29" month="March" year="2024"/>
            <abstract>
              <t>   International law defines a number of emblems, such as the blue
   helmets of United Nations peacekeeping forces, the blue and white
   shield of UNESCO, and the Red Cross of the International Committee of
   the Red Cross, as indicative of special protections under the Geneva
   Conventions.  Similar protections attach to journalists who wear
   "Press" protective emblems on the battlefield, under Article 79 of
   Protocol I of the Geneva Conventions and Resolution 2222 of the
   United Nations Security Council.  The emblems of national governments
   and inter-governmental organizations protect diplomatic pouches,
   couriers, and envoys under the Vienna Convention on Diplomatic
   Relations.  Other marks enjoy protections against mis-use under the
   Paris Convention, the Madrid Protocol, and the Trade-Related Aspects
   of Intellectual Property Rights.

   Such physical emblems have a number of weaknesses (e.g., no real-time
   evaluation of their authenticity) and do not translate to the digital
   realm.  This document describes a digital emblem which addresses the
   shortcomings of the physical emblems and makes possible the
   indication of protections of digital assets under international law.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-haberman-digital-emblem-00"/>
        </reference>
        <reference anchor="RFC6962">
          <front>
            <title>Certificate Transparency</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="A. Langley" initials="A." surname="Langley"/>
            <author fullname="E. Kasper" initials="E." surname="Kasper"/>
            <date month="June" year="2013"/>
            <abstract>
              <t>This document describes an experimental protocol for publicly logging the existence of Transport Layer Security (TLS) certificates as they are issued or observed, in a manner that allows anyone to audit certificate authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
              <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6962"/>
          <seriesInfo name="DOI" value="10.17487/RFC6962"/>
        </reference>
      </references>
    </references>
    <?line 301?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Parts of this draft are based on the initial academic publication describing the proposal <em>ADEM: An Authentic Digital EMblem</em> <xref target="ADEM"/>.
Initial work on this project was funded by the Werner Siemens-Stiftung (WSS).
We thank the WSS for their generous support.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
