Re: [Secret] Call for consensus on updated charter

Tommy Pauly <tpauly@apple.com> Wed, 15 June 2022 03:24 UTC

Return-Path: <tpauly@apple.com>
X-Original-To: secret@ietfa.amsl.com
Delivered-To: secret@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EB868C15AAEC for <secret@ietfa.amsl.com>; Tue, 14 Jun 2022 20:24:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.854
X-Spam-Level:
X-Spam-Status: No, score=-7.854 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.745, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=apple.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id G8GxgyzmlPAd for <secret@ietfa.amsl.com>; Tue, 14 Jun 2022 20:24:57 -0700 (PDT)
Received: from ma1-aaemail-dr-lapp01.apple.com (ma1-aaemail-dr-lapp01.apple.com [17.171.2.60]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BE1E8C157B3F for <secret@ietf.org>; Tue, 14 Jun 2022 20:24:56 -0700 (PDT)
Received: from pps.filterd (ma1-aaemail-dr-lapp01.apple.com [127.0.0.1]) by ma1-aaemail-dr-lapp01.apple.com (8.16.0.42/8.16.0.42) with SMTP id 25F3EB0X008385; Tue, 14 Jun 2022 20:24:47 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=apple.com; h=from : message-id : content-type : mime-version : subject : date : in-reply-to : cc : to : references; s=20180706; bh=SPXZ307W6IYSJZosd50FIWpleJ1SWFGcoVnMtIiDRcs=; b=sKUtkEu8tVZaPLDhW/YA7d/0fQXHfBJz0OuffJAU8V7S+Iv8Eod+LyPSq1QbKqaDQVDo 1QbzK4wtwg4qyYRlNAbOfs/4Teo5hcpeDsqElrcmJ+LvX6zDNRFooEIo//W8MNoPhhU8 nzfBvT/nsLkcclnfmxABwvSFRHVIfape+iSLR9ctb2dqs7kbQl1BXYcIpyklW8s3Xdqh 9o0RM1BTNA3POT1cuA/bccblX3wPQTFq83GGg3QChbTCzv+iYDx+dAH8lINzA3Vx2sc1 Pa0yNE1jQhRhAMI2DZbIArVZ6sniVfLFue7iBi1u6AvA5SerF5LR3wBOE784f0DTl/lr kA==
Received: from rn-mailsvcp-mta-lapp03.rno.apple.com (rn-mailsvcp-mta-lapp03.rno.apple.com [10.225.203.151]) by ma1-aaemail-dr-lapp01.apple.com with ESMTP id 3gmsq35qfj-2 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Tue, 14 Jun 2022 20:24:47 -0700
Received: from rn-mailsvcp-mmp-lapp02.rno.apple.com (rn-mailsvcp-mmp-lapp02.rno.apple.com [17.179.253.15]) by rn-mailsvcp-mta-lapp03.rno.apple.com (Oracle Communications Messaging Server 8.1.0.18.20220407 64bit (built Apr 7 2022)) with ESMTPS id <0RDI00KES1HAC5H0@rn-mailsvcp-mta-lapp03.rno.apple.com>; Tue, 14 Jun 2022 20:24:46 -0700 (PDT)
Received: from process_milters-daemon.rn-mailsvcp-mmp-lapp02.rno.apple.com by rn-mailsvcp-mmp-lapp02.rno.apple.com (Oracle Communications Messaging Server 8.1.0.18.20220407 64bit (built Apr 7 2022)) id <0RDI00X001AM3Q00@rn-mailsvcp-mmp-lapp02.rno.apple.com>; Tue, 14 Jun 2022 20:24:46 -0700 (PDT)
X-Va-A:
X-Va-T-CD: 4ec1d282b8771f346bdd96c8adf118fc
X-Va-E-CD: 70874918c41b8d8a70ca83055167f8d4
X-Va-R-CD: 1d0ef13a9fe98e430a4231513d52d1ee
X-Va-CD: 0
X-Va-ID: aa758aa8-61f6-485a-a2c3-bcc6596e8d08
X-V-A:
X-V-T-CD: 4ec1d282b8771f346bdd96c8adf118fc
X-V-E-CD: 70874918c41b8d8a70ca83055167f8d4
X-V-R-CD: 1d0ef13a9fe98e430a4231513d52d1ee
X-V-CD: 0
X-V-ID: 3f268820-56b7-403c-a055-c798270df4cb
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.517, 18.0.874 definitions=2022-06-15_01:2022-06-13, 2022-06-14 signatures=0
Received: from smtpclient.apple (unknown [17.11.113.68]) by rn-mailsvcp-mmp-lapp02.rno.apple.com (Oracle Communications Messaging Server 8.1.0.18.20220407 64bit (built Apr 7 2022)) with ESMTPSA id <0RDI00Z7M1H9ED00@rn-mailsvcp-mmp-lapp02.rno.apple.com>; Tue, 14 Jun 2022 20:24:46 -0700 (PDT)
From: Tommy Pauly <tpauly@apple.com>
Message-id: <A080500D-2AD4-4424-83E6-716F1625F325@apple.com>
Content-type: multipart/alternative; boundary="Apple-Mail=_CB68543B-B8AA-4D5D-A362-D7B3F6AF421D"
MIME-version: 1.0 (Mac OS X Mail 16.0 \(3721.0.2\))
Date: Tue, 14 Jun 2022 20:24:35 -0700
In-reply-to: <BN2P110MB1107927315F65D68D266C26EDCAA9@BN2P110MB1107.NAMP110.PROD.OUTLOOK.COM>
Cc: "secret@ietf.org" <secret@ietf.org>
To: Roman Danyliw <rdd@cert.org>
References: <BN2P110MB1107927315F65D68D266C26EDCAA9@BN2P110MB1107.NAMP110.PROD.OUTLOOK.COM>
X-Mailer: Apple Mail (2.3721.0.2)
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.517, 18.0.874 definitions=2022-06-15_01:2022-06-13, 2022-06-14 signatures=0
Archived-At: <https://mailarchive.ietf.org/arch/msg/secret/K22GVOy4hyAirImQoSWc1dI5Muk>
Subject: Re: [Secret] Call for consensus on updated charter
X-BeenThere: secret@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Secure Credential Transfer <secret.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secret>, <mailto:secret-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secret/>
List-Post: <mailto:secret@ietf.org>
List-Help: <mailto:secret-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secret>, <mailto:secret-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 15 Jun 2022 03:24:58 -0000

Hi Roman,

Thanks for sharing this. In general, I think this charter is clear and has a good scope. Reviewing it, I had several nits for which I’ve opened a PR: https://github.com/dimmyvi/secure-credential-transfer/pull/32/files .

I’m including the proposed edited version in text below, for reference.

To answer the other questions, I’m willing to help review documents (and that Apple, my company, is planning on implementing).

Best,
Tommy

=======

TIGRESS ("Transfer dIGital cREdentialS Securely")

There are many situations in which it is desirable to transfer a copy of a digital credential to another person. For example, you may want to provide access to your vehicle to a friend or a family member. You may also want to provide access to your home to your cat sitter. Or, you may want to transfer a copy of a hotel key to your spouse. Today, no such standardized method exists in a cross-platform, credential type-agnostic capacity.

The WG charter includes the definition and standardization of a protocol that will facilitate such credential transfers from one person's device to another person's device. The protocol will leverage a “relay server” to transfer data from sender to recipient. The scope of the transfer is limited to a single origin device and a single destination device. Note that neither private keys nor secret symmetric keys present on the sender's device are exchanged during the transfer operation. In the transfer protocol, the "credential" being transferred from sender to recipient comprises data both necessary and sufficient for the recipient to exchange with the credential authority for new digital key material granting the recipient a subset of the sender's capabilities or entitlements.

Privacy goals include:
* The relay server should not see sensitive details of the share
* The relay server should not be able to provision the credential itself, acting as an intermediary for the recipient (person-in-the-middle, impersonation attack)
* Aside from potentially the IP address, the relay server should not learn the identity of the sender or receiver

Sufficient security measures should be embedded in the protocol in an effort to:
* Ensure only the intended recipient is able to provision the credential
* Ensure the credential can only be provisioned once (anti-replay)
* Ensure the sender has intent to share (proof of the fact that the share initiation is attributed to a valid device and a user)

The solution the WG comes up with must:
* Allow a sender to initiate a share and select a relay server
* Allow a recipient to view the share request, and provision the credential associated with the share upon receipt
* Allow a sender and a recipient to perform multiple round trip communications within a limited time frame
* Support opaque message content based on the credential type
* Support a variety of types of credentials, to include those adhering to public standards (e.g., Car Connectivity Consortium) and proprietary (i.e., non-public or closed community) formats

The following topics are out of scope for the WG:
* Defining the mechanism the receiver will use in order to provision the credential with the credential authority
* The User Interface (UI) that is displayed to the sender or receiver during sending or receiving (this will depend on the device manufacturer's interface guidelines)
* Defining the format or content of each field within the encrypted data (i.e., the provisioned credentials and associated information) stored on the relay server

The WG will deliver a protocol to facilitate secure credential transfer. The WG must consider all Privacy and Security considerations in an effort to perform the credential transfer in a secure manner. The protocol will use appropriate cryptographic mechanisms to protect the transferred credentials in accordance with the security and privacy goals described above.

Planned Deliverables:
2022-12: WG adoption of the secure credential transfer protocol
2023-12: Submit secure credential transfer protocol to the IESG for publication

=======

> On Jun 14, 2022, at 3:24 PM, Roman Danyliw <rdd@cert.org> wrote:
> 
> Hi!
> 
> In February 2022, the virtual SECRET BOF was convened [1].  We had a robust discussion on the scope of work and an initial charter presented -- see the minutes [2].  Polling of the BoF participants showed a healthy consensus on understanding of the problem and interest to solve it in the IETF.  There also appeared to be a critical mass of energy to do this work.
> 
> The BoF feedback and subsequent AD review pointed to a few places for refinement to the charter, to include changing the proposed name of the WG.  That version is included below for your review.
> 
> The participants in the BoF showed consensus to proceed with chartering a WG.  Now with a revised charter, I'd like to continue this BoF conversion with an email thread to gauge interest to forming a WG to ensure we also capture views from those who were unable to attend the BoF or those who want to reiterate their positions.  Please respond to the list:
> 
> (1) Do you support the charter text? Or do you have objections or blocking concerns (please describe what they might be)?
> 
> If you do support the charter text:
> (2) Are you willing to author or participate in the developed of the WG drafts?
> (3) Are you willing to review the WG drafts?
> (4) Are you interested in implementing the WG drafts?
> 
> If you previously spoke of at the BoF, you are welcome to repeat yourself here.
> 
> If you have been following along on the mailing list, the charter text below is the one that was being polished in GitHub (https://github.com/dimmyvi/secure-credential-transfer/blob/main/charter.md) with the milestones moved to the end.  
> 
> This call for feedback will end on Monday, June 27.
> 
> Thanks,
> Roman
> 
> [1] https://datatracker.ietf.org/meeting/interim-2022-secret-01/session/secret
> [2] https://datatracker.ietf.org/meeting/interim-2022-secret-01/materials/minutes-interim-2022-secret-01-202202100900-00.html
> 
> -- 
> Secret mailing list
> Secret@ietf.org
> https://www.ietf.org/mailman/listinfo/secret