<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-fossaceca-dult-finding-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.1 -->
  <front>
    <title>Finding Tracking Tags</title>
    <seriesInfo name="Internet-Draft" value="draft-fossaceca-dult-finding-00"/>
    <author fullname="Christine Fossaceca">
      <organization>Microsoft</organization>
      <address>
        <email>cfossaceca@microsoft.com</email>
      </address>
    </author>
    <author fullname="Eric Rescorla">
      <organization>Independent</organization>
      <address>
        <email>ekr@rtfm.com</email>
      </address>
    </author>
    <date year="2024" month="September" day="29"/>
    <area>Security</area>
    <workgroup>Detecting Unwanted Location Trackers</workgroup>
    <abstract>
      <?line 156?>

<t>Lightweight location tracking tags are in wide use to allow users
to locate items. These tags function as a component of a crowdsourced
tracking network in which devices belonging to other network
users (e.g., phones) report which
tags they see and their location, thus allowing the owner of the
tag to determine where their tag was most recently seen. This
document defines the protocol by which devices report tags
they have seen and by which owners look up their location.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://ekr.github.io/draft-fossaceca-dult-finding/draft-fossaceca-dult-finding.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-fossaceca-dult-finding/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Detecting Unwanted Location Trackers Working Group mailing list (<eref target="mailto:unwanted-trackers@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/unwanted-trackers/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/unwanted-trackers/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ekr/draft-fossaceca-dult-finding"/>.</t>
    </note>
  </front>
  <middle>
    <?line 168?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>DISCLAIMER: This draft is work-in-progress and has not yet seen significant (or
really any) security analysis. It should not be used as a basis for building
production systems.</t>
      <t>Lightweight location tracking tags are a mechanism by which users can track their personal items. These tags function as a component of a crowdsourced
tracking network in which devices belonging to other network users
(e.g., phones) report on the location of tags they have seen.
At a high level, location tracking this works as follows:</t>
      <ul spacing="normal">
        <li>
          <t>Tags ("Accessories") broadcast an advertisement payload containing
accessory-specific information. The payload also indicates whether
the accessory is separated from its owner and thus potentially lost.</t>
        </li>
        <li>
          <t>Devices belonging to other users ("Non-Owner Devices" or "Finder Devices")
observe those payloads and if the payload is in a separated
mode, reports its location to some central service ("Crowdsourced Network").</t>
        </li>
        <li>
          <t>The owner ("Owner Device") queries the central service
("Crowdsourced Network") for the location of their accessory.</t>
        </li>
      </ul>
      <t>A naive implementation of this design exposes users to considerable
privacy risk. In particular:</t>
      <ul spacing="normal">
        <li>
          <t>If accessories simply have a fixed identifier that is reported back
to the tracking network, then the central server is able to track
any accessory without the user's assistance, which is clearly
undesirable.</t>
        </li>
        <li>
          <t>Any attacker who can guess or determine a tag ID can query the central server
for its location.</t>
        </li>
        <li>
          <t>An attacker can surreptitiously plant an accessory on a target
and thus track them by tracking their "own" accessory.</t>
        </li>
      </ul>
      <t><xref target="security-considerations"/> provides a more detailed description of the
desired security privacy properties, but briefly, we would like to
have a system in which:</t>
      <ul spacing="normal">
        <li>
          <t>Nobody other than the owner of an accessory would be able to learn
anything about the location of a given accessory.</t>
        </li>
        <li>
          <t>It is possible to detect when an accessory is being used to track you.</t>
        </li>
        <li>
          <t>It is not possible for accessories that do not adhere to the protocol to use the crowdsourced network protocol.</t>
        </li>
        <li>
          <t>It is not possible for unverified accessories to use the crowdsourced network protocol.</t>
        </li>
      </ul>
      <t>A number of manufacturers have developed their own proprietary tracking
protocols, including Apple (see <xref target="WhoTracks"/> and <xref target="Heinrich"/>),
Samsung (see <xref target="Samsung"/>), and Tile, CUBE, Chipolo, Pebblebee and TrackR (see <xref target="GMCKV21"/>),
with varying security and privacy properties.</t>
      <t>This document defines a cryptographic reporting and finding protocol
which is intended to minimize the above privacy risks. It is intended to
work in concert with the requirements defined in
<xref target="I-D.detecting-unwanted-location-trackers"/>, which facilitate
detection of unwanted tracking tags. This protocol design is based on
existing academic research surrounding the security and privacy of
bluetooth location tracking accessories on the market today, as
described in <xref target="BlindMy"/> and <xref target="GMCKV21"/> and closely follows the
design of <xref target="BlindMy"/>.</t>
    </section>
    <section anchor="motivations">
      <name>Motivations</name>
      <section anchor="stalking-prevention">
        <name>Stalking Prevention</name>
        <t>This work has been inspired by the negative security and privacy
implications that were introduced by lightweight location tracking
tags, and defined in part by
<xref target="I-D.detecting-unwanted-location-trackers"/>. The full threat model
is described in detail in <xref target="DultDoc4"/>, however, a significant element
of the threat model lies in part with the security of the Crowdsourced
Network, which will be discussed in detail here.</t>
        <t>In addition to its designed uses, the Crowdsourced Network also
provided stalkers with a means to track others by planting a tracking
tag on them and then using the CN to locate the tracker.  Thus, this
document outlines the requirements and responsibilities of the
Crowdsourced Network to verify the authenticity of the participants,
while also preserving user privacy.</t>
        <ul spacing="normal">
          <li>
            <t>First, the Crowdsourced Network should ensure that only authentic
Finding Devices are sending reports to the Crowdsourced Network, and
this should occur via an authenticated and encrypted channel. This
will help prevent malicious actors from interfering with location
reporting services.</t>
          </li>
          <li>
            <t>Second, the Crowdsourced Network should ensure that only authorized
Owner Devices are able to download location reports, and this should
occur via an authenticated and encrypted channel. This will prevent
malicious actors from unauthorized access of location data.</t>
          </li>
          <li>
            <t>Third, the Crowdsourced Network must follow basic security
principles, such as storing location reports in an encrypted manner  </t>
            <t><em>(The benefits of this requirement are self explanatory.)</em></t>
          </li>
          <li>
            <t>Fourth, the Crowdsourced Network must validate that the accessory
registered to an owner is valid.  This wil prevent malicious actors
from leveraging counterfeit accessories.</t>
          </li>
          <li>
            <t>Fifth, users should should be able to opt-out of their devices
participating in the Crowdsourced Network.</t>
          </li>
        </ul>
      </section>
      <section anchor="prior-research">
        <name>Prior Research</name>
        <t>There is substantial research into stalking via the FindMy protocol
and overall crowdsourced network protocol deficiencies have been
described in multiple bodies of work, such as:</t>
        <ul spacing="normal">
          <li>
            <t><xref target="GMCKV21"/></t>
          </li>
          <li>
            <t><xref target="Heinrich"/></t>
          </li>
          <li>
            <t><xref target="WhoTracks"/></t>
          </li>
          <li>
            <t><xref target="BlindMy"/></t>
          </li>
          <li>
            <t><xref target="Beck"/></t>
          </li>
        </ul>
        <t>and others.</t>
        <t>There are some suggested improvements, such as the security properties
described in <xref target="GMCKV21"/> above.  The authors of <xref target="GMCKV21"/> also
suggested fusing a private key into the <tt>ACC</tt> to make it more difficult
to spoof, and requiring that location updates be signed.</t>
        <t><xref target="Heinrich"/> and <xref target="WhoTracks"/> pointed out early deficiencies in the
protocol, which <xref target="BlindMy"/> set out to solve. By introducing a Blind
Signature scheme, the authors sought to overcome an attacker
leveraging a large amount of keys to avoid triggering the
anti-tracking framework.  In this implementation, keys were
predetermined for a set interval, and signed by the server, such that
a specific, presigned key can only be used during a pre-determined
interval. The drawback of this approach is that the authentication is
left to the <tt>OD</tt> and the <tt>CN</tt>, and the <tt>CN</tt> does not do any
authentication with the <tt>FD</tt>, so it still could store forged location
reports. Additionally, the <tt>FD</tt> does not do any authentication with
the <tt>ACC</tt>, which means that it could potentially interact with
counterfeit <tt>ACC</tt> devices.</t>
        <t><xref target="Beck"/> introduces the idea of Multi-Dealer Secret Sharing (MDSS) as
a privacy preserving protocol that should also be considered.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>Section 1.2 of <xref target="I-D.detecting-unwanted-location-trackers"/> provides
definitions of the various system components.</t>
      <t>Accessory (ACC): This is the device which will be tracked. It is
assumed to lack direct internet access and GPS, but will possess
Bluetooth Low Energy capabilities, which it uses to send advertisement
messages. The accessory protocol is defined in <xref target="DultDoc3"/>.</t>
      <t>Advertisement: This is the message that is sent over the BLE Protocol
from the Accessory</t>
      <t>Crowdsourced Network (CN): This is the network that provides the
location reporting upload and download services for Owner Devices and
Finder Devices.</t>
      <t>Finder Device (FD): This is a device that is a non-owner device that
contributes information about an accessory to the crowdsourced
network.</t>
      <t>Owner Device (OD): This is the device which owns the accessory, and to
which it is paired. There can be multiple owner devices, however, the
security of that implementation is outside of the scope of this
document.</t>
    </section>
    <section anchor="protocol-overview">
      <name>Protocol Overview</name>
      <t><xref target="fig-protocol-overview"/> provides an overall view of the protocol.</t>
      <t>In this protocol, the Accessory communicates to Finder Devices or
<tt>FDs</tt>(such as phones) solely via Bluetooth, and the <tt>FDs</tt> communicate
to a centralized service on the Crowdsourced Network <tt>CN</tt>. Only during
the setup phase is the Owner Device <tt>OD</tt> able to act as a relay
between the Accessory <tt>ACC</tt> and the Crowdsourced Network <tt>CN</tt>. In this
implementation, the <tt>CN</tt> is able to act as a verifier and signer by
leveraging Blind Signatures, which allows the <tt>OD</tt> to obtain a
signature from the signer <tt>CN</tt> without revealing the input to the
<tt>CN</tt>.</t>
      <figure anchor="fig-protocol-overview">
        <name>Protocol Overview</name>
        <artwork><![CDATA[
                              ╭――――――――――――――――――╮
                              │        o         │
                              │ ╭──────────────╮ │
                              │ │              │ │
                              │ │              │ │                        .-~~~-.
                              │ │              │ │                .- ~ ~-(       )_ _
    o  o                      │ │              │ │               /                     ~ -.
 o        o                   │ │              │ │              |                           \
o          o     ------->     │ │              │ │   ------->    \                         .'
o          o                  │ │              │ │                 ~- . _____________ . -~
 o        o                   │ │              │ │
    o  o                      │ │              │ │
                              │ │              │ │
                              │ ╰──────────────╯ │
                              │       (_)        │
                              ╰――――――――――――――――――╯



  Accessory         BLE           Finder Device      Location            CN Server
               Advertisement                          Upload



]]></artwork>
      </figure>
      <t>As part of the setup phase (<xref target="setup"/>) the accessory and
owning device are paired, establishing a shared key <tt>SK</tt>
which is known to both the accessory and the owning device.
The rest of the protocol proceeds as follows.</t>
      <ul spacing="normal">
        <li>
          <t>The accessory periodically sends out an advertisement which contains
an ephemeral public key <tt>Y_i</tt> where <tt>i</tt> is the epoch the key is valid
for (e.g., a one hour window). <tt>Y_i</tt> and its corresponding private key
<tt>X_i</tt> are generated in a deterministic fashion from <tt>SK</tt> and the epoch
<tt>i</tt> (conceptually as a <tt>X_i = PRF(SK, i)</tt>).</t>
        </li>
        <li>
          <t>In order to report an accessory's location at time <tt>i</tt> a non-owning
device <tt>FD</tt> encrypts it under <tt>Y_i</tt> and transmits the pair
<tt>( E(Y_i, location), Y_i )</tt> to the central service <tt>CN</tt>.</t>
        </li>
        <li>
          <t>In order to locate an accessory at time <tt>i</tt>, the owner uses <tt>SK</tt> to
compute <tt>(X_i, Y_i)</tt> and then sends <tt>Y_i</tt> to the central service.
The central service responds with all the reports it has for <tt>Y_i</tt>,
and the owner decrypts them with <tt>X_i</tt>.</t>
        </li>
      </ul>
      <t>This design provides substantially improved privacy properties
over a naive design:</t>
      <ol spacing="normal" type="1"><li>
          <t>Nobody but the owner can learn the reported location of an
accessory because it is encrypted under <tt>Y_i</tt>. This includes
the central service, which just sees encrypted reports.</t>
        </li>
        <li>
          <t>It is not possible to correlate the public keys broadcast
across multiple epochs without knowing the shared key <tt>SK</tt>,
which is only know to the owner. However, an observer who
sees multiple beacons within the same epoch can correlate
them, as they will have the same <tt>Y_i</tt>. However, fast key
rotation also makes it more difficult to detect unwanted
tracking, which relies on multiple observations of the
same identifier over time.</t>
        </li>
      </ol>
      <t>However, there are a number of residual privacy threats, as described below.</t>
      <section anchor="reporting-device-leakage">
        <name>Reporting Device Leakage</name>
        <t>If the central server is able to learn the identity of the device
reporting an accessory or the identity of the owner requesting the location
of an accessory, then it can infer information about that accessory's
behavior. For instance:</t>
        <ul spacing="normal">
          <li>
            <t>If device A reports accessories X and Y owned by different users and
they both query for their devices, then the central server
may learn that those users were in the same place, or at least
their accessories were.</t>
          </li>
          <li>
            <t>If devices A and B both report tag X, then the server learns that
A and B were in the same place.</t>
          </li>
          <li>
            <t>If the central server is able to learn where a reporting device
is (e.g., by IP address) and then the user queries for that
accessory, then the server can infer information about where
the user was, or at least where they lost the accessory.</t>
          </li>
        </ul>
        <t>These issues can be mitigated by concealing the identity and/or
IP address of network elements communicating with the central
server using techniques such as Oblivious HTTP <xref target="RFC9458"/> or
MASQUE <xref target="RFC9298"/>.</t>
      </section>
      <section anchor="non-compliant-accessories">
        <name>Non-compliant Accessories</name>
        <t>The detection mechanisms described in
<xref target="I-D.detecting-unwanted-location-trackers"/> depend on correct
behavior from the tracker. For instance, <xref section="3.5.1" sectionFormat="of" target="I-D.detecting-unwanted-location-trackers"/> requires that
accessories use a rotation period of 24 hours when in
the "separated" state:</t>
        <t>When in a separated state, the accessory <bcp14>SHALL</bcp14> rotate its address
   every 24 hours.  This duration allows a platform's unwanted
   tracking algorithms to detect that the same accessory is in
   proximity for some period of time, when the owner is not in
   physical proximity.</t>
        <t>However, if an attacker were to make their own accessory that was
generated the right beacon messages or modify an existing one, they
could cause it to rotate the MAC address and public key <tt>Y_i</tt> more
frequently, thus evading detection algorithms. The following section
describes a mechanism which is intended to mitigate
this attack.</t>
        <section anchor="rate-limiting-and-attestation">
          <name>Rate Limiting and Attestation</name>
          <t>Because evading detection requires rapidly changing keys, evasion
can be made more difficult by limiting the rate at which keys
can change. This rate limiting works as follows:</t>
          <ol spacing="normal" type="1"><li>
              <t>Instead of allowing the accessory to publish an arbitrary
key <tt>Y_i</tt> it instead must pre-generate a set of keys,
one for each time window.</t>
            </li>
            <li>
              <t>During the setup/pairing phase, the accessory and owning
device interact with the central service, which
signs each temporal key using a blind signature scheme.
The owning device stores the signatures for each key <tt>Y_i</tt>.</t>
            </li>
            <li>
              <t>When it wishes to retrieve the location for a given accessory
the owning device provides the central service with the
corresponding signature, thus proving that it is retrieving
location for a pre-registered key; the central service
will refuse to provide results for unsigned keys.</t>
            </li>
          </ol>
          <t>Note that this mechanism <em>does not</em> prevent the accessory
from broadcasting arbitrary keys, but it cannot retrieve
location reports corresponding to those keys.</t>
          <t>This is not a complete defense: it limits an attacker who owns
a single accessory to a small number of keys per time window,
but an attacker who purchases N devices can then use N times
that many keys per window, potentially coordinating usage across
spatially separated devices to reduce the per-device cost.
[[OPEN ISSUE: Can we do better than this?]]</t>
        </section>
      </section>
    </section>
    <section anchor="protocol-definition">
      <name>Protocol Definition</name>
      <t>This section provides a detailed description of the DULT Finding Protocol.</t>
      <section anchor="system-stages">
        <name>System Stages</name>
        <t>The there are 5 stages that will be outlined, taking into account
elements from both <xref target="BlindMy"/> and <xref target="GMCKV21"/>.  These stages are as
follows:</t>
        <t>1) <strong>Initial Pairing / Accessory Setup</strong></t>
        <t>In this phase, the Accessory <tt>ACC</tt> is paired with the Owner Device
<tt>OD</tt>, and verified as authentic with the Crowdsourced Network <tt>CN</tt></t>
        <t>2) <strong>Accessory in Nearby Owner Mode</strong></t>
        <t>In this phase, the Accessory <tt>ACC</tt> is within Bluetooth range of the
Owner Device <tt>OD</tt>. In this phase, Finder Devices <tt>FDs</tt> <bcp14>SHALL NOT</bcp14>
generate location reports to send to the Crowdsourced Network
<tt>CN</tt>. The Accessory <bcp14>SHALL</bcp14> behave as defined in <xref target="DultDoc3"/>. [[OPEN
ISSUE: Need to make sure that walking around with an AirTag in Nearby
Mode does not allow for stalking]]</t>
        <t>3) <strong>Accessory in Separated (Lost) Mode</strong></t>
        <t>In this phase, the Accessory <tt>ACC</tt> is not within Bluetooth raange fo
the Owner Device <tt>OD</tt>, therefore, the accessory must generate "lost"
messages to be received by Finder Devices <tt>FD</tt>, as described in
<xref target="DultDoc3"/>.</t>
        <t>4) <strong>Finder Device creates a location report</strong></t>
        <t>Finder Device <tt>FD</tt> receives a Bluetooth packet, and uploads a location
report to the Crowdsourced Network <tt>CN</tt> if and only if it is confirmed
to be a valid location report.</t>
        <t>[[OPEN ISSUE: Should this be confirmed by the FD, or the CN? or
Both?]]</t>
        <t>[[OPEN ISSUE: Should there be auth between <tt>FD</tt> and <tt>ACC</tt> as well as
<tt>FD</tt> and <tt>CN</tt>]]</t>
        <t>5) <strong>Owner Device queries the Crowdsourced Network</strong></t>
        <t>Owner Device <tt>OD</tt> queries the Crowdsourced Network <tt>CN</tt> for the
encrypted location report.</t>
      </section>
      <section anchor="partial-blind-signature-scheme">
        <name>Partial Blind Signature Scheme</name>
        <t>[[OPEN ISSUE: Which blind signature scheme to use.]]</t>
        <t>In order to verify the parties involved in the protocol, we rely on a
partially blind signature scheme. <xref target="RFC9474"/> describes a blind signature
scheme as follows:</t>
        <t>The RSA Blind Signature Protocol is a two-party protocol between a
   client and server where they interact to compute sig = Sign(sk,
   input_msg), where input_msg = Prepare(msg) is a prepared version of
   the private message msg provided by the client, and sk is the private
   signing key provided by the server.  See Section 6.2 for details on
   how sk is generated and used in this protocol.  Upon completion of
   this protocol, the server learns nothing, whereas the client learns
   sig.  In particular, this means the server learns nothing of msg or
   input_msg and the client learns nothing of sk.</t>
        <t>The Finding Protocol uses a partially blind signature scheme in which
the signature also covers an additional <tt>info</tt> value which is not
kept secret from the signing server.</t>
      </section>
      <section anchor="setup">
        <name>Initial Pairing / Accessory Setup</name>
        <t>During the pairing process, the Accessory <tt>ACC</tt> pairs with the Owner
Device <tt>OD</tt> over Bluetooth. In this process, the <tt>ACC</tt> and <tt>OD</tt> must
generate cryptographically secure keys that will allow for the <tt>OD</tt> to
decrypt the <tt>ACC</tt> location reports.</t>
        <section anchor="authenticity-verification">
          <name>Authenticity Verification</name>
          <t>Upon the initial pairing of the the <tt>ACC</tt> and <tt>OD</tt>, before the key
generation process, the <tt>OD</tt> must facilitate communication with the
<tt>CN</tt> to verify the authenticity of the <tt>ACC</tt>.</t>
          <t>The precise details of this communication are implementation-dependent,
but at the end of this process the <tt>CN</tt> must be able to verify that:</t>
          <ol spacing="normal" type="1"><li>
              <t>The <tt>ACC</tt> is a legitimate (i.e., authorized) device.</t>
            </li>
            <li>
              <t>The <tt>ACC</tt> has not already been registered.</t>
            </li>
          </ol>
          <t>For instance, each <tt>ACC</tt> might be provisioned with a unique serial
number which is digitally signed by the manufacturer, thus allowing
the <tt>CN</tt> to verify legitimacy. The <tt>CN</tt> could use a database of
registered serial numbers to prevent multiple registrations.
Once registration is complete, there must be some mechanism for
the <tt>OD</tt> to maintain continuity of authentication; this too is
implementation specific.</t>
        </section>
        <section anchor="key-generation-and-signing-with-partial-blind-signatures">
          <name>Key Generation and Signing with Partial Blind Signatures</name>
          <t>The <tt>ACC</tt> must periodically be provisioned with new temporal
keys which FDs can then use to encrypt reports. Each temporal key
is associated with a given timestamp value,</t>
          <t>Once the <tt>ACC</tt> has been authorized, the <tt>ACC</tt> (or <tt>OD</tt> on its behalf)
needs to generate its temporal encryption keys <tt>Y_i</tt>. It then generates
a signing request for the blinded version of each key.</t>
          <t>contains two values:</t>
          <dl>
            <dt>blindedKey</dt>
            <dd>
              <t>An opaque string representing the key to be signed, computed as below.</t>
            </dd>
            <dt>timestamp</dt>
            <dd>
              <t>The time value for the first time when the key will be used in
seconds since the UNIX epoch</t>
            </dd>
          </dl>
          <artwork><![CDATA[
blindedKey = Blind(pk, Y_i, info)
]]></artwork>
          <t>With the following inputs:</t>
          <dl>
            <dt>pk</dt>
            <dd>
              <t>The public key for <tt>CN</tt></t>
            </dd>
            <dt>Y_i</dt>
            <dd>
              <t>The temporal key to be signed</t>
            </dd>
            <dt>info</dt>
            <dd>
              <t>The timestamp value serialized as an unsigned 64-bit integer
in network byte order.</t>
            </dd>
          </dl>
          <t>Prior to signing the key, the <tt>CN</tt> must ensure the acceptability of the timestamp.
While the details are implementation dependent, this generally involves
enforcing rate limits on how many keys can be signed with timestamps
within a given window. Once the <tt>CN</tt> is satisfied with the submission
it constructs a blind signature as shown below and returns it to the <tt>OD</tt>.</t>
          <t>[[OPEN ISSUE: Is it safe for <tt>ACC</tt> to hold all of the precomputed keys? Or does this create a privacy issue? ]]</t>
          <artwork><![CDATA[
    BlindSign(sk, blindedKey, info)
]]></artwork>
          <t>With the following inputs</t>
          <dl>
            <dt>sk</dt>
            <dd>
              <t>The secret key for <tt>CN</tt></t>
            </dd>
            <dt>blindedKey</dt>
            <dd>
              <t>The raw bytes of the blinded key provided by <tt>CN</tt></t>
            </dd>
          </dl>
          <t>Upon receiving the signed blinded key, the <tt>OD</tt> unblinds the signature
and stores it. If the <tt>OD</tt> generated <tt>Y_i</tt>, it must also transfer it
to the <tt>ACC</tt>. Note that <tt>ACC</tt> does not need a copy of the signature.</t>
        </section>
        <section anchor="accessory-in-nearby-owner-mode">
          <name>Accessory in Nearby Owner Mode</name>
          <t>After pairing, when the Accessory <tt>ACC</tt> is in Bluetooth range of <tt>OD</tt>,
it will follow the protocol as decribed in <xref target="DultDoc3"/>.</t>
        </section>
        <section anchor="accessory-in-separated-lost-mode">
          <name>Accessory in Separated (Lost) Mode</name>
          <t>After pairing, when the Accessory <tt>ACC</tt> no longer in the Bluetooth
range of <tt>OD</tt>, it will follow the protocol as decribed below:, which
should correspond to the behavior outlined in <xref target="DultDoc3"/>:</t>
          <t><tt>ACC</tt> periodically sends out an Advertisement which contains the then
current ephemeral public key <tt>Y_i</tt>. The full payload format of the
Advertisement is defined in <xref target="DultDoc3"/>.</t>
        </section>
      </section>
      <section anchor="finder-device-creates-a-location-report">
        <name>Finder Device creates a Location Report</name>
        <t>The Finder Device <tt>FD</tt> receives the advertisement via Bluetooth. <tt>FD</tt>
should have a mechanism by which to authenticate that this is a valid
public key with <tt>CN</tt>. *</t>
        <t>In order to report an accessory's location at time <tt>i</tt>, <tt>FD</tt> extracts
the elliptic curve public key from the advertisement, and records it
own location data, a timestamp, and a confidence value as described in
<xref target="Heinrich"/>.</t>
        <t><tt>FD</tt> performs ECDH with the public key <tt>Y</tt><sub>i</sub> and uses it to
encrypt the location data using HPKE Seal <xref target="RFC9180"/>. It sends the
result to the CN along with the hash of the current public key and the
current time.  [[OPEN ISSUE: Should we work in terms of hashes or the
public keys. What we send has to be what's looked up.]]. <tt>CN</tt> stores
the resulting values indexed under the hash of the public key.</t>
      </section>
      <section anchor="owner-device-queries-the-crowdsourced-network">
        <name>Owner Device queries the Crowdsourced Network</name>
        <t><tt>OD</tt>s can retrieve the location of a paired <tt>ACC</tt> by querying the <tt>CN</tt>.</t>
        <t>In order to query for a given time period <tt>i</tt> it presents:</t>
        <ul spacing="normal">
          <li>
            <t>The public key <tt>Y_i</tt> [or hash of the public key]</t>
          </li>
          <li>
            <t>The <tt>CN</tt>'s signature over <tt>Y_i</tt> as well as the associated
<tt>info</tt> value.</t>
          </li>
        </ul>
        <t>The CN then proceeds as follows:</t>
        <ol spacing="normal" type="1"><li>
            <t>Verify the signature over the key [hash]</t>
          </li>
          <li>
            <t>Verify that the timestamp in the <tt>info</tt> value is within an
acceptable period of time (e.g., one week) from the current time
[[OPEN ISSUE: Why do we need this step?]]</t>
          </li>
          <li>
            <t>Retrieve all reports matching the provided <tt>Y_i</tt></t>
          </li>
          <li>
            <t>Remove all reports which have timestamps that are not within the acceptable
time use window for the key, as indicated by the key's timestamp.</t>
          </li>
          <li>
            <t>Return the remaining reports to <tt>OD</tt>.</t>
          </li>
        </ol>
        <t>Finally, <tt>OD</tt> uses HPKE Open to decrypt the resulting reports,
thus recovering the location data for report.</t>
        <!--
\* Some ideas include

- `FD` can request a signature itself of the key - but would it be the same?
- `ACC` can send the public key and the signature to `FD` so `FD` can verify the signature
- `CN` has the option of discarding the packet if the hash of the public key is unknown, since the server has already signed all of the keys in the past - but is it reasonable to save/store these?
-->

</section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security - as described in <xref target="DultDoc4"/>?.
This section still mostly needs to be written.</t>
      <section anchor="effectiveness-of-rate-limiting-via-blind-signatures">
        <name>Effectiveness of Rate Limiting via Blind Signatures</name>
        <t>The blind signature mechanism described here (adapted from
<xref target="BlindMy"/>) helps to limit the damage of noncompliant devices.</t>
        <t>Because the <tt>CN</tt> will only generate signatures when the request is
associated with a valid device, an attacker cannot obtain a key
directly for a noncompliant device. However, this does not necessarily
mean that the attacker cannot provision noncompliant
devices. Specifically, if the <tt>OD</tt> sees the public keys (it need not
know the private keys, as described below) when they are sent to the
<tt>CN</tt> for signature, then it can provision them to a noncompliant
device.</t>
        <t>Even an attacker who can provision invalid devices can only obtain one
key per time window per valid device. Because key use windows overlap,
it is possible to rotate keys more frequently than the window, but in
order to rotate keys significantly more frequently than this, the
attacker must purchase multiple devices. However, they may be able
to provision the keys from multiple valid devices onto the same device,
thus achieving a rotation rate increase at linear cost.</t>
        <t>Note that enforcement of this rate limit happens only on the <tt>CN</tt>: the
<tt>FD</tt> does not check. An attacker can generate advertisements with
unsigned keys -- and thus at any rotation rate it chooses -- and the
<tt>FD</tt> will duly send valid reports encrypted under those keys. The <tt>CN</tt>
will store them but because the attacker will not be able to produce
valid signatures, they will not be able to retrieve those reports.</t>
        <t>As noted above, the <tt>ACC</tt> does not need to prove that it knows the
corresponding private keys for a given public key. The <tt>ACC</tt>
simply broadcasts the public keys; it is the <tt>OD</tt> which needs to
know the private keys in order to decrypt the reports.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>TODO Privacy - as described in <xref target="DultDoc4"/>?</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.detecting-unwanted-location-trackers">
          <front>
            <title>Detecting Unwanted Location Trackers</title>
            <author fullname="Brent Ledvina" initials="B." surname="Ledvina">
              <organization>Apple</organization>
            </author>
            <author fullname="Zachary Eddinger" initials="Z." surname="Eddinger">
              <organization>Google</organization>
            </author>
            <author fullname="Ben Detwiler" initials="B." surname="Detwiler">
              <organization>Apple</organization>
            </author>
            <author fullname="Siddika Parlak Polatkan" initials="S. P." surname="Polatkan">
              <organization>Google</organization>
            </author>
            <date day="20" month="December" year="2023"/>
            <abstract>
              <t>   This document lists a set of best practices and protocols for
   accessory manufacturers whose products have built-in location-
   tracking capabilities.  By following these requirements and
   recommendations, a location-tracking accessory will be compatible
   with unwanted tracking detection and alerts on mobile platforms.
   This is an important capability for improving the privacy and safety
   of individuals in the circumstance that those accessories are used to
   track their location without their knowledge or consent.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-detecting-unwanted-location-trackers-01"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9180">
          <front>
            <title>Hybrid Public Key Encryption</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="K. Bhargavan" initials="K." surname="Bhargavan"/>
            <author fullname="B. Lipp" initials="B." surname="Lipp"/>
            <author fullname="C. Wood" initials="C." surname="Wood"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document describes a scheme for hybrid public key encryption (HPKE). This scheme provides a variant of public key encryption of arbitrary-sized plaintexts for a recipient public key. It also includes three authenticated variants, including one that authenticates possession of a pre-shared key and two optional ones that authenticate possession of a key encapsulation mechanism (KEM) private key. HPKE works for any combination of an asymmetric KEM, key derivation function (KDF), and authenticated encryption with additional data (AEAD) encryption function. Some authenticated variants may not be supported by all KEMs. We provide instantiations of the scheme using widely used and efficient primitives, such as Elliptic Curve Diffie-Hellman (ECDH) key agreement, HMAC-based key derivation function (HKDF), and SHA2.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9180"/>
          <seriesInfo name="DOI" value="10.17487/RFC9180"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="BlindMy" target="https://petsymposium.org/popets/2023/popets-2023-0006.pdf">
          <front>
            <title>Blind My — An Improved Cryptographic Protocol to Prevent Stalking in Apple’s Find My Network</title>
            <author initials="" surname="Travis Mayberry">
              <organization/>
            </author>
            <author initials="" surname="Erik-Oliver Blass">
              <organization/>
            </author>
            <author initials="" surname="Ellis Fenske">
              <organization/>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="GMCKV21" target="https://dl.acm.org/doi/10.1145/3448300.3467821">
          <front>
            <title>Toward a secure crowdsourced location tracking system</title>
            <author initials="" surname="Chinmay Garg">
              <organization/>
            </author>
            <author initials="" surname="Aravind Machiry">
              <organization/>
            </author>
            <author initials="" surname="Andrea Continella">
              <organization/>
            </author>
            <author initials="" surname="Christopher Kruegel">
              <organization/>
            </author>
            <author initials="" surname="Giovanni Vigna">
              <organization/>
            </author>
            <date year="2021"/>
          </front>
        </reference>
        <reference anchor="DultDoc4" target="https://datatracker.ietf.org/doc/html/draft-delano-dult-threat-model">
          <front>
            <title>DRAFT Dult Threat Model</title>
            <author initials="" surname="Maggie Delano">
              <organization/>
            </author>
            <author initials="" surname="Jessie Lowell">
              <organization/>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="DultDoc3" target="https://www.ietf.org/archive/id/draft-ledvina-dult-accessory-protocol-00.html">
          <front>
            <title>Detecting Unwanted Location Trackers Accessory Protocol</title>
            <author initials="" surname="Brent Ledvina">
              <organization/>
            </author>
            <author initials="D." surname="Lazarov">
              <organization/>
            </author>
            <author initials="B." surname="Detwiler">
              <organization/>
            </author>
            <author initials="S. P." surname="Polatkan">
              <organization/>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="Heinrich" target="https://petsymposium.org/popets/2021/popets-2021-0045.pdf">
          <front>
            <title>Who Can Find My Devices? Security and Privacy of Apple's Crowd-Sourced Bluetooth Location Tracking System</title>
            <author initials="" surname="Alexander Heinrich">
              <organization/>
            </author>
            <author initials="" surname="Milan Stute">
              <organization/>
            </author>
            <author initials="" surname="Tim Kornhuber">
              <organization/>
            </author>
            <author initials="" surname="Matthias Hollick">
              <organization/>
            </author>
            <date year="2021"/>
          </front>
        </reference>
        <reference anchor="WhoTracks" target="https://dl.acm.org/doi/10.1145/3463676.3485616">
          <front>
            <title>Who Tracks the Trackers?</title>
            <author initials="" surname="Travis Mayberry">
              <organization/>
            </author>
            <author initials="" surname="Ellis Fenske">
              <organization/>
            </author>
            <author initials="" surname="Dane Brown">
              <organization/>
            </author>
            <author initials="" surname="Christine Fossaceca">
              <organization/>
            </author>
            <author initials="" surname="Sam Teplov">
              <organization/>
            </author>
            <author initials="" surname="Lucas Foppe">
              <organization/>
            </author>
            <author initials="" surname="Jeremey Martin">
              <organization/>
            </author>
            <author initials="" surname="Erik Rye">
              <organization/>
            </author>
            <date year="2021"/>
          </front>
        </reference>
        <reference anchor="Samsung" target="https://www.usenix.org/system/files/sec23winter-prepub-498-yu.pdf">
          <front>
            <title>Privacy Analysis of Samsung’s Crowd-Sourced Bluetooth Location Tracking System</title>
            <author initials="" surname="Tingfeng Yu">
              <organization/>
            </author>
            <author initials="" surname="James Henderson">
              <organization/>
            </author>
            <author initials="" surname="Alwen Tiu">
              <organization/>
            </author>
            <author initials="" surname="Thomas Haines">
              <organization/>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="Beck" target="https://eprint.iacr.org/2023/1332.pdf">
          <front>
            <title>Abuse-Resistant Location Tracking: Balancing Privacy and Safety in the Offline Finding Ecosystem</title>
            <author initials="" surname="Gabrielle Beck">
              <organization/>
            </author>
            <author initials="" surname="Harry Eldridge">
              <organization/>
            </author>
            <author initials="" surname="Matthew Green">
              <organization/>
            </author>
            <author initials="" surname="Nadia Heninger">
              <organization/>
            </author>
            <author initials="" surname="Abishek Jain">
              <organization/>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="RFC9458">
          <front>
            <title>Oblivious HTTP</title>
            <author fullname="M. Thomson" initials="M." surname="Thomson"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <date month="January" year="2024"/>
            <abstract>
              <t>This document describes Oblivious HTTP, a protocol for forwarding encrypted HTTP messages. Oblivious HTTP allows a client to make multiple requests to an origin server without that server being able to link those requests to the client or to identify the requests as having come from the same client, while placing only limited trust in the nodes used to forward the messages.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9458"/>
          <seriesInfo name="DOI" value="10.17487/RFC9458"/>
        </reference>
        <reference anchor="RFC9298">
          <front>
            <title>Proxying UDP in HTTP</title>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document describes how to proxy UDP in HTTP, similar to how the HTTP CONNECT method allows proxying TCP in HTTP. More specifically, this document defines a protocol that allows an HTTP client to create a tunnel for UDP communications through an HTTP server that acts as a proxy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9298"/>
          <seriesInfo name="DOI" value="10.17487/RFC9298"/>
        </reference>
        <reference anchor="RFC9474">
          <front>
            <title>RSA Blind Signatures</title>
            <author fullname="F. Denis" initials="F." surname="Denis"/>
            <author fullname="F. Jacobs" initials="F." surname="Jacobs"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <date month="October" year="2023"/>
            <abstract>
              <t>This document specifies an RSA-based blind signature protocol. RSA blind signatures were first introduced by Chaum for untraceable payments. A signature that is output from this protocol can be verified as an RSA-PSS signature.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9474"/>
          <seriesInfo name="DOI" value="10.17487/RFC9474"/>
        </reference>
      </references>
    </references>
    <?line 819?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
