<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-dult-finding-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title>Finding Tracking Tags</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-dult-finding-00"/>
    <author fullname="Christine Fossaceca">
      <organization>Microsoft</organization>
      <address>
        <email>cfossaceca@microsoft.com</email>
      </address>
    </author>
    <author fullname="Eric Rescorla">
      <organization>Independent</organization>
      <address>
        <email>ekr@rtfm.com</email>
      </address>
    </author>
    <date year="2024" month="November" day="03"/>
    <area>Security</area>
    <workgroup>Detecting Unwanted Location Trackers</workgroup>
    <abstract>
      <?line 156?>

<t>Lightweight location tracking tags are in wide use to allow users
to locate items. These tags function as a component of a crowdsourced
tracking network in which devices belonging to other network
users (e.g., phones) report which
tags they see and their location, thus allowing the owner of the
tag to determine where their tag was most recently seen. This
document defines the protocol by which devices report tags
they have seen and by which owners look up their location.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://ietf-wg-dult.github.io/draft-ietf-dult-finding/draft-ietf-dult-finding.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-dult-finding/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Detecting Unwanted Location Trackers Working Group mailing list (<eref target="mailto:unwanted-trackers@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/unwanted-trackers/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/unwanted-trackers/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-dult/draft-ietf-dult-finding"/>.</t>
    </note>
  </front>
  <middle>
    <?line 168?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>DISCLAIMER: This draft is work-in-progress and has not yet seen significant (or
really any) security analysis. It should not be used as a basis for building
production systems.</t>
      <t>Lightweight location tracking tags are a mechanism by which users can track their personal items. These tags function as a component of a crowdsourced
tracking network in which devices belonging to other network users
(e.g., phones) report on the location of tags they have seen.
At a high level, location tracking this works as follows:</t>
      <ul spacing="normal">
        <li>
          <t>Tags ("Accessories") broadcast an advertisement payload containing
accessory-specific information. The payload also indicates whether
the accessory is separated from its owner and thus potentially lost.</t>
        </li>
        <li>
          <t>Devices belonging to other users ("Non-Owner Devices" or "Finder Devices")
observe those payloads and if the payload is in a separated
mode, reports its location to some central service ("Crowdsourced Network").</t>
        </li>
        <li>
          <t>The owner ("Owner Device") queries the central service
("Crowdsourced Network") for the location of their accessory.</t>
        </li>
      </ul>
      <t>A naive implementation of this design exposes users to considerable
privacy risk. In particular:</t>
      <ul spacing="normal">
        <li>
          <t>If accessories simply have a fixed identifier that is reported back
to the tracking network, then the central server is able to track
any accessory without the user's assistance, which is clearly
undesirable.</t>
        </li>
        <li>
          <t>Any attacker who can guess or determine a tag ID can query the central server
for its location.</t>
        </li>
        <li>
          <t>An attacker can surreptitiously plant an accessory on a target
and thus track them by tracking their "own" accessory.</t>
        </li>
      </ul>
      <t><xref target="security-considerations"/> provides a more detailed description of the
desired security privacy properties, but briefly, we would like to
have a system in which:</t>
      <ul spacing="normal">
        <li>
          <t>Nobody other than the owner of an accessory would be able to learn
anything about the location of a given accessory.</t>
        </li>
        <li>
          <t>It is possible to detect when an accessory is being used to track you.</t>
        </li>
        <li>
          <t>It is not possible for accessories that do not adhere to the protocol to use the crowdsourced network protocol.</t>
        </li>
        <li>
          <t>It is not possible for unverified accessories to use the crowdsourced network protocol.</t>
        </li>
      </ul>
      <t>A number of manufacturers have developed their own proprietary tracking
protocols, including Apple (see <xref target="WhoTracks"/> and <xref target="Heinrich"/>),
Samsung (see <xref target="Samsung"/>), and Tile, CUBE, Chipolo, Pebblebee and TrackR (see <xref target="GMCKV21"/>),
with varying security and privacy properties.</t>
      <t>This document defines a cryptographic reporting and finding protocol
which is intended to minimize the above privacy risks. It is intended to
work in concert with the requirements defined in
<xref target="I-D.detecting-unwanted-location-trackers"/>, which facilitate
detection of unwanted tracking tags. This protocol design is based on
existing academic research surrounding the security and privacy of
bluetooth location tracking accessories on the market today, as
described in <xref target="BlindMy"/> and <xref target="GMCKV21"/> and closely follows the
design of <xref target="BlindMy"/>.</t>
    </section>
    <section anchor="motivations">
      <name>Motivations</name>
      <section anchor="stalking-prevention">
        <name>Stalking Prevention</name>
        <t>This work has been inspired by the negative security and privacy
implications that were introduced by lightweight location tracking
tags, and defined in part by
<xref target="I-D.detecting-unwanted-location-trackers"/>. The full threat model
is described in detail in <xref target="DultDoc4"/>, however, a significant element
of the threat model lies in part with the security of the Crowdsourced
Network, which will be discussed in detail here.</t>
        <t>In addition to its designed uses, the Crowdsourced Network also
provided stalkers with a means to track others by planting a tracking
tag on them and then using the CN to locate the tracker.  Thus, this
document outlines the requirements and responsibilities of the
Crowdsourced Network to verify the authenticity of the participants,
while also preserving user privacy.</t>
        <ul spacing="normal">
          <li>
            <t>First, the Crowdsourced Network should ensure that only authentic
Finding Devices are sending reports to the Crowdsourced Network, and
this should occur via an authenticated and encrypted channel. This
will help prevent malicious actors from interfering with location
reporting services.</t>
          </li>
          <li>
            <t>Second, the Crowdsourced Network should ensure that only authorized
Owner Devices are able to download location reports, and this should
occur via an authenticated and encrypted channel. This will prevent
malicious actors from unauthorized access of location data.</t>
          </li>
          <li>
            <t>Third, the Crowdsourced Network must follow basic security
principles, such as storing location reports in an encrypted manner  </t>
            <t><em>(The benefits of this requirement are self explanatory.)</em></t>
          </li>
          <li>
            <t>Fourth, the Crowdsourced Network must validate that the accessory
registered to an owner is valid.  This wil prevent malicious actors
from leveraging counterfeit accessories.</t>
          </li>
          <li>
            <t>Fifth, users should should be able to opt-out of their devices
participating in the Crowdsourced Network.</t>
          </li>
        </ul>
      </section>
      <section anchor="prior-research">
        <name>Prior Research</name>
        <t>There is substantial research into stalking via the FindMy protocol
and overall crowdsourced network protocol deficiencies have been
described in multiple bodies of work, such as:</t>
        <ul spacing="normal">
          <li>
            <t><xref target="GMCKV21"/></t>
          </li>
          <li>
            <t><xref target="Heinrich"/></t>
          </li>
          <li>
            <t><xref target="WhoTracks"/></t>
          </li>
          <li>
            <t><xref target="BlindMy"/></t>
          </li>
          <li>
            <t><xref target="Beck"/></t>
          </li>
        </ul>
        <t>and others.</t>
        <t>There are some suggested improvements, such as the security properties
described in <xref target="GMCKV21"/> above.  The authors of <xref target="GMCKV21"/> also
suggested fusing a private key into the <tt>ACC</tt> to make it more difficult
to spoof, and requiring that location updates be signed.</t>
        <t><xref target="Heinrich"/> and <xref target="WhoTracks"/> pointed out early deficiencies in the
protocol, which <xref target="BlindMy"/> set out to solve. By introducing a Blind
Signature scheme, the authors sought to overcome an attacker
leveraging a large amount of keys to avoid triggering the
anti-tracking framework.  In this implementation, keys were
predetermined for a set interval, and signed by the server, such that
a specific, presigned key can only be used during a pre-determined
interval. The drawback of this approach is that the authentication is
left to the <tt>OD</tt> and the <tt>CN</tt>, and the <tt>CN</tt> does not do any
authentication with the <tt>FD</tt>, so it still could store forged location
reports. Additionally, the <tt>FD</tt> does not do any authentication with
the <tt>ACC</tt>, which means that it could potentially interact with
counterfeit <tt>ACC</tt> devices.</t>
        <t><xref target="Beck"/> introduces the idea of Multi-Dealer Secret Sharing (MDSS) as
a privacy preserving protocol that should also be considered.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>Section 1.2 of <xref target="I-D.detecting-unwanted-location-trackers"/> provides
definitions of the various system components.</t>
      <t>Accessory (ACC): This is the device which will be tracked. It is
assumed to lack direct internet access and GPS, but will possess
Bluetooth Low Energy capabilities, which it uses to send advertisement
messages. The accessory protocol is defined in <xref target="DultDoc3"/>.</t>
      <t>Advertisement: This is the message that is sent over the BLE Protocol
from the Accessory</t>
      <t>Crowdsourced Network (CN): This is the network that provides the
location reporting upload and download services for Owner Devices and
Finder Devices.</t>
      <t>Finder Device (FD): This is a device that is a non-owner device that
contributes information about an accessory to the crowdsourced
network.</t>
      <t>Owner Device (OD): This is the device which owns the accessory, and to
which it is paired. There can be multiple owner devices, however, the
security of that implementation is outside of the scope of this
document.</t>
    </section>
    <section anchor="protocol-overview">
      <name>Protocol Overview</name>
      <t><xref target="fig-protocol-overview"/> provides an overall view of the protocol.</t>
      <t>In this protocol, the Accessory communicates to Finder Devices or
<tt>FDs</tt>(such as phones) solely via Bluetooth, and the <tt>FDs</tt> communicate
to a centralized service on the Crowdsourced Network <tt>CN</tt>. Only during
the setup phase is the Owner Device <tt>OD</tt> able to act as a relay
between the Accessory <tt>ACC</tt> and the Crowdsourced Network <tt>CN</tt>. In this
implementation, the <tt>CN</tt> is able to act as a verifier and signer by
leveraging Blind Signatures, which allows the <tt>OD</tt> to obtain a
signature from the signer <tt>CN</tt> without revealing the input to the
<tt>CN</tt>.</t>
      <figure anchor="fig-protocol-overview">
        <name>Protocol Overview</name>
        <artwork><![CDATA[
                              ╭――――――――――――――――――╮
                              │        o         │
                              │ ╭──────────────╮ │
                              │ │              │ │
                              │ │              │ │                        .-~~~-.
                              │ │              │ │                .- ~ ~-(       )_ _
    o  o                      │ │              │ │               /                     ~ -.
 o        o                   │ │              │ │              |                           \
o          o     ------->     │ │              │ │   ------->    \                         .'
o          o                  │ │              │ │                 ~- . _____________ . -~
 o        o                   │ │              │ │
    o  o                      │ │              │ │
                              │ │              │ │
                              │ ╰──────────────╯ │
                              │       (_)        │
                              ╰――――――――――――――――――╯



  Accessory         BLE           Finder Device      Location            CN Server
               Advertisement                          Upload



]]></artwork>
      </figure>
      <t>As part of the setup phase (<xref target="setup"/>) the accessory and
owning device are paired, establishing a shared key <tt>SK</tt>
which is known to both the accessory and the owning device.
The rest of the protocol proceeds as follows.</t>
      <ul spacing="normal">
        <li>
          <t>The accessory periodically sends out an advertisement which contains
an ephemeral public key <tt>Y_i</tt> where <tt>i</tt> is the epoch the key is valid
for (e.g., a one hour window). <tt>Y_i</tt> and its corresponding private key
<tt>X_i</tt> are generated in a deterministic fashion from <tt>SK</tt> and the epoch
<tt>i</tt> (conceptually as a <tt>X_i = PRF(SK, i)</tt>).</t>
        </li>
        <li>
          <t>In order to report an accessory's location at time <tt>i</tt> a non-owning
device <tt>FD</tt> encrypts it under <tt>Y_i</tt> and transmits the pair
<tt>( E(Y_i, location), Y_i )</tt> to the central service <tt>CN</tt>.</t>
        </li>
        <li>
          <t>In order to locate an accessory at time <tt>i</tt>, the owner uses <tt>SK</tt> to
compute <tt>(X_i, Y_i)</tt> and then sends <tt>Y_i</tt> to the central service.
The central service responds with all the reports it has for <tt>Y_i</tt>,
and the owner decrypts them with <tt>X_i</tt>.</t>
        </li>
      </ul>
      <t>This design provides substantially improved privacy properties
over a naive design:</t>
      <ol spacing="normal" type="1"><li>
          <t>Nobody but the owner can learn the reported location of an
accessory because it is encrypted under <tt>Y_i</tt>. This includes
the central service, which just sees encrypted reports.</t>
        </li>
        <li>
          <t>It is not possible to correlate the public keys broadcast
across multiple epochs without knowing the shared key <tt>SK</tt>,
which is only know to the owner. However, an observer who
sees multiple beacons within the same epoch can correlate
them, as they will have the same <tt>Y_i</tt>. However, fast key
rotation also makes it more difficult to detect unwanted
tracking, which relies on multiple observations of the
same identifier over time.</t>
        </li>
      </ol>
      <t>However, there are a number of residual privacy threats, as described below.</t>
      <section anchor="reporting-device-leakage">
        <name>Reporting Device Leakage</name>
        <t>If the central server is able to learn the identity of the device
reporting an accessory or the identity of the owner requesting the location
of an accessory, then it can infer information about that accessory's
behavior. For instance:</t>
        <ul spacing="normal">
          <li>
            <t>If device A reports accessories X and Y owned by different users and
they both query for their devices, then the central server
may learn that those users were in the same place, or at least
their accessories were.</t>
          </li>
          <li>
            <t>If devices A and B both report tag X, then the server learns that
A and B were in the same place.</t>
          </li>
          <li>
            <t>If the central server is able to learn where a reporting device
is (e.g., by IP address) and then the user queries for that
accessory, then the server can infer information about where
the user was, or at least where they lost the accessory.</t>
          </li>
        </ul>
        <t>These issues can be mitigated by concealing the identity and/or
IP address of network elements communicating with the central
server using techniques such as Oblivious HTTP <xref target="RFC9458"/> or
MASQUE <xref target="RFC9298"/>.</t>
      </section>
      <section anchor="non-compliant-accessories">
        <name>Non-compliant Accessories</name>
        <t>The detection mechanisms described in
<xref target="I-D.detecting-unwanted-location-trackers"/> depend on correct
behavior from the tracker. For instance, <xref section="3.5.1" sectionFormat="of" target="I-D.detecting-unwanted-location-trackers"/> requires that
accessories use a rotation period of 24 hours when in
the "separated" state:</t>
        <t>When in a separated state, the accessory <bcp14>SHALL</bcp14> rotate its address
   every 24 hours.  This duration allows a platform's unwanted
   tracking algorithms to detect that the same accessory is in
   proximity for some period of time, when the owner is not in
   physical proximity.</t>
        <t>However, if an attacker were to make their own accessory that was
generated the right beacon messages or modify an existing one, they
could cause it to rotate the MAC address and public key <tt>Y_i</tt> more
frequently, thus evading detection algorithms. The following section
describes a mechanism which is intended to mitigate
this attack.</t>
        <section anchor="rate-limiting-and-attestation">
          <name>Rate Limiting and Attestation</name>
          <t>Because evading detection requires rapidly changing keys, evasion
can be made more difficult by limiting the rate at which keys
can change. This rate limiting works as follows:</t>
          <ol spacing="normal" type="1"><li>
              <t>Instead of allowing the accessory to publish an arbitrary
key <tt>Y_i</tt> it instead must pre-generate a set of keys,
one for each time window.</t>
            </li>
            <li>
              <t>During the setup/pairing phase, the accessory and owning
device interact with the central service, which
signs each temporal key using a blind signature scheme.
The owning device stores the signatures for each key <tt>Y_i</tt>.</t>
            </li>
            <li>
              <t>When it wishes to retrieve the location for a given accessory
the owning device provides the central service with the
corresponding signature, thus proving that it is retrieving
location for a pre-registered key; the central service
will refuse to provide results for unsigned keys.</t>
            </li>
          </ol>
          <t>Note that this mechanism <em>does not</em> prevent the accessory
from broadcasting arbitrary keys, but it cannot retrieve
location reports corresponding to those keys.</t>
          <t>This is not a complete defense: it limits an attacker who owns
a single accessory to a small number of keys per time window,
but an attacker who purchases N devices can then use N times
that many keys per window, potentially coordinating usage across
spatially separated devices to reduce the per-device cost.
[[OPEN ISSUE: Can we do better than this?]]</t>
        </section>
      </section>
    </section>
    <section anchor="protocol-definition">
      <name>Protocol Definition</name>
      <t>This section provides a detailed description of the DULT Finding Protocol.</t>
      <section anchor="system-stages">
        <name>System Stages</name>
        <t>The there are 5 stages that will be outlined, taking into account
elements from both <xref target="BlindMy"/> and <xref target="GMCKV21"/>.  These stages are as
follows:</t>
        <t>1) <strong>Initial Pairing / Accessory Setup</strong></t>
        <t>In this phase, the Accessory <tt>ACC</tt> is paired with the Owner Device
<tt>OD</tt>, and verified as authentic with the Crowdsourced Network <tt>CN</tt></t>
        <t>2) <strong>Accessory in Nearby Owner Mode</strong></t>
        <t>In this phase, the Accessory <tt>ACC</tt> is within Bluetooth range of the
Owner Device <tt>OD</tt>. In this phase, Finder Devices <tt>FDs</tt> <bcp14>SHALL NOT</bcp14>
generate location reports to send to the Crowdsourced Network
<tt>CN</tt>. The Accessory <bcp14>SHALL</bcp14> behave as defined in <xref target="DultDoc3"/>. [[OPEN
ISSUE: Need to make sure that walking around with an AirTag in Nearby
Mode does not allow for stalking]]</t>
        <t>3) <strong>Accessory in Separated (Lost) Mode</strong></t>
        <t>In this phase, the Accessory <tt>ACC</tt> is not within Bluetooth raange fo
the Owner Device <tt>OD</tt>, therefore, the accessory must generate "lost"
messages to be received by Finder Devices <tt>FD</tt>, as described in
<xref target="DultDoc3"/>.</t>
        <t>4) <strong>Finder Device creates a location report</strong></t>
        <t>Finder Device <tt>FD</tt> receives a Bluetooth packet, and uploads a location
report to the Crowdsourced Network <tt>CN</tt> if and only if it is confirmed
to be a valid location report.</t>
        <t>[[OPEN ISSUE: Should this be confirmed by the FD, or the CN? or
Both?]]</t>
        <t>[[OPEN ISSUE: Should there be auth between <tt>FD</tt> and <tt>ACC</tt> as well as
<tt>FD</tt> and <tt>CN</tt>]]</t>
        <t>5) <strong>Owner Device queries the Crowdsourced Network</strong></t>
        <t>Owner Device <tt>OD</tt> queries the Crowdsourced Network <tt>CN</tt> for the
encrypted location report.</t>
      </section>
      <section anchor="partial-blind-signature-scheme">
        <name>Partial Blind Signature Scheme</name>
        <t>[[OPEN ISSUE: Which blind signature scheme to use.]]</t>
        <t>In order to verify the parties involved in the protocol, we rely on a
partially blind signature scheme. <xref target="RFC9474"/> describes a blind signature
scheme as follows:</t>
        <t>The RSA Blind Signature Protocol is a two-party protocol between a
   client and server where they interact to compute sig = Sign(sk,
   input_msg), where input_msg = Prepare(msg) is a prepared version of
   the private message msg provided by the client, and sk is the private
   signing key provided by the server.  See Section 6.2 for details on
   how sk is generated and used in this protocol.  Upon completion of
   this protocol, the server learns nothing, whereas the client learns
   sig.  In particular, this means the server learns nothing of msg or
   input_msg and the client learns nothing of sk.</t>
        <t>The Finding Protocol uses a partially blind signature scheme in which
the signature also covers an additional <tt>info</tt> value which is not
kept secret from the signing server.</t>
      </section>
      <section anchor="setup">
        <name>Initial Pairing / Accessory Setup</name>
        <t>During the pairing process, the Accessory <tt>ACC</tt> pairs with the Owner
Device <tt>OD</tt> over Bluetooth. In this process, the <tt>ACC</tt> and <tt>OD</tt> must
generate cryptographically secure keys that will allow for the <tt>OD</tt> to
decrypt the <tt>ACC</tt> location reports.</t>
        <section anchor="authenticity-verification">
          <name>Authenticity Verification</name>
          <t>Upon the initial pairing of the the <tt>ACC</tt> and <tt>OD</tt>, before the key
generation process, the <tt>OD</tt> must facilitate communication with the
<tt>CN</tt> to verify the authenticity of the <tt>ACC</tt>.</t>
          <t>The precise details of this communication are implementation-dependent,
but at the end of this process the <tt>CN</tt> must be able to verify that:</t>
          <ol spacing="normal" type="1"><li>
              <t>The <tt>ACC</tt> is a legitimate (i.e., authorized) device.</t>
            </li>
            <li>
              <t>The <tt>ACC</tt> has not already been registered.</t>
            </li>
          </ol>
          <t>For instance, each <tt>ACC</tt> might be provisioned with a unique serial
number which is digitally signed by the manufacturer, thus allowing
the <tt>CN</tt> to verify legitimacy. The <tt>CN</tt> could use a database of
registered serial numbers to prevent multiple registrations.
Once registration is complete, there must be some mechanism for
the <tt>OD</tt> to maintain continuity of authentication; this too is
implementation specific.</t>
        </section>
        <section anchor="key-generation-and-signing-with-partial-blind-signatures">
          <name>Key Generation and Signing with Partial Blind Signatures</name>
          <t>The <tt>ACC</tt> must periodically be provisioned with new temporal
keys which FDs can then use to encrypt reports. Each temporal key
is associated with a given timestamp value,</t>
          <t>Once the <tt>ACC</tt> has been authorized, the <tt>ACC</tt> (or <tt>OD</tt> on its behalf)
needs to generate its temporal encryption keys <tt>Y_i</tt>. It then generates
a signing request for the blinded version of each key.</t>
          <t>contains two values:</t>
          <dl>
            <dt>blindedKey</dt>
            <dd>
              <t>An opaque string representing the key to be signed, computed as below.</t>
            </dd>
            <dt>timestamp</dt>
            <dd>
              <t>The time value for the first time when the key will be used in
seconds since the UNIX epoch</t>
            </dd>
          </dl>
          <artwork><![CDATA[
blindedKey = Blind(pk, Y_i, info)
]]></artwork>
          <t>With the following inputs:</t>
          <dl>
            <dt>pk</dt>
            <dd>
              <t>The public key for <tt>CN</tt></t>
            </dd>
            <dt>Y_i</dt>
            <dd>
              <t>The temporal key to be signed</t>
            </dd>
            <dt>info</dt>
            <dd>
              <t>The timestamp value serialized as an unsigned 64-bit integer
in network byte order.</t>
            </dd>
          </dl>
          <t>Prior to signing the key, the <tt>CN</tt> must ensure the acceptability of the timestamp.
While the details are implementation dependent, this generally involves
enforcing rate limits on how many keys can be signed with timestamps
within a given window. Once the <tt>CN</tt> is satisfied with the submission
it constructs a blind signature as shown below and returns it to the <tt>OD</tt>.</t>
          <t>[[OPEN ISSUE: Is it safe for <tt>ACC</tt> to hold all of the precomputed keys? Or does this create a privacy issue? ]]</t>
          <artwork><![CDATA[
    BlindSign(sk, blindedKey, info)
]]></artwork>
          <t>With the following inputs</t>
          <dl>
            <dt>sk</dt>
            <dd>
              <t>The secret key for <tt>CN</tt></t>
            </dd>
            <dt>blindedKey</dt>
            <dd>
              <t>The raw bytes of the blinded key provided by <tt>CN</tt></t>
            </dd>
          </dl>
          <t>Upon receiving the signed blinded key, the <tt>OD</tt> unblinds the signature
and stores it. If the <tt>OD</tt> generated <tt>Y_i</tt>, it must also transfer it
to the <tt>ACC</tt>. Note that <tt>ACC</tt> does not need a copy of the signature.</t>
        </section>
        <section anchor="accessory-in-nearby-owner-mode">
          <name>Accessory in Nearby Owner Mode</name>
          <t>After pairing, when the Accessory <tt>ACC</tt> is in Bluetooth range of <tt>OD</tt>,
it will follow the protocol as decribed in <xref target="DultDoc3"/>.</t>
        </section>
        <section anchor="accessory-in-separated-lost-mode">
          <name>Accessory in Separated (Lost) Mode</name>
          <t>After pairing, when the Accessory <tt>ACC</tt> no longer in the Bluetooth
range of <tt>OD</tt>, it will follow the protocol as decribed below:, which
should correspond to the behavior outlined in <xref target="DultDoc3"/>:</t>
          <t><tt>ACC</tt> periodically sends out an Advertisement which contains the then
current ephemeral public key <tt>Y_i</tt>. The full payload format of the
Advertisement is defined in <xref target="DultDoc3"/>.</t>
        </section>
      </section>
      <section anchor="finder-device-creates-a-location-report">
        <name>Finder Device creates a Location Report</name>
        <t>The Finder Device <tt>FD</tt> receives the advertisement via Bluetooth. <tt>FD</tt>
should have a mechanism by which to authenticate that this is a valid
public key with <tt>CN</tt>. *</t>
        <t>In order to report an accessory's location at time <tt>i</tt>, <tt>FD</tt> extracts
the elliptic curve public key from the advertisement, and records it
own location data, a timestamp, and a confidence value as described in
<xref target="Heinrich"/>.</t>
        <t><tt>FD</tt> performs ECDH with the public key <tt>Y</tt><sub>i</sub> and uses it to
encrypt the location data using HPKE Seal <xref target="RFC9180"/>. It sends the
result to the CN along with the hash of the current public key and the
current time.  [[OPEN ISSUE: Should we work in terms of hashes or the
public keys. What we send has to be what's looked up.]]. <tt>CN</tt> stores
the resulting values indexed under the hash of the public key.</t>
      </section>
      <section anchor="owner-device-queries-the-crowdsourced-network">
        <name>Owner Device queries the Crowdsourced Network</name>
        <t><tt>OD</tt>s can retrieve the location of a paired <tt>ACC</tt> by querying the <tt>CN</tt>.</t>
        <t>In order to query for a given time period <tt>i</tt> it presents:</t>
        <ul spacing="normal">
          <li>
            <t>The public key <tt>Y_i</tt> [or hash of the public key]</t>
          </li>
          <li>
            <t>The <tt>CN</tt>'s signature over <tt>Y_i</tt> as well as the associated
<tt>info</tt> value.</t>
          </li>
        </ul>
        <t>The CN then proceeds as follows:</t>
        <ol spacing="normal" type="1"><li>
            <t>Verify the signature over the key [hash]</t>
          </li>
          <li>
            <t>Verify that the timestamp in the <tt>info</tt> value is within an
acceptable period of time (e.g., one week) from the current time
[[OPEN ISSUE: Why do we need this step?]]</t>
          </li>
          <li>
            <t>Retrieve all reports matching the provided <tt>Y_i</tt></t>
          </li>
          <li>
            <t>Remove all reports which have timestamps that are not within the acceptable
time use window for the key, as indicated by the key's timestamp.</t>
          </li>
          <li>
            <t>Return the remaining reports to <tt>OD</tt>.</t>
          </li>
        </ol>
        <t>Finally, <tt>OD</tt> uses HPKE Open to decrypt the resulting reports,
thus recovering the location data for report.</t>
        <!--
\* Some ideas include

- `FD` can request a signature itself of the key - but would it be the same?
- `ACC` can send the public key and the signature to `FD` so `FD` can verify the signature
- `CN` has the option of discarding the packet if the hash of the public key is unknown, since the server has already signed all of the keys in the past - but is it reasonable to save/store these?
-->

</section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security - as described in <xref target="DultDoc4"/>?.
This section still mostly needs to be written.</t>
      <section anchor="effectiveness-of-rate-limiting-via-blind-signatures">
        <name>Effectiveness of Rate Limiting via Blind Signatures</name>
        <t>The blind signature mechanism described here (adapted from
<xref target="BlindMy"/>) helps to limit the damage of noncompliant devices.</t>
        <t>Because the <tt>CN</tt> will only generate signatures when the request is
associated with a valid device, an attacker cannot obtain a key
directly for a noncompliant device. However, this does not necessarily
mean that the attacker cannot provision noncompliant
devices. Specifically, if the <tt>OD</tt> sees the public keys (it need not
know the private keys, as described below) when they are sent to the
<tt>CN</tt> for signature, then it can provision them to a noncompliant
device.</t>
        <t>Even an attacker who can provision invalid devices can only obtain one
key per time window per valid device. Because key use windows overlap,
it is possible to rotate keys more frequently than the window, but in
order to rotate keys significantly more frequently than this, the
attacker must purchase multiple devices. However, they may be able
to provision the keys from multiple valid devices onto the same device,
thus achieving a rotation rate increase at linear cost.</t>
        <t>Note that enforcement of this rate limit happens only on the <tt>CN</tt>: the
<tt>FD</tt> does not check. An attacker can generate advertisements with
unsigned keys -- and thus at any rotation rate it chooses -- and the
<tt>FD</tt> will duly send valid reports encrypted under those keys. The <tt>CN</tt>
will store them but because the attacker will not be able to produce
valid signatures, they will not be able to retrieve those reports.</t>
        <t>As noted above, the <tt>ACC</tt> does not need to prove that it knows the
corresponding private keys for a given public key. The <tt>ACC</tt>
simply broadcasts the public keys; it is the <tt>OD</tt> which needs to
know the private keys in order to decrypt the reports.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>TODO Privacy - as described in <xref target="DultDoc4"/>?</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.detecting-unwanted-location-trackers">
          <front>
            <title>Detecting Unwanted Location Trackers</title>
            <author fullname="Brent Ledvina" initials="B." surname="Ledvina">
              <organization>Apple</organization>
            </author>
            <author fullname="Zachary Eddinger" initials="Z." surname="Eddinger">
              <organization>Google</organization>
            </author>
            <author fullname="Ben Detwiler" initials="B." surname="Detwiler">
              <organization>Apple</organization>
            </author>
            <author fullname="Siddika Parlak Polatkan" initials="S. P." surname="Polatkan">
              <organization>Google</organization>
            </author>
            <date day="20" month="December" year="2023"/>
            <abstract>
              <t>   This document lists a set of best practices and protocols for
   accessory manufacturers whose products have built-in location-
   tracking capabilities.  By following these requirements and
   recommendations, a location-tracking accessory will be compatible
   with unwanted tracking detection and alerts on mobile platforms.
   This is an important capability for improving the privacy and safety
   of individuals in the circumstance that those accessories are used to
   track their location without their knowledge or consent.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-detecting-unwanted-location-trackers-01"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9180">
          <front>
            <title>Hybrid Public Key Encryption</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="K. Bhargavan" initials="K." surname="Bhargavan"/>
            <author fullname="B. Lipp" initials="B." surname="Lipp"/>
            <author fullname="C. Wood" initials="C." surname="Wood"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document describes a scheme for hybrid public key encryption (HPKE). This scheme provides a variant of public key encryption of arbitrary-sized plaintexts for a recipient public key. It also includes three authenticated variants, including one that authenticates possession of a pre-shared key and two optional ones that authenticate possession of a key encapsulation mechanism (KEM) private key. HPKE works for any combination of an asymmetric KEM, key derivation function (KDF), and authenticated encryption with additional data (AEAD) encryption function. Some authenticated variants may not be supported by all KEMs. We provide instantiations of the scheme using widely used and efficient primitives, such as Elliptic Curve Diffie-Hellman (ECDH) key agreement, HMAC-based key derivation function (HKDF), and SHA2.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9180"/>
          <seriesInfo name="DOI" value="10.17487/RFC9180"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="BlindMy" target="https://petsymposium.org/popets/2023/popets-2023-0006.pdf">
          <front>
            <title>Blind My — An Improved Cryptographic Protocol to Prevent Stalking in Apple’s Find My Network</title>
            <author initials="" surname="Travis Mayberry">
              <organization/>
            </author>
            <author initials="" surname="Erik-Oliver Blass">
              <organization/>
            </author>
            <author initials="" surname="Ellis Fenske">
              <organization/>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="GMCKV21" target="https://dl.acm.org/doi/10.1145/3448300.3467821">
          <front>
            <title>Toward a secure crowdsourced location tracking system</title>
            <author initials="" surname="Chinmay Garg">
              <organization/>
            </author>
            <author initials="" surname="Aravind Machiry">
              <organization/>
            </author>
            <author initials="" surname="Andrea Continella">
              <organization/>
            </author>
            <author initials="" surname="Christopher Kruegel">
              <organization/>
            </author>
            <author initials="" surname="Giovanni Vigna">
              <organization/>
            </author>
            <date year="2021"/>
          </front>
        </reference>
        <reference anchor="DultDoc4" target="https://datatracker.ietf.org/doc/html/draft-delano-dult-threat-model">
          <front>
            <title>DRAFT Dult Threat Model</title>
            <author initials="" surname="Maggie Delano">
              <organization/>
            </author>
            <author initials="" surname="Jessie Lowell">
              <organization/>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="DultDoc3" target="https://www.ietf.org/archive/id/draft-ledvina-dult-accessory-protocol-00.html">
          <front>
            <title>Detecting Unwanted Location Trackers Accessory Protocol</title>
            <author initials="" surname="Brent Ledvina">
              <organization/>
            </author>
            <author initials="D." surname="Lazarov">
              <organization/>
            </author>
            <author initials="B." surname="Detwiler">
              <organization/>
            </author>
            <author initials="S. P." surname="Polatkan">
              <organization/>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="Heinrich" target="https://petsymposium.org/popets/2021/popets-2021-0045.pdf">
          <front>
            <title>Who Can Find My Devices? Security and Privacy of Apple's Crowd-Sourced Bluetooth Location Tracking System</title>
            <author initials="" surname="Alexander Heinrich">
              <organization/>
            </author>
            <author initials="" surname="Milan Stute">
              <organization/>
            </author>
            <author initials="" surname="Tim Kornhuber">
              <organization/>
            </author>
            <author initials="" surname="Matthias Hollick">
              <organization/>
            </author>
            <date year="2021"/>
          </front>
        </reference>
        <reference anchor="WhoTracks" target="https://dl.acm.org/doi/10.1145/3463676.3485616">
          <front>
            <title>Who Tracks the Trackers?</title>
            <author initials="" surname="Travis Mayberry">
              <organization/>
            </author>
            <author initials="" surname="Ellis Fenske">
              <organization/>
            </author>
            <author initials="" surname="Dane Brown">
              <organization/>
            </author>
            <author initials="" surname="Christine Fossaceca">
              <organization/>
            </author>
            <author initials="" surname="Sam Teplov">
              <organization/>
            </author>
            <author initials="" surname="Lucas Foppe">
              <organization/>
            </author>
            <author initials="" surname="Jeremey Martin">
              <organization/>
            </author>
            <author initials="" surname="Erik Rye">
              <organization/>
            </author>
            <date year="2021"/>
          </front>
        </reference>
        <reference anchor="Samsung" target="https://www.usenix.org/system/files/sec23winter-prepub-498-yu.pdf">
          <front>
            <title>Privacy Analysis of Samsung’s Crowd-Sourced Bluetooth Location Tracking System</title>
            <author initials="" surname="Tingfeng Yu">
              <organization/>
            </author>
            <author initials="" surname="James Henderson">
              <organization/>
            </author>
            <author initials="" surname="Alwen Tiu">
              <organization/>
            </author>
            <author initials="" surname="Thomas Haines">
              <organization/>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="Beck" target="https://eprint.iacr.org/2023/1332.pdf">
          <front>
            <title>Abuse-Resistant Location Tracking: Balancing Privacy and Safety in the Offline Finding Ecosystem</title>
            <author initials="" surname="Gabrielle Beck">
              <organization/>
            </author>
            <author initials="" surname="Harry Eldridge">
              <organization/>
            </author>
            <author initials="" surname="Matthew Green">
              <organization/>
            </author>
            <author initials="" surname="Nadia Heninger">
              <organization/>
            </author>
            <author initials="" surname="Abishek Jain">
              <organization/>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="RFC9458">
          <front>
            <title>Oblivious HTTP</title>
            <author fullname="M. Thomson" initials="M." surname="Thomson"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <date month="January" year="2024"/>
            <abstract>
              <t>This document describes Oblivious HTTP, a protocol for forwarding encrypted HTTP messages. Oblivious HTTP allows a client to make multiple requests to an origin server without that server being able to link those requests to the client or to identify the requests as having come from the same client, while placing only limited trust in the nodes used to forward the messages.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9458"/>
          <seriesInfo name="DOI" value="10.17487/RFC9458"/>
        </reference>
        <reference anchor="RFC9298">
          <front>
            <title>Proxying UDP in HTTP</title>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document describes how to proxy UDP in HTTP, similar to how the HTTP CONNECT method allows proxying TCP in HTTP. More specifically, this document defines a protocol that allows an HTTP client to create a tunnel for UDP communications through an HTTP server that acts as a proxy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9298"/>
          <seriesInfo name="DOI" value="10.17487/RFC9298"/>
        </reference>
        <reference anchor="RFC9474">
          <front>
            <title>RSA Blind Signatures</title>
            <author fullname="F. Denis" initials="F." surname="Denis"/>
            <author fullname="F. Jacobs" initials="F." surname="Jacobs"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <date month="October" year="2023"/>
            <abstract>
              <t>This document specifies an RSA-based blind signature protocol. RSA blind signatures were first introduced by Chaum for untraceable payments. A signature that is output from this protocol can be verified as an RSA-PSS signature.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9474"/>
          <seriesInfo name="DOI" value="10.17487/RFC9474"/>
        </reference>
      </references>
    </references>
    <?line 819?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
