<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-dult-finding-01" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title>Finding Tracking Tags</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-dult-finding-01"/>
    <author fullname="Christine Fossaceca">
      <organization>Microsoft</organization>
      <address>
        <email>cfossaceca@microsoft.com</email>
      </address>
    </author>
    <author fullname="Eric Rescorla">
      <organization>Independent</organization>
      <address>
        <email>ekr@rtfm.com</email>
      </address>
    </author>
    <date year="2025" month="June" day="05"/>
    <area>Security</area>
    <workgroup>Detecting Unwanted Location Trackers</workgroup>
    <abstract>
      <?line 156?>

<t>Lightweight location tracking tags are in wide use to allow users
to locate items. These tags function as a component of a crowdsourced
tracking network in which devices belonging to other network
users (e.g., phones) report which
tags they see and their location, thus allowing the owner of the
tag to determine where their tag was most recently seen. This
document defines the protocol by which devices report tags
they have seen and by which owners look up their location.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://ietf-wg-dult.github.io/draft-ietf-dult-finding/draft-ietf-dult-finding.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-dult-finding/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Detecting Unwanted Location Trackers Working Group mailing list (<eref target="mailto:unwanted-trackers@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/unwanted-trackers/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/unwanted-trackers/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-dult/draft-ietf-dult-finding"/>.</t>
    </note>
  </front>
  <middle>
    <?line 168?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>DISCLAIMER: This draft is work-in-progress and has not yet seen significant (or
really any) security analysis. It should not be used as a basis for building
production systems.</t>
      <t>Lightweight location tracking tags are a mechanism by which users can track their personal items. These tags function as a component of a crowdsourced
tracking network in which devices belonging to other network users
(e.g., phones) report on the location of tags they have seen.
At a high level, location tracking this works as follows:</t>
      <ul spacing="normal">
        <li>
          <t>Tags ("Accessories") broadcast an advertisement payload containing
accessory-specific information. The payload also indicates whether
the accessory is separated from its owner and thus potentially lost.</t>
        </li>
        <li>
          <t>Devices belonging to other users ("Non-Owner Devices" or "Finder Devices")
observe those payloads and if the payload is in a separated
mode, reports its location to some central service ("Crowdsourced Network").</t>
        </li>
        <li>
          <t>The owner ("Owner Device") queries the central service
("Crowdsourced Network") for the location of their accessory.</t>
        </li>
      </ul>
      <t>A naive implementation of this design exposes users to considerable
privacy risk. In particular:</t>
      <ul spacing="normal">
        <li>
          <t>If accessories simply have a fixed identifier that is reported back
to the tracking network, then the central server is able to track
any accessory without the user's assistance, which is clearly
undesirable.</t>
        </li>
        <li>
          <t>Any attacker who can guess or determine a tag ID can query the central server
for its location.</t>
        </li>
        <li>
          <t>An attacker can surreptitiously plant an accessory on a target
and thus track them by tracking their "own" accessory.</t>
        </li>
      </ul>
      <t><xref target="security-considerations"/> provides a more detailed description of the
desired security privacy properties, but briefly, we would like to
have a system in which:</t>
      <ul spacing="normal">
        <li>
          <t>Nobody other than the owner of an accessory would be able to learn
anything about the location of a given accessory.</t>
        </li>
        <li>
          <t>It is possible to detect when an accessory is being used to track you.</t>
        </li>
        <li>
          <t>It is not possible for accessories that do not adhere to the protocol to use the crowdsourced network protocol.</t>
        </li>
        <li>
          <t>It is not possible for unverified accessories to use the crowdsourced network protocol.</t>
        </li>
      </ul>
      <t>A number of manufacturers have developed their own proprietary tracking
protocols, including Apple (see <xref target="WhoTracks"/> and <xref target="Heinrich"/>),
Samsung (see <xref target="Samsung"/>), and Tile, CUBE, Chipolo, Pebblebee and TrackR (see <xref target="GMCKV21"/>),
with varying security and privacy properties.</t>
      <t>This document defines a cryptographic reporting and finding protocol
which is intended to minimize the above privacy risks. It is intended to
work in concert with the requirements defined in
<xref target="I-D.detecting-unwanted-location-trackers"/>, which facilitate
detection of unwanted tracking tags. This protocol design is based on
existing academic research surrounding the security and privacy of
bluetooth location tracking accessories on the market today, as
described in <xref target="BlindMy"/> and <xref target="GMCKV21"/> and closely follows the
design of <xref target="BlindMy"/>.</t>
    </section>
    <section anchor="motivations">
      <name>Motivations</name>
      <section anchor="stalking-prevention">
        <name>Stalking Prevention</name>
        <t>This work has been inspired by the negative security and privacy
implications that were introduced by lightweight location tracking
tags, and defined in part by
<xref target="I-D.detecting-unwanted-location-trackers"/>. The full threat model
is described in detail in <xref target="DultDoc4"/>, however, a significant element
of the threat model lies in part with the security of the Crowdsourced
Network, which will be discussed in detail here.</t>
        <t>In addition to its designed uses, the Crowdsourced Network also
provided stalkers with a means to track others by planting a tracking
tag on them and then using the CN to locate the tracker.  Thus, this
document outlines the requirements and responsibilities of the
Crowdsourced Network to verify the authenticity of the participants,
while also preserving user privacy.</t>
        <ul spacing="normal">
          <li>
            <t>First, the Crowdsourced Network should ensure that only authentic
Finding Devices are sending reports to the Crowdsourced Network, and
this should occur via an authenticated and encrypted channel. This
will help prevent malicious actors from interfering with location
reporting services.</t>
          </li>
          <li>
            <t>Second, the Crowdsourced Network should ensure that only authorized
Owner Devices are able to download location reports, and this should
occur via an authenticated and encrypted channel. This will prevent
malicious actors from unauthorized access of location data.</t>
          </li>
          <li>
            <t>Third, the Crowdsourced Network must follow basic security
principles, such as storing location reports in an encrypted manner  </t>
            <t><em>(The benefits of this requirement are self explanatory.)</em></t>
          </li>
          <li>
            <t>Fourth, the Crowdsourced Network must validate that the accessory
registered to an owner is valid.  This wil prevent malicious actors
from leveraging counterfeit accessories.</t>
          </li>
          <li>
            <t>Fifth, users should should be able to opt-out of their devices
participating in the Crowdsourced Network.</t>
          </li>
        </ul>
      </section>
      <section anchor="prior-research">
        <name>Prior Research</name>
        <t>There is substantial research into stalking via the FindMy protocol
and overall crowdsourced network protocol deficiencies have been
described in multiple bodies of work, such as:</t>
        <ul spacing="normal">
          <li>
            <t><xref target="GMCKV21"/></t>
          </li>
          <li>
            <t><xref target="Heinrich"/></t>
          </li>
          <li>
            <t><xref target="WhoTracks"/></t>
          </li>
          <li>
            <t><xref target="BlindMy"/></t>
          </li>
          <li>
            <t><xref target="Beck"/></t>
          </li>
        </ul>
        <t>and others.</t>
        <t>There are some suggested improvements, such as the security properties
described in <xref target="GMCKV21"/> above.  The authors of <xref target="GMCKV21"/> also
suggested fusing a private key into the <tt>ACC</tt> to make it more difficult
to spoof, and requiring that location updates be signed.</t>
        <t><xref target="Heinrich"/> and <xref target="WhoTracks"/> pointed out early deficiencies in the
protocol, which <xref target="BlindMy"/> set out to solve. By introducing a Blind
Signature scheme, the authors sought to overcome an attacker
leveraging a large amount of keys to avoid triggering the
anti-tracking framework.  In this implementation, keys were
predetermined for a set interval, and signed by the server, such that
a specific, presigned key can only be used during a pre-determined
interval. The drawback of this approach is that the authentication is
left to the <tt>OD</tt> and the <tt>CN</tt>, and the <tt>CN</tt> does not do any
authentication with the <tt>FD</tt>, so it still could store forged location
reports. Additionally, the <tt>FD</tt> does not do any authentication with
the <tt>ACC</tt>, which means that it could potentially interact with
counterfeit <tt>ACC</tt> devices.</t>
        <t><xref target="Beck"/> introduces the idea of Multi-Dealer Secret Sharing (MDSS) as
a privacy preserving protocol that should also be considered.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>Section 1.2 of <xref target="I-D.detecting-unwanted-location-trackers"/> provides
definitions of the various system components.</t>
      <t>Accessory (ACC): This is the device which will be tracked. It is
assumed to lack direct internet access and GPS, but will possess
Bluetooth Low Energy capabilities, which it uses to send advertisement
messages. The accessory protocol is defined in <xref target="DultDoc3"/>.</t>
      <t>Advertisement: This is the message that is sent over the BLE Protocol
from the Accessory</t>
      <t>Crowdsourced Network (CN): This is the network that provides the
location reporting upload and download services for Owner Devices and
Finder Devices.</t>
      <t>Finder Device (FD): This is a device that is a non-owner device that
contributes information about an accessory to the crowdsourced
network.</t>
      <t>Owner Device (OD): This is the device which owns the accessory, and to
which it is paired. There can be multiple owner devices, however, the
security of that implementation is outside of the scope of this
document.</t>
    </section>
    <section anchor="protocol-overview">
      <name>Protocol Overview</name>
      <t><xref target="fig-protocol-overview"/> provides an overall view of the protocol.</t>
      <t>In this protocol, the Accessory communicates to Finder Devices or
<tt>FDs</tt>(such as phones) solely via Bluetooth, and the <tt>FDs</tt> communicate
to a centralized service on the Crowdsourced Network <tt>CN</tt>. Only during
the setup phase is the Owner Device <tt>OD</tt> able to act as a relay
between the Accessory <tt>ACC</tt> and the Crowdsourced Network <tt>CN</tt>. In this
implementation, the <tt>CN</tt> is able to act as a verifier and signer by
leveraging Blind Signatures, which allows the <tt>OD</tt> to obtain a
signature from the signer <tt>CN</tt> without revealing the input to the
<tt>CN</tt>.</t>
      <figure anchor="fig-protocol-overview">
        <name>Protocol Overview</name>
        <artwork><![CDATA[
                              ╭――――――――――――――――――╮
                              │        o         │
                              │ ╭──────────────╮ │
                              │ │              │ │
                              │ │              │ │                        .-~~~-.
                              │ │              │ │                .- ~ ~-(       )_ _
    o  o                      │ │              │ │               /                     ~ -.
 o        o                   │ │              │ │              |                           \
o          o     ------->     │ │              │ │   ------->    \                         .'
o          o                  │ │              │ │                 ~- . _____________ . -~
 o        o                   │ │              │ │
    o  o                      │ │              │ │
                              │ │              │ │
                              │ ╰──────────────╯ │
                              │       (_)        │
                              ╰――――――――――――――――――╯



  Accessory         BLE           Finder Device      Location            CN Server
               Advertisement                          Upload



]]></artwork>
      </figure>
      <t>As part of the setup phase (<xref target="setup"/>) the accessory and
owning device are paired, establishing a shared key <tt>SK</tt>
which is known to both the accessory and the owning device.
The rest of the protocol proceeds as follows.</t>
      <ul spacing="normal">
        <li>
          <t>The accessory periodically sends out an advertisement which contains
an ephemeral public key <tt>Y_i</tt> where <tt>i</tt> is the epoch the key is valid
for (e.g., a one hour window). <tt>Y_i</tt> and its corresponding private key
<tt>X_i</tt> are generated in a deterministic fashion from <tt>SK</tt> and the epoch
<tt>i</tt> (conceptually as a <tt>X_i = PRF(SK, i)</tt>).</t>
        </li>
        <li>
          <t>In order to report an accessory's location at time <tt>i</tt> a non-owning
device <tt>FD</tt> encrypts it under <tt>Y_i</tt> and transmits the pair
<tt>( E(Y_i, location), Y_i )</tt> to the central service <tt>CN</tt>.</t>
        </li>
        <li>
          <t>In order to locate an accessory at time <tt>i</tt>, the owner uses <tt>SK</tt> to
compute <tt>(X_i, Y_i)</tt> and then sends <tt>Y_i</tt> to the central service.
The central service responds with all the reports it has for <tt>Y_i</tt>,
and the owner decrypts them with <tt>X_i</tt>.</t>
        </li>
      </ul>
      <t>This design provides substantially improved privacy properties
over a naive design:</t>
      <ol spacing="normal" type="1"><li>
          <t>Nobody but the owner can learn the reported location of an
accessory because it is encrypted under <tt>Y_i</tt>. This includes
the central service, which just sees encrypted reports.</t>
        </li>
        <li>
          <t>It is not possible to correlate the public keys broadcast
across multiple epochs without knowing the shared key <tt>SK</tt>,
which is only know to the owner. However, an observer who
sees multiple beacons within the same epoch can correlate
them, as they will have the same <tt>Y_i</tt>. However, fast key
rotation also makes it more difficult to detect unwanted
tracking, which relies on multiple observations of the
same identifier over time.</t>
        </li>
      </ol>
      <t>However, there are a number of residual privacy threats, as described below.</t>
      <section anchor="reporting-device-leakage">
        <name>Reporting Device Leakage</name>
        <t>If the central server is able to learn the identity of the device
reporting an accessory or the identity of the owner requesting the location
of an accessory, then it can infer information about that accessory's
behavior. For instance:</t>
        <ul spacing="normal">
          <li>
            <t>If device A reports accessories X and Y owned by different users and
they both query for their devices, then the central server
may learn that those users were in the same place, or at least
their accessories were.</t>
          </li>
          <li>
            <t>If devices A and B both report tag X, then the server learns that
A and B were in the same place.</t>
          </li>
          <li>
            <t>If the central server is able to learn where a reporting device
is (e.g., by IP address) and then the user queries for that
accessory, then the server can infer information about where
the user was, or at least where they lost the accessory.</t>
          </li>
        </ul>
        <t>These issues can be mitigated by concealing the identity and/or
IP address of network elements communicating with the central
server using techniques such as Oblivious HTTP <xref target="RFC9458"/> or
MASQUE <xref target="RFC9298"/>.</t>
      </section>
      <section anchor="non-compliant-accessories">
        <name>Non-compliant Accessories</name>
        <t>The detection mechanisms described in
<xref target="I-D.detecting-unwanted-location-trackers"/> depend on correct
behavior from the tracker. For instance, <xref section="3.5.1" sectionFormat="of" target="I-D.detecting-unwanted-location-trackers"/> requires that
accessories use a rotation period of 24 hours when in
the "separated" state:</t>
        <t>When in a separated state, the accessory <bcp14>SHALL</bcp14> rotate its address
   every 24 hours.  This duration allows a platform's unwanted
   tracking algorithms to detect that the same accessory is in
   proximity for some period of time, when the owner is not in
   physical proximity.</t>
        <t>However, if an attacker were to make their own accessory that was
generated the right beacon messages or modify an existing one, they
could cause it to rotate the MAC address and public key <tt>Y_i</tt> more
frequently, thus evading detection algorithms. The following section
describes a mechanism which is intended to mitigate
this attack.</t>
        <section anchor="rate-limiting-and-attestation">
          <name>Rate Limiting and Attestation</name>
          <t>Because evading detection requires rapidly changing keys, evasion
can be made more difficult by limiting the rate at which keys
can change. This rate limiting works as follows:</t>
          <ol spacing="normal" type="1"><li>
              <t>Instead of allowing the accessory to publish an arbitrary
key <tt>Y_i</tt> it instead must pre-generate a set of keys,
one for each time window.</t>
            </li>
            <li>
              <t>During the setup/pairing phase, the accessory and owning
device interact with the central service, which
signs each temporal key using a blind signature scheme.
The owning device stores the signatures for each key <tt>Y_i</tt>.</t>
            </li>
            <li>
              <t>When it wishes to retrieve the location for a given accessory
the owning device provides the central service with the
corresponding signature, thus proving that it is retrieving
location for a pre-registered key; the central service
will refuse to provide results for unsigned keys.</t>
            </li>
          </ol>
          <t>Note that this mechanism <em>does not</em> prevent the accessory
from broadcasting arbitrary keys, but it cannot retrieve
location reports corresponding to those keys.</t>
          <t>This is not a complete defense: it limits an attacker who owns
a single accessory to a small number of keys per time window,
but an attacker who purchases N devices can then use N times
that many keys per window, potentially coordinating usage across
spatially separated devices to reduce the per-device cost.
[[OPEN ISSUE: Can we do better than this?]]</t>
        </section>
      </section>
    </section>
    <section anchor="protocol-definition">
      <name>Protocol Definition</name>
      <t>This section provides a detailed description of the DULT Finding Protocol.</t>
      <section anchor="system-stages">
        <name>System Stages</name>
        <t>The there are 5 stages that will be outlined, taking into account
elements from both <xref target="BlindMy"/> and <xref target="GMCKV21"/>.  These stages are as
follows:</t>
        <t>1) <strong>Initial Pairing / Accessory Setup</strong></t>
        <t>In this phase, the Accessory <tt>ACC</tt> is paired with the Owner Device
<tt>OD</tt>, and verified as authentic with the Crowdsourced Network <tt>CN</tt></t>
        <t>2) <strong>Accessory in Nearby Owner Mode</strong></t>
        <t>In this phase, the Accessory <tt>ACC</tt> is within Bluetooth range of the
Owner Device <tt>OD</tt>. In this phase, Finder Devices <tt>FDs</tt> <bcp14>SHALL NOT</bcp14>
generate location reports to send to the Crowdsourced Network
<tt>CN</tt>. The Accessory <bcp14>SHALL</bcp14> behave as defined in <xref target="DultDoc3"/>. [[OPEN
ISSUE: Need to make sure that walking around with an AirTag in Nearby
Mode does not allow for stalking]]</t>
        <t>3) <strong>Accessory in Separated (Lost) Mode</strong></t>
        <t>In this phase, the Accessory <tt>ACC</tt> is not within Bluetooth raange fo
the Owner Device <tt>OD</tt>, therefore, the accessory must generate "lost"
messages to be received by Finder Devices <tt>FD</tt>, as described in
<xref target="DultDoc3"/>.</t>
        <t>4) <strong>Finder Device creates a location report</strong></t>
        <t>Finder Device <tt>FD</tt> receives a Bluetooth packet, and uploads a location
report to the Crowdsourced Network <tt>CN</tt> if and only if it is confirmed
to be a valid location report.</t>
        <t>[[OPEN ISSUE: Should this be confirmed by the FD, or the CN? or
Both?]]</t>
        <t>[[OPEN ISSUE: Should there be auth between <tt>FD</tt> and <tt>ACC</tt> as well as
<tt>FD</tt> and <tt>CN</tt>]]</t>
        <t>5) <strong>Owner Device queries the Crowdsourced Network</strong></t>
        <t>Owner Device <tt>OD</tt> queries the Crowdsourced Network <tt>CN</tt> for the
encrypted location report.</t>
      </section>
      <section anchor="partial-blind-signature-scheme">
        <name>Partial Blind Signature Scheme</name>
        <t>[[OPEN ISSUE: Which blind signature scheme to use.]]</t>
        <t>In order to verify the parties involved in the protocol, we rely on a
partially blind signature scheme. <xref target="RFC9474"/> describes a blind signature
scheme as follows:</t>
        <t>The RSA Blind Signature Protocol is a two-party protocol between a
   client and server where they interact to compute sig = Sign(sk,
   input_msg), where input_msg = Prepare(msg) is a prepared version of
   the private message msg provided by the client, and sk is the private
   signing key provided by the server.  See Section 6.2 for details on
   how sk is generated and used in this protocol.  Upon completion of
   this protocol, the server learns nothing, whereas the client learns
   sig.  In particular, this means the server learns nothing of msg or
   input_msg and the client learns nothing of sk.</t>
        <t>The Finding Protocol uses a partially blind signature scheme in which
the signature also covers an additional <tt>info</tt> value which is not
kept secret from the signing server.</t>
      </section>
      <section anchor="setup">
        <name>Initial Pairing / Accessory Setup</name>
        <t>During the pairing process, the Accessory <tt>ACC</tt> pairs with the Owner
Device <tt>OD</tt> over Bluetooth. In this process, the <tt>ACC</tt> and <tt>OD</tt> must
generate cryptographically secure keys that will allow for the <tt>OD</tt> to
decrypt the <tt>ACC</tt> location reports.</t>
        <section anchor="authenticity-verification">
          <name>Authenticity Verification</name>
          <t>Upon the initial pairing of the the <tt>ACC</tt> and <tt>OD</tt>, before the key
generation process, the <tt>OD</tt> must facilitate communication with the
<tt>CN</tt> to verify the authenticity of the <tt>ACC</tt>.</t>
          <t>The precise details of this communication are implementation-dependent,
but at the end of this process the <tt>CN</tt> must be able to verify that:</t>
          <ol spacing="normal" type="1"><li>
              <t>The <tt>ACC</tt> is a legitimate (i.e., authorized) device.</t>
            </li>
            <li>
              <t>The <tt>ACC</tt> has not already been registered.</t>
            </li>
          </ol>
          <t>For instance, each <tt>ACC</tt> might be provisioned with a unique serial
number which is digitally signed by the manufacturer, thus allowing
the <tt>CN</tt> to verify legitimacy. The <tt>CN</tt> could use a database of
registered serial numbers to prevent multiple registrations.
Once registration is complete, there must be some mechanism for
the <tt>OD</tt> to maintain continuity of authentication; this too is
implementation specific.</t>
        </section>
        <section anchor="key-generation-and-signing-with-partial-blind-signatures">
          <name>Key Generation and Signing with Partial Blind Signatures</name>
          <t>The <tt>ACC</tt> must periodically be provisioned with new temporal
keys which FDs can then use to encrypt reports. Each temporal key
is associated with a given timestamp value,</t>
          <t>Once the <tt>ACC</tt> has been authorized, the <tt>ACC</tt> (or <tt>OD</tt> on its behalf)
needs to generate its temporal encryption keys <tt>Y_i</tt>. It then generates
a signing request for the blinded version of each key.</t>
          <t>contains two values:</t>
          <dl>
            <dt>blindedKey</dt>
            <dd>
              <t>An opaque string representing the key to be signed, computed as below.</t>
            </dd>
            <dt>timestamp</dt>
            <dd>
              <t>The time value for the first time when the key will be used in
seconds since the UNIX epoch</t>
            </dd>
          </dl>
          <artwork><![CDATA[
blindedKey = Blind(pk, Y_i, info)
]]></artwork>
          <t>With the following inputs:</t>
          <dl>
            <dt>pk</dt>
            <dd>
              <t>The public key for <tt>CN</tt></t>
            </dd>
            <dt>Y_i</dt>
            <dd>
              <t>The temporal key to be signed</t>
            </dd>
            <dt>info</dt>
            <dd>
              <t>The timestamp value serialized as an unsigned 64-bit integer
in network byte order.</t>
            </dd>
          </dl>
          <t>Prior to signing the key, the <tt>CN</tt> must ensure the acceptability of the timestamp.
While the details are implementation dependent, this generally involves
enforcing rate limits on how many keys can be signed with timestamps
within a given window. Once the <tt>CN</tt> is satisfied with the submission
it constructs a blind signature as shown below and returns it to the <tt>OD</tt>.</t>
          <t>[[OPEN ISSUE: Is it safe for <tt>ACC</tt> to hold all of the precomputed keys? Or does this create a privacy issue? ]]</t>
          <artwork><![CDATA[
    BlindSign(sk, blindedKey, info)
]]></artwork>
          <t>With the following inputs</t>
          <dl>
            <dt>sk</dt>
            <dd>
              <t>The secret key for <tt>CN</tt></t>
            </dd>
            <dt>blindedKey</dt>
            <dd>
              <t>The raw bytes of the blinded key provided by <tt>CN</tt></t>
            </dd>
          </dl>
          <t>Upon receiving the signed blinded key, the <tt>OD</tt> unblinds the signature
and stores it. If the <tt>OD</tt> generated <tt>Y_i</tt>, it must also transfer it
to the <tt>ACC</tt>. Note that <tt>ACC</tt> does not need a copy of the signature.</t>
        </section>
        <section anchor="accessory-in-nearby-owner-mode">
          <name>Accessory in Nearby Owner Mode</name>
          <t>After pairing, when the Accessory <tt>ACC</tt> is in Bluetooth range of <tt>OD</tt>,
it will follow the protocol as decribed in <xref target="DultDoc3"/>.</t>
        </section>
        <section anchor="accessory-in-separated-lost-mode">
          <name>Accessory in Separated (Lost) Mode</name>
          <t>After pairing, when the Accessory <tt>ACC</tt> no longer in the Bluetooth
range of <tt>OD</tt>, it will follow the protocol as decribed below:, which
should correspond to the behavior outlined in <xref target="DultDoc3"/>:</t>
          <t><tt>ACC</tt> periodically sends out an Advertisement which contains the then
current ephemeral public key <tt>Y_i</tt>. The full payload format of the
Advertisement is defined in <xref target="DultDoc3"/>.</t>
        </section>
      </section>
      <section anchor="finder-device-creates-a-location-report">
        <name>Finder Device creates a Location Report</name>
        <t>The Finder Device <tt>FD</tt> receives the advertisement via Bluetooth. <tt>FD</tt>
should have a mechanism by which to authenticate that this is a valid
public key with <tt>CN</tt>. *</t>
        <t>In order to report an accessory's location at time <tt>i</tt>, <tt>FD</tt> extracts
the elliptic curve public key from the advertisement, and records it
own location data, a timestamp, and a confidence value as described in
<xref target="Heinrich"/>.</t>
        <t><tt>FD</tt> performs ECDH with the public key <tt>Y</tt><sub>i</sub> and uses it to
encrypt the location data using HPKE Seal <xref target="RFC9180"/>. It sends the
result to the CN along with the hash of the current public key and the
current time.  [[OPEN ISSUE: Should we work in terms of hashes or the
public keys. What we send has to be what's looked up.]]. <tt>CN</tt> stores
the resulting values indexed under the hash of the public key.</t>
      </section>
      <section anchor="owner-device-queries-the-crowdsourced-network">
        <name>Owner Device queries the Crowdsourced Network</name>
        <t><tt>OD</tt>s can retrieve the location of a paired <tt>ACC</tt> by querying the <tt>CN</tt>.</t>
        <t>In order to query for a given time period <tt>i</tt> it presents:</t>
        <ul spacing="normal">
          <li>
            <t>The public key <tt>Y_i</tt> [or hash of the public key]</t>
          </li>
          <li>
            <t>The <tt>CN</tt>'s signature over <tt>Y_i</tt> as well as the associated
<tt>info</tt> value.</t>
          </li>
        </ul>
        <t>The CN then proceeds as follows:</t>
        <ol spacing="normal" type="1"><li>
            <t>Verify the signature over the key [hash]</t>
          </li>
          <li>
            <t>Verify that the timestamp in the <tt>info</tt> value is within an
acceptable period of time (e.g., one week) from the current time
[[OPEN ISSUE: Why do we need this step?]]</t>
          </li>
          <li>
            <t>Retrieve all reports matching the provided <tt>Y_i</tt></t>
          </li>
          <li>
            <t>Remove all reports which have timestamps that are not within the acceptable
time use window for the key, as indicated by the key's timestamp.</t>
          </li>
          <li>
            <t>Return the remaining reports to <tt>OD</tt>.</t>
          </li>
        </ol>
        <t>Finally, <tt>OD</tt> uses HPKE Open to decrypt the resulting reports,
thus recovering the location data for report.</t>
        <!--
\* Some ideas include

- `FD` can request a signature itself of the key - but would it be the same?
- `ACC` can send the public key and the signature to `FD` so `FD` can verify the signature
- `CN` has the option of discarding the packet if the hash of the public key is unknown, since the server has already signed all of the keys in the past - but is it reasonable to save/store these?
-->

</section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security - as described in <xref target="DultDoc4"/>?.
This section still mostly needs to be written.</t>
      <section anchor="effectiveness-of-rate-limiting-via-blind-signatures">
        <name>Effectiveness of Rate Limiting via Blind Signatures</name>
        <t>The blind signature mechanism described here (adapted from
<xref target="BlindMy"/>) helps to limit the damage of noncompliant devices.</t>
        <t>Because the <tt>CN</tt> will only generate signatures when the request is
associated with a valid device, an attacker cannot obtain a key
directly for a noncompliant device. However, this does not necessarily
mean that the attacker cannot provision noncompliant
devices. Specifically, if the <tt>OD</tt> sees the public keys (it need not
know the private keys, as described below) when they are sent to the
<tt>CN</tt> for signature, then it can provision them to a noncompliant
device.</t>
        <t>Even an attacker who can provision invalid devices can only obtain one
key per time window per valid device. Because key use windows overlap,
it is possible to rotate keys more frequently than the window, but in
order to rotate keys significantly more frequently than this, the
attacker must purchase multiple devices. However, they may be able
to provision the keys from multiple valid devices onto the same device,
thus achieving a rotation rate increase at linear cost.</t>
        <t>Note that enforcement of this rate limit happens only on the <tt>CN</tt>: the
<tt>FD</tt> does not check. An attacker can generate advertisements with
unsigned keys -- and thus at any rotation rate it chooses -- and the
<tt>FD</tt> will duly send valid reports encrypted under those keys. The <tt>CN</tt>
will store them but because the attacker will not be able to produce
valid signatures, they will not be able to retrieve those reports.</t>
        <t>As noted above, the <tt>ACC</tt> does not need to prove that it knows the
corresponding private keys for a given public key. The <tt>ACC</tt>
simply broadcasts the public keys; it is the <tt>OD</tt> which needs to
know the private keys in order to decrypt the reports.</t>
      </section>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>TODO Privacy - as described in <xref target="DultDoc4"/>?</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.detecting-unwanted-location-trackers">
          <front>
            <title>Detecting Unwanted Location Trackers</title>
            <author fullname="Brent Ledvina" initials="B." surname="Ledvina">
              <organization>Apple</organization>
            </author>
            <author fullname="Zachary Eddinger" initials="Z." surname="Eddinger">
              <organization>Google</organization>
            </author>
            <author fullname="Ben Detwiler" initials="B." surname="Detwiler">
              <organization>Apple</organization>
            </author>
            <author fullname="Siddika Parlak Polatkan" initials="S. P." surname="Polatkan">
              <organization>Google</organization>
            </author>
            <date day="20" month="December" year="2023"/>
            <abstract>
              <t>   This document lists a set of best practices and protocols for
   accessory manufacturers whose products have built-in location-
   tracking capabilities.  By following these requirements and
   recommendations, a location-tracking accessory will be compatible
   with unwanted tracking detection and alerts on mobile platforms.
   This is an important capability for improving the privacy and safety
   of individuals in the circumstance that those accessories are used to
   track their location without their knowledge or consent.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-detecting-unwanted-location-trackers-01"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC9180">
          <front>
            <title>Hybrid Public Key Encryption</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="K. Bhargavan" initials="K." surname="Bhargavan"/>
            <author fullname="B. Lipp" initials="B." surname="Lipp"/>
            <author fullname="C. Wood" initials="C." surname="Wood"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document describes a scheme for hybrid public key encryption (HPKE). This scheme provides a variant of public key encryption of arbitrary-sized plaintexts for a recipient public key. It also includes three authenticated variants, including one that authenticates possession of a pre-shared key and two optional ones that authenticate possession of a key encapsulation mechanism (KEM) private key. HPKE works for any combination of an asymmetric KEM, key derivation function (KDF), and authenticated encryption with additional data (AEAD) encryption function. Some authenticated variants may not be supported by all KEMs. We provide instantiations of the scheme using widely used and efficient primitives, such as Elliptic Curve Diffie-Hellman (ECDH) key agreement, HMAC-based key derivation function (HKDF), and SHA2.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9180"/>
          <seriesInfo name="DOI" value="10.17487/RFC9180"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="BlindMy" target="https://petsymposium.org/popets/2023/popets-2023-0006.pdf">
          <front>
            <title>Blind My — An Improved Cryptographic Protocol to Prevent Stalking in Apple’s Find My Network</title>
            <author initials="" surname="Travis Mayberry">
              <organization/>
            </author>
            <author initials="" surname="Erik-Oliver Blass">
              <organization/>
            </author>
            <author initials="" surname="Ellis Fenske">
              <organization/>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="GMCKV21" target="https://dl.acm.org/doi/10.1145/3448300.3467821">
          <front>
            <title>Toward a secure crowdsourced location tracking system</title>
            <author initials="" surname="Chinmay Garg">
              <organization/>
            </author>
            <author initials="" surname="Aravind Machiry">
              <organization/>
            </author>
            <author initials="" surname="Andrea Continella">
              <organization/>
            </author>
            <author initials="" surname="Christopher Kruegel">
              <organization/>
            </author>
            <author initials="" surname="Giovanni Vigna">
              <organization/>
            </author>
            <date year="2021"/>
          </front>
        </reference>
        <reference anchor="DultDoc4" target="https://datatracker.ietf.org/doc/html/draft-delano-dult-threat-model">
          <front>
            <title>DRAFT Dult Threat Model</title>
            <author initials="" surname="Maggie Delano">
              <organization/>
            </author>
            <author initials="" surname="Jessie Lowell">
              <organization/>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="DultDoc3" target="https://www.ietf.org/archive/id/draft-ledvina-dult-accessory-protocol-00.html">
          <front>
            <title>Detecting Unwanted Location Trackers Accessory Protocol</title>
            <author initials="" surname="Brent Ledvina">
              <organization/>
            </author>
            <author initials="D." surname="Lazarov">
              <organization/>
            </author>
            <author initials="B." surname="Detwiler">
              <organization/>
            </author>
            <author initials="S. P." surname="Polatkan">
              <organization/>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="Heinrich" target="https://petsymposium.org/popets/2021/popets-2021-0045.pdf">
          <front>
            <title>Who Can Find My Devices? Security and Privacy of Apple's Crowd-Sourced Bluetooth Location Tracking System</title>
            <author initials="" surname="Alexander Heinrich">
              <organization/>
            </author>
            <author initials="" surname="Milan Stute">
              <organization/>
            </author>
            <author initials="" surname="Tim Kornhuber">
              <organization/>
            </author>
            <author initials="" surname="Matthias Hollick">
              <organization/>
            </author>
            <date year="2021"/>
          </front>
        </reference>
        <reference anchor="WhoTracks" target="https://dl.acm.org/doi/10.1145/3463676.3485616">
          <front>
            <title>Who Tracks the Trackers?</title>
            <author initials="" surname="Travis Mayberry">
              <organization/>
            </author>
            <author initials="" surname="Ellis Fenske">
              <organization/>
            </author>
            <author initials="" surname="Dane Brown">
              <organization/>
            </author>
            <author initials="" surname="Christine Fossaceca">
              <organization/>
            </author>
            <author initials="" surname="Sam Teplov">
              <organization/>
            </author>
            <author initials="" surname="Lucas Foppe">
              <organization/>
            </author>
            <author initials="" surname="Jeremey Martin">
              <organization/>
            </author>
            <author initials="" surname="Erik Rye">
              <organization/>
            </author>
            <date year="2021"/>
          </front>
        </reference>
        <reference anchor="Samsung" target="https://www.usenix.org/system/files/sec23winter-prepub-498-yu.pdf">
          <front>
            <title>Privacy Analysis of Samsung’s Crowd-Sourced Bluetooth Location Tracking System</title>
            <author initials="" surname="Tingfeng Yu">
              <organization/>
            </author>
            <author initials="" surname="James Henderson">
              <organization/>
            </author>
            <author initials="" surname="Alwen Tiu">
              <organization/>
            </author>
            <author initials="" surname="Thomas Haines">
              <organization/>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="Beck" target="https://eprint.iacr.org/2023/1332.pdf">
          <front>
            <title>Abuse-Resistant Location Tracking: Balancing Privacy and Safety in the Offline Finding Ecosystem</title>
            <author initials="" surname="Gabrielle Beck">
              <organization/>
            </author>
            <author initials="" surname="Harry Eldridge">
              <organization/>
            </author>
            <author initials="" surname="Matthew Green">
              <organization/>
            </author>
            <author initials="" surname="Nadia Heninger">
              <organization/>
            </author>
            <author initials="" surname="Abishek Jain">
              <organization/>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="RFC9458">
          <front>
            <title>Oblivious HTTP</title>
            <author fullname="M. Thomson" initials="M." surname="Thomson"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <date month="January" year="2024"/>
            <abstract>
              <t>This document describes Oblivious HTTP, a protocol for forwarding encrypted HTTP messages. Oblivious HTTP allows a client to make multiple requests to an origin server without that server being able to link those requests to the client or to identify the requests as having come from the same client, while placing only limited trust in the nodes used to forward the messages.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9458"/>
          <seriesInfo name="DOI" value="10.17487/RFC9458"/>
        </reference>
        <reference anchor="RFC9298">
          <front>
            <title>Proxying UDP in HTTP</title>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document describes how to proxy UDP in HTTP, similar to how the HTTP CONNECT method allows proxying TCP in HTTP. More specifically, this document defines a protocol that allows an HTTP client to create a tunnel for UDP communications through an HTTP server that acts as a proxy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9298"/>
          <seriesInfo name="DOI" value="10.17487/RFC9298"/>
        </reference>
        <reference anchor="RFC9474">
          <front>
            <title>RSA Blind Signatures</title>
            <author fullname="F. Denis" initials="F." surname="Denis"/>
            <author fullname="F. Jacobs" initials="F." surname="Jacobs"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <date month="October" year="2023"/>
            <abstract>
              <t>This document specifies an RSA-based blind signature protocol. RSA blind signatures were first introduced by Chaum for untraceable payments. A signature that is output from this protocol can be verified as an RSA-PSS signature.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9474"/>
          <seriesInfo name="DOI" value="10.17487/RFC9474"/>
        </reference>
      </references>
    </references>
    <?line 819?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
